mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-05-30T02:00:19.706078+00:00
This commit is contained in:
parent
b742296548
commit
8cbf20a0ff
37
CVE-2020/CVE-2020-368xx/CVE-2020-36846.json
Normal file
37
CVE-2020/CVE-2020-368xx/CVE-2020-36846.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2020-36846",
|
||||
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
|
||||
"published": "2025-05-30T01:15:20.950",
|
||||
"lastModified": "2025-05-30T01:15:20.950",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library.\u00a0 Versions of IO::Compress::Brotli prior to 0.007 included a version of the brotli library prior to version 1.0.8, where an attacker controlling the input length of a \"one-shot\" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your IO::Compress::Brotli module to 0.007\u00a0or later. If one cannot update, we recommend to use the \"streaming\" API as opposed to the \"one-shot\" API, and impose chunk size limits."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/advisories/GHSA-5v8v-66v8-mwm7",
|
||||
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/google/brotli/commit/223d80cfbec8fd346e32906c732c8ede21f0cea6",
|
||||
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/google/brotli/pull/826",
|
||||
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/timlegge/perl-IO-Compress-Brotli/blob/8b44c83b23bb4658179e1494af4b725a1bc476bc/Changes#L52",
|
||||
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
||||
},
|
||||
{
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8927",
|
||||
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-21265",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2021-03-10T22:15:12.057",
|
||||
"lastModified": "2024-11-21T05:47:53.477",
|
||||
"lastModified": "2025-05-30T00:15:20.330",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -87,7 +87,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -115,6 +115,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/octobercms/library/commit/f29865ae3db7a03be7c49294cd93980ec457f10d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6",
|
||||
"source": "security-advisories@github.com",
|
||||
@ -123,6 +127,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octobercms/october/commit/555ab61f2313f45d7d5d138656420ead536c5d30",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0",
|
||||
"source": "security-advisories@github.com",
|
||||
@ -139,6 +147,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://packagist.org/packages/october/backend",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-29505",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2021-05-28T21:15:08.713",
|
||||
"lastModified": "2025-05-23T16:53:47.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-05-30T00:15:20.543",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -382,6 +382,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/x-stream/xstream/commit/f0c4a8d861b68ffc3119cfbbbd632deee624e227",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-7chv-rrw6-w6fc",
|
||||
"source": "security-advisories@github.com",
|
||||
@ -390,12 +394,8 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r8ee51debf7fd184b6a6b020dc31df25118b0aa612885f12fbe77f04f%40%3Cdev.jmeter.apache.org%3E",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Issue Tracking"
|
||||
]
|
||||
"url": "https://lists.apache.org/thread.html/r8ee51debf7fd184b6a6b020dc31df25118b0aa612885f12fbe77f04f@%3Cdev.jmeter.apache.org%3E",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00004.html",
|
||||
@ -406,32 +406,20 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210708-0007/",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210708-0007",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2021/dsa-5004",
|
||||
@ -471,6 +459,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://x-stream.github.io/CVE-2021-29505.html",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
@ -490,8 +482,8 @@
|
||||
"url": "https://lists.apache.org/thread.html/r8ee51debf7fd184b6a6b020dc31df25118b0aa612885f12fbe77f04f%40%3Cdev.jmeter.apache.org%3E",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Issue Tracking"
|
||||
"Issue Tracking",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40458",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-22T19:15:40.543",
|
||||
"lastModified": "2025-05-23T15:54:42.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:17:07.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,14 +55,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ocuco:innovation:2.10.24.51:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A51C5F05-7D25-4008-8BB5-1731424FE1CE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1E8dxLt2LnvmLcCEUyp6qtnG-yZjyvMji/view?usp=drive_link",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40459",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-22T19:15:40.717",
|
||||
"lastModified": "2025-05-23T15:54:42.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:17:01.203",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ocuco:innovation:2.10.24.51:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A51C5F05-7D25-4008-8BB5-1731424FE1CE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1J2PsjRc6u2q4Teo3eVnBVmTEFjOgaPzX/view?usp=drive_link",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40460",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-22T19:15:40.860",
|
||||
"lastModified": "2025-05-23T15:54:42.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:16:56.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ocuco:innovation:2.10.24.51:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A51C5F05-7D25-4008-8BB5-1731424FE1CE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/10M4x2jL_l-kPSZOOE_tUmBzCTCr0tMiF/view?usp=drive_link",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40461",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-22T19:15:40.980",
|
||||
"lastModified": "2025-05-23T16:15:23.190",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:16:50.940",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ocuco:innovation:2.10.24.51:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A51C5F05-7D25-4008-8BB5-1731424FE1CE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1DyiyLQRvTRAZD8gn2BT7oDzX1NQ7wmFT/view?usp=drive_link",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40462",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-22T19:15:41.107",
|
||||
"lastModified": "2025-05-23T16:15:23.363",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:16:45.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ocuco:innovation:2.10.24.51:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A51C5F05-7D25-4008-8BB5-1731424FE1CE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1MDU9FGo36U83yQy55nnVj1syWVy9WLm5/view?usp=drive_link",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41195",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-22T19:15:41.260",
|
||||
"lastModified": "2025-05-23T16:15:23.533",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:16:38.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ocuco:innovation:2.10.24.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4303D5D8-CC75-42B5-A857-300058ECCF4F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1U50ZsLo7VXWKQ1_6FxWy70F_75jzVUwi/view?usp=drive_link",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41196",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-22T19:15:41.387",
|
||||
"lastModified": "2025-05-23T16:15:23.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:16:32.857",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ocuco:innovation:2.10.24.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D4E7762-6AF7-4F01-AD85-70DA5F9C43CA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/285.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Technical Description"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1UqJAQiwhHZCHtgac4-YiJHElBYhqUu3M/view?usp=drive_link",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41197",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-22T19:15:41.520",
|
||||
"lastModified": "2025-05-23T16:15:23.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:15:41.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ocuco:innovation:2.10.24.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD7903C1-CF0A-44D4-9567-FB465A46F721"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1XgbcJqYIHxAROcCACdgdD8V_97Hcwdze/view?usp=drive_link",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41198",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-22T19:15:41.663",
|
||||
"lastModified": "2025-05-23T16:15:24.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:15:33.680",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ocuco:innovation:2.10.24.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D4E7762-6AF7-4F01-AD85-70DA5F9C43CA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1k7P36ygRjQE6XfcT-FJgsN2yrtQy2yhH/view?usp=drive_link",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41199",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-22T19:15:41.803",
|
||||
"lastModified": "2025-05-23T15:54:42.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:15:26.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,14 +55,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ocuco:innovation:2.10.24.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A92A68C-ACB1-48CB-945D-1C8FD8C63BDA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1dVvH9l0gKRK0OPcF6_8yTLPsARKFqWqB/view?usp=drive_link",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raw/d2d3d74ccaa939127ee2b03139061509a7dd238c/full-disclosure.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42514",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T19:15:07.883",
|
||||
"lastModified": "2024-10-07T19:37:19.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:26:00.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mitel:micontact_center_business:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "10.1.0.4",
|
||||
"matchCriteriaId": "E7CB4AB4-E082-4C02-BAED-9EA1497C197A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_24-0024-001-v2.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mitel.com/support/security-advisories",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0024",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52874",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-22T18:15:40.543",
|
||||
"lastModified": "2025-05-23T16:15:24.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:18:52.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:infoblox:netmri:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.6.1",
|
||||
"matchCriteriaId": "7386D948-8CAD-4AC9-B710-FA1B91F3C467"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.infoblox.com/s/article/Infoblox-NetMRI-is-vulnerable-to-CVE-2024-52874",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
104
CVE-2025/CVE-2025-19xx/CVE-2025-1907.json
Normal file
104
CVE-2025/CVE-2025-19xx/CVE-2025-1907.json
Normal file
@ -0,0 +1,104 @@
|
||||
{
|
||||
"id": "CVE-2025-1907",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-05-30T00:15:22.830",
|
||||
"lastModified": "2025-05-30T00:15:22.830",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Instantel Micromate lacks authentication on a configuration port which could allow an attacker to execute commands if connected."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-04",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.instantel.com/service-and-support/contact-technical-support",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-33136",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-05-22T17:15:23.420",
|
||||
"lastModified": "2025-05-23T15:55:02.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:19:40.167",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,12 +69,56 @@
|
||||
"value": "CWE-471"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.0.12.1",
|
||||
"matchCriteriaId": "328CA1EB-FB41-4711-BE39-45F5B5DE1B8D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7234114",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-33137",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-05-22T17:15:23.580",
|
||||
"lastModified": "2025-05-23T15:55:02.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:19:24.883",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,12 +69,56 @@
|
||||
"value": "CWE-602"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.0.12.1",
|
||||
"matchCriteriaId": "328CA1EB-FB41-4711-BE39-45F5B5DE1B8D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7234114",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-33138",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-05-22T17:15:23.737",
|
||||
"lastModified": "2025-05-23T15:55:02.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:19:08.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,12 +69,56 @@
|
||||
"value": "CWE-80"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.0.12.1",
|
||||
"matchCriteriaId": "328CA1EB-FB41-4711-BE39-45F5B5DE1B8D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7234114",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
104
CVE-2025/CVE-2025-414xx/CVE-2025-41438.json
Normal file
104
CVE-2025/CVE-2025-414xx/CVE-2025-41438.json
Normal file
@ -0,0 +1,104 @@
|
||||
{
|
||||
"id": "CVE-2025-41438",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-05-30T00:15:23.003",
|
||||
"lastModified": "2025-05-30T00:15:23.003",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The CS5000 Fire Panel is vulnerable due to a default account that exists\n on the panel. Even though it is possible to change this by SSHing into \nthe device, it has remained unchanged on every installed system \nobserved. This account is not root but holds high-level permissions that\n could severely impact the device's operation if exploited."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1188"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-03",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.consiliumsafety.com/en/support/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-44880",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-20T21:15:23.170",
|
||||
"lastModified": "2025-05-21T20:24:58.133",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:20:04.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wavlink:wl-wn579a3_firmware:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97A1604A-4557-4FC3-9FCC-E38143FA50F5"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wavlink:wl-wn579a3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "55EAFBB8-31E1-4B0F-A5E7-7CD5D9E90132"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lafdrew.github.io/2025/03/27/Remote-Command-Execution-in-adm-cgi-of-wavlink-WL-WN579A3-Device/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-44881",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-20T20:15:41.763",
|
||||
"lastModified": "2025-05-21T20:24:58.133",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:20:11.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wavlink:wl-wn579a3_firmware:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97A1604A-4557-4FC3-9FCC-E38143FA50F5"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wavlink:wl-wn579a3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "55EAFBB8-31E1-4B0F-A5E7-7CD5D9E90132"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lafdrew.github.io/2025/03/31/Remote-Command-Execution-in-qos-cgi-of-wavlink-WL-WN579A3-Device/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-44882",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-20T21:15:23.257",
|
||||
"lastModified": "2025-05-21T20:24:58.133",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:19:48.050",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wavlink:wl-wn579a3_firmware:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97A1604A-4557-4FC3-9FCC-E38143FA50F5"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wavlink:wl-wn579a3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "55EAFBB8-31E1-4B0F-A5E7-7CD5D9E90132"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lafdrew.github.io/2025/03/31/Remote-Command-Execution-in-firewall-cgi-of-wavlink-WL-WN579A3-Device/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
104
CVE-2025/CVE-2025-463xx/CVE-2025-46352.json
Normal file
104
CVE-2025/CVE-2025-463xx/CVE-2025-46352.json
Normal file
@ -0,0 +1,104 @@
|
||||
{
|
||||
"id": "CVE-2025-46352",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-05-30T00:15:23.170",
|
||||
"lastModified": "2025-05-30T00:15:23.170",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The CS5000 Fire Panel is vulnerable due to a hard-coded password that \nruns on a VNC server and is visible as a string in the binary \nresponsible for running VNC. This password cannot be altered, allowing \nanyone with knowledge of it to gain remote access to the panel. Such \naccess could enable an attacker to operate the panel remotely, \npotentially putting the fire panel into a non-functional state and \ncausing serious safety issues."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-03",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.consiliumsafety.com/en/support/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-48066",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-05-22T18:15:43.027",
|
||||
"lastModified": "2025-05-23T15:55:02.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:18:41.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,59 @@
|
||||
"value": "CWE-226"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-212"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wire:wire-webapp:2025-04-14:production0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E9883F99-F67A-4B56-A024-9C50C240E4F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wire:wire-webapp:2025-04-29:production0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35D73783-E715-4CDC-B561-FC9438D20B43"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wire:wire-webapp:2025-05-06:alphaging0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "904A0620-4BAE-4B2B-9E80-BC46DE25827D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wireapp/wire-webapp/commit/4c0ed5f1e9e0fcfceedf3c29034defce6e1fea77",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wireapp/wire-webapp/security/advisories/GHSA-qc6c-2hh8-qfh8",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-48075",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-05-22T18:15:43.310",
|
||||
"lastModified": "2025-05-23T15:55:02.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:18:13.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,18 +95,48 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gofiber:fiber:*:*:*:*:*:go:*:*",
|
||||
"versionStartIncluding": "2.0.0",
|
||||
"versionEndExcluding": "2.52.7",
|
||||
"matchCriteriaId": "0F6C860D-F467-442C-968A-A1A95A3B20BE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gofiber/fiber/commit/e115c08b8f059a4a031b492aa9eef0712411853d",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-hg3g-gphw-5hhm",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-hg3g-gphw-5hhm",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Vendor Advisory",
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-48366",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-05-22T18:15:43.470",
|
||||
"lastModified": "2025-05-23T15:55:02.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:17:53.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -75,16 +97,57 @@
|
||||
"value": "CWE-87"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:intermesh:group-office:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.8.199",
|
||||
"matchCriteriaId": "75D26F94-8800-4913-BD03-48DE532124FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:intermesh:group-office:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "25.0.1",
|
||||
"versionEndExcluding": "25.0.20",
|
||||
"matchCriteriaId": "6B0B1A49-60A8-4332-AC3F-C09167343E53"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Intermesh/groupoffice/security/advisories/GHSA-phhq-3h8f-qxpx",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Intermesh/groupoffice/security/advisories/GHSA-phhq-3h8f-qxpx",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-48368",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-05-22T18:15:43.630",
|
||||
"lastModified": "2025-05-23T15:54:42.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:17:44.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,14 +95,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:intermesh:group-office:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.8.199",
|
||||
"matchCriteriaId": "75D26F94-8800-4913-BD03-48DE532124FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:intermesh:group-office:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "25.0.1",
|
||||
"versionEndExcluding": "25.0.20",
|
||||
"matchCriteriaId": "6B0B1A49-60A8-4332-AC3F-C09167343E53"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Intermesh/groupoffice/security/advisories/GHSA-c49j-qvp9-vgg6",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Intermesh/groupoffice/security/advisories/GHSA-c49j-qvp9-vgg6",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Vendor Advisory",
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-48369",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-05-22T18:15:43.770",
|
||||
"lastModified": "2025-05-23T15:54:42.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:17:25.770",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,14 +95,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:intermesh:group-office:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.8.199",
|
||||
"matchCriteriaId": "75D26F94-8800-4913-BD03-48DE532124FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:intermesh:group-office:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "25.0.1",
|
||||
"versionEndExcluding": "25.0.20",
|
||||
"matchCriteriaId": "6B0B1A49-60A8-4332-AC3F-C09167343E53"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Intermesh/groupoffice/security/advisories/GHSA-45jj-r48j-75pp",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Intermesh/groupoffice/security/advisories/GHSA-45jj-r48j-75pp",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5268",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-05-27T13:15:22.610",
|
||||
"lastModified": "2025-05-28T15:01:30.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:15:17.360",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,57 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
|
||||
"versionEndExcluding": "128.11.0",
|
||||
"matchCriteriaId": "4BA097AB-46D1-4C4E-9856-9109237940C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
|
||||
"versionEndExcluding": "130.0",
|
||||
"matchCriteriaId": "474427D8-84E9-4C4B-8B0B-D5961AF6B28E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "139.0",
|
||||
"matchCriteriaId": "2BC51636-40B4-4FB9-975F-CBF61A91A8AC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1950136%2C1958121%2C1960499%2C1962634",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-42/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-44/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5269",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-05-27T13:15:22.717",
|
||||
"lastModified": "2025-05-28T15:01:30.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-30T01:15:10.063",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
|
||||
"versionEndExcluding": "128.11.0",
|
||||
"matchCriteriaId": "4BA097AB-46D1-4C4E-9856-9109237940C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.11.0",
|
||||
"matchCriteriaId": "1495D4C0-92D7-4384-8730-B59560AD0BEE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924108",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-44/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
57
README.md
57
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-05-29T23:55:18.831432+00:00
|
||||
2025-05-30T02:00:19.706078+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-05-29T23:15:26.680000+00:00
|
||||
2025-05-30T01:26:00.767000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,41 +27,54 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2025-05-29T00:00:04.402072+00:00
|
||||
2025-05-30T00:00:04.322276+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
295967
|
||||
295971
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2025-30466](CVE-2025/CVE-2025-304xx/CVE-2025-30466.json) (`2025-05-29T22:15:21.603`)
|
||||
- [CVE-2025-31189](CVE-2025/CVE-2025-311xx/CVE-2025-31189.json) (`2025-05-29T22:15:21.737`)
|
||||
- [CVE-2025-31198](CVE-2025/CVE-2025-311xx/CVE-2025-31198.json) (`2025-05-29T22:15:21.840`)
|
||||
- [CVE-2025-31199](CVE-2025/CVE-2025-311xx/CVE-2025-31199.json) (`2025-05-29T22:15:21.937`)
|
||||
- [CVE-2025-31231](CVE-2025/CVE-2025-312xx/CVE-2025-31231.json) (`2025-05-29T22:15:22.050`)
|
||||
- [CVE-2025-31261](CVE-2025/CVE-2025-312xx/CVE-2025-31261.json) (`2025-05-29T22:15:22.147`)
|
||||
- [CVE-2025-31263](CVE-2025/CVE-2025-312xx/CVE-2025-31263.json) (`2025-05-29T22:15:22.250`)
|
||||
- [CVE-2025-31264](CVE-2025/CVE-2025-312xx/CVE-2025-31264.json) (`2025-05-29T22:15:22.350`)
|
||||
- [CVE-2025-5307](CVE-2025/CVE-2025-53xx/CVE-2025-5307.json) (`2025-05-29T22:15:22.557`)
|
||||
- [CVE-2025-5330](CVE-2025/CVE-2025-53xx/CVE-2025-5330.json) (`2025-05-29T22:15:22.747`)
|
||||
- [CVE-2025-5331](CVE-2025/CVE-2025-53xx/CVE-2025-5331.json) (`2025-05-29T22:15:22.940`)
|
||||
- [CVE-2025-5332](CVE-2025/CVE-2025-53xx/CVE-2025-5332.json) (`2025-05-29T23:15:26.680`)
|
||||
- [CVE-2020-36846](CVE-2020/CVE-2020-368xx/CVE-2020-36846.json) (`2025-05-30T01:15:20.950`)
|
||||
- [CVE-2025-1907](CVE-2025/CVE-2025-19xx/CVE-2025-1907.json) (`2025-05-30T00:15:22.830`)
|
||||
- [CVE-2025-41438](CVE-2025/CVE-2025-414xx/CVE-2025-41438.json) (`2025-05-30T00:15:23.003`)
|
||||
- [CVE-2025-46352](CVE-2025/CVE-2025-463xx/CVE-2025-46352.json) (`2025-05-30T00:15:23.170`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `27`
|
||||
|
||||
- [CVE-2020-15187](CVE-2020/CVE-2020-151xx/CVE-2020-15187.json) (`2025-05-29T23:15:20.520`)
|
||||
- [CVE-2025-30224](CVE-2025/CVE-2025-302xx/CVE-2025-30224.json) (`2025-05-29T22:15:20.577`)
|
||||
- [CVE-2025-46701](CVE-2025/CVE-2025-467xx/CVE-2025-46701.json) (`2025-05-29T22:15:22.450`)
|
||||
- [CVE-2025-47497](CVE-2025/CVE-2025-474xx/CVE-2025-47497.json) (`2025-05-29T23:15:26.450`)
|
||||
- [CVE-2024-40458](CVE-2024/CVE-2024-404xx/CVE-2024-40458.json) (`2025-05-30T01:17:07.267`)
|
||||
- [CVE-2024-40459](CVE-2024/CVE-2024-404xx/CVE-2024-40459.json) (`2025-05-30T01:17:01.203`)
|
||||
- [CVE-2024-40460](CVE-2024/CVE-2024-404xx/CVE-2024-40460.json) (`2025-05-30T01:16:56.187`)
|
||||
- [CVE-2024-40461](CVE-2024/CVE-2024-404xx/CVE-2024-40461.json) (`2025-05-30T01:16:50.940`)
|
||||
- [CVE-2024-40462](CVE-2024/CVE-2024-404xx/CVE-2024-40462.json) (`2025-05-30T01:16:45.277`)
|
||||
- [CVE-2024-41195](CVE-2024/CVE-2024-411xx/CVE-2024-41195.json) (`2025-05-30T01:16:38.953`)
|
||||
- [CVE-2024-41196](CVE-2024/CVE-2024-411xx/CVE-2024-41196.json) (`2025-05-30T01:16:32.857`)
|
||||
- [CVE-2024-41197](CVE-2024/CVE-2024-411xx/CVE-2024-41197.json) (`2025-05-30T01:15:41.757`)
|
||||
- [CVE-2024-41198](CVE-2024/CVE-2024-411xx/CVE-2024-41198.json) (`2025-05-30T01:15:33.680`)
|
||||
- [CVE-2024-41199](CVE-2024/CVE-2024-411xx/CVE-2024-41199.json) (`2025-05-30T01:15:26.797`)
|
||||
- [CVE-2024-42514](CVE-2024/CVE-2024-425xx/CVE-2024-42514.json) (`2025-05-30T01:26:00.767`)
|
||||
- [CVE-2024-52874](CVE-2024/CVE-2024-528xx/CVE-2024-52874.json) (`2025-05-30T01:18:52.420`)
|
||||
- [CVE-2025-33136](CVE-2025/CVE-2025-331xx/CVE-2025-33136.json) (`2025-05-30T01:19:40.167`)
|
||||
- [CVE-2025-33137](CVE-2025/CVE-2025-331xx/CVE-2025-33137.json) (`2025-05-30T01:19:24.883`)
|
||||
- [CVE-2025-33138](CVE-2025/CVE-2025-331xx/CVE-2025-33138.json) (`2025-05-30T01:19:08.327`)
|
||||
- [CVE-2025-44880](CVE-2025/CVE-2025-448xx/CVE-2025-44880.json) (`2025-05-30T01:20:04.080`)
|
||||
- [CVE-2025-44881](CVE-2025/CVE-2025-448xx/CVE-2025-44881.json) (`2025-05-30T01:20:11.797`)
|
||||
- [CVE-2025-44882](CVE-2025/CVE-2025-448xx/CVE-2025-44882.json) (`2025-05-30T01:19:48.050`)
|
||||
- [CVE-2025-48066](CVE-2025/CVE-2025-480xx/CVE-2025-48066.json) (`2025-05-30T01:18:41.410`)
|
||||
- [CVE-2025-48075](CVE-2025/CVE-2025-480xx/CVE-2025-48075.json) (`2025-05-30T01:18:13.397`)
|
||||
- [CVE-2025-48366](CVE-2025/CVE-2025-483xx/CVE-2025-48366.json) (`2025-05-30T01:17:53.250`)
|
||||
- [CVE-2025-48368](CVE-2025/CVE-2025-483xx/CVE-2025-48368.json) (`2025-05-30T01:17:44.430`)
|
||||
- [CVE-2025-48369](CVE-2025/CVE-2025-483xx/CVE-2025-48369.json) (`2025-05-30T01:17:25.770`)
|
||||
- [CVE-2025-5268](CVE-2025/CVE-2025-52xx/CVE-2025-5268.json) (`2025-05-30T01:15:17.360`)
|
||||
- [CVE-2025-5269](CVE-2025/CVE-2025-52xx/CVE-2025-5269.json) (`2025-05-30T01:15:10.063`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
90
_state.csv
90
_state.csv
@ -150160,7 +150160,7 @@ CVE-2020-15183,0,0,0bbd0c1da337fc8bba588f5e2bd6bfdae94ea8c555f3dbc56bd2bb570044f
|
||||
CVE-2020-15184,0,0,4aebcd3704f7a1bfb5d0e3705fe7fe0e14aa42b668949151b2b4796991d7946b,2024-11-21T05:05:01.673000
|
||||
CVE-2020-15185,0,0,cc5766a153b62bc07b601853e8d639caf5ef64a5fb6601d6b519c96aaf15761c,2024-11-21T05:05:01.830000
|
||||
CVE-2020-15186,0,0,302f7ba6d0072df2bfc756f60c86934a698fe704bd2a1090e36c6c836aa47787,2024-11-21T05:05:01.987000
|
||||
CVE-2020-15187,0,1,b9381d0c09b0257a40191e4ba212b01b1e82e9122eb44f9dc74d973f0440002b,2025-05-29T23:15:20.520000
|
||||
CVE-2020-15187,0,0,b9381d0c09b0257a40191e4ba212b01b1e82e9122eb44f9dc74d973f0440002b,2025-05-29T23:15:20.520000
|
||||
CVE-2020-15188,0,0,01977825d44a72064d75c73b9751030fb5d6191a5bb2ca886c28b2451008dfd0,2024-11-21T05:05:02.270000
|
||||
CVE-2020-15189,0,0,ef813d7445d80c4e33da98c4a1fa9d9e9cd55b96408059936672a81a8625470f,2024-11-21T05:05:02.407000
|
||||
CVE-2020-1519,0,0,2c35e10547c5dd939f5d7b85ac6b78181c97a1a554ae00a50d69307fae8687d1,2024-11-21T05:10:44.430000
|
||||
@ -159623,6 +159623,7 @@ CVE-2020-36842,0,0,aa409bdde21a1952d265f5aff9fddfa11fdb1da8db2d6b76fb10ddce24ac9
|
||||
CVE-2020-36843,0,0,023fb2c50bcc67a3bb33f41e6bdffdf9e9ccdfb393ddc1b6592a73ee3ce02ee8,2025-03-13T06:15:34.043000
|
||||
CVE-2020-36844,0,0,60e3130f50ab126fc421bc412edf77c062fd6e2253b802f57f2b68c1e0de80e5,2025-05-13T14:27:46.340000
|
||||
CVE-2020-36845,0,0,b56b8c9dc3675888b9f2a011874d766edcadea309bedb24a6277c02b91d1a109,2025-05-13T14:27:55.550000
|
||||
CVE-2020-36846,1,1,a7468bab106827129da5c477bf1d4f1880f032fd73fecc66e9b3511097ddfcb0,2025-05-30T01:15:20.950000
|
||||
CVE-2020-3685,0,0,ebc768dfe955ad0c52041c7e2608a91c2b5719c6059fc65a66fc055e90d4e6b0,2024-11-21T05:31:34.290000
|
||||
CVE-2020-3686,0,0,fed42ed77b3514bcd56d213454eba10c6543e81893514c48ebacb4355f05304f,2024-11-21T05:31:34.463000
|
||||
CVE-2020-3687,0,0,4f5fc687e6ec97625652ba8cc878e5dcedb758a9b86899e8a0bd5d38bccb2613,2024-11-21T05:31:34.637000
|
||||
@ -167857,7 +167858,7 @@ CVE-2021-21260,0,0,670c3e5d21facb56f5e499429899e6a95f2bf51be50af5baddc62edc174cf
|
||||
CVE-2021-21261,0,0,7e376e7e90df16219956b7f121a7724ad3212ffb3cd83a583f762bb8ed11d1ac,2024-11-21T05:47:53.037000
|
||||
CVE-2021-21263,0,0,e1ea1ac11965e5cffa8082ba1786a6593cffa97a44cc8b4c7125adbe4530c296,2024-11-21T05:47:53.180000
|
||||
CVE-2021-21264,0,0,0e4719456f55e5e2b9d7d068ae00da9bcce031ba06fc42e23bdd455f9dd1dbd7,2024-11-21T05:47:53.340000
|
||||
CVE-2021-21265,0,0,108bff2b5e97c357e6a32cd76f4f6b654d264b994a124eb4bc26013f0bd69962,2024-11-21T05:47:53.477000
|
||||
CVE-2021-21265,0,1,d13da4143fed881f35e3962ecdd55dd02cc03945cb6c675c5b2abcdbb075e9cc,2025-05-30T00:15:20.330000
|
||||
CVE-2021-21266,0,0,dec5f25693c6bf77e5e5018fccd01a52a9ae78067f8cfc6d537ff201efd30824,2024-11-21T05:47:53.610000
|
||||
CVE-2021-21267,0,0,739d474bb98e7c31e8839a7d0c8ab57fec9cc48cdc98523b6496de38c3354228,2024-11-21T05:47:53.753000
|
||||
CVE-2021-21269,0,0,115fc8b8ebc02eb681c3972d5ae75d37571e04d83cc28cee0aeae47d1a641ac7,2024-11-21T05:47:53.877000
|
||||
@ -174200,7 +174201,7 @@ CVE-2021-29501,0,0,fbb0626f7ce6d8c58978b32413ae00ecd3117a12da17d8400f8a4e33dabe7
|
||||
CVE-2021-29502,0,0,485b1514ff061635ab26628e3d2c9642a7f91ddd5a5c5cdca1f83b4cd51291c1,2024-11-21T06:01:15.617000
|
||||
CVE-2021-29503,0,0,6495dd51194baaf2e0b5565e7f7d0f8a7dc1d5106a48cab962c20131de1bf4cc,2024-11-21T06:01:15.737000
|
||||
CVE-2021-29504,0,0,11b9bab4d5340b7e43b0f770dd0a28b784276fcc80345bfc5edfa574e9e27fd0,2024-11-21T06:01:15.860000
|
||||
CVE-2021-29505,0,0,6fcfb39d41e58e96914cf8f9a16f73e3da796d3919d04026bd79c34f4b839d11,2025-05-23T16:53:47.953000
|
||||
CVE-2021-29505,0,1,86361fb109cec28f9bfcf7e2f0584f02dd3dbd0375ff3f021c35728353a76f20,2025-05-30T00:15:20.543000
|
||||
CVE-2021-29506,0,0,d7577c1294d7af9ecdd57f5ccd37c920630c990d7ff63b205596572b9444cf77,2024-11-21T06:01:16.210000
|
||||
CVE-2021-29507,0,0,7fd88eb0a87b5dafdc1889c533d8cc8044852710acea551ccc2900438e5c22c7,2024-11-21T06:01:16.337000
|
||||
CVE-2021-29508,0,0,7bfaea7efcf27d8d9fd3793449784ee5ddf0ee913920573a7fa2a39ea93f7a56,2024-11-21T06:01:16.453000
|
||||
@ -265603,12 +265604,12 @@ CVE-2024-40453,0,0,44028ded5df7ca69cdf493f195db9cc0d99fa7bb7b128c31936f66f8a0891
|
||||
CVE-2024-40455,0,0,de7fbbe58f22122912bb4505b4fac34aed399683e93e39080dcf369a911444ce,2025-04-28T14:44:33.090000
|
||||
CVE-2024-40456,0,0,b282c3faed2b169890d7c393ead6de175fbbf60b11c5017118af2cac3eb0aed1,2025-04-28T14:43:04.063000
|
||||
CVE-2024-40457,0,0,390d8a58e2d154cd9c58a3e4748ba4c5a47c1d045aaef6fb95193c7f046d0256,2024-10-31T20:15:05.173000
|
||||
CVE-2024-40458,0,0,dcafa1c9c09748e4ec9c3f75076f25246e632f2b5cd04a981fa0c4a2902a0b30,2025-05-23T15:54:42.643000
|
||||
CVE-2024-40459,0,0,f7c7aa3dd5d285fe5266c24d1685f6200b010c86f030bce556e1f47a6e7ce528,2025-05-23T15:54:42.643000
|
||||
CVE-2024-40458,0,1,eeae4b4435be98e3a3b4172f657b5b0f21cad448d4031dd2bd65620f57f8cefe,2025-05-30T01:17:07.267000
|
||||
CVE-2024-40459,0,1,78fcde479f57b50c40755c9b540861c7825f7b0571b66f0df71747948e9a81c5,2025-05-30T01:17:01.203000
|
||||
CVE-2024-4046,0,0,138bf9d15d808a387f1842c46e6552085e59aca18c14e013e3ba3c3747ce3bc9,2024-12-09T19:01:57.977000
|
||||
CVE-2024-40460,0,0,2448eacd98d3fd285ae55ef569eb62702065cc508361d4c034a58c5459181699,2025-05-23T15:54:42.643000
|
||||
CVE-2024-40461,0,0,7a8a3ab9a19b7118829c101e04a14e1e5b7d2e5e613c0b26e8776f52c51795e0,2025-05-23T16:15:23.190000
|
||||
CVE-2024-40462,0,0,2117e71b66004e7d3073009c8ba77117d2778799eea786ccdef83a72f9527b52,2025-05-23T16:15:23.363000
|
||||
CVE-2024-40460,0,1,66cf14b4d75f72452b1bf8ee3757af2bc1fadfb52046ab32cb3fecf602026911,2025-05-30T01:16:56.187000
|
||||
CVE-2024-40461,0,1,e0a6db9824c974a26c30e4d95470335a5134d11065be6b8c591cbd592c12727d,2025-05-30T01:16:50.940000
|
||||
CVE-2024-40462,0,1,84e1306edb2ee8044680a76097af638745f6234190454f2fc39ab4a5e8b8b175,2025-05-30T01:16:45.277000
|
||||
CVE-2024-40464,0,0,24a2b11fcc0b71c0371d2caf323eabbeaed9510a92bc85a0da1ff652186f468c,2024-08-15T13:02:33
|
||||
CVE-2024-40465,0,0,644c0216c1506c1099bd3b6b869de679733a4cf67f89d86d85eb11fe0a995535,2024-08-15T13:11:07.570000
|
||||
CVE-2024-40472,0,0,bcf095f49103f8be65b2fbbe82c9e00a5906120507f3f06b91ce19a94ecfd7e9,2024-08-15T13:25:05.657000
|
||||
@ -266251,11 +266252,11 @@ CVE-2024-4118,0,0,8bf149a8f64d211137fcc1dd07139bf2cce504fc2fcbfd4bda0a4a22ff04bc
|
||||
CVE-2024-41183,0,0,f677e899ab8799bb9f70193d6b51e0e3321c7af6a87ef63580df64ff3a485660,2025-03-13T17:15:32.703000
|
||||
CVE-2024-41184,0,0,d11bdf2832a9e13e0b0593f5c54f38254bc5a5ef842984b77ca034047fda34a0,2024-11-21T09:32:21.433000
|
||||
CVE-2024-4119,0,0,53e147e50dcbb0b5d57056a958b73c1df1f4f6ca04c064535d9914f749acd2a3,2025-01-15T18:42:59.407000
|
||||
CVE-2024-41195,0,0,244b4a7214879a1fd06ee87d48a3c822f922186eb43a404830ce527642dfd75a,2025-05-23T16:15:23.533000
|
||||
CVE-2024-41196,0,0,3c101a117157427a1cd1bb236d2a1f1e5c20ab8dbd74cab7b945c543bb17d31a,2025-05-23T16:15:23.700000
|
||||
CVE-2024-41197,0,0,0534c55c112ee90e7a69f35e40b2df20f64ea47ae04da1cd9e6d6e93d4900791,2025-05-23T16:15:23.863000
|
||||
CVE-2024-41198,0,0,a2ce7964b2738e3a02abf209a71d9bee39efbe60a0658296913ad98ab0a88931,2025-05-23T16:15:24.033000
|
||||
CVE-2024-41199,0,0,d738bcfb2bb488a2f621b8a5e2f77e83a7c913af2fb72e5416c5ceaaa393b500,2025-05-23T15:54:42.643000
|
||||
CVE-2024-41195,0,1,161daf8366a05dd3e3099cb8e54a19fff78f3dc3f732cc8fa120430a4b69d1cd,2025-05-30T01:16:38.953000
|
||||
CVE-2024-41196,0,1,f2e82fff23fd65032209a41657407035a3506adacf153531453fe08eccddf592,2025-05-30T01:16:32.857000
|
||||
CVE-2024-41197,0,1,6d28392cc9418f05699ed01b28f619e17311e3589458bb85822208f5a06fc13e,2025-05-30T01:15:41.757000
|
||||
CVE-2024-41198,0,1,4daadd79450515013d2339251c4cdf7b55a871952c4c8d30628c61d6d883b967,2025-05-30T01:15:33.680000
|
||||
CVE-2024-41199,0,1,ba6ef0aecef4a73a9f688f85181618ff405576ea3f5709d1c0abd66325654a3e,2025-05-30T01:15:26.797000
|
||||
CVE-2024-4120,0,0,a33a79c72d67b8a0d2013315702723845274e337714c41179d71798f1e81b436,2025-01-15T18:43:08.337000
|
||||
CVE-2024-41200,0,0,e441357b55ebd7a4569c027610f2b32e91c4bcfb68fbb54281a5e99e9ea9d206,2024-11-05T22:35:06.980000
|
||||
CVE-2024-41206,0,0,6e4ceb70882bd84fa7714bb2eda4e3bcf8266ff2a972ce92f9eea956a11d629c,2024-11-15T19:35:08.297000
|
||||
@ -267312,7 +267313,7 @@ CVE-2024-42509,0,0,eca853432fd85e8e27d923a0722a00e8ab0664b46803cacaccfabef1e63cc
|
||||
CVE-2024-4251,0,0,6a333dd704aaa4313e0204d6e743164fe6a8a7155958341655c766a433d4252d,2025-01-27T18:22:36.203000
|
||||
CVE-2024-42512,0,0,3dc22e96500ae6f3fd8bb28e53fdde25e5a2eabfed0c97b7b9f47bc751ab5787,2025-02-10T22:15:33.307000
|
||||
CVE-2024-42513,0,0,cab1d1f044f1d50b40559be1018cfc2ad7835e203275e93c1a591001b61c9da2,2025-02-10T22:15:33.497000
|
||||
CVE-2024-42514,0,0,054904ffa1271a48858c27639a4f212945cad4d4eba2b0403080625082e79d9d,2024-10-07T19:37:19.973000
|
||||
CVE-2024-42514,0,1,dc6bf57276df80d94425f3e87e4ffd35450f06095903447e9bfd0d20b2506ca8,2025-05-30T01:26:00.767000
|
||||
CVE-2024-42515,0,0,b4ba8f757b46c5b5582e08c4488010c57606be0ab98ee3dd9524f14ea7dfdfcb,2024-11-01T16:35:25.690000
|
||||
CVE-2024-4252,0,0,b027ab4b8de5ee8c4baf37e041444c874ccee9af350563490b809bedf82aa24f,2025-01-27T18:27:19.633000
|
||||
CVE-2024-42520,0,0,8efdfa32af414d36b5f0e9904b69a768bde856f36d5b8c9699ca2d90a3457ec9,2024-08-13T15:35:16.110000
|
||||
@ -275006,7 +275007,7 @@ CVE-2024-5287,0,0,566c0092592429f6a0f9cf1bb5d88729dcb3f5eae9340faa4d589fc4172ac4
|
||||
CVE-2024-52870,0,0,1a3a6d971d4bd90b76dc72d1f20af849443ecb143b46e583f633f2d3b372f550,2025-01-17T22:15:28.663000
|
||||
CVE-2024-52871,0,0,bc912334ad7760e2905477f1da15c92d58ec818da9de2502b7206c7a0336bc4d,2024-11-18T18:35:09.027000
|
||||
CVE-2024-52872,0,0,d5c137691ac8affde2eb9f0d98f11a2242b42b7ed558ce4003950a43927045f3,2024-11-18T18:35:09.270000
|
||||
CVE-2024-52874,0,0,f06e6a9400af72484d778641e999c7695fe8ec9a4b834628f2fa57ae81168966,2025-05-23T16:15:24.817000
|
||||
CVE-2024-52874,0,1,52576182d175133e523562535334a82a7d49664c9e5655dd0c887880097a7116,2025-05-30T01:18:52.420000
|
||||
CVE-2024-52875,0,0,1ac4526d2c044d382cc0f35ef9e40c2813ed4958da8686e71b5eb97bc5d89bd5,2025-01-31T08:15:07.827000
|
||||
CVE-2024-52876,0,0,6fd21241a1a4f5f736d93e368fdcf08c204bdebd19eb249ace2fceb507212592,2024-11-18T17:35:08.900000
|
||||
CVE-2024-52877,0,0,9c3067e0b499d8fe38d63c0fb33cd8a42b9d4a1ff6d2be5158f2b8014c8614a3,2025-05-19T20:15:20.227000
|
||||
@ -283788,6 +283789,7 @@ CVE-2025-1903,0,0,6d340e8ed917a821f64df99818d24e210d21c9915d508adde3298f17a8197a
|
||||
CVE-2025-1904,0,0,f1403f89463521fa6ecf20ea0b63150d28c96f5825eb8230b39ee2a81e24b378,2025-03-06T12:20:33.473000
|
||||
CVE-2025-1905,0,0,2b4eb6efb4aab05c0b5f79955f2e8fa7379c3a611db1f2d5266246ca15810f0c,2025-03-06T12:21:06.503000
|
||||
CVE-2025-1906,0,0,25be12853bbdada8a0f0b6f9783f2e12a1ead904ee5fe2efcc8d708d8d5a84e0,2025-03-06T12:17:27.613000
|
||||
CVE-2025-1907,1,1,4690f8483bb44ff398b937f1505dde9051e4a7855b57536b4847b4cb66b139e2,2025-05-30T00:15:22.830000
|
||||
CVE-2025-1908,0,0,54102afe78dfd9ba90dde1515e764f3bc5ce380e066d2c9a94226102b5e94ebd,2025-04-29T13:52:47.470000
|
||||
CVE-2025-1909,0,0,278894b5b5f89b9338b95357b21f5abf31cdfe96bb50b4cea5a0478b0d55215c,2025-05-28T20:03:54.720000
|
||||
CVE-2025-1911,0,0,2e91c6b1d959cb6ca722089184997cbda20efda4aa5d2ef28d2794cac01c676f,2025-03-27T16:45:27.850000
|
||||
@ -290377,7 +290379,7 @@ CVE-2025-3022,0,0,3e5c3522912a5af9f22a50e01e2ab86007dcf43ad518eed68ffde4cec152f8
|
||||
CVE-2025-30221,0,0,b78962d7d374d57624c57c2bd45520ed73de256e6210780692f628d0e7b67d45,2025-03-27T16:45:12.210000
|
||||
CVE-2025-30222,0,0,8181bb8e50b5d5403e3aeeed651e80d360ebd306c6c001c9fd5d8239df2af092,2025-03-27T16:45:46.410000
|
||||
CVE-2025-30223,0,0,31b61b937326178d46925dc0ef3d6b549ce269034fb63371f6368418121b1ad9,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30224,0,1,4a5da5d18683dad9b13849baa455183b16937940e3de00549e5c3794d7daf746,2025-05-29T22:15:20.577000
|
||||
CVE-2025-30224,0,0,4a5da5d18683dad9b13849baa455183b16937940e3de00549e5c3794d7daf746,2025-05-29T22:15:20.577000
|
||||
CVE-2025-30225,0,0,cc37e4f779c1e97cd26219457ed556549a6b6364424a050cb8b68a80d988d93c,2025-03-27T16:45:27.850000
|
||||
CVE-2025-3023,0,0,c0506f7d95f0b17e7bc0a73f1252e5bd69aa40179970119460c1a5bbe9e48c68,2025-04-09T23:15:38.053000
|
||||
CVE-2025-30232,0,0,eeb8ece2fb628c02d10a566625252905e84a897de93ba8f383987da02d0cb6af,2025-03-28T18:11:40.180000
|
||||
@ -290553,7 +290555,7 @@ CVE-2025-30462,0,0,4bdec634bf22dfe7000ec2114c1948d8376bfcc7de65e9822131d6f1494f7
|
||||
CVE-2025-30463,0,0,05cab9a88b5fe14651fb4091f32724013a6b709979189bb9339db2ad3e72b102,2025-04-04T18:12:18.250000
|
||||
CVE-2025-30464,0,0,162cd6362752c0f31ef3dab640c358c1acdde6a03810f6f12a55bd6714d97e42,2025-04-04T18:16:18.353000
|
||||
CVE-2025-30465,0,0,6662e5d084f4b08d9b14aed1394c2c5112e2e03c0e03b4486bd615995b89d730,2025-04-04T18:16:13.317000
|
||||
CVE-2025-30466,1,1,3cd8756623f5d67692d3952ab65c85d5f980e7baac3d0d728f08cb785009ef3b,2025-05-29T22:15:21.603000
|
||||
CVE-2025-30466,0,0,3cd8756623f5d67692d3952ab65c85d5f980e7baac3d0d728f08cb785009ef3b,2025-05-29T22:15:21.603000
|
||||
CVE-2025-30467,0,0,a719241a9705392d42f30d7c189aba650161488350f36a52aac6c1d3080c65bc,2025-04-04T18:15:47.390000
|
||||
CVE-2025-30469,0,0,12dc8780539236a700bd1bfbc0ce6f4be605db998e5fb59430520d0b2b69f417,2025-04-04T18:15:42.680000
|
||||
CVE-2025-3047,0,0,cfa884e8622bfe4e7e55cdf5c7dcf2b226d404ef83a560c54bf8e30b5596fe5f,2025-04-01T20:26:22.890000
|
||||
@ -291121,7 +291123,7 @@ CVE-2025-31184,0,0,37da5da86ab459cad0437a10e1eff0088f482ec7ea7501c948d974d21033a
|
||||
CVE-2025-31185,0,0,8e91b3cb89e02d90a681a32d2eefc9d6f2abd150038b458001ae12815bf830e0,2025-05-28T14:19:08.990000
|
||||
CVE-2025-31187,0,0,a6105b8146b15b371ec11e675e56d0f333e59f34cafc14af70a8938c57646155,2025-04-04T18:14:40.860000
|
||||
CVE-2025-31188,0,0,ac4daf7978b232d97009f92d676a349b7b690088900d1cffde25ff14738c94f7,2025-04-15T14:12:09.620000
|
||||
CVE-2025-31189,1,1,d90114e35f7300ebd8052be0bbc98779de4e2a57899770b01b9c383929a235cd,2025-05-29T22:15:21.737000
|
||||
CVE-2025-31189,0,0,d90114e35f7300ebd8052be0bbc98779de4e2a57899770b01b9c383929a235cd,2025-05-29T22:15:21.737000
|
||||
CVE-2025-3119,0,0,fb28a13fa5f6c3ec2d64e255d291586b142600588109911726796634ee9c18f3,2025-04-09T20:29:51.413000
|
||||
CVE-2025-31191,0,0,842b811b8d5d4e71ebc9fcfeec8564f604bccb1b1c8cfafc92788e53f2ae22c6,2025-05-10T17:15:52.630000
|
||||
CVE-2025-31192,0,0,7592453ba1ec969e1c33159c4b526124f89adec761e1812d1595bac9e2f595e6,2025-04-07T13:31:45.807000
|
||||
@ -291129,8 +291131,8 @@ CVE-2025-31194,0,0,03f4d110302543c66a4fd7a7b9480fc20da220403b3309cb642a2155d37d3
|
||||
CVE-2025-31195,0,0,a55e70930e2e3c63acb9c91b6e9dd9e47a6c8b9157668e459b638202d442e577,2025-05-27T13:57:41.770000
|
||||
CVE-2025-31196,0,0,defa8929763af29845ccf545bdba5e58bea7508b2df24ef358b3de433bc6a125,2025-05-27T13:57:35.067000
|
||||
CVE-2025-31197,0,0,3398c0e8feb5507293c959674dbfa0a4b75f3b8ba43cb526b7c5a4336b7dddfe,2025-04-30T16:15:35.520000
|
||||
CVE-2025-31198,1,1,874acdaee62ae585166714955c72ad937436652a3273b5196c130d1e3b86a0f4,2025-05-29T22:15:21.840000
|
||||
CVE-2025-31199,1,1,ed48f43623b84e6531871ceff43ba257d58aed1d1853fb899a46b0beb8a9e3fa,2025-05-29T22:15:21.937000
|
||||
CVE-2025-31198,0,0,874acdaee62ae585166714955c72ad937436652a3273b5196c130d1e3b86a0f4,2025-05-29T22:15:21.840000
|
||||
CVE-2025-31199,0,0,ed48f43623b84e6531871ceff43ba257d58aed1d1853fb899a46b0beb8a9e3fa,2025-05-29T22:15:21.937000
|
||||
CVE-2025-3120,0,0,5145ab91a3b905f41026add1f6ff9bff84c48f68b4513bce38bedbeffe905195,2025-05-07T15:45:50.257000
|
||||
CVE-2025-31200,0,0,a74f3af296b68c60f67b1de629944e384bb830a561ceea1f2a5727cedcce4f22,2025-04-18T13:50:15.483000
|
||||
CVE-2025-31201,0,0,e7a89cad97e6db05e56e18d53afb0ef797d06486568ee4e0af2d0bab9bccd568,2025-04-18T13:47:59.890000
|
||||
@ -291162,7 +291164,7 @@ CVE-2025-31226,0,0,0b0c192e846514355ff449664d74ecca42e4d16f15776048d92859f8b106c
|
||||
CVE-2025-31227,0,0,2f54ed7ad08db6e3b35b95176667b7f97fa5e017490ac1ae3046707b1e5c6d49,2025-05-27T21:28:17.303000
|
||||
CVE-2025-31228,0,0,dacddfa42ef2d34bed959288cf0f276da35e9247a1addeecea213a1b2a954da1,2025-05-27T21:27:47.040000
|
||||
CVE-2025-3123,0,0,0afe1eb87424419c317945dcb2596cb02113099736f56ed7efb1537a611228a3,2025-05-28T15:56:33.173000
|
||||
CVE-2025-31231,1,1,74bef6cf9b56098603cf7069b7da2b8cf3026e9cdb5623bbe2b1da97eb81e7f7,2025-05-29T22:15:22.050000
|
||||
CVE-2025-31231,0,0,74bef6cf9b56098603cf7069b7da2b8cf3026e9cdb5623bbe2b1da97eb81e7f7,2025-05-29T22:15:22.050000
|
||||
CVE-2025-31232,0,0,929fbcdeba14bd9f65656e50f1d8551403e76de8d6996b68d043c76c28f8333c,2025-05-27T21:27:43.033000
|
||||
CVE-2025-31233,0,0,ef05b27fea1c15c004dd2e3e7e8cb97de624c6d9c60510c6518ebdc0bbf941be,2025-05-27T21:27:39.140000
|
||||
CVE-2025-31234,0,0,b8a1382e3cdc4f02d2c02ead4701102e4cacdbaa797e55ae94098afbeac292ba,2025-05-27T21:27:34.300000
|
||||
@ -291188,10 +291190,10 @@ CVE-2025-31257,0,0,a5452f273fcf3519c013d71f7047adf1c081bf9e7d4637eaa64b11702f063
|
||||
CVE-2025-31258,0,0,3a68c5a45835571adfeaf2cd60890feb2470ce8da5f569d1ec5b4a2aa9537471,2025-05-27T20:04:54.470000
|
||||
CVE-2025-31259,0,0,58aa3fe000d9fd54882741087fb8c4bef11ee6d048be6cea4692fa3a1bc83bd7,2025-05-27T20:04:45.907000
|
||||
CVE-2025-31260,0,0,97f1087f96d08dd66d679fbf0003dd18d73e0a2dc386ab135a2a6e50a6418fc6,2025-05-27T20:04:38.437000
|
||||
CVE-2025-31261,1,1,5f82ce1768a81f5e2e2e912e43888fcbb20b4ffdf7a8e71c48987f78187c2fdd,2025-05-29T22:15:22.147000
|
||||
CVE-2025-31261,0,0,5f82ce1768a81f5e2e2e912e43888fcbb20b4ffdf7a8e71c48987f78187c2fdd,2025-05-29T22:15:22.147000
|
||||
CVE-2025-31262,0,0,7599e648849bdfa2172ff63c139068eaa0fd9196c21c6b9b97d7ada151e0e86e,2025-05-28T14:18:57.337000
|
||||
CVE-2025-31263,1,1,b128329ff282d9dbda66e6c06d8aeb47ecd43f715cfe65d2a07bfd8bbfb23d57,2025-05-29T22:15:22.250000
|
||||
CVE-2025-31264,1,1,9e79721997c128564bf823a4d6228eef73d42f636442e6c5f8d7293122e59511,2025-05-29T22:15:22.350000
|
||||
CVE-2025-31263,0,0,b128329ff282d9dbda66e6c06d8aeb47ecd43f715cfe65d2a07bfd8bbfb23d57,2025-05-29T22:15:22.250000
|
||||
CVE-2025-31264,0,0,9e79721997c128564bf823a4d6228eef73d42f636442e6c5f8d7293122e59511,2025-05-29T22:15:22.350000
|
||||
CVE-2025-31282,0,0,e42cf63dbb0fe720b3cff193b25f790bd6ddf2c2ce7f9ecf83cd2fa7f8f4826f,2025-04-07T14:18:49.830000
|
||||
CVE-2025-31283,0,0,f1c9b9a8bd26581142b32e65b03aa48b10749e70986d31aa3500b4055b161aed,2025-04-07T14:18:49.830000
|
||||
CVE-2025-31284,0,0,414b38cf46319d544e3e7ccb1bcdd15c60d390dd05075a67d2ab6f13acabecaf,2025-04-07T14:18:49.830000
|
||||
@ -292616,9 +292618,9 @@ CVE-2025-33104,0,0,ce493789d7031f1aa7fdbd052662901a982b8a28c0736ec1b9c5ee4d95c43
|
||||
CVE-2025-3311,0,0,e74d5ecfc9cc851d8a2375e0e95746ca34d32a4ae1bff25c4184cdeb743a156f,2025-05-28T21:08:38.403000
|
||||
CVE-2025-3312,0,0,d314cd0e3d98597c32289b5f3f4209f174e16c52e8e6ba2862a75de1162b07d0,2025-05-07T16:45:29.103000
|
||||
CVE-2025-3313,0,0,8c3e746212b0f7e34691b425d570770595ed2ddcf9c85476d8c05485bbf5b80a,2025-05-07T16:45:47.623000
|
||||
CVE-2025-33136,0,0,ed8cd13d0e551e91274875bdc4caaecebe4e172b38f4ef45b9a818b42fd494e3,2025-05-23T15:55:02.040000
|
||||
CVE-2025-33137,0,0,14a0bc2aed422749ab1e49448a94c31674cbf4f1b9a3684983ffa1492057d082,2025-05-23T15:55:02.040000
|
||||
CVE-2025-33138,0,0,a655bdc4307c12ca6fd0fd8aec842daaff58c08be25320c1f9699dab8e0799a3,2025-05-23T15:55:02.040000
|
||||
CVE-2025-33136,0,1,27a78f34bfe266c2ec4d98dca65066403e26999ef14696ceea2068909ce50e9f,2025-05-30T01:19:40.167000
|
||||
CVE-2025-33137,0,1,7682521c272fc983898f262d7a26ae95a5457c4ccfa28cf239219cc364559be5,2025-05-30T01:19:24.883000
|
||||
CVE-2025-33138,0,1,f3d1012b42eac58fa1f42c87b8a1dc935860a508ecaa92c1dd820b8baddddfe0,2025-05-30T01:19:08.327000
|
||||
CVE-2025-3314,0,0,b0e48e6a3f8b9661934730a17a6390ace506ff9a0ff428767c25879bd6d8d360,2025-05-14T21:02:19.217000
|
||||
CVE-2025-3315,0,0,1f847c098518c83189dbeef46d9312e1f2d8310d8f0e759ad841eee668fc10bc,2025-05-14T21:02:31.867000
|
||||
CVE-2025-3316,0,0,3e88a15102379c98d458fd3db7b2ca0fb380819b90213305e7a63c89acf48439,2025-05-07T16:45:57.510000
|
||||
@ -293900,6 +293902,7 @@ CVE-2025-41429,0,0,785edbb9428ab75f9ce49605baef089838a4f7d9c3a250c30dec518c67c17
|
||||
CVE-2025-4143,0,0,3a393d8ebe58f1f33890c3bd1fbf19f7d13ee6d06509ac73d2c28267c5f302ad,2025-05-12T19:39:43.820000
|
||||
CVE-2025-41431,0,0,457130baf4dd6b7cc1c6ae128560ec31a298f522cc0ef7f373b70c3f0729af10,2025-05-08T14:39:09.683000
|
||||
CVE-2025-41433,0,0,f6273c3cc0a212df803e85bf8ba3fed5695ff63848595dbd80f25b739ca0954c,2025-05-08T14:39:09.683000
|
||||
CVE-2025-41438,1,1,64a64d0ce20850a8f005bc92ed39ab433e38e7cbcf5eb7e56945a8a3cd5c8741,2025-05-30T00:15:23.003000
|
||||
CVE-2025-4144,0,0,ed44a24e80e1487d547bfe32499c8ba4450309e0e9d0acd2df7ebfcd519c74a9,2025-05-12T19:39:31.053000
|
||||
CVE-2025-41441,0,0,0a096bf023b4f4fd329513f04e526322e1b86971286fe310628b892c603b1ecb,2025-05-28T15:01:30.720000
|
||||
CVE-2025-4145,0,0,fa58d4933201d65cc9b44e9816af7313e719b690552f69a8a0e4a077c4fb877f,2025-05-12T19:39:15.540000
|
||||
@ -294356,9 +294359,9 @@ CVE-2025-44872,0,0,50eec1162e1494a61aead0f1752f05730373336b7bea6313dbcc6c6e3a090
|
||||
CVE-2025-44877,0,0,9e059dc100534ee697bbb39499a25ba9ca8d9b909fd378a2222c5753de33e2fc,2025-05-27T14:21:50.710000
|
||||
CVE-2025-44879,0,0,ff1ef867ce69e37912432278bb7e0aa14cd74213d1fc79ab0c52cd134a93eccd,2025-05-16T14:43:26.160000
|
||||
CVE-2025-4488,0,0,6a99f0313dc7f97a5c97149c95e04b5ae66bfa8e7bdbbb32a1650fd0a61c4703,2025-05-13T19:02:35.513000
|
||||
CVE-2025-44880,0,0,467c5cb40a69a7d14616d52475eb2a6494f8ed4a8f8475fe28e5229494aa1ca4,2025-05-21T20:24:58.133000
|
||||
CVE-2025-44881,0,0,5bf3f8f9dc968976e5423180a372edf9d0105c6438b555ae1fe84ca943f5c3d3,2025-05-21T20:24:58.133000
|
||||
CVE-2025-44882,0,0,456a29ebe583262de8cca144429c084f0103ee96e2b1b67f5b33d97e3d5e0e27,2025-05-21T20:24:58.133000
|
||||
CVE-2025-44880,0,1,5323c4c1dc5ac8c2d6c56b6eabf105172050249f790caad2a7f7c76a24bdfe0b,2025-05-30T01:20:04.080000
|
||||
CVE-2025-44881,0,1,535e5c3b728ac259ed5bed7dfd090d5b376680cdb01beca43cf6631bdca470d7,2025-05-30T01:20:11.797000
|
||||
CVE-2025-44882,0,1,1b5e46eca740c41452c9d047a429d1f699c6d2094e3e13c78fc046221c681475,2025-05-30T01:19:48.050000
|
||||
CVE-2025-44883,0,0,3838c4750b3ba1a6f09b881a54c8fed58f54547030957593e9efe56e11eea572,2025-05-29T15:54:04.067000
|
||||
CVE-2025-44884,0,0,6bda8f123c68e3d9ced1682b64ae253c5fc7896500b5699503089aa148acd44f,2025-05-29T15:54:57.493000
|
||||
CVE-2025-44885,0,0,d55fd048d444884c74190c6f28587499595482118686fefa0232eadaf0fda2e1,2025-05-29T15:54:50.920000
|
||||
@ -294637,6 +294640,7 @@ CVE-2025-46347,0,0,f93970d16a6579dd0d46e3d23dde4ca90b5bc29df0821cb9205ebfab24000
|
||||
CVE-2025-46348,0,0,99dbe0bf8506cd9f6a243d5e66318a6c2a7c634489bd4adbb540d1e30e20746c,2025-05-09T13:58:53.453000
|
||||
CVE-2025-46349,0,0,1714a97271744ee922f4bd027ddde23d095fab400e525c7e78a72152293a3a42,2025-05-09T13:56:42.180000
|
||||
CVE-2025-46350,0,0,e9c2d732d02d04db30379a06f4d06a3199d3f19fe29e090eebfdcec4aeb7f535,2025-05-09T13:57:36.823000
|
||||
CVE-2025-46352,1,1,4b52075e6b233532b83dae5f6206df03ba912c22a66bc6b87180c22c65464691,2025-05-30T00:15:23.170000
|
||||
CVE-2025-4637,0,0,6a6f5a6b16c4a5dc9c7dfdefe827d1876d1a6cd89fb863be894c5faba3f21b65,2025-05-16T14:43:56.797000
|
||||
CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000
|
||||
CVE-2025-46375,0,0,c7cadd24d0c0ef6263c2e4f0e993c1b14e1cbac838119ad2f4f42dcfb3b1b113,2025-04-24T03:15:15.867000
|
||||
@ -294859,7 +294863,7 @@ CVE-2025-46689,0,0,0388dc31c6443d3bcfeb535a7ed8c8e04f9b9cb1be53d492b19b4be3a93bf
|
||||
CVE-2025-4669,0,0,54ec364588ee900808fd1aa8d968e01bed1a2da1f35945030ba5d2b9e5be2cee,2025-05-19T13:35:20.460000
|
||||
CVE-2025-46690,0,0,973a37c2db031d79f10319288b5777f494d38cd710bbcf14cf819512ce030af8,2025-05-12T19:31:51.950000
|
||||
CVE-2025-4670,0,0,9a596c2e9255695567d05d824226f83fb55fc8cbf2293428d75afad8a36539ac,2025-05-29T14:29:50.247000
|
||||
CVE-2025-46701,0,1,6e4a72ba512d134f38bef39d1aaca13ea87df43a5525758714f90e8712bc9d63,2025-05-29T22:15:22.450000
|
||||
CVE-2025-46701,0,0,6e4a72ba512d134f38bef39d1aaca13ea87df43a5525758714f90e8712bc9d63,2025-05-29T22:15:22.450000
|
||||
CVE-2025-46712,0,0,0c073dcafa656dd770ca6df4993eba5d01868e4680b3acd34dd6f33ce4c7aa2a,2025-05-12T17:32:52.810000
|
||||
CVE-2025-46713,0,0,52b5f47481eed81cdfa77d7fdf7e1eb397e2770a52108ac1a8158bbb54118740,2025-05-23T15:55:02.040000
|
||||
CVE-2025-46714,0,0,0a41c2a9ca714c22e2b0866438762cfc18c811db79b3df98db455c7fc3a6108b,2025-05-23T15:55:02.040000
|
||||
@ -295099,7 +295103,7 @@ CVE-2025-47493,0,0,76f0201d33428ed13ba59687dd93009828114189accf979309ebf3e7cee77
|
||||
CVE-2025-47494,0,0,e0302526898a5ae70ee8eef6e4b83c959eaac0e5251f92271da4bdf3d6315abf,2025-05-08T14:39:18.800000
|
||||
CVE-2025-47495,0,0,777808ec78a970d2ad85b19c1a4b26603d8f27c940d73bd14b2cb23b34a5c977,2025-05-08T14:39:18.800000
|
||||
CVE-2025-47496,0,0,5c8e292662c44174edcb0c4f029df6e187c40589089801ecc24be99bac3c18e9,2025-05-08T14:39:18.800000
|
||||
CVE-2025-47497,0,1,86b3b77fd9a509784cafa6764818343c9cb3babb4ab5d50cc6888e4658282512,2025-05-29T23:15:26.450000
|
||||
CVE-2025-47497,0,0,86b3b77fd9a509784cafa6764818343c9cb3babb4ab5d50cc6888e4658282512,2025-05-29T23:15:26.450000
|
||||
CVE-2025-47498,0,0,edd75d355a4d6930d9c348986a43b0cc1172a1641e93a5ae5794f19f04c66ab7,2025-05-08T14:39:18.800000
|
||||
CVE-2025-47499,0,0,148d1c310044253544a786f9c6801edeb3fc66df77b55f69c198fce07f0914c1,2025-05-08T14:39:18.800000
|
||||
CVE-2025-4750,0,0,c39c561cc222830a237918280b3d54c76431a4d0607d407184e71db361ae033f,2025-05-16T14:42:18.700000
|
||||
@ -295439,11 +295443,11 @@ CVE-2025-48060,0,0,e880a7998ac7937dea606622d4d4f9e16644f2d07bf1521aa507e684ea319
|
||||
CVE-2025-48061,0,0,9623adaa4a2a12419dc1960402eeb7cda483dd4973982b2b4588eefcc7c2d6af,2025-05-23T15:55:02.040000
|
||||
CVE-2025-48063,0,0,b51c84591461349d9cf6414a93a17bf05aa314500b0f0e486a94556b20ce49d8,2025-05-21T20:24:58.133000
|
||||
CVE-2025-48064,0,0,f30f6abfc706c8ec009b8e1646b8ce7a94ad294f1fc91f47ca51b619773ad0e0,2025-05-21T20:24:58.133000
|
||||
CVE-2025-48066,0,0,28fa0dc5751631bbd53a62d8a343b9db5e68ae8e116ea0b24464baafce7d1ae4,2025-05-23T15:55:02.040000
|
||||
CVE-2025-48066,0,1,faea31f6567e989a0ef973c3f26a498ca723f84a2b80d40e0205222fbd185beb,2025-05-30T01:18:41.410000
|
||||
CVE-2025-48069,0,0,d201b903e106fd4e8e9a5c16c5ee97dd49fc9c17d0474c4fa89382c7bdd7010c,2025-05-21T20:24:58.133000
|
||||
CVE-2025-4807,0,0,38e0deb05d9d726281158918611fe40bc8b500e3135a018beac99acf23d735d4,2025-05-28T13:38:25.170000
|
||||
CVE-2025-48070,0,0,bed1805e46e1e55370ff9bc19da5a6d7e3c95e34134426c68a907b0b4c694440,2025-05-23T15:55:02.040000
|
||||
CVE-2025-48075,0,0,87e82b9f27c9f8a9978d368852e06162224de1f8d4f3d59fe746f8138058dba8,2025-05-23T15:55:02.040000
|
||||
CVE-2025-48075,0,1,ceded26a477da7bdd3b4705aea0a4689aac5d500ae2c2acb800b2c72db0780d6,2025-05-30T01:18:13.397000
|
||||
CVE-2025-48079,0,0,6a9c124abc87a320bc8b30f57c16bd051b25830658cd2d770da8f936d77bfc2d,2025-05-19T13:35:50.497000
|
||||
CVE-2025-4808,0,0,754834e2a19df62069bc2414c3d233aae38d368529ec96cc4bed4babf3116dd2,2025-05-21T20:59:50.423000
|
||||
CVE-2025-48080,0,0,3ac40a2ee2ffbe53ef86e322d55a6c979dec23087ec5d5ea5075b108588d8314,2025-05-19T13:35:50.497000
|
||||
@ -295564,9 +295568,9 @@ CVE-2025-48344,0,0,ba9ec2cf1d4eadb80bfcbe5209456d9014a63bb9820d381804d6db8934bf8
|
||||
CVE-2025-48346,0,0,df44a636fcb8a95eb1777f4620f7844fd80604e2a21bbe85a4714ec18fcfce27,2025-05-21T20:25:33.823000
|
||||
CVE-2025-4835,0,0,2f5ad6229d5b9b413e04a81b59106e5a85fb8d33f4f22cdfba9946f94435c0a6,2025-05-23T15:50:01.543000
|
||||
CVE-2025-4836,0,0,381a21f4fc668a982c9ea0d6a5f4b8a8152eb0ca75926c09f17075729aa073a9,2025-05-28T13:54:46.070000
|
||||
CVE-2025-48366,0,0,d7ce9d0d3c7505c7d63fd9bb6950311507fb7a33b732862958ebe8c1d5b71836,2025-05-23T15:55:02.040000
|
||||
CVE-2025-48368,0,0,899c3a31b1c599e3ec0b69b5cb7422912c99ec94f62c67b92fd8b6efb5460b9b,2025-05-23T15:54:42.643000
|
||||
CVE-2025-48369,0,0,dead242230f5dc15069538201d7c6ccaf1b7e367c408fe3c28ecdd56aa68f6f7,2025-05-23T15:54:42.643000
|
||||
CVE-2025-48366,0,1,c4b55aab61c20a48c9f4f35cfff88c4f001aac74c3c0fe509ce92338a5a73cf2,2025-05-30T01:17:53.250000
|
||||
CVE-2025-48368,0,1,7aa43beebddc67e05e855de1c853e16919a3051539d389fbfeaded768e9a7691,2025-05-30T01:17:44.430000
|
||||
CVE-2025-48369,0,1,576d533c9ddbdbacc2f8abf33153567b9e0e45e4d6d1bb54beb34c6dbf2139f3,2025-05-30T01:17:25.770000
|
||||
CVE-2025-4837,0,0,97165344a1aaa334dd7151b29efb73d1ce1ef6112299500e4f1c0dfe72af4861,2025-05-28T13:58:35.157000
|
||||
CVE-2025-48370,0,0,62d2199c47dd7a41c532f29fd9e0d554bff0d633dbb1a677fe7b16624fa90309,2025-05-28T15:01:30.720000
|
||||
CVE-2025-48371,0,0,4fd7802bb8d9ff8d952e39071cc6f06e959c68a1480d31295d09af67692e9047,2025-05-23T15:54:42.643000
|
||||
@ -295934,8 +295938,8 @@ CVE-2025-5264,0,0,abe0b79d14498f3be90de80c92300dc78db972cc8e588116c99ae67d75da07
|
||||
CVE-2025-5265,0,0,9de2c5b20df8510834fb337c7755c83f338293d05ac52d7da90c530d78ac0135,2025-05-28T15:01:30.720000
|
||||
CVE-2025-5266,0,0,a6c13db6a72f4d13284e0132227ab17d92b7bcfca0e7230bab0207d942084b96,2025-05-28T15:01:30.720000
|
||||
CVE-2025-5267,0,0,813867aae1d64af4aec22b6b70fa8a3b8a66ea93c6632bc8fa0a49ff1af19d03,2025-05-28T15:01:30.720000
|
||||
CVE-2025-5268,0,0,7e3d10a27b4ce0c2b62a9767007e49993d9c89ab3e0337760a099dd7c0f6de0f,2025-05-28T15:01:30.720000
|
||||
CVE-2025-5269,0,0,6d0eb976023aa8d738f9489edf4ecc8721c3f256fb2cf88e5a729c5dc6828f0a,2025-05-28T15:01:30.720000
|
||||
CVE-2025-5268,0,1,9ca56217f6656b3db6f3886ae97c6aaf51981b2cfee3ec36114b04504f1fde37,2025-05-30T01:15:17.360000
|
||||
CVE-2025-5269,0,1,636b981ad0b6bd51e888bd083e0521a5d5430a75a4379a3e968a67a4dc3d2be8,2025-05-30T01:15:10.063000
|
||||
CVE-2025-5270,0,0,aa456a57f4f2365f19a6751f7c8757f0e45ea8ebbfa9b865c8b311a5b75652fd,2025-05-28T18:36:10.270000
|
||||
CVE-2025-5271,0,0,690e8825fc80b6fc0ecfe900ac3dcad130d2f9496b37f82b320aac0ae279f7b4,2025-05-28T18:35:56.847000
|
||||
CVE-2025-5272,0,0,074c893922ad04d4cd97e1ed2d35dd3b2f922b3d3528dc0bfa306f766f8c44dc,2025-05-28T18:35:29.857000
|
||||
@ -295953,7 +295957,7 @@ CVE-2025-5295,0,0,fa9a5670b3c573b1d649121f91fea9d5e1a6db1271692650785a46a0f5487f
|
||||
CVE-2025-5297,0,0,1904e932c0220e129d3d6e273dfa8ff6706543681d2ef7758dd9429e0a1c2a90,2025-05-28T15:01:30.720000
|
||||
CVE-2025-5298,0,0,45ff1beadacec96b0b72b9acfad30f60f42f289478c18289d03a11e46cdec43d,2025-05-28T20:37:48.440000
|
||||
CVE-2025-5299,0,0,f26dbcf0a7d53b5a2d64e81d1f22b02f5b39dc958fe7a9afe9d805de75d8189a,2025-05-28T15:01:30.720000
|
||||
CVE-2025-5307,1,1,64d79aff473168c01ceb888b2406cca3d5e373d2f8affb16ee7fccf2c9333e9f,2025-05-29T22:15:22.557000
|
||||
CVE-2025-5307,0,0,64d79aff473168c01ceb888b2406cca3d5e373d2f8affb16ee7fccf2c9333e9f,2025-05-29T22:15:22.557000
|
||||
CVE-2025-5320,0,0,ee7fb1d3594ecc8f3338b2dd50ece8d49038b6e1f5c612f8b9b85e6cb4273199,2025-05-29T14:29:50.247000
|
||||
CVE-2025-5321,0,0,9e05504faedb37c714ab4871e8172010ba09093d29addefd8c36eb2b529b87b8,2025-05-29T15:15:34.417000
|
||||
CVE-2025-5323,0,0,9b08749dda231819786a6e39ec4a13f6c10a57c5cda3006ba1145aa9e5b25ceb,2025-05-29T19:15:28.747000
|
||||
@ -295962,7 +295966,7 @@ CVE-2025-5325,0,0,f2bbb135eb03160cd04cc13499ec1ebcc468b5fd4391a177389d05af8054ff
|
||||
CVE-2025-5326,0,0,18d1ce1d3cf923fc33534d3fd8af918332b48e3686c44d91aa9769a69fa6f042,2025-05-29T20:15:28.060000
|
||||
CVE-2025-5327,0,0,46778b15f6fc806947fc15464ebf143bc8624f1c653c4555efb608d2639c199a,2025-05-29T21:15:26.557000
|
||||
CVE-2025-5328,0,0,3d0e42808751ba882f514e26698498b2d82af1dbda053903bf2af4aaacb467a7,2025-05-29T21:15:26.753000
|
||||
CVE-2025-5330,1,1,becb998fdc3396cd909582453b31b6b2f07f50b02a96a8faa3959f57bbfe652c,2025-05-29T22:15:22.747000
|
||||
CVE-2025-5331,1,1,8489ebedf654d7fdbbe01200bd73205f7f8e393dfe71484c796f5d6a245d6410,2025-05-29T22:15:22.940000
|
||||
CVE-2025-5332,1,1,f8977548ddceb1502298b1f57d7b9ebd54d12d2f2bf0335af0b34b1c8e258d65,2025-05-29T23:15:26.680000
|
||||
CVE-2025-5330,0,0,becb998fdc3396cd909582453b31b6b2f07f50b02a96a8faa3959f57bbfe652c,2025-05-29T22:15:22.747000
|
||||
CVE-2025-5331,0,0,8489ebedf654d7fdbbe01200bd73205f7f8e393dfe71484c796f5d6a245d6410,2025-05-29T22:15:22.940000
|
||||
CVE-2025-5332,0,0,f8977548ddceb1502298b1f57d7b9ebd54d12d2f2bf0335af0b34b1c8e258d65,2025-05-29T23:15:26.680000
|
||||
CVE-2025-5334,0,0,4e60e1ab1eeaa1fd20fc8046892744b98efa9ae8fb9f515a84323e31a31d20e3,2025-05-29T15:15:34.650000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user