mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-10T22:00:20.519098+00:00
This commit is contained in:
parent
9228c40301
commit
8eb1bba649
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2022-43855",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-08T18:15:48.283",
|
||||
"lastModified": "2025-01-07T15:38:33.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-10T20:15:21.210",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM SPSS Statistics 26.0, 27.0.1, and 28.0 could allow a local user to create multiple files that could exhaust the file handles capacity and cause a denial of service. IBM X-Force ID: 230235."
|
||||
"value": "IBM SPSS Statistics 26.0, 27.0.1, and 28.0 IO Module could allow a local user to create multiple files that could exhaust the file handles capacity and cause a denial of service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -109,13 +109,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239235",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7130881",
|
||||
"source": "psirt@us.ibm.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3931",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-18T00:15:07.810",
|
||||
"lastModified": "2025-06-10T06:15:21.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T20:08:09.853",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -124,26 +144,97 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:totara:totara:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.46",
|
||||
"matchCriteriaId": "022A9916-1FEA-4FF8-83F9-34DDAE4656C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:totara:totara:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.38",
|
||||
"matchCriteriaId": "C5807B45-6C27-43AF-BC35-04B6D14E2563"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:totara:totara:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "15.0",
|
||||
"versionEndExcluding": "15.33",
|
||||
"matchCriteriaId": "C18F7A73-B5AC-4EA3-8285-CFFA669F0038"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:totara:totara:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "16.0",
|
||||
"versionEndExcluding": "16.27",
|
||||
"matchCriteriaId": "6EEBDAA3-881B-48A2-96D9-DF192358006C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:totara:totara:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.21",
|
||||
"matchCriteriaId": "AFE3B9EA-DA71-497A-91FF-072C1D0A3452"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:totara:totara:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "18.0",
|
||||
"versionEndExcluding": "18.8",
|
||||
"matchCriteriaId": "543ED963-9A32-4EDF-98D4-303D9A2751FC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://totara.community/mod/forum/discuss.php?d=27644",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.261368",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.261368",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.261368",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.261368",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-415xx/CVE-2024-41502.json
Normal file
25
CVE-2024/CVE-2024-415xx/CVE-2024-41502.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-41502",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-10T20:15:21.470",
|
||||
"lastModified": "2025-06-10T20:15:21.470",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS) via the form field \"Observaces\" (observances) in the \"Pessoas\" (persons) section when creating or editing either a legal or a natural person."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://jetimob.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rafaelbaldasso/CVE-2024-41502",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-415xx/CVE-2024-41503.json
Normal file
25
CVE-2024/CVE-2024-415xx/CVE-2024-41503.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-41503",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-10T20:15:21.610",
|
||||
"lastModified": "2025-06-10T20:15:21.610",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS) in the field \"Ttulo\" (title) inside the filter Save option in the \"Busca\" (search) function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://jetimob.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rafaelbaldasso/CVE-2024-41503",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-415xx/CVE-2024-41504.json
Normal file
25
CVE-2024/CVE-2024-415xx/CVE-2024-41504.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-41504",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-10T20:15:21.733",
|
||||
"lastModified": "2025-06-10T20:15:21.733",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS). In the \"Oportunidades\" (opportunities) section of the application when creating or editing an \"Atividade\" (activity), the form field \"Descrico\" allows injection of JavaScript."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://jetimob.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rafaelbaldasso/CVE-2024-41504",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-415xx/CVE-2024-41505.json
Normal file
25
CVE-2024/CVE-2024-415xx/CVE-2024-41505.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-41505",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-10T20:15:21.850",
|
||||
"lastModified": "2025-06-10T20:15:21.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS) in the \"Pessoas\" (persons) section via the field \"Profisso\" (professor)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://jetimob.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rafaelbaldasso/CVE-2024-41505",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-57190",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-10T17:20:38.540",
|
||||
"lastModified": "2025-06-10T17:20:38.540",
|
||||
"lastModified": "2025-06-10T20:15:22.247",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Erxes <1.6.1 is vulnerable to Incorrect Access Control. An attacker can bypass authentication by providing a \"User\" HTTP header that contains any user, allowing them to talk to any GraphQL endpoint."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/erxes/erxes/commit/4ed2ca797241d2ba0c9083feeadd9755c1310ce8",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-23102",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-03T19:15:38.807",
|
||||
"lastModified": "2025-06-09T14:15:22.093",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-06-10T20:07:12.893",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,8 +61,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_9820_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07729C7A-BC6B-482E-86C1-0B5047A98BEC"
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F18F62E-2012-442E-BE60-6E76325D1824"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -72,8 +72,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_9820:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "59BBB1C0-06B0-4912-9A60-DB6DF7ECF7CD"
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D8701B6-6989-44D1-873A-A1823BFD7CCC"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -88,8 +88,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_9825_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88933009-790A-44A6-ABAB-02B3FAEDD2A7"
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_990_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BCF6C91D-DECE-4630-85FE-C22EF2B9160A"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -99,8 +99,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_9825:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23C2C4F9-5F26-4FF7-BCDF-AE3D47EBE78B"
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_990:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87FE8214-E165-4874-BB5A-3C4298708039"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -115,8 +115,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_980_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A2AFC23-2E28-48A2-96AD-7637479F58C0"
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1080_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43DE4D6F-D662-46F2-93BC-9AE950320BDE"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -126,8 +126,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_980:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4644455-7E6F-44AD-8739-D1BD2081968C"
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE06CD56-8BFD-4208-843A-179E3E6F5C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -142,8 +142,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_990_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5517D822-4960-4DDA-B972-4EEFBB4FD5DE"
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2100_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89B88BFE-3C82-498C-8EC1-5784836DB1A1"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -153,8 +153,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_990:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "094E26DF-52C7-419A-ACC3-7D50E74DB77F"
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9385885D-654A-496E-8029-7C6D9B077193"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -169,8 +169,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_1080_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD320084-5B49-4770-A097-992533EBBF43"
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD1A7B09-9031-4E54-A24F-3237C054166B"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -180,8 +180,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_1080:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F61DC81-BF95-4169-B9E1-30CD33EF0EB3"
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFC68046-2F08-40D1-B158-89D8D9263541"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -196,8 +196,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_2100_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AECB9FE-C536-468C-9234-8FD3AD9B4468"
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -207,8 +207,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_2100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B901CCD1-A13D-4A20-81C7-94DCCB6949F9"
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -223,8 +223,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_1280_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D714D07-E89C-4B7F-AA0C-3D95D34FF1D2"
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D381478B-C638-4663-BD71-144BE4B02E46"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -234,8 +234,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_1280:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53CEA16B-5800-41FF-9788-D10674EC9DB6"
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61E72146-72FE-4B54-AB79-3C665E7F016C"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -250,8 +250,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_2200_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2F71CFA-9C51-4FA5-B0E5-0A1409E61B6F"
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1480_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64897B0D-EBF6-4BEB-BF54-ABCDBFAB45E0"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -261,8 +261,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_2200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C12886E-27FA-45F4-96F7-B1D8D3BE80D2"
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1480:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3F328B4-0442-4748-B5EE-DD1CEE50D6CF"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -277,8 +277,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_1380_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "189FE096-4B41-47F6-A159-3E0091005F60"
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16D9272E-1794-48FF-B6A4-8F48395BA38E"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -288,8 +288,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_1380:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE6559C6-78E4-4985-811F-DD4983C4B445"
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "932F5FB3-5527-44D7-9DD9-EF03963E3CA3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
52
CVE-2025/CVE-2025-30xx/CVE-2025-3052.json
Normal file
52
CVE-2025/CVE-2025-30xx/CVE-2025-3052.json
Normal file
@ -0,0 +1,52 @@
|
||||
{
|
||||
"id": "CVE-2025-3052",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2025-06-10T20:15:23.037",
|
||||
"lastModified": "2025-06-10T21:15:22.450",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.binarly.io/advisories/brly-dva-2025-001",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kb.cert.org/vuls/id/806555",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-359xx/CVE-2025-35940.json
Normal file
56
CVE-2025/CVE-2025-359xx/CVE-2025-35940.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-35940",
|
||||
"sourceIdentifier": "vulnreport@tenable.com",
|
||||
"published": "2025-06-10T21:15:22.210",
|
||||
"lastModified": "2025-06-10T21:15:22.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ArchiverSpaApi\u00a0ASP.NET application uses a hard-coded JWT signing key. An unauthenticated remote attacker can generate and use a verifiable JWT token to access protected ArchiverSpaApi URL endpoints."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vulnreport@tenable.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vulnreport@tenable.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.tenable.com/security/research/tra-2025-17",
|
||||
"source": "vulnreport@tenable.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-368xx/CVE-2025-36852.json
Normal file
78
CVE-2025/CVE-2025-368xx/CVE-2025-36852.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-36852",
|
||||
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",
|
||||
"published": "2025-06-10T20:15:22.877",
|
||||
"lastModified": "2025-06-10T20:15:22.877",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A critical security vulnerability exists in remote cache extensions for common build systems utilizing bucket-based remote cache (such as those using Amazon S3, Google Cloud Storage, or similar object storage) that allows any contributor with pull request privileges to inject compromised artifacts from an untrusted environment into trusted production environments without detection.\u00a0\n\n\n\n\nThe vulnerability exploits a fundamental design flaw in the \"first-to-cache wins\" principle, where artifacts built in untrusted environments (feature branches, pull requests) can poison the cache used by trusted environments (protected branches, production deployments).\u00a0\n\n\n\n\nThis attack bypasses all traditional security measures including encryption, access controls, and checksum validation because the poisoning occurs during the artifact construction phase, before any security measures are applied."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "36c7be3b-2937-45df-85ea-ca7133ea542c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:U/V:C/RE:M/U:Red",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "PRESENT",
|
||||
"Automatable": "YES",
|
||||
"Recovery": "USER",
|
||||
"valueDensity": "CONCENTRATED",
|
||||
"vulnerabilityResponseEffort": "MODERATE",
|
||||
"providerUrgency": "RED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "36c7be3b-2937-45df-85ea-ca7133ea542c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-829"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nx.app/files/cve-2025-06",
|
||||
"source": "36c7be3b-2937-45df-85ea-ca7133ea542c"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-44044",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-10T16:15:40.940",
|
||||
"lastModified": "2025-06-10T16:15:40.940",
|
||||
"lastModified": "2025-06-10T20:15:23.817",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Keyoti SearchUnit prior to 9.0.0. is vulnerable to XML External Entity (XXE). An attacker who can force a vulnerable SearchUnit host into parsing maliciously crafted XML and/or DTD files can exfiltrate some files from the underlying operating system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://keyoti.com/products/search/dotNetWeb/HtmlHelp9/?topic=UserGuide/Release%20Notes.htm",
|
||||
|
@ -2,20 +2,51 @@
|
||||
"id": "CVE-2025-4652",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-06-09T06:15:25.740",
|
||||
"lastModified": "2025-06-09T12:15:47.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T20:15:24.553",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Broadstreet WordPress plugin before 1.51.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Broadstreet para WordPress anterior a la versi\u00f3n 1.51.8 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/2a18ab96-ba95-4599-824f-df12e4851e6d/",
|
||||
"source": "contact@wpscan.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/2a18ab96-ba95-4599-824f-df12e4851e6d/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-47176",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-06-10T17:23:59.800",
|
||||
"lastModified": "2025-06-10T18:15:32.510",
|
||||
"lastModified": "2025-06-10T20:15:24.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -42,7 +42,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,20 +2,51 @@
|
||||
"id": "CVE-2025-4840",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-06-10T06:15:22.287",
|
||||
"lastModified": "2025-06-10T06:15:22.287",
|
||||
"lastModified": "2025-06-10T20:15:24.693",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The inprosysmedia-likes-dislikes-post WordPress plugin through 1.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento inprosysmedia-likes-dislikes-post de WordPress hasta la versi\u00f3n 1.0.0 no depura ni escapa correctamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL a trav\u00e9s de una acci\u00f3n AJAX disponible para usuarios no autenticados, lo que genera una inyecci\u00f3n SQL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/85dc579d-edc4-421e-9bb1-09629dec527b/",
|
||||
"source": "contact@wpscan.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/85dc579d-edc4-421e-9bb1-09629dec527b/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-491xx/CVE-2025-49133.json
Normal file
68
CVE-2025/CVE-2025-491xx/CVE-2025-49133.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-49133",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-10T20:15:24.337",
|
||||
"lastModified": "2025-06-10T20:15:24.337",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Libtpms is a library that targets the integration of TPM functionality into hypervisors, primarily into Qemu. Libtpms, which is derived from the TPM 2.0 reference implementation code published by the Trusted Computing Group, is prone to a potential out of bounds (OOB) read vulnerability. The vulnerability occurs in the \u2018CryptHmacSign\u2019 function with an inconsistent pairing of the signKey and signScheme parameters, where the signKey is ALG_KEYEDHASH key and inScheme is an ECC or RSA scheme. The reported vulnerability is in the \u2018CryptHmacSign\u2019 function, which is defined in the \"Part 4: Supporting Routines \u2013 Code\" document, section \"7.151 - /tpm/src/crypt/CryptUtil.c \". This vulnerability can be triggered from user-mode applications by sending malicious commands to a TPM 2.0/vTPM (swtpm) whose firmware is based on an affected TCG reference implementation. The effect on libtpms is that it will cause an abort due to the detection of the out-of-bounds access, thus for example making a vTPM (swtpm) unavailable to a VM. This vulnerability is fixed in 0.7.12, 0.8.10, 0.9.7, and 0.10.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/stefanberger/libtpms/commit/04b2d8e9afc0a9b6bffe562a23e58c0de11532d1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/stefanberger/libtpms/security/advisories/GHSA-25w5-6fjj-hf8g",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://trustedcomputinggroup.org/resource/tpm-library-specification",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://trustedcomputinggroup.org/wp-content/uploads/TPM-2.0-1.83-Part-4-Supporting-Routines-Code.pdf",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-59xx/CVE-2025-5974.json
Normal file
145
CVE-2025/CVE-2025-59xx/CVE-2025-5974.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5974",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-10T20:15:24.923",
|
||||
"lastModified": "2025-06-10T20:15:24.923",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in PHPGurukul Restaurant Table Booking System 1.0. Affected by this issue is some unknown functionality of the file /check-status.php. The manipulation of the argument searchdata leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kakalalaww/CVE/issues/8",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311852",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311852",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592357",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-59xx/CVE-2025-5975.json
Normal file
145
CVE-2025/CVE-2025-59xx/CVE-2025-5975.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5975",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-10T20:15:25.117",
|
||||
"lastModified": "2025-06-10T20:15:25.117",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in PHPGurukul Rail Pass Management System 1.0. This affects an unknown part of the file /rpms/download-pass.php. The manipulation of the argument searchdata leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"baseScore": 5.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kakalalaww/CVE/issues/9",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311853",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311853",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592440",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-59xx/CVE-2025-5976.json
Normal file
145
CVE-2025/CVE-2025-59xx/CVE-2025-5976.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5976",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-10T20:15:25.297",
|
||||
"lastModified": "2025-06-10T20:15:25.297",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in PHPGurukul Rail Pass Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/add-pass.php. The manipulation of the argument fullname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kakalalaww/CVE/issues/10",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311854",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311854",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592442",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-59xx/CVE-2025-5977.json
Normal file
145
CVE-2025/CVE-2025-59xx/CVE-2025-5977.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5977",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-10T20:15:25.480",
|
||||
"lastModified": "2025-06-10T20:15:25.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects School Fees Payment System 1.0 and classified as critical. This issue affects some unknown processing of the file /datatable.php. The manipulation of the argument sSortDir_0 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jiangffffd/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311855",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311855",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592458",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-59xx/CVE-2025-5978.json
Normal file
145
CVE-2025/CVE-2025-59xx/CVE-2025-5978.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5978",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-10T21:15:22.793",
|
||||
"lastModified": "2025-06-10T21:15:22.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda FH1202 1.2.0.14. It has been classified as critical. Affected is the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-fromVirtualSer-20b53a41781f80b7a6c7e727f93d7d9f?source=copy_link",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311856",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311856",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592462",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-59xx/CVE-2025-5979.json
Normal file
145
CVE-2025/CVE-2025-59xx/CVE-2025-5979.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5979",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-10T21:15:22.970",
|
||||
"lastModified": "2025-06-10T21:15:22.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in code-projects School Fees Payment System 1.0. This affects an unknown part of the file /branch.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jiangffffd/cve/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311859",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311859",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592463",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-59xx/CVE-2025-5980.json
Normal file
145
CVE-2025/CVE-2025-59xx/CVE-2025-5980.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5980",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-10T21:15:23.150",
|
||||
"lastModified": "2025-06-10T21:15:23.150",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in code-projects Restaurant Order System 1.0. This vulnerability affects unknown code of the file /order.php. The manipulation of the argument tabidNoti leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jiangffffd/cve/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311860",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311860",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592467",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
83
README.md
83
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-10T20:00:19.940571+00:00
|
||||
2025-06-10T22:00:20.519098+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-10T19:43:40.383000+00:00
|
||||
2025-06-10T21:15:23.150000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
297430
|
||||
297445
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `31`
|
||||
Recently added CVEs: `15`
|
||||
|
||||
- [CVE-2025-2884](CVE-2025/CVE-2025-28xx/CVE-2025-2884.json) (`2025-06-10T18:15:30.617`)
|
||||
- [CVE-2025-30327](CVE-2025/CVE-2025-303xx/CVE-2025-30327.json) (`2025-06-10T19:15:29.600`)
|
||||
- [CVE-2025-36574](CVE-2025/CVE-2025-365xx/CVE-2025-36574.json) (`2025-06-10T18:15:30.883`)
|
||||
- [CVE-2025-36575](CVE-2025/CVE-2025-365xx/CVE-2025-36575.json) (`2025-06-10T18:15:31.060`)
|
||||
- [CVE-2025-36576](CVE-2025/CVE-2025-365xx/CVE-2025-36576.json) (`2025-06-10T18:15:31.217`)
|
||||
- [CVE-2025-36577](CVE-2025/CVE-2025-365xx/CVE-2025-36577.json) (`2025-06-10T18:15:31.363`)
|
||||
- [CVE-2025-36578](CVE-2025/CVE-2025-365xx/CVE-2025-36578.json) (`2025-06-10T18:15:31.513`)
|
||||
- [CVE-2025-36580](CVE-2025/CVE-2025-365xx/CVE-2025-36580.json) (`2025-06-10T18:15:31.660`)
|
||||
- [CVE-2025-43550](CVE-2025/CVE-2025-435xx/CVE-2025-43550.json) (`2025-06-10T19:15:32.120`)
|
||||
- [CVE-2025-43573](CVE-2025/CVE-2025-435xx/CVE-2025-43573.json) (`2025-06-10T19:15:32.273`)
|
||||
- [CVE-2025-43574](CVE-2025/CVE-2025-435xx/CVE-2025-43574.json) (`2025-06-10T19:15:32.427`)
|
||||
- [CVE-2025-43575](CVE-2025/CVE-2025-435xx/CVE-2025-43575.json) (`2025-06-10T19:15:32.570`)
|
||||
- [CVE-2025-43576](CVE-2025/CVE-2025-435xx/CVE-2025-43576.json) (`2025-06-10T19:15:32.723`)
|
||||
- [CVE-2025-43577](CVE-2025/CVE-2025-435xx/CVE-2025-43577.json) (`2025-06-10T19:15:32.893`)
|
||||
- [CVE-2025-43578](CVE-2025/CVE-2025-435xx/CVE-2025-43578.json) (`2025-06-10T19:15:33.050`)
|
||||
- [CVE-2025-43579](CVE-2025/CVE-2025-435xx/CVE-2025-43579.json) (`2025-06-10T19:15:33.200`)
|
||||
- [CVE-2025-43581](CVE-2025/CVE-2025-435xx/CVE-2025-43581.json) (`2025-06-10T18:15:31.807`)
|
||||
- [CVE-2025-43588](CVE-2025/CVE-2025-435xx/CVE-2025-43588.json) (`2025-06-10T18:15:32.063`)
|
||||
- [CVE-2025-47107](CVE-2025/CVE-2025-471xx/CVE-2025-47107.json) (`2025-06-10T19:15:33.347`)
|
||||
- [CVE-2025-47111](CVE-2025/CVE-2025-471xx/CVE-2025-47111.json) (`2025-06-10T19:15:33.507`)
|
||||
- [CVE-2025-47112](CVE-2025/CVE-2025-471xx/CVE-2025-47112.json) (`2025-06-10T19:15:33.667`)
|
||||
- [CVE-2025-5943](CVE-2025/CVE-2025-59xx/CVE-2025-5943.json) (`2025-06-10T18:15:33.020`)
|
||||
- [CVE-2025-5971](CVE-2025/CVE-2025-59xx/CVE-2025-5971.json) (`2025-06-10T18:15:33.240`)
|
||||
- [CVE-2025-5972](CVE-2025/CVE-2025-59xx/CVE-2025-5972.json) (`2025-06-10T19:15:35.537`)
|
||||
- [CVE-2025-5973](CVE-2025/CVE-2025-59xx/CVE-2025-5973.json) (`2025-06-10T19:15:35.727`)
|
||||
- [CVE-2024-41502](CVE-2024/CVE-2024-415xx/CVE-2024-41502.json) (`2025-06-10T20:15:21.470`)
|
||||
- [CVE-2024-41503](CVE-2024/CVE-2024-415xx/CVE-2024-41503.json) (`2025-06-10T20:15:21.610`)
|
||||
- [CVE-2024-41504](CVE-2024/CVE-2024-415xx/CVE-2024-41504.json) (`2025-06-10T20:15:21.733`)
|
||||
- [CVE-2024-41505](CVE-2024/CVE-2024-415xx/CVE-2024-41505.json) (`2025-06-10T20:15:21.850`)
|
||||
- [CVE-2025-3052](CVE-2025/CVE-2025-30xx/CVE-2025-3052.json) (`2025-06-10T20:15:23.037`)
|
||||
- [CVE-2025-35940](CVE-2025/CVE-2025-359xx/CVE-2025-35940.json) (`2025-06-10T21:15:22.210`)
|
||||
- [CVE-2025-36852](CVE-2025/CVE-2025-368xx/CVE-2025-36852.json) (`2025-06-10T20:15:22.877`)
|
||||
- [CVE-2025-49133](CVE-2025/CVE-2025-491xx/CVE-2025-49133.json) (`2025-06-10T20:15:24.337`)
|
||||
- [CVE-2025-5974](CVE-2025/CVE-2025-59xx/CVE-2025-5974.json) (`2025-06-10T20:15:24.923`)
|
||||
- [CVE-2025-5975](CVE-2025/CVE-2025-59xx/CVE-2025-5975.json) (`2025-06-10T20:15:25.117`)
|
||||
- [CVE-2025-5976](CVE-2025/CVE-2025-59xx/CVE-2025-5976.json) (`2025-06-10T20:15:25.297`)
|
||||
- [CVE-2025-5977](CVE-2025/CVE-2025-59xx/CVE-2025-5977.json) (`2025-06-10T20:15:25.480`)
|
||||
- [CVE-2025-5978](CVE-2025/CVE-2025-59xx/CVE-2025-5978.json) (`2025-06-10T21:15:22.793`)
|
||||
- [CVE-2025-5979](CVE-2025/CVE-2025-59xx/CVE-2025-5979.json) (`2025-06-10T21:15:22.970`)
|
||||
- [CVE-2025-5980](CVE-2025/CVE-2025-59xx/CVE-2025-5980.json) (`2025-06-10T21:15:23.150`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `49`
|
||||
Recently modified CVEs: `8`
|
||||
|
||||
- [CVE-2025-44040](CVE-2025/CVE-2025-440xx/CVE-2025-44040.json) (`2025-06-10T19:34:47.497`)
|
||||
- [CVE-2025-45753](CVE-2025/CVE-2025-457xx/CVE-2025-45753.json) (`2025-06-10T19:34:41.410`)
|
||||
- [CVE-2025-45755](CVE-2025/CVE-2025-457xx/CVE-2025-45755.json) (`2025-06-10T19:34:54.193`)
|
||||
- [CVE-2025-47176](CVE-2025/CVE-2025-471xx/CVE-2025-47176.json) (`2025-06-10T18:15:32.510`)
|
||||
- [CVE-2025-48432](CVE-2025/CVE-2025-484xx/CVE-2025-48432.json) (`2025-06-10T18:15:32.790`)
|
||||
- [CVE-2025-5053](CVE-2025/CVE-2025-50xx/CVE-2025-5053.json) (`2025-06-10T19:34:33.830`)
|
||||
- [CVE-2025-5119](CVE-2025/CVE-2025-51xx/CVE-2025-5119.json) (`2025-06-10T19:34:07.790`)
|
||||
- [CVE-2025-5137](CVE-2025/CVE-2025-51xx/CVE-2025-5137.json) (`2025-06-10T19:33:16.710`)
|
||||
- [CVE-2025-5297](CVE-2025/CVE-2025-52xx/CVE-2025-5297.json) (`2025-06-10T19:33:01.990`)
|
||||
- [CVE-2025-5334](CVE-2025/CVE-2025-53xx/CVE-2025-5334.json) (`2025-06-10T19:15:35.243`)
|
||||
- [CVE-2025-5610](CVE-2025/CVE-2025-56xx/CVE-2025-5610.json) (`2025-06-10T19:32:53.453`)
|
||||
- [CVE-2025-5611](CVE-2025/CVE-2025-56xx/CVE-2025-5611.json) (`2025-06-10T19:32:30.077`)
|
||||
- [CVE-2025-5674](CVE-2025/CVE-2025-56xx/CVE-2025-5674.json) (`2025-06-10T19:32:07.543`)
|
||||
- [CVE-2025-5675](CVE-2025/CVE-2025-56xx/CVE-2025-5675.json) (`2025-06-10T19:31:56.573`)
|
||||
- [CVE-2025-5676](CVE-2025/CVE-2025-56xx/CVE-2025-5676.json) (`2025-06-10T19:31:48.510`)
|
||||
- [CVE-2025-5677](CVE-2025/CVE-2025-56xx/CVE-2025-5677.json) (`2025-06-10T19:31:37.290`)
|
||||
- [CVE-2025-5726](CVE-2025/CVE-2025-57xx/CVE-2025-5726.json) (`2025-06-10T19:31:01.250`)
|
||||
- [CVE-2025-5727](CVE-2025/CVE-2025-57xx/CVE-2025-5727.json) (`2025-06-10T19:30:49.890`)
|
||||
- [CVE-2025-5756](CVE-2025/CVE-2025-57xx/CVE-2025-5756.json) (`2025-06-10T19:30:25.590`)
|
||||
- [CVE-2025-5757](CVE-2025/CVE-2025-57xx/CVE-2025-5757.json) (`2025-06-10T19:30:10.510`)
|
||||
- [CVE-2025-5764](CVE-2025/CVE-2025-57xx/CVE-2025-5764.json) (`2025-06-10T19:29:57.893`)
|
||||
- [CVE-2025-5765](CVE-2025/CVE-2025-57xx/CVE-2025-5765.json) (`2025-06-10T19:29:44.973`)
|
||||
- [CVE-2025-5766](CVE-2025/CVE-2025-57xx/CVE-2025-5766.json) (`2025-06-10T19:29:34.820`)
|
||||
- [CVE-2025-5779](CVE-2025/CVE-2025-57xx/CVE-2025-5779.json) (`2025-06-10T19:26:20.883`)
|
||||
- [CVE-2025-5780](CVE-2025/CVE-2025-57xx/CVE-2025-5780.json) (`2025-06-10T19:26:11.937`)
|
||||
- [CVE-2022-43855](CVE-2022/CVE-2022-438xx/CVE-2022-43855.json) (`2025-06-10T20:15:21.210`)
|
||||
- [CVE-2024-3931](CVE-2024/CVE-2024-39xx/CVE-2024-3931.json) (`2025-06-10T20:08:09.853`)
|
||||
- [CVE-2024-57190](CVE-2024/CVE-2024-571xx/CVE-2024-57190.json) (`2025-06-10T20:15:22.247`)
|
||||
- [CVE-2025-23102](CVE-2025/CVE-2025-231xx/CVE-2025-23102.json) (`2025-06-10T20:07:12.893`)
|
||||
- [CVE-2025-44044](CVE-2025/CVE-2025-440xx/CVE-2025-44044.json) (`2025-06-10T20:15:23.817`)
|
||||
- [CVE-2025-4652](CVE-2025/CVE-2025-46xx/CVE-2025-4652.json) (`2025-06-10T20:15:24.553`)
|
||||
- [CVE-2025-47176](CVE-2025/CVE-2025-471xx/CVE-2025-47176.json) (`2025-06-10T20:15:24.203`)
|
||||
- [CVE-2025-4840](CVE-2025/CVE-2025-48xx/CVE-2025-4840.json) (`2025-06-10T20:15:24.693`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
189
_state.csv
189
_state.csv
@ -209756,7 +209756,7 @@ CVE-2022-4385,0,0,e8b4e2410cfe63eeb4bcbcabc4ca3915e6daad03830092325a0bfa5b6170d6
|
||||
CVE-2022-43850,0,0,2b87c8e3ff800d3b638cd7c06b6611d053357dbd4e2331ccd989283b7fa5ef2d,2025-04-15T18:39:27.967000
|
||||
CVE-2022-43851,0,0,ca5e97e653c3d3fda024e9e86c7bdc37a420abbf9da4f07ff1e40f509e65ea22,2025-04-15T18:39:27.967000
|
||||
CVE-2022-43852,0,0,ebdc368d84f3016d163259bea9b56b0f45eda0b76893462e34bbfc09085a858d,2025-04-15T18:39:27.967000
|
||||
CVE-2022-43855,0,0,64fbe7dc298ae5c5ac98c70a6d144003654c18affb03fce85bbaadaad755a546,2025-01-07T15:38:33.697000
|
||||
CVE-2022-43855,0,1,dcd596c29370422c61ea5eec00a0cd79e3caf360cc623caac1374e22c074cc57,2025-06-10T20:15:21.210000
|
||||
CVE-2022-43857,0,0,c2306b55f2b4c37a83b047fd2388728e99b12612bc990aa59fe7703ba18ae695,2024-11-21T07:27:16.837000
|
||||
CVE-2022-43858,0,0,f37263e6c9a749dffda738fdd0099cd194b151233806de545336aaf55f4891b9,2024-11-21T07:27:16.990000
|
||||
CVE-2022-43859,0,0,fb5fcf2008667bf8e36fcb4c86b0d5f159050715bb8a549a5cfbc9fc72c9e289,2024-11-21T07:27:17.153000
|
||||
@ -224111,7 +224111,7 @@ CVE-2023-29206,0,0,05757323076564194eb0d2d2908b8334d6e6a978aa54bc6ee226a0d36cc62
|
||||
CVE-2023-29207,0,0,0af945ef09065db90527ef274d7ce0495ad84a6920d29cd49153411b29baf617,2024-11-21T07:56:42.957000
|
||||
CVE-2023-29208,0,0,d72b1806b1a1227f32e97378fed3e89636f834684f9c16c8299375c3bb3bce52,2024-11-21T07:56:43.067000
|
||||
CVE-2023-29209,0,0,b1a441944c74810d18fc5489d956cef09498551551095624d6742251ccaf5fbb,2024-11-21T07:56:43.173000
|
||||
CVE-2023-2921,0,1,a8e050004edd94635c1c38a8a9507c756c881d8c9a8d8cd7435999c85fbef263,2025-06-10T19:31:20.783000
|
||||
CVE-2023-2921,0,0,a8e050004edd94635c1c38a8a9507c756c881d8c9a8d8cd7435999c85fbef263,2025-06-10T19:31:20.783000
|
||||
CVE-2023-29210,0,0,c3845ea336ba86b11c4eb91d03d31293cb5fa7d22a81e37d92159250f0782f95,2024-11-21T07:56:43.280000
|
||||
CVE-2023-29211,0,0,2c3cbb186baea22a317d036509e1c123cdef6e9162bb76b6980c83b9c51f1fd5,2024-11-21T07:56:43.390000
|
||||
CVE-2023-29212,0,0,7e4cfc930a4d95e84076cf66c0dc7b198644afe8874cd82ae3f152882ef5d0b8,2024-11-21T07:56:43.500000
|
||||
@ -235167,7 +235167,7 @@ CVE-2023-43590,0,0,a24b0a4d4fbd849cf9c8576934def2996908e56c45e589c0a4718de3c52b7
|
||||
CVE-2023-43591,0,0,7089bdd917ed1a6d5c9808def1f484fb67c2e6a88e9a9ee81ab645fde8d2e80f,2024-11-21T08:24:27.223000
|
||||
CVE-2023-4360,0,0,bf776b564f3d9f4caa1d912b4d5307249bcc398bd846123f845e5bb5ceeeb373,2024-11-21T08:34:55.873000
|
||||
CVE-2023-43608,0,0,6c27dbdafa55f2b7aa33c3b628ee6a7a91ecbd84b5bb3689ac1f00133224f13b,2024-11-21T08:24:27.367000
|
||||
CVE-2023-43609,0,1,75f30095c4f4e4e457e17ae12eff03d46c5fbd1c1d424a29e6514e4d8050cc7c,2025-06-10T19:15:26.357000
|
||||
CVE-2023-43609,0,0,75f30095c4f4e4e457e17ae12eff03d46c5fbd1c1d424a29e6514e4d8050cc7c,2025-06-10T19:15:26.357000
|
||||
CVE-2023-4361,0,0,fffbd1502a6e8a4a3e57bb55356e04373dad92e0e12adfebb9247d6da916fbf9,2024-11-21T08:34:56.010000
|
||||
CVE-2023-43610,0,0,3398d70884a3b75d3665e9fcf50e949d3bc1d8320e3af92db062ae0a4fdfcae6,2025-02-20T18:34:50.990000
|
||||
CVE-2023-43611,0,0,c870388edda2fadd40d04f44c0e4b5df8dbf6e33dc5c1b8a0154cfcd890ffb51,2024-11-21T08:24:27.740000
|
||||
@ -241083,7 +241083,7 @@ CVE-2023-51754,0,0,5990abeb92795a2483bca9447d29e85b563f90fee4bd3d86ef95fd44bfd35
|
||||
CVE-2023-51755,0,0,ef67db68f5dc8286b447ec3eb725f76132db71d3e97ab41205e0053447e1146c,2024-02-14T18:15:46.907000
|
||||
CVE-2023-51756,0,0,2da76d00a3c8e433c8cf3ceecf4af63965fe93839cb19972c98891eea255b050,2025-05-28T22:15:20.500000
|
||||
CVE-2023-5176,0,0,089cb1115288b184fde7bf8813f6b12c223a35a4f0d244f28238a4c94b47588e,2025-05-01T18:15:52.350000
|
||||
CVE-2023-51761,0,1,5bef7993fd49e639375d47d16de790ee8c0777f926fbda5b4544029d4c62b8db,2025-06-10T19:15:27.317000
|
||||
CVE-2023-51761,0,0,5bef7993fd49e639375d47d16de790ee8c0777f926fbda5b4544029d4c62b8db,2025-06-10T19:15:27.317000
|
||||
CVE-2023-51763,0,0,c10c499362cf03a08a3f609dba3fd908e128903e62356fa988042861b44383ca,2024-11-21T08:38:44.580000
|
||||
CVE-2023-51764,0,0,68bf6066af973c65f300d23894dbf4aa356a3e3cf8cee280eeb2640147512e22,2024-11-21T08:38:44.733000
|
||||
CVE-2023-51765,0,0,7e2f6975525437c04272d273eaf98fe256b560ab01ad36b2b6e2672e6d8bf839,2024-11-21T08:38:44.980000
|
||||
@ -251750,7 +251750,7 @@ CVE-2024-22246,0,0,3ad8f091c992ef0cbdd48a2a2293d5474828742dbc9e91a3177d9a9487836
|
||||
CVE-2024-22247,0,0,98551df5e52ed97248ab470679d67b187ff4dc2bf422d4a17c411b750b658cc5,2024-11-21T08:55:53.110000
|
||||
CVE-2024-22248,0,0,7d11e6f20b6e40a0e1b3d2474db81de7a92f55a017f57048c4c374e5a84d824e,2024-11-21T08:55:53.237000
|
||||
CVE-2024-22250,0,0,40db3fb51052a18ec19cf444cfe62376d1b552d431677cfcf8f3962e85474381,2024-11-21T08:55:53.373000
|
||||
CVE-2024-22251,0,1,a98f7864da9714e729b8ce57bf0cafef405e688075ef2e34d80418fa56245454,2025-06-10T19:33:10.877000
|
||||
CVE-2024-22251,0,0,a98f7864da9714e729b8ce57bf0cafef405e688075ef2e34d80418fa56245454,2025-06-10T19:33:10.877000
|
||||
CVE-2024-22252,0,0,f5949bf1f821b4b0a30bff45e5e17fba5e511d8e2938928ceac12ac2a4f6fc6a,2025-03-27T20:15:21.593000
|
||||
CVE-2024-22253,0,0,d82ed5452593dc092b271c1ab049fd5d5f5b58e7da58c6d4ec27f5d12d786bf6,2025-05-07T15:35:46.910000
|
||||
CVE-2024-22254,0,0,3a56bec7fa36896f03cccbd63ae8f55be5ed77c66a50a8e191612be7b3df1c97,2025-05-07T15:37:28.313000
|
||||
@ -254252,7 +254252,7 @@ CVE-2024-25817,0,0,24fb9fa88c35098258f5c3f08547ebdab9fa05429aca7f1384875ff62d1c8
|
||||
CVE-2024-25825,0,0,0ffb769a5b15104308a542a8126cf407f088d0f85637998c3ea573ab17a15826,2024-10-11T21:36:24.583000
|
||||
CVE-2024-25828,0,0,6c0bb5940de5e96f5ca16393f1d0a516655bbac4099e03e4a759fc54dedd226e,2025-04-03T13:18:40.520000
|
||||
CVE-2024-2583,0,0,ec8ed9d2db80677fb7b8998ce552570f1169e1022c7b0e5cf7b08113f45fef05,2025-05-12T19:41:58.157000
|
||||
CVE-2024-25830,0,1,09e87865c76d37a3911cb8b610266f2a72607caac04bdab6b5a86dcdc36a9d91,2025-06-10T19:22:13.847000
|
||||
CVE-2024-25830,0,0,09e87865c76d37a3911cb8b610266f2a72607caac04bdab6b5a86dcdc36a9d91,2025-06-10T19:22:13.847000
|
||||
CVE-2024-25831,0,0,bd8cc628942f0cfec3cd605617d2c1225f2d77c4bfbb5c43b8cabd63ea5984ac,2025-01-16T17:50:46.660000
|
||||
CVE-2024-25832,0,0,0359e72eed9b587f1da939ee2b4f202d62bdd6b390e2936728c43fb3aef82845,2025-03-27T15:15:50.607000
|
||||
CVE-2024-25833,0,0,50dde66bc691dda473a0e2525b2d4cb41dc2484c7572d20b63fa74d0870cf5ff,2025-01-16T17:50:18.237000
|
||||
@ -255871,7 +255871,7 @@ CVE-2024-27715,0,0,588f0129d251c25a62c6758efd788f377fccf8c1d3855c585b3b6fa48c201
|
||||
CVE-2024-27716,0,0,4e33ff7b1a83f51fed4b80a3d94c6d3a9ee0c5bb94137c0b4ce8ff1d81d644a3,2024-11-21T09:04:56.483000
|
||||
CVE-2024-27717,0,0,7c5360378c1c098145273942daac7e3b2041c6891631d0b1d163bd0d3e72c1e7,2025-04-28T14:47:26.353000
|
||||
CVE-2024-27718,0,0,6fd0ecf52683c3600c47787d4abfe093befe302da46880121fb7e6cebae4c848,2024-11-21T09:04:56.920000
|
||||
CVE-2024-27719,0,1,d54a6d47900f274a1a878f6b15ae424af1ad2673ea148756d0e1663a32cebdba,2025-06-10T19:18:36.323000
|
||||
CVE-2024-27719,0,0,d54a6d47900f274a1a878f6b15ae424af1ad2673ea148756d0e1663a32cebdba,2025-06-10T19:18:36.323000
|
||||
CVE-2024-2772,0,0,02f750b020a1c0ddcf10a0cbf86dad19edb566b57ce2911796231437ddd08a75,2025-02-06T18:38:03.913000
|
||||
CVE-2024-27728,0,0,7ac0baa8172873b0a2a6a9b03d18aad08ac6aca8f91202c286a75d0b174cacbf,2025-06-04T17:18:07.780000
|
||||
CVE-2024-27729,0,0,809fcc66d1703da695f3fdd07183b33a76080add392f01a1abb9d8a582f159f5,2024-09-11T20:29:52.477000
|
||||
@ -256565,7 +256565,7 @@ CVE-2024-28717,0,0,f064c2527027f1d200a3ae2380ea6a1de60fc691a685db676c60e122a7822
|
||||
CVE-2024-28718,0,0,4b42598c1833414216b23ff75ba486396d15aa100de693110a04f3bae6d22b6f,2024-11-21T09:06:49.160000
|
||||
CVE-2024-2872,0,0,87925b419717d8830a879144756885cd88be21489574b937b1d8ebe32304a621,2024-08-02T19:35:35.923000
|
||||
CVE-2024-28722,0,0,6d443e07210f2fb5607864bee04861fe35c03f17da7b4f0c25c94d52a4275284,2024-11-21T09:06:49.393000
|
||||
CVE-2024-28725,0,1,bf7241efa7090a333fe7d0e2a1b366c3b2eca3107b2c7829320210430ee91528,2025-06-10T19:42:27.550000
|
||||
CVE-2024-28725,0,0,bf7241efa7090a333fe7d0e2a1b366c3b2eca3107b2c7829320210430ee91528,2025-06-10T19:42:27.550000
|
||||
CVE-2024-28726,0,0,e4a478e75be04e720bd4e13c28f4be85ea4531f0922534203e6979ffb00bb636,2024-11-13T17:01:16.850000
|
||||
CVE-2024-28728,0,0,2f49beb4a0091a43fe36381e11b91d64d1234257f60dc6e6d342d630ab81ec31,2024-11-13T17:01:16.850000
|
||||
CVE-2024-28729,0,0,aa6c44f849bb44d64165851d689a34ede9731d09f06e99f14e15f8565b92c1d6,2024-11-22T19:15:05.760000
|
||||
@ -258833,7 +258833,7 @@ CVE-2024-3161,0,0,7ff2082f6351ede04bcaee458485774bc296f65d182897eb72643563eb3d12
|
||||
CVE-2024-31610,0,0,4c6b6dc6d800562d34453d1236b542d5c9b28b5e80099dade9f215221da4dfa3,2025-04-04T14:39:00.233000
|
||||
CVE-2024-31611,0,0,d6f3916293f769d89e5742cac6baba324d007ac090647f4cd7a68157e23c229d,2025-03-13T18:15:39.873000
|
||||
CVE-2024-31612,0,0,e21e87a0350dc1dc4c0062c07acc797b1f129606b80779537140509864823f0b,2024-11-21T09:13:45.513000
|
||||
CVE-2024-31613,0,1,dc6132bebc7d3ac53b67d7b3f5c41e4b8ac52c9857401b0b57976690427c20ab,2025-06-10T18:14:29.873000
|
||||
CVE-2024-31613,0,0,dc6132bebc7d3ac53b67d7b3f5c41e4b8ac52c9857401b0b57976690427c20ab,2025-06-10T18:14:29.873000
|
||||
CVE-2024-31615,0,0,61049b753eaeb4c1ebb4ab43b6a4cb337141661b3876613701b7239d58530e53,2025-04-16T18:43:40.233000
|
||||
CVE-2024-31616,0,0,ce5060690e6e6c38f4b42fed4bd764ea68b08181e44c5a8e5340e1acdf22588b,2024-11-21T09:13:46.163000
|
||||
CVE-2024-31617,0,0,73a3cec0d5d804d344deae1a6a39fc6ea66b3e9cd931143fe074d1b7ff4884db,2025-06-05T15:20:09.800000
|
||||
@ -260017,7 +260017,7 @@ CVE-2024-33111,0,0,17f4a588b6771453aae4fc0d8fe54488d2c27b36ab3b37893b9ded6fd2912
|
||||
CVE-2024-33112,0,0,f8ad2bcf8d7e340ab8b56d4ec4e1bfe3463c718134abce8b16f9a87aaa63e418,2025-05-21T13:02:30.203000
|
||||
CVE-2024-33113,0,0,7cf7987cc0dd6caecd85afedffd5aa13c551f5a0cf5e90dfd19e9f43dd0dd370,2025-05-21T13:02:27.457000
|
||||
CVE-2024-33117,0,0,8552376d82bc5ea5f10b0096ec96a0896f4535cab3b58e17a1204148ea532a7a,2024-12-06T21:15:07.340000
|
||||
CVE-2024-33118,0,1,72c8999c88c2b5558e4a8f33a58e566f4eb8caa38d2e54a61703d28769d04715,2025-06-10T19:43:40.383000
|
||||
CVE-2024-33118,0,0,72c8999c88c2b5558e4a8f33a58e566f4eb8caa38d2e54a61703d28769d04715,2025-06-10T19:43:40.383000
|
||||
CVE-2024-3312,0,0,5f7abfea07e26708b46deb725eba9cf7ab27075e45367056ede9366567e02312,2024-11-21T09:29:22.277000
|
||||
CVE-2024-33120,0,0,6059ae7834dce7456d75514ab19c32a74ce0bc8de7f67b7ab7f5e8e4997c2e7a,2025-05-01T14:55:22.393000
|
||||
CVE-2024-33121,0,0,4d0cdf195b7af822ecf9552669fca899ba17446d26e82e19dc60b2b08d04c551,2024-11-21T16:15:24.297000
|
||||
@ -260094,7 +260094,7 @@ CVE-2024-33297,0,0,f985b4ec95c2159e5e76f9d25a77776d09282d508692ae1cc59363a781355
|
||||
CVE-2024-33298,0,0,9c06b8ccfb08582acacd17859b848ecaf4ddac6e1a1c8fdec283caac233271cd,2025-01-13T16:15:16.813000
|
||||
CVE-2024-33299,0,0,526210a22947a8b57295bbb5ff835f3ee5d2471b06fd3b2ff15a98e0e72c6e1d,2025-01-14T16:15:28.893000
|
||||
CVE-2024-3330,0,0,c065d4bcab4f16db3053a980305730ff33dd0d5eb8ac38631155f08ab4ecfec1,2024-11-21T09:29:24.060000
|
||||
CVE-2024-33300,0,1,033135dad6d48168fc642068d9cc131ad80fb382c3ee3b11807da2cee0c2f2b7,2025-06-10T18:07:52.360000
|
||||
CVE-2024-33300,0,0,033135dad6d48168fc642068d9cc131ad80fb382c3ee3b11807da2cee0c2f2b7,2025-06-10T18:07:52.360000
|
||||
CVE-2024-33302,0,0,0c7be401f051d22afd63a81d9dc3334104a73c22a0ce5b2bcb8cef27905c6773,2025-04-22T16:16:27.233000
|
||||
CVE-2024-33303,0,0,05ff887d8066217fded343844e694b013fdf584e0d06817c5541ff4b5f6bc0b1,2025-04-22T16:16:04.177000
|
||||
CVE-2024-33304,0,0,b8a7c1e293a96b3b10a57a8135c5ad2ae036faa22554ea9e6c2e44f72034ad48,2025-04-22T16:48:57.193000
|
||||
@ -260433,7 +260433,7 @@ CVE-2024-33783,0,0,3efb6717dc071bcd4966a7972f6670fd4553a3d85347d37b83769ae70d5d4
|
||||
CVE-2024-33786,0,0,e1fb385dd8747da32e59253a9ffdea319cd8cdf03f2ca73f386cdc040ae670ac,2024-11-21T09:17:29.420000
|
||||
CVE-2024-33787,0,0,c49a88a43a707c2472f311af9a25d218e0650695fd55867c121db961e1d0f0a5,2024-11-21T09:17:29.593000
|
||||
CVE-2024-33788,0,0,43883aa11c8f8d9e2b0e9c2a3228de314f0cbb5388933699b91e2c176c156f8e,2024-11-21T09:17:29.797000
|
||||
CVE-2024-33789,0,1,5986e92c6ccb4c451262b2b9902891f0ea70e1b2b0fa3b4355e2c35998fcde42,2025-06-10T18:01:58.607000
|
||||
CVE-2024-33789,0,0,5986e92c6ccb4c451262b2b9902891f0ea70e1b2b0fa3b4355e2c35998fcde42,2025-06-10T18:01:58.607000
|
||||
CVE-2024-3379,0,0,ff4b29a94fdd9578584432ff10eeb3895455cc484ac7d59b569ca6f419a0ff31,2024-11-18T21:30:49.947000
|
||||
CVE-2024-33791,0,0,cd712f1b08608ec404f57f0c2d9228e781ce3c7f5333a295e303b9e9ebade340,2024-11-21T09:17:30.170000
|
||||
CVE-2024-33792,0,0,557c8be18231f105a49eedca527312b5e6afffb508bf833760792de404b3ada4,2024-11-21T09:17:30.357000
|
||||
@ -260449,7 +260449,7 @@ CVE-2024-33805,0,0,4ea95364c9464019939f3f94936b8688d722b06fad52fbeeef4b595d7ddb6
|
||||
CVE-2024-33806,0,0,ddb5e7e5961ed8599a01c1fb6fad34b5ab465edeef84b85f5fa3c206f30f59b5,2025-03-25T17:18:42.710000
|
||||
CVE-2024-33807,0,0,833725a27cf95506eb88c7a1d30758babdde5c5e149663c2e7958e9ef741aa14,2025-03-25T17:14:05.797000
|
||||
CVE-2024-33808,0,0,42cf0b3dc36e6b94e81e34d753f9588a43c4cf40076d9723e5f62db9b48cf068,2025-03-25T17:14:01.137000
|
||||
CVE-2024-33809,0,1,9fcab3f9e0ee9cedd33a4f4498b64ad29d80b7624388ddfed756044b37fde0d8,2025-06-10T18:41:45.063000
|
||||
CVE-2024-33809,0,0,9fcab3f9e0ee9cedd33a4f4498b64ad29d80b7624388ddfed756044b37fde0d8,2025-06-10T18:41:45.063000
|
||||
CVE-2024-3381,0,0,54f1490359f84b37b9085d1c2a64f460d8cc1a4d213b5755f1dd6de7bae13285,2024-05-27T13:15:08.490000
|
||||
CVE-2024-33818,0,0,0d7c4b76cba1dfa6da185b5a73313b4cd3894cea6b8d1c4bba28860c0480eb08,2025-03-27T16:15:23.787000
|
||||
CVE-2024-33819,0,0,7e61d4c0dd3553f64a2e5fef11b92143383472dd77b567ea2aea59f5055dae94,2024-11-21T09:17:32.847000
|
||||
@ -260529,7 +260529,7 @@ CVE-2024-33917,0,0,60a4af7cfcf4e06103f1c6d2c14a236296bec211e9de649b77897e1343e38
|
||||
CVE-2024-33918,0,0,e8891d682c150e2a43c93ac529887aa1876ac7532ae4799d67c2de59df0be1be,2024-11-21T09:17:44.117000
|
||||
CVE-2024-33919,0,0,218db7aa94acd5b3ba852e0809032a287e01423410a27beaab7a21a7e53a110c,2024-11-21T09:17:44.220000
|
||||
CVE-2024-33920,0,0,ab8ac45645ff2c704965c3c5bc33eb89aadcf679ae48d6aba2272b5e5c924b84,2024-11-21T09:17:44.330000
|
||||
CVE-2024-33921,0,1,c6acf3e7e8760d02218ceb4296b8dc0d169e3ebb0021a8fe04b1b945e2e4dff3,2025-06-10T18:03:40.997000
|
||||
CVE-2024-33921,0,0,c6acf3e7e8760d02218ceb4296b8dc0d169e3ebb0021a8fe04b1b945e2e4dff3,2025-06-10T18:03:40.997000
|
||||
CVE-2024-33922,0,0,65eba2319c2a51514d45da9dcd10a8b65b24e12155252c3daa3d30d298c36d37,2024-11-21T09:17:44.547000
|
||||
CVE-2024-33923,0,0,dbfce3ba0743fb6a4583c3e35cd600c60078753f20517993f110fc9ddb292585,2024-11-21T09:17:44.647000
|
||||
CVE-2024-33924,0,0,cd91ae14d143fd3a9244e608a4fac373aeff872b53921238973d6be9b0353107,2024-11-21T09:17:44.750000
|
||||
@ -260914,7 +260914,7 @@ CVE-2024-34398,0,0,4678c93c73e8144cbdfc3aa33b9d1ca48656b5f205f2aceccc9c17c7a1776
|
||||
CVE-2024-34399,0,0,fa616a5babcaf42787946ebecb7f12ab699617c74e0d38a5c61b1374f609b858,2024-09-20T12:30:17.483000
|
||||
CVE-2024-3440,0,0,3f13bc3624027e098a71bfa9faf881800f72231b484f42c72b9113d8573cc5ea,2025-02-10T16:13:08.300000
|
||||
CVE-2024-34400,0,0,61addbb37f2be6f3520fd1cbc50bcd9bbc76a89c19689ad04dca7f6a95f34a40,2024-11-21T09:18:35.293000
|
||||
CVE-2024-34401,0,1,ad64215e77a2b77255b5ebe7935007458638468cdfe46fd9b5c1118486e1d08c,2025-06-10T18:06:46.050000
|
||||
CVE-2024-34401,0,0,ad64215e77a2b77255b5ebe7935007458638468cdfe46fd9b5c1118486e1d08c,2025-06-10T18:06:46.050000
|
||||
CVE-2024-34402,0,0,e2263cc9bf7b4e27acf49cdb19cf0fdb717ff43ddb40b241b482f3718a709dbe,2024-11-21T09:18:35.737000
|
||||
CVE-2024-34403,0,0,b1c3c1354b2410af6d5a743f38e48d435410bc652a0d6da4974ed394e2f4ae27,2024-11-21T09:18:35.980000
|
||||
CVE-2024-34404,0,0,45cd797469fadab4130ad07f7dba5d42cc10e87e49d302cddd2916272514d9be,2025-03-28T20:15:23.287000
|
||||
@ -261444,7 +261444,7 @@ CVE-2024-35102,0,0,a3ac6cb938aa7738580fe72bae53eba68e5c5ac83bdf3dd07089a3c2800ee
|
||||
CVE-2024-35106,0,0,b3cbb527e89eeaa447d1de741b34621dea8868efaceae836286cd0a4cc5c9cc1,2025-02-11T16:15:39.913000
|
||||
CVE-2024-35108,0,0,491ec2260165d7f7d3efd5be494989910741df5aa19c1bf25c8b4a132d685389,2025-04-15T17:02:50.950000
|
||||
CVE-2024-35109,0,0,8d3fa27f37233d70869ab46151b8c18b411e269cb16c472303eab804df9c5c1b,2025-04-15T17:02:45.973000
|
||||
CVE-2024-35110,0,1,5befbb4d6ff243e493eb0845590af56b30d55ebed4c9cc3628eccbae22269a4d,2025-06-10T18:32:58.057000
|
||||
CVE-2024-35110,0,0,5befbb4d6ff243e493eb0845590af56b30d55ebed4c9cc3628eccbae22269a4d,2025-06-10T18:32:58.057000
|
||||
CVE-2024-35111,0,0,32e114bfcb14b5f1a3ca174c51aa1f1f24655b09f1f515c98299c51557856017,2025-03-04T17:45:08.987000
|
||||
CVE-2024-35112,0,0,3280206f8a84b4c8489cc36e2e9cce1c1682791d1bd75d078ad6e3f08e151b0d,2025-03-04T17:43:28.240000
|
||||
CVE-2024-35113,0,0,96cbec05664b2908cffab97e57ae7ea791a417f247934ce466f8a3d39af00ebd,2025-03-04T17:26:35.850000
|
||||
@ -262657,9 +262657,9 @@ CVE-2024-36522,0,0,9b80d6d8ad834b2ad12a9c002e135616fd5e236e3616bd648663cccfef77b
|
||||
CVE-2024-36523,0,0,dc465e2d7dbaf26a7ffbd5ea3623a483d3bc760775e8b283b9659c08d888d538,2024-11-21T09:22:19.770000
|
||||
CVE-2024-36526,0,0,7eb130a5f3d73c89b7f5cd8217a059ab207fdeab2df485fcb069aa0328d07168,2024-11-21T09:22:19.993000
|
||||
CVE-2024-36527,0,0,2fe968f9db97e47864d546cb83cbb537d4cf1bd288baee48e4ffbf302a88ab2b,2024-11-21T09:22:20.213000
|
||||
CVE-2024-36528,0,1,7d2ac3f933b7d4ae4e0c8f5c2d73d6177e5b580ae5639fefe1188c34354b0dde,2025-06-10T18:31:33.757000
|
||||
CVE-2024-36528,0,0,7d2ac3f933b7d4ae4e0c8f5c2d73d6177e5b580ae5639fefe1188c34354b0dde,2025-06-10T18:31:33.757000
|
||||
CVE-2024-3653,0,0,54e462017b45f0c8f3e8f7e260b096f8028d979506f49d916b7586b57d75848f,2024-11-21T09:30:06.253000
|
||||
CVE-2024-36531,0,1,e307e7b133d24b35a61e50f632ed1519b30f7abf81b58191a51b53038ffabb58,2025-06-10T18:26:17.380000
|
||||
CVE-2024-36531,0,0,e307e7b133d24b35a61e50f632ed1519b30f7abf81b58191a51b53038ffabb58,2025-06-10T18:26:17.380000
|
||||
CVE-2024-36532,0,0,d4193996b0397e0a4dee577d3e251e2d9d6acc4697b78e5be5b0ad0f0577a357,2024-11-21T09:22:20.870000
|
||||
CVE-2024-36533,0,0,7b37764a0b7853f615719a995566f68d7a7deee74def6781711cb81ae23e8665,2024-11-21T09:22:21.090000
|
||||
CVE-2024-36534,0,0,2ccc9352f401338f7a13af480165921c3a497a579b8305661c53b267de31f42b,2024-11-21T09:22:21.297000
|
||||
@ -263347,9 +263347,9 @@ CVE-2024-3739,0,0,e485b7726bfb9c0e0538daf95db79a608df3dc6996a1c1fff88cd1b1e128d7
|
||||
CVE-2024-37391,0,0,83604059a0a3493e2890c3d7d2ec3ff1f78123fc0b5c774b0cb9659167e26236,2025-03-13T15:15:45.533000
|
||||
CVE-2024-37392,0,0,2ddcfdda121ccf673d3c3575ba342373b49a9baac2c6a11d1f9b50a7a51a719f,2025-03-20T14:15:19.487000
|
||||
CVE-2024-37393,0,0,59f9709c253a77f24571bf0211deb5a06ff1bfae384e16dec166534c4a1c2a5e,2024-11-21T09:23:46.627000
|
||||
CVE-2024-37394,1,1,8659e7677c2e6a6b5663456a11183774f367d0f5f5c99a0e7ee7c8cc4159dda3,2025-06-10T18:15:29.527000
|
||||
CVE-2024-37395,1,1,fbc3f124796da6de01089ac670eed86fa687af889d780a1b50b5136c8c1fa4d8,2025-06-10T18:15:29.660000
|
||||
CVE-2024-37396,1,1,ecc5302a6eb03fa788bfa1b2bb89251461d308c62303a273d379d93f827194ba,2025-06-10T18:15:29.773000
|
||||
CVE-2024-37394,0,0,8659e7677c2e6a6b5663456a11183774f367d0f5f5c99a0e7ee7c8cc4159dda3,2025-06-10T18:15:29.527000
|
||||
CVE-2024-37395,0,0,fbc3f124796da6de01089ac670eed86fa687af889d780a1b50b5136c8c1fa4d8,2025-06-10T18:15:29.660000
|
||||
CVE-2024-37396,0,0,ecc5302a6eb03fa788bfa1b2bb89251461d308c62303a273d379d93f827194ba,2025-06-10T18:15:29.773000
|
||||
CVE-2024-37397,0,0,645394d57366af4d14bd72b0f709a5f25542d1f984f3b92daf1f425614dbe561,2024-09-13T16:35:09.630000
|
||||
CVE-2024-37398,0,0,0f42760c0326cdea8f98f78b855bbf63b71770b97a72517371b459e84e271523,2024-11-18T15:23:23.543000
|
||||
CVE-2024-37399,0,0,91513a99b1995bb678a44db233b24968cd7625f00c77086c4c8d80914d8fefca,2024-08-15T17:31:49.067000
|
||||
@ -263657,7 +263657,7 @@ CVE-2024-3783,0,0,63ed2c6db85ddced65490d88747d9f9c60589606466f96b7676d2539f5bb0d
|
||||
CVE-2024-37830,0,0,9396113938aff690243b110d71c1db69617c2b0e2f623a15484e143c1ba91169,2024-11-21T09:24:21.857000
|
||||
CVE-2024-37831,0,0,441743a859c32d6468deb58ac518c2787d768e84d36d713eb3a544fa4a083a51,2024-11-21T09:24:22.087000
|
||||
CVE-2024-3784,0,0,dd478a72cc7e6da4a4f7ad7472df523284b9cdfb10e28b224cb313000b4bb37e,2025-02-27T16:19:43.660000
|
||||
CVE-2024-37840,0,1,15871418aac0e39f110d264810507060061350b31f2a731e7b392a370056029d,2025-06-10T18:12:34.147000
|
||||
CVE-2024-37840,0,0,15871418aac0e39f110d264810507060061350b31f2a731e7b392a370056029d,2025-06-10T18:12:34.147000
|
||||
CVE-2024-37843,0,0,0b3063ae527efc2fee65f8cf91bc539262de9f2518563f8af622b9935d078d5d,2024-11-21T09:24:22.550000
|
||||
CVE-2024-37844,0,0,309b5878be678f267abd2605f919c710c5a70b405c93110c0363d43291df9df3,2024-11-05T16:03:33.217000
|
||||
CVE-2024-37845,0,0,7e23ffab4e3d435b6bae4de19f00b6496dd2e59edb55d76da49eb90fd7da1e04,2024-11-04T21:53:53.433000
|
||||
@ -264882,7 +264882,7 @@ CVE-2024-39306,0,0,8e446f8cd38382555b776a84edd1102287cdb22d9e95652344c53f12d26a9
|
||||
CVE-2024-39307,0,0,54fef08c46653f6e61b6f0cd14a692daff3eb07244b26dc42dd314c57d353922,2024-11-21T09:27:25.713000
|
||||
CVE-2024-39308,0,0,5e2a254789b6adf99c0777cff7acf6dd961d09c4b36426a3aeec492e329363b3,2024-11-21T09:27:25.837000
|
||||
CVE-2024-39309,0,0,05dddb230d488a4715733b5828a558e0d37a47d27fd705c4212d0a536cb382bd,2024-11-21T09:27:25.990000
|
||||
CVE-2024-3931,0,0,1a38c5b918e27e20b2d0a3fb12abd6fe9ae68c20f1e615049592c663fbe0e401,2025-06-10T06:15:21.053000
|
||||
CVE-2024-3931,0,1,f553904db358d69cb5020f261a83091b27e3f8e1734a2d71233128d75e944924,2025-06-10T20:08:09.853000
|
||||
CVE-2024-39310,0,0,09dc0d6f8f165690ce5741ca2ed6e9da3275d325f18578ccaad0e38dbe7b8f91,2024-11-21T09:27:26.120000
|
||||
CVE-2024-39311,0,0,ebf789116a74eb2a4f5371006bc49718c2bb9a41ce67f4e999602b1ddee53657,2025-04-14T14:24:49.550000
|
||||
CVE-2024-39312,0,0,244e5eeda7d77b8f762732664cb450aa8179af57ae55ef58be1fa7ad940fc27b,2025-04-11T14:09:48.327000
|
||||
@ -266448,6 +266448,10 @@ CVE-2024-41482,0,0,0a596a5cf7b27067c86547cf8e385cb1be782f18b5f9b3af58ba9ccf7350b
|
||||
CVE-2024-4149,0,0,ce35c5dabaf9e62f62b27cc2db90363703ad2249bc96cfb9d4c9aa830d3e1498,2025-03-26T15:15:52.433000
|
||||
CVE-2024-41492,0,0,0f8b4f7028b46594d815901b3c46f498a5d62420cc14f100e4b212c233005a09,2025-04-07T17:27:14.087000
|
||||
CVE-2024-4150,0,0,2e8c0a57bcb392581939b062355027d1d8486c47fcac2388b6838611dbf235a6,2024-11-21T09:42:17.333000
|
||||
CVE-2024-41502,1,1,5029d7ae53258a3cbf50ec4c92c2614074d439128dd03a3ee865a2a5eaf5fd4d,2025-06-10T20:15:21.470000
|
||||
CVE-2024-41503,1,1,3f2bf3e731d782e3e7ef0d8c1c0b40b826a768bdc0773a433e02bd2f6c25b5fb,2025-06-10T20:15:21.610000
|
||||
CVE-2024-41504,1,1,37067d42d1b425849206a99c4fa3d1a775facce230487c29a50bf5bc10a01177,2025-06-10T20:15:21.733000
|
||||
CVE-2024-41505,1,1,123247ab5738cc46457400910d8683f2f005356335856263f36c4cc9a0d308a4,2025-06-10T20:15:21.850000
|
||||
CVE-2024-4151,0,0,337c26dffc6a0b1164159cb60fac00060ef9443ae253113be62690b03c8c28be,2025-01-31T11:15:10.620000
|
||||
CVE-2024-41511,0,0,6347d6e8bdca9e61881aa8b3e3ce915cd91cf5be437f01825e5d12236e6d66dd,2025-06-02T17:41:35.250000
|
||||
CVE-2024-41512,0,0,6c48f03f5a62a673b28167efa2657e1883db56964e6cb4fe91d57cc6cf6d0d2b,2025-06-02T17:40:46.877000
|
||||
@ -271622,7 +271626,7 @@ CVE-2024-4817,0,0,0dcd699a58b3fa13f00e699c07879a8849bbc3d5b97bd9762b35657461b567
|
||||
CVE-2024-48170,0,0,34fd20d51f74a2ecf2d8d3a06f0137fb8961ff5f329c5a6acaaa7ddfeee73779,2025-02-18T20:15:19.797000
|
||||
CVE-2024-48176,0,0,8cb771d702cd09277abeddf2e7225393d633247d884aeea4273f944a8d1f66b2,2025-05-01T15:00:20.730000
|
||||
CVE-2024-48177,0,0,90649086193e291835bdef2f7e6fa80e829ddcc4d99dbc3822e4f44d6589f188,2025-04-18T01:23:30.553000
|
||||
CVE-2024-48178,0,1,d54c726e113b0dfab4a3ddc1b25a2fae3858fcd17b5c53503e68c40944d0ee37,2025-06-10T18:44:10.583000
|
||||
CVE-2024-48178,0,0,d54c726e113b0dfab4a3ddc1b25a2fae3858fcd17b5c53503e68c40944d0ee37,2025-06-10T18:44:10.583000
|
||||
CVE-2024-4818,0,0,7eb9f87453466a82567333ba5bc5e47b162cdd22e1273603be23f63fb83da218,2025-02-20T18:17:41.877000
|
||||
CVE-2024-48180,0,0,fdcd0adbd6e000b70b86c96463685b3f8e06e9e3d993eb287a59410e3231c0c2,2025-04-28T17:34:22.620000
|
||||
CVE-2024-4819,0,0,357db78a10d6a847667b9ca0f576e976c5fe2a876dcd6731bb57683aeb2a6700,2025-02-20T18:16:52.500000
|
||||
@ -271649,11 +271653,11 @@ CVE-2024-48224,0,0,3bde62d3564470d94f47952655096096272b2c29ad34a2b57639c2bee8676
|
||||
CVE-2024-48225,0,0,9a69fc6c09d6c7d8deaed95b8833063b6ab392618027f193767998496d2d5abf,2024-10-31T15:35:46.407000
|
||||
CVE-2024-48226,0,0,7b5c8b23d52f929b13245a15fb1a5ef3f9829f2f71ca0aa283f9572db3742282,2024-10-31T15:38:32.917000
|
||||
CVE-2024-48227,0,0,7faf356b350dc38fb0b35229e5b925245f71f461da25edc8ab8307d84e45486c,2024-10-31T15:48:19.927000
|
||||
CVE-2024-48228,0,1,f5363f135c1516d4db94a0a5fcc6a852f8689ac7001c3b01cae0d7e373b401d6,2025-06-10T18:46:12.453000
|
||||
CVE-2024-48228,0,0,f5363f135c1516d4db94a0a5fcc6a852f8689ac7001c3b01cae0d7e373b401d6,2025-06-10T18:46:12.453000
|
||||
CVE-2024-48229,0,0,753695ef497a3b33ba510b0cc1abbfd97d1734ff029994a01afd3f86eaa36f6f,2024-10-31T15:49:11.533000
|
||||
CVE-2024-4823,0,0,7a94f4e2979011f7645f376909dacda84ba52f8c331da75e2c621bf9b82d3a17,2024-11-21T09:43:41.830000
|
||||
CVE-2024-48230,0,0,b4098c1a1922ed9aedd74b2197ce0761cd26e416d9d284b7a22c6f89401cf374,2024-10-31T15:57:23.693000
|
||||
CVE-2024-48231,0,1,b5293a7d07a11178cd414bf3d7963150b4062c9936cf95fe0229c0281e923474,2025-06-10T18:57:51.190000
|
||||
CVE-2024-48231,0,0,b5293a7d07a11178cd414bf3d7963150b4062c9936cf95fe0229c0281e923474,2025-06-10T18:57:51.190000
|
||||
CVE-2024-48232,0,0,b8671628647703c7771fe995c20e120eaf0662d571698887d3f6092edd741c0d,2024-10-30T19:35:26.257000
|
||||
CVE-2024-48233,0,0,4c1b8613b92789d2a1a4ceb040217c085ac3354ebc641db500cdc80096f1b499,2024-10-30T19:35:27.360000
|
||||
CVE-2024-48234,0,0,133ce6bfaf8a3bf889c4c8407c1ad16ff3c3f45f7ba5c6c0a5b225a8f849cca6,2024-10-29T19:35:19.743000
|
||||
@ -271730,8 +271734,8 @@ CVE-2024-48419,0,0,cf877c0c42116621043856f5a076e313ee25d0e68c7d86d2bdc7d809debe3
|
||||
CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000
|
||||
CVE-2024-48420,0,0,e34a62ce475f21638fedc41e6a91aab3747d8d818fc9bfd5cc0c8b2bef317c00,2025-05-28T17:53:50.397000
|
||||
CVE-2024-48423,0,0,905d7aa9f40bc2315b64415beaca8558efff30feb4eedc78c3f814354c0055b2,2024-11-21T09:40:45.127000
|
||||
CVE-2024-48424,0,1,b3030ac2cc7ee08e90a93235f604ecd877aec94adcc47509ad51d15173b2c9be,2025-06-10T18:52:19.943000
|
||||
CVE-2024-48425,0,1,ada05822406d79d8ee0054e7e273f1736ceadd7e0c40729ecb0373e2dd6b5d7d,2025-06-10T18:47:27.137000
|
||||
CVE-2024-48424,0,0,b3030ac2cc7ee08e90a93235f604ecd877aec94adcc47509ad51d15173b2c9be,2025-06-10T18:52:19.943000
|
||||
CVE-2024-48425,0,0,ada05822406d79d8ee0054e7e273f1736ceadd7e0c40729ecb0373e2dd6b5d7d,2025-06-10T18:47:27.137000
|
||||
CVE-2024-48426,0,0,23c43b45e4070fa645a9c9f6eda4a911da4949bb83b450edd2a2a3836ca3c99a,2025-05-28T21:06:42.670000
|
||||
CVE-2024-48427,0,0,f5bc199ef1ea0736820435167bda31ad1018743e2ba5f1a061cbeb83f0e27129,2024-10-31T00:07:25.997000
|
||||
CVE-2024-48428,0,0,bb407217c76a1ecdc5d79ef9c90964560c50b9ab959aec047d066b6b5c9d80d1,2025-03-19T19:15:41.880000
|
||||
@ -277848,7 +277852,7 @@ CVE-2024-57184,0,0,3fd914158434721c2565c1759ef928a3f64e92f246b28f05ed1e4a71635f0
|
||||
CVE-2024-57186,0,0,3cb7bfc921c90a0c2e8bf89e93b21235b5460fce01f59754b641c8ef5841e3b8,2025-06-10T17:19:40.367000
|
||||
CVE-2024-57189,0,0,4fc162f08873672d8151f27900e054f69ae2c9ba29a1ff213a01b33fcfcbe787,2025-06-10T17:20:09.367000
|
||||
CVE-2024-5719,0,0,3d2db656c5d1f0a79b62bae36bd1cd10161f3160ac0d855266c2bbd4d021243f,2024-11-22T20:15:10.450000
|
||||
CVE-2024-57190,0,0,96b4ea5b8e89fdf65c2dc7a6134f3d15efcff4445931482d71fe8a7a365fc624,2025-06-10T17:20:38.540000
|
||||
CVE-2024-57190,0,1,08b9e89723ba8456142ddb25972cfe6f270f1b34e7110981d2b565e32a3de4f9,2025-06-10T20:15:22.247000
|
||||
CVE-2024-5720,0,0,eb323a155cad85d456bd7c0f7894b5f9589ce98c04e2db5736a7c40744f539a9,2024-11-22T20:15:10.563000
|
||||
CVE-2024-5721,0,0,f143dbbb695fa9f83fd9d3c9d9d3aaa920ced069d4617f7e2c69a39cb694b5ad,2024-11-22T20:15:10.677000
|
||||
CVE-2024-57211,0,0,98fcb4c7f26e4032b5a1184446b4d799208b39be2e033c671a8c4b297e19eeb9,2025-04-03T15:48:09.543000
|
||||
@ -282432,8 +282436,8 @@ CVE-2025-0036,0,0,4622d895242474524300bf29581e972fd6b88949fc94bc4781252a482e3712
|
||||
CVE-2025-0037,0,0,cc1dfde006ade30b52c8384bda8e2e9f8b9a5502ce2fb01803c3f24f8c09eb35,2025-06-10T00:15:22.103000
|
||||
CVE-2025-0049,0,0,8566ff09b2bbb295e6a6510741945c10bdac42655494cd307530daa390a46ab3,2025-05-10T00:55:19.180000
|
||||
CVE-2025-0050,0,0,482b5ff7576183287db2c32c74da0d2abbf92554144e005c1fef00f71efefdf1,2025-04-08T19:15:46.877000
|
||||
CVE-2025-0051,1,1,a8311d8a9eac126cae51be2473175d3b4bef87b003cdf9ef15926d4c098819b1,2025-06-10T18:15:30.030000
|
||||
CVE-2025-0052,1,1,89c8cc9be5c0c845432fcc334b32c49c30a4a7c78321df8fa635f8470198c7f5,2025-06-10T18:15:30.180000
|
||||
CVE-2025-0051,0,0,a8311d8a9eac126cae51be2473175d3b4bef87b003cdf9ef15926d4c098819b1,2025-06-10T18:15:30.030000
|
||||
CVE-2025-0052,0,0,89c8cc9be5c0c845432fcc334b32c49c30a4a7c78321df8fa635f8470198c7f5,2025-06-10T18:15:30.180000
|
||||
CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000
|
||||
CVE-2025-0054,0,0,b8bc9804913976424582a72964eb068b4365d1e22607e5b0c46a2e77e3b25525,2025-02-18T18:15:28.260000
|
||||
CVE-2025-0055,0,0,0e89795bc87c51adbc679d78b37bf974fd01b97679ad0635934ee83322d4b078,2025-01-14T01:15:15.570000
|
||||
@ -286295,7 +286299,7 @@ CVE-2025-23099,0,0,76197de6f7075c8d8a9f0fc39558cb7eedbeb1e6ce55a9cdbe78882e1931c
|
||||
CVE-2025-2310,0,0,1254bedeef285364d4ce4cc304a3b27319f0e76b0b0498fd69d05aba0b6f3806,2025-05-28T18:12:42.130000
|
||||
CVE-2025-23100,0,0,46b37fe2c3228425bf3c04fe972bc0cdefe57e7dc18dacde4550fc6f81a56a37,2025-06-06T18:45:16.443000
|
||||
CVE-2025-23101,0,0,cc19cf5c7434529aeced05e986d69324969dba24b6a740d7f092ac779d3d70fd,2025-06-05T20:12:23.777000
|
||||
CVE-2025-23102,0,0,698850e268311f21f42c66620e97a010c579c3717cbd82cc7156a4a41724d3d0,2025-06-09T14:15:22.093000
|
||||
CVE-2025-23102,0,1,49abde4781c7970c0963b4225909dbd07917e4ed564029a579d5c8c20b131ddd,2025-06-10T20:07:12.893000
|
||||
CVE-2025-23103,0,0,af7de4223ee48e5d5418763433d6687e1e0444809ae878b4ad8a4335b22ba78e,2025-06-06T18:49:19.250000
|
||||
CVE-2025-23104,0,0,5a4215e79ac958e04815e0d83cdbdc0822de3272f45b4d0aea0c06e194c03746,2025-06-09T14:15:22.403000
|
||||
CVE-2025-23105,0,0,0cfe1826e7f6e2704ce0e8c0045a2d064cd7652071b287e953f8c489e8a22a74,2025-06-04T14:54:33.783000
|
||||
@ -287759,7 +287763,7 @@ CVE-2025-24736,0,0,1e8a96652fc2162e5783360265a8d95c57b803a595f82f3425468a4e8170b
|
||||
CVE-2025-24737,0,0,9483d129977b5a55aa4e0fc4b6924a76dadd8b2c82251145da31eab6c37c7862,2025-04-17T20:21:48.243000
|
||||
CVE-2025-24738,0,0,ff824e93f081ca47b8768807ed6baf0479ca4ae475620ff9b3eabc39fddae9c1,2025-01-24T18:15:48.017000
|
||||
CVE-2025-24739,0,0,2511d2bc15670f2f05a63c18d4ca8980ee5ac36501cd02fafaa675bb11e9da2e,2025-01-24T18:15:48.177000
|
||||
CVE-2025-2474,1,1,a607c17516d9823265efebfc75c38671fbb84aad8e9e56480d1fdd88e242b4eb,2025-06-10T18:15:30.477000
|
||||
CVE-2025-2474,0,0,a607c17516d9823265efebfc75c38671fbb84aad8e9e56480d1fdd88e242b4eb,2025-06-10T18:15:30.477000
|
||||
CVE-2025-24740,0,0,6625bfe56de6b3a16927dfe5b854d7fd1ba6fb38ee1b7183ea2974f9f55a36a3,2025-01-27T15:15:16.537000
|
||||
CVE-2025-24741,0,0,ff6450b1af6908df2e44b6535e5b24a0380c0174fb20cfb2b978f741b76c5dfc,2025-02-10T16:00:11.040000
|
||||
CVE-2025-24742,0,0,6ef73fa0e67e6dadbcd7b6ade881469cccf34ee6f1ad4930d0628185680e8f85,2025-02-11T15:53:48.107000
|
||||
@ -290002,7 +290006,7 @@ CVE-2025-2880,0,0,e389725818c992645d02e6070b5c39fb3800bf8237a4c9078a3291c23ae543
|
||||
CVE-2025-2881,0,0,fdb559a0489fd102237eb30f41f019d2f5c2b3faa82f877e9abc8e7c02b82b2c,2025-04-15T18:39:43.697000
|
||||
CVE-2025-2882,0,0,c97b3f3ea8d4bf1b525408e9c0aeb5839e6b1dab2a43ddecf7ef1915f34a41ad,2025-04-08T18:13:53.347000
|
||||
CVE-2025-2883,0,0,de11120bf19ac8735b713769da981d898702017cd1ccc7eb0f5a880098b288b6,2025-04-08T18:13:53.347000
|
||||
CVE-2025-2884,1,1,5e072d72f816ed35616d5f52cc6f7b9f5b38ba09182083cab62d4e2073153ed3,2025-06-10T19:15:28.847000
|
||||
CVE-2025-2884,0,0,5e072d72f816ed35616d5f52cc6f7b9f5b38ba09182083cab62d4e2073153ed3,2025-06-10T19:15:28.847000
|
||||
CVE-2025-2885,0,0,d7e6b0bcc2bde4b9a153bfaf9504a6fe34cca823b62dab5c29aeb4ff68d351e8,2025-03-28T18:11:40.180000
|
||||
CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28856,0,0,49facbda8e3a831c26c726b61bef1fcd0c7982f3fa2f79e25ef260adf4085d93,2025-04-09T14:05:44.960000
|
||||
@ -290756,7 +290760,7 @@ CVE-2025-30322,0,0,fffb143d86fda45cfaab46b7f00cb9ce6863b83ec5cc74e528f6ecd921540
|
||||
CVE-2025-30324,0,0,cc814187ea587e10cc609b1aa2e1d499f6d169893aea075eef7cd426f0fb5529,2025-05-22T18:34:10.280000
|
||||
CVE-2025-30325,0,0,28ff58c7866f3c5b8b7c6c71294d9237d94bc56e945e412c9e15b3bb0632bfd8,2025-05-22T18:33:36.103000
|
||||
CVE-2025-30326,0,0,9992415b3b689780cb04537575e2ccdcdd5da44b75665b5c20c58cb2fe549aea,2025-05-15T18:40:01.163000
|
||||
CVE-2025-30327,1,1,136dc3192dd25727c7db30ba189dfc6dd74f1323ccf0bea42bc0cf4b4637c012,2025-06-10T19:15:29.600000
|
||||
CVE-2025-30327,0,0,136dc3192dd25727c7db30ba189dfc6dd74f1323ccf0bea42bc0cf4b4637c012,2025-06-10T19:15:29.600000
|
||||
CVE-2025-30328,0,0,9cadd4022a5bb8dd64c894376e4948ba5977fec9413107684832f78bc5d00d77,2025-05-15T18:39:52.363000
|
||||
CVE-2025-30329,0,0,5d6fbd6b38b0cbbe8cf0dd33c92cf8bb93a2944a4d3c12953275a5b6d84b7133,2025-05-15T18:39:44.717000
|
||||
CVE-2025-3033,0,0,8def21998c2b2d3712dcfd8c779587a6dd338f31829b8436a6e15945baec01a3,2025-04-07T13:30:59.570000
|
||||
@ -290900,6 +290904,7 @@ CVE-2025-30512,0,0,830ca9aa3d060fbfd3176f9d9f5c7cd3b5eb14a6890ffb225ca2f7e33b59a
|
||||
CVE-2025-30514,0,0,191fbbadf6252574a267c8157cf87ff8e05e4c53e45be9178ae9e940181c57b2,2025-04-16T13:25:59.640000
|
||||
CVE-2025-30515,0,0,614960604329a0eaed1a817027e1b09f610d68c4507b5268d02b65ad0e798c79,2025-06-09T23:15:22.273000
|
||||
CVE-2025-30516,0,0,6e9088ba36985b7325f51c1d3c78cbc79ac0a2c6c97bf904fbc9eebc8d7f06b9,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3052,1,1,30918acacf864df6328e2c8ee8fadea06c6002472676998b0d8330e0b424f554,2025-06-10T21:15:22.450000
|
||||
CVE-2025-30520,0,0,36202f4247a4e2c05ed8fe3c2794dc6deb26ec20b4118dea06db3314c5e3a395,2025-04-01T20:26:11.547000
|
||||
CVE-2025-30521,0,0,eee2f839741a5e176cacf865cc6d42d2df432fd3f60c0ff1d8e1355c4ac5b964,2025-03-27T16:44:44.143000
|
||||
CVE-2025-30522,0,0,ab298bed764aa241f7fdd86556fbb1b68374df7068fea4de0fc7d11feb11540d,2025-03-27T16:44:44.143000
|
||||
@ -293342,6 +293347,7 @@ CVE-2025-3591,0,0,9faf0d8d54afa4d861e787bba12e728bac4244da2f6db382b13f6aac7674e6
|
||||
CVE-2025-3592,0,0,3766f02a8a9b7546b3744ae601fb2a46406e95eb867e2ef9712274445e3cdb7b,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3593,0,0,a01f66982e63d1a9077a22fb9d3bb17c3788e9968a5ce8acfaa25734a955883b,2025-04-15T18:39:27.967000
|
||||
CVE-2025-35939,0,0,6a840d2678de0b0635b0f573a4e0aa98890f3ce611bcae157f676530014eaaf6,2025-06-03T20:59:34.117000
|
||||
CVE-2025-35940,1,1,99035063dad9daa4cf8431584bdae2d17fb96f782e0199a539be51e489d8b53f,2025-06-10T21:15:22.210000
|
||||
CVE-2025-35965,0,0,4aa642d84377cde687111c4598cf1eaeacbb56cf1c939bfc9602ea66c09fbf1f,2025-04-29T13:52:47.470000
|
||||
CVE-2025-3597,0,0,d7f16eae83f55d018cc2fc04d9f80eccf613371d509c7f99733ac01645d2c6f1,2025-06-05T14:27:53.477000
|
||||
CVE-2025-35975,0,0,ff6f53919e1d0edd41e3d119f9454f71c4e7dd5f4908d853817e3fb24cd36fe2,2025-05-02T13:52:51.693000
|
||||
@ -293401,12 +293407,12 @@ CVE-2025-36558,0,0,f7ba1efb73da33ba35418104474d3de926b1549af2f93d6130fc139c04b0f
|
||||
CVE-2025-36560,0,0,69f4a5989b5124f7f2b1a6e9227991ebf4cb4743ed3c1503408fd719a2cf79d8,2025-05-19T13:35:20.460000
|
||||
CVE-2025-36564,0,0,f446e566baff1cdb9604912d945d5cdc052f4905557c8c5952132ba86a364f20,2025-06-04T14:54:33.783000
|
||||
CVE-2025-36572,0,0,c97f006dfc4bcc3f67f9ecbcb1cefb56f7696607fd2d0cdd339f46804df42e2c,2025-06-09T18:58:23.397000
|
||||
CVE-2025-36574,1,1,236ff0fd472e1e30ff34db3b5dcb4c92457ffb4d8edfec40f0808d4779c86b85,2025-06-10T18:15:30.883000
|
||||
CVE-2025-36575,1,1,bfd480f774ccfb75673ecc0425753095a608a9984714c98c4506269577d6e714,2025-06-10T18:15:31.060000
|
||||
CVE-2025-36576,1,1,2da3bbc6f768a7d9ae3aef5fff3aaa21fc593cf5de755d83f86831850a9a5f63,2025-06-10T18:15:31.217000
|
||||
CVE-2025-36577,1,1,543859de3c781a3ccb8baea1be9c8f859c1052e90c6e820342688d2a523f5553,2025-06-10T18:15:31.363000
|
||||
CVE-2025-36578,1,1,df0520ed80b7d3d149391a2fad5e29b67682d7887c3f07ae91b073b3bed8e19c,2025-06-10T18:15:31.513000
|
||||
CVE-2025-36580,1,1,89b9878131812a345e3b2279c309eb0a6d410c52fd52576b65e0c9ca0c5dbba0,2025-06-10T18:15:31.660000
|
||||
CVE-2025-36574,0,0,236ff0fd472e1e30ff34db3b5dcb4c92457ffb4d8edfec40f0808d4779c86b85,2025-06-10T18:15:30.883000
|
||||
CVE-2025-36575,0,0,bfd480f774ccfb75673ecc0425753095a608a9984714c98c4506269577d6e714,2025-06-10T18:15:31.060000
|
||||
CVE-2025-36576,0,0,2da3bbc6f768a7d9ae3aef5fff3aaa21fc593cf5de755d83f86831850a9a5f63,2025-06-10T18:15:31.217000
|
||||
CVE-2025-36577,0,0,543859de3c781a3ccb8baea1be9c8f859c1052e90c6e820342688d2a523f5553,2025-06-10T18:15:31.363000
|
||||
CVE-2025-36578,0,0,df0520ed80b7d3d149391a2fad5e29b67682d7887c3f07ae91b073b3bed8e19c,2025-06-10T18:15:31.513000
|
||||
CVE-2025-36580,0,0,89b9878131812a345e3b2279c309eb0a6d410c52fd52576b65e0c9ca0c5dbba0,2025-06-10T18:15:31.660000
|
||||
CVE-2025-3659,0,0,039e45884228ee6931146a26d674c81218c137b52a98fba4b25ba26a78f9ee4c,2025-05-13T19:35:25.503000
|
||||
CVE-2025-3661,0,0,dd52ef0b5adcc429dab993fa8b0a07866db488604856f931ffdf953b111b0450,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3662,0,0,3e1dd0745f4aafb27713ee2b3d9daccf1be19770e4b95d3787e2f2ca8d2c3c07,2025-06-05T14:09:58.017000
|
||||
@ -293431,6 +293437,7 @@ CVE-2025-3682,0,0,de57eace49a6d27204917c5ceecbe658fdb389a40602552630be6620ebd4bb
|
||||
CVE-2025-3683,0,0,806199c36683a1a495080faf4f821b587dc0a352eaa7192b73d771799e75d407,2025-04-29T20:18:17.860000
|
||||
CVE-2025-3684,0,0,7836d98df2297c3ae4c00520b5763d5507d37fc0ab3fa0fd3ea28ab66ce84d57,2025-04-24T12:58:54.257000
|
||||
CVE-2025-3685,0,0,3a67948a7766390cea93599c00e3b1b3041acf42fb5dac717813d68e2a48374a,2025-05-28T21:09:35.543000
|
||||
CVE-2025-36852,1,1,c70781909b19793c26910421923d022f6407a9e375a97ff759b401a02be143af,2025-06-10T20:15:22.877000
|
||||
CVE-2025-3686,0,0,b12d874696b4c56b951e5f5d604ca0ae05aa4221e4a7df5fdc60a7a8c1ba7455,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3687,0,0,5c6850d14ad0b944b323e811f12955f48cd1349682a0b58df031474842b9b2df,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3688,0,0,0c5a9c39d0a46b352ad26209271a79a845e7971d7d876bb2609e071b04f68cc2,2025-04-16T13:25:37.340000
|
||||
@ -294487,7 +294494,7 @@ CVE-2025-4162,0,0,bd7ee4eafbad385e1e351df319e6d6835cd1bab5b8f0b1df69e26a394c35b5
|
||||
CVE-2025-4163,0,0,90b94328ec1d78c2c92fb5347be0835a81d1ecb778d277713df60a936155c16e,2025-05-16T17:47:32.577000
|
||||
CVE-2025-4164,0,0,c409a415056cfc60d19356dab298bdf2afe4926171d33ff65db9098cfdafae24,2025-05-16T17:45:46.460000
|
||||
CVE-2025-41645,0,0,05dc7979d552d91b524b274c74c87b4d6526958474a345200f3e130228064f47,2025-05-13T19:35:18.080000
|
||||
CVE-2025-41646,0,1,67ce20c1a9865425780a6906ee39e9288bbd25b638b5a3631cb1e54cf8c9584e,2025-06-10T19:29:22.893000
|
||||
CVE-2025-41646,0,0,67ce20c1a9865425780a6906ee39e9288bbd25b638b5a3631cb1e54cf8c9584e,2025-06-10T19:29:22.893000
|
||||
CVE-2025-41649,0,0,612914eeae0d0b80cff3d2f6bd08d474bd30dce7e9b2b85352e6df3c8ab3fb10,2025-05-28T15:01:30.720000
|
||||
CVE-2025-41650,0,0,269c0d41f251c325a207de06d644a97e57e82f1a90edffb55ef7207165df0de3,2025-05-28T15:01:30.720000
|
||||
CVE-2025-41651,0,0,38a22c1448767e102d555501f2b957b582c47bcd5ef6a6193da873a6e029276c,2025-05-28T15:01:30.720000
|
||||
@ -294696,7 +294703,7 @@ CVE-2025-43547,0,0,6a488cda754d55f995203b3823845f8cd3b3b66516230bb29ed9007896e9d
|
||||
CVE-2025-43548,0,0,13920673fb4b3975743a58a5a587ee86a07ff7f4cb5c4d72c708afd2e4970874,2025-05-19T17:01:58.257000
|
||||
CVE-2025-43549,0,0,b4273b740de66933093f8b3ba976fa992b8ce6c49a9d46845ac0fd26eee75006,2025-05-19T17:05:36.717000
|
||||
CVE-2025-4355,0,0,6dc91d458ed065023b11afe3affc209e389d213bb73587a0b00003bdf2c58078,2025-05-13T20:24:22.710000
|
||||
CVE-2025-43550,1,1,7cce67289c0f9839ff0447151b1fb1cc4f7a8fd7b5143b6624c8435bcbeb3496,2025-06-10T19:15:32.120000
|
||||
CVE-2025-43550,0,0,7cce67289c0f9839ff0447151b1fb1cc4f7a8fd7b5143b6624c8435bcbeb3496,2025-06-10T19:15:32.120000
|
||||
CVE-2025-43551,0,0,74c68fb3c46c40b60e9d54573853d0b03d4cab74789f458ab5c8408710c609d3,2025-05-19T17:05:39.537000
|
||||
CVE-2025-43553,0,0,87ec4b93260460a2cbb640bd57e8ba139e8be34a46d0c1b7a03855a5f554e6e7,2025-05-19T17:13:02.587000
|
||||
CVE-2025-43554,0,0,72f8a55aa3016b7b98602aea28c96ba8387be55ce503a81731ea16020f85c56e,2025-05-19T17:12:53.610000
|
||||
@ -294720,18 +294727,18 @@ CVE-2025-4357,0,0,91b239efa30bec23fb574abf1096f71b882e8528c2289837ab32873dcf633d
|
||||
CVE-2025-43570,0,0,0c8efc2d054886dd381bb66546f1a26190dc1ece1eec1ae7fb83991db60a56d0,2025-05-19T17:05:23.670000
|
||||
CVE-2025-43571,0,0,c2bcae4b1f89ddf1d102789dbe6cd3adc50327d32e5f767a09d399069834bc12,2025-05-19T17:05:42.667000
|
||||
CVE-2025-43572,0,0,327243895386af4b0dde8e2106b9c865928e6a67412132d0e25900a6625c554a,2025-05-19T17:01:49.553000
|
||||
CVE-2025-43573,1,1,a48c039101d44dbfea1ff6f42fc01e887687c9ddfb57a235bf32965a90b97166,2025-06-10T19:15:32.273000
|
||||
CVE-2025-43574,1,1,00f9b0106ba5102d3a7d573b37a7ffa8dd2fa8ca43af688eddb5aef8382c8c95,2025-06-10T19:15:32.427000
|
||||
CVE-2025-43575,1,1,1bb88f5bb9f24f2f7d02a7e4e24dae6d0d50afb47f48144b6c92e7a872eb022d,2025-06-10T19:15:32.570000
|
||||
CVE-2025-43576,1,1,147f98eda99883527b02d57e0fb6099cb90c0b1231500c0d4ab846014afcf56c,2025-06-10T19:15:32.723000
|
||||
CVE-2025-43577,1,1,2d59a3978c4f6b8e6604567a044287e8926b9a7da76c4b0a2363caca10d58607,2025-06-10T19:15:32.893000
|
||||
CVE-2025-43578,1,1,8e601966f5922ec22dbff51ce974bbb70e0ff33b05c6ebe444351ddb8c49304b,2025-06-10T19:15:33.050000
|
||||
CVE-2025-43579,1,1,15662cbd3a9b98e83f62743bc9adb206488e47f097f86fbc13d730ebb9ce4bcd,2025-06-10T19:15:33.200000
|
||||
CVE-2025-43573,0,0,a48c039101d44dbfea1ff6f42fc01e887687c9ddfb57a235bf32965a90b97166,2025-06-10T19:15:32.273000
|
||||
CVE-2025-43574,0,0,00f9b0106ba5102d3a7d573b37a7ffa8dd2fa8ca43af688eddb5aef8382c8c95,2025-06-10T19:15:32.427000
|
||||
CVE-2025-43575,0,0,1bb88f5bb9f24f2f7d02a7e4e24dae6d0d50afb47f48144b6c92e7a872eb022d,2025-06-10T19:15:32.570000
|
||||
CVE-2025-43576,0,0,147f98eda99883527b02d57e0fb6099cb90c0b1231500c0d4ab846014afcf56c,2025-06-10T19:15:32.723000
|
||||
CVE-2025-43577,0,0,2d59a3978c4f6b8e6604567a044287e8926b9a7da76c4b0a2363caca10d58607,2025-06-10T19:15:32.893000
|
||||
CVE-2025-43578,0,0,8e601966f5922ec22dbff51ce974bbb70e0ff33b05c6ebe444351ddb8c49304b,2025-06-10T19:15:33.050000
|
||||
CVE-2025-43579,0,0,15662cbd3a9b98e83f62743bc9adb206488e47f097f86fbc13d730ebb9ce4bcd,2025-06-10T19:15:33.200000
|
||||
CVE-2025-4358,0,0,d3722602427908cbcfc83920c5bb8690b3edbc0005f687a90c096634472fae17,2025-05-15T07:15:50.917000
|
||||
CVE-2025-43581,1,1,69cbeee621ac22557be001b0db101dc36389d44360576f251190c9e94a19e3fa,2025-06-10T18:15:31.807000
|
||||
CVE-2025-43581,0,0,69cbeee621ac22557be001b0db101dc36389d44360576f251190c9e94a19e3fa,2025-06-10T18:15:31.807000
|
||||
CVE-2025-43585,0,0,caa518760101b341ab21699370bf0eda5d861b6f94c3119459b3b4ecb4840643,2025-06-10T16:15:40.043000
|
||||
CVE-2025-43586,0,0,05f19df9fc1fdd75efcef39eb188dc38e4eef1a912e0175ae70548c27249dfd2,2025-06-10T16:15:40.207000
|
||||
CVE-2025-43588,1,1,6580e05574c01a350e78615cb59a51aa59d05d91582583258e555ee592973cc0,2025-06-10T18:15:32.063000
|
||||
CVE-2025-43588,0,0,6580e05574c01a350e78615cb59a51aa59d05d91582583258e555ee592973cc0,2025-06-10T18:15:32.063000
|
||||
CVE-2025-43589,0,0,72063c8a100f13e2e3e376ad606581414549652bb619fa0619cf800b44820c2a,2025-06-10T17:23:15.613000
|
||||
CVE-2025-4359,0,0,59ee176cba0c4e4e03aa8a60f5b2ae3d433f145526f53fa31de3f32e5e408c2d,2025-05-28T20:02:09.627000
|
||||
CVE-2025-43590,0,0,9675455a93c53ed32d3e8a499db98fa6c9e81f476825d66f910718fb6561d071,2025-06-10T17:23:16.903000
|
||||
@ -294855,9 +294862,9 @@ CVE-2025-44023,0,0,dd8462de68aec0eefae4f74877d4a0096c0b0b7c788a64dabe51a09973639
|
||||
CVE-2025-44024,0,0,9a6e90ca8c9fd22a614240a93227346aae4f630541c9ceee0dede71783be3310,2025-05-16T14:43:26.160000
|
||||
CVE-2025-4403,0,0,a597524215bcc55cf95efb619760b46f4cfae80b1fccf565ab77d2156ec46259,2025-05-12T17:32:32.760000
|
||||
CVE-2025-44039,0,0,e526d2ea964b8df9e1d271dd8836298e821a1312ecb07527aee6d82ed8db4da5,2025-05-13T19:35:18.080000
|
||||
CVE-2025-44040,0,1,b4bc9c9a135c852b34fde590233a20aefa279834e43ffbaee5fef18c63b73890,2025-06-10T19:34:47.497000
|
||||
CVE-2025-44040,0,0,b4bc9c9a135c852b34fde590233a20aefa279834e43ffbaee5fef18c63b73890,2025-06-10T19:34:47.497000
|
||||
CVE-2025-44043,0,0,3036defbb851adc12433efe80e5fc6191550dd660e310fbc4032bb52cddd3b0f,2025-06-10T16:15:40.823000
|
||||
CVE-2025-44044,0,0,6ddbbce33caea2d35f44f12ad3bd3e98b080decb5230a99e5cf8affdbe7764e7,2025-06-10T16:15:40.940000
|
||||
CVE-2025-44044,0,1,f5c59ec6996436edc8b5e5be096c22250cd11f88ecccdb3ada909a5383bff0e0,2025-06-10T20:15:23.817000
|
||||
CVE-2025-4405,0,0,a4c8d39da5071a2f65ae4b241bc012dd3778a87eb537de1f84f3ff1327d39e13,2025-05-23T15:55:02.040000
|
||||
CVE-2025-44071,0,0,2772db9d2d7dc3a2f1886d3495d15be2a65239054354b12c18090ea5927d54cb,2025-05-13T20:03:39.143000
|
||||
CVE-2025-44072,0,0,66cb314272334a06d99ce1609f65344916890c52ec9c458ff627cd7071565ba0,2025-05-13T20:05:16.493000
|
||||
@ -295136,9 +295143,9 @@ CVE-2025-45746,0,0,4f739c19260013516117a27de71915ddd8b481653d1fe15c253a574b15da0
|
||||
CVE-2025-4575,0,0,0624d6300232d42a9f90f1e62069c560ca8ea8d361bea47508069c55d62ec0b1,2025-05-23T15:55:02.040000
|
||||
CVE-2025-45751,0,0,de89d7eb563ced8140d03e3271409a0c1ca243ce5972ff6bb5c7d466a89cb054,2025-05-07T19:16:08.903000
|
||||
CVE-2025-45752,0,0,bb720a75a25153c4b67014caa45a3f9b58d2b0bec0c849f14f25b8ea2041a38a,2025-05-22T19:15:51.100000
|
||||
CVE-2025-45753,0,1,30657d89657a69d831b066e35506609b3d0fe532bff6b15754cd56eb0d90a508,2025-06-10T19:34:41.410000
|
||||
CVE-2025-45753,0,0,30657d89657a69d831b066e35506609b3d0fe532bff6b15754cd56eb0d90a508,2025-06-10T19:34:41.410000
|
||||
CVE-2025-45754,0,0,a302b00636684b408f789314fb369b31d357d4a411342b7876cf26fe121b9472,2025-05-21T20:24:58.133000
|
||||
CVE-2025-45755,0,1,6fe3262fee3e82261947590b30e342c111c5db410776b66947644241532cfec3,2025-06-10T19:34:54.193000
|
||||
CVE-2025-45755,0,0,6fe3262fee3e82261947590b30e342c111c5db410776b66947644241532cfec3,2025-06-10T19:34:54.193000
|
||||
CVE-2025-4577,0,0,4a91aca368e2246a8d948570e9d07d7ca1b03157298c3f0691b2680d7569c16e,2025-06-10T12:15:24.737000
|
||||
CVE-2025-45779,0,0,c093a7d91bfb997294cab32f2ebe8a712075ae66c80f7c18bdd9520e3509f542,2025-05-12T22:15:26.173000
|
||||
CVE-2025-4578,0,0,8451b1c03045c8ad3abf8c71774c6b63bc79023720225fdd15b30152793b6197,2025-06-04T20:07:45.857000
|
||||
@ -295413,7 +295420,7 @@ CVE-2025-46516,0,0,4c88ad304f0a3200cb6dc067922e69e11f23bef3885f8612be34edd9304b4
|
||||
CVE-2025-46517,0,0,e00d3386df3e4b7181f0c929b08e457a807826ffd3ac273de6467947811d8ead,2025-04-29T13:52:28.490000
|
||||
CVE-2025-46518,0,0,8ff37657d40d28b7e43670dec8250c937bdcb35627142fe4e1a4550710ea863b,2025-05-23T15:54:42.643000
|
||||
CVE-2025-46519,0,0,a33ce7fa0944b2cff6a953c93d911a59cad0e41e0288c75a1ef712b260164b09,2025-04-29T13:52:28.490000
|
||||
CVE-2025-4652,0,0,d749552241890355f8fedd32517b71b5eeb6a42f9b2cafbc64278df140247c96,2025-06-09T12:15:47.880000
|
||||
CVE-2025-4652,0,1,a73d399faba425757c68319d9d66cd30311731e3fb0ce5638e154fa6fcf0c4df,2025-06-10T20:15:24.553000
|
||||
CVE-2025-46520,0,0,1c31d6dbbd3e5241ef4e2c12464d7caf8aa9991d18bc3f254623825eb9b8b54c,2025-04-29T13:52:28.490000
|
||||
CVE-2025-46521,0,0,c218263f26834f6156811624211affe72a1577541fc4caa1b57a6d05a3e214a1,2025-04-29T13:52:28.490000
|
||||
CVE-2025-46522,0,0,d3d2527c85c582d99da6bcb828f5f2b083bd408e3a5301718b05fe08113648f0,2025-04-29T13:52:28.490000
|
||||
@ -295634,12 +295641,12 @@ CVE-2025-4710,0,0,e39d67cb76ce566e1fa070d7e96f2d3191895b08d95f46b970d158a013f006
|
||||
CVE-2025-47104,0,0,ad5e27d9d0015d4bac6932b15f5c621d1e70469ea346e224f770fd2fddb4cbc1,2025-06-10T17:23:19.443000
|
||||
CVE-2025-47105,0,0,06215a4d110f788cce09dd422ebaebbc53eb409aeceabf09df4b92214eddd629,2025-06-10T17:23:20.873000
|
||||
CVE-2025-47106,0,0,c77417a949f1d028c64f8a97dbbd14475f9cf7a14bcda2f0bc8cfaa82369fb5c,2025-06-10T17:23:22.100000
|
||||
CVE-2025-47107,1,1,3cdfc02f179e11ed2722762297a76fca6fe3de70753312e9966e612dbe8ca558,2025-06-10T19:15:33.347000
|
||||
CVE-2025-47107,0,0,3cdfc02f179e11ed2722762297a76fca6fe3de70753312e9966e612dbe8ca558,2025-06-10T19:15:33.347000
|
||||
CVE-2025-47108,0,0,a8210ba36b68fa518c01f7a95a7781a297853152fe3aac1730f6e970b80103df,2025-06-10T17:23:23.340000
|
||||
CVE-2025-4711,0,0,21c8c473cfd0b8fb70049ba4f98b86bc8037c0e94662198ff53f909236b4a0c5,2025-05-27T14:10:06.050000
|
||||
CVE-2025-47110,0,0,bc094b4579c57ac0b748fd5fe2b39afc172f6e77433289184299d33b0d2e21ca,2025-06-10T16:15:41.210000
|
||||
CVE-2025-47111,1,1,e83630af857e1a44e18b243583132333eb77c3a5f9419833d4aed5a723e4b9ef,2025-06-10T19:15:33.507000
|
||||
CVE-2025-47112,1,1,4b745a356740f8bd2800debc089e34965364b4ae2be226d6a4e86286a4e25556,2025-06-10T19:15:33.667000
|
||||
CVE-2025-47111,0,0,e83630af857e1a44e18b243583132333eb77c3a5f9419833d4aed5a723e4b9ef,2025-06-10T19:15:33.507000
|
||||
CVE-2025-47112,0,0,4b745a356740f8bd2800debc089e34965364b4ae2be226d6a4e86286a4e25556,2025-06-10T19:15:33.667000
|
||||
CVE-2025-4712,0,0,655cc7933dcbfa8299ca016577dc2e95743bc96639079a5634fc2b1e9ba99048,2025-05-27T14:10:29.530000
|
||||
CVE-2025-4713,0,0,07deb6148a7b9c61da4f7b5f9679e8b0482f4bcf7e19d344fe5ec15e4b57121a,2025-05-27T14:10:47.117000
|
||||
CVE-2025-4714,0,0,ea07a9f4689461c2a8f9423bf631226225cddda92ad9e10d96306967ff6a2ec2,2025-05-27T14:10:53.560000
|
||||
@ -295665,7 +295672,7 @@ CVE-2025-47172,0,0,37b1f918d2d8cd12a46066d1370faef412ec274022a5e7cfd297d45770e98
|
||||
CVE-2025-47173,0,0,34a60018d8a0cbaea405dcaf7d0df458ec4e220258796ec21e49eeb054e44869,2025-06-10T17:23:53.543000
|
||||
CVE-2025-47174,0,0,739934298fca1373ca3a9ec768d8cb3075baece01333323786bfc1d274b763d7,2025-06-10T17:23:55.607000
|
||||
CVE-2025-47175,0,0,774f3b1bcfe86cfe94a341bd6264513635ae5c49df06414d37cdc1aa4ab8dd84,2025-06-10T17:23:57.607000
|
||||
CVE-2025-47176,0,1,2685884f1dcccb1bcd32dd181dfd3b3d2c002a9b9722c31ee82116d9e5b261d1,2025-06-10T18:15:32.510000
|
||||
CVE-2025-47176,0,1,747fd3b4c7745345c22b957134baade7dcd76b1b7799b23289e88025a6763b3c,2025-06-10T20:15:24.203000
|
||||
CVE-2025-4718,0,0,e197120a33051d36a3bdf1b0305cf7de5c5f5941a30eaf0eb2f8e25b8c33d5d8,2025-05-28T14:26:27.280000
|
||||
CVE-2025-47181,0,0,aa11c9243cf9f21606fed813a8d7013ca1fc81a1699c797c7e93c8870c1ba872,2025-05-23T15:54:42.643000
|
||||
CVE-2025-4719,0,0,8f45404e8c5e0b5372b6c6d3c18e425f04bef83b0b8978ee2807105e5fc3ce21,2025-05-28T14:26:35.423000
|
||||
@ -296350,7 +296357,7 @@ CVE-2025-48389,0,0,e0a06862dbd5de9d0e30b39ba95e12152ebb3f987c91aebc43d8b22f341a7
|
||||
CVE-2025-4839,0,0,026d74f00e92e1df1d876b9f6b1cecb41d0bc701e988325a0cacac560f915dca,2025-06-04T20:11:58.047000
|
||||
CVE-2025-48390,0,0,e08fc2fcf4792cfdc29a5c8dbd607faa716468223eb98fd8cb285bd470941f51,2025-05-30T16:31:03.107000
|
||||
CVE-2025-48391,0,0,6ff3d1038c2add63bd7e7b8b38f9227bd17f067c0122feb999c7084ff1a9050a,2025-05-21T20:24:58.133000
|
||||
CVE-2025-4840,0,0,98bc2633995e7d67a8737f47869388351c7cb5ae3ea83713c8db09c6416e7f03,2025-06-10T06:15:22.287000
|
||||
CVE-2025-4840,0,1,3b1c97ddd72e409860695abe86aa48a9d5ee61c6237b3931c5003fa86d580c94,2025-06-10T20:15:24.693000
|
||||
CVE-2025-4841,0,0,9ef74f3a79e56684383036ff7085bf06d0eca4b2dbe84beb51e4af0435bfe603,2025-06-03T15:57:42.837000
|
||||
CVE-2025-48413,0,0,b3b11f8a7ba8622574fd750e056164f0578951072345d9f4cba4efbb84a42403,2025-05-21T20:24:58.133000
|
||||
CVE-2025-48414,0,0,e314f6955b624ffe6cbb1b252b69ac45f584829d39abb7e04746fd27a97f3f9b,2025-05-21T20:24:58.133000
|
||||
@ -296368,7 +296375,7 @@ CVE-2025-48425,0,0,5375b1213c661d9c8e265e6ccb918fa737a0a97c61c46c0979c4669ee5fa8
|
||||
CVE-2025-48426,0,0,4a81f9becf3c9368a66d400667b54c85edc5dcfa7efc6202bcbc6fb457650122,2025-05-21T06:16:28.347000
|
||||
CVE-2025-48427,0,0,7b7d0b24d905cbea3b50146b37b4cf62666de442b9ee6475e1cabe343e0aa3f7,2025-05-21T06:16:28.427000
|
||||
CVE-2025-4843,0,0,5890e4c47a5552e18a9be038fa9194d6f64cc12e48ceed25f7f3e1b0ba45bf6f,2025-06-04T20:11:36.947000
|
||||
CVE-2025-48432,0,1,5f6d8752b6215d1c6c6ed176249453d7202995237846ebecf3edfe940755446e,2025-06-10T18:15:32.790000
|
||||
CVE-2025-48432,0,0,5f6d8752b6215d1c6c6ed176249453d7202995237846ebecf3edfe940755446e,2025-06-10T18:15:32.790000
|
||||
CVE-2025-4844,0,0,c912eb5a20c5346c9f6d6c3e57f91f3a367b50a9f461c9f08439baff48bc8fef,2025-06-04T20:11:19.110000
|
||||
CVE-2025-4845,0,0,5d1b81810c6ca4083e9e97cb1e8cb24890cd9aa68161fff1d9a41ed5b829a66e,2025-06-04T20:11:09.500000
|
||||
CVE-2025-4846,0,0,4dd97835f28bce0c2a0646c496f88035dc9f48717c734fc8fd3222164cab7575,2025-05-19T13:35:20.460000
|
||||
@ -296602,6 +296609,7 @@ CVE-2025-49128,0,0,be74e1e3636b4e3c68c2e5f707126adefa5b42c030884a0a961eb0fa96655
|
||||
CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149c2,2025-05-19T17:37:22.390000
|
||||
CVE-2025-49130,0,0,101994697265c4124b21893e7018192e4caf4f2ec31625a5dfcbe146cdb28e2a,2025-06-09T13:15:23.977000
|
||||
CVE-2025-49131,0,0,cb5b50180e5eaa5b85e2d41a2bea84c06691db09851c0931186c9857c00a2951,2025-06-09T13:15:24.120000
|
||||
CVE-2025-49133,1,1,6dc99b4aaaec6406a38af880ef32fc2b0a0c99f5f31786d903de7ea67d6805fc,2025-06-10T20:15:24.337000
|
||||
CVE-2025-49136,0,0,f17c65c3fffc31c312f66268030c86b49b3a7486baa9ae080bc38b145e145f89,2025-06-10T14:15:30.510000
|
||||
CVE-2025-49137,0,0,4ab0141317e92d7cc36a79e8d8b73bb39053a0d4d0cd444a2cb1522c3d9d7b0b,2025-06-10T16:15:41.880000
|
||||
CVE-2025-49138,0,0,cf1ec877b517e9c0d5bc9ca79299af68ec9d1ed097304a7b91ea5fe7bfadcf7c,2025-06-10T16:15:41.983000
|
||||
@ -296808,7 +296816,7 @@ CVE-2025-5049,0,0,6be769e63b7936d84c6427cb6db022f696b00834d46110cecd1cbd77c6e202
|
||||
CVE-2025-5050,0,0,589b169c40b037eea9cb072f964d65e5e3d4fd396fb0aa30971ab829944d6511,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5051,0,0,9c110d30fb7d5b76a834a2709876396dbb061a47276883a9c8b6f8ca7926c469,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5052,0,0,aa387e74996184bbceb7dcb0f0533b96402b1f03de23f558fcebbd4c6085f924,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5053,0,1,3d2b70b4aa9309898ac88338d0e45e48032f9ef01b4619e69e4f80270305e3ac,2025-06-10T19:34:33.830000
|
||||
CVE-2025-5053,0,0,3d2b70b4aa9309898ac88338d0e45e48032f9ef01b4619e69e4f80270305e3ac,2025-06-10T19:34:33.830000
|
||||
CVE-2025-5054,0,0,68d095110a6b2be331697a8699cb10ea98d7a65a96add11ba5059f95d872a268,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5055,0,0,2813a40f904a4d38c72314bdeb0478f12eb76957b4f05117bb45d588d4e24d35,2025-05-28T14:58:52.920000
|
||||
CVE-2025-5056,0,0,41abcc4b21c4c44af1bb2b5ebe6eed640fd93ff380221b407c4bb670519af696,2025-05-28T02:08:30.840000
|
||||
@ -296851,7 +296859,7 @@ CVE-2025-5113,0,0,4fded5fd40401c221cac2ef8ce80b61992e5d3143855e1468dca36f7819a99
|
||||
CVE-2025-5114,0,0,20a4205c8646981529f8abb6bcbb5fe0a32214254e6052ddc8802d6fd9b03d3c,2025-05-23T15:54:42.643000
|
||||
CVE-2025-5116,0,0,b6938e7bcf712294173537b38f61d79bb1a781951b36c05c0a08cc11ed4b2073,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5117,0,0,d8ff3473124b58dde3b831065aca2c1cf497de1bb078c68e491105627964201f,2025-05-28T15:01:30.720000
|
||||
CVE-2025-5119,0,1,15623b4a1405db2ab9f990c5e6ae33546aa75c69874829b4176204ed82093444,2025-06-10T19:34:07.790000
|
||||
CVE-2025-5119,0,0,15623b4a1405db2ab9f990c5e6ae33546aa75c69874829b4176204ed82093444,2025-06-10T19:34:07.790000
|
||||
CVE-2025-5122,0,0,f0e21910b241d49227076aad0272129f233644ba6bdfb930e332b9b2297be743,2025-05-29T14:29:50.247000
|
||||
CVE-2025-5124,0,0,faf8cbc0f69371ed3c6719c9c69c4315ba1bcb8fbea9df9ad359b463d11b395d,2025-05-28T18:15:27.973000
|
||||
CVE-2025-5126,0,0,8a0557ea6376858295fab66f0f6670724f6318d02f3458731c89655e92d81a6a,2025-05-28T18:15:28.143000
|
||||
@ -296865,7 +296873,7 @@ CVE-2025-5133,0,0,71ff685cb41d220918422266a9a9027a78bee24552031db902c458276c3d06
|
||||
CVE-2025-5134,0,0,d420ea46d85516af4902b09065e0670f0f7a966eecf320488abdd86a620ad3ac,2025-06-03T15:48:28.580000
|
||||
CVE-2025-5135,0,0,ff5e4b4f352f002c704ddb4fec56d312bfa70e7ac4d7428009d05887b065c456,2025-06-03T15:48:40.953000
|
||||
CVE-2025-5136,0,0,bd0c27de50ee06fcb71ffb69b26d594d7fa702a9a559c430c5d629f3be8d9822,2025-05-28T18:15:29.530000
|
||||
CVE-2025-5137,0,1,a461b4cd382da5c206010b8729faf9840aa41b3d9e8c8cf8ba7880897f06f378,2025-06-10T19:33:16.710000
|
||||
CVE-2025-5137,0,0,a461b4cd382da5c206010b8729faf9840aa41b3d9e8c8cf8ba7880897f06f378,2025-06-10T19:33:16.710000
|
||||
CVE-2025-5138,0,0,3bae41860cd01f5b3b29a66081652cec538a389d28958af017b419d06b38908c,2025-05-28T14:58:52.920000
|
||||
CVE-2025-5139,0,0,1f6b6d6f74654497d336b663b2d16a5fe2eea3d0378c7d1c3577dfaa66e63c83,2025-05-28T14:58:52.920000
|
||||
CVE-2025-5140,0,0,7eb8851e623e7595aeb04f88f3b17c4f06b9055459a202a999065089d465d23f,2025-05-28T14:58:52.920000
|
||||
@ -296989,7 +296997,7 @@ CVE-2025-5287,0,0,b8300f230839e0ad3335fdc92731d9b07abc7f3405256834dd55febc4f9b01
|
||||
CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5292,0,0,30cec8bd4cde62e6ca85175b601b2d9fd7dc117c201a288e7f0e6414bd251b48,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5295,0,0,86992e97da5db3e66123dc758ac5a1f83b74ab998ea61bbd2f95d3d081833d3f,2025-05-28T15:01:30.720000
|
||||
CVE-2025-5297,0,1,32219ebb357b11c35687ad82e2d72808a3fe88681e14d78b6d0829c9d1dbc7ef,2025-06-10T19:33:01.990000
|
||||
CVE-2025-5297,0,0,32219ebb357b11c35687ad82e2d72808a3fe88681e14d78b6d0829c9d1dbc7ef,2025-06-10T19:33:01.990000
|
||||
CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000
|
||||
CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000
|
||||
CVE-2025-5303,0,0,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000
|
||||
@ -297005,7 +297013,7 @@ CVE-2025-5328,0,0,69e2dcbfc2b85f6314db4745b576ea63b045f3b89808be8d33ed6e2b706690
|
||||
CVE-2025-5330,0,0,d834ad4ad61a847f16cff13c2e41a3edc0634ba2b8cfe9a60897f96120871dc7,2025-05-30T16:31:03.107000
|
||||
CVE-2025-5331,0,0,6d6e63e0f8a1a491f6a38b24f4a10f691f644991827baf7d50b9fb0e398065a6,2025-05-30T16:31:03.107000
|
||||
CVE-2025-5332,0,0,e1def175621c4e1d1942302bd613c0906cf0d988637a95edef4cbf91efd49e74,2025-06-04T15:37:02.583000
|
||||
CVE-2025-5334,0,1,3b25ffa10fa68a37bf0e18657dc7cc96e971a33e8fade936cdd130170872987d,2025-06-10T19:15:35.243000
|
||||
CVE-2025-5334,0,0,3b25ffa10fa68a37bf0e18657dc7cc96e971a33e8fade936cdd130170872987d,2025-06-10T19:15:35.243000
|
||||
CVE-2025-5335,0,0,e16a76200b950d2b5a9c6bf9a18e3f4a54d41ee72e847fe3e679465b4988f67d,2025-06-10T15:15:25.703000
|
||||
CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2ceb,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5341,0,0,2f7555dddd47395f556aef803e272926d99b2be1a7b798f5f5a29577ec1f1191,2025-06-05T20:12:23.777000
|
||||
@ -297185,8 +297193,8 @@ CVE-2025-5606,0,0,f1b344f05593638f56ae97bd4a3ae2344d8c49f42a7e4146ae2f0ceba51d7e
|
||||
CVE-2025-5607,0,0,9aacf7995f1e37d05e7f946c5a74b9cfa42ed1291e7d764cf1df8b98f4f8d919,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5608,0,0,a6fd4cf6a853c5b50d2adbc58badc00e78a4b15d719a0e262c3536cf7eb022e8,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5609,0,0,b393dc7d8eae58f3971e224e8813e7a1af64a0d88824f5f24af71e1ad3003ad7,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5610,0,1,a78c0af34eb9d1004f4e6f768b907fe6a563e3de4aad8019568ef0e9f1f96775,2025-06-10T19:32:53.453000
|
||||
CVE-2025-5611,0,1,d1d7b2899e99786e8be3c68c254e6243a084cc0e29df47c4904979ebc4e1a23e,2025-06-10T19:32:30.077000
|
||||
CVE-2025-5610,0,0,a78c0af34eb9d1004f4e6f768b907fe6a563e3de4aad8019568ef0e9f1f96775,2025-06-10T19:32:53.453000
|
||||
CVE-2025-5611,0,0,d1d7b2899e99786e8be3c68c254e6243a084cc0e29df47c4904979ebc4e1a23e,2025-06-10T19:32:30.077000
|
||||
CVE-2025-5612,0,0,3eb307a0a0cbaaa44e441a689cece0ed028d19cededc42a6e5128a2337fecf4d,2025-06-06T20:10:20.870000
|
||||
CVE-2025-5613,0,0,5c852f790ee9450ec50beb9319d4075e185a01ce6ef26c1472484f137c74d219,2025-06-06T20:10:33.297000
|
||||
CVE-2025-5614,0,0,8e0c0aa8d2812f5636529729017d80dc0e08b2225a3c38054accfc9540442377,2025-06-10T15:07:07.150000
|
||||
@ -297247,10 +297255,10 @@ CVE-2025-5669,0,0,e41cf90831d0a6cf4929e129e10c87880a3b230cc5343d610b4f26d94c5ca2
|
||||
CVE-2025-5670,0,0,aa088ba5a44773ff1366ed76955e38f916db102440b97c97a352678ba98d3d07,2025-06-06T19:40:14.910000
|
||||
CVE-2025-5671,0,0,eb8fc745fee34a3711d29fe25f4c5db1a3010a89ad41b22fe8685e426fcf1532,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5672,0,0,b5f35a60b31667154d144333dd8af0cb05b469f7cf6c2dd3ee23c9b3b86a5c05,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5674,0,1,00321347327a5af2fc5c4b712466e46106633bbb0b8355ca269c6d7d191000b2,2025-06-10T19:32:07.543000
|
||||
CVE-2025-5675,0,1,d79dd03500c999a297bce3fa643e7aff128a4fb8f3e3aa9fbc2dfabaffc455fd,2025-06-10T19:31:56.573000
|
||||
CVE-2025-5676,0,1,1ca2c49bb4d510b5740938a869bb2d11a6220d1957dff2d9f9653e2673322f3a,2025-06-10T19:31:48.510000
|
||||
CVE-2025-5677,0,1,364b4a61489a27818eacb60d1e1f6c17d4c2d09e9d81b672d48b3e04da11ebb6,2025-06-10T19:31:37.290000
|
||||
CVE-2025-5674,0,0,00321347327a5af2fc5c4b712466e46106633bbb0b8355ca269c6d7d191000b2,2025-06-10T19:32:07.543000
|
||||
CVE-2025-5675,0,0,d79dd03500c999a297bce3fa643e7aff128a4fb8f3e3aa9fbc2dfabaffc455fd,2025-06-10T19:31:56.573000
|
||||
CVE-2025-5676,0,0,1ca2c49bb4d510b5740938a869bb2d11a6220d1957dff2d9f9653e2673322f3a,2025-06-10T19:31:48.510000
|
||||
CVE-2025-5677,0,0,364b4a61489a27818eacb60d1e1f6c17d4c2d09e9d81b672d48b3e04da11ebb6,2025-06-10T19:31:37.290000
|
||||
CVE-2025-5679,0,0,39a76065dd3011f556df8ecc5c1607529488c249cbea269aa42dbb97296654d5,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5680,0,0,951e9727eb6f85cb1826e5addda531b5a3ed92e200dcd69a9572852fb51b7dd6,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5683,0,0,1a3b3cb960b03a08fa5b7c4079149ff9fe6c9f4a5d5c8b0f22c43f750a1037ab,2025-06-05T20:12:23.777000
|
||||
@ -297287,8 +297295,8 @@ CVE-2025-5722,0,0,a7964efdc18e4bc1beb90ac824e1664e0c0a375d14ff32bc06365c8e32501d
|
||||
CVE-2025-5723,0,0,11184ab3f208a19ce9c996ab3c00255c3f0c3b34e98627e17f79e3e19d7339cc,2025-06-10T14:59:02.027000
|
||||
CVE-2025-5724,0,0,b93d22dab9afa1f68385eee755304a67801f5b23d8977eabf56f075a28484c02,2025-06-10T14:58:46.713000
|
||||
CVE-2025-5725,0,0,50b90d1f6262d6199a4112ec7f62ca2f6a6af71fa34d8c551ddb2ea5f71b3cf8,2025-06-10T14:58:33.113000
|
||||
CVE-2025-5726,0,1,ee7c2168fc4df99ae26ff1928c673572570d2b73b7f2f8583cd52149422b0edf,2025-06-10T19:31:01.250000
|
||||
CVE-2025-5727,0,1,233f39774007ec048ab823ce132d5d9a0383f240e79c4b766b8268e460e699b9,2025-06-10T19:30:49.890000
|
||||
CVE-2025-5726,0,0,ee7c2168fc4df99ae26ff1928c673572570d2b73b7f2f8583cd52149422b0edf,2025-06-10T19:31:01.250000
|
||||
CVE-2025-5727,0,0,233f39774007ec048ab823ce132d5d9a0383f240e79c4b766b8268e460e699b9,2025-06-10T19:30:49.890000
|
||||
CVE-2025-5728,0,0,a2734432c6d5c9718e73264aec800c40d10a3b1f503cc6a36bad0f61d236849e,2025-06-10T14:58:21.970000
|
||||
CVE-2025-5729,0,0,e4496e2ef853aa19924d8ea59da09547edb389972468d1750a85a5b387d74db8,2025-06-09T13:15:24.277000
|
||||
CVE-2025-5732,0,0,e44c4abf488eb73f34cf4fc12053fa1034be5ba1cd633b45abb888bfd8cfede8,2025-06-10T14:58:00.633000
|
||||
@ -297310,20 +297318,20 @@ CVE-2025-5749,0,0,2acdc5934ddc07f2fae85bef8a4374f26ddda9b56d85fb729428cb8631784a
|
||||
CVE-2025-5750,0,0,646c631d9c514f468fff0f4160ac8169075fcfbd4ea661785f21ee9043cdb606,2025-06-09T12:15:47.880000
|
||||
CVE-2025-5751,0,0,23d09c43fb68d6574ce1c145de5cc00dbd740af4044f3203a46a17e73c0d72a6,2025-06-09T12:15:47.880000
|
||||
CVE-2025-5755,0,0,683d03a310dee20dfc4c0c492307fcdf50f379083e65a890885b5d7593fe9e0c,2025-06-10T15:46:20.973000
|
||||
CVE-2025-5756,0,1,75df471632c678468bff3c8420b140411e7c615a2ebbeb62b01e86352245dfea,2025-06-10T19:30:25.590000
|
||||
CVE-2025-5757,0,1,40749c2e56fb9466b2f938292e355fc1f7d0929edcf6928d949ae56f2315342c,2025-06-10T19:30:10.510000
|
||||
CVE-2025-5756,0,0,75df471632c678468bff3c8420b140411e7c615a2ebbeb62b01e86352245dfea,2025-06-10T19:30:25.590000
|
||||
CVE-2025-5757,0,0,40749c2e56fb9466b2f938292e355fc1f7d0929edcf6928d949ae56f2315342c,2025-06-10T19:30:10.510000
|
||||
CVE-2025-5758,0,0,bce5afb4f21a287bf92575e93baec895e704f60501a807e104b04218775a5539,2025-06-10T15:46:05.007000
|
||||
CVE-2025-5759,0,0,dd26a21c310951f8c8cb21cdb2671617f7b1d86adbd58fa9e740fe83e3e4b93b,2025-06-10T14:57:42.917000
|
||||
CVE-2025-5760,0,0,264b625ff0aed0d36bd2f34c00b500f47e8637a884732813c7f4bc5752a68537,2025-06-06T14:06:58.193000
|
||||
CVE-2025-5761,0,0,6b08df0b4cbd80fdbb3f973140f0a6f8c80c4fba2be5f89a23b8b1009035568d,2025-06-10T14:57:30.623000
|
||||
CVE-2025-5762,0,0,98845990a3f86d908111d51ee73a3e155d48f6275d2246a68a11e0b27e9aa30f,2025-06-10T14:57:14.800000
|
||||
CVE-2025-5763,0,0,a15a3a2b0366b1c66dcf3b366b895c7439dfb4d30e432b0e7f8ed791e648add5,2025-06-10T14:55:49.067000
|
||||
CVE-2025-5764,0,1,2d28a1f65a433690f9d2f8261def9db24023e822b530c5b66d4068781293abda,2025-06-10T19:29:57.893000
|
||||
CVE-2025-5765,0,1,cf1c505b8511f3d7107b049f561769a46f8060e4722ef9f239daeb196ff8da86,2025-06-10T19:29:44.973000
|
||||
CVE-2025-5766,0,1,28ff5fc5d5092ea27c0ea445f8523dc92a0b61bbfca49399a743b91e6135f816,2025-06-10T19:29:34.820000
|
||||
CVE-2025-5764,0,0,2d28a1f65a433690f9d2f8261def9db24023e822b530c5b66d4068781293abda,2025-06-10T19:29:57.893000
|
||||
CVE-2025-5765,0,0,cf1c505b8511f3d7107b049f561769a46f8060e4722ef9f239daeb196ff8da86,2025-06-10T19:29:44.973000
|
||||
CVE-2025-5766,0,0,28ff5fc5d5092ea27c0ea445f8523dc92a0b61bbfca49399a743b91e6135f816,2025-06-10T19:29:34.820000
|
||||
CVE-2025-5778,0,0,5f200e53fd6421895a453b111aeb1386ab25cc3e45de20df15c46216ef4a37f8,2025-06-09T12:15:47.880000
|
||||
CVE-2025-5779,0,1,1e700fadb20c430a15a195537975215f0a5a558e649a2a5a5d9bb126f7483d20,2025-06-10T19:26:20.883000
|
||||
CVE-2025-5780,0,1,291144f4a381da80b9438fe643e4a6c8cc152547ccff2703d0e51362f127b808,2025-06-10T19:26:11.937000
|
||||
CVE-2025-5779,0,0,1e700fadb20c430a15a195537975215f0a5a558e649a2a5a5d9bb126f7483d20,2025-06-10T19:26:20.883000
|
||||
CVE-2025-5780,0,0,291144f4a381da80b9438fe643e4a6c8cc152547ccff2703d0e51362f127b808,2025-06-10T19:26:11.937000
|
||||
CVE-2025-5782,0,0,6972da12d61c944fe4bbea6f93b44a377d32b8a94e64404a2e1a04e310f27128,2025-06-10T15:42:31.557000
|
||||
CVE-2025-5783,0,0,ad3b4fbba1e09b73bf21fedfd9854dfacbc53263d6cf28fde257534a31faeedc,2025-06-10T15:42:17.287000
|
||||
CVE-2025-5784,0,0,e09538ed3fb443c9b7bf4475803950b33e688b0670f3753325c659e87e3e11ff,2025-06-10T14:56:59.937000
|
||||
@ -297421,11 +297429,18 @@ CVE-2025-5918,0,0,5fae4533f01b7c4f6585a87e7b2331625bf70aa585af023c3c09519081c4b2
|
||||
CVE-2025-5925,0,0,573daaf55ea018a58bf2bd7e92cad13cf577779f7064f5ad7d1f8de96931b737,2025-06-10T04:15:54.330000
|
||||
CVE-2025-5934,0,0,6e6b56247e88c88b3883e91849581fe9fb4286ffb99dfd632c90d49eafeb498f,2025-06-10T13:15:24.570000
|
||||
CVE-2025-5935,0,0,bca6b82aff793b09175597d3d76faef10a884937cddad66c78fab2ba223eb2cd,2025-06-10T05:15:22.780000
|
||||
CVE-2025-5943,1,1,571906ffe14a79e22d0036c86683c5a92f8c755e9133387c395960e0afa9c11b,2025-06-10T18:15:33.020000
|
||||
CVE-2025-5943,0,0,571906ffe14a79e22d0036c86683c5a92f8c755e9133387c395960e0afa9c11b,2025-06-10T18:15:33.020000
|
||||
CVE-2025-5945,0,0,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c56d,2025-06-10T09:15:25.930000
|
||||
CVE-2025-5952,0,0,89b97adc3e12e17ca18b9484f2cc0cbac7f8ea34e27cce81e859e2ad09b23e1a,2025-06-10T16:15:45.717000
|
||||
CVE-2025-5969,0,0,0cb5f1eef226658325ae1059818aba7cb4928688bc7acca6d60e3f96dc260577,2025-06-10T17:25:20.293000
|
||||
CVE-2025-5970,0,0,d7c94f11149aa2d1fa422037b5710258375a5e88a21be20512abe255cca0c035,2025-06-10T17:25:24.033000
|
||||
CVE-2025-5971,1,1,a585731e3dcf519d6d97e5105421f7765406419a5d86aa36be35cba576add91e,2025-06-10T19:15:35.400000
|
||||
CVE-2025-5972,1,1,7d178a84b419e58797ce23ea5013f3c0aa6df08095e8230fe08008da316229a5,2025-06-10T19:15:35.537000
|
||||
CVE-2025-5973,1,1,f1c8ea086ca8937b6526c221e3ad36638865ad0af1f1cd81b5da818f15eee7e1,2025-06-10T19:15:35.727000
|
||||
CVE-2025-5971,0,0,a585731e3dcf519d6d97e5105421f7765406419a5d86aa36be35cba576add91e,2025-06-10T19:15:35.400000
|
||||
CVE-2025-5972,0,0,7d178a84b419e58797ce23ea5013f3c0aa6df08095e8230fe08008da316229a5,2025-06-10T19:15:35.537000
|
||||
CVE-2025-5973,0,0,f1c8ea086ca8937b6526c221e3ad36638865ad0af1f1cd81b5da818f15eee7e1,2025-06-10T19:15:35.727000
|
||||
CVE-2025-5974,1,1,339321be4c5ac9108cce5e98767fc5970ae083450218fa354fd8033f05a2527f,2025-06-10T20:15:24.923000
|
||||
CVE-2025-5975,1,1,9008eeb9527e9693001a3be4b45aa5cf8a88c8a44caffd0e0b12ea03a78b8ee2,2025-06-10T20:15:25.117000
|
||||
CVE-2025-5976,1,1,6867fdd2eea80fafea5defe2bbd68074fcd28406e4e3c12b1e1b2d17570ffa73,2025-06-10T20:15:25.297000
|
||||
CVE-2025-5977,1,1,f304c9ff5770b6781d3f20efc156d80096139af8a0274e3045f16c5bb9d0173f,2025-06-10T20:15:25.480000
|
||||
CVE-2025-5978,1,1,4e4d69a73c249e0a4a5dd907dae67dfe13fdf168bd6154e3a3a2e85793f26d9e,2025-06-10T21:15:22.793000
|
||||
CVE-2025-5979,1,1,d27c61690a89a70834e1ac7ec79b55e9c00b548ee2fa9335cb0305161ad45244,2025-06-10T21:15:22.970000
|
||||
CVE-2025-5980,1,1,e040dd481b18254b8331cc7db878c5d64b7a6be5a4fa7521d9ea11a576b92997,2025-06-10T21:15:23.150000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user