Auto-Update: 2025-06-02T14:00:19.743193+00:00

This commit is contained in:
cad-safe-bot 2025-06-02 14:03:56 +00:00
parent 094319c586
commit 8913de9814
25 changed files with 1449 additions and 70 deletions

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-12168",
"sourceIdentifier": "browser-security@yandex-team.ru",
"published": "2025-06-02T13:15:20.517",
"lastModified": "2025-06-02T13:15:20.517",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Yandex Telemost for Desktop before 2.7.0\u00a0has a DLL Hijacking Vulnerability because an untrusted search path is used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "browser-security@yandex-team.ru",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "browser-security@yandex-team.ru",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
}
],
"references": [
{
"url": "https://yandex.com/bugbounty/i/hall-of-fame-products",
"source": "browser-security@yandex-team.ru"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26467",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-26T16:27:59.823",
"lastModified": "2024-11-21T09:02:27.513",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T13:46:43.653",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tabatkins:railroad-diagram_generator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024-01-15",
"matchCriteriaId": "64C9CFD5-202A-4156-96F0-86249C61C605"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/cd80/50463b0e62067ec861b7006cbf46b068",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/cd80/50463b0e62067ec861b7006cbf46b068",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26468",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-26T16:27:59.870",
"lastModified": "2024-11-21T09:02:27.717",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T13:55:25.737",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jstrieb:url_pages:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2020-10-25",
"matchCriteriaId": "9C2C99DD-FE4F-420C-8E81-F6ED755A634C"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/cd80/87b41cf58ba04564d55f4a26152bf0a9",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/cd80/87b41cf58ba04564d55f4a26152bf0a9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28286",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T02:52:24.617",
"lastModified": "2024-11-21T09:06:08.723",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T13:59:05.650",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mz-automation:libiec61850:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F82EDC5-C42C-4EED-A04D-D27F75F61D21"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mz-automation/libiec61850/issues/496",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory",
"Exploit"
]
},
{
"url": "https://github.com/mz-automation/libiec61850/issues/496",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory",
"Exploit"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-26396",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2025-06-02T13:15:21.367",
"lastModified": "2025-06-02T13:15:21.367",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SolarWinds Dameware Mini Remote Control was determined to be affected by Incorrect Permissions Local Privilege Escalation Vulnerability. This vulnerability requires local access and a valid low privilege account to be susceptible to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://documentation.solarwinds.com/en/success_center/dameware/content/release_notes/dameware_12-3-2_release_notes.htm",
"source": "psirt@solarwinds.com"
},
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26396",
"source": "psirt@solarwinds.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-46806",
"sourceIdentifier": "meissner@suse.de",
"published": "2025-06-02T13:15:21.600",
"lastModified": "2025-06-02T13:15:21.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Use of Out-of-range Pointer Offset vulnerability in sslh leads to denial of service on some architectures.This issue affects sslh before 2.2.4."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "meissner@suse.de",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-823"
}
]
}
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46806",
"source": "meissner@suse.de"
},
{
"url": "https://github.com/yrutschle/sslh/releases/tag/v2.2.4",
"source": "meissner@suse.de"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-46807",
"sourceIdentifier": "meissner@suse.de",
"published": "2025-06-02T12:15:24.800",
"lastModified": "2025-06-02T12:15:24.800",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Allocation of Resources Without Limits or Throttling vulnerability in sslh allows attackers to easily exhaust the file descriptors in sslh and deny legitimate users service.This issue affects sslh before 2.2.4."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "meissner@suse.de",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46807",
"source": "meissner@suse.de"
},
{
"url": "https://github.com/yrutschle/sslh/releases/tag/v2.2.4",
"source": "meissner@suse.de"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-47289",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-02T11:15:22.710",
"lastModified": "2025-06-02T11:15:22.710",
"lastModified": "2025-06-02T13:15:21.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +55,10 @@
{
"url": "https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-98qq-m8qj-vvgj",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-98qq-m8qj-vvgj",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-48495",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-02T12:15:25.380",
"lastModified": "2025-06-02T12:15:25.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. By renaming the friendly name of an API key, an authenticated user could inject JS into the API key overview, which would also be executed when another user clicks on his API tab. Prior to version 2.0.0, there was no user permission system implemented, therefore all authenticated users were already able to see and modify all resources, even if end-to-end encrypted, as the encryption key had to be the same for all users of versions prior to 2.0.0. If a user is the only authenticated user using Gokapi, they are not affected. This issue has been fixed in v2.0.0. A workaround would be to not open the API page if it is possible that another user might have injected code."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-87"
}
]
}
],
"references": [
{
"url": "https://github.com/Forceu/Gokapi/commit/65ddbc68fbfdf1c80cadb477f4bcbb7f2c4fdbf8",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Forceu/Gokapi/security/advisories/GHSA-4xg4-54hm-9j77",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48745",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-02T13:15:21.897",
"lastModified": "2025-06-02T13:15:21.897",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-49113. Reason: This candidate is a reservation duplicate of CVE-2025-49113. Notes: All CVE users should reference CVE-2025-49113 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-48955",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-02T12:15:25.523",
"lastModified": "2025-06-02T12:15:25.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Para is a multitenant backend server/framework for object persistence and retrieval. A vulnerability that exists in versions prior to 1.50.8 exposes both access and secret keys in logs without redaction. These credentials are later reused in variable assignments for persistence but do not require logging for debugging or system health purposes. Version 1.50.8 fixes the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://github.com/Erudika/para/commit/1e8a89558542854bb0683ab234c4429ad93b0835",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Erudika/para/security/advisories/GHSA-v75g-77vf-6jjq",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-48957",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-02T12:15:25.680",
"lastModified": "2025-06-02T12:15:25.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AstrBot is a large language model chatbot and development framework. A path traversal vulnerability present in versions 3.4.4 through 3.5.12 may lead to information disclosure, such as API keys for LLM providers, account passwords, and other sensitive data. The vulnerability has been addressed in Pull Request #1676 and is included in version 3.5.13. As a workaround, users can edit the `cmd_config.json` file to disable the dashboard feature as a temporary workaround. However, it is strongly recommended to upgrade to version v3.5.13 or later to fully resolve this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-23"
}
]
}
],
"references": [
{
"url": "https://github.com/AstrBotDevs/AstrBot/commit/cceadf222c46813c7f41115b40d371e7eb91e492",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/AstrBotDevs/AstrBot/issues/1675",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/AstrBotDevs/AstrBot/pull/1676",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/AstrBotDevs/AstrBot/security/advisories/GHSA-cq37-g2qp-3c2p",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-48958",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-02T12:15:25.840",
"lastModified": "2025-06-02T12:15:25.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Froxlor is open source server administration software. Prior to version 2.2.6, an HTML Injection vulnerability in the customer account portal allows an attacker to inject malicious HTML payloads in the email section. This can lead to phishing attacks, credential theft, and reputational damage by redirecting users to malicious external websites. The vulnerability has a medium severity, as it can be exploited through user input without authentication. Version 2.2.6 fixes the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/froxlor/Froxlor/commit/fde43f80600f1035e1e3d2297411b666d805549a",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/froxlor/Froxlor/security/advisories/GHSA-26xq-m8xw-6373",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/user-attachments/assets/86947633-3e7c-4e10-86cc-92e577761e8e",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-48990",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-02T12:15:25.997",
"lastModified": "2025-06-02T12:15:25.997",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NeKernal is a free and open-source operating system stack. Version 0.0.2 has a 1-byte heap overflow in `rt_copy_memory`, which unconditionally wrote a null terminator at `dst[len]`. When `len` equals the size of the destination buffer (256 bytes), that extra `'\\0'` write overruns the buffer by one byte. To avoid breaking existing callers or changing the public API, the patch in commit fb7b7f658327f659c6a6da1af151cb389c2ca4ee takes a minimal approach: it simply removes the overflow-causing line without adding bounds checks or altering the function signature."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://github.com/nekernel-org/nekernel/commit/fb7b7f658327f659c6a6da1af151cb389c2ca4ee",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nekernel-org/nekernel/security/advisories/GHSA-jvvh-fp57-2p32",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-49113",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-02T05:15:53.420",
"lastModified": "2025-06-02T05:15:53.420",
"lastModified": "2025-06-02T13:15:21.987",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -48,6 +48,10 @@
}
],
"references": [
{
"url": "https://fearsoff.org/research/roundcube",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/roundcube/roundcubemail/commit/0376f69e958a8fef7f6f09e352c541b4e7729c4d",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-5428",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-02T04:15:44.977",
"lastModified": "2025-06-02T04:15:44.977",
"lastModified": "2025-06-02T13:15:22.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.584056",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_list_delete_logs.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-5430",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-02T05:16:09.920",
"lastModified": "2025-06-02T05:16:09.920",
"lastModified": "2025-06-02T13:15:22.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.584257",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-5431",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-02T06:15:20.740",
"lastModified": "2025-06-02T06:15:20.740",
"lastModified": "2025-06-02T13:15:22.403",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -132,6 +132,10 @@
{
"url": "https://vuldb.com/?id.310764",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-5432",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-02T06:15:21.023",
"lastModified": "2025-06-02T06:15:21.023",
"lastModified": "2025-06-02T13:15:22.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -132,6 +132,10 @@
{
"url": "https://vuldb.com/?id.310765",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5443",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-02T12:15:26.143",
"lastModified": "2025-06-02T12:15:26.143",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function wirelessAdvancedHidden of the file /goform/wirelessAdvancedHidden. The manipulation of the argument ExtChSelector/24GSelector/5GSelector leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
},
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_6/6.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.310782",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.310782",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.584365",
"source": "cna@vuldb.com"
},
{
"url": "https://www.linksys.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5444",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-02T12:15:26.337",
"lastModified": "2025-06-02T12:15:26.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this vulnerability is the function RP_UpgradeFWByBBS of the file /goform/RP_UpgradeFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
},
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_7/7.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.310783",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.310783",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.584366",
"source": "cna@vuldb.com"
},
{
"url": "https://www.linksys.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5445",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-02T13:15:22.910",
"lastModified": "2025-06-02T13:15:22.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this issue is the function RP_checkFWByBBS of the file /goform/RP_checkFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
},
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_8/8.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.310784",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.310784",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.584367",
"source": "cna@vuldb.com"
},
{
"url": "https://www.linksys.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5446",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-02T13:15:23.097",
"lastModified": "2025-06-02T13:15:23.097",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been classified as critical. This affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. The manipulation of the argument pwd leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
},
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_9/9.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.310785",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.310785",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.584368",
"source": "cna@vuldb.com"
},
{
"url": "https://www.linksys.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-02T12:00:22.692386+00:00
2025-06-02T14:00:19.743193+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-02T11:15:23.260000+00:00
2025-06-02T13:59:05.650000+00:00
```
### Last Data Feed Release
@ -33,34 +33,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
296195
296209
```
### CVEs added in the last Commit
Recently added CVEs: `14`
- [CVE-2025-0073](CVE-2025/CVE-2025-00xx/CVE-2025-0073.json) (`2025-06-02T11:15:21.067`)
- [CVE-2025-0819](CVE-2025/CVE-2025-08xx/CVE-2025-0819.json) (`2025-06-02T11:15:21.707`)
- [CVE-2025-1246](CVE-2025/CVE-2025-12xx/CVE-2025-1246.json) (`2025-06-02T11:15:21.823`)
- [CVE-2025-1750](CVE-2025/CVE-2025-17xx/CVE-2025-1750.json) (`2025-06-02T10:15:20.557`)
- [CVE-2025-29785](CVE-2025/CVE-2025-297xx/CVE-2025-29785.json) (`2025-06-02T11:15:21.953`)
- [CVE-2025-3260](CVE-2025/CVE-2025-32xx/CVE-2025-3260.json) (`2025-06-02T10:15:21.740`)
- [CVE-2025-3454](CVE-2025/CVE-2025-34xx/CVE-2025-3454.json) (`2025-06-02T11:15:22.167`)
- [CVE-2025-47272](CVE-2025/CVE-2025-472xx/CVE-2025-47272.json) (`2025-06-02T11:15:22.557`)
- [CVE-2025-47289](CVE-2025/CVE-2025-472xx/CVE-2025-47289.json) (`2025-06-02T11:15:22.710`)
- [CVE-2025-48494](CVE-2025/CVE-2025-484xx/CVE-2025-48494.json) (`2025-06-02T11:15:22.867`)
- [CVE-2025-5439](CVE-2025/CVE-2025-54xx/CVE-2025-5439.json) (`2025-06-02T10:15:21.907`)
- [CVE-2025-5440](CVE-2025/CVE-2025-54xx/CVE-2025-5440.json) (`2025-06-02T10:15:22.180`)
- [CVE-2025-5441](CVE-2025/CVE-2025-54xx/CVE-2025-5441.json) (`2025-06-02T11:15:23.060`)
- [CVE-2025-5442](CVE-2025/CVE-2025-54xx/CVE-2025-5442.json) (`2025-06-02T11:15:23.260`)
- [CVE-2024-12168](CVE-2024/CVE-2024-121xx/CVE-2024-12168.json) (`2025-06-02T13:15:20.517`)
- [CVE-2025-26396](CVE-2025/CVE-2025-263xx/CVE-2025-26396.json) (`2025-06-02T13:15:21.367`)
- [CVE-2025-46806](CVE-2025/CVE-2025-468xx/CVE-2025-46806.json) (`2025-06-02T13:15:21.600`)
- [CVE-2025-46807](CVE-2025/CVE-2025-468xx/CVE-2025-46807.json) (`2025-06-02T12:15:24.800`)
- [CVE-2025-48495](CVE-2025/CVE-2025-484xx/CVE-2025-48495.json) (`2025-06-02T12:15:25.380`)
- [CVE-2025-48745](CVE-2025/CVE-2025-487xx/CVE-2025-48745.json) (`2025-06-02T13:15:21.897`)
- [CVE-2025-48955](CVE-2025/CVE-2025-489xx/CVE-2025-48955.json) (`2025-06-02T12:15:25.523`)
- [CVE-2025-48957](CVE-2025/CVE-2025-489xx/CVE-2025-48957.json) (`2025-06-02T12:15:25.680`)
- [CVE-2025-48958](CVE-2025/CVE-2025-489xx/CVE-2025-48958.json) (`2025-06-02T12:15:25.840`)
- [CVE-2025-48990](CVE-2025/CVE-2025-489xx/CVE-2025-48990.json) (`2025-06-02T12:15:25.997`)
- [CVE-2025-5443](CVE-2025/CVE-2025-54xx/CVE-2025-5443.json) (`2025-06-02T12:15:26.143`)
- [CVE-2025-5444](CVE-2025/CVE-2025-54xx/CVE-2025-5444.json) (`2025-06-02T12:15:26.337`)
- [CVE-2025-5445](CVE-2025/CVE-2025-54xx/CVE-2025-5445.json) (`2025-06-02T13:15:22.910`)
- [CVE-2025-5446](CVE-2025/CVE-2025-54xx/CVE-2025-5446.json) (`2025-06-02T13:15:23.097`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `9`
- [CVE-2025-40909](CVE-2025/CVE-2025-409xx/CVE-2025-40909.json) (`2025-06-02T11:15:22.310`)
- [CVE-2024-26467](CVE-2024/CVE-2024-264xx/CVE-2024-26467.json) (`2025-06-02T13:46:43.653`)
- [CVE-2024-26468](CVE-2024/CVE-2024-264xx/CVE-2024-26468.json) (`2025-06-02T13:55:25.737`)
- [CVE-2024-28286](CVE-2024/CVE-2024-282xx/CVE-2024-28286.json) (`2025-06-02T13:59:05.650`)
- [CVE-2025-47289](CVE-2025/CVE-2025-472xx/CVE-2025-47289.json) (`2025-06-02T13:15:21.743`)
- [CVE-2025-49113](CVE-2025/CVE-2025-491xx/CVE-2025-49113.json) (`2025-06-02T13:15:21.987`)
- [CVE-2025-5428](CVE-2025/CVE-2025-54xx/CVE-2025-5428.json) (`2025-06-02T13:15:22.140`)
- [CVE-2025-5430](CVE-2025/CVE-2025-54xx/CVE-2025-5430.json) (`2025-06-02T13:15:22.277`)
- [CVE-2025-5431](CVE-2025/CVE-2025-54xx/CVE-2025-5431.json) (`2025-06-02T13:15:22.403`)
- [CVE-2025-5432](CVE-2025/CVE-2025-54xx/CVE-2025-5432.json) (`2025-06-02T13:15:22.523`)
## Download and Usage

View File

@ -247281,6 +247281,7 @@ CVE-2024-12164,0,0,e252f13dd9720dcd4131988acbb14108c9d660bac4dc69fb3a06b127cc0ee
CVE-2024-12165,0,0,565f6113f161726a36dcd8f87106f931ffa1dad23df770638714143fb4529a90,2024-12-07T02:15:18.790000
CVE-2024-12166,0,0,318717b4a3842e9291a2442fedeb1198ccbbca486552d6b1e9ef8aa65b1bfc3e,2024-12-07T02:15:18.923000
CVE-2024-12167,0,0,648fdeb771c33890685bfca6029b01ac44a17697a1725a67472f5321f6e1f66d,2024-12-07T02:15:19.057000
CVE-2024-12168,1,1,00d2c546c11a236b0cfeb984a17951f770ce5e9104d3a5f1bf8ced2a2cf20293,2025-06-02T13:15:20.517000
CVE-2024-12169,0,0,2cb4d326eb74962f36bd473143efe22c253e3ffb801c22c8001cea0ca8bcb67d,2025-03-27T16:45:46.410000
CVE-2024-1217,0,0,6b4f28a64a0963868a0b0fd68f3e80e1f35d8f2883d87d4094b446f0742cbcfb,2025-01-19T02:51:21.017000
CVE-2024-12170,0,0,dda5e4dfb884254330b10e15454ff7f267eea062af3a3c0f061f58e061dbc21b,2025-01-07T05:15:15.713000
@ -254752,8 +254753,8 @@ CVE-2024-26462,0,0,25f2254d778b889a2851e66f6c411f8a73b90524a128dab651aec48b5cdb8
CVE-2024-26464,0,0,4ab3cf87be607a3f2e4c00e75552541f89691b136bdc5e46f36bd1de5e4f294e,2024-02-28T15:15:09.390000
CVE-2024-26465,0,0,ade97cdb5c6cf4f48879f07ad4a7605a0c64a0d603fc472a6f3229d145ef5dca,2024-11-25T19:15:08.960000
CVE-2024-26466,0,0,dc82b286483ed0081f723ee3516747e22293d5c74e6b30bbf9650bedfe3ba1c3,2025-05-19T12:48:52.820000
CVE-2024-26467,0,0,0556c1f5024bed78dda2024dd14eee20e33c16b9bdc12609f766a3b6d9a8ca63,2024-11-21T09:02:27.513000
CVE-2024-26468,0,0,99256accb4864d104f28d89d5eb4ed4c821639f1d2602e389e37b0eb4c8fc7a1,2024-11-21T09:02:27.717000
CVE-2024-26467,0,1,b500d420921049b8fd4623514a671ad1adc39001df3a95f0e4b096c166702a21,2025-06-02T13:46:43.653000
CVE-2024-26468,0,1,cb9a2a0b675bae026341df25e5965cdc1a11555ba271a5ad0bd8f1416d0e5d50,2025-06-02T13:55:25.737000
CVE-2024-26469,0,0,9e4d593902085f4092c8cab6fbd5cadf0d15ba8323e2da1cf6d86de4feb54a4f,2025-05-13T14:22:16.917000
CVE-2024-2647,0,0,bbe1a272a76fd31c1c6ab2c26f30c3c63771d99203be4f6b4b60845ea9cf719b,2025-02-10T13:49:48.360000
CVE-2024-26470,0,0,5e30fb9ed298680eb1509fddcf64925b43bcf3998f5c1cf22223f32f773def6f,2025-04-30T16:52:55.830000
@ -256357,7 +256358,7 @@ CVE-2024-28279,0,0,371a6db4bfcfaa0c72291cbc279291879c814e6e774d39db4e4c005f7e298
CVE-2024-2828,0,0,79034e33018335efad10934558e8b84384b5f2f2133fce62438d617ea963efcf,2024-11-21T09:10:37.513000
CVE-2024-28283,0,0,ce7a9c7cebaf258528c4f64296c4349b2ca8196425fb75250670fc71bac6a199,2024-11-21T09:06:08.270000
CVE-2024-28285,0,0,d6af77d4c1b881ace2cde569269de77c400ab0444445e8beeda0612dd6100440,2024-11-21T09:06:08.497000
CVE-2024-28286,0,0,443b71b447874d7e85414d39090dd3f2383fef5e0435d3fe6410bb9a66f0c9f4,2024-11-21T09:06:08.723000
CVE-2024-28286,0,1,0757249cbaa15bc07df502c32c1b53781d52e423b8f162fc3de5e29bd12f0076,2025-06-02T13:59:05.650000
CVE-2024-28287,0,0,a8c69a5ccabbb193237debf5f07040ef395a0f376f000c1003682d3fc4f3b2ce,2024-11-21T09:06:08.947000
CVE-2024-28288,0,0,917c615d247f423af0c4696050d5dac2e677cd6cdc4f1d78fcb72e3632aa5e47,2024-11-21T09:06:09.163000
CVE-2024-2829,0,0,5d6ede104c5f721bc49057f0a400b43bce14f079f98156f2630e18adcc15a282,2024-12-12T17:32:37.870000
@ -282371,7 +282372,7 @@ CVE-2025-0069,0,0,d7ac8ba36cfcab8a8836c1588e52e8bbaed2d415e393c11bf82b7bb82617b0
CVE-2025-0070,0,0,dbf9edc467887c587ee503735d983d3eb618b4cd55fb133fb8e2178f124d6f6b,2025-01-14T01:15:17.427000
CVE-2025-0071,0,0,a9f17b8587d9681508885fa05b5cb6e1fb480f5738675f612162a9b567f90271,2025-03-11T01:15:33.917000
CVE-2025-0072,0,0,7c68681d522f867cd278cffcb4470ef78b9648796a6206167a2247ec164299a1,2025-05-12T16:15:21.587000
CVE-2025-0073,1,1,e612b82ce7aceb5e22ac6e6c5a7d01a7a284ab1a80d6f17bf536b26f9203eb73,2025-06-02T11:15:21.067000
CVE-2025-0073,0,0,e612b82ce7aceb5e22ac6e6c5a7d01a7a284ab1a80d6f17bf536b26f9203eb73,2025-06-02T11:15:21.067000
CVE-2025-0101,0,0,391653291dbc9e356bdd9f7cf48cb4ee16c22960b84cfac559c323183419fbd8,2025-04-16T13:25:37.340000
CVE-2025-0103,0,0,06fd8d922bac50d8ab7e8102b5457a5978f502265c9b1059554ccaf6e0c9679c,2025-01-11T03:15:22.020000
CVE-2025-0104,0,0,dc4c81878786bc602ee20c50b1dae485c1da904352cbab72ccb96b2a9dcd9e75,2025-01-11T03:15:22.183000
@ -282945,7 +282946,7 @@ CVE-2025-0814,0,0,275433a2e2c23056d581480e8763e8e9197d76ff67d734aa21e397b5cac2bf
CVE-2025-0815,0,0,f73b50d64016c2e64fd2df2d6c90edb74018594168bb3b9f019d2de177423288,2025-02-13T07:15:11.160000
CVE-2025-0816,0,0,d49cff9b1300ba83e836640c26fee4d28d3c84d54249c4f7af3bef6763c2c81e,2025-02-13T07:15:11.353000
CVE-2025-0817,0,0,11343ed20662b8da62be45ff4c13d864ae4d9a05be3d231b0a3e4a5cb280e5dc,2025-02-21T12:15:11.963000
CVE-2025-0819,1,1,50a9643f2ab349d33a7d5834da9052f27f85d7c0df2fe60b842822c4fff1cf26,2025-06-02T11:15:21.707000
CVE-2025-0819,0,0,50a9643f2ab349d33a7d5834da9052f27f85d7c0df2fe60b842822c4fff1cf26,2025-06-02T11:15:21.707000
CVE-2025-0820,0,0,6d45f28eb00b0039ad804e065c885bf40234d2bcc3aa26a58867a7f5eaafc285,2025-03-01T05:15:15.953000
CVE-2025-0821,0,0,276d38f36e1718392d91943f87a21d4117bd30970ca15dadffff44ef97d51e0f,2025-02-25T03:42:52.263000
CVE-2025-0822,0,0,4c844a6713ce2631895193eac241699c6c3839eb1c8dbea359488af5de55887f,2025-02-24T12:36:46.670000
@ -283285,7 +283286,7 @@ CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa
CVE-2025-1243,0,0,b36908327b1b41fa664c4a39c71934592fd1d75bcc40ba67f7d64ed64955da7e,2025-02-12T01:15:09.073000
CVE-2025-1244,0,0,ca7dde03c53f2f538c0b12fb599e84ae66a426ff6488b7e67f4989aba1f7a6f7,2025-03-13T14:15:34.977000
CVE-2025-1245,0,0,1f44b48d866bcc8251435e1f8580e9a7c9edc0ad7da6e06f008dba048b954524,2025-05-16T14:42:18.700000
CVE-2025-1246,1,1,0251c2ff86aa80d3f3c492ca4aeeab9dd727fa21cb46bb08a619161352af0126,2025-06-02T11:15:21.823000
CVE-2025-1246,0,0,0251c2ff86aa80d3f3c492ca4aeeab9dd727fa21cb46bb08a619161352af0126,2025-06-02T11:15:21.823000
CVE-2025-1247,0,0,413d4bcd6e00b55487b15f2b541fa31d8a6169438afa6345f0107f85b8ddc727,2025-03-03T14:15:34.120000
CVE-2025-1249,0,0,6a7f3a2500b58cdcea7c9e46385c15368818268591d8a8d12de3eb4b42bd3d72,2025-02-26T15:15:24.470000
CVE-2025-1252,0,0,9716250bcf118be27f9d89f5f8b184767026e3acfd92390347cf9e55a42d7d4b,2025-05-08T14:39:09.683000
@ -283684,7 +283685,7 @@ CVE-2025-1746,0,0,2ad65a9dbdf0c4381f281d77fa741dce6ba1f1df02159548941e5a1db121f3
CVE-2025-1747,0,0,fe9fc1715d54827a665282361c4a912da2b8a4104647978512bc0ae9117ef282,2025-05-07T19:47:20.830000
CVE-2025-1748,0,0,27c7d2fcd6085847315aeadd07a684f6a91809737cbc365c466e57be1af34067,2025-05-07T19:47:43.517000
CVE-2025-1749,0,0,6db79c896d97ba53b839effabd14a076d6b2af29f854eac41ba251a1f2db4f18,2025-05-07T19:49:23.300000
CVE-2025-1750,1,1,48616090589d6dc02a6bf1431b0e611036832583e27deee68a22de22ba14a676,2025-06-02T10:15:20.557000
CVE-2025-1750,0,0,48616090589d6dc02a6bf1431b0e611036832583e27deee68a22de22ba14a676,2025-06-02T10:15:20.557000
CVE-2025-1751,0,0,abfc84328e2199f31a54a26b50388e665ca54aab7fd0cce8bda2194b6d823604,2025-02-27T12:15:35.030000
CVE-2025-1752,0,0,67bdd52861cadb9ec44fc5e063c3f2c1275aef4202dd498970e70f4ea7d1426e,2025-05-12T18:15:43.960000
CVE-2025-1753,0,0,3593b6ba50ede630959d5ea37be4b1eda351a397f05e35b03d360630d3f61397,2025-05-28T15:01:30.720000
@ -288476,6 +288477,7 @@ CVE-2025-26389,0,0,69c0b4482301cbdf7810c0d66dde175a8a55879ae4b001f43aded2e047b17
CVE-2025-2639,0,0,eeccd7e86f1a8e6550900d4406a77fd9c06a6948c701e759827649fddf007255,2025-03-28T19:33:14.553000
CVE-2025-26390,0,0,d486511ec0cd7e022494115d025bafe0774221a17a1b54e8ff55467ae4483ee1,2025-05-13T19:35:18.080000
CVE-2025-26393,0,0,0084efd52fbee3d09de405c3fe48d1fbc4bd7655a73c657547c37f33e81d553f,2025-03-17T20:15:14.140000
CVE-2025-26396,1,1,3fec10aa99b62ec6557c26ff189fae94e929e21d16192c5bd4df833d6411ad26,2025-06-02T13:15:21.367000
CVE-2025-2640,0,0,cb1c6d71f05715e40a599d54b3e503bcebd1109fe2ad2ac7ebfd5568ea675609,2025-04-02T14:26:23.040000
CVE-2025-26401,0,0,8a8a5edf8458e0cd9c5461b93aa3dd8d7a38c5486b82730ab0a36983d22db1ca,2025-04-07T14:18:15.560000
CVE-2025-26408,0,0,cc3ff44719bfe263908c93711d844cb0c43379729d03c83e2a4a7413b5395225,2025-03-22T15:15:38.687000
@ -290135,7 +290137,7 @@ CVE-2025-29781,0,0,9602edcc5b5c6ecdfd105a84695ee56cace470c55953ae06faefbf1153141
CVE-2025-29782,0,0,642561341fd441d3b75649151bd8fd2cc9789f9959ceab4d0a40abb896c0a19e,2025-03-25T20:12:23.047000
CVE-2025-29783,0,0,45d2b00d8a588bece93df8bfaa38fd733283ba2670cda9e32612d412a0ff1e78,2025-03-22T01:15:30.443000
CVE-2025-29784,0,0,9f5fac5d056c47dae0ae6358dac107544bc727213e81bb0b162611aa4d061032,2025-05-13T15:41:25.090000
CVE-2025-29785,1,1,750962f6f73f51bc8b03e2336174d8fa0d016d6d8ea86e623234458269a10d57,2025-06-02T11:15:21.953000
CVE-2025-29785,0,0,750962f6f73f51bc8b03e2336174d8fa0d016d6d8ea86e623234458269a10d57,2025-06-02T11:15:21.953000
CVE-2025-29786,0,0,451b93240c4543f3def3ea2c9521ecc2be3354f0b552d41bf2a019283f00a79d,2025-03-17T14:15:22.237000
CVE-2025-29787,0,0,2fd3435cc0f680f18716d607bc13a6c7a954d55969aae7d30fd344637489ec1d,2025-03-17T14:15:22.447000
CVE-2025-29788,0,0,864c3c65f52e851c38fc6d391e926f348d1c70745c997c79fa8abde39ce5bc67,2025-03-17T14:15:22.653000
@ -292308,7 +292310,7 @@ CVE-2025-32596,0,0,f1872f78910abd93ca6bc44a668b64d9a217aba1c01ee357a12dfaef6efc9
CVE-2025-32597,0,0,55ab5ca6ed3d8b6cf0931426c8147ebabb322fbbc0aae4fae4f5b3289fb12ce9,2025-04-09T20:02:41.860000
CVE-2025-32598,0,0,cdac3f432b75d5f00695f6f1edf0fbf1140369b9893f469b35a81ca8a52c54b6,2025-04-15T15:16:09.180000
CVE-2025-32599,0,0,2831ce4b5b42e6325ce283503c26f9c21788129405d17dc22b338c3d4b2bbf42,2025-04-11T15:39:52.920000
CVE-2025-3260,1,1,f911df05b90ec3abce4ce5a349fced2077b60173eb43728f25af08432508f724,2025-06-02T10:15:21.740000
CVE-2025-3260,0,0,f911df05b90ec3abce4ce5a349fced2077b60173eb43728f25af08432508f724,2025-06-02T10:15:21.740000
CVE-2025-32600,0,0,083cfb813b0e4faf3c70b5e5f02105068f0caedfb180899d4577e64e9ef1444f,2025-04-11T15:39:52.920000
CVE-2025-32601,0,0,684526a644a2d5bc9b83c4eb6c253fb64f18b24d4f5112267400e5345b8fc15c,2025-04-11T15:39:52.920000
CVE-2025-32602,0,0,148b28f7e108599f04bd783492c1327b9adeb61a0cf6bda137e87e19db0937c2,2025-04-17T20:21:05.203000
@ -292794,7 +292796,7 @@ CVE-2025-34490,0,0,ff6ccf68d08b2145b1b0c3fd30524d8f343b67a475d00c1c0efae114546b6
CVE-2025-34491,0,0,faad48875b9db7a8e22a3e33d04e2680f19102abb22a8bb70d5a70d93b5c1ed5,2025-05-10T00:58:12.427000
CVE-2025-3452,0,0,a0af240b89728ab4c39e75e741754c068d979812f93583676566bf2c295ab7ec,2025-05-06T15:35:58.647000
CVE-2025-3453,0,0,6d4c3756403d2c169f24bd9cd170cc74dc819f8c072954929ebcb8b579bf19de,2025-04-17T20:21:48.243000
CVE-2025-3454,1,1,4aac0cbec8eb4ae4b6c0be315a75103ac49d2f14e3429207314c7ab0889558d6,2025-06-02T11:15:22.167000
CVE-2025-3454,0,0,4aac0cbec8eb4ae4b6c0be315a75103ac49d2f14e3429207314c7ab0889558d6,2025-06-02T11:15:22.167000
CVE-2025-3455,0,0,27fc2bff0afea6de93406ff695251ef67a3d625051a2b866cd1a3908c7fd4f8e,2025-05-12T17:32:32.760000
CVE-2025-3457,0,0,1ce8b706c7f27acea549531081740896317ac6a97554394545c243bd2df931ba,2025-04-30T14:07:52.490000
CVE-2025-3458,0,0,f4c08c655e5360e2158789a545b6b552e0aff82df287be3ab4de5c3123f29f32,2025-04-30T14:05:12.373000
@ -293887,7 +293889,7 @@ CVE-2025-4090,0,0,7f9eabb4ad6772523e0c5f0a270166b4617494fcbb3075e75cc2736a0fa15b
CVE-2025-40906,0,0,3bcd0a99f567a8c8c8c888444bf8652ce672ff26763dd9562ab4be9a1279c017,2025-05-19T13:35:50.497000
CVE-2025-40907,0,0,02479ee238b9c2c4380d00bd9d3c9ee05adf00f8c7961fd6f9263c931d94c687,2025-05-16T16:15:41.590000
CVE-2025-40908,0,0,9e6f7c01493ad7d898ae71483c9feee0a759fd2cb47de6da8eb69ddcf35d1f6b,2025-06-02T04:15:38.817000
CVE-2025-40909,0,1,02c8b40ddd4de52276b8a411f275c217854d3f11ab470f013187260e9276ea09,2025-06-02T11:15:22.310000
CVE-2025-40909,0,0,02c8b40ddd4de52276b8a411f275c217854d3f11ab470f013187260e9276ea09,2025-06-02T11:15:22.310000
CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000
CVE-2025-40911,0,0,fcf4deedf6cc79e67d521479df45c4b1f5ac81bf8605fcf0e3b318f0c121b089,2025-05-28T15:01:30.720000
CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000
@ -295004,6 +295006,8 @@ CVE-2025-46802,0,0,e0845e0a2badfb8351bf85ec4dfd1c99c7e29caf4bb332a81fa1375afc25e
CVE-2025-46803,0,0,0a5de4a7042abfff99e6c11ab58d1e1483a67b11f4bef7e11f8857a336030c12,2025-05-28T15:01:30.720000
CVE-2025-46804,0,0,33150bb68c13eed9accf4cb312a19408b88b9f75691eb7f11163f9cad134f711,2025-05-28T15:01:30.720000
CVE-2025-46805,0,0,b1097088aa0dbd2e4b45c8b3983be6a33e94edc138942af1ff1720f9da99ad58,2025-05-28T15:01:30.720000
CVE-2025-46806,1,1,603ad39c04d3b6dfb4d74e2a6593c9cafab3fcac7b5373b3a24f9b62ae31d289,2025-06-02T13:15:21.600000
CVE-2025-46807,1,1,1c6a320639dd7d05bae2073dca3f030f06f77af255e7f77dab44f866bfed0685,2025-06-02T12:15:24.800000
CVE-2025-46812,0,0,efbba45e18cc8937b9f87a0e29f466265a1e1be9d804a38357596ef0f2987dda,2025-05-12T17:32:52.810000
CVE-2025-46813,0,0,01deee0db3f748e6f8e958a47d5a96825a2f5d578da6e58d6d8c34dd9ef7b2a5,2025-05-05T20:54:19.760000
CVE-2025-46814,0,0,a39c61eb85c9c40f8b1a1b3b957ff5b21067cc488cde122058f10a18468e916d,2025-05-07T14:13:20.483000
@ -295077,7 +295081,7 @@ CVE-2025-47269,0,0,b9d52d64e2c0cec1ecdcd2f4d7408887dda629b4e369e1e7b2409608db43d
CVE-2025-4727,0,0,170e11f6923ca5cbfd0f6244eaf161be67d9ce2c6a5c3f835565b0bb279da21f,2025-05-16T14:42:18.700000
CVE-2025-47270,0,0,f7de4b1bbad67df8d0ed8562ed81ad54a4a617d8e905a95b0012c5c493a9cba4,2025-05-12T17:32:32.760000
CVE-2025-47271,0,0,b4dba60dfb0342c7663df3f21e36f0d1e4cac1426ea6dff373e34c92771a1236,2025-05-12T17:32:32.760000
CVE-2025-47272,1,1,673f7322859d6f32fb1497b6ed4be038670e6640abdea24d95158af6335ee00f,2025-06-02T11:15:22.557000
CVE-2025-47272,0,0,673f7322859d6f32fb1497b6ed4be038670e6640abdea24d95158af6335ee00f,2025-06-02T11:15:22.557000
CVE-2025-47273,0,0,8a015bdd65fd76310e1f3acdca4cc1889577f5d468ae1e2f275ffca260b8e7ee,2025-05-28T15:15:25.080000
CVE-2025-47274,0,0,fad3fb606ae045fd813c37388dd60dff1a0ba71c69c4422b81f53361cf7f503f,2025-05-12T17:32:32.760000
CVE-2025-47275,0,0,c08b4ed4e8318278685cc65ac12c1f286376fdd04ac329814f0f17ec3e430d14,2025-05-16T14:42:18.700000
@ -295093,7 +295097,7 @@ CVE-2025-47284,0,0,927b09b86a7bb19dbf3e9d0808f921b2d28747e702e8d9ec13ede5b5a7267
CVE-2025-47285,0,0,a4b322cfa16ac0198aad5626c2233334a81e0c8124806adefa631e6ad6b3d8e6,2025-05-16T14:43:26.160000
CVE-2025-47287,0,0,4a03b7a85e9f4f1ae469c2f4edaad7e40d35a7308b2c4cacf7afd6a1813a45c3,2025-05-29T06:15:23.090000
CVE-2025-47288,0,0,4f46812765e170d3e0663ea32f05e904834e57f589f5c764ae983ba008d7452b,2025-05-30T16:31:03.107000
CVE-2025-47289,1,1,f7a8fb4cc0a5caf3a83a772f3c1608108dbd2e7c44c8802b4229ec2f270e31b3,2025-06-02T11:15:22.710000
CVE-2025-47289,0,1,09cb84c673d83325feab8cd735aaca2413f90bf61c59c4bcaed6123f411e9d81,2025-06-02T13:15:21.743000
CVE-2025-4729,0,0,073b70e77ba60376073b6bf036503b0e9d4ab1ba93aced39541912843c902c9b,2025-05-16T14:42:18.700000
CVE-2025-47290,0,0,fef9205d946b23690e870377651d8631936053bea9e3a05a823cfda120b52c00,2025-05-21T20:24:58.133000
CVE-2025-47291,0,0,77c2613c093f23da4845bc4516f16594af2697fccb6f4c62fbf6122c314ea551,2025-05-21T20:24:58.133000
@ -295722,7 +295726,8 @@ CVE-2025-4849,0,0,79bafc8d78c1efc632ed95ad4a130766ed5d90c45e45605773df0d46773756
CVE-2025-48490,0,0,87ecfeb6e490715223675b6987710680d7319b22f1f72e859b8289d6cc58a36f,2025-05-30T16:31:03.107000
CVE-2025-48491,0,0,192909d10acf6a2f5c7dbd7cf4a77eb5c3f60df46b3da837effcf5a7a7693800,2025-05-30T16:31:03.107000
CVE-2025-48492,0,0,27f020803580a5c4453e15c7140e9561136d4680304daf59a0f7133793e5d193,2025-05-30T16:31:03.107000
CVE-2025-48494,1,1,5745fb806ce299632f2531b42815e36bb1c9c8377243e0f319ec99a0550ef850,2025-06-02T11:15:22.867000
CVE-2025-48494,0,0,5745fb806ce299632f2531b42815e36bb1c9c8377243e0f319ec99a0550ef850,2025-06-02T11:15:22.867000
CVE-2025-48495,1,1,fe5c88c6ea2ca72185cecedb50ad11f9b1ee65a3599da0cdcaa0274975580e8d,2025-06-02T12:15:25.380000
CVE-2025-4850,0,0,f4734de71688bb34b47f04cb41c5af0cc568cf46c9e6cb90745360a2b3c7693b,2025-05-24T00:57:35.620000
CVE-2025-4851,0,0,e5a9ac67f494616a05e2f84fff689d174d4a8c96dcdf95534865dd01a2cf2a1b,2025-05-24T01:03:29.400000
CVE-2025-4852,0,0,8056c97adb54f901af1b48f1e44b7ca1809889745baa2872bb19324ac5d93e7f,2025-05-19T15:15:34.693000
@ -295756,6 +295761,7 @@ CVE-2025-48741,0,0,75001d0705bc789d943f76109b8b14a126d281e251509064c5cca96008e10
CVE-2025-48742,0,0,5f33c781ef30502ef2e246627292bc67d88c79205c0f59dcb70501ff4a68f09c,2025-05-29T17:15:21.900000
CVE-2025-48743,0,0,24d943dbdb45a4fa6b30762dbd53504c04a4380cb55364901f38457df34be0b5,2025-05-28T15:01:30.720000
CVE-2025-48744,0,0,2bdd08647659ee3f558bb4b4bded879f1ed8d92273df3815d9aaa6c8cd04d2b8,2025-05-28T15:01:30.720000
CVE-2025-48745,1,1,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000
CVE-2025-48746,0,0,f72c5a8d16806b0ba968ccabf6f8a5266bce1d331d3179a6d466243179f0e088,2025-05-30T17:15:29.937000
CVE-2025-48747,0,0,8c3baf0ee9646e657c0ba351a53bca2d3d39df6e364e578cbb75404ea4e19368,2025-05-29T14:29:50.247000
CVE-2025-48748,0,0,379223c1d681caf1cc4eae8f0abea64ba33403c2868d28f8d0d01bb8de57655a,2025-05-30T16:31:03.107000
@ -295837,10 +295843,14 @@ CVE-2025-48946,0,0,1a27a6f457ae10610e9029a593882fe63dffb628eae1e50404a3c7d290e45
CVE-2025-48948,0,0,ca75e8c9851d84ae181b6b16f7e3dd9c6089c2140c1ef03716877d045b38e2d4,2025-05-30T20:15:43.910000
CVE-2025-48949,0,0,4e76516c9619345b129c182f65062ed50a58136a10adc9889a0de68842130806,2025-05-30T20:15:44.083000
CVE-2025-4895,0,0,451159abdd179506166eda92c0cc3ecdcfca15d4a903bf6a2c0ccf029c166653,2025-05-21T19:37:48.777000
CVE-2025-48955,1,1,e866020b5e53cd957bc33457946ef98a259e2748730b0523cd3a756f2ee07e50,2025-06-02T12:15:25.523000
CVE-2025-48957,1,1,0bb9005e25d05f04f7168f81837919e34950d9cf87042ea4188ad6efc5d9339e,2025-06-02T12:15:25.680000
CVE-2025-48958,1,1,c67b68371e8bfae6a779f69aa2d3c70fb8dff5d80a7f298972784a871b72d1d2,2025-06-02T12:15:25.840000
CVE-2025-4896,0,0,eb43857d84c4e3c0ca9bf4ac15086d7606c87aaeb17237d45e10278d3431115c,2025-05-27T16:30:13.490000
CVE-2025-4897,0,0,104730cc5ad0680860a774881c7ad06896ad7afe2bb00c017480a43cf79011cd,2025-05-27T16:30:05.410000
CVE-2025-4898,0,0,088de021e18707e0dc4ec8499500601b39900fc456f0a7d4c0f7a0b50fbac254,2025-05-21T19:37:41.533000
CVE-2025-4899,0,0,384aad67823f1c19c564c5975182391c80467536acba8235a635dfd93a5393e3,2025-05-21T19:37:31.280000
CVE-2025-48990,1,1,53563761e0abc7a3ca88976c33667a47da4f8dc3c5f72a17ecf7203538dc6a56,2025-06-02T12:15:25.997000
CVE-2025-4900,0,0,a63cc638a24f84eec22901c973a40410ae17057cc7bae6578e39029782b2ee63,2025-05-21T19:37:15.790000
CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e8d,2025-05-21T13:40:20.293000
CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000
@ -295854,7 +295864,7 @@ CVE-2025-4909,0,0,2543aa084bfc859fe1a7a0558cc76c793b6ee9b986cb9885265313fc24749d
CVE-2025-4910,0,0,d0c7584b70570a0f60f72259e5222dec42c6f070aafbec7da031c0738cd595d2,2025-05-21T17:40:58.137000
CVE-2025-4911,0,0,8165f0d1dc1e78afded21e50626575112805e2ff63d8f266295fb56c02f3696f,2025-05-21T13:26:25.383000
CVE-2025-49112,0,0,68b9f8ae8378455b94697490a4c9482a35ead35162dc1f57c6769030fa5d1d53,2025-06-02T05:15:21.277000
CVE-2025-49113,0,0,358ac32f89451109a971e873fdac6b608e79e1801d399ebf53ee99796c6b9da4,2025-06-02T05:15:53.420000
CVE-2025-49113,0,1,32d36c52070530467b17daab5505f8aec0de856bdbbf3bfcf6775e31c5175692,2025-06-02T13:15:21.987000
CVE-2025-4912,0,0,952cc1697455c59886c397e61a80308747f6eedd0f377c0531d621b366fc5d7d,2025-05-21T17:41:21.063000
CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149c2,2025-05-19T17:37:22.390000
CVE-2025-4914,0,0,a988b116f09ba2a954362a47d883dbc77032cfbf0fc2d8366f3812d4ec746e85,2025-05-19T17:37:31.327000
@ -296178,19 +296188,23 @@ CVE-2025-5424,0,0,8846307422a1e70afaa4472c8339f8684a9ad79dc12a6b1e4401dcca541b41
CVE-2025-5425,0,0,be91d19736e14b87d2d7a8a21cf7155dfcdc6ebc2c74f44b7cabd08f35eb48eb,2025-06-02T03:15:25.537000
CVE-2025-5426,0,0,57cb772d14527dbc6e6a63b12d5b01bad3ac902c3f8c60c73dd5ff0ee844eb33,2025-06-02T03:15:25.717000
CVE-2025-5427,0,0,7248241b6511e7dae2909aae008975c5e1d909b0fa9a2d42cb023cab3ad79f41,2025-06-02T04:15:44
CVE-2025-5428,0,0,8e37e3d63a4fe3eb041bc551acaf6d51874f670999761815a63f3357c2185ba8,2025-06-02T04:15:44.977000
CVE-2025-5428,0,1,8de7c8b73073abc1d37c3198f867a27f29ebbbad4190b2dd6629572e7d38630e,2025-06-02T13:15:22.140000
CVE-2025-5429,0,0,d3b059787ffa7e06d4a4aef3851efbbfa5534e20659ffd5b3f55c63550568be6,2025-06-02T05:16:08.447000
CVE-2025-5430,0,0,9c8ff751e513a786224c51fe5c3552be7b4d78ad672aaba460fa4a9f98a16c6a,2025-06-02T05:16:09.920000
CVE-2025-5431,0,0,efefbcf239cea408ae0e3ee2472f3f1a37ba8c9e3dce439dcb4ab817f2a98a32,2025-06-02T06:15:20.740000
CVE-2025-5432,0,0,d572dc3edae46e5957de45fa4ac2dd9d097546a0d1041dbbae03cd7598f7b12e,2025-06-02T06:15:21.023000
CVE-2025-5430,0,1,575998dfdc58bf78895e6505775ceb47d8fb5a44c64b642741ea3c1e2d02041c,2025-06-02T13:15:22.277000
CVE-2025-5431,0,1,994e477235c446060bbb3fd20ba0a9dde6f8fc0485f87b1341fbed2c0eb64a07,2025-06-02T13:15:22.403000
CVE-2025-5432,0,1,1606ccb952e02573ce9e9ce8f262975d836a490db658823d9e039892725ade78,2025-06-02T13:15:22.523000
CVE-2025-5433,0,0,c8bef5e02889d81d9820bc4f7df922d26d02dd5fb2e601c82875e353e00ca72f,2025-06-02T07:15:22
CVE-2025-5434,0,0,4e7c75fc3ac4e181befe9a93c9c12ef65751e8d2fe55da16447e5daadcd83eaa,2025-06-02T07:15:22.230000
CVE-2025-5435,0,0,dcf4258cf6809dfc182d62df7089a871748c9b139044f7b2923e29e48b3038b5,2025-06-02T08:15:21.230000
CVE-2025-5436,0,0,d68e6cc48ff07effcdabcbcf49258634252ea2262182e54eb43102662626e959,2025-06-02T08:15:21.437000
CVE-2025-5437,0,0,3052fa6936274bb3eba99317d3e4daab84fd4fe1ceb685290dca60c7fa3d1a04,2025-06-02T09:15:21.027000
CVE-2025-5438,0,0,990c843261638a390371e7714161b5d3176423efe5d9172f5f232f3bddb512be,2025-06-02T09:15:21.280000
CVE-2025-5439,1,1,aa110c46dc286c7e9d8cb2d97815d673f115d30b33674e0d9da42bae02a93b74,2025-06-02T10:15:21.907000
CVE-2025-5440,1,1,23a278cff435d5c44ccef8150e6637344c9029c328600fd3b807a6015b6ed757,2025-06-02T10:15:22.180000
CVE-2025-5441,1,1,64777ca5b3f1848321cc862bac1cadce8406dedce7ee060897eb18bc57816364,2025-06-02T11:15:23.060000
CVE-2025-5442,1,1,4cfa2491529f3adc5b1beaec9350343f83487af1e2dc30a5f11bee6aa59c5a28,2025-06-02T11:15:23.260000
CVE-2025-5439,0,0,aa110c46dc286c7e9d8cb2d97815d673f115d30b33674e0d9da42bae02a93b74,2025-06-02T10:15:21.907000
CVE-2025-5440,0,0,23a278cff435d5c44ccef8150e6637344c9029c328600fd3b807a6015b6ed757,2025-06-02T10:15:22.180000
CVE-2025-5441,0,0,64777ca5b3f1848321cc862bac1cadce8406dedce7ee060897eb18bc57816364,2025-06-02T11:15:23.060000
CVE-2025-5442,0,0,4cfa2491529f3adc5b1beaec9350343f83487af1e2dc30a5f11bee6aa59c5a28,2025-06-02T11:15:23.260000
CVE-2025-5443,1,1,5598bb6eea21bd13765afe37d6570c2e26dc8a78ef3614e8a741492174c69c78,2025-06-02T12:15:26.143000
CVE-2025-5444,1,1,d544dbe8f2268ff7850a7c0dc85fc51888e589c75a04a384cb8526b00af58fc4,2025-06-02T12:15:26.337000
CVE-2025-5445,1,1,519bf24077154af0e4727aac86b3fc5b5c4cf0c1944316e2c44d42b4bf4316f8,2025-06-02T13:15:22.910000
CVE-2025-5446,1,1,2943f1b50cf2623a078c7b44d217f150986e93c16c4756ecb5da1f8e47e23a76,2025-06-02T13:15:23.097000
CVE-2025-5455,0,0,8d271c9b47b5647f1f114bae05a0555876aab8060dabdd5d5775e0ee67faf718,2025-06-02T09:15:21.493000

Can't render this file because it is too large.