Auto-Update: 2025-06-19T02:00:19.760458+00:00

This commit is contained in:
cad-safe-bot 2025-06-19 02:03:57 +00:00
parent fb18b09534
commit 891f5d561f
45 changed files with 2003 additions and 187 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43840",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-04-14T21:15:16.200",
"lastModified": "2025-04-15T21:15:46.440",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T00:37:04.670",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:aspera_console:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.4.0",
"versionEndIncluding": "3.4.4",
"matchCriteriaId": "682EB2AD-DD53-43FC-8A8E-7A3BDE927467"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7169766",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43052",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-03-07T17:15:18.060",
"lastModified": "2025-03-07T17:15:18.060",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T00:11:36.133",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -81,10 +81,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:control_center:6.2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "86853A4E-905D-46A9-BF43-6D6117AA2442"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:control_center:6.3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5C510A28-7CFF-414B-A740-13A71CB97271"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7185102",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44755",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-22T18:15:58.483",
"lastModified": "2025-04-23T14:15:27.320",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T00:21:38.390",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:sacco_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FDC948D1-2B9F-4317-8ED4-73F1BF7C4537"
}
]
}
]
}
],
"references": [
{
"url": "https://flashy-lemonade-192.notion.site/SQL-injection-in-Sacco-Management-system-via-password-and-id-parameter-1d85fc432de24db896446002f91acfd1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://flashy-lemonade-192.notion.site/SQL-injection-in-Sacco-Management-system-via-password-and-id-parameter-1d85fc432de24db896446002f91acfd1?pvs=4",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22653",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-29T15:15:29.470",
"lastModified": "2025-05-30T16:31:03.107",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-18T23:57:03.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yasm_project:yasm:2023-09-22:*:*:*:*:*:*:*",
"matchCriteriaId": "CED0EE19-843C-4F9E-AB11-C2912EC1BD3D"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/TimChan2001/03e5792b15d0a34bfaad970e37c17660",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/yasm/yasm/issues/247",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-45208",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.097",
"lastModified": "2025-06-19T00:15:21.097",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform which makes use of Cisco NCS application service. Active and Standby Directors communicate over TCP ports 4566 and 4570 to exchange High Availability (HA) information using a shared password. Affected versions of Versa Director bound to these ports on all interfaces. An attacker that can access the Versa Director could access the NCS service on port 4566 and exploit it to perform unauthorized administrative actions and perform remote code execution. Customers are recommended to follow the hardening guide.\r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://docs.versa-networks.com/Solutions/System_Hardening/Perform_Manual_Hardening_for_Versa_Director#Harden_Port_4566",
"source": "support@hackerone.com"
},
{
"url": "https://security-portal.versa-networks.com/emailbulletins/68526c3cdc94d6b9f2faf718",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026724-versa-director-ha-port-exploit-discovery-remediation",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-23121",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.260",
"lastModified": "2025-06-19T00:15:21.260",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user"
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4743",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-23168",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.377",
"lastModified": "2025-06-19T00:15:21.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform implements Two-Factor Authentication (2FA) using One-Time Passcodes (OTP) delivered via email or SMS. Versa Director accepts untrusted user input when dispatching 2FA codes, allowing an attacker who knows a valid username and password to redirect the OTP delivery (SMS/email) to their own device. OTP/TOTP codes are not invalidated after use, enabling reuse by an attacker who has previously intercepted or obtained a valid code. In addition, the 2FA system does not adequately restrict the number or frequency of login attempts. The OTP values are generated from a relatively small keyspace, making brute-force attacks more feasible. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nVersa recommends that Director be upgraded to one of the remediated software versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://security-portal.versa-networks.com/emailbulletins/68526512dc94d6b9f2faf715",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-23169",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.497",
"lastModified": "2025-06-19T00:15:21.497",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform allows customization of the user interface, including the header, footer, and logo. However, the input provided for these customizations is not properly validated or sanitized, allowing a malicious user to inject and store cross-site scripting (XSS) payloads. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://security-portal.versa-networks.com/emailbulletins/68526a08dc94d6b9f2faf716",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-23170",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.620",
"lastModified": "2025-06-19T00:15:21.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform includes functionality to initiate SSH sessions to remote CPEs and the Director shell via Shell-In-A-Box. The underlying Python script, shell-connect.py, is vulnerable to command injection through the user argument. This allows an attacker to execute arbitrary commands on the system. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security-portal.versa-networks.com/emailbulletins/68526bc7dc94d6b9f2faf717",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-23171",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.743",
"lastModified": "2025-06-19T00:15:21.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform provides an option to upload various types of files. The Versa Director does not correctly limit file upload permissions. The UI appears not to allow file uploads but uploads still succeed. In addition, the Versa Director discloses the full filename of uploaded temporary files, including the UUID prefix. Insecure UCPE image upload in Versa Director allows an authenticated attacker to upload a webshell. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security-portal.versa-networks.com/emailbulletins/68526dbbdc94d6b9f2faf71a",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-23172",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.857",
"lastModified": "2025-06-19T00:15:21.857",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform includes a Webhook feature for sending notifications to external HTTP endpoints. However, the \"Add Webhook\" and \"Test Webhook\" functionalities can be abused by an authenticated user to send crafted HTTP requests to localhost. This can be leveraged to execute commands on behalf of the versa user, who has sudo privileges, potentially leading to privilege escalation or remote code execution. \r\n \r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security-portal.versa-networks.com/emailbulletins/68526e7bdc94d6b9f2faf71b",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-23173",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.977",
"lastModified": "2025-06-19T00:15:21.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform provides direct web-based access to uCPE virtual machines through the Director GUI. By default, the websockify service is exposed on port 6080 and accessible from the internet. This exposure introduces significant risk, as websockify has known weaknesses that can be exploited, potentially leading to remote code execution. \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nRestrict access to TCP port 6080 if uCPE console access is not necessary. Versa recommends that Director be upgraded to one of the remediated software versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security-portal.versa-networks.com/emailbulletins/68526ee0dc94d6b9f2faf71c",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-24286",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:22.093",
"lastModified": "2025-06-19T00:15:22.093",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability allowing an authenticated user with the Backup Operator role to modify backup jobs, which could execute arbitrary code."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4743",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-24287",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:22.207",
"lastModified": "2025-06-19T00:15:22.207",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability allowing local system users to modify directory contents, allowing for arbitrary code execution on the local system with elevated permissions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4743",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2025-24288",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:22.323",
"lastModified": "2025-06-19T00:15:22.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Versa Director software exposes a number of services by default and allow attackers an easy foothold due to default credentials and multiple accounts (most with sudo access) that utilize the same default credentials. By default, Versa director exposes ssh and postgres to the internet, alongside a host of other services.\r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nVersa recommends the following security controls:\r\n\r\n1) Change default passwords to complex passwords\r\n2) Passwords must be complex with at least 8 characters that comprise of upper case, and lower case alphabets, as well as at at least one digit, and one special character\r\n3) Passwords must be changed at least every 90 days\r\n4) Password change history is checked to ensure that the at least the last 5 passwords must be used when changing password.\r\n5) Review and audit logs for all authentication attempts to check for unauthorized/suspicious login attempts and enforce remediation steps."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security-portal.versa-networks.com/emailbulletins/68526d12dc94d6b9f2faf719",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-24291",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:22.437",
"lastModified": "2025-06-19T00:15:22.437",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform provides functionality to upload various types of files. However, the Java code handling file uploads contains an argument injection vulnerability. By appending additional arguments to the file name, an attacker can bypass MIME type validation, allowing the upload of arbitrary file types. This flaw can be exploited to place a malicious file on disk. \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://security-portal.versa-networks.com/emailbulletins/68526fc6dc94d6b9f2faf71d",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
"source": "support@hackerone.com"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4",
"source": "support@hackerone.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25580",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-18T15:16:00.123",
"lastModified": "2025-03-19T19:15:44.917",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T00:18:57.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:r1bbit:yimioa:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.07.04",
"matchCriteriaId": "12EE45D4-0E6C-44B0-8E4F-1B821044BB12"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/r1bbit/yimioa/issues/IBI6XT",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25585",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-18T15:16:00.253",
"lastModified": "2025-03-19T19:15:45.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T00:16:52.923",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:r1bbit:yimioa:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.07.04",
"matchCriteriaId": "12EE45D4-0E6C-44B0-8E4F-1B821044BB12"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/r1bbit/yimioa/issues/IBI7PG",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25590",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-18T15:16:00.373",
"lastModified": "2025-03-19T19:15:45.640",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T00:17:23.083",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:r1bbit:yimioa:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.07.04",
"matchCriteriaId": "12EE45D4-0E6C-44B0-8E4F-1B821044BB12"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/r1bbit/yimioa/issues/IBI7XH",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27913",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T20:15:14.500",
"lastModified": "2025-03-11T03:15:40.027",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T00:14:38.870",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -95,10 +95,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:passbolt:passbolt_api:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.0.0",
"matchCriteriaId": "B392CCF7-6685-4C9F-AD83-9D98B1D1625C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.passbolt.com/incidents/host-header-injection",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory",
"Mitigation"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29058",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-18T21:15:43.843",
"lastModified": "2025-04-21T14:23:45.950",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-19T00:24:18.037",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qimou_cms_project:qimou_cms:3.34.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B50095A0-C8D6-4504-8E83-ABB06128C792"
}
]
}
]
}
],
"references": [
{
"url": "https://cdn.wjlin0.com/halo-img/74CMSv3.34.0%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.zip",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29339",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-22T17:16:46.827",
"lastModified": "2025-04-23T14:15:28.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-19T00:23:24.013",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.7.2",
"matchCriteriaId": "E8160C0A-E77F-487D-B5E0-C6657E80D327"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/open5gs/open5gs/issues/3727",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-32790",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-18T13:15:58.177",
"lastModified": "2025-04-21T14:23:45.950",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-19T00:36:04.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,24 +69,69 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:langgenius:dify:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "0.6.13",
"matchCriteriaId": "DBA28F0B-2A55-4349-8728-2F6793E4295E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/langgenius/dify/commit/59ad091e69736bc9dc1a3bace62ec0a232346246",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/langgenius/dify/pull/5841",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/langgenius/dify/security/advisories/GHSA-jp6m-v4gw-5vgp",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory",
"Mitigation"
]
},
{
"url": "https://github.com/langgenius/dify/security/advisories/GHSA-jp6m-v4gw-5vgp",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Vendor Advisory",
"Mitigation"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-32795",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-18T16:15:23.627",
"lastModified": "2025-04-21T14:23:45.950",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-19T00:25:59.333",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,20 +49,62 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:langgenius:dify:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "0.6.12",
"matchCriteriaId": "63A68C09-32F4-4AEE-B016-EFBAD72543EC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/langgenius/dify/pull/5266",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/langgenius/dify/security/advisories/GHSA-gg5w-m2vw-vmmj",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory",
"Mitigation"
]
},
{
"url": "https://github.com/langgenius/dify/security/advisories/GHSA-gg5w-m2vw-vmmj",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Vendor Advisory",
"Mitigation"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-44612",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-30T03:15:20.110",
"lastModified": "2025-05-30T22:15:22.617",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-19T01:08:28.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tinxy:wifi_lock_controller_firmware:1:*:*:*:*:*:*:*",
"matchCriteriaId": "D5412F14-F539-403A-B269-AFCB5CC6A956"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tinxy:wifi_lock_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3D05B11-9932-4DD5-86C6-B66BA7D3949D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ShravanSinghRathore/Tinxy/wiki/1.-WiFi-Lock-Controller-v1-RF-%281%E2%80%909%29",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-44614",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-30T03:15:20.573",
"lastModified": "2025-05-30T22:15:22.790",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-19T01:06:45.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tinxy:wifi_lock_controller_firmware:1:*:*:*:*:*:*:*",
"matchCriteriaId": "D5412F14-F539-403A-B269-AFCB5CC6A956"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tinxy:wifi_lock_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3D05B11-9932-4DD5-86C6-B66BA7D3949D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ShravanSinghRathore/Tinxy/wiki/1.-WiFi-Lock-Controller-v1-RF-%281%E2%80%909%29",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-44619",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-30T03:15:20.737",
"lastModified": "2025-05-30T22:15:22.967",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-19T01:04:28.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tinxy:wifi_lock_controller_firmware:1:*:*:*:*:*:*:*",
"matchCriteriaId": "D5412F14-F539-403A-B269-AFCB5CC6A956"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tinxy:wifi_lock_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3D05B11-9932-4DD5-86C6-B66BA7D3949D"
}
]
}
]
}
],
"references": [
{
"url": "http://tinxy.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://wifi.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-44906",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-30T04:15:46.583",
"lastModified": "2025-05-30T22:15:23.487",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-19T00:57:57.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jhead_project:jhead:3.08:*:*:*:*:*:*:*",
"matchCriteriaId": "E20ACC36-4896-4F01-B566-E37FC500A87C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/madao123123/crash_report/blob/main/jhead/jhead.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/madao123123/crash_report/blob/main/jhead/jhead.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-45474",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-29T16:15:40.143",
"lastModified": "2025-05-30T16:31:03.107",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-19T00:45:23.457",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2025.1000.4047:*:*:*:*:*:*",
"matchCriteriaId": "C5D75D35-F395-490F-8D42-D409A16FED9A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.yuque.com/morysummer/vx41bz/ptnnp4eema601rvz",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-45878",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-17T17:15:33.487",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T01:16:08.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the report manager function of Miliaris Amigdala v2.2.6 allows attackers to execute arbitrary HTML in the context of a user's browser via a crafted payload."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la funci\u00f3n de administrador de informes de Miliaris Amigdala v2.2.6 permite a los atacantes ejecutar HTML arbitrario en el contexto del navegador de un usuario a trav\u00e9s de un payload manipulado."
}
],
"metrics": {
@ -47,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:miliaris:amygdala:2.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ED0824F0-D832-4AE3-9CE0-4B3B344E9C6B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.miliaris.it/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://xaliom.blogspot.com/2025/06/cve-2025-45878cve-2025-45879-and-cve.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-45879",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-17T16:15:32.730",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T01:17:35.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the e-mail manager function of Miliaris Amigdala v2.2.6 allows attackers to execute arbitrary HTML in the context of a user's browser via a crafted payload."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la funci\u00f3n de administrador de correo electr\u00f3nico de Miliaris Amigdala v2.2.6 permite a los atacantes ejecutar HTML arbitrario en el contexto del navegador de un usuario a trav\u00e9s de un payload manipulado."
}
],
"metrics": {
@ -47,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:miliaris:amygdala:2.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ED0824F0-D832-4AE3-9CE0-4B3B344E9C6B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.miliaris.it/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://xaliom.blogspot.com/2025/06/cve-2025-45878cve-2025-45879-and-cve.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-45880",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-17T17:15:33.603",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T01:14:25.967",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the data resource management function of Miliaris Amigdala v2.2.6 allows attackers to execute arbitrary HTML in the context of a user's browser via a crafted payload."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la funci\u00f3n de gesti\u00f3n de recursos de datos de Miliaris Amigdala v2.2.6 permite a los atacantes ejecutar HTML arbitrario en el contexto del navegador de un usuario a trav\u00e9s de un payload manipulado."
}
],
"metrics": {
@ -47,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:miliaris:amygdala:2.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ED0824F0-D832-4AE3-9CE0-4B3B344E9C6B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.miliaris.it/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://xaliom.blogspot.com/2025/06/cve-2025-45878cve-2025-45879-and-cve.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-47748",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-28T18:15:27.307",
"lastModified": "2025-05-30T17:15:29.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-19T00:02:12.070",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netwrix:directory_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0.0",
"versionEndExcluding": "11.1.25134.03",
"matchCriteriaId": "C8C200D2-C9DC-47E4-9DA9-C61B7E27C651"
}
]
}
]
}
],
"references": [
{
"url": "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://netwrix.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-48747",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-28T18:15:27.553",
"lastModified": "2025-05-29T14:29:50.247",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-19T00:01:01.873",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netwrix:directory_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0.0",
"versionEndExcluding": "11.1.25134.03",
"matchCriteriaId": "C8C200D2-C9DC-47E4-9DA9-C61B7E27C651"
}
]
}
]
}
],
"references": [
{
"url": "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://netwrix.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-48749",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-28T18:15:27.723",
"lastModified": "2025-05-29T14:29:50.247",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-18T23:59:44.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netwrix:directory_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0.0",
"versionEndExcluding": "11.1.25134.03",
"matchCriteriaId": "C8C200D2-C9DC-47E4-9DA9-C61B7E27C651"
}
]
}
]
}
],
"references": [
{
"url": "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://netwrix.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-48887",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-05-30T18:15:32.500",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T00:55:27.710",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vllm:vllm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.6.4",
"versionEndExcluding": "0.9.0",
"matchCriteriaId": "18A93B72-AD3E-46D7-8948-E0765D4A7CB1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/vllm-project/vllm/commit/4fc1bf813ad80172c1db31264beaef7d93fe0601",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/vllm-project/vllm/pull/18454",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://github.com/vllm-project/vllm/security/advisories/GHSA-w6q7-j642-7c25",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/vllm-project/vllm/security/advisories/GHSA-w6q7-j642-7c25",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-50181",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-19T01:15:24.453",
"lastModified": "2025-06-19T01:15:24.453",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "urllib3 is a user-friendly HTTP client library for Python. Prior to 2.5.0, it is possible to disable redirects for all requests by instantiating a PoolManager and specifying retries in a way that disable redirects. By default, requests and botocore users are not affected. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects at the PoolManager level will remain vulnerable. This issue has been patched in version 2.5.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://github.com/urllib3/urllib3/commit/f05b1329126d5be6de501f9d1e3e36738bc08857",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-pq67-6m6q-mj2v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5136",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-25T00:15:23.043",
"lastModified": "2025-05-28T18:15:29.530",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-19T00:43:40.970",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -122,28 +122,78 @@
"value": "CWE-330"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:project_team:tmall_demo:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2025-05-05",
"matchCriteriaId": "7E13454D-93F2-4322-91A6-F4F365B6AA50"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/bdkuzma/vuln/issues/15",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Third Party Advisory",
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.310215",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.310215",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.571960",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/bdkuzma/vuln/issues/15",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Issue Tracking",
"Third Party Advisory",
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5198",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-05-27T21:15:22.863",
"lastModified": "2025-05-28T15:01:30.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T00:08:12.993",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,18 +71,61 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:kubernates:*:*",
"matchCriteriaId": "0FB56EBE-BCC0-4833-82B3-D5EFC50A7E65"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stackrox:stackrox:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52EBFA77-3FF6-43EB-8606-C02D32796957"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-5198",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368568",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368568",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6007",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-12T02:15:27.450",
"lastModified": "2025-06-12T16:06:20.180",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T01:26:45.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kicode111:like-girl:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2948AA51-987D-477A-9CE2-0A4C4AF7A13C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/adminnerr/cve/issues/8",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.312330",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312330",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.587569",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/adminnerr/cve/issues/8",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-12T02:15:27.647",
"lastModified": "2025-06-12T16:06:20.180",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T01:26:01.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kicode111:like-girl:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2948AA51-987D-477A-9CE2-0A4C4AF7A13C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/adminnerr/cve/issues/9",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.312331",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312331",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.588088",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/adminnerr/cve/issues/9",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-12T03:15:26.440",
"lastModified": "2025-06-12T16:06:20.180",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T01:25:17.743",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kicode111:like-girl:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2948AA51-987D-477A-9CE2-0A4C4AF7A13C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/adminnerr/cve/issues/11",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.312332",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312332",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.588092",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/adminnerr/cve/issues/11",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6151",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T01:15:23.313",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-19T01:20:04.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -122,32 +122,96 @@
"value": "CWE-120"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2492A6CA-DFF1-42DC-8800-4A66D8943C33"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:tl-wr940n:v4:*:*:*:*:*:*:*",
"matchCriteriaId": "2537DC7E-8024-45B5-924C-18C9B702DAFC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/WhereisDoujo/CVE/issues/7",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.312626",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312626",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.593031",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tp-link.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/WhereisDoujo/CVE/issues/7",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-18T23:55:19.662525+00:00
2025-06-19T02:00:19.760458+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-18T23:39:55.290000+00:00
2025-06-19T01:26:45.850000+00:00
```
### Last Data Feed Release
@ -27,35 +27,63 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-06-18T00:00:04.338437+00:00
2025-06-19T00:00:04.325476+00:00
```
### Total Number of included CVEs
```plain
298668
298681
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `13`
- [CVE-2025-49590](CVE-2025/CVE-2025-495xx/CVE-2025-49590.json) (`2025-06-18T23:15:19.200`)
- [CVE-2025-49591](CVE-2025/CVE-2025-495xx/CVE-2025-49591.json) (`2025-06-18T23:15:19.403`)
- [CVE-2024-45208](CVE-2024/CVE-2024-452xx/CVE-2024-45208.json) (`2025-06-19T00:15:21.097`)
- [CVE-2025-23121](CVE-2025/CVE-2025-231xx/CVE-2025-23121.json) (`2025-06-19T00:15:21.260`)
- [CVE-2025-23168](CVE-2025/CVE-2025-231xx/CVE-2025-23168.json) (`2025-06-19T00:15:21.377`)
- [CVE-2025-23169](CVE-2025/CVE-2025-231xx/CVE-2025-23169.json) (`2025-06-19T00:15:21.497`)
- [CVE-2025-23170](CVE-2025/CVE-2025-231xx/CVE-2025-23170.json) (`2025-06-19T00:15:21.620`)
- [CVE-2025-23171](CVE-2025/CVE-2025-231xx/CVE-2025-23171.json) (`2025-06-19T00:15:21.743`)
- [CVE-2025-23172](CVE-2025/CVE-2025-231xx/CVE-2025-23172.json) (`2025-06-19T00:15:21.857`)
- [CVE-2025-23173](CVE-2025/CVE-2025-231xx/CVE-2025-23173.json) (`2025-06-19T00:15:21.977`)
- [CVE-2025-24286](CVE-2025/CVE-2025-242xx/CVE-2025-24286.json) (`2025-06-19T00:15:22.093`)
- [CVE-2025-24287](CVE-2025/CVE-2025-242xx/CVE-2025-24287.json) (`2025-06-19T00:15:22.207`)
- [CVE-2025-24288](CVE-2025/CVE-2025-242xx/CVE-2025-24288.json) (`2025-06-19T00:15:22.323`)
- [CVE-2025-24291](CVE-2025/CVE-2025-242xx/CVE-2025-24291.json) (`2025-06-19T00:15:22.437`)
- [CVE-2025-50181](CVE-2025/CVE-2025-501xx/CVE-2025-50181.json) (`2025-06-19T01:15:24.453`)
### CVEs modified in the last Commit
Recently modified CVEs: `8`
Recently modified CVEs: `30`
- [CVE-2023-25718](CVE-2023/CVE-2023-257xx/CVE-2023-25718.json) (`2025-06-18T22:15:31.953`)
- [CVE-2023-25719](CVE-2023/CVE-2023-257xx/CVE-2023-25719.json) (`2025-06-18T22:15:32.900`)
- [CVE-2024-45673](CVE-2024/CVE-2024-456xx/CVE-2024-45673.json) (`2025-06-18T23:36:20.167`)
- [CVE-2024-53011](CVE-2024/CVE-2024-530xx/CVE-2024-53011.json) (`2025-06-18T23:27:51.907`)
- [CVE-2024-54961](CVE-2024/CVE-2024-549xx/CVE-2024-54961.json) (`2025-06-18T23:39:55.290`)
- [CVE-2025-1403](CVE-2025/CVE-2025-14xx/CVE-2025-1403.json) (`2025-06-18T23:34:56.550`)
- [CVE-2025-22973](CVE-2025/CVE-2025-229xx/CVE-2025-22973.json) (`2025-06-18T23:38:27.877`)
- [CVE-2025-3509](CVE-2025/CVE-2025-35xx/CVE-2025-3509.json) (`2025-06-18T22:15:33.197`)
- [CVE-2025-25585](CVE-2025/CVE-2025-255xx/CVE-2025-25585.json) (`2025-06-19T00:16:52.923`)
- [CVE-2025-25590](CVE-2025/CVE-2025-255xx/CVE-2025-25590.json) (`2025-06-19T00:17:23.083`)
- [CVE-2025-27913](CVE-2025/CVE-2025-279xx/CVE-2025-27913.json) (`2025-06-19T00:14:38.870`)
- [CVE-2025-29058](CVE-2025/CVE-2025-290xx/CVE-2025-29058.json) (`2025-06-19T00:24:18.037`)
- [CVE-2025-29339](CVE-2025/CVE-2025-293xx/CVE-2025-29339.json) (`2025-06-19T00:23:24.013`)
- [CVE-2025-32790](CVE-2025/CVE-2025-327xx/CVE-2025-32790.json) (`2025-06-19T00:36:04.717`)
- [CVE-2025-32795](CVE-2025/CVE-2025-327xx/CVE-2025-32795.json) (`2025-06-19T00:25:59.333`)
- [CVE-2025-44612](CVE-2025/CVE-2025-446xx/CVE-2025-44612.json) (`2025-06-19T01:08:28.777`)
- [CVE-2025-44614](CVE-2025/CVE-2025-446xx/CVE-2025-44614.json) (`2025-06-19T01:06:45.603`)
- [CVE-2025-44619](CVE-2025/CVE-2025-446xx/CVE-2025-44619.json) (`2025-06-19T01:04:28.143`)
- [CVE-2025-44906](CVE-2025/CVE-2025-449xx/CVE-2025-44906.json) (`2025-06-19T00:57:57.120`)
- [CVE-2025-45474](CVE-2025/CVE-2025-454xx/CVE-2025-45474.json) (`2025-06-19T00:45:23.457`)
- [CVE-2025-45878](CVE-2025/CVE-2025-458xx/CVE-2025-45878.json) (`2025-06-19T01:16:08.927`)
- [CVE-2025-45879](CVE-2025/CVE-2025-458xx/CVE-2025-45879.json) (`2025-06-19T01:17:35.180`)
- [CVE-2025-45880](CVE-2025/CVE-2025-458xx/CVE-2025-45880.json) (`2025-06-19T01:14:25.967`)
- [CVE-2025-47748](CVE-2025/CVE-2025-477xx/CVE-2025-47748.json) (`2025-06-19T00:02:12.070`)
- [CVE-2025-48747](CVE-2025/CVE-2025-487xx/CVE-2025-48747.json) (`2025-06-19T00:01:01.873`)
- [CVE-2025-48749](CVE-2025/CVE-2025-487xx/CVE-2025-48749.json) (`2025-06-18T23:59:44.600`)
- [CVE-2025-48887](CVE-2025/CVE-2025-488xx/CVE-2025-48887.json) (`2025-06-19T00:55:27.710`)
- [CVE-2025-5136](CVE-2025/CVE-2025-51xx/CVE-2025-5136.json) (`2025-06-19T00:43:40.970`)
- [CVE-2025-5198](CVE-2025/CVE-2025-51xx/CVE-2025-5198.json) (`2025-06-19T00:08:12.993`)
- [CVE-2025-6007](CVE-2025/CVE-2025-60xx/CVE-2025-6007.json) (`2025-06-19T01:26:45.850`)
- [CVE-2025-6008](CVE-2025/CVE-2025-60xx/CVE-2025-6008.json) (`2025-06-19T01:26:01.867`)
- [CVE-2025-6009](CVE-2025/CVE-2025-60xx/CVE-2025-6009.json) (`2025-06-19T01:25:17.743`)
- [CVE-2025-6151](CVE-2025/CVE-2025-61xx/CVE-2025-6151.json) (`2025-06-19T01:20:04.247`)
## Download and Usage

View File

@ -209743,7 +209743,7 @@ CVE-2022-4383,0,0,4f3978e4f233cbb9ea3de8a171f30bbfb0c78ab6638a66a4ebf99903af67e7
CVE-2022-43830,0,0,2f64150b363b8e69222f4767b2a962c4259c9aa91848800fda8ecd6f999d6183,2023-11-15T07:15:14.527000
CVE-2022-43831,0,0,4b824d13f4654134bfaa17c7c5acf538260c76da9795c9bb806d1640e5487247,2024-11-21T07:27:15.673000
CVE-2022-4384,0,0,e4a42500f1faf0f01c4bfb043390142606fdcf1d1d2db89407d32200252c33e2,2025-03-25T21:15:38.660000
CVE-2022-43840,0,0,17b6a4cb24007ec977e60889a6e08821bcc6c5745ad3e4daae541616660c9c28,2025-04-15T21:15:46.440000
CVE-2022-43840,0,1,94f74eda1ab8e287091221f74a3441f77946bbe7ffdb7fa0120169fed7356996,2025-06-19T00:37:04.670000
CVE-2022-43841,0,0,6dac3a6012885404339a039f533cfe4b8c4ab64fc90a590d1b6f4c9d270c1163,2025-01-08T17:13:14.077000
CVE-2022-43842,0,0,968543d78d4d0106d71002238fd33b4337c8761617723fc4383d8ec785dd2e77,2024-12-31T15:32:22.737000
CVE-2022-43843,0,0,aa4e8920b27430c0e020c56337aaf572b7590d86ac4b80d6e5ec6ab868ab7eb7,2024-11-21T07:27:16.070000
@ -221427,8 +221427,8 @@ CVE-2023-25714,0,0,30d1b3b8c2658a5d809246d435c81ddf2f9287a1f5b188d50271eb4a0e433
CVE-2023-25715,0,0,6d88ef667b64c52873b9245db5fa7fe78e16f2c79bc517d1f15a2686934c9956,2024-11-21T07:49:59.500000
CVE-2023-25716,0,0,6a68a371fb70c98c3f42445bc57863f0a9fc317dbcca5e2cf2d7a9605735c149,2024-11-21T07:49:59.620000
CVE-2023-25717,0,0,7ab45047ae291b9110620bf824e69b193b7f478cc5e4114d5ea36a12a4b0fe42,2025-03-10T20:48:20.863000
CVE-2023-25718,0,1,cc8356e68a532592d775c24c87006dd197f0d5fa235dcf5d5a5430114eb11a09,2025-06-18T22:15:31.953000
CVE-2023-25719,0,1,fc4f39771edda78244556047b067a46288412298b1ca6924e0ff9d3be74cad0f,2025-06-18T22:15:32.900000
CVE-2023-25718,0,0,cc8356e68a532592d775c24c87006dd197f0d5fa235dcf5d5a5430114eb11a09,2025-06-18T22:15:31.953000
CVE-2023-25719,0,0,fc4f39771edda78244556047b067a46288412298b1ca6924e0ff9d3be74cad0f,2025-06-18T22:15:32.900000
CVE-2023-2572,0,0,ed886a16c7f1007ac7399c56e87342873576f715bc1e7094b3db9028c0821f2a,2025-01-08T17:15:11.603000
CVE-2023-25721,0,0,f81320c364560d2364a1f3ba19d0330f029ea11a50a94d0f9f6b4ead68d21d31,2025-02-19T19:15:13.430000
CVE-2023-25722,0,0,bca76e3911d579e248d877cdd35275de0ae46411c20589fc7ce57e1a3e928a08,2025-02-19T19:15:13.617000
@ -235144,7 +235144,7 @@ CVE-2023-43043,0,0,4ec93aa82436dc86b4ccb1b3684f50d48aedc5bdc1d93f254412bd4b2a651
CVE-2023-43044,0,0,c700e000c93a60d18aeeabd55f0025926f6f0c9fba18f1ec754ac13e08b3d371,2024-11-21T08:23:38.910000
CVE-2023-43045,0,0,692f22dbc4dc19c089253751109b93bb0e5cefd8359cd7675e66e51e06c8d3dd,2024-11-21T08:23:39.040000
CVE-2023-43051,0,0,ed0b2315886b0d02ae69e50125a4e57219197c24e1340da2f4eb30f9896d5010,2024-12-17T18:08:08.027000
CVE-2023-43052,0,0,30b38e81f9b68b808f2a57887d47632e125fae6e9f8c3bc0081997acf157dbbd,2025-03-07T17:15:18.060000
CVE-2023-43052,0,1,34d91346bfa0dfc2c1a10c99807c82304103db8d4169e79a7cb7e17472e40ad3,2025-06-19T00:11:36.133000
CVE-2023-43054,0,0,160b9682e5bec73380f263a77e3ebbeba23b48fbec834d03025c28d701ba1820,2024-12-23T17:29:02.930000
CVE-2023-43057,0,0,01fddeae7f9538027c931e3e992d44ad1edd38b1d8fac1c202a9cab42dc2359d,2024-11-21T08:23:39.433000
CVE-2023-43058,0,0,a2df93f61b20e82bd3917a094411dc8a8f78a1f838adb628292a86116ce01de3,2024-11-21T08:23:39.570000
@ -236235,7 +236235,7 @@ CVE-2023-4474,0,0,d4799a0dcb39156734a25b4a28a5bb799b18044cdd0ae6f04e22995d42ec8e
CVE-2023-4475,0,0,47d15833d3ca73c79ddd2d5025af5599df0f7e6c16d19dfe77959aa4b1c5b183,2024-11-21T08:35:14.783000
CVE-2023-44752,0,0,4150e5669753eb509a1cbbef3d32df8ffde74678268a185e96d344d83a0d7b56,2025-04-24T14:56:07.597000
CVE-2023-44753,0,0,7f15867a32c11b9d1f1f543f8bcefd4ddc6bed14590816ea3bb45fb1470f0c42,2025-04-24T14:56:59.410000
CVE-2023-44755,0,0,92d10d0b12020aa13ca2aaede57a9d65cd4656558ec8de3c717fbbcdbcb38a22,2025-04-23T14:15:27.320000
CVE-2023-44755,0,1,d4cf51af7796cac9fa9b6347172c9e7e4d9beb9283ba7a52b125bc35dc0bc41e,2025-06-19T00:21:38.390000
CVE-2023-44758,0,0,e729895caf9bb37b37c8201b6a85dd648d3aa9d89e2cb2d0d6a653b2301b177c,2024-11-21T08:26:00.480000
CVE-2023-4476,0,0,bf61db59ad9dafdf3e6ed235511e570fb7d4b9651b983b2ad75bb82e45001399,2025-04-23T17:16:44.590000
CVE-2023-44760,0,0,8a6af57f009c485579afa393ac6a3871eb0427a7d2f884cbbc517eacf7222787,2024-11-21T08:26:00.630000
@ -252351,7 +252351,7 @@ CVE-2024-22647,0,0,0ff7eb4dbd9389ed33bcf5e48fde75377e1d805c7a4011b4189cfb80cc3dc
CVE-2024-22648,0,0,bf371e82e6b8ba69838a85189fd7c617dc96a67937ae928aae96b0e09af69b0c,2024-11-21T08:56:32.420000
CVE-2024-2265,0,0,2d9e3f6a8940d91c300a26e60fbafd657c57a52b99326912de499462a5a33db6,2025-03-11T16:53:59.010000
CVE-2024-22651,0,0,e469381682c5eb450c79d9b6a70a064ab830cecb8e16bcfbc6f7459206453c7f,2024-11-21T08:56:32.580000
CVE-2024-22653,0,0,84ea78d231e683750b79b93a6446704614ee3cab07a58cf58e432565337cb4f0,2025-05-30T16:31:03.107000
CVE-2024-22653,0,1,9327c4eeb2944373f4b4615e203889d4d97ef3692e8a64646c097e9e2e698468,2025-06-18T23:57:03.917000
CVE-2024-22654,0,0,7f401d524d432dc6daf2737f2dfd50a846877c5557a2b4e454e64bca9bc199f3,2025-05-30T16:31:03.107000
CVE-2024-2266,0,0,95d5ae8a3d9367be388b5604e19ba904305ae510fd4151f2cfa0ff7fb43bf84e,2025-03-11T16:53:46.840000
CVE-2024-22660,0,0,2311a8f71be31bc2d8e245fbbdb3d3cc97a05fbb5d0aad28b28032e7f069aa6a,2024-11-21T08:56:32.850000
@ -269703,6 +269703,7 @@ CVE-2024-45204,0,0,c17d724ab71326993fc885d0d9808c0b2eaae94c47b7923f22dde16d2eff6
CVE-2024-45205,0,0,a10f061421a2a3424e1b6c374ce4a524c46fcb2bdda2afd1dfd63ddbb6391abd,2024-12-04T17:15:14.330000
CVE-2024-45206,0,0,d9e968acf0dd8b42fc18894be4d96b31b86b907e5133e5110d37345500c02d41,2025-03-13T19:15:48.013000
CVE-2024-45207,0,0,c6ee04eede270568245ffcec461ab781dd5d887b6f188268b86eaa3a09be9e39,2024-12-04T16:15:25.580000
CVE-2024-45208,1,1,7215a369507849f231782490b34d0cc67523c6bd551d9fefc6a31e8c75e86c05,2025-06-19T00:15:21.097000
CVE-2024-4521,0,0,4a1a789411022da9e12743f86f636c858525a8f77c0a3180e65a51191dfff476,2025-02-19T18:01:20.563000
CVE-2024-45216,0,0,0c858a01ee35c91ac1e5a46b34b1bd78a3671b8c7c394b48bf0907856ecc77c6,2024-11-21T09:37:28.690000
CVE-2024-45217,0,0,6810c24892f2494e2f2c08a71fcaf1b8b72831c7bb6f78dcca7b6cc985b451a7,2024-11-21T09:37:28.897000
@ -270108,7 +270109,7 @@ CVE-2024-45663,0,0,f5982f696eb561ee89ceacd8a652ce2095dd2ab2ec4564026ad75a7cdf0b6
CVE-2024-4567,0,0,f9422c43c79efa82ea99c9dec60f6662a26312cd8fd4cf90d580aef590f63be3,2025-03-07T12:37:30.023000
CVE-2024-45670,0,0,884f280837c803b089861d2cd0800b5b952f4567c75753b35001e2a46ace7ee6,2024-11-16T00:24:57.203000
CVE-2024-45672,0,0,1f284c4606417b08ac2cd87243460783df32e665537ee9aa04c2649281078873,2025-01-23T18:15:30.057000
CVE-2024-45673,0,1,29f2d7c32b4c17ca5b5341d16e6030d5c7734db3da16c157ef02bea198990643,2025-06-18T23:36:20.167000
CVE-2024-45673,0,0,29f2d7c32b4c17ca5b5341d16e6030d5c7734db3da16c157ef02bea198990643,2025-06-18T23:36:20.167000
CVE-2024-45674,0,0,5a8f07a024d33c4f56bbf8876244f6e043fca60be2177c862fb1271be54ef76b,2025-02-22T00:15:18.410000
CVE-2024-45676,0,0,eb22d41374a33aad487840972b05f99b6866c07ad3faeb5bebf20d811966d571,2024-12-11T03:21:10.387000
CVE-2024-45678,0,0,c75108ce7d77ba88a074d8ae6e0835493f724a0bc9c0b841e9bb922f4030ac54,2025-03-17T18:15:18.033000
@ -275504,7 +275505,7 @@ CVE-2024-53007,0,0,7ba22a6b4032cf25f35c1ef00a1f90b930f980bf5515302c33e7724c5430a
CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce6966412829a,2024-11-28T03:15:16.363000
CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000
CVE-2024-53010,0,0,e92ea489ea86ddb06142add3a7b47a2b4c77fd3f05e7b1a7bf67e9e564744128,2025-06-04T14:54:33.783000
CVE-2024-53011,0,1,9f543daf6d1032b8c529ba0691f6774574470a7477d429016cd467649e59ce57,2025-06-18T23:27:51.907000
CVE-2024-53011,0,0,9f543daf6d1032b8c529ba0691f6774574470a7477d429016cd467649e59ce57,2025-06-18T23:27:51.907000
CVE-2024-53012,0,0,950d19974b52359043aeababc59a313e37e644d350cda3a38725dd1bbdedcdb2,2025-03-06T17:11:00.953000
CVE-2024-53013,0,0,8d210c05dd1b64c6c47cfd00c65a0b73f17272a696913a123b948752a0ecd543,2025-06-04T14:54:33.783000
CVE-2024-53014,0,0,f46cf9621d7ec0ec27b269342393212a2ff98a2d1e4dee51da1f5926fb7a1566,2025-03-06T17:53:56.627000
@ -276908,7 +276909,7 @@ CVE-2024-54958,0,0,05aa071d04d451a63fdeb28f8fd1c549b9935b77ac20404b5acdb6c9e76ec
CVE-2024-54959,0,0,d1f45eb8b3595354ce21bb15fb93c0707cc7f656ec9206940bec23d402effbf4,2025-02-21T22:15:12.593000
CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000
CVE-2024-54960,0,0,8d367a9174beb59a3f0e906c9cbe8173c7e94403da4b6d1b3ef81ffe768eea4c,2025-02-20T20:15:45.927000
CVE-2024-54961,0,1,d01efa3a725b7b071feaa9038a3d2e643299d5c9a69e4d407f43d6af709bc320,2025-06-18T23:39:55.290000
CVE-2024-54961,0,0,d01efa3a725b7b071feaa9038a3d2e643299d5c9a69e4d407f43d6af709bc320,2025-06-18T23:39:55.290000
CVE-2024-5497,0,0,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000
CVE-2024-5498,0,0,9ecbba4511623233a33c3c81181005b0976c38a133da4d6811e96531fd97f158,2024-12-26T16:43:44.433000
CVE-2024-54982,0,0,f9ebf7280811fe14b802aa42d21c7712849d65d0c4fab1838b9c1493b6720970,2025-01-16T21:15:16.320000
@ -283840,7 +283841,7 @@ CVE-2025-1399,0,0,e8485dd7af68ba8f2d01d51196b9d6a2f2dcf208ff563be9860baa305f6daa
CVE-2025-1400,0,0,9f46a0258b2b238aeafb292dde4996586d32ba094d532a39f75891a9cb5fcf1e,2025-05-07T14:13:20.483000
CVE-2025-1401,0,0,133011ee6945168c3da00a99f9ab3febf4bfdf6bf9088c02ff1a91a5995f2e5b,2025-04-29T14:33:03.920000
CVE-2025-1402,0,0,c23c451cfa1d570fb16b3d38ae224aa085b42cdb084d4b1dbd67b0732fd42aba,2025-02-25T04:04:59.860000
CVE-2025-1403,0,1,c40087b1d9b18cf6d2fd48f22d1a8ca09df0153a80f3a47bf1e1d9b76fc33bdc,2025-06-18T23:34:56.550000
CVE-2025-1403,0,0,c40087b1d9b18cf6d2fd48f22d1a8ca09df0153a80f3a47bf1e1d9b76fc33bdc,2025-06-18T23:34:56.550000
CVE-2025-1404,0,0,f39be30144b0a5fe80b4b94433169bbe79b568debe0e45a11fa0a8302ed0e64e,2025-03-01T12:15:34.310000
CVE-2025-1405,0,0,9d1939e7603fe8cd2a4a6b659e6149cd03308d08f69102d0905681145b4d879a,2025-03-06T17:57:54.597000
CVE-2025-1406,0,0,6fbc92715581c083383884df65716e311e7920e9986e87816bf21c4af15408ec,2025-02-25T03:38:24.303000
@ -286560,7 +286561,7 @@ CVE-2025-22962,0,0,773f9192cf586f9a26d3c9055927917c829f6abfc86fb569ec71975a3edac
CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000
CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000
CVE-2025-22968,0,0,d0a75ffad23d4bf4fd1a2a7bd701b07084101823bc6e94fd7915fe64c67cfcd2,2025-05-21T16:21:44.280000
CVE-2025-22973,0,1,ac6664ff93ee8bd28667fc4c4cb52a67fbb351c8a7bd7808b2174e7353b88f37,2025-06-18T23:38:27.877000
CVE-2025-22973,0,0,ac6664ff93ee8bd28667fc4c4cb52a67fbb351c8a7bd7808b2174e7353b88f37,2025-06-18T23:38:27.877000
CVE-2025-22974,0,0,4185e79accf61de6fccd04dc583797f701c7a7868c89a08c56fe419709f832c0,2025-03-25T16:36:17.127000
CVE-2025-22976,0,0,34e44a1193299f2815c5773a405812b482572222a2b2eca4f8d55245112e8b61,2025-02-03T19:15:14.397000
CVE-2025-22978,0,0,a869979eb8846d055e51d4b0332046ec3bb48e7e906c85c4b44b4a923b3dfc63,2025-05-13T19:34:04.030000
@ -286679,6 +286680,7 @@ CVE-2025-23118,0,0,1b6935e1de98bd988462eba8eda54cef63b56f3eba9236fce4c76fcc1a2a8
CVE-2025-23119,0,0,03b50e07e15abdb790cc32062bbf922a7a5b86dedcc5d4ac846195c74e91324e,2025-03-04T20:15:38.060000
CVE-2025-2312,0,0,9414b11cccd912a93c7b77b8b8a4cccf6c204bd0063ade57fb6afec180d8cd63,2025-03-27T16:45:46.410000
CVE-2025-23120,0,0,fcc412fa6fb516a26fbcce2f3fd613ece130eab1dda24987978f45ecc9becda2,2025-04-02T16:01:20.857000
CVE-2025-23121,1,1,c86b05491865e4836bf6329c1e162cbd30a6a1a5c9be4521f81e5cc797e8b1c6,2025-06-19T00:15:21.260000
CVE-2025-23122,0,0,f8c01c8ef5b6f9e831cc1568dda7fdd2cbff2f2dc9b80c6b770cbbbb7df7e604,2025-05-20T22:15:18.907000
CVE-2025-23123,0,0,d28e8b5e29fa7054d5082b2ec0990e478426188aacd81179d6ef03e17b2813d9,2025-05-19T14:15:22.560000
CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000
@ -286726,7 +286728,13 @@ CVE-2025-23164,0,0,d6c71aadf409109dde414ece9e46d71250f8539b53bfd49135d9534a66c81
CVE-2025-23165,0,0,a3f5779be4e59c9a66a594d6c3ca801baf089a9d49144b143211178cc604b18d,2025-05-19T14:15:22.683000
CVE-2025-23166,0,0,47816fc5591e3a4414111fd69de9efb4cbf6aca82919721dea5adc3261322e9d,2025-05-19T15:15:23.310000
CVE-2025-23167,0,0,51e20beaaef964a23d54b2f922e381e06cac714eb024305c1bced81671d165c1,2025-05-19T16:15:27.317000
CVE-2025-23168,1,1,546ed7c64bc03ea0d51fecc396d56c188ec7f68a49c7ea532db1eaf3e684366b,2025-06-19T00:15:21.377000
CVE-2025-23169,1,1,e6f8ba47a6606d785ba012a980755371860a8b07baaaed5333bdd4dff9994ab6,2025-06-19T00:15:21.497000
CVE-2025-2317,0,0,9ea9ba34615d5bc5ee8806158627db355af143699ea415828af46066a4160dd0,2025-04-07T14:18:15.560000
CVE-2025-23170,1,1,435072620bb9f6e2323acf1b32f92f05d9f6176513f869147cabcbc7416369e7,2025-06-19T00:15:21.620000
CVE-2025-23171,1,1,93cd0060572ed22af88863bbc002e2eae1bda0f6be8c43e073a24b943a764b61,2025-06-19T00:15:21.743000
CVE-2025-23172,1,1,08d066df5e2545e2c4980c7a00113f81e9955fbf9898af9917452768c0c042ca,2025-06-19T00:15:21.857000
CVE-2025-23173,1,1,46be7eeb11c19f13fd500aa3ff85203ba69130d74a0bd93b54ea0e84e022ac91,2025-06-19T00:15:21.977000
CVE-2025-23174,0,0,50322119595bff087a12ed6f94f87f583ba40060fccb96eb5cf9c3f3476fa552,2025-04-23T14:08:13.383000
CVE-2025-23175,0,0,d32116b600ac178b1ee720078d8acfc21dc4298d12982e92ae53dd00f4271286,2025-04-23T14:08:13.383000
CVE-2025-23176,0,0,4d8a569d7f8b232199b1ed07a8ee3ee2f1c9e25ade11e06e887257dda42b67cb,2025-04-23T14:08:13.383000
@ -287746,6 +287754,10 @@ CVE-2025-24280,0,0,7e6318ddeec3c45683c18b4a04b0c338f2389b9346d93c786d9c6752b668d
CVE-2025-24281,0,0,76b9011c7783c871ef865a80caf1ae08e485f8d8810428515769f6f44737d638,2025-04-04T18:22:19.983000
CVE-2025-24282,0,0,92059d5a241b5d96ef7593ded7e2abc281079ec5ed3a524fa050c614e5194214,2025-04-04T18:23:23.340000
CVE-2025-24283,0,0,4df1743210499b8e21375ec5fdb7750825951563a76a92a49e54d06df67345b4,2025-04-07T14:07:33.510000
CVE-2025-24286,1,1,65683583000d5529830b20ccff957add7c317eaf54ac1796bbc7a2c77fe87db0,2025-06-19T00:15:22.093000
CVE-2025-24287,1,1,e41d94977fd890910d04b473f5243ba60c7263c3bad06c2e597f78ea0eb5c900,2025-06-19T00:15:22.207000
CVE-2025-24288,1,1,2a83985293da967adc6016271e645505f2b1fe813d876cc179a7cddf121b081a,2025-06-19T00:15:22.323000
CVE-2025-24291,1,1,af1e02cc91c468c4c3b8047dcc990ef7498963d0fe709481ee27332ceda5885a,2025-06-19T00:15:22.437000
CVE-2025-24297,0,0,5d4a74f3648dba475a9505a338d2107001df4a92611f1e742f9c3b8bc6fc9e4e,2025-04-16T13:25:37.340000
CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000
CVE-2025-24304,0,0,d93e512a7b4aa7125a9d9a3a56f58a274a5675b50a430e59bfee24f84fb92162,2025-04-07T14:17:50.220000
@ -288696,13 +288708,13 @@ CVE-2025-2557,0,0,a42b70c78dcd89b9d3e57fec472337c34078e8807b7744b63a4210d8692650
CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000
CVE-2025-25579,0,0,9ad1112c1ed3d836da183b36b2d4375f4736b0d6d1110b2bc10e441acd9590d4,2025-04-07T14:23:36.660000
CVE-2025-2558,0,0,f54caa5596788d78e4aadac9170f01e05efbd611d3891eab20a89c4ada7faf76,2025-04-29T13:52:47.470000
CVE-2025-25580,0,0,981db6fd6e3e758c95a7a3f18e0cb48f5883f5e68031cb88007741a3d3ada90e,2025-03-19T19:15:44.917000
CVE-2025-25580,0,1,a7fce7289773d49e23ea5e84e7bf568aff3d97944f32e02e6812a51089903564,2025-06-19T00:18:57.017000
CVE-2025-25582,0,0,fdff5f005418e70695619b15a5365b87844b6870f1b28eb8b42a995086eb8722,2025-04-02T12:27:19.593000
CVE-2025-25585,0,0,aa4f3350849e7a6d1d328ba035f3acd3940e4357ca726a2c6819200e720715c1,2025-03-19T19:15:45.203000
CVE-2025-25585,0,1,98a50572e811d5f13ce801a89eed6933c5c3cc3522affcd97ffbbab7b5092abc,2025-06-19T00:16:52.923000
CVE-2025-25586,0,0,9d3dab1f0ca9edbc0b6ffff21562595a974056df41184e0c163d1dfe65d9c443,2025-04-01T20:38:38.617000
CVE-2025-25589,0,0,279eb4ff22a60008293d709d8e850b13874c50e8c6f1e23d8361c430349b0055,2025-03-21T14:15:16.007000
CVE-2025-2559,0,0,e0a1ec52fcee197642d94bd63e1278a00066cfd7daa56d8679b3fb30d47c24ac,2025-04-30T03:15:17.857000
CVE-2025-25590,0,0,3893b0a4da36be48d36967b7837bf6fae4ec31547efd1c3211b9404b64ed4014,2025-03-19T19:15:45.640000
CVE-2025-25590,0,1,96d0d533d8a4dfebea4ec0eedd66c24e0734a94d85635e359915a361c424dc59,2025-06-19T00:17:23.083000
CVE-2025-25595,0,0,fed1db19038d4b73f5895de99c0193dd0437928c86ea4f6762661a5574f5f9ac,2025-04-01T20:38:28.603000
CVE-2025-25598,0,0,97b7c491c3636dfe02438cb323583c05678dcf453afda217f0aaabb9e8d0908a,2025-04-03T16:36:30.420000
CVE-2025-2560,0,0,337093de562c8838404064a49d62d16ccb57a1ba560038dbcd17a316d2777179,2025-06-17T21:07:40.473000
@ -290181,7 +290193,7 @@ CVE-2025-27907,0,0,9272c9f0f3ebf450826a7c5ed13cb42593f690c62fd733f0bb0016d57e6b9
CVE-2025-27910,0,0,507628b1591b753da54c96355e4029096a0435f13a8b9964d15ae69d34924cd4,2025-05-21T19:34:30.897000
CVE-2025-27911,0,0,10e67228aa90db73c3414ce28096a25aef6cbc3f128533308c9edad1912d6fdb,2025-03-11T08:15:11.500000
CVE-2025-27912,0,0,607ba6a16d641d751b5df959275fc938490ced30d4e8e005bbdc21ac77f4d97c,2025-03-11T08:15:11.727000
CVE-2025-27913,0,0,f2177e7fabb09419b96c97469c2fe9aa09d8b825af754be72e4ea907f64e0e7c,2025-03-11T03:15:40.027000
CVE-2025-27913,0,1,485fe06bc425120126a2274ee10ae796cc1723ddd3b39b8ce670ae2e45be546c,2025-06-19T00:14:38.870000
CVE-2025-27914,0,0,f279e908e73009eab2977a1f24fd2dfdc09b80866f9164398ffd96fb6fa013f7,2025-04-02T20:38:06.430000
CVE-2025-27915,0,0,cd099995dd55d9bf47b9910748dbe833f7620d7232f17e750972cd85ba2bccbf,2025-04-02T20:38:25.487000
CVE-2025-27920,0,0,860eecbf3eb49dc71aa68177ecb3d2f8f87bd3bfcb02e4d5ca70f91c6686bc79,2025-05-21T19:40:21.300000
@ -290549,7 +290561,7 @@ CVE-2025-29046,0,0,97c704d53eaab90ebd050fb706002e2d0c0d26d31e8336e6914769a779ce7
CVE-2025-29047,0,0,ab9e56c52d1b5d7ce28982f238deab131b797a6e3c2a7fe7bd1afe31cde47f19,2025-04-30T15:32:30.690000
CVE-2025-29049,0,0,5d330c70d7d31103316e937aa271bd3496ea507fadb908ea97bf504a0ca30485,2025-04-02T14:58:07.527000
CVE-2025-2905,0,0,4e658b40e4673325cad88f5d27301325c733ab3811bf1fdb2bfe5209f1723eaf,2025-05-05T20:54:19.760000
CVE-2025-29058,0,0,7bc50f4cade840847079528b991d483c5848c526d0c824da3719f4b63ecc56c6,2025-04-21T14:23:45.950000
CVE-2025-29058,0,1,8fd36d2b37519c6477eceb6d49c53ef292a2d14ab64b3e3ae3de289581e5f825,2025-06-19T00:24:18.037000
CVE-2025-2906,0,0,a9a7d8b41557888835e1c79dd2617916cc6b4f3c0d6d09861e305343a3b52d6a,2025-04-01T20:26:11.547000
CVE-2025-29062,0,0,cf634246124158ff6da279c0a25858fa36e0953ce98966a9f38c5cffd84c104e,2025-04-29T13:42:54.483000
CVE-2025-29063,0,0,53319713162795fa5af1bba6f6ae7ca1ca4961c65f7a40b22ba40193b32d5e1f,2025-04-29T13:38:03.320000
@ -290624,7 +290636,7 @@ CVE-2025-29315,0,0,f907f053863754eafc89ac11a469f54443f6b549eee8182288b1596f75ccb
CVE-2025-29316,0,0,edbfef5d2b6ba20f5ddacf4404f4ebf4c89ebe5fca32750f4069bf616e710afc,2025-05-05T18:15:41.723000
CVE-2025-29322,0,0,2d154ec4512c8c4d705799afa2ea73c17ca8f22a9dcc44f2fe16f737f7f4c5a2,2025-04-08T19:15:48.650000
CVE-2025-2933,0,0,d2bf8266af3293189f2fc83d9c7224df7d9162ddc33d6ffbeb12c1b55081638f,2025-04-07T14:17:50.220000
CVE-2025-29339,0,0,68a305eeb644847bf32dd93a9ea14694595bad06f76ea0ff7f59df135eb9dae8,2025-04-23T14:15:28.957000
CVE-2025-29339,0,1,3c8767e6fc1c7537f5abbed85f26508361863e04ceb6434ef3e14faf20c7a82c,2025-06-19T00:23:24.013000
CVE-2025-2935,0,0,7b37cfe809822a560bb0e6dbeb565e9e50c614feb77ac7a6501335760c490b55,2025-06-06T14:07:28.330000
CVE-2025-29357,0,0,eb014a723aa009227f0255b17dfaab32ae69c018e0a2e5c6777057d80a0cac3f,2025-04-02T20:33:45.110000
CVE-2025-29358,0,0,610f6132677edbf66dfcad4906cefbaf7edab86ba5e1c4ae5ea8eda11e0df66d,2025-04-02T20:33:25.387000
@ -293277,12 +293289,12 @@ CVE-2025-32784,0,0,f07e1bae891c8076c2e74beba24dfa0a792bdc8c6b542f23984d9697f06bd
CVE-2025-32787,0,0,8a246667f42b8c93bdf6ea46fc5b0e98103cc9f313dbb1cf2d73b44e0183e974,2025-04-17T20:21:48.243000
CVE-2025-32788,0,0,cebc5cd0039e46d666bc72b974aa2129ecda5527e4c21f72222322773942a165,2025-04-23T14:08:13.383000
CVE-2025-32789,0,0,15497d5966ffa6957462c2b50b8826e589c0a55241d8772e97d18438454b376f,2025-06-18T13:08:03.067000
CVE-2025-32790,0,0,990684714275a758b4cf34a8ac7b4f82fc1b2c4e46163c9e33e822bd80e8f1a8,2025-04-21T14:23:45.950000
CVE-2025-32790,0,1,ad704aba084f587745e00b79fe34454c0424370ee4217d2aeeeb26c85bddfc96,2025-06-19T00:36:04.717000
CVE-2025-32791,0,0,7bfb43a10b9eb50667be3773a3b4fe4844fac126ca4c8485005211a087def8c1,2025-04-17T20:21:48.243000
CVE-2025-32792,0,0,5617465372754753e6f838bd9a5e8e1789ad8b344ec076ba7e3dadb68ae93bcb,2025-04-21T14:23:45.950000
CVE-2025-32793,0,0,53c512d5ca796aaa2074213fb6811f42fd2ddcbb1551cf07ba87dac176a68735,2025-04-23T14:08:13.383000
CVE-2025-32794,0,0,e5c75374c7acd23f4b7bf6398c0b16e7126deed02aabe7e5caf26f8df1848b02,2025-05-28T14:58:52.920000
CVE-2025-32795,0,0,9b91f12206c53caef7f7087deba98182feb5bc18c57224b5893c030b3a403c24,2025-04-21T14:23:45.950000
CVE-2025-32795,0,1,3226787ef9fde307f13d92b52c13368891b70059c6d43e363196d275603a2be2,2025-06-19T00:25:59.333000
CVE-2025-32796,0,0,20ed07849a09b1f538632557f0ede2b9976cfa2cb03f0965ae7b2114a9dbac36,2025-04-30T16:12:32.757000
CVE-2025-32797,0,0,39a1453b6f2631a027a7807128ca6c2891d742d8758fbedb098024372cb946b4,2025-06-17T20:50:23.507000
CVE-2025-32798,0,0,f44833545ee36efc429fe65c06380ddfd5e2af6021ad43cc23f550f5437de549,2025-06-17T20:50:23.507000
@ -293696,7 +293708,7 @@ CVE-2025-3503,0,0,8d73ed34ec38f7a3fa46caf6863bc942845955658d4c73ee2f17e6ea13b905
CVE-2025-35036,0,0,8999fc2e6f0f347716ac95ecda1fad4f0e119637eb3d3b6b7486b65b8a53ad62,2025-06-04T14:54:33.783000
CVE-2025-3504,0,0,aa0bdb842e6d15cc15443745349224911fa493d95241cc6b8918b52272013f3a,2025-05-07T16:30:38.630000
CVE-2025-3506,0,0,2cb7dd6bbf56ec7a1271ba0855665acb3addde320f586d229e2ed1fc18ebe38d,2025-05-08T14:39:09.683000
CVE-2025-3509,0,1,59dfeef049b50d7f8ac0a0fdc9ad111deee128bea1190de29b989508fce45039,2025-06-18T22:15:33.197000
CVE-2025-3509,0,0,59dfeef049b50d7f8ac0a0fdc9ad111deee128bea1190de29b989508fce45039,2025-06-18T22:15:33.197000
CVE-2025-3510,0,0,1b8ed8f812be63691dac933113d2a261e9d649bd0a63b491c4d9db6c3ce2c4a2,2025-05-06T15:19:30.527000
CVE-2025-3511,0,0,2581a75036be8d737bc9c5afcbd1a9fd25ea23392ab1ff727e244646bbc80fb2,2025-04-29T13:52:28.490000
CVE-2025-3512,0,0,20d5b7a0c651482d59ceef752919a6e419c7dc684bf79b235343ded68357dd77,2025-04-25T18:15:26.103000
@ -295497,9 +295509,9 @@ CVE-2025-4458,0,0,eea9d140dad4a90fff730d46462b27320b6a68017f06012fa50cfa447315cc
CVE-2025-4459,0,0,5d83ffa5e1366542181e5e41a54bfeb484e13bea3e368fac332c6a4e14d2429f,2025-05-16T15:36:12.370000
CVE-2025-4460,0,0,1523c53b4c3872072d748d30b69d698f488cc9e2a4c6bd053b5055199ec1d6eb,2025-05-23T12:28:39.320000
CVE-2025-4461,0,0,3bcbf8140bfe36150100ec64813a63556401d9c6c9569195ed4770cdd149bae8,2025-05-23T12:33:21.447000
CVE-2025-44612,0,0,ab31165040d4e1acf62342650f5a81fcd3d1ed85f65ea951c1762f491a626de7,2025-05-30T22:15:22.617000
CVE-2025-44614,0,0,2b0e5eb52856556d366041a820729a8d2c7d10ce2788b493796bef3738a63138,2025-05-30T22:15:22.790000
CVE-2025-44619,0,0,2e5472ba4d6ea57e021067b24b93cef81ddd7248b90b1c18bf27182d915cf485,2025-05-30T22:15:22.967000
CVE-2025-44612,0,1,5defe95505c6700db90200d792442f785e503a45c3ea11c6229ec62aecfa8dd5,2025-06-19T01:08:28.777000
CVE-2025-44614,0,1,0f68dc5a3d03479a4187b8785f635a99a89cffec91a8b63dbc057ac34a947962,2025-06-19T01:06:45.603000
CVE-2025-44619,0,1,422a72a04b94879413276ec6eb0213f1193ef9eb8b1372f7221aa0e31c9fe170,2025-06-19T01:04:28.143000
CVE-2025-4462,0,0,a45c74043d407d51bd153a59310148483accce910ccf874e95fb20ccf665af48,2025-05-23T12:37:15.720000
CVE-2025-4463,0,0,9e877456add3b215f52a45038f40c9086cab0011383eb94f398b692bd4cf9448,2025-05-16T15:36:03.983000
CVE-2025-4464,0,0,43a4f1f30e275a5908987f511806e5bef7544ddf882b5a452ef3e2c803ed00cc,2025-05-16T15:35:56.983000
@ -295579,7 +295591,7 @@ CVE-2025-4490,0,0,241f08f705ae3e66d0cf435e9f641db9abaac260a233ab4f24995312c1bd33
CVE-2025-44900,0,0,715b90a244faa6f40eccc3c1fc10f72c265ad47c8a18532c8f483a83d8dfdf3b,2025-06-04T17:25:54.930000
CVE-2025-44904,0,0,698017dffc9baafe7f90678fc77c6bf37e6dde2be1b0112d7bbe4b0cba948021,2025-06-03T15:35:50.377000
CVE-2025-44905,0,0,55f5d849eeb5a9403dc8d40445e406a7d903c79ed83689e9e12fa9fbbf4ce28a,2025-06-03T15:35:40.283000
CVE-2025-44906,0,0,282d55acfc77538b313708459953bbd20cbde03a419a436e303d61c1ed0e76dd,2025-05-30T22:15:23.487000
CVE-2025-44906,0,1,8c35bb41ab99832e2381732b703a4e95fba657841fb0a7405fdc1c5ff67eb038,2025-06-19T00:57:57.120000
CVE-2025-4491,0,0,ba256d8517f70212e591537769bd709f798dda4e9421bc8dc0e19810c50211c2,2025-05-13T18:57:25.977000
CVE-2025-4492,0,0,4eec4ffb9ff09b31eb69062234f9086984737bbfc848cc0a9df2b8747073742a,2025-05-13T18:57:16.670000
CVE-2025-4493,0,0,68c76c6c662ffa6d0b165fd473ec10bcb58eca28ca884631899ab57537d7fbf7,2025-05-28T15:01:30.720000
@ -295668,7 +295680,7 @@ CVE-2025-45468,0,0,1f9ca402c698f9398e2cfc09460d45546d3a5c4644d69b2590973d05b1fe6
CVE-2025-4547,0,0,5a9f97c59a5517a42eb37b2bfaeb218892d8ce2e6447168e1978702b9836490b,2025-05-16T17:19:47.520000
CVE-2025-45471,0,0,175cebfb698d65801503c809b3aa892182068d5ca8c7cb75b47dca0205a19e21,2025-05-23T15:55:02.040000
CVE-2025-45472,0,0,2637a833bc8f30b44e037d16794888343f063d186f0716a0b1631b9011f38122,2025-05-23T16:15:25.777000
CVE-2025-45474,0,0,15c71faa487e912137cb6dd8291dff7f6e8ac2a114c512a23cbcfed4253fa37e,2025-05-30T16:31:03.107000
CVE-2025-45474,0,1,5a86947a5dcb30409703950db611fb972ad2af49b62606364ea6d0524ca2d928,2025-06-19T00:45:23.457000
CVE-2025-45475,0,0,c651c3ca7b70bd6e8fa8fbb78ede99da7981aaa6c45716e37e6135c5fa59a413,2025-05-29T19:15:27.790000
CVE-2025-4548,0,0,a8fe2cea464a0b35dbac9350217055ae490f25b77738ddb03311a9902dfffcb3,2025-05-13T18:55:54.360000
CVE-2025-45487,0,0,ffb60bfe346afcb15249da2528ccd12c910ff9915205c63e38aaf38509c65e39,2025-05-13T20:19:05.490000
@ -295764,9 +295776,9 @@ CVE-2025-45864,0,0,b32f79c80f948a5502c692222ba63db7db0d85fc0944e6f9a68e63f94b3a1
CVE-2025-45865,0,0,367062564ab2fabd14817d58b3e7095878e7c26afaa0eb1dd77e8dfb0a65054e,2025-05-15T18:37:31.917000
CVE-2025-45866,0,0,48c16ba2c1a450558a2d650800240d515297efe6c8338a7502e000a11c7cf020,2025-06-17T19:39:56.640000
CVE-2025-45867,0,0,a78de81cad59bbc316e2ff4eacf13da0ca81d5efbf89eb838fbfcc576cba1eb1,2025-06-17T19:39:47.240000
CVE-2025-45878,0,0,62b94a39a151ab6e7c549c2c16947ad4227e454bb47e8f58a3b24b8380fc5307,2025-06-17T20:50:23.507000
CVE-2025-45879,0,0,b379e9eb0b5b34ad9aef750a6bedc6898f7516a414ea0451183ba6c225d00aaa,2025-06-17T20:50:23.507000
CVE-2025-45880,0,0,44f30fcb46473facac91e9a76b1d275d248138cc58976639930bfa745e54aa8d,2025-06-17T20:50:23.507000
CVE-2025-45878,0,1,6b615553fc01027582e83444469fbebd12926b528a6fd0f4487cffdba07fc964,2025-06-19T01:16:08.927000
CVE-2025-45879,0,1,a523ea1be4f66a907ee86b9ebd07662f0a00641a69e4600b6fb7654b16a506de,2025-06-19T01:17:35.180000
CVE-2025-45880,0,1,c47ab1f65c4156b5c6429c22b5f9bfbbc63b3cc275dd1d042554312bbfc017be,2025-06-19T01:14:25.967000
CVE-2025-45885,0,0,79234899966b4c8a321aa6153cf77a765f29e557be9d26ad86dc78b3a7557cf5,2025-05-28T13:40:22.817000
CVE-2025-45887,0,0,fb1a15240343f864311f44360980a2f79927e76ee0105844e8c76acb00550c58,2025-06-12T16:39:34.730000
CVE-2025-4589,0,0,bb26d22fcf596d77e370296c8ae93489013c99f636d3a8cff9546409ae0197a5,2025-05-16T14:43:26.160000
@ -296861,7 +296873,7 @@ CVE-2025-47735,0,0,2f52e7c2d058d86629cac68f734c0774cf880fe4e8f98eedcaeede1d23aa6
CVE-2025-47736,0,0,2f11e9b0a9d748da2f6ce9c62d30862cdd6596c7ac96ac5f1028db67479c00c6,2025-05-12T17:32:52.810000
CVE-2025-47737,0,0,60cb12bc89ce6f2a8fe9e7af3463c6e9c2bcca5ef96322a90d7cccb126b389d1,2025-05-12T17:32:52.810000
CVE-2025-4774,0,0,030f0c165972a90f2efc4aaa5ddbfe19e3d1b1c3af0f3137283b01a5858b493d,2025-06-12T16:06:39.330000
CVE-2025-47748,0,0,b90bacb2c6f839ee321be88774b4833cef222cda69ff8602ec8ddb9f1d835f3e,2025-05-30T17:15:29.117000
CVE-2025-47748,0,1,e91bacbbf68ff936e9ffc4e2dc9102ab0bec0b3e3b7394e08f7d2f364041349e,2025-06-19T00:02:12.070000
CVE-2025-47749,0,0,77136f5a200eae36103a9c78079b2abf4fa9dbee2a99746a355de3498002722c,2025-05-19T17:30:06.440000
CVE-2025-4775,0,0,0fad29bd3e9858145fb455ae58be296c8d3a170752ce945a7dd422f11e7d0b15,2025-06-17T20:50:23.507000
CVE-2025-47750,0,0,1a4ff5a2f7fb0cd15d257d686f97e3b073753ad3ba8037a1d7327a6c86b11820,2025-05-19T17:31:27.667000
@ -297305,9 +297317,9 @@ CVE-2025-48743,0,0,c91acb6150f07a43c974b698b48df19455694c9a8c5f37e0bbd5aa9b807fb
CVE-2025-48744,0,0,a039740c56d4e93180f7ac5a496864b9f89957753f0bd173790011a4f09f8955,2025-06-09T18:50:58.620000
CVE-2025-48745,0,0,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000
CVE-2025-48746,0,0,f72c5a8d16806b0ba968ccabf6f8a5266bce1d331d3179a6d466243179f0e088,2025-05-30T17:15:29.937000
CVE-2025-48747,0,0,15faa5990b14fe28d9e9adffb09c889e29a458d2860986cf684ebec4ab0b970b,2025-05-29T14:29:50.247000
CVE-2025-48747,0,1,77f2b3f312e05dae0fd49a4fbf0de33587f3dcda8e8123589893c43a0bb874a3,2025-06-19T00:01:01.873000
CVE-2025-48748,0,0,b7307577dff3e5ce645bd5ba057a9ae096f6a95ae5b6b2f453f6bbe07920f1f1,2025-05-30T16:31:03.107000
CVE-2025-48749,0,0,00f7b9bcd1525e342ee0659152f079b4a6dcc45883d33ce6a8b1423f085fa8c2,2025-05-29T14:29:50.247000
CVE-2025-48749,0,1,1782601449fdbad7e128b503fdc88bf73801639c356e6033cd52a3b78e0cb26f,2025-06-18T23:59:44.600000
CVE-2025-4875,0,0,130bc5da676a7028541a0b0fca1ba41a63baeb979bb88a491f60fd8b45c2548f,2025-05-21T19:39:23.917000
CVE-2025-48751,0,0,7b48afa401b2b93b58deb3a57cdb6356d07d3afa8b095b572a5b480362f21209,2025-05-28T14:58:52.920000
CVE-2025-48752,0,0,417f08c4a3fc844a1f6adee231658d0c60eb0b6a83e7d60fcf34a66c6755f30e,2025-05-28T14:58:52.920000
@ -297370,7 +297382,7 @@ CVE-2025-48881,0,0,478c71cbb268c7668af9adbe8d9db873a15a6f0100cbc1765ad6b2fc8ccbe
CVE-2025-48882,0,0,0675a44f5475635d3b90df25f21b843f71a594f25b60ebf1257710a520ba2459,2025-06-02T17:32:17.397000
CVE-2025-48883,0,0,14507842d3e0b613f4c9b8d62ad8df05d93e1c97510cf43e163a8411a419850f,2025-06-02T17:32:17.397000
CVE-2025-48885,0,0,a22cad12e847f8e3d6cac2d0c207ccbc3235380976544a38095804a3e40d9d2f,2025-06-02T17:32:17.397000
CVE-2025-48887,0,0,1d5cacac7d4463b079037d15dea05f85b4e0e8b7d35792f7788c0510a474c648,2025-06-02T17:32:17.397000
CVE-2025-48887,0,1,d715c137954000dfa4d0fdb3ecdb8e16b928f4dac02dc271a6a5d4052e6a12f9,2025-06-19T00:55:27.710000
CVE-2025-48888,0,0,e337e94b85d7a08366e0c5a3cc16b222a86bb1703b8b9d4a80140797b44ccf65,2025-06-05T20:12:23.777000
CVE-2025-48889,0,0,10193c433a4bb6349663dd15365e40e7749e3028945374c079cc00a7a9212044,2025-05-30T16:31:03.107000
CVE-2025-4889,0,0,01c7a8037082d88b5ac656519933c8c5460517579f14e0273e6b2875f7942bab,2025-05-28T15:30:05.053000
@ -297731,8 +297743,8 @@ CVE-2025-49585,0,0,5bf4c40d67475101b94bdc46e2d5692603da18c9e7df40708e6ea162e9f61
CVE-2025-49586,0,0,2c3a3ffb465e48b26eb6217846164f4f9a6ce07e373f9efa6cf1228016e4468b,2025-06-16T12:32:18.840000
CVE-2025-49587,0,0,de5086ac381fd168ddf890ff4b6777f5711fd665730c37d4ee199139f966ae7d,2025-06-16T12:32:18.840000
CVE-2025-49589,0,0,4de9f02dd34b97b034101bec18a9814c3229a0f8edc0cf289468099913dab0e8,2025-06-16T12:32:18.840000
CVE-2025-49590,1,1,d02c6f68b2408b9164502691436e2ff7dad8a8a8a34be335d4ee052b1ca56b13,2025-06-18T23:15:19.200000
CVE-2025-49591,1,1,28f6d3018b9734805a1499f3feb0c242fc3749eb3d800735b2df7e9e13d4e56e,2025-06-18T23:15:19.403000
CVE-2025-49590,0,0,d02c6f68b2408b9164502691436e2ff7dad8a8a8a34be335d4ee052b1ca56b13,2025-06-18T23:15:19.200000
CVE-2025-49591,0,0,28f6d3018b9734805a1499f3feb0c242fc3749eb3d800735b2df7e9e13d4e56e,2025-06-18T23:15:19.403000
CVE-2025-49593,0,0,6d7381d4ff0f4b81807be7ac3e78832aa1c2958239dda39de56e3e5b443b96da,2025-06-18T13:46:52.973000
CVE-2025-49596,0,0,914f35572c3497727ef5bfdff2cd9e17d27812703e06d7a6c3496156238c7e41,2025-06-16T12:32:18.840000
CVE-2025-49597,0,0,31430be1a672877ef5712ae64cc63468a339d903aeb2a4d86bb312578783d5a4,2025-06-16T12:32:18.840000
@ -297845,6 +297857,7 @@ CVE-2025-50149,0,0,e01be1ba294ecdeaf476ba9bb17e64b1284ce9362fb5da1703e5c224f2a89
CVE-2025-50150,0,0,79eb21a64f645c369296b1d0b905e35268f567b5a96dfbfc58ef963e4e69507b,2025-06-14T03:15:22.220000
CVE-2025-5016,0,0,d907c2ff3d5c65fe44aee01e8b0e3594629d2dcb543e14c1a3c5bbcba44c8083,2025-06-02T17:32:17.397000
CVE-2025-5018,0,0,e6074d13c744f0bbc4fedce0adf645747389e40f5acdd13f0492e74df313cc90,2025-06-06T14:07:28.330000
CVE-2025-50181,1,1,c3850146c5a0b14f2cce48561569b8a28f7456fb311da59cb44a38aa4cc7c715,2025-06-19T01:15:24.453000
CVE-2025-5019,0,0,9e77689bce77b4f77cc10eef8ecd39dc784fee948cba6d9ab205fa6a8f33f986,2025-06-06T14:07:28.330000
CVE-2025-5020,0,0,a009d51287904279a69fbc7b7d45e7044fc45e21284eb97bd084f038009245ee,2025-06-13T18:55:32.903000
CVE-2025-50202,0,0,c82284387579a4d5287081c79bce5f56bb74234016b730f3d53b62b5739eec46,2025-06-18T13:46:52.973000
@ -297918,7 +297931,7 @@ CVE-2025-5132,0,0,92567ff3cb96caac4b2a7f5afbc84b272b06854c208c48821c8e814d8a244d
CVE-2025-5133,0,0,71ff685cb41d220918422266a9a9027a78bee24552031db902c458276c3d0621,2025-06-03T15:48:15.610000
CVE-2025-5134,0,0,d420ea46d85516af4902b09065e0670f0f7a966eecf320488abdd86a620ad3ac,2025-06-03T15:48:28.580000
CVE-2025-5135,0,0,ff5e4b4f352f002c704ddb4fec56d312bfa70e7ac4d7428009d05887b065c456,2025-06-03T15:48:40.953000
CVE-2025-5136,0,0,bd0c27de50ee06fcb71ffb69b26d594d7fa702a9a559c430c5d629f3be8d9822,2025-05-28T18:15:29.530000
CVE-2025-5136,0,1,6b76178b393ce786e02c90a2baf18e1605a6560667c6c5172f14e227aef611af,2025-06-19T00:43:40.970000
CVE-2025-5137,0,0,a461b4cd382da5c206010b8729faf9840aa41b3d9e8c8cf8ba7880897f06f378,2025-06-10T19:33:16.710000
CVE-2025-5138,0,0,3bae41860cd01f5b3b29a66081652cec538a389d28958af017b419d06b38908c,2025-05-28T14:58:52.920000
CVE-2025-51381,0,0,90017ba2f2fd86cff636ae17c3c22e5ea0f00724f257397ca0c300a57129132c,2025-06-18T13:46:52.973000
@ -297973,7 +297986,7 @@ CVE-2025-5190,0,0,b83fcbe64867ed5f66064afe0985f0f8e1099ccb823b90fa56196e26e3f4bf
CVE-2025-5192,0,0,60cab63e53de16bf0d2b760f814c5b69c2d153aa1edfa79d1c5ac599f5bf94f5,2025-06-06T14:07:28.330000
CVE-2025-5195,0,0,67ed4f2b8401a12100a4ab10d4477eb555cb25ae77229fa0c172cda09b715498,2025-06-12T16:06:20.180000
CVE-2025-5196,0,0,e0938db7c97745bb3f3070e04c267d2314060f49f00cd38492cd5b468ae94740,2025-05-28T18:15:33.670000
CVE-2025-5198,0,0,81bd13d2a866ca7de4c3f2f26760c3d14afdd9d115b50ea3fd55967b3466e3f8,2025-05-28T15:01:30.720000
CVE-2025-5198,0,1,c8124bf615d24cf9474c96b9bd6d16252727b696641a4975ae527719f7fa40f3,2025-06-19T00:08:12.993000
CVE-2025-5200,0,0,740d1c6af0ac032e5f77add784768d5ba871f8a7dc1be1d8555505f3ed6440d1,2025-06-05T14:17:19.607000
CVE-2025-5201,0,0,b4028548330d8a4402ec1f2305222f13a42431f4d6fce12a8c6845a20f9892aa,2025-06-05T14:16:26.557000
CVE-2025-5202,0,0,a5576375be538fa454feccc29b5d9756f262d32c77920b2b2fcc080fafd9eb39,2025-06-05T14:16:16.410000
@ -298551,9 +298564,9 @@ CVE-2025-6002,0,0,c3342aafede1398b2d7e7cc8f4c9f889ab7afc3c4ac6360898dd2f7299f1fe
CVE-2025-6003,0,0,13a477a4b87366b3fef1966498d6d8c821ce2e26bf2366c0e56fb46b20ebdcb5,2025-06-12T16:06:20.180000
CVE-2025-6005,0,0,2cf44564776f402947a17c91be3717b20ba7071fdb538dc73eff857dfd935e96,2025-06-12T16:06:20.180000
CVE-2025-6006,0,0,f3890d678b52a65bb188746bd2b72b04830e80f4fcc6e370b4f5f482a5c89435,2025-06-12T16:06:20.180000
CVE-2025-6007,0,0,0a6b30e00b610d68c64f9ae664f6748f210976b9ca69a527a02472b830ffa838,2025-06-12T16:06:20.180000
CVE-2025-6008,0,0,bdfd3cc3e4441917f3e7587cffe8368d1b175ba60e9dbe2f7dbae2a1b2f94481,2025-06-12T16:06:20.180000
CVE-2025-6009,0,0,45d2cd3c349eec086d7dbf8e5d3677c0ad4a90d0009e476cec317ccc54ba0f3a,2025-06-12T16:06:20.180000
CVE-2025-6007,0,1,ad7217a46edf88f3122f03c09e2fdcfd31382468cbe1002c4a5de402899399f2,2025-06-19T01:26:45.850000
CVE-2025-6008,0,1,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde0826f,2025-06-19T01:26:01.867000
CVE-2025-6009,0,1,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000
CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000
CVE-2025-6020,0,0,439a2d09f05868a64a6818f204c8af8c3741a1aa91da69dac7da1c6864b5ef72,2025-06-17T20:50:23.507000
CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000
@ -298638,7 +298651,7 @@ CVE-2025-6147,0,0,570ac2a48926a6ca3fbbf19843b6ed5165fc288ba0666045a4c3539c09fd13
CVE-2025-6148,0,0,ea54d2ee97b05bc473f95b428c1e5203650c95ed69365a87af6ed86096e7cac1,2025-06-17T20:50:23.507000
CVE-2025-6149,0,0,7c17b71b2470ad9456e79bc76a0e10dbfa869b397a8c16a012013222daafab86,2025-06-17T20:50:23.507000
CVE-2025-6150,0,0,7824049227e4d181411b19e48dd725520b624c26d17cf96197a1635eeeb0b9a5,2025-06-17T20:50:23.507000
CVE-2025-6151,0,0,aa4fa0a465e1acec8ecc150b0738a8690a097c49434164f17226e1edc7c55015,2025-06-17T20:50:23.507000
CVE-2025-6151,0,1,66f985d955d28732cb3e20742ce5c2b75d056fdf6e0c0fd5329b3e2551fd465e,2025-06-19T01:20:04.247000
CVE-2025-6152,0,0,ff4ccaf39bf818abdc375e234ccbed4be33d2e886689e2e8335c122e3871c2eb,2025-06-17T20:50:23.507000
CVE-2025-6153,0,0,2fc60dca756ddc4e172d6897384ac8518a5ff1f5174120a3dcec13ba5207b272,2025-06-17T20:50:23.507000
CVE-2025-6154,0,0,f1415c5a2eb0eacb2f774f7a7fb86d492db28bb7f75636c28658e54eafbc0f4f,2025-06-17T20:50:23.507000

Can't render this file because it is too large.