mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-19T02:00:19.760458+00:00
This commit is contained in:
parent
fb18b09534
commit
891f5d561f
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43840",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-04-14T21:15:16.200",
|
||||
"lastModified": "2025-04-15T21:15:46.440",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T00:37:04.670",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:aspera_console:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.4.0",
|
||||
"versionEndIncluding": "3.4.4",
|
||||
"matchCriteriaId": "682EB2AD-DD53-43FC-8A8E-7A3BDE927467"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7169766",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43052",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-03-07T17:15:18.060",
|
||||
"lastModified": "2025-03-07T17:15:18.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T00:11:36.133",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -81,10 +81,35 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:control_center:6.2.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86853A4E-905D-46A9-BF43-6D6117AA2442"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:control_center:6.3.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C510A28-7CFF-414B-A740-13A71CB97271"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7185102",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44755",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T18:15:58.483",
|
||||
"lastModified": "2025-04-23T14:15:27.320",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T00:21:38.390",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayurik:sacco_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDC948D1-2B9F-4317-8ED4-73F1BF7C4537"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://flashy-lemonade-192.notion.site/SQL-injection-in-Sacco-Management-system-via-password-and-id-parameter-1d85fc432de24db896446002f91acfd1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://flashy-lemonade-192.notion.site/SQL-injection-in-Sacco-Management-system-via-password-and-id-parameter-1d85fc432de24db896446002f91acfd1?pvs=4",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22653",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-29T15:15:29.470",
|
||||
"lastModified": "2025-05-30T16:31:03.107",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-18T23:57:03.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yasm_project:yasm:2023-09-22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CED0EE19-843C-4F9E-AB11-C2912EC1BD3D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/TimChan2001/03e5792b15d0a34bfaad970e37c17660",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yasm/yasm/issues/247",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-452xx/CVE-2024-45208.json
Normal file
68
CVE-2024/CVE-2024-452xx/CVE-2024-45208.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-45208",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-06-19T00:15:21.097",
|
||||
"lastModified": "2025-06-19T00:15:21.097",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform which makes use of Cisco NCS application service. Active and Standby Directors communicate over TCP ports 4566 and 4570 to exchange High Availability (HA) information using a shared password. Affected versions of Versa Director bound to these ports on all interfaces. An attacker that can access the Versa Director could access the NCS service on port 4566 and exploit it to perform unauthorized administrative actions and perform remote code execution. Customers are recommended to follow the hardening guide.\r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.versa-networks.com/Solutions/System_Hardening/Perform_Manual_Hardening_for_Versa_Director#Harden_Port_4566",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security-portal.versa-networks.com/emailbulletins/68526c3cdc94d6b9f2faf718",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026724-versa-director-ha-port-exploit-discovery-remediation",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-231xx/CVE-2025-23121.json
Normal file
44
CVE-2025/CVE-2025-231xx/CVE-2025-23121.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-23121",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-06-19T00:15:21.260",
|
||||
"lastModified": "2025-06-19T00:15:21.260",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.veeam.com/kb4743",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-231xx/CVE-2025-23168.json
Normal file
60
CVE-2025/CVE-2025-231xx/CVE-2025-23168.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-23168",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-06-19T00:15:21.377",
|
||||
"lastModified": "2025-06-19T00:15:21.377",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform implements Two-Factor Authentication (2FA) using One-Time Passcodes (OTP) delivered via email or SMS. Versa Director accepts untrusted user input when dispatching 2FA codes, allowing an attacker who knows a valid username and password to redirect the OTP delivery (SMS/email) to their own device. OTP/TOTP codes are not invalidated after use, enabling reuse by an attacker who has previously intercepted or obtained a valid code. In addition, the 2FA system does not adequately restrict the number or frequency of login attempts. The OTP values are generated from a relatively small keyspace, making brute-force attacks more feasible. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nVersa recommends that Director be upgraded to one of the remediated software versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security-portal.versa-networks.com/emailbulletins/68526512dc94d6b9f2faf715",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-231xx/CVE-2025-23169.json
Normal file
60
CVE-2025/CVE-2025-231xx/CVE-2025-23169.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-23169",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-06-19T00:15:21.497",
|
||||
"lastModified": "2025-06-19T00:15:21.497",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform allows customization of the user interface, including the header, footer, and logo. However, the input provided for these customizations is not properly validated or sanitized, allowing a malicious user to inject and store cross-site scripting (XSS) payloads. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security-portal.versa-networks.com/emailbulletins/68526a08dc94d6b9f2faf716",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-231xx/CVE-2025-23170.json
Normal file
60
CVE-2025/CVE-2025-231xx/CVE-2025-23170.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-23170",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-06-19T00:15:21.620",
|
||||
"lastModified": "2025-06-19T00:15:21.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform includes functionality to initiate SSH sessions to remote CPEs and the Director shell via Shell-In-A-Box. The underlying Python script, shell-connect.py, is vulnerable to command injection through the user argument. This allows an attacker to execute arbitrary commands on the system. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security-portal.versa-networks.com/emailbulletins/68526bc7dc94d6b9f2faf717",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-231xx/CVE-2025-23171.json
Normal file
60
CVE-2025/CVE-2025-231xx/CVE-2025-23171.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-23171",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-06-19T00:15:21.743",
|
||||
"lastModified": "2025-06-19T00:15:21.743",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform provides an option to upload various types of files. The Versa Director does not correctly limit file upload permissions. The UI appears not to allow file uploads but uploads still succeed. In addition, the Versa Director discloses the full filename of uploaded temporary files, including the UUID prefix. Insecure UCPE image upload in Versa Director allows an authenticated attacker to upload a webshell. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security-portal.versa-networks.com/emailbulletins/68526dbbdc94d6b9f2faf71a",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-231xx/CVE-2025-23172.json
Normal file
60
CVE-2025/CVE-2025-231xx/CVE-2025-23172.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-23172",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-06-19T00:15:21.857",
|
||||
"lastModified": "2025-06-19T00:15:21.857",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform includes a Webhook feature for sending notifications to external HTTP endpoints. However, the \"Add Webhook\" and \"Test Webhook\" functionalities can be abused by an authenticated user to send crafted HTTP requests to localhost. This can be leveraged to execute commands on behalf of the versa user, who has sudo privileges, potentially leading to privilege escalation or remote code execution. \r\n \r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security-portal.versa-networks.com/emailbulletins/68526e7bdc94d6b9f2faf71b",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-231xx/CVE-2025-23173.json
Normal file
60
CVE-2025/CVE-2025-231xx/CVE-2025-23173.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-23173",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-06-19T00:15:21.977",
|
||||
"lastModified": "2025-06-19T00:15:21.977",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform provides direct web-based access to uCPE virtual machines through the Director GUI. By default, the websockify service is exposed on port 6080 and accessible from the internet. This exposure introduces significant risk, as websockify has known weaknesses that can be exploited, potentially leading to remote code execution. \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nRestrict access to TCP port 6080 if uCPE console access is not necessary. Versa recommends that Director be upgraded to one of the remediated software versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security-portal.versa-networks.com/emailbulletins/68526ee0dc94d6b9f2faf71c",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-242xx/CVE-2025-24286.json
Normal file
44
CVE-2025/CVE-2025-242xx/CVE-2025-24286.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-24286",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-06-19T00:15:22.093",
|
||||
"lastModified": "2025-06-19T00:15:22.093",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability allowing an authenticated user with the Backup Operator role to modify backup jobs, which could execute arbitrary code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.veeam.com/kb4743",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-242xx/CVE-2025-24287.json
Normal file
44
CVE-2025/CVE-2025-242xx/CVE-2025-24287.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-24287",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-06-19T00:15:22.207",
|
||||
"lastModified": "2025-06-19T00:15:22.207",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability allowing local system users to modify directory contents, allowing for arbitrary code execution on the local system with elevated permissions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.veeam.com/kb4743",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2025/CVE-2025-242xx/CVE-2025-24288.json
Normal file
48
CVE-2025/CVE-2025-242xx/CVE-2025-24288.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2025-24288",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-06-19T00:15:22.323",
|
||||
"lastModified": "2025-06-19T00:15:22.323",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director software exposes a number of services by default and allow attackers an easy foothold due to default credentials and multiple accounts (most with sudo access) that utilize the same default credentials. By default, Versa director exposes ssh and postgres to the internet, alongside a host of other services.\r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nVersa recommends the following security controls:\r\n\r\n1) Change default passwords to complex passwords\r\n2) Passwords must be complex with at least 8 characters that comprise of upper case, and lower case alphabets, as well as at at least one digit, and one special character\r\n3) Passwords must be changed at least every 90 days\r\n4) Password change history is checked to ensure that the at least the last 5 passwords must be used when changing password.\r\n5) Review and audit logs for all authentication attempts to check for unauthorized/suspicious login attempts and enforce remediation steps."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security-portal.versa-networks.com/emailbulletins/68526d12dc94d6b9f2faf719",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-242xx/CVE-2025-24291.json
Normal file
60
CVE-2025/CVE-2025-242xx/CVE-2025-24291.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-24291",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-06-19T00:15:22.437",
|
||||
"lastModified": "2025-06-19T00:15:22.437",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform provides functionality to upload various types of files. However, the Java code handling file uploads contains an argument injection vulnerability. By appending additional arguments to the file name, an attacker can bypass MIME type validation, allowing the upload of arbitrary file types. This flaw can be exploited to place a malicious file on disk. \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security-portal.versa-networks.com/emailbulletins/68526fc6dc94d6b9f2faf71d",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-25580",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-18T15:16:00.123",
|
||||
"lastModified": "2025-03-19T19:15:44.917",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T00:18:57.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:r1bbit:yimioa:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.07.04",
|
||||
"matchCriteriaId": "12EE45D4-0E6C-44B0-8E4F-1B821044BB12"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/r1bbit/yimioa/issues/IBI6XT",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-25585",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-18T15:16:00.253",
|
||||
"lastModified": "2025-03-19T19:15:45.203",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T00:16:52.923",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:r1bbit:yimioa:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.07.04",
|
||||
"matchCriteriaId": "12EE45D4-0E6C-44B0-8E4F-1B821044BB12"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/r1bbit/yimioa/issues/IBI7PG",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-25590",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-18T15:16:00.373",
|
||||
"lastModified": "2025-03-19T19:15:45.640",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T00:17:23.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:r1bbit:yimioa:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.07.04",
|
||||
"matchCriteriaId": "12EE45D4-0E6C-44B0-8E4F-1B821044BB12"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/r1bbit/yimioa/issues/IBI7XH",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-27913",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-10T20:15:14.500",
|
||||
"lastModified": "2025-03-11T03:15:40.027",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T00:14:38.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,10 +95,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:passbolt:passbolt_api:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.0.0",
|
||||
"matchCriteriaId": "B392CCF7-6685-4C9F-AD83-9D98B1D1625C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.passbolt.com/incidents/host-header-injection",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory",
|
||||
"Mitigation"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-29058",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-18T21:15:43.843",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-19T00:24:18.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:qimou_cms_project:qimou_cms:3.34.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B50095A0-C8D6-4504-8E83-ABB06128C792"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cdn.wjlin0.com/halo-img/74CMSv3.34.0%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.zip",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-29339",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T17:16:46.827",
|
||||
"lastModified": "2025-04-23T14:15:28.957",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-19T00:23:24.013",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.7.2",
|
||||
"matchCriteriaId": "E8160C0A-E77F-487D-B5E0-C6657E80D327"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/open5gs/open5gs/issues/3727",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-32790",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-04-18T13:15:58.177",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-19T00:36:04.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,69 @@
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:langgenius:dify:*:*:*:*:*:node.js:*:*",
|
||||
"versionEndExcluding": "0.6.13",
|
||||
"matchCriteriaId": "DBA28F0B-2A55-4349-8728-2F6793E4295E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/langgenius/dify/commit/59ad091e69736bc9dc1a3bace62ec0a232346246",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/langgenius/dify/pull/5841",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/langgenius/dify/security/advisories/GHSA-jp6m-v4gw-5vgp",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory",
|
||||
"Mitigation"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/langgenius/dify/security/advisories/GHSA-jp6m-v4gw-5vgp",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory",
|
||||
"Mitigation"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-32795",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-04-18T16:15:23.627",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-19T00:25:59.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,20 +49,62 @@
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:langgenius:dify:*:*:*:*:*:node.js:*:*",
|
||||
"versionEndExcluding": "0.6.12",
|
||||
"matchCriteriaId": "63A68C09-32F4-4AEE-B016-EFBAD72543EC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/langgenius/dify/pull/5266",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/langgenius/dify/security/advisories/GHSA-gg5w-m2vw-vmmj",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory",
|
||||
"Mitigation"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/langgenius/dify/security/advisories/GHSA-gg5w-m2vw-vmmj",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory",
|
||||
"Mitigation"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-44612",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-30T03:15:20.110",
|
||||
"lastModified": "2025-05-30T22:15:22.617",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-19T01:08:28.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,42 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tinxy:wifi_lock_controller_firmware:1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5412F14-F539-403A-B269-AFCB5CC6A956"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tinxy:wifi_lock_controller:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3D05B11-9932-4DD5-86C6-B66BA7D3949D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ShravanSinghRathore/Tinxy/wiki/1.-WiFi-Lock-Controller-v1-RF-%281%E2%80%909%29",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-44614",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-30T03:15:20.573",
|
||||
"lastModified": "2025-05-30T22:15:22.790",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-19T01:06:45.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,42 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tinxy:wifi_lock_controller_firmware:1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5412F14-F539-403A-B269-AFCB5CC6A956"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tinxy:wifi_lock_controller:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3D05B11-9932-4DD5-86C6-B66BA7D3949D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ShravanSinghRathore/Tinxy/wiki/1.-WiFi-Lock-Controller-v1-RF-%281%E2%80%909%29",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-44619",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-30T03:15:20.737",
|
||||
"lastModified": "2025-05-30T22:15:22.967",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-19T01:04:28.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tinxy:wifi_lock_controller_firmware:1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5412F14-F539-403A-B269-AFCB5CC6A956"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tinxy:wifi_lock_controller:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3D05B11-9932-4DD5-86C6-B66BA7D3949D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://tinxy.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://wifi.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-44906",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-30T04:15:46.583",
|
||||
"lastModified": "2025-05-30T22:15:23.487",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-19T00:57:57.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jhead_project:jhead:3.08:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E20ACC36-4896-4F01-B566-E37FC500A87C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/madao123123/crash_report/blob/main/jhead/jhead.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/madao123123/crash_report/blob/main/jhead/jhead.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-45474",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-29T16:15:40.143",
|
||||
"lastModified": "2025-05-30T16:31:03.107",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-19T00:45:23.457",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2025.1000.4047:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5D75D35-F395-490F-8D42-D409A16FED9A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/ptnnp4eema601rvz",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-45878",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-17T17:15:33.487",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T01:16:08.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the report manager function of Miliaris Amigdala v2.2.6 allows attackers to execute arbitrary HTML in the context of a user's browser via a crafted payload."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la funci\u00f3n de administrador de informes de Miliaris Amigdala v2.2.6 permite a los atacantes ejecutar HTML arbitrario en el contexto del navegador de un usuario a trav\u00e9s de un payload manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:miliaris:amygdala:2.2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED0824F0-D832-4AE3-9CE0-4B3B344E9C6B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.miliaris.it/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://xaliom.blogspot.com/2025/06/cve-2025-45878cve-2025-45879-and-cve.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-45879",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-17T16:15:32.730",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T01:17:35.180",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the e-mail manager function of Miliaris Amigdala v2.2.6 allows attackers to execute arbitrary HTML in the context of a user's browser via a crafted payload."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la funci\u00f3n de administrador de correo electr\u00f3nico de Miliaris Amigdala v2.2.6 permite a los atacantes ejecutar HTML arbitrario en el contexto del navegador de un usuario a trav\u00e9s de un payload manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:miliaris:amygdala:2.2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED0824F0-D832-4AE3-9CE0-4B3B344E9C6B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.miliaris.it/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://xaliom.blogspot.com/2025/06/cve-2025-45878cve-2025-45879-and-cve.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-45880",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-17T17:15:33.603",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T01:14:25.967",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the data resource management function of Miliaris Amigdala v2.2.6 allows attackers to execute arbitrary HTML in the context of a user's browser via a crafted payload."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la funci\u00f3n de gesti\u00f3n de recursos de datos de Miliaris Amigdala v2.2.6 permite a los atacantes ejecutar HTML arbitrario en el contexto del navegador de un usuario a trav\u00e9s de un payload manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:miliaris:amygdala:2.2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED0824F0-D832-4AE3-9CE0-4B3B344E9C6B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.miliaris.it/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://xaliom.blogspot.com/2025/06/cve-2025-45878cve-2025-45879-and-cve.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-47748",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-28T18:15:27.307",
|
||||
"lastModified": "2025-05-30T17:15:29.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-19T00:02:12.070",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netwrix:directory_manager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0.0",
|
||||
"versionEndExcluding": "11.1.25134.03",
|
||||
"matchCriteriaId": "C8C200D2-C9DC-47E4-9DA9-C61B7E27C651"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://netwrix.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-48747",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-28T18:15:27.553",
|
||||
"lastModified": "2025-05-29T14:29:50.247",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-19T00:01:01.873",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netwrix:directory_manager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0.0",
|
||||
"versionEndExcluding": "11.1.25134.03",
|
||||
"matchCriteriaId": "C8C200D2-C9DC-47E4-9DA9-C61B7E27C651"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://netwrix.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-48749",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-28T18:15:27.723",
|
||||
"lastModified": "2025-05-29T14:29:50.247",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-18T23:59:44.600",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netwrix:directory_manager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0.0",
|
||||
"versionEndExcluding": "11.1.25134.03",
|
||||
"matchCriteriaId": "C8C200D2-C9DC-47E4-9DA9-C61B7E27C651"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://netwrix.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-48887",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-05-30T18:15:32.500",
|
||||
"lastModified": "2025-06-02T17:32:17.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T00:55:27.710",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vllm:vllm:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "0.6.4",
|
||||
"versionEndExcluding": "0.9.0",
|
||||
"matchCriteriaId": "18A93B72-AD3E-46D7-8948-E0765D4A7CB1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vllm-project/vllm/commit/4fc1bf813ad80172c1db31264beaef7d93fe0601",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vllm-project/vllm/pull/18454",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vllm-project/vllm/security/advisories/GHSA-w6q7-j642-7c25",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vllm-project/vllm/security/advisories/GHSA-w6q7-j642-7c25",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-501xx/CVE-2025-50181.json
Normal file
60
CVE-2025/CVE-2025-501xx/CVE-2025-50181.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-50181",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-19T01:15:24.453",
|
||||
"lastModified": "2025-06-19T01:15:24.453",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "urllib3 is a user-friendly HTTP client library for Python. Prior to 2.5.0, it is possible to disable redirects for all requests by instantiating a PoolManager and specifying retries in a way that disable redirects. By default, requests and botocore users are not affected. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects at the PoolManager level will remain vulnerable. This issue has been patched in version 2.5.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/urllib3/urllib3/commit/f05b1329126d5be6de501f9d1e3e36738bc08857",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-pq67-6m6q-mj2v",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5136",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-25T00:15:23.043",
|
||||
"lastModified": "2025-05-28T18:15:29.530",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-19T00:43:40.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -122,28 +122,78 @@
|
||||
"value": "CWE-330"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:project_team:tmall_demo:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2025-05-05",
|
||||
"matchCriteriaId": "7E13454D-93F2-4322-91A6-F4F365B6AA50"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/bdkuzma/vuln/issues/15",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.310215",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.310215",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.571960",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bdkuzma/vuln/issues/15",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory",
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5198",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-05-27T21:15:22.863",
|
||||
"lastModified": "2025-05-28T15:01:30.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T00:08:12.993",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,18 +71,61 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:kubernates:*:*",
|
||||
"matchCriteriaId": "0FB56EBE-BCC0-4833-82B3-D5EFC50A7E65"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:stackrox:stackrox:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52EBFA77-3FF6-43EB-8606-C02D32796957"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-5198",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368568",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368568",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6007",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-12T02:15:27.450",
|
||||
"lastModified": "2025-06-12T16:06:20.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T01:26:45.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kicode111:like-girl:5.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2948AA51-987D-477A-9CE2-0A4C4AF7A13C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adminnerr/cve/issues/8",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312330",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312330",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.587569",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/adminnerr/cve/issues/8",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6008",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-12T02:15:27.647",
|
||||
"lastModified": "2025-06-12T16:06:20.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T01:26:01.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kicode111:like-girl:5.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2948AA51-987D-477A-9CE2-0A4C4AF7A13C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adminnerr/cve/issues/9",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312331",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312331",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.588088",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/adminnerr/cve/issues/9",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6009",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-12T03:15:26.440",
|
||||
"lastModified": "2025-06-12T16:06:20.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T01:25:17.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kicode111:like-girl:5.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2948AA51-987D-477A-9CE2-0A4C4AF7A13C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adminnerr/cve/issues/11",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312332",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312332",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.588092",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/adminnerr/cve/issues/11",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6151",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-17T01:15:23.313",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T01:20:04.247",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -122,32 +122,96 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2492A6CA-DFF1-42DC-8800-4A66D8943C33"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:tl-wr940n:v4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2537DC7E-8024-45B5-924C-18C9B702DAFC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WhereisDoujo/CVE/issues/7",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312626",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312626",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593031",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.tp-link.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/WhereisDoujo/CVE/issues/7",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
README.md
60
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-18T23:55:19.662525+00:00
|
||||
2025-06-19T02:00:19.760458+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-18T23:39:55.290000+00:00
|
||||
2025-06-19T01:26:45.850000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,35 +27,63 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2025-06-18T00:00:04.338437+00:00
|
||||
2025-06-19T00:00:04.325476+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
298668
|
||||
298681
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
- [CVE-2025-49590](CVE-2025/CVE-2025-495xx/CVE-2025-49590.json) (`2025-06-18T23:15:19.200`)
|
||||
- [CVE-2025-49591](CVE-2025/CVE-2025-495xx/CVE-2025-49591.json) (`2025-06-18T23:15:19.403`)
|
||||
- [CVE-2024-45208](CVE-2024/CVE-2024-452xx/CVE-2024-45208.json) (`2025-06-19T00:15:21.097`)
|
||||
- [CVE-2025-23121](CVE-2025/CVE-2025-231xx/CVE-2025-23121.json) (`2025-06-19T00:15:21.260`)
|
||||
- [CVE-2025-23168](CVE-2025/CVE-2025-231xx/CVE-2025-23168.json) (`2025-06-19T00:15:21.377`)
|
||||
- [CVE-2025-23169](CVE-2025/CVE-2025-231xx/CVE-2025-23169.json) (`2025-06-19T00:15:21.497`)
|
||||
- [CVE-2025-23170](CVE-2025/CVE-2025-231xx/CVE-2025-23170.json) (`2025-06-19T00:15:21.620`)
|
||||
- [CVE-2025-23171](CVE-2025/CVE-2025-231xx/CVE-2025-23171.json) (`2025-06-19T00:15:21.743`)
|
||||
- [CVE-2025-23172](CVE-2025/CVE-2025-231xx/CVE-2025-23172.json) (`2025-06-19T00:15:21.857`)
|
||||
- [CVE-2025-23173](CVE-2025/CVE-2025-231xx/CVE-2025-23173.json) (`2025-06-19T00:15:21.977`)
|
||||
- [CVE-2025-24286](CVE-2025/CVE-2025-242xx/CVE-2025-24286.json) (`2025-06-19T00:15:22.093`)
|
||||
- [CVE-2025-24287](CVE-2025/CVE-2025-242xx/CVE-2025-24287.json) (`2025-06-19T00:15:22.207`)
|
||||
- [CVE-2025-24288](CVE-2025/CVE-2025-242xx/CVE-2025-24288.json) (`2025-06-19T00:15:22.323`)
|
||||
- [CVE-2025-24291](CVE-2025/CVE-2025-242xx/CVE-2025-24291.json) (`2025-06-19T00:15:22.437`)
|
||||
- [CVE-2025-50181](CVE-2025/CVE-2025-501xx/CVE-2025-50181.json) (`2025-06-19T01:15:24.453`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `8`
|
||||
Recently modified CVEs: `30`
|
||||
|
||||
- [CVE-2023-25718](CVE-2023/CVE-2023-257xx/CVE-2023-25718.json) (`2025-06-18T22:15:31.953`)
|
||||
- [CVE-2023-25719](CVE-2023/CVE-2023-257xx/CVE-2023-25719.json) (`2025-06-18T22:15:32.900`)
|
||||
- [CVE-2024-45673](CVE-2024/CVE-2024-456xx/CVE-2024-45673.json) (`2025-06-18T23:36:20.167`)
|
||||
- [CVE-2024-53011](CVE-2024/CVE-2024-530xx/CVE-2024-53011.json) (`2025-06-18T23:27:51.907`)
|
||||
- [CVE-2024-54961](CVE-2024/CVE-2024-549xx/CVE-2024-54961.json) (`2025-06-18T23:39:55.290`)
|
||||
- [CVE-2025-1403](CVE-2025/CVE-2025-14xx/CVE-2025-1403.json) (`2025-06-18T23:34:56.550`)
|
||||
- [CVE-2025-22973](CVE-2025/CVE-2025-229xx/CVE-2025-22973.json) (`2025-06-18T23:38:27.877`)
|
||||
- [CVE-2025-3509](CVE-2025/CVE-2025-35xx/CVE-2025-3509.json) (`2025-06-18T22:15:33.197`)
|
||||
- [CVE-2025-25585](CVE-2025/CVE-2025-255xx/CVE-2025-25585.json) (`2025-06-19T00:16:52.923`)
|
||||
- [CVE-2025-25590](CVE-2025/CVE-2025-255xx/CVE-2025-25590.json) (`2025-06-19T00:17:23.083`)
|
||||
- [CVE-2025-27913](CVE-2025/CVE-2025-279xx/CVE-2025-27913.json) (`2025-06-19T00:14:38.870`)
|
||||
- [CVE-2025-29058](CVE-2025/CVE-2025-290xx/CVE-2025-29058.json) (`2025-06-19T00:24:18.037`)
|
||||
- [CVE-2025-29339](CVE-2025/CVE-2025-293xx/CVE-2025-29339.json) (`2025-06-19T00:23:24.013`)
|
||||
- [CVE-2025-32790](CVE-2025/CVE-2025-327xx/CVE-2025-32790.json) (`2025-06-19T00:36:04.717`)
|
||||
- [CVE-2025-32795](CVE-2025/CVE-2025-327xx/CVE-2025-32795.json) (`2025-06-19T00:25:59.333`)
|
||||
- [CVE-2025-44612](CVE-2025/CVE-2025-446xx/CVE-2025-44612.json) (`2025-06-19T01:08:28.777`)
|
||||
- [CVE-2025-44614](CVE-2025/CVE-2025-446xx/CVE-2025-44614.json) (`2025-06-19T01:06:45.603`)
|
||||
- [CVE-2025-44619](CVE-2025/CVE-2025-446xx/CVE-2025-44619.json) (`2025-06-19T01:04:28.143`)
|
||||
- [CVE-2025-44906](CVE-2025/CVE-2025-449xx/CVE-2025-44906.json) (`2025-06-19T00:57:57.120`)
|
||||
- [CVE-2025-45474](CVE-2025/CVE-2025-454xx/CVE-2025-45474.json) (`2025-06-19T00:45:23.457`)
|
||||
- [CVE-2025-45878](CVE-2025/CVE-2025-458xx/CVE-2025-45878.json) (`2025-06-19T01:16:08.927`)
|
||||
- [CVE-2025-45879](CVE-2025/CVE-2025-458xx/CVE-2025-45879.json) (`2025-06-19T01:17:35.180`)
|
||||
- [CVE-2025-45880](CVE-2025/CVE-2025-458xx/CVE-2025-45880.json) (`2025-06-19T01:14:25.967`)
|
||||
- [CVE-2025-47748](CVE-2025/CVE-2025-477xx/CVE-2025-47748.json) (`2025-06-19T00:02:12.070`)
|
||||
- [CVE-2025-48747](CVE-2025/CVE-2025-487xx/CVE-2025-48747.json) (`2025-06-19T00:01:01.873`)
|
||||
- [CVE-2025-48749](CVE-2025/CVE-2025-487xx/CVE-2025-48749.json) (`2025-06-18T23:59:44.600`)
|
||||
- [CVE-2025-48887](CVE-2025/CVE-2025-488xx/CVE-2025-48887.json) (`2025-06-19T00:55:27.710`)
|
||||
- [CVE-2025-5136](CVE-2025/CVE-2025-51xx/CVE-2025-5136.json) (`2025-06-19T00:43:40.970`)
|
||||
- [CVE-2025-5198](CVE-2025/CVE-2025-51xx/CVE-2025-5198.json) (`2025-06-19T00:08:12.993`)
|
||||
- [CVE-2025-6007](CVE-2025/CVE-2025-60xx/CVE-2025-6007.json) (`2025-06-19T01:26:45.850`)
|
||||
- [CVE-2025-6008](CVE-2025/CVE-2025-60xx/CVE-2025-6008.json) (`2025-06-19T01:26:01.867`)
|
||||
- [CVE-2025-6009](CVE-2025/CVE-2025-60xx/CVE-2025-6009.json) (`2025-06-19T01:25:17.743`)
|
||||
- [CVE-2025-6151](CVE-2025/CVE-2025-61xx/CVE-2025-6151.json) (`2025-06-19T01:20:04.247`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
93
_state.csv
93
_state.csv
@ -209743,7 +209743,7 @@ CVE-2022-4383,0,0,4f3978e4f233cbb9ea3de8a171f30bbfb0c78ab6638a66a4ebf99903af67e7
|
||||
CVE-2022-43830,0,0,2f64150b363b8e69222f4767b2a962c4259c9aa91848800fda8ecd6f999d6183,2023-11-15T07:15:14.527000
|
||||
CVE-2022-43831,0,0,4b824d13f4654134bfaa17c7c5acf538260c76da9795c9bb806d1640e5487247,2024-11-21T07:27:15.673000
|
||||
CVE-2022-4384,0,0,e4a42500f1faf0f01c4bfb043390142606fdcf1d1d2db89407d32200252c33e2,2025-03-25T21:15:38.660000
|
||||
CVE-2022-43840,0,0,17b6a4cb24007ec977e60889a6e08821bcc6c5745ad3e4daae541616660c9c28,2025-04-15T21:15:46.440000
|
||||
CVE-2022-43840,0,1,94f74eda1ab8e287091221f74a3441f77946bbe7ffdb7fa0120169fed7356996,2025-06-19T00:37:04.670000
|
||||
CVE-2022-43841,0,0,6dac3a6012885404339a039f533cfe4b8c4ab64fc90a590d1b6f4c9d270c1163,2025-01-08T17:13:14.077000
|
||||
CVE-2022-43842,0,0,968543d78d4d0106d71002238fd33b4337c8761617723fc4383d8ec785dd2e77,2024-12-31T15:32:22.737000
|
||||
CVE-2022-43843,0,0,aa4e8920b27430c0e020c56337aaf572b7590d86ac4b80d6e5ec6ab868ab7eb7,2024-11-21T07:27:16.070000
|
||||
@ -221427,8 +221427,8 @@ CVE-2023-25714,0,0,30d1b3b8c2658a5d809246d435c81ddf2f9287a1f5b188d50271eb4a0e433
|
||||
CVE-2023-25715,0,0,6d88ef667b64c52873b9245db5fa7fe78e16f2c79bc517d1f15a2686934c9956,2024-11-21T07:49:59.500000
|
||||
CVE-2023-25716,0,0,6a68a371fb70c98c3f42445bc57863f0a9fc317dbcca5e2cf2d7a9605735c149,2024-11-21T07:49:59.620000
|
||||
CVE-2023-25717,0,0,7ab45047ae291b9110620bf824e69b193b7f478cc5e4114d5ea36a12a4b0fe42,2025-03-10T20:48:20.863000
|
||||
CVE-2023-25718,0,1,cc8356e68a532592d775c24c87006dd197f0d5fa235dcf5d5a5430114eb11a09,2025-06-18T22:15:31.953000
|
||||
CVE-2023-25719,0,1,fc4f39771edda78244556047b067a46288412298b1ca6924e0ff9d3be74cad0f,2025-06-18T22:15:32.900000
|
||||
CVE-2023-25718,0,0,cc8356e68a532592d775c24c87006dd197f0d5fa235dcf5d5a5430114eb11a09,2025-06-18T22:15:31.953000
|
||||
CVE-2023-25719,0,0,fc4f39771edda78244556047b067a46288412298b1ca6924e0ff9d3be74cad0f,2025-06-18T22:15:32.900000
|
||||
CVE-2023-2572,0,0,ed886a16c7f1007ac7399c56e87342873576f715bc1e7094b3db9028c0821f2a,2025-01-08T17:15:11.603000
|
||||
CVE-2023-25721,0,0,f81320c364560d2364a1f3ba19d0330f029ea11a50a94d0f9f6b4ead68d21d31,2025-02-19T19:15:13.430000
|
||||
CVE-2023-25722,0,0,bca76e3911d579e248d877cdd35275de0ae46411c20589fc7ce57e1a3e928a08,2025-02-19T19:15:13.617000
|
||||
@ -235144,7 +235144,7 @@ CVE-2023-43043,0,0,4ec93aa82436dc86b4ccb1b3684f50d48aedc5bdc1d93f254412bd4b2a651
|
||||
CVE-2023-43044,0,0,c700e000c93a60d18aeeabd55f0025926f6f0c9fba18f1ec754ac13e08b3d371,2024-11-21T08:23:38.910000
|
||||
CVE-2023-43045,0,0,692f22dbc4dc19c089253751109b93bb0e5cefd8359cd7675e66e51e06c8d3dd,2024-11-21T08:23:39.040000
|
||||
CVE-2023-43051,0,0,ed0b2315886b0d02ae69e50125a4e57219197c24e1340da2f4eb30f9896d5010,2024-12-17T18:08:08.027000
|
||||
CVE-2023-43052,0,0,30b38e81f9b68b808f2a57887d47632e125fae6e9f8c3bc0081997acf157dbbd,2025-03-07T17:15:18.060000
|
||||
CVE-2023-43052,0,1,34d91346bfa0dfc2c1a10c99807c82304103db8d4169e79a7cb7e17472e40ad3,2025-06-19T00:11:36.133000
|
||||
CVE-2023-43054,0,0,160b9682e5bec73380f263a77e3ebbeba23b48fbec834d03025c28d701ba1820,2024-12-23T17:29:02.930000
|
||||
CVE-2023-43057,0,0,01fddeae7f9538027c931e3e992d44ad1edd38b1d8fac1c202a9cab42dc2359d,2024-11-21T08:23:39.433000
|
||||
CVE-2023-43058,0,0,a2df93f61b20e82bd3917a094411dc8a8f78a1f838adb628292a86116ce01de3,2024-11-21T08:23:39.570000
|
||||
@ -236235,7 +236235,7 @@ CVE-2023-4474,0,0,d4799a0dcb39156734a25b4a28a5bb799b18044cdd0ae6f04e22995d42ec8e
|
||||
CVE-2023-4475,0,0,47d15833d3ca73c79ddd2d5025af5599df0f7e6c16d19dfe77959aa4b1c5b183,2024-11-21T08:35:14.783000
|
||||
CVE-2023-44752,0,0,4150e5669753eb509a1cbbef3d32df8ffde74678268a185e96d344d83a0d7b56,2025-04-24T14:56:07.597000
|
||||
CVE-2023-44753,0,0,7f15867a32c11b9d1f1f543f8bcefd4ddc6bed14590816ea3bb45fb1470f0c42,2025-04-24T14:56:59.410000
|
||||
CVE-2023-44755,0,0,92d10d0b12020aa13ca2aaede57a9d65cd4656558ec8de3c717fbbcdbcb38a22,2025-04-23T14:15:27.320000
|
||||
CVE-2023-44755,0,1,d4cf51af7796cac9fa9b6347172c9e7e4d9beb9283ba7a52b125bc35dc0bc41e,2025-06-19T00:21:38.390000
|
||||
CVE-2023-44758,0,0,e729895caf9bb37b37c8201b6a85dd648d3aa9d89e2cb2d0d6a653b2301b177c,2024-11-21T08:26:00.480000
|
||||
CVE-2023-4476,0,0,bf61db59ad9dafdf3e6ed235511e570fb7d4b9651b983b2ad75bb82e45001399,2025-04-23T17:16:44.590000
|
||||
CVE-2023-44760,0,0,8a6af57f009c485579afa393ac6a3871eb0427a7d2f884cbbc517eacf7222787,2024-11-21T08:26:00.630000
|
||||
@ -252351,7 +252351,7 @@ CVE-2024-22647,0,0,0ff7eb4dbd9389ed33bcf5e48fde75377e1d805c7a4011b4189cfb80cc3dc
|
||||
CVE-2024-22648,0,0,bf371e82e6b8ba69838a85189fd7c617dc96a67937ae928aae96b0e09af69b0c,2024-11-21T08:56:32.420000
|
||||
CVE-2024-2265,0,0,2d9e3f6a8940d91c300a26e60fbafd657c57a52b99326912de499462a5a33db6,2025-03-11T16:53:59.010000
|
||||
CVE-2024-22651,0,0,e469381682c5eb450c79d9b6a70a064ab830cecb8e16bcfbc6f7459206453c7f,2024-11-21T08:56:32.580000
|
||||
CVE-2024-22653,0,0,84ea78d231e683750b79b93a6446704614ee3cab07a58cf58e432565337cb4f0,2025-05-30T16:31:03.107000
|
||||
CVE-2024-22653,0,1,9327c4eeb2944373f4b4615e203889d4d97ef3692e8a64646c097e9e2e698468,2025-06-18T23:57:03.917000
|
||||
CVE-2024-22654,0,0,7f401d524d432dc6daf2737f2dfd50a846877c5557a2b4e454e64bca9bc199f3,2025-05-30T16:31:03.107000
|
||||
CVE-2024-2266,0,0,95d5ae8a3d9367be388b5604e19ba904305ae510fd4151f2cfa0ff7fb43bf84e,2025-03-11T16:53:46.840000
|
||||
CVE-2024-22660,0,0,2311a8f71be31bc2d8e245fbbdb3d3cc97a05fbb5d0aad28b28032e7f069aa6a,2024-11-21T08:56:32.850000
|
||||
@ -269703,6 +269703,7 @@ CVE-2024-45204,0,0,c17d724ab71326993fc885d0d9808c0b2eaae94c47b7923f22dde16d2eff6
|
||||
CVE-2024-45205,0,0,a10f061421a2a3424e1b6c374ce4a524c46fcb2bdda2afd1dfd63ddbb6391abd,2024-12-04T17:15:14.330000
|
||||
CVE-2024-45206,0,0,d9e968acf0dd8b42fc18894be4d96b31b86b907e5133e5110d37345500c02d41,2025-03-13T19:15:48.013000
|
||||
CVE-2024-45207,0,0,c6ee04eede270568245ffcec461ab781dd5d887b6f188268b86eaa3a09be9e39,2024-12-04T16:15:25.580000
|
||||
CVE-2024-45208,1,1,7215a369507849f231782490b34d0cc67523c6bd551d9fefc6a31e8c75e86c05,2025-06-19T00:15:21.097000
|
||||
CVE-2024-4521,0,0,4a1a789411022da9e12743f86f636c858525a8f77c0a3180e65a51191dfff476,2025-02-19T18:01:20.563000
|
||||
CVE-2024-45216,0,0,0c858a01ee35c91ac1e5a46b34b1bd78a3671b8c7c394b48bf0907856ecc77c6,2024-11-21T09:37:28.690000
|
||||
CVE-2024-45217,0,0,6810c24892f2494e2f2c08a71fcaf1b8b72831c7bb6f78dcca7b6cc985b451a7,2024-11-21T09:37:28.897000
|
||||
@ -270108,7 +270109,7 @@ CVE-2024-45663,0,0,f5982f696eb561ee89ceacd8a652ce2095dd2ab2ec4564026ad75a7cdf0b6
|
||||
CVE-2024-4567,0,0,f9422c43c79efa82ea99c9dec60f6662a26312cd8fd4cf90d580aef590f63be3,2025-03-07T12:37:30.023000
|
||||
CVE-2024-45670,0,0,884f280837c803b089861d2cd0800b5b952f4567c75753b35001e2a46ace7ee6,2024-11-16T00:24:57.203000
|
||||
CVE-2024-45672,0,0,1f284c4606417b08ac2cd87243460783df32e665537ee9aa04c2649281078873,2025-01-23T18:15:30.057000
|
||||
CVE-2024-45673,0,1,29f2d7c32b4c17ca5b5341d16e6030d5c7734db3da16c157ef02bea198990643,2025-06-18T23:36:20.167000
|
||||
CVE-2024-45673,0,0,29f2d7c32b4c17ca5b5341d16e6030d5c7734db3da16c157ef02bea198990643,2025-06-18T23:36:20.167000
|
||||
CVE-2024-45674,0,0,5a8f07a024d33c4f56bbf8876244f6e043fca60be2177c862fb1271be54ef76b,2025-02-22T00:15:18.410000
|
||||
CVE-2024-45676,0,0,eb22d41374a33aad487840972b05f99b6866c07ad3faeb5bebf20d811966d571,2024-12-11T03:21:10.387000
|
||||
CVE-2024-45678,0,0,c75108ce7d77ba88a074d8ae6e0835493f724a0bc9c0b841e9bb922f4030ac54,2025-03-17T18:15:18.033000
|
||||
@ -275504,7 +275505,7 @@ CVE-2024-53007,0,0,7ba22a6b4032cf25f35c1ef00a1f90b930f980bf5515302c33e7724c5430a
|
||||
CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce6966412829a,2024-11-28T03:15:16.363000
|
||||
CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000
|
||||
CVE-2024-53010,0,0,e92ea489ea86ddb06142add3a7b47a2b4c77fd3f05e7b1a7bf67e9e564744128,2025-06-04T14:54:33.783000
|
||||
CVE-2024-53011,0,1,9f543daf6d1032b8c529ba0691f6774574470a7477d429016cd467649e59ce57,2025-06-18T23:27:51.907000
|
||||
CVE-2024-53011,0,0,9f543daf6d1032b8c529ba0691f6774574470a7477d429016cd467649e59ce57,2025-06-18T23:27:51.907000
|
||||
CVE-2024-53012,0,0,950d19974b52359043aeababc59a313e37e644d350cda3a38725dd1bbdedcdb2,2025-03-06T17:11:00.953000
|
||||
CVE-2024-53013,0,0,8d210c05dd1b64c6c47cfd00c65a0b73f17272a696913a123b948752a0ecd543,2025-06-04T14:54:33.783000
|
||||
CVE-2024-53014,0,0,f46cf9621d7ec0ec27b269342393212a2ff98a2d1e4dee51da1f5926fb7a1566,2025-03-06T17:53:56.627000
|
||||
@ -276908,7 +276909,7 @@ CVE-2024-54958,0,0,05aa071d04d451a63fdeb28f8fd1c549b9935b77ac20404b5acdb6c9e76ec
|
||||
CVE-2024-54959,0,0,d1f45eb8b3595354ce21bb15fb93c0707cc7f656ec9206940bec23d402effbf4,2025-02-21T22:15:12.593000
|
||||
CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000
|
||||
CVE-2024-54960,0,0,8d367a9174beb59a3f0e906c9cbe8173c7e94403da4b6d1b3ef81ffe768eea4c,2025-02-20T20:15:45.927000
|
||||
CVE-2024-54961,0,1,d01efa3a725b7b071feaa9038a3d2e643299d5c9a69e4d407f43d6af709bc320,2025-06-18T23:39:55.290000
|
||||
CVE-2024-54961,0,0,d01efa3a725b7b071feaa9038a3d2e643299d5c9a69e4d407f43d6af709bc320,2025-06-18T23:39:55.290000
|
||||
CVE-2024-5497,0,0,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000
|
||||
CVE-2024-5498,0,0,9ecbba4511623233a33c3c81181005b0976c38a133da4d6811e96531fd97f158,2024-12-26T16:43:44.433000
|
||||
CVE-2024-54982,0,0,f9ebf7280811fe14b802aa42d21c7712849d65d0c4fab1838b9c1493b6720970,2025-01-16T21:15:16.320000
|
||||
@ -283840,7 +283841,7 @@ CVE-2025-1399,0,0,e8485dd7af68ba8f2d01d51196b9d6a2f2dcf208ff563be9860baa305f6daa
|
||||
CVE-2025-1400,0,0,9f46a0258b2b238aeafb292dde4996586d32ba094d532a39f75891a9cb5fcf1e,2025-05-07T14:13:20.483000
|
||||
CVE-2025-1401,0,0,133011ee6945168c3da00a99f9ab3febf4bfdf6bf9088c02ff1a91a5995f2e5b,2025-04-29T14:33:03.920000
|
||||
CVE-2025-1402,0,0,c23c451cfa1d570fb16b3d38ae224aa085b42cdb084d4b1dbd67b0732fd42aba,2025-02-25T04:04:59.860000
|
||||
CVE-2025-1403,0,1,c40087b1d9b18cf6d2fd48f22d1a8ca09df0153a80f3a47bf1e1d9b76fc33bdc,2025-06-18T23:34:56.550000
|
||||
CVE-2025-1403,0,0,c40087b1d9b18cf6d2fd48f22d1a8ca09df0153a80f3a47bf1e1d9b76fc33bdc,2025-06-18T23:34:56.550000
|
||||
CVE-2025-1404,0,0,f39be30144b0a5fe80b4b94433169bbe79b568debe0e45a11fa0a8302ed0e64e,2025-03-01T12:15:34.310000
|
||||
CVE-2025-1405,0,0,9d1939e7603fe8cd2a4a6b659e6149cd03308d08f69102d0905681145b4d879a,2025-03-06T17:57:54.597000
|
||||
CVE-2025-1406,0,0,6fbc92715581c083383884df65716e311e7920e9986e87816bf21c4af15408ec,2025-02-25T03:38:24.303000
|
||||
@ -286560,7 +286561,7 @@ CVE-2025-22962,0,0,773f9192cf586f9a26d3c9055927917c829f6abfc86fb569ec71975a3edac
|
||||
CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000
|
||||
CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000
|
||||
CVE-2025-22968,0,0,d0a75ffad23d4bf4fd1a2a7bd701b07084101823bc6e94fd7915fe64c67cfcd2,2025-05-21T16:21:44.280000
|
||||
CVE-2025-22973,0,1,ac6664ff93ee8bd28667fc4c4cb52a67fbb351c8a7bd7808b2174e7353b88f37,2025-06-18T23:38:27.877000
|
||||
CVE-2025-22973,0,0,ac6664ff93ee8bd28667fc4c4cb52a67fbb351c8a7bd7808b2174e7353b88f37,2025-06-18T23:38:27.877000
|
||||
CVE-2025-22974,0,0,4185e79accf61de6fccd04dc583797f701c7a7868c89a08c56fe419709f832c0,2025-03-25T16:36:17.127000
|
||||
CVE-2025-22976,0,0,34e44a1193299f2815c5773a405812b482572222a2b2eca4f8d55245112e8b61,2025-02-03T19:15:14.397000
|
||||
CVE-2025-22978,0,0,a869979eb8846d055e51d4b0332046ec3bb48e7e906c85c4b44b4a923b3dfc63,2025-05-13T19:34:04.030000
|
||||
@ -286679,6 +286680,7 @@ CVE-2025-23118,0,0,1b6935e1de98bd988462eba8eda54cef63b56f3eba9236fce4c76fcc1a2a8
|
||||
CVE-2025-23119,0,0,03b50e07e15abdb790cc32062bbf922a7a5b86dedcc5d4ac846195c74e91324e,2025-03-04T20:15:38.060000
|
||||
CVE-2025-2312,0,0,9414b11cccd912a93c7b77b8b8a4cccf6c204bd0063ade57fb6afec180d8cd63,2025-03-27T16:45:46.410000
|
||||
CVE-2025-23120,0,0,fcc412fa6fb516a26fbcce2f3fd613ece130eab1dda24987978f45ecc9becda2,2025-04-02T16:01:20.857000
|
||||
CVE-2025-23121,1,1,c86b05491865e4836bf6329c1e162cbd30a6a1a5c9be4521f81e5cc797e8b1c6,2025-06-19T00:15:21.260000
|
||||
CVE-2025-23122,0,0,f8c01c8ef5b6f9e831cc1568dda7fdd2cbff2f2dc9b80c6b770cbbbb7df7e604,2025-05-20T22:15:18.907000
|
||||
CVE-2025-23123,0,0,d28e8b5e29fa7054d5082b2ec0990e478426188aacd81179d6ef03e17b2813d9,2025-05-19T14:15:22.560000
|
||||
CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000
|
||||
@ -286726,7 +286728,13 @@ CVE-2025-23164,0,0,d6c71aadf409109dde414ece9e46d71250f8539b53bfd49135d9534a66c81
|
||||
CVE-2025-23165,0,0,a3f5779be4e59c9a66a594d6c3ca801baf089a9d49144b143211178cc604b18d,2025-05-19T14:15:22.683000
|
||||
CVE-2025-23166,0,0,47816fc5591e3a4414111fd69de9efb4cbf6aca82919721dea5adc3261322e9d,2025-05-19T15:15:23.310000
|
||||
CVE-2025-23167,0,0,51e20beaaef964a23d54b2f922e381e06cac714eb024305c1bced81671d165c1,2025-05-19T16:15:27.317000
|
||||
CVE-2025-23168,1,1,546ed7c64bc03ea0d51fecc396d56c188ec7f68a49c7ea532db1eaf3e684366b,2025-06-19T00:15:21.377000
|
||||
CVE-2025-23169,1,1,e6f8ba47a6606d785ba012a980755371860a8b07baaaed5333bdd4dff9994ab6,2025-06-19T00:15:21.497000
|
||||
CVE-2025-2317,0,0,9ea9ba34615d5bc5ee8806158627db355af143699ea415828af46066a4160dd0,2025-04-07T14:18:15.560000
|
||||
CVE-2025-23170,1,1,435072620bb9f6e2323acf1b32f92f05d9f6176513f869147cabcbc7416369e7,2025-06-19T00:15:21.620000
|
||||
CVE-2025-23171,1,1,93cd0060572ed22af88863bbc002e2eae1bda0f6be8c43e073a24b943a764b61,2025-06-19T00:15:21.743000
|
||||
CVE-2025-23172,1,1,08d066df5e2545e2c4980c7a00113f81e9955fbf9898af9917452768c0c042ca,2025-06-19T00:15:21.857000
|
||||
CVE-2025-23173,1,1,46be7eeb11c19f13fd500aa3ff85203ba69130d74a0bd93b54ea0e84e022ac91,2025-06-19T00:15:21.977000
|
||||
CVE-2025-23174,0,0,50322119595bff087a12ed6f94f87f583ba40060fccb96eb5cf9c3f3476fa552,2025-04-23T14:08:13.383000
|
||||
CVE-2025-23175,0,0,d32116b600ac178b1ee720078d8acfc21dc4298d12982e92ae53dd00f4271286,2025-04-23T14:08:13.383000
|
||||
CVE-2025-23176,0,0,4d8a569d7f8b232199b1ed07a8ee3ee2f1c9e25ade11e06e887257dda42b67cb,2025-04-23T14:08:13.383000
|
||||
@ -287746,6 +287754,10 @@ CVE-2025-24280,0,0,7e6318ddeec3c45683c18b4a04b0c338f2389b9346d93c786d9c6752b668d
|
||||
CVE-2025-24281,0,0,76b9011c7783c871ef865a80caf1ae08e485f8d8810428515769f6f44737d638,2025-04-04T18:22:19.983000
|
||||
CVE-2025-24282,0,0,92059d5a241b5d96ef7593ded7e2abc281079ec5ed3a524fa050c614e5194214,2025-04-04T18:23:23.340000
|
||||
CVE-2025-24283,0,0,4df1743210499b8e21375ec5fdb7750825951563a76a92a49e54d06df67345b4,2025-04-07T14:07:33.510000
|
||||
CVE-2025-24286,1,1,65683583000d5529830b20ccff957add7c317eaf54ac1796bbc7a2c77fe87db0,2025-06-19T00:15:22.093000
|
||||
CVE-2025-24287,1,1,e41d94977fd890910d04b473f5243ba60c7263c3bad06c2e597f78ea0eb5c900,2025-06-19T00:15:22.207000
|
||||
CVE-2025-24288,1,1,2a83985293da967adc6016271e645505f2b1fe813d876cc179a7cddf121b081a,2025-06-19T00:15:22.323000
|
||||
CVE-2025-24291,1,1,af1e02cc91c468c4c3b8047dcc990ef7498963d0fe709481ee27332ceda5885a,2025-06-19T00:15:22.437000
|
||||
CVE-2025-24297,0,0,5d4a74f3648dba475a9505a338d2107001df4a92611f1e742f9c3b8bc6fc9e4e,2025-04-16T13:25:37.340000
|
||||
CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000
|
||||
CVE-2025-24304,0,0,d93e512a7b4aa7125a9d9a3a56f58a274a5675b50a430e59bfee24f84fb92162,2025-04-07T14:17:50.220000
|
||||
@ -288696,13 +288708,13 @@ CVE-2025-2557,0,0,a42b70c78dcd89b9d3e57fec472337c34078e8807b7744b63a4210d8692650
|
||||
CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000
|
||||
CVE-2025-25579,0,0,9ad1112c1ed3d836da183b36b2d4375f4736b0d6d1110b2bc10e441acd9590d4,2025-04-07T14:23:36.660000
|
||||
CVE-2025-2558,0,0,f54caa5596788d78e4aadac9170f01e05efbd611d3891eab20a89c4ada7faf76,2025-04-29T13:52:47.470000
|
||||
CVE-2025-25580,0,0,981db6fd6e3e758c95a7a3f18e0cb48f5883f5e68031cb88007741a3d3ada90e,2025-03-19T19:15:44.917000
|
||||
CVE-2025-25580,0,1,a7fce7289773d49e23ea5e84e7bf568aff3d97944f32e02e6812a51089903564,2025-06-19T00:18:57.017000
|
||||
CVE-2025-25582,0,0,fdff5f005418e70695619b15a5365b87844b6870f1b28eb8b42a995086eb8722,2025-04-02T12:27:19.593000
|
||||
CVE-2025-25585,0,0,aa4f3350849e7a6d1d328ba035f3acd3940e4357ca726a2c6819200e720715c1,2025-03-19T19:15:45.203000
|
||||
CVE-2025-25585,0,1,98a50572e811d5f13ce801a89eed6933c5c3cc3522affcd97ffbbab7b5092abc,2025-06-19T00:16:52.923000
|
||||
CVE-2025-25586,0,0,9d3dab1f0ca9edbc0b6ffff21562595a974056df41184e0c163d1dfe65d9c443,2025-04-01T20:38:38.617000
|
||||
CVE-2025-25589,0,0,279eb4ff22a60008293d709d8e850b13874c50e8c6f1e23d8361c430349b0055,2025-03-21T14:15:16.007000
|
||||
CVE-2025-2559,0,0,e0a1ec52fcee197642d94bd63e1278a00066cfd7daa56d8679b3fb30d47c24ac,2025-04-30T03:15:17.857000
|
||||
CVE-2025-25590,0,0,3893b0a4da36be48d36967b7837bf6fae4ec31547efd1c3211b9404b64ed4014,2025-03-19T19:15:45.640000
|
||||
CVE-2025-25590,0,1,96d0d533d8a4dfebea4ec0eedd66c24e0734a94d85635e359915a361c424dc59,2025-06-19T00:17:23.083000
|
||||
CVE-2025-25595,0,0,fed1db19038d4b73f5895de99c0193dd0437928c86ea4f6762661a5574f5f9ac,2025-04-01T20:38:28.603000
|
||||
CVE-2025-25598,0,0,97b7c491c3636dfe02438cb323583c05678dcf453afda217f0aaabb9e8d0908a,2025-04-03T16:36:30.420000
|
||||
CVE-2025-2560,0,0,337093de562c8838404064a49d62d16ccb57a1ba560038dbcd17a316d2777179,2025-06-17T21:07:40.473000
|
||||
@ -290181,7 +290193,7 @@ CVE-2025-27907,0,0,9272c9f0f3ebf450826a7c5ed13cb42593f690c62fd733f0bb0016d57e6b9
|
||||
CVE-2025-27910,0,0,507628b1591b753da54c96355e4029096a0435f13a8b9964d15ae69d34924cd4,2025-05-21T19:34:30.897000
|
||||
CVE-2025-27911,0,0,10e67228aa90db73c3414ce28096a25aef6cbc3f128533308c9edad1912d6fdb,2025-03-11T08:15:11.500000
|
||||
CVE-2025-27912,0,0,607ba6a16d641d751b5df959275fc938490ced30d4e8e005bbdc21ac77f4d97c,2025-03-11T08:15:11.727000
|
||||
CVE-2025-27913,0,0,f2177e7fabb09419b96c97469c2fe9aa09d8b825af754be72e4ea907f64e0e7c,2025-03-11T03:15:40.027000
|
||||
CVE-2025-27913,0,1,485fe06bc425120126a2274ee10ae796cc1723ddd3b39b8ce670ae2e45be546c,2025-06-19T00:14:38.870000
|
||||
CVE-2025-27914,0,0,f279e908e73009eab2977a1f24fd2dfdc09b80866f9164398ffd96fb6fa013f7,2025-04-02T20:38:06.430000
|
||||
CVE-2025-27915,0,0,cd099995dd55d9bf47b9910748dbe833f7620d7232f17e750972cd85ba2bccbf,2025-04-02T20:38:25.487000
|
||||
CVE-2025-27920,0,0,860eecbf3eb49dc71aa68177ecb3d2f8f87bd3bfcb02e4d5ca70f91c6686bc79,2025-05-21T19:40:21.300000
|
||||
@ -290549,7 +290561,7 @@ CVE-2025-29046,0,0,97c704d53eaab90ebd050fb706002e2d0c0d26d31e8336e6914769a779ce7
|
||||
CVE-2025-29047,0,0,ab9e56c52d1b5d7ce28982f238deab131b797a6e3c2a7fe7bd1afe31cde47f19,2025-04-30T15:32:30.690000
|
||||
CVE-2025-29049,0,0,5d330c70d7d31103316e937aa271bd3496ea507fadb908ea97bf504a0ca30485,2025-04-02T14:58:07.527000
|
||||
CVE-2025-2905,0,0,4e658b40e4673325cad88f5d27301325c733ab3811bf1fdb2bfe5209f1723eaf,2025-05-05T20:54:19.760000
|
||||
CVE-2025-29058,0,0,7bc50f4cade840847079528b991d483c5848c526d0c824da3719f4b63ecc56c6,2025-04-21T14:23:45.950000
|
||||
CVE-2025-29058,0,1,8fd36d2b37519c6477eceb6d49c53ef292a2d14ab64b3e3ae3de289581e5f825,2025-06-19T00:24:18.037000
|
||||
CVE-2025-2906,0,0,a9a7d8b41557888835e1c79dd2617916cc6b4f3c0d6d09861e305343a3b52d6a,2025-04-01T20:26:11.547000
|
||||
CVE-2025-29062,0,0,cf634246124158ff6da279c0a25858fa36e0953ce98966a9f38c5cffd84c104e,2025-04-29T13:42:54.483000
|
||||
CVE-2025-29063,0,0,53319713162795fa5af1bba6f6ae7ca1ca4961c65f7a40b22ba40193b32d5e1f,2025-04-29T13:38:03.320000
|
||||
@ -290624,7 +290636,7 @@ CVE-2025-29315,0,0,f907f053863754eafc89ac11a469f54443f6b549eee8182288b1596f75ccb
|
||||
CVE-2025-29316,0,0,edbfef5d2b6ba20f5ddacf4404f4ebf4c89ebe5fca32750f4069bf616e710afc,2025-05-05T18:15:41.723000
|
||||
CVE-2025-29322,0,0,2d154ec4512c8c4d705799afa2ea73c17ca8f22a9dcc44f2fe16f737f7f4c5a2,2025-04-08T19:15:48.650000
|
||||
CVE-2025-2933,0,0,d2bf8266af3293189f2fc83d9c7224df7d9162ddc33d6ffbeb12c1b55081638f,2025-04-07T14:17:50.220000
|
||||
CVE-2025-29339,0,0,68a305eeb644847bf32dd93a9ea14694595bad06f76ea0ff7f59df135eb9dae8,2025-04-23T14:15:28.957000
|
||||
CVE-2025-29339,0,1,3c8767e6fc1c7537f5abbed85f26508361863e04ceb6434ef3e14faf20c7a82c,2025-06-19T00:23:24.013000
|
||||
CVE-2025-2935,0,0,7b37cfe809822a560bb0e6dbeb565e9e50c614feb77ac7a6501335760c490b55,2025-06-06T14:07:28.330000
|
||||
CVE-2025-29357,0,0,eb014a723aa009227f0255b17dfaab32ae69c018e0a2e5c6777057d80a0cac3f,2025-04-02T20:33:45.110000
|
||||
CVE-2025-29358,0,0,610f6132677edbf66dfcad4906cefbaf7edab86ba5e1c4ae5ea8eda11e0df66d,2025-04-02T20:33:25.387000
|
||||
@ -293277,12 +293289,12 @@ CVE-2025-32784,0,0,f07e1bae891c8076c2e74beba24dfa0a792bdc8c6b542f23984d9697f06bd
|
||||
CVE-2025-32787,0,0,8a246667f42b8c93bdf6ea46fc5b0e98103cc9f313dbb1cf2d73b44e0183e974,2025-04-17T20:21:48.243000
|
||||
CVE-2025-32788,0,0,cebc5cd0039e46d666bc72b974aa2129ecda5527e4c21f72222322773942a165,2025-04-23T14:08:13.383000
|
||||
CVE-2025-32789,0,0,15497d5966ffa6957462c2b50b8826e589c0a55241d8772e97d18438454b376f,2025-06-18T13:08:03.067000
|
||||
CVE-2025-32790,0,0,990684714275a758b4cf34a8ac7b4f82fc1b2c4e46163c9e33e822bd80e8f1a8,2025-04-21T14:23:45.950000
|
||||
CVE-2025-32790,0,1,ad704aba084f587745e00b79fe34454c0424370ee4217d2aeeeb26c85bddfc96,2025-06-19T00:36:04.717000
|
||||
CVE-2025-32791,0,0,7bfb43a10b9eb50667be3773a3b4fe4844fac126ca4c8485005211a087def8c1,2025-04-17T20:21:48.243000
|
||||
CVE-2025-32792,0,0,5617465372754753e6f838bd9a5e8e1789ad8b344ec076ba7e3dadb68ae93bcb,2025-04-21T14:23:45.950000
|
||||
CVE-2025-32793,0,0,53c512d5ca796aaa2074213fb6811f42fd2ddcbb1551cf07ba87dac176a68735,2025-04-23T14:08:13.383000
|
||||
CVE-2025-32794,0,0,e5c75374c7acd23f4b7bf6398c0b16e7126deed02aabe7e5caf26f8df1848b02,2025-05-28T14:58:52.920000
|
||||
CVE-2025-32795,0,0,9b91f12206c53caef7f7087deba98182feb5bc18c57224b5893c030b3a403c24,2025-04-21T14:23:45.950000
|
||||
CVE-2025-32795,0,1,3226787ef9fde307f13d92b52c13368891b70059c6d43e363196d275603a2be2,2025-06-19T00:25:59.333000
|
||||
CVE-2025-32796,0,0,20ed07849a09b1f538632557f0ede2b9976cfa2cb03f0965ae7b2114a9dbac36,2025-04-30T16:12:32.757000
|
||||
CVE-2025-32797,0,0,39a1453b6f2631a027a7807128ca6c2891d742d8758fbedb098024372cb946b4,2025-06-17T20:50:23.507000
|
||||
CVE-2025-32798,0,0,f44833545ee36efc429fe65c06380ddfd5e2af6021ad43cc23f550f5437de549,2025-06-17T20:50:23.507000
|
||||
@ -293696,7 +293708,7 @@ CVE-2025-3503,0,0,8d73ed34ec38f7a3fa46caf6863bc942845955658d4c73ee2f17e6ea13b905
|
||||
CVE-2025-35036,0,0,8999fc2e6f0f347716ac95ecda1fad4f0e119637eb3d3b6b7486b65b8a53ad62,2025-06-04T14:54:33.783000
|
||||
CVE-2025-3504,0,0,aa0bdb842e6d15cc15443745349224911fa493d95241cc6b8918b52272013f3a,2025-05-07T16:30:38.630000
|
||||
CVE-2025-3506,0,0,2cb7dd6bbf56ec7a1271ba0855665acb3addde320f586d229e2ed1fc18ebe38d,2025-05-08T14:39:09.683000
|
||||
CVE-2025-3509,0,1,59dfeef049b50d7f8ac0a0fdc9ad111deee128bea1190de29b989508fce45039,2025-06-18T22:15:33.197000
|
||||
CVE-2025-3509,0,0,59dfeef049b50d7f8ac0a0fdc9ad111deee128bea1190de29b989508fce45039,2025-06-18T22:15:33.197000
|
||||
CVE-2025-3510,0,0,1b8ed8f812be63691dac933113d2a261e9d649bd0a63b491c4d9db6c3ce2c4a2,2025-05-06T15:19:30.527000
|
||||
CVE-2025-3511,0,0,2581a75036be8d737bc9c5afcbd1a9fd25ea23392ab1ff727e244646bbc80fb2,2025-04-29T13:52:28.490000
|
||||
CVE-2025-3512,0,0,20d5b7a0c651482d59ceef752919a6e419c7dc684bf79b235343ded68357dd77,2025-04-25T18:15:26.103000
|
||||
@ -295497,9 +295509,9 @@ CVE-2025-4458,0,0,eea9d140dad4a90fff730d46462b27320b6a68017f06012fa50cfa447315cc
|
||||
CVE-2025-4459,0,0,5d83ffa5e1366542181e5e41a54bfeb484e13bea3e368fac332c6a4e14d2429f,2025-05-16T15:36:12.370000
|
||||
CVE-2025-4460,0,0,1523c53b4c3872072d748d30b69d698f488cc9e2a4c6bd053b5055199ec1d6eb,2025-05-23T12:28:39.320000
|
||||
CVE-2025-4461,0,0,3bcbf8140bfe36150100ec64813a63556401d9c6c9569195ed4770cdd149bae8,2025-05-23T12:33:21.447000
|
||||
CVE-2025-44612,0,0,ab31165040d4e1acf62342650f5a81fcd3d1ed85f65ea951c1762f491a626de7,2025-05-30T22:15:22.617000
|
||||
CVE-2025-44614,0,0,2b0e5eb52856556d366041a820729a8d2c7d10ce2788b493796bef3738a63138,2025-05-30T22:15:22.790000
|
||||
CVE-2025-44619,0,0,2e5472ba4d6ea57e021067b24b93cef81ddd7248b90b1c18bf27182d915cf485,2025-05-30T22:15:22.967000
|
||||
CVE-2025-44612,0,1,5defe95505c6700db90200d792442f785e503a45c3ea11c6229ec62aecfa8dd5,2025-06-19T01:08:28.777000
|
||||
CVE-2025-44614,0,1,0f68dc5a3d03479a4187b8785f635a99a89cffec91a8b63dbc057ac34a947962,2025-06-19T01:06:45.603000
|
||||
CVE-2025-44619,0,1,422a72a04b94879413276ec6eb0213f1193ef9eb8b1372f7221aa0e31c9fe170,2025-06-19T01:04:28.143000
|
||||
CVE-2025-4462,0,0,a45c74043d407d51bd153a59310148483accce910ccf874e95fb20ccf665af48,2025-05-23T12:37:15.720000
|
||||
CVE-2025-4463,0,0,9e877456add3b215f52a45038f40c9086cab0011383eb94f398b692bd4cf9448,2025-05-16T15:36:03.983000
|
||||
CVE-2025-4464,0,0,43a4f1f30e275a5908987f511806e5bef7544ddf882b5a452ef3e2c803ed00cc,2025-05-16T15:35:56.983000
|
||||
@ -295579,7 +295591,7 @@ CVE-2025-4490,0,0,241f08f705ae3e66d0cf435e9f641db9abaac260a233ab4f24995312c1bd33
|
||||
CVE-2025-44900,0,0,715b90a244faa6f40eccc3c1fc10f72c265ad47c8a18532c8f483a83d8dfdf3b,2025-06-04T17:25:54.930000
|
||||
CVE-2025-44904,0,0,698017dffc9baafe7f90678fc77c6bf37e6dde2be1b0112d7bbe4b0cba948021,2025-06-03T15:35:50.377000
|
||||
CVE-2025-44905,0,0,55f5d849eeb5a9403dc8d40445e406a7d903c79ed83689e9e12fa9fbbf4ce28a,2025-06-03T15:35:40.283000
|
||||
CVE-2025-44906,0,0,282d55acfc77538b313708459953bbd20cbde03a419a436e303d61c1ed0e76dd,2025-05-30T22:15:23.487000
|
||||
CVE-2025-44906,0,1,8c35bb41ab99832e2381732b703a4e95fba657841fb0a7405fdc1c5ff67eb038,2025-06-19T00:57:57.120000
|
||||
CVE-2025-4491,0,0,ba256d8517f70212e591537769bd709f798dda4e9421bc8dc0e19810c50211c2,2025-05-13T18:57:25.977000
|
||||
CVE-2025-4492,0,0,4eec4ffb9ff09b31eb69062234f9086984737bbfc848cc0a9df2b8747073742a,2025-05-13T18:57:16.670000
|
||||
CVE-2025-4493,0,0,68c76c6c662ffa6d0b165fd473ec10bcb58eca28ca884631899ab57537d7fbf7,2025-05-28T15:01:30.720000
|
||||
@ -295668,7 +295680,7 @@ CVE-2025-45468,0,0,1f9ca402c698f9398e2cfc09460d45546d3a5c4644d69b2590973d05b1fe6
|
||||
CVE-2025-4547,0,0,5a9f97c59a5517a42eb37b2bfaeb218892d8ce2e6447168e1978702b9836490b,2025-05-16T17:19:47.520000
|
||||
CVE-2025-45471,0,0,175cebfb698d65801503c809b3aa892182068d5ca8c7cb75b47dca0205a19e21,2025-05-23T15:55:02.040000
|
||||
CVE-2025-45472,0,0,2637a833bc8f30b44e037d16794888343f063d186f0716a0b1631b9011f38122,2025-05-23T16:15:25.777000
|
||||
CVE-2025-45474,0,0,15c71faa487e912137cb6dd8291dff7f6e8ac2a114c512a23cbcfed4253fa37e,2025-05-30T16:31:03.107000
|
||||
CVE-2025-45474,0,1,5a86947a5dcb30409703950db611fb972ad2af49b62606364ea6d0524ca2d928,2025-06-19T00:45:23.457000
|
||||
CVE-2025-45475,0,0,c651c3ca7b70bd6e8fa8fbb78ede99da7981aaa6c45716e37e6135c5fa59a413,2025-05-29T19:15:27.790000
|
||||
CVE-2025-4548,0,0,a8fe2cea464a0b35dbac9350217055ae490f25b77738ddb03311a9902dfffcb3,2025-05-13T18:55:54.360000
|
||||
CVE-2025-45487,0,0,ffb60bfe346afcb15249da2528ccd12c910ff9915205c63e38aaf38509c65e39,2025-05-13T20:19:05.490000
|
||||
@ -295764,9 +295776,9 @@ CVE-2025-45864,0,0,b32f79c80f948a5502c692222ba63db7db0d85fc0944e6f9a68e63f94b3a1
|
||||
CVE-2025-45865,0,0,367062564ab2fabd14817d58b3e7095878e7c26afaa0eb1dd77e8dfb0a65054e,2025-05-15T18:37:31.917000
|
||||
CVE-2025-45866,0,0,48c16ba2c1a450558a2d650800240d515297efe6c8338a7502e000a11c7cf020,2025-06-17T19:39:56.640000
|
||||
CVE-2025-45867,0,0,a78de81cad59bbc316e2ff4eacf13da0ca81d5efbf89eb838fbfcc576cba1eb1,2025-06-17T19:39:47.240000
|
||||
CVE-2025-45878,0,0,62b94a39a151ab6e7c549c2c16947ad4227e454bb47e8f58a3b24b8380fc5307,2025-06-17T20:50:23.507000
|
||||
CVE-2025-45879,0,0,b379e9eb0b5b34ad9aef750a6bedc6898f7516a414ea0451183ba6c225d00aaa,2025-06-17T20:50:23.507000
|
||||
CVE-2025-45880,0,0,44f30fcb46473facac91e9a76b1d275d248138cc58976639930bfa745e54aa8d,2025-06-17T20:50:23.507000
|
||||
CVE-2025-45878,0,1,6b615553fc01027582e83444469fbebd12926b528a6fd0f4487cffdba07fc964,2025-06-19T01:16:08.927000
|
||||
CVE-2025-45879,0,1,a523ea1be4f66a907ee86b9ebd07662f0a00641a69e4600b6fb7654b16a506de,2025-06-19T01:17:35.180000
|
||||
CVE-2025-45880,0,1,c47ab1f65c4156b5c6429c22b5f9bfbbc63b3cc275dd1d042554312bbfc017be,2025-06-19T01:14:25.967000
|
||||
CVE-2025-45885,0,0,79234899966b4c8a321aa6153cf77a765f29e557be9d26ad86dc78b3a7557cf5,2025-05-28T13:40:22.817000
|
||||
CVE-2025-45887,0,0,fb1a15240343f864311f44360980a2f79927e76ee0105844e8c76acb00550c58,2025-06-12T16:39:34.730000
|
||||
CVE-2025-4589,0,0,bb26d22fcf596d77e370296c8ae93489013c99f636d3a8cff9546409ae0197a5,2025-05-16T14:43:26.160000
|
||||
@ -296861,7 +296873,7 @@ CVE-2025-47735,0,0,2f52e7c2d058d86629cac68f734c0774cf880fe4e8f98eedcaeede1d23aa6
|
||||
CVE-2025-47736,0,0,2f11e9b0a9d748da2f6ce9c62d30862cdd6596c7ac96ac5f1028db67479c00c6,2025-05-12T17:32:52.810000
|
||||
CVE-2025-47737,0,0,60cb12bc89ce6f2a8fe9e7af3463c6e9c2bcca5ef96322a90d7cccb126b389d1,2025-05-12T17:32:52.810000
|
||||
CVE-2025-4774,0,0,030f0c165972a90f2efc4aaa5ddbfe19e3d1b1c3af0f3137283b01a5858b493d,2025-06-12T16:06:39.330000
|
||||
CVE-2025-47748,0,0,b90bacb2c6f839ee321be88774b4833cef222cda69ff8602ec8ddb9f1d835f3e,2025-05-30T17:15:29.117000
|
||||
CVE-2025-47748,0,1,e91bacbbf68ff936e9ffc4e2dc9102ab0bec0b3e3b7394e08f7d2f364041349e,2025-06-19T00:02:12.070000
|
||||
CVE-2025-47749,0,0,77136f5a200eae36103a9c78079b2abf4fa9dbee2a99746a355de3498002722c,2025-05-19T17:30:06.440000
|
||||
CVE-2025-4775,0,0,0fad29bd3e9858145fb455ae58be296c8d3a170752ce945a7dd422f11e7d0b15,2025-06-17T20:50:23.507000
|
||||
CVE-2025-47750,0,0,1a4ff5a2f7fb0cd15d257d686f97e3b073753ad3ba8037a1d7327a6c86b11820,2025-05-19T17:31:27.667000
|
||||
@ -297305,9 +297317,9 @@ CVE-2025-48743,0,0,c91acb6150f07a43c974b698b48df19455694c9a8c5f37e0bbd5aa9b807fb
|
||||
CVE-2025-48744,0,0,a039740c56d4e93180f7ac5a496864b9f89957753f0bd173790011a4f09f8955,2025-06-09T18:50:58.620000
|
||||
CVE-2025-48745,0,0,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000
|
||||
CVE-2025-48746,0,0,f72c5a8d16806b0ba968ccabf6f8a5266bce1d331d3179a6d466243179f0e088,2025-05-30T17:15:29.937000
|
||||
CVE-2025-48747,0,0,15faa5990b14fe28d9e9adffb09c889e29a458d2860986cf684ebec4ab0b970b,2025-05-29T14:29:50.247000
|
||||
CVE-2025-48747,0,1,77f2b3f312e05dae0fd49a4fbf0de33587f3dcda8e8123589893c43a0bb874a3,2025-06-19T00:01:01.873000
|
||||
CVE-2025-48748,0,0,b7307577dff3e5ce645bd5ba057a9ae096f6a95ae5b6b2f453f6bbe07920f1f1,2025-05-30T16:31:03.107000
|
||||
CVE-2025-48749,0,0,00f7b9bcd1525e342ee0659152f079b4a6dcc45883d33ce6a8b1423f085fa8c2,2025-05-29T14:29:50.247000
|
||||
CVE-2025-48749,0,1,1782601449fdbad7e128b503fdc88bf73801639c356e6033cd52a3b78e0cb26f,2025-06-18T23:59:44.600000
|
||||
CVE-2025-4875,0,0,130bc5da676a7028541a0b0fca1ba41a63baeb979bb88a491f60fd8b45c2548f,2025-05-21T19:39:23.917000
|
||||
CVE-2025-48751,0,0,7b48afa401b2b93b58deb3a57cdb6356d07d3afa8b095b572a5b480362f21209,2025-05-28T14:58:52.920000
|
||||
CVE-2025-48752,0,0,417f08c4a3fc844a1f6adee231658d0c60eb0b6a83e7d60fcf34a66c6755f30e,2025-05-28T14:58:52.920000
|
||||
@ -297370,7 +297382,7 @@ CVE-2025-48881,0,0,478c71cbb268c7668af9adbe8d9db873a15a6f0100cbc1765ad6b2fc8ccbe
|
||||
CVE-2025-48882,0,0,0675a44f5475635d3b90df25f21b843f71a594f25b60ebf1257710a520ba2459,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48883,0,0,14507842d3e0b613f4c9b8d62ad8df05d93e1c97510cf43e163a8411a419850f,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48885,0,0,a22cad12e847f8e3d6cac2d0c207ccbc3235380976544a38095804a3e40d9d2f,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48887,0,0,1d5cacac7d4463b079037d15dea05f85b4e0e8b7d35792f7788c0510a474c648,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48887,0,1,d715c137954000dfa4d0fdb3ecdb8e16b928f4dac02dc271a6a5d4052e6a12f9,2025-06-19T00:55:27.710000
|
||||
CVE-2025-48888,0,0,e337e94b85d7a08366e0c5a3cc16b222a86bb1703b8b9d4a80140797b44ccf65,2025-06-05T20:12:23.777000
|
||||
CVE-2025-48889,0,0,10193c433a4bb6349663dd15365e40e7749e3028945374c079cc00a7a9212044,2025-05-30T16:31:03.107000
|
||||
CVE-2025-4889,0,0,01c7a8037082d88b5ac656519933c8c5460517579f14e0273e6b2875f7942bab,2025-05-28T15:30:05.053000
|
||||
@ -297731,8 +297743,8 @@ CVE-2025-49585,0,0,5bf4c40d67475101b94bdc46e2d5692603da18c9e7df40708e6ea162e9f61
|
||||
CVE-2025-49586,0,0,2c3a3ffb465e48b26eb6217846164f4f9a6ce07e373f9efa6cf1228016e4468b,2025-06-16T12:32:18.840000
|
||||
CVE-2025-49587,0,0,de5086ac381fd168ddf890ff4b6777f5711fd665730c37d4ee199139f966ae7d,2025-06-16T12:32:18.840000
|
||||
CVE-2025-49589,0,0,4de9f02dd34b97b034101bec18a9814c3229a0f8edc0cf289468099913dab0e8,2025-06-16T12:32:18.840000
|
||||
CVE-2025-49590,1,1,d02c6f68b2408b9164502691436e2ff7dad8a8a8a34be335d4ee052b1ca56b13,2025-06-18T23:15:19.200000
|
||||
CVE-2025-49591,1,1,28f6d3018b9734805a1499f3feb0c242fc3749eb3d800735b2df7e9e13d4e56e,2025-06-18T23:15:19.403000
|
||||
CVE-2025-49590,0,0,d02c6f68b2408b9164502691436e2ff7dad8a8a8a34be335d4ee052b1ca56b13,2025-06-18T23:15:19.200000
|
||||
CVE-2025-49591,0,0,28f6d3018b9734805a1499f3feb0c242fc3749eb3d800735b2df7e9e13d4e56e,2025-06-18T23:15:19.403000
|
||||
CVE-2025-49593,0,0,6d7381d4ff0f4b81807be7ac3e78832aa1c2958239dda39de56e3e5b443b96da,2025-06-18T13:46:52.973000
|
||||
CVE-2025-49596,0,0,914f35572c3497727ef5bfdff2cd9e17d27812703e06d7a6c3496156238c7e41,2025-06-16T12:32:18.840000
|
||||
CVE-2025-49597,0,0,31430be1a672877ef5712ae64cc63468a339d903aeb2a4d86bb312578783d5a4,2025-06-16T12:32:18.840000
|
||||
@ -297845,6 +297857,7 @@ CVE-2025-50149,0,0,e01be1ba294ecdeaf476ba9bb17e64b1284ce9362fb5da1703e5c224f2a89
|
||||
CVE-2025-50150,0,0,79eb21a64f645c369296b1d0b905e35268f567b5a96dfbfc58ef963e4e69507b,2025-06-14T03:15:22.220000
|
||||
CVE-2025-5016,0,0,d907c2ff3d5c65fe44aee01e8b0e3594629d2dcb543e14c1a3c5bbcba44c8083,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5018,0,0,e6074d13c744f0bbc4fedce0adf645747389e40f5acdd13f0492e74df313cc90,2025-06-06T14:07:28.330000
|
||||
CVE-2025-50181,1,1,c3850146c5a0b14f2cce48561569b8a28f7456fb311da59cb44a38aa4cc7c715,2025-06-19T01:15:24.453000
|
||||
CVE-2025-5019,0,0,9e77689bce77b4f77cc10eef8ecd39dc784fee948cba6d9ab205fa6a8f33f986,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5020,0,0,a009d51287904279a69fbc7b7d45e7044fc45e21284eb97bd084f038009245ee,2025-06-13T18:55:32.903000
|
||||
CVE-2025-50202,0,0,c82284387579a4d5287081c79bce5f56bb74234016b730f3d53b62b5739eec46,2025-06-18T13:46:52.973000
|
||||
@ -297918,7 +297931,7 @@ CVE-2025-5132,0,0,92567ff3cb96caac4b2a7f5afbc84b272b06854c208c48821c8e814d8a244d
|
||||
CVE-2025-5133,0,0,71ff685cb41d220918422266a9a9027a78bee24552031db902c458276c3d0621,2025-06-03T15:48:15.610000
|
||||
CVE-2025-5134,0,0,d420ea46d85516af4902b09065e0670f0f7a966eecf320488abdd86a620ad3ac,2025-06-03T15:48:28.580000
|
||||
CVE-2025-5135,0,0,ff5e4b4f352f002c704ddb4fec56d312bfa70e7ac4d7428009d05887b065c456,2025-06-03T15:48:40.953000
|
||||
CVE-2025-5136,0,0,bd0c27de50ee06fcb71ffb69b26d594d7fa702a9a559c430c5d629f3be8d9822,2025-05-28T18:15:29.530000
|
||||
CVE-2025-5136,0,1,6b76178b393ce786e02c90a2baf18e1605a6560667c6c5172f14e227aef611af,2025-06-19T00:43:40.970000
|
||||
CVE-2025-5137,0,0,a461b4cd382da5c206010b8729faf9840aa41b3d9e8c8cf8ba7880897f06f378,2025-06-10T19:33:16.710000
|
||||
CVE-2025-5138,0,0,3bae41860cd01f5b3b29a66081652cec538a389d28958af017b419d06b38908c,2025-05-28T14:58:52.920000
|
||||
CVE-2025-51381,0,0,90017ba2f2fd86cff636ae17c3c22e5ea0f00724f257397ca0c300a57129132c,2025-06-18T13:46:52.973000
|
||||
@ -297973,7 +297986,7 @@ CVE-2025-5190,0,0,b83fcbe64867ed5f66064afe0985f0f8e1099ccb823b90fa56196e26e3f4bf
|
||||
CVE-2025-5192,0,0,60cab63e53de16bf0d2b760f814c5b69c2d153aa1edfa79d1c5ac599f5bf94f5,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5195,0,0,67ed4f2b8401a12100a4ab10d4477eb555cb25ae77229fa0c172cda09b715498,2025-06-12T16:06:20.180000
|
||||
CVE-2025-5196,0,0,e0938db7c97745bb3f3070e04c267d2314060f49f00cd38492cd5b468ae94740,2025-05-28T18:15:33.670000
|
||||
CVE-2025-5198,0,0,81bd13d2a866ca7de4c3f2f26760c3d14afdd9d115b50ea3fd55967b3466e3f8,2025-05-28T15:01:30.720000
|
||||
CVE-2025-5198,0,1,c8124bf615d24cf9474c96b9bd6d16252727b696641a4975ae527719f7fa40f3,2025-06-19T00:08:12.993000
|
||||
CVE-2025-5200,0,0,740d1c6af0ac032e5f77add784768d5ba871f8a7dc1be1d8555505f3ed6440d1,2025-06-05T14:17:19.607000
|
||||
CVE-2025-5201,0,0,b4028548330d8a4402ec1f2305222f13a42431f4d6fce12a8c6845a20f9892aa,2025-06-05T14:16:26.557000
|
||||
CVE-2025-5202,0,0,a5576375be538fa454feccc29b5d9756f262d32c77920b2b2fcc080fafd9eb39,2025-06-05T14:16:16.410000
|
||||
@ -298551,9 +298564,9 @@ CVE-2025-6002,0,0,c3342aafede1398b2d7e7cc8f4c9f889ab7afc3c4ac6360898dd2f7299f1fe
|
||||
CVE-2025-6003,0,0,13a477a4b87366b3fef1966498d6d8c821ce2e26bf2366c0e56fb46b20ebdcb5,2025-06-12T16:06:20.180000
|
||||
CVE-2025-6005,0,0,2cf44564776f402947a17c91be3717b20ba7071fdb538dc73eff857dfd935e96,2025-06-12T16:06:20.180000
|
||||
CVE-2025-6006,0,0,f3890d678b52a65bb188746bd2b72b04830e80f4fcc6e370b4f5f482a5c89435,2025-06-12T16:06:20.180000
|
||||
CVE-2025-6007,0,0,0a6b30e00b610d68c64f9ae664f6748f210976b9ca69a527a02472b830ffa838,2025-06-12T16:06:20.180000
|
||||
CVE-2025-6008,0,0,bdfd3cc3e4441917f3e7587cffe8368d1b175ba60e9dbe2f7dbae2a1b2f94481,2025-06-12T16:06:20.180000
|
||||
CVE-2025-6009,0,0,45d2cd3c349eec086d7dbf8e5d3677c0ad4a90d0009e476cec317ccc54ba0f3a,2025-06-12T16:06:20.180000
|
||||
CVE-2025-6007,0,1,ad7217a46edf88f3122f03c09e2fdcfd31382468cbe1002c4a5de402899399f2,2025-06-19T01:26:45.850000
|
||||
CVE-2025-6008,0,1,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde0826f,2025-06-19T01:26:01.867000
|
||||
CVE-2025-6009,0,1,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000
|
||||
CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6020,0,0,439a2d09f05868a64a6818f204c8af8c3741a1aa91da69dac7da1c6864b5ef72,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000
|
||||
@ -298638,7 +298651,7 @@ CVE-2025-6147,0,0,570ac2a48926a6ca3fbbf19843b6ed5165fc288ba0666045a4c3539c09fd13
|
||||
CVE-2025-6148,0,0,ea54d2ee97b05bc473f95b428c1e5203650c95ed69365a87af6ed86096e7cac1,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6149,0,0,7c17b71b2470ad9456e79bc76a0e10dbfa869b397a8c16a012013222daafab86,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6150,0,0,7824049227e4d181411b19e48dd725520b624c26d17cf96197a1635eeeb0b9a5,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6151,0,0,aa4fa0a465e1acec8ecc150b0738a8690a097c49434164f17226e1edc7c55015,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6151,0,1,66f985d955d28732cb3e20742ce5c2b75d056fdf6e0c0fd5329b3e2551fd465e,2025-06-19T01:20:04.247000
|
||||
CVE-2025-6152,0,0,ff4ccaf39bf818abdc375e234ccbed4be33d2e886689e2e8335c122e3871c2eb,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6153,0,0,2fc60dca756ddc4e172d6897384ac8518a5ff1f5174120a3dcec13ba5207b272,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6154,0,0,f1415c5a2eb0eacb2f774f7a7fb86d492db28bb7f75636c28658e54eafbc0f4f,2025-06-17T20:50:23.507000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user