Auto-Update: 2025-06-06T20:00:23.555194+00:00

This commit is contained in:
cad-safe-bot 2025-06-06 20:03:59 +00:00
parent 30f35b8e92
commit a20117dc4b
45 changed files with 5258 additions and 294 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-8639",
"sourceIdentifier": "secure@microsoft.com",
"published": "2018-12-12T00:29:01.840",
"lastModified": "2025-03-05T16:24:58.477",
"vulnStatus": "Analyzed",
"lastModified": "2025-06-06T18:15:33.090",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
],

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41545",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T18:15:13.450",
"lastModified": "2025-03-20T17:15:36.803",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:01:39.573",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,65 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:c7800_firmware:6.01.07:*:*:*:*:*:*:*",
"matchCriteriaId": "50944BC9-7834-4184-B97F-2A6DC3916B34"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:c7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9B4919C-A3E3-43F2-9714-18F607925F69"
}
]
}
]
}
],
"references": [
{
"url": "https://seclists.org/fulldisclosure/2025/Feb/12",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.netgear.com/images/datasheet/networking/cablemodems/C7800.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://seclists.org/fulldisclosure/2025/Feb/12",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48909",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T09:15:44.133",
"lastModified": "2024-11-21T08:32:36.543",
"lastModified": "2025-06-06T18:15:34.120",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51955",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-10T15:15:09.150",
"lastModified": "2024-11-21T08:38:58.313",
"lastModified": "2025-06-06T18:15:34.400",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-7231",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:30.840",
"lastModified": "2025-05-27T20:00:59.710",
"lastModified": "2025-06-06T19:26:02.810",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -60,9 +60,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:evanliewer:illi_link_party\\!*:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:evanliewer:illi_link_party\\!:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "E33994AB-3666-41CD-A959-A59017B77F21"
"matchCriteriaId": "C78FD2BD-2F50-47B9-ABE7-2A110B5C3AB9"
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22533",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T03:15:11.210",
"lastModified": "2024-11-21T08:56:25.177",
"lastModified": "2025-06-06T18:15:34.733",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-94"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34067",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-03T18:15:09.573",
"lastModified": "2024-11-21T09:18:01.257",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-06T19:15:40.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,38 +71,80 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pterodactyl:panel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.11.6",
"matchCriteriaId": "ED188395-6608-4D08-BE62-00FED786112D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/pterodactyl/panel/commit/0dad4c5a488661f9adc27dd311542516d9bfa0f2",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/pterodactyl/panel/commit/1172d71d31561c4e465dabdf6b838e64de48ad16",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/pterodactyl/panel/commit/f671046947e4695b5e1c647df79305c1cefdf817",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/pterodactyl/panel/security/advisories/GHSA-384w-wffr-x63q",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/pterodactyl/panel/commit/0dad4c5a488661f9adc27dd311542516d9bfa0f2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/pterodactyl/panel/commit/1172d71d31561c4e465dabdf6b838e64de48ad16",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/pterodactyl/panel/commit/f671046947e4695b5e1c647df79305c1cefdf817",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/pterodactyl/panel/security/advisories/GHSA-384w-wffr-x63q",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57727",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-15T23:15:09.650",
"lastModified": "2025-03-14T20:01:25.483",
"vulnStatus": "Analyzed",
"lastModified": "2025-06-06T18:15:34.957",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -42,20 +42,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
"impactScore": 5.2
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6236",
"sourceIdentifier": "secure@citrix.com",
"published": "2024-07-10T21:15:11.120",
"lastModified": "2024-11-21T09:49:15.173",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-06T18:56:43.393",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
@ -73,14 +95,95 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:citrix:netscaler_agent:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0-58.30",
"versionEndExcluding": "13.0-92.31",
"matchCriteriaId": "F4FA76A8-E953-4751-B7A8-ADC2FC226997"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:citrix:netscaler_agent:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1-4.43",
"versionEndExcluding": "13.1-53.22",
"matchCriteriaId": "6981F122-C2AA-4D21-B83C-F499EA6629DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:citrix:netscaler_agent:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1-4.42",
"versionEndExcluding": "14.1-25.53",
"matchCriteriaId": "5EC59DDE-6DB6-4CF4-AEE1-27410D7FE010"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:citrix:netscaler_console:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0-58.30",
"versionEndExcluding": "13.0-92.31",
"matchCriteriaId": "2A922EC2-62D0-4877-B82F-9CB49CD97F1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:citrix:netscaler_console:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1-4.43",
"versionEndExcluding": "13.1-53.22",
"matchCriteriaId": "2A85282E-98F2-4A48-9213-80D82BBA9C2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:citrix:netscaler_console:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1-4.42",
"versionEndExcluding": "14.1-25.53",
"matchCriteriaId": "D9A1C950-BACE-44C1-B0D5-F00F46D280F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:citrix:netscaler_sdx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0-91.12",
"versionEndExcluding": "13.0-92.31",
"matchCriteriaId": "10E845C6-2516-4DBB-9A8F-1EB852B93EB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:citrix:netscaler_sdx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1-49.13",
"versionEndExcluding": "13.1-53.17",
"matchCriteriaId": "F24241B9-7586-4BC8-87B0-11F60190676E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:citrix:netscaler_sdx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1-4.42",
"versionEndExcluding": "14.1-25.53",
"matchCriteriaId": "3A55F7F3-B702-48E9-B8BD-8D85A850B76E"
}
]
}
]
}
],
"references": [
{
"url": "https://support.citrix.com/article/CTX677998",
"source": "secure@citrix.com"
"source": "secure@citrix.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.citrix.com/article/CTX677998",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23097",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-03T20:15:20.883",
"lastModified": "2025-06-04T19:15:24.113",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:45:47.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D381478B-C638-4663-BD71-144BE4B02E46"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61E72146-72FE-4B54-AB79-3C665E7F016C"
}
]
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23097/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23098",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-03T20:15:21.760",
"lastModified": "2025-06-04T19:15:24.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:44:58.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,211 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F18F62E-2012-442E-BE60-6E76325D1824"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D8701B6-6989-44D1-873A-A1823BFD7CCC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_990_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF6C91D-DECE-4630-85FE-C22EF2B9160A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_990:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87FE8214-E165-4874-BB5A-3C4298708039"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1080_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43DE4D6F-D662-46F2-93BC-9AE950320BDE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE06CD56-8BFD-4208-843A-179E3E6F5C10"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89B88BFE-3C82-498C-8EC1-5784836DB1A1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9385885D-654A-496E-8029-7C6D9B077193"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1A7B09-9031-4E54-A24F-3237C054166B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC68046-2F08-40D1-B158-89D8D9263541"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D381478B-C638-4663-BD71-144BE4B02E46"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61E72146-72FE-4B54-AB79-3C665E7F016C"
}
]
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23098/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23100",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-03T20:15:21.880",
"lastModified": "2025-06-04T19:15:24.867",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:45:16.443",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,157 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1A7B09-9031-4E54-A24F-3237C054166B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC68046-2F08-40D1-B158-89D8D9263541"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D381478B-C638-4663-BD71-144BE4B02E46"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61E72146-72FE-4B54-AB79-3C665E7F016C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1480_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64897B0D-EBF6-4BEB-BF54-ABCDBFAB45E0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3F328B4-0442-4748-B5EE-DD1CEE50D6CF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16D9272E-1794-48FF-B6A4-8F48395BA38E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "932F5FB3-5527-44D7-9DD9-EF03963E3CA3"
}
]
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23100/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23102",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-03T19:15:38.807",
"lastModified": "2025-06-04T14:54:33.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:49:02.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,265 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:*:exynos_9820_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07729C7A-BC6B-482E-86C1-0B5047A98BEC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:*:exynos_9820:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59BBB1C0-06B0-4912-9A60-DB6DF7ECF7CD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:*:exynos_9825_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88933009-790A-44A6-ABAB-02B3FAEDD2A7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:*:exynos_9825:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23C2C4F9-5F26-4FF7-BCDF-AE3D47EBE78B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:*:exynos_980_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A2AFC23-2E28-48A2-96AD-7637479F58C0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:*:exynos_980:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4644455-7E6F-44AD-8739-D1BD2081968C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:*:exynos_990_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5517D822-4960-4DDA-B972-4EEFBB4FD5DE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:*:exynos_990:-:*:*:*:*:*:*:*",
"matchCriteriaId": "094E26DF-52C7-419A-ACC3-7D50E74DB77F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:*:exynos_1080_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD320084-5B49-4770-A097-992533EBBF43"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:*:exynos_1080:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F61DC81-BF95-4169-B9E1-30CD33EF0EB3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:*:exynos_2100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AECB9FE-C536-468C-9234-8FD3AD9B4468"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:*:exynos_2100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B901CCD1-A13D-4A20-81C7-94DCCB6949F9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:*:exynos_1280_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D714D07-E89C-4B7F-AA0C-3D95D34FF1D2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:*:exynos_1280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53CEA16B-5800-41FF-9788-D10674EC9DB6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:*:exynos_2200_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F71CFA-9C51-4FA5-B0E5-0A1409E61B6F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:*:exynos_2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C12886E-27FA-45F4-96F7-B1D8D3BE80D2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:*:exynos_1380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "189FE096-4B41-47F6-A159-3E0091005F60"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:*:exynos_1380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE6559C6-78E4-4985-811F-DD4983C4B445"
}
]
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23102/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23103",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-03T16:15:23.650",
"lastModified": "2025-06-04T14:54:33.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:49:19.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,76 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1480_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64897B0D-EBF6-4BEB-BF54-ABCDBFAB45E0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3F328B4-0442-4748-B5EE-DD1CEE50D6CF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16D9272E-1794-48FF-B6A4-8F48395BA38E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "932F5FB3-5527-44D7-9DD9-EF03963E3CA3"
}
]
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23103/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23107",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-03T17:15:21.327",
"lastModified": "2025-06-04T14:54:33.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:49:12.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,76 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1480_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64897B0D-EBF6-4BEB-BF54-ABCDBFAB45E0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3F328B4-0442-4748-B5EE-DD1CEE50D6CF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16D9272E-1794-48FF-B6A4-8F48395BA38E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "932F5FB3-5527-44D7-9DD9-EF03963E3CA3"
}
]
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23107/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-2766",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-06T19:15:26.930",
"lastModified": "2025-06-06T19:15:26.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "70mai A510 Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of 70mai A510. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the default configuration of user accounts. The configuration contains default password. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the root. Was ZDI-CAN-24996."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1393"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-180/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3485",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-06T19:15:27.140",
"lastModified": "2025-06-06T19:15:27.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Allegra extractFileFromZip Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the extractFileFromZip method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26524."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://alltena.com/en/resources/release-notes/release-notes-for-release-8-1-2",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-254/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2025-47950",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-06T18:15:35.330",
"lastModified": "2025-06-06T18:15:35.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CoreDNS is a DNS server that chains plugins. In versions prior to 1.21.2, a Denial of Service (DoS) vulnerability exists in the CoreDNS DNS-over-QUIC (DoQ) server implementation. The server previously created a new goroutine for every incoming QUIC stream without imposing any limits on the number of concurrent streams or goroutines. A remote, unauthenticated attacker could open a large number of streams, leading to uncontrolled memory consumption and eventually causing an Out Of Memory (OOM) crash \u2014 especially in containerized or memory-constrained environments. The patch in version 1.21.2 introduces two key mitigation mechanisms: `max_streams`, which caps the number of concurrent QUIC streams per connection with a default value of `256`; and `worker_pool_size`, which Introduces a server-wide, bounded worker pool to process incoming streams with a default value of `1024`. This eliminates the 1:1 stream-to-goroutine model and ensures that CoreDNS remains resilient under high concurrency. Some workarounds are available for those who are unable to upgrade. Disable QUIC support by removing or commenting out the `quic://` block in the Corefile, use container runtime resource limits to detect and isolate excessive memory usage, and/or monitor QUIC connection patterns and alert on anomalies."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://datatracker.ietf.org/doc/html/rfc9250",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/coredns/coredns/commit/efaed02c6a480ec147b1f799aab7cf815b17dfe1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/coredns/coredns/security/advisories/GHSA-cvx7-x8pj-x2gw",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/quic-go/quic-go",
"source": "security-advisories@github.com"
},
{
"url": "https://www.usenix.org/conference/usenixsecurity23/presentation/botella",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-49011",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-06T18:15:35.497",
"lastModified": "2025-06-06T18:15:35.497",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SpiceDB is an open source database for storing and querying fine-grained authorization data. Prior to version 1.44.2, on schemas involving arrows with caveats on the arrow\u2019ed relation, when the path to resolve a CheckPermission request involves the evaluation of multiple caveated branches, requests may return a negative response when a positive response is expected. Version 1.44.2 fixes the issue. As a workaround, do not use caveats in the schema over an arrow\u2019ed relation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-358"
}
]
}
],
"references": [
{
"url": "https://github.com/authzed/spicedb/commit/fe8dd9f491f6975b3408c401e413a530eb181a67",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/authzed/spicedb/releases/tag/v1.44.2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/authzed/spicedb/security/advisories/GHSA-cwwm-hr97-qfxm",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-49223",
"sourceIdentifier": "cve@navercorp.com",
"published": "2025-06-04T03:15:27.190",
"lastModified": "2025-06-04T14:54:33.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T19:30:16.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:naver:billboard.js:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.15.1",
"matchCriteriaId": "221EEEB3-105E-4CDD-8F53-23BDAC46A61C"
}
]
}
]
}
],
"references": [
{
"url": "https://cve.naver.com/detail/cve-2025-49223.html",
"source": "cve@navercorp.com"
"source": "cve@navercorp.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-5473",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-06T19:15:27.463",
"lastModified": "2025-06-06T19:15:27.463",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GIMP ICO File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of ICO files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26752."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://www.gimp.org/news/2025/05/18/gimp-3-0-4-released/#general-bugfixes",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-321/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-5474",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-06T19:15:27.613",
"lastModified": "2025-06-06T19:15:27.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "2BrightSparks SyncBackFree Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of 2BrightSparks SyncBackFree. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. User interaction on the part of an administrator is also required.\n\nThe specific flaw exists within the Mirror functionality. By creating a junction, an attacker can abuse the service to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26962."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-322/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-5480",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-06T19:15:27.757",
"lastModified": "2025-06-06T19:15:27.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Action1 Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Action1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26767."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [
{
"url": "https://www.action1.com/blog/acknowledging-zdi-can-26767-high-severity-vulnerability-in-action1-agent/",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-323/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-5481",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-06T19:15:27.903",
"lastModified": "2025-06-06T19:15:27.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sante DICOM Viewer Pro DCM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26168."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-324/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5542",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-03T22:15:21.807",
"lastModified": "2025-06-04T14:54:33.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:47:37.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -122,32 +142,92 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230726.1108:*:*:*:*:*:*:*",
"matchCriteriaId": "597534B0-5451-4B51-AEFA-099DB4DC505E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/X2000R/XSS_Virtual_Server",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.310992",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.310992",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.585726",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/X2000R/XSS_Virtual_Server",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5543",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-03T23:15:20.953",
"lastModified": "2025-06-04T14:54:33.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:47:47.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -122,32 +142,92 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230726.1108:*:*:*:*:*:*:*",
"matchCriteriaId": "597534B0-5451-4B51-AEFA-099DB4DC505E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/X2000R/XSS_parent_control",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.310993",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Vendor Advisory"
]
},
{
"url": "https://vuldb.com/?id.310993",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
]
},
{
"url": "https://vuldb.com/?submit.585728",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
]
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/X2000R/XSS_parent_control",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5572",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-04T06:15:22.437",
"lastModified": "2025-06-04T14:54:33.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:48:37.333",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
@ -87,6 +87,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -129,32 +149,92 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dcs-932l_firmware:2.18.01:*:*:*:*:*:*:*",
"matchCriteriaId": "2AD4BC0A-6ADE-47C3-83D9-288D46A60EA4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dcs-932l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34775D9A-F16B-43C5-A8F4-88C0F9760364"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_43/43.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.311029",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311029",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.588466",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_43/43.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5573",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-04T06:15:22.677",
"lastModified": "2025-06-04T14:54:33.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:48:46.463",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
@ -87,6 +87,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -129,32 +149,92 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dcs-932l_firmware:2.18.01:*:*:*:*:*:*:*",
"matchCriteriaId": "2AD4BC0A-6ADE-47C3-83D9-288D46A60EA4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dcs-932l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34775D9A-F16B-43C5-A8F4-88C0F9760364"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_44/44.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.311030",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311030",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.588467",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_44/44.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5652",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T10:15:23.477",
"lastModified": "2025-06-05T20:12:23.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:31:53.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in PHPGurukul Complaint Management System 2.0. Affected is an unknown function of the file /admin/between-date-complaintreport.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Complaint Management System 2.0. La vulnerabilidad afecta a una funci\u00f3n desconocida del archivo /admin/between-date-complaintreport.php. La manipulaci\u00f3n del argumento fromdate/todate provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,32 +142,81 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F9408DA9-0416-443D-8CDF-66677CF98CF1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/41",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.311142",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.311142",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.589963",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/41",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5659",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T13:15:21.907",
"lastModified": "2025-06-05T20:12:23.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:42:31.650",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in PHPGurukul Complaint Management System 2.0. Affected by this vulnerability is an unknown functionality of the file /user/profile.php. The manipulation of the argument pincode leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Complaint Management System 2.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /user/profile.php. La manipulaci\u00f3n del argumento pincode provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,32 +142,81 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:2.0:*:*:*:-:*:*:*",
"matchCriteriaId": "8C6D9515-0DC3-4727-B5B5-2E6C34362BF7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/48",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.311149",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.311149",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.589980",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/48",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5660",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T13:15:22.123",
"lastModified": "2025-06-05T20:12:23.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:42:59.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Complaint Management System 2.0. Affected by this issue is some unknown functionality of the file /user/register-complaint.php. The manipulation of the argument noc leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Complaint Management System 2.0. Este problema afecta a una funcionalidad desconocida del archivo /user/register-complaint.php. La manipulaci\u00f3n del argumento noc provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,32 +142,81 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:2.0:*:*:*:-:*:*:*",
"matchCriteriaId": "8C6D9515-0DC3-4727-B5B5-2E6C34362BF7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/49",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.311150",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.311150",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.589981",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/49",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5663",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T14:15:38.567",
"lastModified": "2025-06-05T20:12:23.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T18:43:14.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in PHPGurukul Auto Taxi Stand Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/search-autoortaxi.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en PHPGurukul Auto Taxi Stand Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/search-autoortaxi.php. La manipulaci\u00f3n del argumento \"searchdata\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,32 +142,81 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:auto\\/taxi_stand_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "341E1FB8-0A7F-4621-972C-CF3EED2F67E6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Pjwww13447/pjwww/issues/20",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.311152",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.311152",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.590055",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/Pjwww13447/pjwww/issues/20",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5669",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T17:15:29.917",
"lastModified": "2025-06-05T20:12:23.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T19:39:31.743",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in PHPGurukul Medical Card Generation System 1.0. This vulnerability affects unknown code of the file /admin/unreadenq.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad cr\u00edtica en PHPGurukul Medical Card Generation System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/unreadenq.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,32 +142,81 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/51",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.311158",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.311158",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.590065",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/51",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5670",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T17:15:30.117",
"lastModified": "2025-06-05T20:12:23.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-06T19:40:14.910",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Medical Card Generation System 1.0. This issue affects some unknown processing of the file /admin/manage-card.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Medical Card Generation System 1.0. Este problema afecta a un procesamiento desconocido del archivo /admin/manage-card.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,32 +142,81 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/52",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.311159",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.311159",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.590066",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/52",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5789",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T18:15:35.650",
"lastModified": "2025-06-06T18:15:35.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in TOTOLINK X15 1.0.0-B20230714.1105. This affects an unknown part of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/awindog/cve/blob/main/11.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311337",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311337",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.591218",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5790",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T18:15:35.840",
"lastModified": "2025-06-06T18:15:35.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in TOTOLINK X15 1.0.0-B20230714.1105. This vulnerability affects unknown code of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation of the argument mac leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/awindog/cve/blob/main/12.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311338",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311338",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.591219",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5792",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T18:15:36.030",
"lastModified": "2025-06-06T18:15:36.030",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This issue affects some unknown processing of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/byxs0x0/cve2/blob/main/1.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311339",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311339",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.591220",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5793",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T18:15:36.227",
"lastModified": "2025-06-06T18:15:36.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/byxs0x0/cve2/blob/main/2.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311340",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311340",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.591222",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5794",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T19:15:28.393",
"lastModified": "2025-06-06T19:15:28.393",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Tenda AC5 15.03.06.47. Affected by this issue is the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC5-formSetPPTPUserList-20a53a41781f806faf61cef61ed929c0?source=copy_link",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311348",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311348",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.591223",
"source": "cna@vuldb.com"
},
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5795",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T19:15:28.617",
"lastModified": "2025-06-06T19:15:28.617",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Tenda AC5 1.0/15.03.06.47. This affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC5-fromadvsetlanip-20a53a41781f805389dcd51fa04bc530?source=copy_link",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311349",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311349",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.591224",
"source": "cna@vuldb.com"
},
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5796",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T19:15:28.817",
"lastModified": "2025-06-06T19:15:28.817",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in code-projects Laundry System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /data/edit_type.php. The manipulation of the argument Type leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/tuooo/CVE/issues/8",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311350",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311350",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.591267",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-5797",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T19:15:29.020",
"lastModified": "2025-06-06T19:15:29.020",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Laundry Laundry System 1.0 and classified as problematic. This issue affects some unknown processing of the file /data/insert_type.php. The manipulation of the argument Type leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/tuooo/CVE/issues/9",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311351",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311351",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.591315",
"source": "cna@vuldb.com"
}
]
}

101
README.md
View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-06T18:00:19.694569+00:00
2025-06-06T20:00:23.555194+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-06T17:59:21.903000+00:00
2025-06-06T19:40:14.910000+00:00
```
### Last Data Feed Release
@ -33,69 +33,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
296938
296954
```
### CVEs added in the last Commit
Recently added CVEs: `33`
Recently added CVEs: `16`
- [CVE-2025-22490](CVE-2025/CVE-2025-224xx/CVE-2025-22490.json) (`2025-06-06T16:15:24.487`)
- [CVE-2025-29871](CVE-2025/CVE-2025-298xx/CVE-2025-29871.json) (`2025-06-06T16:15:24.637`)
- [CVE-2025-29872](CVE-2025/CVE-2025-298xx/CVE-2025-29872.json) (`2025-06-06T16:15:24.803`)
- [CVE-2025-29873](CVE-2025/CVE-2025-298xx/CVE-2025-29873.json) (`2025-06-06T16:15:24.950`)
- [CVE-2025-29876](CVE-2025/CVE-2025-298xx/CVE-2025-29876.json) (`2025-06-06T16:15:25.090`)
- [CVE-2025-29877](CVE-2025/CVE-2025-298xx/CVE-2025-29877.json) (`2025-06-06T16:15:25.230`)
- [CVE-2025-29883](CVE-2025/CVE-2025-298xx/CVE-2025-29883.json) (`2025-06-06T16:15:25.370`)
- [CVE-2025-29884](CVE-2025/CVE-2025-298xx/CVE-2025-29884.json) (`2025-06-06T16:15:25.510`)
- [CVE-2025-29885](CVE-2025/CVE-2025-298xx/CVE-2025-29885.json) (`2025-06-06T16:15:25.643`)
- [CVE-2025-29892](CVE-2025/CVE-2025-298xx/CVE-2025-29892.json) (`2025-06-06T16:15:25.783`)
- [CVE-2025-30279](CVE-2025/CVE-2025-302xx/CVE-2025-30279.json) (`2025-06-06T16:15:26.030`)
- [CVE-2025-33031](CVE-2025/CVE-2025-330xx/CVE-2025-33031.json) (`2025-06-06T16:15:28.203`)
- [CVE-2025-33035](CVE-2025/CVE-2025-330xx/CVE-2025-33035.json) (`2025-06-06T16:15:28.353`)
- [CVE-2025-49599](CVE-2025/CVE-2025-495xx/CVE-2025-49599.json) (`2025-06-06T17:15:36.147`)
- [CVE-2025-5747](CVE-2025/CVE-2025-57xx/CVE-2025-5747.json) (`2025-06-06T16:15:29.803`)
- [CVE-2025-5748](CVE-2025/CVE-2025-57xx/CVE-2025-5748.json) (`2025-06-06T16:15:29.973`)
- [CVE-2025-5749](CVE-2025/CVE-2025-57xx/CVE-2025-5749.json) (`2025-06-06T16:15:30.120`)
- [CVE-2025-5750](CVE-2025/CVE-2025-57xx/CVE-2025-5750.json) (`2025-06-06T16:15:30.273`)
- [CVE-2025-5751](CVE-2025/CVE-2025-57xx/CVE-2025-5751.json) (`2025-06-06T16:15:30.413`)
- [CVE-2025-5783](CVE-2025/CVE-2025-57xx/CVE-2025-5783.json) (`2025-06-06T16:15:30.960`)
- [CVE-2025-5784](CVE-2025/CVE-2025-57xx/CVE-2025-5784.json) (`2025-06-06T16:15:31.180`)
- [CVE-2025-5785](CVE-2025/CVE-2025-57xx/CVE-2025-5785.json) (`2025-06-06T16:15:31.370`)
- [CVE-2025-5786](CVE-2025/CVE-2025-57xx/CVE-2025-5786.json) (`2025-06-06T17:15:39.037`)
- [CVE-2025-5787](CVE-2025/CVE-2025-57xx/CVE-2025-5787.json) (`2025-06-06T17:15:40.630`)
- [CVE-2025-5788](CVE-2025/CVE-2025-57xx/CVE-2025-5788.json) (`2025-06-06T17:15:41.797`)
- [CVE-2025-2766](CVE-2025/CVE-2025-27xx/CVE-2025-2766.json) (`2025-06-06T19:15:26.930`)
- [CVE-2025-3485](CVE-2025/CVE-2025-34xx/CVE-2025-3485.json) (`2025-06-06T19:15:27.140`)
- [CVE-2025-47950](CVE-2025/CVE-2025-479xx/CVE-2025-47950.json) (`2025-06-06T18:15:35.330`)
- [CVE-2025-49011](CVE-2025/CVE-2025-490xx/CVE-2025-49011.json) (`2025-06-06T18:15:35.497`)
- [CVE-2025-5473](CVE-2025/CVE-2025-54xx/CVE-2025-5473.json) (`2025-06-06T19:15:27.463`)
- [CVE-2025-5474](CVE-2025/CVE-2025-54xx/CVE-2025-5474.json) (`2025-06-06T19:15:27.613`)
- [CVE-2025-5480](CVE-2025/CVE-2025-54xx/CVE-2025-5480.json) (`2025-06-06T19:15:27.757`)
- [CVE-2025-5481](CVE-2025/CVE-2025-54xx/CVE-2025-5481.json) (`2025-06-06T19:15:27.903`)
- [CVE-2025-5789](CVE-2025/CVE-2025-57xx/CVE-2025-5789.json) (`2025-06-06T18:15:35.650`)
- [CVE-2025-5790](CVE-2025/CVE-2025-57xx/CVE-2025-5790.json) (`2025-06-06T18:15:35.840`)
- [CVE-2025-5792](CVE-2025/CVE-2025-57xx/CVE-2025-5792.json) (`2025-06-06T18:15:36.030`)
- [CVE-2025-5793](CVE-2025/CVE-2025-57xx/CVE-2025-5793.json) (`2025-06-06T18:15:36.227`)
- [CVE-2025-5794](CVE-2025/CVE-2025-57xx/CVE-2025-5794.json) (`2025-06-06T19:15:28.393`)
- [CVE-2025-5795](CVE-2025/CVE-2025-57xx/CVE-2025-5795.json) (`2025-06-06T19:15:28.617`)
- [CVE-2025-5796](CVE-2025/CVE-2025-57xx/CVE-2025-5796.json) (`2025-06-06T19:15:28.817`)
- [CVE-2025-5797](CVE-2025/CVE-2025-57xx/CVE-2025-5797.json) (`2025-06-06T19:15:29.020`)
### CVEs modified in the last Commit
Recently modified CVEs: `30`
Recently modified CVEs: `27`
- [CVE-2024-38892](CVE-2024/CVE-2024-388xx/CVE-2024-38892.json) (`2025-06-06T17:16:48.147`)
- [CVE-2024-38894](CVE-2024/CVE-2024-388xx/CVE-2024-38894.json) (`2025-06-06T17:16:55.567`)
- [CVE-2024-38895](CVE-2024/CVE-2024-388xx/CVE-2024-38895.json) (`2025-06-06T17:13:32.390`)
- [CVE-2024-38896](CVE-2024/CVE-2024-388xx/CVE-2024-38896.json) (`2025-06-06T17:13:15.750`)
- [CVE-2024-38897](CVE-2024/CVE-2024-388xx/CVE-2024-38897.json) (`2025-06-06T17:10:46.100`)
- [CVE-2024-38949](CVE-2024/CVE-2024-389xx/CVE-2024-38949.json) (`2025-06-06T17:15:02.730`)
- [CVE-2024-38950](CVE-2024/CVE-2024-389xx/CVE-2024-38950.json) (`2025-06-06T17:15:28.550`)
- [CVE-2024-5155](CVE-2024/CVE-2024-51xx/CVE-2024-5155.json) (`2025-06-06T16:18:02.717`)
- [CVE-2024-57049](CVE-2024/CVE-2024-570xx/CVE-2024-57049.json) (`2025-06-06T17:59:07.280`)
- [CVE-2024-57050](CVE-2024/CVE-2024-570xx/CVE-2024-57050.json) (`2025-06-06T17:59:21.903`)
- [CVE-2024-57603](CVE-2024/CVE-2024-576xx/CVE-2024-57603.json) (`2025-06-06T17:53:07.037`)
- [CVE-2024-57604](CVE-2024/CVE-2024-576xx/CVE-2024-57604.json) (`2025-06-06T17:57:47.273`)
- [CVE-2024-6390](CVE-2024/CVE-2024-63xx/CVE-2024-6390.json) (`2025-06-06T16:10:55.940`)
- [CVE-2024-6477](CVE-2024/CVE-2024-64xx/CVE-2024-6477.json) (`2025-06-06T16:12:25.440`)
- [CVE-2025-20188](CVE-2025/CVE-2025-201xx/CVE-2025-20188.json) (`2025-06-06T17:15:30.170`)
- [CVE-2025-26157](CVE-2025/CVE-2025-261xx/CVE-2025-26157.json) (`2025-06-06T17:58:10.687`)
- [CVE-2025-26158](CVE-2025/CVE-2025-261xx/CVE-2025-26158.json) (`2025-06-06T17:58:29.797`)
- [CVE-2025-26773](CVE-2025/CVE-2025-267xx/CVE-2025-26773.json) (`2025-06-06T17:58:49.050`)
- [CVE-2025-31200](CVE-2025/CVE-2025-312xx/CVE-2025-31200.json) (`2025-06-06T16:15:27.827`)
- [CVE-2025-31201](CVE-2025/CVE-2025-312xx/CVE-2025-31201.json) (`2025-06-06T16:15:28.020`)
- [CVE-2025-5502](CVE-2025/CVE-2025-55xx/CVE-2025-5502.json) (`2025-06-06T17:42:05.687`)
- [CVE-2025-5516](CVE-2025/CVE-2025-55xx/CVE-2025-5516.json) (`2025-06-06T17:42:29.520`)
- [CVE-2025-5525](CVE-2025/CVE-2025-55xx/CVE-2025-5525.json) (`2025-06-06T17:27:21.350`)
- [CVE-2025-5685](CVE-2025/CVE-2025-56xx/CVE-2025-5685.json) (`2025-06-06T16:15:29.510`)
- [CVE-2025-5806](CVE-2025/CVE-2025-58xx/CVE-2025-5806.json) (`2025-06-06T16:15:31.560`)
- [CVE-2023-48909](CVE-2023/CVE-2023-489xx/CVE-2023-48909.json) (`2025-06-06T18:15:34.120`)
- [CVE-2023-51955](CVE-2023/CVE-2023-519xx/CVE-2023-51955.json) (`2025-06-06T18:15:34.400`)
- [CVE-2023-7231](CVE-2023/CVE-2023-72xx/CVE-2023-7231.json) (`2025-06-06T19:26:02.810`)
- [CVE-2024-20382](CVE-2024/CVE-2024-203xx/CVE-2024-20382.json) (`2025-06-06T18:51:11.123`)
- [CVE-2024-22533](CVE-2024/CVE-2024-225xx/CVE-2024-22533.json) (`2025-06-06T18:15:34.733`)
- [CVE-2024-34067](CVE-2024/CVE-2024-340xx/CVE-2024-34067.json) (`2025-06-06T19:15:40.140`)
- [CVE-2024-57727](CVE-2024/CVE-2024-577xx/CVE-2024-57727.json) (`2025-06-06T18:15:34.957`)
- [CVE-2024-6236](CVE-2024/CVE-2024-62xx/CVE-2024-6236.json) (`2025-06-06T18:56:43.393`)
- [CVE-2025-23097](CVE-2025/CVE-2025-230xx/CVE-2025-23097.json) (`2025-06-06T18:45:47.190`)
- [CVE-2025-23098](CVE-2025/CVE-2025-230xx/CVE-2025-23098.json) (`2025-06-06T18:44:58.380`)
- [CVE-2025-23100](CVE-2025/CVE-2025-231xx/CVE-2025-23100.json) (`2025-06-06T18:45:16.443`)
- [CVE-2025-23102](CVE-2025/CVE-2025-231xx/CVE-2025-23102.json) (`2025-06-06T18:49:02.287`)
- [CVE-2025-23103](CVE-2025/CVE-2025-231xx/CVE-2025-23103.json) (`2025-06-06T18:49:19.250`)
- [CVE-2025-23107](CVE-2025/CVE-2025-231xx/CVE-2025-23107.json) (`2025-06-06T18:49:12.190`)
- [CVE-2025-49223](CVE-2025/CVE-2025-492xx/CVE-2025-49223.json) (`2025-06-06T19:30:16.060`)
- [CVE-2025-5542](CVE-2025/CVE-2025-55xx/CVE-2025-5542.json) (`2025-06-06T18:47:37.757`)
- [CVE-2025-5543](CVE-2025/CVE-2025-55xx/CVE-2025-5543.json) (`2025-06-06T18:47:47.150`)
- [CVE-2025-5572](CVE-2025/CVE-2025-55xx/CVE-2025-5572.json) (`2025-06-06T18:48:37.333`)
- [CVE-2025-5573](CVE-2025/CVE-2025-55xx/CVE-2025-5573.json) (`2025-06-06T18:48:46.463`)
- [CVE-2025-5652](CVE-2025/CVE-2025-56xx/CVE-2025-5652.json) (`2025-06-06T18:31:53.513`)
- [CVE-2025-5659](CVE-2025/CVE-2025-56xx/CVE-2025-5659.json) (`2025-06-06T18:42:31.650`)
- [CVE-2025-5660](CVE-2025/CVE-2025-56xx/CVE-2025-5660.json) (`2025-06-06T18:42:59.143`)
- [CVE-2025-5663](CVE-2025/CVE-2025-56xx/CVE-2025-5663.json) (`2025-06-06T18:43:14.380`)
- [CVE-2025-5669](CVE-2025/CVE-2025-56xx/CVE-2025-5669.json) (`2025-06-06T19:39:31.743`)
- [CVE-2025-5670](CVE-2025/CVE-2025-56xx/CVE-2025-5670.json) (`2025-06-06T19:40:14.910`)
## Download and Usage

View File

@ -126436,7 +126436,7 @@ CVE-2018-8635,0,0,2fa77610eae5127b69b72c8cd0c818352e2543174d574fb2deef54909e4fd4
CVE-2018-8636,0,0,432a07941e0899dcde198ff4f6249981610b9fb745921cfa04dab18ffc106851,2024-11-21T04:14:09.333000
CVE-2018-8637,0,0,14830137fe8bbc02788d245c16f9474c23cdbb327541d997f923df2c03a74013,2024-11-21T04:14:09.450000
CVE-2018-8638,0,0,b65222b6ab3c08a5318c5cfa087d17966ae608ccda1cc49c66b47d657073eba3,2024-11-21T04:14:09.573000
CVE-2018-8639,0,0,ef4e9f402807822491e83543e71a80371978253a4050a98333ee78dd9734c167,2025-03-05T16:24:58.477000
CVE-2018-8639,0,1,90fdf5b7140ef53ab972e3c3276508c86638fccfc1dc42cff5e5414bd0922ef8,2025-06-06T18:15:33.090000
CVE-2018-8641,0,0,a43394ac0283961ddab14e82a4299cbf7b8ac31c65f3064c1f9d8590d867ced2,2024-11-21T04:14:09.823000
CVE-2018-8643,0,0,bb7f45a85641f4ae4900e37b2faa285774a0d13729ca5f355b4cb6670454fe5d,2024-11-21T04:14:09.953000
CVE-2018-8649,0,0,c268dba9f2f7c15df48853255b474b1824af0b9b7086e1ed7148f8b0f4c9ee76,2024-11-21T04:14:10.080000
@ -207850,7 +207850,7 @@ CVE-2022-41540,0,0,19ac2edf697f1fc6c5dfd1dfe6d5200efff00e2f3ab1dffbd94946a57ff74
CVE-2022-41541,0,0,62bcbe88569c0af82de71dbc914961b1b38c22841d479a1da4ba20fbad5ada14,2025-05-15T15:16:06.270000
CVE-2022-41542,0,0,26ea6d3b932a2bee517cdb50b34d83d1551d963c22b4d4528858778033c82a8e,2025-05-13T16:15:22.500000
CVE-2022-41544,0,0,46d8d143e59c2bc610b24f2499524919e7dba9016c816d873e9908eae8c2c845,2025-05-13T20:15:23.060000
CVE-2022-41545,0,0,2ca57bd36e23a7f6d797d20d750a7df1fc825ba3746def947c83a006ccc68f16,2025-03-20T17:15:36.803000
CVE-2022-41545,0,1,a56d1359b39f94bdaaad138e9cd0a0aa57980f281030860c88a5fed2fdb76a3c,2025-06-06T18:01:39.573000
CVE-2022-41547,0,0,2fed9ec6a690cfa5c6fc6dc8bf3ae65365b216d596d3712f522188a5bf1b240a,2025-05-10T03:15:21.323000
CVE-2022-4155,0,0,a960c13c29b37d7343a3f366ea68ec0256f562d9d96944e083db3c30f6a2e202,2025-04-12T00:15:17.273000
CVE-2022-41550,0,0,f59c06917890b3454de1d2e01b9b8e896175f34bf650dfb358537b915891d032,2025-05-20T16:15:23.060000
@ -211839,7 +211839,7 @@ CVE-2022-46849,0,0,822dab7399fa42100e792735d7c8fcfc797401b26b250f9c75a35c1da7e91
CVE-2022-4685,0,0,f811885dae02c5392d6262d2ce12d3efc8cce3de17cc4b2f0f68d631d60d55e0,2023-11-07T03:58:35.860000
CVE-2022-46850,0,0,1ee7230cd0ce68747cdc4c15d295683ec86f9c361c32306e65b18b714c4fb38c,2024-11-21T07:31:10.100000
CVE-2022-46851,0,0,4a1db3251a0659832fecab1e76f8718c9cb41559e0349c62362e9b3203e01012,2024-11-21T07:31:10.240000
CVE-2022-46852,0,1,d457b7921b4bfb29df57d2105fbd69681131cb7da08f189dc1b8b274c391822f,2025-06-06T17:22:55.973000
CVE-2022-46852,0,0,d457b7921b4bfb29df57d2105fbd69681131cb7da08f189dc1b8b274c391822f,2025-06-06T17:22:55.973000
CVE-2022-46853,0,0,32abb78ff89d3fda6c8fdbaf825c5f057c2942b788ec490ccf7e8ad86f4a8269,2025-04-15T13:10:20.330000
CVE-2022-46854,0,0,d381d825968efa10033cef77f8bb8812957b4f8331dc8462132ed31e02e39d2d,2024-11-21T07:31:10.627000
CVE-2022-46855,0,0,67f8e0843ed691e23edcc11c7c4a6b8cf6e871728a48c0617b73618d68161f94,2024-11-21T07:31:10.750000
@ -239068,7 +239068,7 @@ CVE-2023-48901,0,0,66995dd25bd1c4575966899b47e249f4f99e42673ebbe7904e356fbbaad77
CVE-2023-48902,0,0,d987a8473188002d2b44d8e375ee03e7917b5724f96beef410565a4dc06d2433,2025-05-19T13:06:35.470000
CVE-2023-48903,0,0,a46ebf8e8349110923b01983b804a1cad90901dc14db89a69922cbc7789d0fc7,2025-05-19T13:06:33.037000
CVE-2023-48906,0,0,a3f7e82edcf93b86c130216880280929fbc9306c05db8190e2002e7925dfcec6,2025-03-28T20:15:18.650000
CVE-2023-48909,0,0,26188ae4304731681e252b5cd6f1f2f155d508198abb79497f44faa48db08208,2024-11-21T08:32:36.543000
CVE-2023-48909,0,1,a123f5c7a28d35ddc595c31cb43295e3ffb2daa1d64b1b184de6d644a0a5247a,2025-06-06T18:15:34.120000
CVE-2023-4891,0,0,9ebdcad71a27c27fe0dfae467335b7edb7ecffb33128ac6fca07d743ca1730f9,2024-11-21T08:36:12.107000
CVE-2023-48910,0,0,93d4d7091dcd3205186551dbeebc53525343dcbca06f87903f0e2169b1de7d02,2024-11-21T08:32:36.690000
CVE-2023-48912,0,0,109e9984fc8e8e281750312e72adf3f51a1c3818871bbcf73f4d25c6abe5a0e5,2024-11-21T08:32:36.920000
@ -241173,7 +241173,7 @@ CVE-2023-51951,0,0,5723b90f8ddbc77ac2ddda0fc1e2439842eb75405bb5261a8a3e2df9c2cf4
CVE-2023-51952,0,0,3ff812a795eaa25f84bb2cdf16d16a7db5f97ece164e4994297049e490772af3,2024-11-21T08:38:57.857000
CVE-2023-51953,0,0,e37612a11a9d71533ddd7b4d06ce9ab58a42bfa22633c0e0e14163f964928244,2024-11-21T08:38:58.023000
CVE-2023-51954,0,0,85e766fbe54eb5b441d6d8b766aaaa8bbf9b36980c73e269479ea77b43aa8a5b,2025-06-03T15:15:48.140000
CVE-2023-51955,0,0,5f78dd931fba7ab7497e17e4dfd1de6af1617d08da87d818625e30d5879ec9dd,2024-11-21T08:38:58.313000
CVE-2023-51955,0,1,0d54fd57d962b6533aafc4b961c69093c67961ab1ad01487e02e25770da5bc50,2025-06-06T18:15:34.400000
CVE-2023-51956,0,0,c9c9aba31f78dd96dd4adf02499c39dd256279663ddea11006140c39508764c3,2025-06-03T15:15:48.350000
CVE-2023-51957,0,0,76e7b32685a00f4369bdf2c6a596ac0c87298633fbf5a80d5facb022abc68579,2024-11-21T08:38:58.610000
CVE-2023-51958,0,0,e40fe21fa221ac8f194540f4f239f90de6fe1826c8d380d968a5794f965ba175,2024-11-21T08:38:58.840000
@ -244069,7 +244069,7 @@ CVE-2023-7227,0,0,062837ad2a2bc1e11b2e3820e3d99d10d4b3ca1af13959e96c26537a624d2a
CVE-2023-7228,0,0,1bd9f42c82350c0208f607611c9840befce0eeb766f860c11bce4b0fd8f2e36b,2025-05-28T14:26:18.270000
CVE-2023-7229,0,0,9500a7b8af9ea07300db230c5a721e265019fea1d9c09d18491740993cb84676,2025-05-27T20:02:45.827000
CVE-2023-7230,0,0,4762a4831ed2235747f0b5267c3da49fa895d3ca30fb5638ab94c71b28f9a928,2025-05-27T20:02:38.433000
CVE-2023-7231,0,0,a136547a981845a571da9e8ef768322490eecbb93d7cd9ac71c1bea0ae005be9,2025-05-27T20:00:59.710000
CVE-2023-7231,0,1,909ee1bf8f4b677665e46df50eea076f0b83b7bd8ad48ba2affaf981bf11a71d,2025-06-06T19:26:02.810000
CVE-2023-7232,0,0,9f7a5c43edaf3b14982f9301a589e9c185378d046852750b8fde2c0fb8bd58c7,2025-05-07T01:29:49.817000
CVE-2023-7233,0,0,cd57130e3a0adbdd71886028ffb489df6c2e5d6130f885e92fdc92adf16d35a6,2025-03-14T19:15:43.210000
CVE-2023-7234,0,0,248e31b2cc999c8ba6f2ca9d8d8237c455eadccd42c135ee68f6b05bbf12972b,2024-11-21T08:45:34.383000
@ -248223,8 +248223,8 @@ CVE-2024-13083,0,0,9baf862c4a01e16469f726f0f2436d28244783672ca85ea8f1f8981937170
CVE-2024-13084,0,0,f2c72f4c09d45c5cd33a8dc82e8e6f76fce41bba98f78ae1d6ecedd64730d79d,2025-01-06T14:44:57.910000
CVE-2024-13085,0,0,162bf1e91a247b7e6da6855dca3faf3ee63c65213e4a36036c19ad648c40fedb,2025-01-06T14:43:13.437000
CVE-2024-13086,0,0,7ac42c524055e40fca53eb99442db6298fae490b3d2a5b9bd9dde151851588be,2025-03-07T17:15:18.430000
CVE-2024-13087,1,1,35260f13a79cf139041023831654c64219b8f809a7b38814600971834708570f,2025-06-06T16:15:22.573000
CVE-2024-13088,1,1,0272f4b3c968a816786485aafa87f084bd478cc6c925669a3769d54b35ce88a1,2025-06-06T16:15:23.323000
CVE-2024-13087,0,0,35260f13a79cf139041023831654c64219b8f809a7b38814600971834708570f,2025-06-06T16:15:22.573000
CVE-2024-13088,0,0,0272f4b3c968a816786485aafa87f084bd478cc6c925669a3769d54b35ce88a1,2025-06-06T16:15:23.323000
CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000
CVE-2024-13091,0,0,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff452d,2025-01-24T18:42:25.563000
CVE-2024-13092,0,0,a2750c0c790f467a547694b70414fe45b0b02ded27bb4d4c2a0fae1c1a0700ca,2025-04-03T14:45:17.077000
@ -250032,7 +250032,7 @@ CVE-2024-20379,0,0,f6b182aba1f5bea74c992ea3496378e31429790ebaa564f57ec1bdcd738a1
CVE-2024-2038,0,0,a3a7a3e24ecae0b84a6a9e24c5c693be1d1fdd37db796b330eac6b7e8cd72018,2024-11-21T09:08:54.393000
CVE-2024-20380,0,0,52ff045cdd3863bab68c233643aecbc307a3fb67fe28e04320763830e99a3824,2024-11-21T08:52:30.310000
CVE-2024-20381,0,0,c0c1e72d09de162858c50f3eb24b8e3b2eaddf6db3013286ef5d0324b4df5094,2024-10-08T21:43:28.757000
CVE-2024-20382,0,0,9c89ae49089bffd86661d49ef2c6768a3b7084c30720d9c506b89f16cf39e0d6,2024-10-25T12:56:36.827000
CVE-2024-20382,0,1,92d04b0d91cc1813c983467bab79d38c94510ff0bc760aa68a27e77d5960a671,2025-06-06T18:51:11.123000
CVE-2024-20383,0,0,617126a1a30b56caa324787ca2c439bbb2e8383571de91ef560adba715caef73,2024-11-21T08:52:30.840000
CVE-2024-20384,0,0,0a746f9fe8687840f9d3d1db9400d7af0ab805422e416850a25ec8a34da8c34a,2024-10-25T12:56:36.827000
CVE-2024-20385,0,0,7736e77dbc744ce9555e0ea6627eea3f34e81d95a75ed68714b7ae9537ea24d9,2024-10-08T14:22:34.120000
@ -251984,7 +251984,7 @@ CVE-2024-22526,0,0,be0cd17245feb37010512e9e801fc3cf88fa259a228b2653acad22a5e1382
CVE-2024-22529,0,0,6ff6964af6dcf37228963edad1e1a72d4daa6ec595720f814030f9445d7fd173,2025-06-04T22:15:24.783000
CVE-2024-2253,0,0,fcaa54d611112bbef2bb576728350004bcfdf9fe077edec443da7f473b69b277,2024-11-21T09:09:21.307000
CVE-2024-22532,0,0,5752a21af26f07df5f97f702cf28a5f0fbd30a7fc273fee426e54f038bc969a7,2025-05-13T14:43:59.507000
CVE-2024-22533,0,0,5103c8569310cce602bdd9c2fb596174835a1b3141133217054fc95f31d140fe,2024-11-21T08:56:25.177000
CVE-2024-22533,0,1,1bf8ec80297c6a6ca140823c44ddd3ce704fccbb5f2636812d119bad40122740,2025-06-06T18:15:34.733000
CVE-2024-2254,0,0,156e422dd0111a66d9220d123185b3910ba66ffac4d50ed4595b56b3d5d0cb5a,2024-09-26T22:36:20.803000
CVE-2024-22543,0,0,c2f2470fbb228b72d3dd746a2eebda28219c960f97fd57b7d45ac949003fdb46,2025-04-08T14:41:22.843000
CVE-2024-22544,0,0,5c859c6b12795b2200448f24ca9a6011d7687074cfe2e34dadb24dd7fd5449bc,2025-04-08T14:42:14.787000
@ -260117,7 +260117,7 @@ CVE-2024-33368,0,0,1aed4b18a1492d5e22723c399fa6202a83f88860ce0815b8c4855ef51f160
CVE-2024-33369,0,0,b9490b3f7ca43c4b15f380a2b2afddef109797ed9310d8e0bbcf8d7a479d2906,2024-09-30T12:45:57.823000
CVE-2024-3337,0,0,93fac470c900f6f8b15137cc4a36deefb5092aa95ff5568e01f2ecb87b3abff1,2025-01-28T18:10:03.600000
CVE-2024-33371,0,0,f4bc90a82667f79cc8cefc7905503af52594d6365d0f0f5457d8b3ea11012e6e,2025-04-01T15:15:36.887000
CVE-2024-33373,0,1,ea63a122d0d6ac8e36093298ccb6c4776867d4f28c870f80f2ff22c56bff3016,2025-06-06T17:16:30.690000
CVE-2024-33373,0,0,ea63a122d0d6ac8e36093298ccb6c4776867d4f28c870f80f2ff22c56bff3016,2025-06-06T17:16:30.690000
CVE-2024-33374,0,0,74f1d636f52a32c597b2978544934a629869471c51c9ae394bee1952eff3f9e7,2024-11-21T09:16:51.360000
CVE-2024-33375,0,0,f88574a9cfe30e71bdaf143c28b4b8b85911fc72588a69430865cd1e2de2835f,2025-05-30T14:09:48.680000
CVE-2024-33377,0,0,2b277b87eb958e279f3a13417178a00d041bd21f2ebf65fd66c2dceacfa92eb6,2025-05-30T14:12:07.740000
@ -260661,7 +260661,7 @@ CVE-2024-34063,0,0,b643c186253dea78886cdc164848b2150252d41fc3260449c6470a9b018af
CVE-2024-34064,0,0,d4829dc815189eceac871b0df2db5b56da09a3bb505bf219d3305b275816fd82,2025-02-04T17:15:18.667000
CVE-2024-34065,0,0,4d85ab326ecb53235af3ff0a7f41a0c6b0f15838f98dde2b100e9a0c37c4fc30,2024-11-21T09:18:00.980000
CVE-2024-34066,0,0,a6c7f9e2fa625444e66819f02de5f84ab05035e76b2d9a7a68ee6024511c806e,2025-02-21T15:15:38.680000
CVE-2024-34067,0,0,a4874c94ab86be355218dd89763b57103c31949c31b72b41d00b759fa3049886,2024-11-21T09:18:01.257000
CVE-2024-34067,0,1,5d5deae8f2f77faa31e4a9986e762cd18be423572286627c6567dc3891cf733a,2025-06-06T19:15:40.140000
CVE-2024-34068,0,0,746c105ea0ce54757cf5de08407840037e20da226e2ff660f2606589bddf9680,2025-02-21T15:19:39.417000
CVE-2024-34069,0,0,e06af822099f29af869bb5334ce574287bfc7df782eee0154ea8f805cc040597,2025-02-21T18:15:16.663000
CVE-2024-3407,0,0,d37a2e3074bf6319620248c6e40abd52728bf6bf8a14bb51fb72602683c6c5ae,2025-05-15T14:21:34.543000
@ -262483,7 +262483,7 @@ CVE-2024-3635,0,0,6b91ce08fb1c4fe8eb1c3b4b2db88c9ffd3abcddd772228d559fe4e3fab4a5
CVE-2024-36353,0,0,caf07d2a6c34feb51886f1ce6edb50e9937e103b379c80565763a756df3ec242,2025-03-02T18:15:34.033000
CVE-2024-36358,0,0,81b5623d6ec0aba632ed9ccbd9cbbeee602466b9c8b47e22ca90ce67f15c6d23,2025-03-13T14:15:26.933000
CVE-2024-36359,0,0,681447f14a7123230c23ae85426c8aaf48135d70ce8470eeb85fe0cc08ab2eb1,2025-03-18T16:15:21.627000
CVE-2024-3636,0,1,7998201ae43ad31a3690128e467b0e5b28dee8679cc095cec217932ed4c04872,2025-06-06T16:15:59.430000
CVE-2024-3636,0,0,7998201ae43ad31a3690128e467b0e5b28dee8679cc095cec217932ed4c04872,2025-06-06T16:15:59.430000
CVE-2024-36360,0,0,98643c3072e9d590b4c751843f231fe3cbac85b5add3945e111d686ffb57c7ef,2025-03-14T15:15:41.037000
CVE-2024-36361,0,0,e4343f7ee38acd675bd11a78326fa9c9897eb116b95daf33a3c1581431d81b95,2024-11-21T09:22:01.357000
CVE-2024-36362,0,0,3ff8b5091e460c716d44f313160232b1d6394a6c30faf8d66a18a697350ec2db,2024-12-16T15:41:48.623000
@ -263567,8 +263567,8 @@ CVE-2024-37649,0,0,162c02fd634f3857ac43a4b48233920dfa2eaee3a75657af8d68aaa5ded5f
CVE-2024-3765,0,0,c54b78e5adfc3aa0aeee5a0c713f8fc0d1f32174018a6d7be47506e453bfd25c,2024-11-21T09:30:21.087000
CVE-2024-37654,0,0,907897ff6c2382fc56ee5ba07de58991906e2dbb80ef72616776edb5dc93d406,2024-11-21T19:15:08.990000
CVE-2024-3766,0,0,5b1f97d45b8d13ab711b52176ff6a759c727cc812c4dd212fe3769d5cd7bfb0f,2024-11-21T09:30:21.280000
CVE-2024-37661,0,1,ee08e04759841bbf9e002e732331f80dee9de5ef526cd60e9627ae7db039d225,2025-06-06T17:09:35.177000
CVE-2024-37662,0,1,9fb609c29e351aae318bf190d1652757771b4257bef2c46e7c384208ed859872,2025-06-06T17:09:55.507000
CVE-2024-37661,0,0,ee08e04759841bbf9e002e732331f80dee9de5ef526cd60e9627ae7db039d225,2025-06-06T17:09:35.177000
CVE-2024-37662,0,0,9fb609c29e351aae318bf190d1652757771b4257bef2c46e7c384208ed859872,2025-06-06T17:09:55.507000
CVE-2024-37663,0,0,fed344a0d61f1e567327514f6a8e91ad3162275e1c47738bf38d3802a419ffbb,2024-11-22T16:15:24.273000
CVE-2024-37664,0,0,ec10d2a017c572696a305d5984bbbc6e09db1615173526af4be64eee6d7ed665,2024-11-22T16:15:24.463000
CVE-2024-37665,0,0,1eb587434ded45d2e868af7abc77840ba8d1cc348193e8d80a8fd746774e5a12,2024-11-21T09:24:12.510000
@ -264661,11 +264661,11 @@ CVE-2024-38889,0,0,0b2bee4dc124ba73567cd1246f3597be7d361d6616d364c8e433bdd324f98
CVE-2024-3889,0,0,af0688b95d292dc92732b5c4e2393cb03293b12b4f4dd952db51aab4274a418d,2025-01-10T21:35:50.913000
CVE-2024-38890,0,0,5e341dfa8295fd78a7ddede46ae19aab792fd75804339582eff535eaf7f9049a,2025-05-06T16:33:19.013000
CVE-2024-38891,0,0,e5d32fdd9af0f421041a310471a5b5fa3a1fa250c57717f5413406e6e3afd997,2024-08-20T16:19:34.213000
CVE-2024-38892,0,1,a20692a4afccd4041f8dc2fe8c93e7fcd33447ec53a49c40f7b3d23824613ad7,2025-06-06T17:16:48.147000
CVE-2024-38894,0,1,c62c7e31976529f1d9044dbf96421f9722d660d8f91e291869d162c1c9093fa3,2025-06-06T17:16:55.567000
CVE-2024-38895,0,1,336501c788694b0bacbb5c1d6e36e24802753d1f0e6949efd54ac8f19087ab23,2025-06-06T17:13:32.390000
CVE-2024-38896,0,1,7bdbbc20cd07c668e0d394267e9d1f84542ed05a721ee1815b9486444df5b61a,2025-06-06T17:13:15.750000
CVE-2024-38897,0,1,e9be4bceba81b51f2a25a86d2b7d1c6225938f83c91fd88f791fd2bea0e732ee,2025-06-06T17:10:46.100000
CVE-2024-38892,0,0,a20692a4afccd4041f8dc2fe8c93e7fcd33447ec53a49c40f7b3d23824613ad7,2025-06-06T17:16:48.147000
CVE-2024-38894,0,0,c62c7e31976529f1d9044dbf96421f9722d660d8f91e291869d162c1c9093fa3,2025-06-06T17:16:55.567000
CVE-2024-38895,0,0,336501c788694b0bacbb5c1d6e36e24802753d1f0e6949efd54ac8f19087ab23,2025-06-06T17:13:32.390000
CVE-2024-38896,0,0,7bdbbc20cd07c668e0d394267e9d1f84542ed05a721ee1815b9486444df5b61a,2025-06-06T17:13:15.750000
CVE-2024-38897,0,0,e9be4bceba81b51f2a25a86d2b7d1c6225938f83c91fd88f791fd2bea0e732ee,2025-06-06T17:10:46.100000
CVE-2024-3890,0,0,fce70548afac71463049803d99839c76f83c3f99644b737e71452f11bf39c15a,2025-01-07T18:13:29.557000
CVE-2024-38902,0,0,a85f33770f60b7bf9df7e69ccad63c68feb9e8859d1f289821e024bb51b84ae8,2025-05-27T16:21:56.730000
CVE-2024-38903,0,0,bb8eb3b19953647f1fa790b248a4aaef61b725deca797759dfe3998f4fd400e8,2025-05-27T16:21:20.807000
@ -264684,9 +264684,9 @@ CVE-2024-38927,0,0,abfe11434474364e77539bf1ef520124ec57a47fc17409062fe7ded067bd7
CVE-2024-3893,0,0,c2de55ea7ad77ebdebed1014688a507618f8fc49cf6b1d631dbe5d9590d23bf1,2025-04-23T19:35:15.900000
CVE-2024-3894,0,0,b3a2aa3b7941117f799646b94fe80eaf70c3bf0a40df09c6ce1c103c909b6f7c,2024-11-21T09:30:38.890000
CVE-2024-38944,0,0,aea38a4752802a1f34132bcbb575e35233d1954a8780f67f8d4f7cb5965d4f2d,2024-11-21T09:26:59.773000
CVE-2024-38949,0,1,c2dc06410437d6b7466efea86067a9318190842975673bba6b77a4e1a5edd255,2025-06-06T17:15:02.730000
CVE-2024-38949,0,0,c2dc06410437d6b7466efea86067a9318190842975673bba6b77a4e1a5edd255,2025-06-06T17:15:02.730000
CVE-2024-3895,0,0,eec6aef993f3d43c7eb882a2a9d8a867f219e712647ca683547eabd57b58d62f,2025-02-27T16:42:58.907000
CVE-2024-38950,0,1,b05ec5a7eea79ccf66874cc1c1e33b8a664ca20ede6d8633e744c6ba6aa1834a,2025-06-06T17:15:28.550000
CVE-2024-38950,0,0,b05ec5a7eea79ccf66874cc1c1e33b8a664ca20ede6d8633e744c6ba6aa1834a,2025-06-06T17:15:28.550000
CVE-2024-38951,0,0,17e6d72d6ddc33d1e74949cddb49cc4cea8c80a6d51eb19eb8f6f6dcf3bf4102,2024-11-21T09:27:00.490000
CVE-2024-38952,0,0,f38baf84d36c6a8308d09b2d27a0d4f36a3cd4be5595209fae6a993eda0806ec,2024-11-21T09:27:00.710000
CVE-2024-38953,0,0,fd9efa483bb26dd3f6907738be0603b61a425b96c3ed89017c91e47bd1d62539,2025-03-20T21:15:20.563000
@ -273322,7 +273322,7 @@ CVE-2024-50402,0,0,28472c7defbbac1b7ee91e0374b734ad9c07484f87a0834b751e8761f9fd2
CVE-2024-50403,0,0,a4aa183b6f66c4ffb2fd1f183c9279ee43b63cdcaf8bd051b52907975e4618c5,2024-12-06T17:15:09.900000
CVE-2024-50404,0,0,b5b2cf7f4bf1d6f93ea84548591911fd77b0383a18caa9c4b41e9f2a677f47b0,2024-12-06T17:15:10.043000
CVE-2024-50405,0,0,06e3b60885c6440ab76c773e978b8803975ccdad2c31fc890d225b2f4d48208f,2025-03-07T18:15:41.860000
CVE-2024-50406,1,1,5d949256504083c95f77236e1d75ad6767e7a8c329c49774df341d7f1fc59d72,2025-06-06T16:15:23.500000
CVE-2024-50406,0,0,5d949256504083c95f77236e1d75ad6767e7a8c329c49774df341d7f1fc59d72,2025-06-06T16:15:23.500000
CVE-2024-50407,0,0,9866052bb59192baca2967b3bc2111164d6bd7872bf340b1aca3f2c160296628,2024-11-07T20:28:22.860000
CVE-2024-50408,0,0,58a47a84acdf0f836c9f8a5fa3c21e90b2d2f3c587c1b70e5c24f5387d6b7c59,2024-10-29T16:01:08.447000
CVE-2024-50409,0,0,d098af286ab64a0110f5be7e77620539ec040083e43f27de87ded5e888586c5d,2024-11-07T20:28:43.577000
@ -274022,7 +274022,7 @@ CVE-2024-51546,0,0,2b7d2ed1b3c1d35cd65cf3d2239a5b0dfa667195eca1e04d6c8565ee65a61
CVE-2024-51547,0,0,18d16c84e6b2591d6430e9b2ae1fb20f3a2a8a898f27919e7f6a3ea8e0cefa4a,2025-05-23T10:15:20.647000
CVE-2024-51548,0,0,7d9709d0855401dfb9c745c0d11b58433dc7c72e7b3dac228ea835c7008ec03e,2025-02-27T17:23:44.833000
CVE-2024-51549,0,0,7a913dd216baa7e7597ae6670d152495655b15a26cf3e96b08ca7c1c40542aab,2025-02-27T17:26:15.490000
CVE-2024-5155,0,1,312cbcc7741760656a4b562fae5050285584be252dc31dbfe5037605e4b8cdb6,2025-06-06T16:18:02.717000
CVE-2024-5155,0,0,312cbcc7741760656a4b562fae5050285584be252dc31dbfe5037605e4b8cdb6,2025-06-06T16:18:02.717000
CVE-2024-51550,0,0,eab4f36e25fd77797f2adaaf892a3fe69a0f660642c8824bd8c29fe2dbbeb55c,2025-02-27T17:27:37.560000
CVE-2024-51551,0,0,0f85b1616cbec771da8e420593f4961efb3c181b331a523fcec17a7d2e26ce47,2025-02-27T17:32:14.497000
CVE-2024-51552,0,0,3688f9d65f1f96cbb3456ec0abfe23aca323bfcabb66858577920825e3552dd7,2025-05-23T15:54:42.643000
@ -277653,7 +277653,7 @@ CVE-2024-56800,0,0,1070967245f97018d7931f1b8b9aae6488fa864b099e181ef436fe219b367
CVE-2024-56801,0,0,6cef8dddf864e165aa4a99ecadbdf0b87f7bd86d5c6e0ade6e7a30e3abe18a7a,2025-02-07T15:24:01.100000
CVE-2024-56802,0,0,ca8c864df520606afd51db2524a82ddab30d22123f6eef6cec3ac696eba93af5,2024-12-31T16:15:28.240000
CVE-2024-56803,0,0,1584d41fd9d3e6beb3be7c57bb8ba96341667bc6ec41b946b6138146b4297f8b,2024-12-31T23:15:41.553000
CVE-2024-56805,1,1,c3c4099e049365293de69b0d2010b61b03c0ed630a246eda3b08848a3c903feb,2025-06-06T16:15:23.660000
CVE-2024-56805,0,0,c3c4099e049365293de69b0d2010b61b03c0ed630a246eda3b08848a3c903feb,2025-06-06T16:15:23.660000
CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000
CVE-2024-56810,0,0,194a35bc92d3f9958aea6b769fb050479e40c23a506bee57531c36053803ff2a,2025-02-27T15:15:39.930000
CVE-2024-56811,0,0,a175c74dc672ed974260adb2523ba1d1cc36b446afb4b300e1f0c115c8f66a38,2025-02-27T15:15:40.067000
@ -277760,9 +277760,9 @@ CVE-2024-57040,0,0,33933917891b5c81929460ab67ed0d7164ee900a0e5137644747b9fb793e4
CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39
CVE-2024-57045,0,0,fb5ea4e4f7a4b9889a1febeaf0802625e04c77b289c8befbcdbc515a09b01b01,2025-05-21T13:08:12.557000
CVE-2024-57046,0,0,ed4764a2183714deed727de4acb95079ff6351d4a17070f6f3c7fbd3a859097c,2025-02-19T22:15:23.207000
CVE-2024-57049,0,1,2a0005173d8041814a4147620684c257c9ca3c68d2751da229477245e15e8a12,2025-06-06T17:59:07.280000
CVE-2024-57049,0,0,2a0005173d8041814a4147620684c257c9ca3c68d2751da229477245e15e8a12,2025-06-06T17:59:07.280000
CVE-2024-5705,0,0,f3b79a5d6cb194f0bd96745c53b497323f2e376cb2b6ea3a0bd2883a13683047,2025-02-19T23:15:10.823000
CVE-2024-57050,0,1,a8a23107a1e42d1b6ac3205cc9b597da829b10740486a542824fbd3889bb45fd,2025-06-06T17:59:21.903000
CVE-2024-57050,0,0,a8a23107a1e42d1b6ac3205cc9b597da829b10740486a542824fbd3889bb45fd,2025-06-06T17:59:21.903000
CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000
CVE-2024-57055,0,0,10985f4d1644c583934097b7ec50c1a0dc3d6cc9f218e4bbfca50a2ea6ce6767,2025-02-19T21:15:15.227000
CVE-2024-57056,0,0,5fa1c6daac1c565c60219576528f65f5f288f5ab9fda6e5efedccb351b0ddf0d,2025-02-18T22:15:14.653000
@ -277994,8 +277994,8 @@ CVE-2024-57599,0,0,08a6b92156dbb47043a13e2f6a8f470b6ff2d84a2cc52c57a2605bc11a655
CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000
CVE-2024-57601,0,0,d978ee2acd4111ee755bc6d199e0b7a5b30d82c722a815c1a28b244c807873ce,2025-03-22T15:15:37.747000
CVE-2024-57602,0,0,226d91ed331e63f738fd3b8b845736eb5a7fc570a3a123d5ea996b5176962aac,2025-03-18T16:15:25.597000
CVE-2024-57603,0,1,8a9645debea5f521afc44c4af7ccadfc073cca6b3e81dc82e702421273405f96,2025-06-06T17:53:07.037000
CVE-2024-57604,0,1,9e7671c8762e3f19760ed992a9c62647cd7a36bacd45d15f952664f88ca86047,2025-06-06T17:57:47.273000
CVE-2024-57603,0,0,8a9645debea5f521afc44c4af7ccadfc073cca6b3e81dc82e702421273405f96,2025-06-06T17:53:07.037000
CVE-2024-57604,0,0,9e7671c8762e3f19760ed992a9c62647cd7a36bacd45d15f952664f88ca86047,2025-06-06T17:57:47.273000
CVE-2024-57605,0,0,c41e31bc0c6b4266a22e57b7929d37215234774341d010b325202d9b2f8dc9f2,2025-03-19T15:15:52.740000
CVE-2024-57606,0,0,88fff29b8b35a01ed272a18dce87c845eb952014b7761d37d399b66c213e66c6,2025-03-22T14:15:16.170000
CVE-2024-57608,0,0,f13d7092b69ab1bb8b9d9e29e8d71dd51ba622da797972897165fa9f6e4af609,2025-02-25T21:15:17.440000
@ -278095,7 +278095,7 @@ CVE-2024-57723,0,0,2857c6a7267b9fbf709b31556ea3afe564d1a9d64d356af9ef40f193a9899
CVE-2024-57724,0,0,2babbe669aa2ce36155d43831c1be93b71c465ce0ba8f60650d569e3901a0689,2025-04-15T17:09:32.053000
CVE-2024-57725,0,0,37c96803862b631e561de51a48e8624822d17dc31067e76ef4d04e27dbd1c96e,2025-02-18T15:15:17.067000
CVE-2024-57726,0,0,b06228a1f549336c575c9af51a5eec97f13915f9b87b92d879c22e35b9610a8c,2025-01-31T21:15:11.857000
CVE-2024-57727,0,0,40a8243c73e2ffb483061a8498545f248d48c8fe22413e0fd73f6459bc3cda9b,2025-03-14T20:01:25.483000
CVE-2024-57727,0,1,1a72302c48430c5cef509e2207fa76e384db74fbb47bfcd46f39442705e5813c,2025-06-06T18:15:34.957000
CVE-2024-57728,0,0,300d732277cb2b6af20193b0ebd36f609253f83cb041dd620ac6c99126042718,2025-01-31T21:15:12.330000
CVE-2024-5773,0,0,48a7b89c22eea357c17d55a9c448884ba410356aa0d0f8db39ef44b51213a084,2025-01-29T17:38:34.290000
CVE-2024-5774,0,0,486fd90e135c6757b4aafe207d8db6c3d7877d00116c11e1cc252707663db7ad,2024-11-21T09:48:19.287000
@ -278841,7 +278841,7 @@ CVE-2024-6231,0,0,dfc7c4e49166819861180a0da734d525f69cd21d8e997b2dea10bc7f0fbe16
CVE-2024-6232,0,0,3c57f72839de7a6ce60aa8101fbe572f19dcd9de326f2f4d9acedbe78b53dea6,2025-03-20T18:15:18.197000
CVE-2024-6233,0,0,4bbca18d3f336296f26771ea45741081bf89a79a8a0061f18ec10c1c6fe49357,2024-11-22T20:15:11.437000
CVE-2024-6235,0,0,addba757604926755fff636abbd91835a1dc2053a79b8de1012976e7ed5e5f32,2025-05-14T15:16:05.077000
CVE-2024-6236,0,0,17dbb30c163d97e105e41953d78892b4df1370e2d128ace3876adfaaa79aa5e2,2024-11-21T09:49:15.173000
CVE-2024-6236,0,1,84733fc9da1a398e382ca6edaa4237a5e04370dc42762987f1e22f7d13cf7137,2025-06-06T18:56:43.393000
CVE-2024-6237,0,0,a14607871063db3c3f01995985b5b45b18dd68a5122270f9c1651369f50a267f,2024-11-21T09:49:15.300000
CVE-2024-6238,0,0,2bad0e3b748e19d0ccf220a01ba2c819474d4f59fa4eaf1d9bd3cb971f6eda4b,2024-11-21T09:49:15.450000
CVE-2024-6239,0,0,fedb9c2b04e1868bbb3fff69404d082eaba26e41ad42c2361f2508e11cbb3e2a,2024-11-21T09:49:15.570000
@ -278995,7 +278995,7 @@ CVE-2024-6386,0,0,43149b950114ada6c3d4e90aacbe6afb74f4514cd9a056703ffcdf09e7e5f8
CVE-2024-6387,0,0,6240b1c210b0a863c90f8498ec69ea6546130804a79d4c5f6e7a20723fb009ba,2025-04-24T19:15:46.257000
CVE-2024-6388,0,0,8ab7c0afc73e8c28d936009de43463daaaf6c3042744c1e4b0610db8f0664630,2024-11-21T09:49:33.430000
CVE-2024-6389,0,0,a40c90713a887f7f448cc701bdb107fa8ebfad06c51056b2044132a6a26d93fa,2024-11-21T09:49:33.553000
CVE-2024-6390,0,1,e77181fa254c64b82a508ff014b9e824ea740dd6223e203717fb624301944f5d,2025-06-06T16:10:55.940000
CVE-2024-6390,0,0,e77181fa254c64b82a508ff014b9e824ea740dd6223e203717fb624301944f5d,2025-06-06T16:10:55.940000
CVE-2024-6391,0,0,170666d5ac46c441c3231a73dd8199dff199e8d781e611d9f163aebb1ceb1ce3,2024-11-21T09:49:33.850000
CVE-2024-6392,0,0,36e4666a41f8ae603d4a4e9d6e2055423bfd3ce9426341de5b4cc157e8a42494,2024-11-21T09:49:33.967000
CVE-2024-6393,0,0,0ecfa1307884486a8815a0ce15547118b579ed9ce4c752d8d316c1d999d6922c,2025-05-15T15:36:18.983000
@ -279074,7 +279074,7 @@ CVE-2024-6471,0,0,44599ea735cf4c0f59a4c46eec9f2dcd408bc3c08f93c8063ba5adf763f68b
CVE-2024-6472,0,0,e26f0ed33b9352737fba2c7a5901be2204823366dc7f964b880fceddc7f136d1,2024-08-06T16:31:05.780000
CVE-2024-6473,0,0,1dafd6b50b11af3a55a60927aceae7fdee5db46502c399f03ce389e747a46480,2024-09-05T14:19:45.153000
CVE-2024-6476,0,0,a0cbdf8db7abbf40af298419f002b432eaa0907f370a1f5866689f4a683a61f6,2024-11-26T07:15:05.697000
CVE-2024-6477,0,1,f8f6847d32a610415a7c2ca805a1a46e2c4ada6ffccb0f2d3fc8c2c8f1cf2f4b,2025-06-06T16:12:25.440000
CVE-2024-6477,0,0,f8f6847d32a610415a7c2ca805a1a46e2c4ada6ffccb0f2d3fc8c2c8f1cf2f4b,2025-06-06T16:12:25.440000
CVE-2024-6478,0,0,d355f87d3d08b7198675f904b84d8494a8a121b6cd2dde7851c549ddd2d28d25,2025-05-20T20:15:37.603000
CVE-2024-6479,0,0,e61c30f16f0abfc9f93099b9bc147874bff7bedf1b6bcc46dd42e617eef67181,2024-11-01T12:57:03.417000
CVE-2024-6480,0,0,4266a2448f7419be28cb4214e61c8f9e0c911904bbcd8a264d7b98190c25fc16,2024-11-01T12:57:03.417000
@ -284098,7 +284098,7 @@ CVE-2025-20184,0,0,9eb256a52263cf40f2a0e3559972cb02a910d9338675658a6b6e99c16dd38
CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000
CVE-2025-20186,0,0,988f7f1d2645d1b97028fb13ba80ac27036d7d2054583bffc040f1b4de466626,2025-05-08T14:39:09.683000
CVE-2025-20187,0,0,49cb1bb2460f1bf94d25f953e4816fb4704910b25f07a14f891f757e44af242f,2025-05-08T14:39:09.683000
CVE-2025-20188,0,1,c76f1c516e8e4901deea9b39dafb36c1df8db0fd49768c43dfb84a9676fff7af,2025-06-06T17:15:30.170000
CVE-2025-20188,0,0,c76f1c516e8e4901deea9b39dafb36c1df8db0fd49768c43dfb84a9676fff7af,2025-06-06T17:15:30.170000
CVE-2025-20189,0,0,80748ec81ef3d0bfea0a8fd1c737694e12cc44ced3d0cbf30c347d4a66ab6799,2025-05-08T14:39:09.683000
CVE-2025-2019,0,0,ce7a9cbc0a7eb98392e8b644905555ade42dac13612963c992df55a4ab3df595,2025-03-11T21:15:53.337000
CVE-2025-20190,0,0,469a86e281a91f6666aba5167ba034aae7aaa490b577c894f7d420858aa81096,2025-05-08T14:39:09.683000
@ -285711,12 +285711,12 @@ CVE-2025-22478,0,0,581a5f745c8e6e0231f6143e773a9eb6d230b0d53e7237fccf8d3d76cc422
CVE-2025-22479,0,0,1020ed0786a0c53974ebfcb601d1f02d18778bef0e765c0c2884bd0e7b0f68ff,2025-05-13T20:18:11.457000
CVE-2025-2248,0,0,c777d68e94acb7df7f51d66a6234f2e224456943a6065bd7a816052673458dc6,2025-06-04T20:03:58.247000
CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000
CVE-2025-22481,1,1,d74c9adfee1121da6a1e6f2d58cb11ada31a80bc7c544b0607c7fafc3d69ef0d,2025-06-06T16:15:23.877000
CVE-2025-22482,1,1,a8e89db2e4260d7d21d7b67ed88b68525e45b5132a6520096bc2e01c9a58de16,2025-06-06T16:15:24.023000
CVE-2025-22484,1,1,08224f26f52f4e16503913d7a9e727f145339af9b37a01b5624bd3cf87632d95,2025-06-06T16:15:24.187000
CVE-2025-22486,1,1,0bf5f5a60a5cb32b416a663fa2e5e8c25d3442a416e7fa7e70186e2b43cf84a4,2025-06-06T16:15:24.330000
CVE-2025-22481,0,0,d74c9adfee1121da6a1e6f2d58cb11ada31a80bc7c544b0607c7fafc3d69ef0d,2025-06-06T16:15:23.877000
CVE-2025-22482,0,0,a8e89db2e4260d7d21d7b67ed88b68525e45b5132a6520096bc2e01c9a58de16,2025-06-06T16:15:24.023000
CVE-2025-22484,0,0,08224f26f52f4e16503913d7a9e727f145339af9b37a01b5624bd3cf87632d95,2025-06-06T16:15:24.187000
CVE-2025-22486,0,0,0bf5f5a60a5cb32b416a663fa2e5e8c25d3442a416e7fa7e70186e2b43cf84a4,2025-06-06T16:15:24.330000
CVE-2025-2249,0,0,b8b4319df0eeaddaa08416535fc97107b599907518d1e8273137ec9437aa4b47,2025-04-01T20:26:30.593000
CVE-2025-22490,1,1,7e5f2ff5a52a80d60adb4bf67b53061f31607fc04f0aef85cd22febbcd4a8465,2025-06-06T16:15:24.487000
CVE-2025-22490,0,0,7e5f2ff5a52a80d60adb4bf67b53061f31607fc04f0aef85cd22febbcd4a8465,2025-06-06T16:15:24.487000
CVE-2025-22491,0,0,ad85f2f60683d1b1d15d527fe2b105a5594d84c0da0f697daa4684f44b948c2e,2025-02-28T09:15:12.540000
CVE-2025-22492,0,0,6675658809687c830ee351f78ca107f7df64e972ba8ef72f245dee116e840551,2025-02-28T09:15:12.680000
CVE-2025-22493,0,0,d929c5d6113570551417420f2e90fa0b9e868f3eee937ae9b18c8bf109c1b5b2,2025-03-05T09:15:10.443000
@ -286247,18 +286247,18 @@ CVE-2025-23093,0,0,7320826aecf4e98ab5895586ea1e6e8575244a0f095c3e1b8e12bb0d362e3
CVE-2025-23094,0,0,7cea7e6e51afc006925b4e48de2308fe64516f9177080ff30f9a60f654ae9082,2025-02-11T22:15:30.597000
CVE-2025-23095,0,0,af9f11f87a7c2b544be8c7031fb66369a2bd65f1e55cd07a7f0844e5f4a78e06,2025-06-05T20:12:23.777000
CVE-2025-23096,0,0,938070ad0e686392e5ffe83ad3d5737b6fc864428d62110758b90471f896dc94,2025-06-05T20:12:23.777000
CVE-2025-23097,0,0,ae11ec200a512e0157961b9111e0fddc588e6ce80ea01dec36109dca23db7bb6,2025-06-04T19:15:24.113000
CVE-2025-23098,0,0,7a3d82787fd0dbd2f597db75a7f5627aba3635770e845622738fb5ecf46ba462,2025-06-04T19:15:24.687000
CVE-2025-23097,0,1,4774d32d16478d23000e84838eba89ca903790355c35f9f93f408220eab71d8b,2025-06-06T18:45:47.190000
CVE-2025-23098,0,1,38caacad0ce8434e1a4a06bf6456842d8a6ac9b59543ad3010a9645c867ef495,2025-06-06T18:44:58.380000
CVE-2025-23099,0,0,76197de6f7075c8d8a9f0fc39558cb7eedbeb1e6ce55a9cdbe78882e1931cafa,2025-06-04T14:54:33.783000
CVE-2025-2310,0,0,1254bedeef285364d4ce4cc304a3b27319f0e76b0b0498fd69d05aba0b6f3806,2025-05-28T18:12:42.130000
CVE-2025-23100,0,0,6f153ee72c1bebba4cbbfbfd325af0460cdc055bf1d1806fffea41949fb6c2c4,2025-06-04T19:15:24.867000
CVE-2025-23100,0,1,46b37fe2c3228425bf3c04fe972bc0cdefe57e7dc18dacde4550fc6f81a56a37,2025-06-06T18:45:16.443000
CVE-2025-23101,0,0,cc19cf5c7434529aeced05e986d69324969dba24b6a740d7f092ac779d3d70fd,2025-06-05T20:12:23.777000
CVE-2025-23102,0,0,6bec7573bbe7240a0cc6c4ad146f66173c15f86fae3427c8aa28807d6147b430,2025-06-04T14:54:33.783000
CVE-2025-23103,0,0,c8c91a4a577fefcea451a589fa7a19f5057b093193fb8a60af72a8861235b66e,2025-06-04T14:54:33.783000
CVE-2025-23102,0,1,14a807753e58dc9842375a0338c965d34317a66a2ddaaed297172fe1c936f158,2025-06-06T18:49:02.287000
CVE-2025-23103,0,1,af7de4223ee48e5d5418763433d6687e1e0444809ae878b4ad8a4335b22ba78e,2025-06-06T18:49:19.250000
CVE-2025-23104,0,0,6e3255de9b3e3eabf4e0883aa996b5d13398a20f89aed465be62f21cd861d0db,2025-06-04T14:54:53.980000
CVE-2025-23105,0,0,0cfe1826e7f6e2704ce0e8c0045a2d064cd7652071b287e953f8c489e8a22a74,2025-06-04T14:54:33.783000
CVE-2025-23106,0,0,7446272ace00eeeb413814cbfbb0a042b98e698b2d2698216672556a0d555e90,2025-06-05T20:12:23.777000
CVE-2025-23107,0,0,b5923ffad40828aa0847fa30f2f0def8d61f468e0a49580d483e213869e12b9e,2025-06-04T14:54:33.783000
CVE-2025-23107,0,1,473e9f3950324060da83c2e03546f7606cb24c446ae5eb77e417a460d4770978,2025-06-06T18:49:12.190000
CVE-2025-23108,0,0,43dfea536f21c7dddc3256c2f1e274765fe5955541d1af65c01a12871277b7ff,2025-04-03T18:58:00.940000
CVE-2025-23109,0,0,dab09ed4e1fbec86e8afd75398d8d3c5a65ca2a268fa35cb5d3a1b5459dc4d18,2025-04-03T18:52:57.410000
CVE-2025-2311,0,0,0549a26ae70964117a933b4c0694a85dc38e847ae92918cf4a69583f79013968,2025-03-21T07:15:36.820000
@ -288492,8 +288492,8 @@ CVE-2025-26137,0,0,004205e5376adff96c010e010531e03852f5eb4905a1a3c73ed331cf2f44f
CVE-2025-26138,0,0,4c83b447574a31d9857c309d7f5649f5104ee78c2e6617a4327eaace6a44e40b,2025-04-01T20:37:28.490000
CVE-2025-26153,0,0,fbd54e08d3ed017020223f9a7b6b482516a3990fb93f496abb0ee8889236b21e,2025-04-18T12:15:15.033000
CVE-2025-26156,0,0,962eae3fa0ac2ee7ef9345ac9060a4193d262807409fdde8171c1e14753b4430,2025-04-02T18:49:33.170000
CVE-2025-26157,0,1,38de05e421d679d343d79e185476ab67eea088104866559f392814d0f7cd1051,2025-06-06T17:58:10.687000
CVE-2025-26158,0,1,9a9ccb779ce1e088ebdbc11b5b68d322452a852d85321db4285fa5c556e48796,2025-06-06T17:58:29.797000
CVE-2025-26157,0,0,38de05e421d679d343d79e185476ab67eea088104866559f392814d0f7cd1051,2025-06-06T17:58:10.687000
CVE-2025-26158,0,0,9a9ccb779ce1e088ebdbc11b5b68d322452a852d85321db4285fa5c556e48796,2025-06-06T17:58:29.797000
CVE-2025-26159,0,0,5cb7b2e3d55f2fd4f39ad0eb0db7448231df9f032e32668063e620270ed021a5,2025-04-23T14:08:13.383000
CVE-2025-2616,0,0,2f2b88794fbbb9efdd58fa5d5c325450c0adad88bc639add77ab6b1ee88ac735,2025-03-22T10:15:16.533000
CVE-2025-26163,0,0,4ffd8c87a5a86411342dba92069be8d16487d70a2e7d1aa79a834090be3e95d6,2025-04-03T16:18:02.457000
@ -288883,7 +288883,7 @@ CVE-2025-2677,0,0,52b47ab6f3d262b4155c1661620656e26b2dd05dba4f612127b0a1d50d697e
CVE-2025-26770,0,0,58e7c71e0ac873fd5253876cd79624d523c33d6d728641b89a44e8229c67714d,2025-02-17T12:15:28.687000
CVE-2025-26771,0,0,1cc6eb2ca32ed2c917944619e728f51549d1501ef8f0d116201d8e22b61cbf6f,2025-05-21T17:44:25.067000
CVE-2025-26772,0,0,e0253b405d26c0acf4ac037cd41c093db348a26c0d4952d5f6ab78a89abbb9d5,2025-03-20T12:20:45.623000
CVE-2025-26773,0,1,fa0000b8b1a5b47d442ad80cdc1c55dfe6f6ac9df74f5a7efa51f1ff36f8d37e,2025-06-06T17:58:49.050000
CVE-2025-26773,0,0,fa0000b8b1a5b47d442ad80cdc1c55dfe6f6ac9df74f5a7efa51f1ff36f8d37e,2025-06-06T17:58:49.050000
CVE-2025-26774,0,0,526dfe51d520753de4e60d175888e5d8ca8738aa723fd20bff017fe643f4fb4b,2025-02-22T16:15:32.060000
CVE-2025-26775,0,0,52cdf659c6c58d7b65216ee908b2b8b467178ee216ba1f7aae1e466a75c0462c,2025-03-19T20:39:46.850000
CVE-2025-26776,0,0,777b3d6f00f90c4800bb30405923ef1b3111a8007fa8cde8f118fda7de44f9fa,2025-02-22T16:15:32.203000
@ -289556,6 +289556,7 @@ CVE-2025-27656,0,0,dc5fc2c3c8a07c3a3cfe1ee867d42fde63655b6c9bddf068a07c7bc74ae1a
CVE-2025-27657,0,0,3eddb2d82080e689fb7a38a26491cf85af6f11c0b6c2f8b880fc98ccf7cbb284,2025-04-15T22:15:23.297000
CVE-2025-27658,0,0,0a24404418538ac121d7c4c4d8f44e3f618fd8f7b009a95b9a16f5a27c30cc30,2025-04-01T20:52:35.280000
CVE-2025-27659,0,0,6989eae856811847c2a58c863f54f44cb2dcbec3e10efcd978081087ac6c7169,2025-04-01T20:52:40.093000
CVE-2025-2766,1,1,9b1f5f2e9dfc091985c96c027ccf7610a1d9f346d8550706c8f521f5867b908d,2025-06-06T19:15:26.930000
CVE-2025-27660,0,0,3a0899dbc46812a2590e82860ab081b5510035133bae348d96e775c97781ae71,2025-04-01T20:52:30.800000
CVE-2025-27661,0,0,869daaf4557f5365a322d5447c96a298787adea4b5ab9a153eff276733cb0538,2025-04-01T20:52:26.040000
CVE-2025-27662,0,0,51f9a933b126beaf1b2bbf92aaf57c2055219e6474859e87b287385577c6458b,2025-04-01T20:49:44.823000
@ -290371,17 +290372,17 @@ CVE-2025-2986,0,0,d4de6065b989c9ce03bdc42146227d2a6037461d4d3c99124dadaa602d2c97
CVE-2025-29868,0,0,3cdd5d5bc9e5c1cb38e652f74faead4f53d8e8683a37455baaae14fba635a1fa,2025-04-15T13:07:54.393000
CVE-2025-2987,0,0,c5ae0e320f83eaa0b28afb3c153f6c745fec2a59a31f1b5ca52889e16590e49b,2025-04-23T14:08:13.383000
CVE-2025-29870,0,0,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000
CVE-2025-29871,1,1,267c054edce34824e666ecdd086324cba2d0ad91df2d78d897370c789b93d154,2025-06-06T16:15:24.637000
CVE-2025-29872,1,1,b47a1b5c44b1cec4607f515d79dc9aae42c499abba4c8945d5c4afffcf1c14f7,2025-06-06T16:15:24.803000
CVE-2025-29873,1,1,5e72666f14aa6741fe6a4524e435490585627074d96ed7ba355cc9614d5635f9,2025-06-06T16:15:24.950000
CVE-2025-29876,1,1,fe2c3191bf79fe8d06d6ad0018d1ce7d1ad17b7d81d15bac7cff381347084d4a,2025-06-06T16:15:25.090000
CVE-2025-29877,1,1,f1f08b6cdc4ff5e4b56a31314ab6767a457d0032600ee9abbceb5ad1c6f484a2,2025-06-06T16:15:25.230000
CVE-2025-29883,1,1,fafeb9b425444214e843df19142453900d78b3f422b3d198a360aa8d90917ef1,2025-06-06T16:15:25.370000
CVE-2025-29884,1,1,23acd2be25dd92a8b18ffd732ff540f9d80942927e75a70459be534506abb4ef,2025-06-06T16:15:25.510000
CVE-2025-29885,1,1,b9e6e9a126b1dcbba775375b61769f16c62852b42581d74bb3cd311c75e4ac0e,2025-06-06T16:15:25.643000
CVE-2025-29871,0,0,267c054edce34824e666ecdd086324cba2d0ad91df2d78d897370c789b93d154,2025-06-06T16:15:24.637000
CVE-2025-29872,0,0,b47a1b5c44b1cec4607f515d79dc9aae42c499abba4c8945d5c4afffcf1c14f7,2025-06-06T16:15:24.803000
CVE-2025-29873,0,0,5e72666f14aa6741fe6a4524e435490585627074d96ed7ba355cc9614d5635f9,2025-06-06T16:15:24.950000
CVE-2025-29876,0,0,fe2c3191bf79fe8d06d6ad0018d1ce7d1ad17b7d81d15bac7cff381347084d4a,2025-06-06T16:15:25.090000
CVE-2025-29877,0,0,f1f08b6cdc4ff5e4b56a31314ab6767a457d0032600ee9abbceb5ad1c6f484a2,2025-06-06T16:15:25.230000
CVE-2025-29883,0,0,fafeb9b425444214e843df19142453900d78b3f422b3d198a360aa8d90917ef1,2025-06-06T16:15:25.370000
CVE-2025-29884,0,0,23acd2be25dd92a8b18ffd732ff540f9d80942927e75a70459be534506abb4ef,2025-06-06T16:15:25.510000
CVE-2025-29885,0,0,b9e6e9a126b1dcbba775375b61769f16c62852b42581d74bb3cd311c75e4ac0e,2025-06-06T16:15:25.643000
CVE-2025-2989,0,0,0766747cb0e01c92c737981bb238f9adb3ab95fb53aa49cc63ece17dfe385650,2025-04-07T14:15:04.880000
CVE-2025-29891,0,0,752eb7db0cd8cf51c6f0df1d0540c6e0a94cdab3ef9ff768e6ace10510ce6968,2025-04-02T20:37:07.073000
CVE-2025-29892,1,1,301ea0ffaebd07f242ba7f2696555bf21271f625f4d5c9ef3270e06efab1508f,2025-06-06T16:15:25.783000
CVE-2025-29892,0,0,301ea0ffaebd07f242ba7f2696555bf21271f625f4d5c9ef3270e06efab1508f,2025-06-06T16:15:25.783000
CVE-2025-2990,0,0,71ab3f8fbfc23333e9355c75b23bef4a236943bf94587f620db3828791ab7825,2025-04-07T14:14:41.947000
CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000
CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000
@ -290618,7 +290619,7 @@ CVE-2025-30258,0,0,cc431d0d4fe6a8b6881434ff2ad3ef316269606a3845b529c54a958324c9a
CVE-2025-30259,0,0,e7ad748a07d97a3ed7d8fd479d0bd66cf98f38cbfee97910d52cd90aa0d3bed9,2025-03-20T00:15:13.780000
CVE-2025-3026,0,0,e1d5f90de5cffdef16fb6ac0720c6a50512e756b166ba5e7f995a1b9b9409a90,2025-04-01T20:26:30.593000
CVE-2025-3027,0,0,f3696c958664e9365e1d42a21589288938608fca603179f411c899cdda3285f7,2025-04-01T20:26:30.593000
CVE-2025-30279,1,1,0f1d8e34427e7e9b9347e6dd97295917263a9ff02ac454bcd4463da00b618f78,2025-06-06T16:15:26.030000
CVE-2025-30279,0,0,0f1d8e34427e7e9b9347e6dd97295917263a9ff02ac454bcd4463da00b618f78,2025-06-06T16:15:26.030000
CVE-2025-3028,0,0,b4904bcbef402a86d26a68f36c89c0f13bdfe9f0b82a73bc5473d3a54339d650,2025-04-07T13:31:38.947000
CVE-2025-30280,0,0,30288d638eb0e9dbcf0aa5896bd69db9acfcecdbc6d868f34c8a52e27afc1001,2025-04-14T08:15:13.823000
CVE-2025-30281,0,0,1559be2cc3af28eafdfdda2201e058111279b1728b928b15c90560429d8cd6de,2025-05-28T17:06:16.963000
@ -291419,8 +291420,8 @@ CVE-2025-31197,0,0,3398c0e8feb5507293c959674dbfa0a4b75f3b8ba43cb526b7c5a4336b7dd
CVE-2025-31198,0,0,c25fe22374cd402a6a70ef6d6ee86de60f25c282d03849893df8e7817d21ca2f,2025-06-02T16:00:30.577000
CVE-2025-31199,0,0,2423eacc33f142b965fb47cc5ca2e34376b9469e02c2768289c9d601c82282c4,2025-06-02T16:00:21.060000
CVE-2025-3120,0,0,5145ab91a3b905f41026add1f6ff9bff84c48f68b4513bce38bedbeffe905195,2025-05-07T15:45:50.257000
CVE-2025-31200,0,1,d953dd1d59e98acc760e65903612e9f5f98c82ea59c0d2a876594783fdb2ecf9,2025-06-06T16:15:27.827000
CVE-2025-31201,0,1,4854058fa0957ba98f267d21b7764dab34ce279bedbfaf07f60749960497a52a,2025-06-06T16:15:28.020000
CVE-2025-31200,0,0,d953dd1d59e98acc760e65903612e9f5f98c82ea59c0d2a876594783fdb2ecf9,2025-06-06T16:15:27.827000
CVE-2025-31201,0,0,4854058fa0957ba98f267d21b7764dab34ce279bedbfaf07f60749960497a52a,2025-06-06T16:15:28.020000
CVE-2025-31202,0,0,3ecd0d77add2d84f0d79835e95e49a94c9e589accdbb5863c6bd37f956215a89,2025-05-05T20:07:59.807000
CVE-2025-31203,0,0,b4dd46f64e252e7dee2b6e4e785b34065a46e842fe99f0583719bea8200b72fd,2025-05-05T20:08:22.600000
CVE-2025-31204,0,0,8e915dbb1f5bac8a4d4715736c6831a5387646e3d2b9a8a2e94b0cfaf1b78c6d,2025-05-27T13:57:27.943000
@ -292898,8 +292899,8 @@ CVE-2025-33026,0,0,16823ea87e15ed5dd06862f606f290dd47fd68e96dd8b001f96144de8d0be
CVE-2025-33027,0,0,315132d50b588b2e2dcb36832e008e48471336783b88752c2b030500f9b618d4,2025-04-25T16:54:53.077000
CVE-2025-33028,0,0,d10b7c0dfad3fcdf6e98b228bc3a645088136373e6ebf203ac0322a6c2690e9d,2025-05-06T01:15:50.660000
CVE-2025-3303,0,0,a88559a89b09c7db23c32ee2c85028152291b57ba44bc3a0730626f1d4cddeda,2025-04-08T15:02:36.210000
CVE-2025-33031,1,1,2d969a774af5ceaf66dd278f74553fa7ce9d1ba27a89b3a16d68fba80ac09e53,2025-06-06T16:15:28.203000
CVE-2025-33035,1,1,db3cb0da6488f5b3a0815770af4b96e6b94c6f22fc359a699e9183c8dbff6539,2025-06-06T16:15:28.353000
CVE-2025-33031,0,0,2d969a774af5ceaf66dd278f74553fa7ce9d1ba27a89b3a16d68fba80ac09e53,2025-06-06T16:15:28.203000
CVE-2025-33035,0,0,db3cb0da6488f5b3a0815770af4b96e6b94c6f22fc359a699e9183c8dbff6539,2025-06-06T16:15:28.353000
CVE-2025-3304,0,0,cd001e23659b91ac09e62e7f84c563c50c19190543e934899e672b5c50fb7073,2025-05-28T21:10:23.573000
CVE-2025-33043,0,0,ef36d411d5cc19c9905c2483de7e4477e0680a0d20b28599d7397884fc4af7de,2025-05-29T14:29:50.247000
CVE-2025-3305,0,0,caed50d99616da9f2a70f5ff8ff690cbc48b6002cca415c3290f8e367603d490,2025-04-08T16:46:55.203000
@ -293069,6 +293070,7 @@ CVE-2025-3481,0,0,fc292950178293c5d7012f2f451427b1d8e213e39ec7c38473276a4ba3b782
CVE-2025-3482,0,0,725e6811f786fa1a2964e3139476056bc5110112a084055b3ffcf507726db606,2025-05-23T15:55:02.040000
CVE-2025-3483,0,0,67eec717b32d9cb5e3ef7b345bcc95d2e7c639bc1fc7069d55c953a17c519d44,2025-05-23T15:55:02.040000
CVE-2025-3484,0,0,9b379aadd7d20c9c57369b6e7e822e1a6ac4b4258b87caf2b9dec82eec0f1f80,2025-05-23T15:55:02.040000
CVE-2025-3485,1,1,1fca2d8d0a5ebe67549a5a24586ff9275e3df7d8dbde2a3dbcb10d69869ed26c,2025-06-06T19:15:27.140000
CVE-2025-3486,0,0,7a44a599ea4a475c12a9f935494be9cbd4167bf7d281b57a4d4512713e92309b,2025-05-23T15:55:02.040000
CVE-2025-3487,0,0,199b8611c8e5457bd92c751e347923a2fd3e3ae8117e5e7759eec299c03e5969,2025-05-28T17:53:05.963000
CVE-2025-3488,0,0,c7eefb60f78d0958cd2e23946d634228ed1d24a7964a368a35db998af9592006,2025-05-06T13:42:26.630000
@ -295827,6 +295829,7 @@ CVE-2025-47947,0,0,937e21e816ace6c7b2eea9b27977c70a0355dffa802eeb709a1580aec3fe9
CVE-2025-47948,0,0,ba2e8c1cb0258308d0310ef150246d3504511a8f7fe9ed640ab9013bfefadd52,2025-05-19T15:15:25.400000
CVE-2025-47949,0,0,dc86078901df64be63bcaee4a73ca319eec3de89fa5549a71818463921d49b3a,2025-05-21T20:25:16.407000
CVE-2025-4795,0,0,3fd0e28eaafb548c1d9f9e6a41da631ae960e10221f6f4901b1a5e253e1ad775,2025-05-19T13:35:20.460000
CVE-2025-47950,1,1,207559f497f03ff90d65bceef52d232aa5033ea1c293c9c2faf72621a8896397,2025-06-06T18:15:35.330000
CVE-2025-47952,0,0,98063020cb9f5c2b480f0cb92a50eeedaf8c49e542ef7ba3da076028de108162,2025-05-30T16:31:03.107000
CVE-2025-47966,0,0,9af6a33a751a4e930e5be1495300477ca1b17cde2c86ba4e4a2e9e219bcd8d40,2025-06-06T14:07:28.330000
CVE-2025-4797,0,0,7955c65d02ae59cf8e91f669d1ef33f935d7dc4278caacac2c860c6a07f32d1d,2025-06-04T14:54:33.783000
@ -296231,6 +296234,7 @@ CVE-2025-49007,0,0,d1c6d78f4ed2af74dee6497de444888fe48e0c945fb3e3b2be2f74b557cd3
CVE-2025-49008,0,0,5906f158b4998a3ea295f4b31b7f6d29c67e9e9abb77b31bc6681c8bf5f684d0,2025-06-05T20:12:23.777000
CVE-2025-49009,0,0,76d8be196b9fa55d517dc826120ab50a9788f285be9ce66c1a1960b2443dc26c,2025-06-05T20:12:23.777000
CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e8d,2025-05-21T13:40:20.293000
CVE-2025-49011,1,1,2e7da429b95a4f2254c5a8795b5999a44c06845c593ad460917245d4e9c39380,2025-06-06T18:15:35.497000
CVE-2025-49012,0,0,2faa3b03d38706521ba412ef015f2b3ddc23776e15e89fc334c8483419ee59d3,2025-06-06T14:07:28.330000
CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000
CVE-2025-4903,0,0,69886136439184589d2514a03e48b62487582f2c9800b08c9aef0c9095fac7f7,2025-05-27T16:29:52.787000
@ -296275,7 +296279,7 @@ CVE-2025-49208,0,0,a8e96108da8f9e7efa92e227e5541e40bf6024b1bdd55d38cbd0bffbcfb12
CVE-2025-49209,0,0,293d4b58934d7545b7379d142ec4ec0556406a7f545f40e2a06e2176fbaac700,2025-06-04T03:15:27.057000
CVE-2025-4921,0,0,6764dccda373512b657fe3c8300f9213acc595572fe2b42c347ebcd82da48e2d,2025-05-18T20:15:19.273000
CVE-2025-49210,0,0,0d98b9f5865953f1015e0875c4ef02572a5474d0f348f574d55b17a2fdab9325,2025-06-04T03:15:27.127000
CVE-2025-49223,0,0,cd4bc81f717f31f530cbbbcd345f91c89f8ab5a23dc20acec833942415054bef,2025-06-04T14:54:33.783000
CVE-2025-49223,0,1,648cfa7c40c96de295e183f0ea98c44bf314195a3ae5c64b8746fcff08134939,2025-06-06T19:30:16.060000
CVE-2025-4923,0,0,9beba7071c51eba6c1d71d0a324059e1f5260406f92dc4aea21591df042815db,2025-05-28T12:50:28.590000
CVE-2025-49235,0,0,8c9fd6d5e7a7c75e9718e9d71425868ac554e5b2c4e799bbc755c0b8dcf21e57,2025-06-06T14:06:58.193000
CVE-2025-49236,0,0,bb23158464a18cb15ee157f8739cdc9023b3122e136a86328a75f1543c7a1904,2025-06-06T14:06:58.193000
@ -296377,7 +296381,7 @@ CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb
CVE-2025-4948,0,0,2d8928ecccf769064199e618193b5181fd943840af74729dd43fad03a17cb71a,2025-06-04T04:15:53.497000
CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000
CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000
CVE-2025-49599,1,1,f422e579100d81619126fdb05172f6f63b5a43123a5c3cb8a9e2e7d97f2a064c,2025-06-06T17:15:36.147000
CVE-2025-49599,0,0,f422e579100d81619126fdb05172f6f63b5a43123a5c3cb8a9e2e7d97f2a064c,2025-06-06T17:15:36.147000
CVE-2025-4963,0,0,bcea30a5657c56e720740d0c1da3f6ecccc2ea27495c62c19f4e987237e46939,2025-05-28T15:01:30.720000
CVE-2025-4964,0,0,9a4175fc819c8903aae087508d79cb283240d351bb7e4f3f9bd0bc9b58a9f683,2025-06-06T14:07:28.330000
CVE-2025-4966,0,0,8884eb97bbdf1a18517bed6dc84588ccbd4cf19bb3dff5ec3aa5d29bc4c7285b,2025-06-06T14:07:28.330000
@ -296701,6 +296705,10 @@ CVE-2025-5445,0,0,4170f3c2f537d54cec187b705ba4828958c100062593b53f1a91ca989cc07f
CVE-2025-5446,0,0,9d168da398a778ce0b0095a7e0a8e3bca462cdb12a826e6bb187c380e071a192,2025-06-02T17:32:17.397000
CVE-2025-5447,0,0,a5cb8bc4c7a4de9ae3bfa5d338b695456ece1a5a0b2112b238cb5da4d8fbdcc4,2025-06-02T17:32:17.397000
CVE-2025-5455,0,0,49ebfbc7472b909f08e0e5deb4e4ea5f4cedd298a2046130e62c9603cffb4aad,2025-06-02T17:32:17.397000
CVE-2025-5473,1,1,3fe62f0104bf9a4b0a1d8ab027088b8f175238f5a4bdc7e000632cb2da20271a,2025-06-06T19:15:27.463000
CVE-2025-5474,1,1,36332de2185297aad47d710829277e2bb20c3868e01cf4164480d727b7485abb,2025-06-06T19:15:27.613000
CVE-2025-5480,1,1,d99165dc939dd1b33cdd36787937414a81409d6ee0fe6550da8ac1874c25f128,2025-06-06T19:15:27.757000
CVE-2025-5481,1,1,fc5f08f7dec8c8d23a03b3d531756e8b923ab5264d6e6fbb2c8804adad13ce9e,2025-06-06T19:15:27.903000
CVE-2025-5482,0,0,010176165dc064c9d0f5c42c228b3c1b03d533e2fec3bc43624fb7ad3f4bc0b3,2025-06-04T14:54:33.783000
CVE-2025-5486,0,0,403a5f3fdf24114225af88123fd5df41b3fe4d4616779e15f6218229399593fb,2025-06-06T14:07:28.330000
CVE-2025-5492,0,0,5239a7cb50dec6b348e683d7a6c48897854a921e0d403f100d8eaef90a706bbd,2025-06-04T14:54:33.783000
@ -296710,7 +296718,7 @@ CVE-2025-5497,0,0,c3fb93fb2741ce4b0d4d7875815abfbddcb0f0be37c2c2c614518d48b9a6c7
CVE-2025-5498,0,0,3b5a38a2aa87d4a3bd8bdfa90b8081a42500b6e8cafb2140e4a5c2fe8a26b6b8,2025-06-04T14:54:33.783000
CVE-2025-5499,0,0,cd3d3ed5d5fb8c8fbe27922589daeaa9197814d18c151184287c55023aa5ed53,2025-06-04T14:54:33.783000
CVE-2025-5501,0,0,fec642688768e0515c9938a7b29759d6d9542fc6469b13587cb3286b2b89817f,2025-06-04T14:54:33.783000
CVE-2025-5502,0,1,99346326039ee5cdcdcfe00f2582c20a6c1d7dd58fe330abac7090df9f19ad78,2025-06-06T17:42:05.687000
CVE-2025-5502,0,0,99346326039ee5cdcdcfe00f2582c20a6c1d7dd58fe330abac7090df9f19ad78,2025-06-06T17:42:05.687000
CVE-2025-5503,0,0,0955847c248da4c18d595794b240de3862c80eb3860c7e19a8014999867ef785,2025-06-04T14:54:33.783000
CVE-2025-5504,0,0,6c560d6ba4b2d7e35dd18761fbbed3d7abd6c2042c66d950d638625a6ba59d03,2025-06-04T14:54:33.783000
CVE-2025-5505,0,0,446964e3eb0d4dd76d452f5358cb34395ed631d401919996fdbc4c2592cb8251,2025-06-04T14:54:33.783000
@ -296723,12 +296731,12 @@ CVE-2025-5511,0,0,dc11727eeaf3ff134ac86f7744e483b4844b784d2fb5f0ebbc7688ff688397
CVE-2025-5512,0,0,928bf241a04e6f233ea4797161d04d18b17e3498020465b77bbfd133375e0a8f,2025-06-04T14:54:33.783000
CVE-2025-5513,0,0,8b9deb8bfd077eaa06e3766c71deddefc7ec160546ad93b5bea3e81778183cb6,2025-06-04T14:54:33.783000
CVE-2025-5515,0,0,f79961a91b30f9e2454ef2ad8ea226c45534538ce6258faff70246141b067814,2025-06-04T14:54:33.783000
CVE-2025-5516,0,1,e46c0cac83b86ce3176774dfc5fcec7555beaf5b4cc847dd9f90d439ebb39443,2025-06-06T17:42:29.520000
CVE-2025-5516,0,0,e46c0cac83b86ce3176774dfc5fcec7555beaf5b4cc847dd9f90d439ebb39443,2025-06-06T17:42:29.520000
CVE-2025-5520,0,0,44141505222ef241703ec614a1ff4a30be75907eff83ac39140f2bf22fc427eb,2025-06-04T14:54:33.783000
CVE-2025-5521,0,0,2095aca7402553e86899f1ab452e6d8dccb9d483d7d614c6abf50daa71fc7d34,2025-06-04T14:54:33.783000
CVE-2025-5522,0,0,a6f0feb7c3dd1459fe736f4f5982460ecbcab99d78d309661631c0ee8cbfc4d4,2025-06-04T14:54:33.783000
CVE-2025-5523,0,0,3d6f767d22c6db3d901c9fe460993f574c4cc4a691383d638625efefbfde064b,2025-06-04T14:54:33.783000
CVE-2025-5525,0,1,8a6fda70c73f8d7caf337b44e8088af73f34b5d808b601ef429b01e524913c40,2025-06-06T17:27:21.350000
CVE-2025-5525,0,0,8a6fda70c73f8d7caf337b44e8088af73f34b5d808b601ef429b01e524913c40,2025-06-06T17:27:21.350000
CVE-2025-5527,0,0,5dead2f90bfa336b299d2790c248c3e2b665e86fc2c3c9c7ff0f4ee35f1af83c,2025-06-04T14:54:33.783000
CVE-2025-5531,0,0,6d27f31038761ad0a1ccad441f88039d5d4e8afb6e2422d32c208713130619d5,2025-06-04T14:54:33.783000
CVE-2025-5532,0,0,d307f7aa5ca0395a7c8a1bde45bdc53cca6e2426e0b9fc80212fdc7f65c5fbe7,2025-06-04T14:54:33.783000
@ -296738,8 +296746,8 @@ CVE-2025-5536,0,0,7df71d1dab0ddadc1cf40e48870e67453a2cbb15d8332fa14fab505e504c5a
CVE-2025-5538,0,0,762f67a9ba2152c03c8ac60e588d19c417662c15009fd5c6802487e853ce4da9,2025-06-06T14:07:28.330000
CVE-2025-5539,0,0,298ac745dff309bfc9c32d271927b52132f95cd6835d223a8ca6e238897e44d1,2025-06-04T14:54:33.783000
CVE-2025-5541,0,0,391135ebadea81125a316a68624bd1db152869e9dddfca42493d694df648dd89,2025-06-06T14:07:28.330000
CVE-2025-5542,0,0,d6f73127563d185f85d4ea7483a6651c4389b791fccb5a0f74ef856dec9c4d33,2025-06-04T14:54:33.783000
CVE-2025-5543,0,0,1d8a435ed88a5df21f363a761b25c4a0cbf09f84f022d0fbe70e5e84f11f1af7,2025-06-04T14:54:33.783000
CVE-2025-5542,0,1,3ecc2ef85a02a09c9be7e6dbf30040d86ff640f6ba754495a5d8dbf30a0806ed,2025-06-06T18:47:37.757000
CVE-2025-5543,0,1,1ff545b0787bdb2f415332be5f3786ca673df4cb409c2ec190778560a2d9b13a,2025-06-06T18:47:47.150000
CVE-2025-5544,0,0,020a516e79a3f89efe59dfb651e1ec3f5e799cf4a3d54ccd47ef877829750c60,2025-06-04T14:54:33.783000
CVE-2025-5545,0,0,389e1c995ff3b8301f082d6239329a262b969461cdde480fd8a11ba009de114a,2025-06-04T14:54:33.783000
CVE-2025-5546,0,0,c014aea6b5432f9ec15a4f9236a0abd58e7be7ace9bb9e49f7a344a566124468,2025-06-04T14:54:33.783000
@ -296762,8 +296770,8 @@ CVE-2025-5565,0,0,69057d9fcda3a9d391a6fdd2d36028e43e46d962e75d2a96d0e0e06e8f6deb
CVE-2025-5566,0,0,6cd1b19db0a2abdf35ae21538de449c05d1cecfb40c37f0b82d89c2ca9b4dcf9,2025-06-04T14:54:33.783000
CVE-2025-5569,0,0,4c30b6740d26360ebc0aa84c2a25fe04c9749eefc6a71facbba872eca1a65c71,2025-06-04T14:54:33.783000
CVE-2025-5571,0,0,88815a4b21737d58e162800981d93fa4afd05c1cd7a98afd3597a0eeba47b636,2025-06-04T14:54:33.783000
CVE-2025-5572,0,0,ca9b685d75a3c1fa1a949d4d1a510c131dde7d574a807080acd6298c1e9cc248,2025-06-04T14:54:33.783000
CVE-2025-5573,0,0,738f476890f8e2cd7666346bc7e6cc43335214dc033c038435905e50f2ac6faf,2025-06-04T14:54:33.783000
CVE-2025-5572,0,1,f58a8b0d677b3b1e3374f5b4bd151cd210da95aa5b9dd2a74ae8e59ebb8e1e16,2025-06-06T18:48:37.333000
CVE-2025-5573,0,1,6e69e3f6614bb634486e032f3753cb8f537723c56a38d21eec74aa1f5111ea31,2025-06-06T18:48:46.463000
CVE-2025-5574,0,0,d828c37825b04f9e6d6b2a7f019e3280cbd719b2e2fa72cc9964ddedc119f986,2025-06-04T14:54:33.783000
CVE-2025-5575,0,0,81a126dfb6ccad488366b77c36606cd2156f744efbd821f36b71a3dcd92de139,2025-06-05T14:07:21.913000
CVE-2025-5576,0,0,9f8e91355100a3b7dd53af7604f262c00a18d00760bd7db63f9844a1c4222ed2,2025-06-04T18:28:36.393000
@ -296835,24 +296843,24 @@ CVE-2025-5648,0,0,6ac7bd30998079a462b2bc55b6cfc8e5226c95680358c7ac74fbfcbda79704
CVE-2025-5649,0,0,30d42caea517c90bf1f7021dff1f808d9270a04d62d708de625ff00d2719d5f5,2025-06-05T20:12:23.777000
CVE-2025-5650,0,0,2909155d6a53f122792d3e476ad36bbe0484dad5750217bd0dcf041153c745bb,2025-06-05T20:12:23.777000
CVE-2025-5651,0,0,24cde1636f70e4b89cb882e89c8eff4d2956b5eaffc93a7e1b7d2d1cf201e123,2025-06-05T20:12:23.777000
CVE-2025-5652,0,0,8a87f8eaf99a4d88a95d7891411b74b4ec9e1f9420d4d32e96d722622d8431f4,2025-06-05T20:12:23.777000
CVE-2025-5652,0,1,0724d88b1f9ce21bc0e0832801cf9e7e7f74020843d83266b3b7dd809f5e6ba7,2025-06-06T18:31:53.513000
CVE-2025-5653,0,0,ebc9eb83de293a88516540da2ce2435411ee3546cd5862503970f7009364c6f2,2025-06-05T20:12:23.777000
CVE-2025-5654,0,0,470669381fa89a79219bdd6634bdeceab6ff857036f45afc019f916775f0a0f6,2025-06-05T20:12:23.777000
CVE-2025-5655,0,0,c796c17b7373b526172363b0234ec394ac17946bb8c4a3e20a583b4c47a9dc29,2025-06-05T20:12:23.777000
CVE-2025-5656,0,0,b338b16f85071743f3b302134535a1f857dec7cd2cee9533740ff897ea1f7bf5,2025-06-05T20:12:23.777000
CVE-2025-5657,0,0,71e7461c8138a6792ecd2f0932635df730ab7b98b19b67ac9a8e77bd098112dd,2025-06-05T20:12:23.777000
CVE-2025-5658,0,0,dcee7864d155df2523a869996e1acf244f160fa00194028f996c749af64c6996,2025-06-05T20:12:23.777000
CVE-2025-5659,0,0,990e75f573f949541aad2f9c14cd8bb661cce281dd970655f5ecb8436a243884,2025-06-05T20:12:23.777000
CVE-2025-5660,0,0,d93bfa8936934defdb85e831bc9e5ebfbff55c9ab265ac00b7e34e02faf73f8c,2025-06-05T20:12:23.777000
CVE-2025-5659,0,1,2e9f4a0e418de16bd3132ecd2481fb9b9879d63feb5400e7c03179d6af45fcfd,2025-06-06T18:42:31.650000
CVE-2025-5660,0,1,d49a54f32a97bad23440ace013a3dd27ada7eeb7c7e0a58f71ba52213e92aef2,2025-06-06T18:42:59.143000
CVE-2025-5661,0,0,8487e6a4666a69dba5b926ee889c5eb9849fbd0981bf9f397fc8b987e7d814e8,2025-06-05T20:12:23.777000
CVE-2025-5663,0,0,c85c62f4f2882aaabc99c9a2244b304eba3a3427a06d9ffa070775f45119e07a,2025-06-05T20:12:23.777000
CVE-2025-5663,0,1,8c93d873d2b9bcbc305e1d9b46e20f6f681f336f769ee36ddc277777629edd2b,2025-06-06T18:43:14.380000
CVE-2025-5664,0,0,3013c13b7f28a8a34239b9d6327d4d3f98fd81c78564ff317f65ad36bff38c71,2025-06-05T20:12:23.777000
CVE-2025-5665,0,0,3cfde591a91c9aedc86fb3daccd90d9dab049587a7bfb0bf8cb91a53b3a7c91e,2025-06-05T20:12:23.777000
CVE-2025-5666,0,0,adc46dea78cf5d2df08a3aff0d414721e4e000d8a87176352724dcee0cf64ddb,2025-06-05T20:12:23.777000
CVE-2025-5667,0,0,fb9ad8936314077bd0556e4ab10f6636ff023079fcaf277e5878155eaea45611,2025-06-05T20:12:23.777000
CVE-2025-5668,0,0,d183036441983a427c09488fa2e462491d05d488edf66bb8ef75bbe12f2fe9d2,2025-06-05T20:12:23.777000
CVE-2025-5669,0,0,52ffb046c46c8b6d87fcb9f3b856748a4cce2a18ab8737f9f3cca1596d91ddfc,2025-06-05T20:12:23.777000
CVE-2025-5670,0,0,6bb709bbdfbb625b130a11f2f1c0d56a4e56cff4f4edbdffc064fdc51fcab56b,2025-06-05T20:12:23.777000
CVE-2025-5669,0,1,e41cf90831d0a6cf4929e129e10c87880a3b230cc5343d610b4f26d94c5ca251,2025-06-06T19:39:31.743000
CVE-2025-5670,0,1,aa088ba5a44773ff1366ed76955e38f916db102440b97c97a352678ba98d3d07,2025-06-06T19:40:14.910000
CVE-2025-5671,0,0,e1cb68a1a7e0ce2770bac37bb536d1554569874249823872f4fc248121eb36fe,2025-06-05T20:12:23.777000
CVE-2025-5672,0,0,bec0b00b183687e8a6e63d1c861d9a4aaa1eb1c6829029f9f585e4f4a769b3ca,2025-06-05T20:12:23.777000
CVE-2025-5674,0,0,f090282830840d43410a45e8dd19b0b1f93ee5e6b318e39fe0e7b2a1ab816f34,2025-06-05T20:12:23.777000
@ -296862,7 +296870,7 @@ CVE-2025-5677,0,0,a001ea9b76f78f3f1863e938aa2b1752ac60e19c978feacb4aa67789658c45
CVE-2025-5679,0,0,59c0e847ad907b313509a8a7262ed706ea6357cc7a8feeba56ceeee73456c780,2025-06-05T20:12:23.777000
CVE-2025-5680,0,0,951e9727eb6f85cb1826e5addda531b5a3ed92e200dcd69a9572852fb51b7dd6,2025-06-06T14:07:28.330000
CVE-2025-5683,0,0,1a3b3cb960b03a08fa5b7c4079149ff9fe6c9f4a5d5c8b0f22c43f750a1037ab,2025-06-05T20:12:23.777000
CVE-2025-5685,0,1,41f30934d37a68c0b6e306b8453424d3ff8a24b4556b1bfb8e01e5aa7db29ca9,2025-06-06T16:15:29.510000
CVE-2025-5685,0,0,41f30934d37a68c0b6e306b8453424d3ff8a24b4556b1bfb8e01e5aa7db29ca9,2025-06-06T16:15:29.510000
CVE-2025-5686,0,0,ceecb4c8c9b6240c3c4cf6461703c0b505d1b9b8eeadd71aabaf7a72390230d4,2025-06-06T14:07:28.330000
CVE-2025-5688,0,0,8859de4a9377955821b5e59f7a118128be39b8ffcd1a35e1ff851cd9073a522a,2025-06-05T20:12:23.777000
CVE-2025-5690,0,0,2e6ec95a91973b0c3c4a92b7ee6f9cd8669b2bfbe2e8890344ec60c22753f2e7,2025-06-05T20:12:23.777000
@ -296908,11 +296916,11 @@ CVE-2025-5737,0,0,08daa88b0f47d96d464bb5d9df986f1f88b3c61d0636f7d9794766640f13fa
CVE-2025-5738,0,0,40160f872c6c36d854905fad1108d58a096f60c1e64b8c34f437851763611290,2025-06-06T14:07:28.330000
CVE-2025-5739,0,0,a0de668636e833e77f2e9d40411491def3e08bcb75e4e696079fb6b5aab62971,2025-06-06T14:07:28.330000
CVE-2025-5745,0,0,3580be19c456f8a1a42e4194fda4fe5138a1c28c64f6ee9c28042cef6c57327d,2025-06-06T14:07:28.330000
CVE-2025-5747,1,1,22d5519f083be3f8d2a8c9eea97154a8a75de23ff5e22d049c2d58ba3d765e71,2025-06-06T16:15:29.803000
CVE-2025-5748,1,1,d86ec27e31fd48801eed64b3d420979b10c849d0943186d84a02d1e8c61f06e3,2025-06-06T16:15:29.973000
CVE-2025-5749,1,1,5f07eda7d9ba20a4657ed395d1656f3428448552c8d1d495fde6b025a8cbed2e,2025-06-06T16:15:30.120000
CVE-2025-5750,1,1,d4ab220caeb76541db4ea4ba45af1a7a5802a84991eb08604daaac3330e5d24f,2025-06-06T16:15:30.273000
CVE-2025-5751,1,1,69076bbb32593cf710292aa1be54c2442edb0bb6cc30f685087289be2ca2f2b7,2025-06-06T16:15:30.413000
CVE-2025-5747,0,0,22d5519f083be3f8d2a8c9eea97154a8a75de23ff5e22d049c2d58ba3d765e71,2025-06-06T16:15:29.803000
CVE-2025-5748,0,0,d86ec27e31fd48801eed64b3d420979b10c849d0943186d84a02d1e8c61f06e3,2025-06-06T16:15:29.973000
CVE-2025-5749,0,0,5f07eda7d9ba20a4657ed395d1656f3428448552c8d1d495fde6b025a8cbed2e,2025-06-06T16:15:30.120000
CVE-2025-5750,0,0,d4ab220caeb76541db4ea4ba45af1a7a5802a84991eb08604daaac3330e5d24f,2025-06-06T16:15:30.273000
CVE-2025-5751,0,0,69076bbb32593cf710292aa1be54c2442edb0bb6cc30f685087289be2ca2f2b7,2025-06-06T16:15:30.413000
CVE-2025-5755,0,0,28839a4284836d06b3eb4221f50b293458c660e12fcab8d4c7841bb6d8cb6c7a,2025-06-06T14:07:28.330000
CVE-2025-5756,0,0,983cab85761c36f1e1ac2363ae99121e28a102ce2360578e9cd88c0e790262ab,2025-06-06T14:07:28.330000
CVE-2025-5757,0,0,135c18e20d949031e9ce20b6a79d8818b9e53edc58f52d0f7788e7c2403d1718,2025-06-06T14:07:28.330000
@ -296929,11 +296937,19 @@ CVE-2025-5778,0,0,7dd65f7b7d2079765d1c512eea3927ac3c646f8994e80c20cc78a723151d53
CVE-2025-5779,0,0,b858bce2d1721a2ca6d0d019547451287def5b486cf9ff2d2fad7fb1ad003372,2025-06-06T15:15:27.177000
CVE-2025-5780,0,0,a79d5bde6de9888e44d84f63ec0737d64a7984794aa0da81a48131d9e8e51862,2025-06-06T15:15:27.377000
CVE-2025-5782,0,0,865cb59b6e6b56132012beaa7e218524dc300348ded3d8f9dcd3df0750fe6449,2025-06-06T15:15:27.557000
CVE-2025-5783,1,1,eb7629d6e871a5ce50ba18dc59b688484697dd4904a8b7b212df38655ce738e2,2025-06-06T16:15:30.960000
CVE-2025-5784,1,1,70d455f6ee88efdac40963af74a25cee89588a1583d5a5c837d38d806e9590ef,2025-06-06T16:15:31.180000
CVE-2025-5785,1,1,361ed2e9929bd986f8e364266b2b1015221efe4c9e553e488ffb26ccf656b07c,2025-06-06T16:15:31.370000
CVE-2025-5786,1,1,a3c7640def0bc2caebf515a3375c80f49c2cd1584462164c628634750210c4db,2025-06-06T17:15:39.037000
CVE-2025-5787,1,1,8fb5d0c9a0922f6975e303c4a28ae967b1efa29d1c5a20cd9a2bad475ac5f635,2025-06-06T17:15:40.630000
CVE-2025-5788,1,1,60dd3c5365aac2f4f1565cf49e3038f104fe13ca6eda25144b7b3512d60e5de2,2025-06-06T17:15:41.797000
CVE-2025-5783,0,0,eb7629d6e871a5ce50ba18dc59b688484697dd4904a8b7b212df38655ce738e2,2025-06-06T16:15:30.960000
CVE-2025-5784,0,0,70d455f6ee88efdac40963af74a25cee89588a1583d5a5c837d38d806e9590ef,2025-06-06T16:15:31.180000
CVE-2025-5785,0,0,361ed2e9929bd986f8e364266b2b1015221efe4c9e553e488ffb26ccf656b07c,2025-06-06T16:15:31.370000
CVE-2025-5786,0,0,a3c7640def0bc2caebf515a3375c80f49c2cd1584462164c628634750210c4db,2025-06-06T17:15:39.037000
CVE-2025-5787,0,0,8fb5d0c9a0922f6975e303c4a28ae967b1efa29d1c5a20cd9a2bad475ac5f635,2025-06-06T17:15:40.630000
CVE-2025-5788,0,0,60dd3c5365aac2f4f1565cf49e3038f104fe13ca6eda25144b7b3512d60e5de2,2025-06-06T17:15:41.797000
CVE-2025-5789,1,1,333389dc54f6208be11c93c03d375d5fb9bd2bd30bfcc2fc0f7eacb3d14317eb,2025-06-06T18:15:35.650000
CVE-2025-5790,1,1,39c11c121a77d487a0b0c7947fb18590cbb86e05dd264a93a0ba9b6e05670d5f,2025-06-06T18:15:35.840000
CVE-2025-5791,0,0,4f64f57ffbcb47b155f217980406fa0c16d85c7d46fc83efc6ae0930e3d8ae52,2025-06-06T14:15:23.137000
CVE-2025-5806,0,1,79933e1939f5bacaa56d4bc6218de84ebab11db530a087d329b01c15373f4e0d,2025-06-06T16:15:31.560000
CVE-2025-5792,1,1,7defe825b7fe3099a7d2d69432cf358752c0d539c6590c8abc6d472feac2f339,2025-06-06T18:15:36.030000
CVE-2025-5793,1,1,30ac5ca9089d062b3d4345fd7fad55ed1214a8cd144a2c8fba58fe48429537d2,2025-06-06T18:15:36.227000
CVE-2025-5794,1,1,3f65c0d7298169a109cf0baabde8ecd5a15519770db304978c850a9071131391,2025-06-06T19:15:28.393000
CVE-2025-5795,1,1,cc1a92a566920098ab15eb4a4114f8f42e0b319eb8a4d01ad7cb6009fadd75b2,2025-06-06T19:15:28.617000
CVE-2025-5796,1,1,3cc1480c7cc1ebb4a1cd22150b9ab428e5376bc40b32f998106b4d663b5dfc11,2025-06-06T19:15:28.817000
CVE-2025-5797,1,1,196ce35a658b91cc18ab5dfbb97ee346217de7ce5826d6722d929ab609520310,2025-06-06T19:15:29.020000
CVE-2025-5806,0,0,79933e1939f5bacaa56d4bc6218de84ebab11db530a087d329b01c15373f4e0d,2025-06-06T16:15:31.560000

Can't render this file because it is too large.