mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-06T20:00:23.555194+00:00
This commit is contained in:
parent
30f35b8e92
commit
a20117dc4b
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-8639",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2018-12-12T00:29:01.840",
|
||||
"lastModified": "2025-03-05T16:24:58.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-06T18:15:33.090",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,19 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-41545",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T18:15:13.450",
|
||||
"lastModified": "2025-03-20T17:15:36.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:01:39.573",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netgear:c7800_firmware:6.01.07:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50944BC9-7834-4184-B97F-2A6DC3916B34"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netgear:c7800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9B4919C-A3E3-43F2-9714-18F607925F69"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2025/Feb/12",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.netgear.com/about/security/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.netgear.com/images/datasheet/networking/cablemodems/C7800.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2025/Feb/12",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-48909",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-12T09:15:44.133",
|
||||
"lastModified": "2024-11-21T08:32:36.543",
|
||||
"lastModified": "2025-06-06T18:15:34.120",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-51955",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-10T15:15:09.150",
|
||||
"lastModified": "2024-11-21T08:38:58.313",
|
||||
"lastModified": "2025-06-06T18:15:34.400",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-7231",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:30.840",
|
||||
"lastModified": "2025-05-27T20:00:59.710",
|
||||
"lastModified": "2025-06-06T19:26:02.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,9 +60,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:evanliewer:illi_link_party\\!*:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:evanliewer:illi_link_party\\!:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0",
|
||||
"matchCriteriaId": "E33994AB-3666-41CD-A959-A59017B77F21"
|
||||
"matchCriteriaId": "C78FD2BD-2F50-47B9-ABE7-2A110B5C3AB9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22533",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T03:15:11.210",
|
||||
"lastModified": "2024-11-21T08:56:25.177",
|
||||
"lastModified": "2025-06-06T18:15:34.733",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34067",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-05-03T18:15:09.573",
|
||||
"lastModified": "2024-11-21T09:18:01.257",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-06T19:15:40.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,38 +71,80 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pterodactyl:panel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.11.6",
|
||||
"matchCriteriaId": "ED188395-6608-4D08-BE62-00FED786112D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pterodactyl/panel/commit/0dad4c5a488661f9adc27dd311542516d9bfa0f2",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pterodactyl/panel/commit/1172d71d31561c4e465dabdf6b838e64de48ad16",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pterodactyl/panel/commit/f671046947e4695b5e1c647df79305c1cefdf817",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pterodactyl/panel/security/advisories/GHSA-384w-wffr-x63q",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pterodactyl/panel/commit/0dad4c5a488661f9adc27dd311542516d9bfa0f2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pterodactyl/panel/commit/1172d71d31561c4e465dabdf6b838e64de48ad16",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pterodactyl/panel/commit/f671046947e4695b5e1c647df79305c1cefdf817",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pterodactyl/panel/security/advisories/GHSA-384w-wffr-x63q",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57727",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-15T23:15:09.650",
|
||||
"lastModified": "2025-03-14T20:01:25.483",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-06T18:15:34.957",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,20 +42,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6236",
|
||||
"sourceIdentifier": "secure@citrix.com",
|
||||
"published": "2024-07-10T21:15:11.120",
|
||||
"lastModified": "2024-11-21T09:49:15.173",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-06T18:56:43.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,14 +95,95 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:citrix:netscaler_agent:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0-58.30",
|
||||
"versionEndExcluding": "13.0-92.31",
|
||||
"matchCriteriaId": "F4FA76A8-E953-4751-B7A8-ADC2FC226997"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:citrix:netscaler_agent:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.1-4.43",
|
||||
"versionEndExcluding": "13.1-53.22",
|
||||
"matchCriteriaId": "6981F122-C2AA-4D21-B83C-F499EA6629DA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:citrix:netscaler_agent:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.1-4.42",
|
||||
"versionEndExcluding": "14.1-25.53",
|
||||
"matchCriteriaId": "5EC59DDE-6DB6-4CF4-AEE1-27410D7FE010"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:citrix:netscaler_console:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0-58.30",
|
||||
"versionEndExcluding": "13.0-92.31",
|
||||
"matchCriteriaId": "2A922EC2-62D0-4877-B82F-9CB49CD97F1D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:citrix:netscaler_console:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.1-4.43",
|
||||
"versionEndExcluding": "13.1-53.22",
|
||||
"matchCriteriaId": "2A85282E-98F2-4A48-9213-80D82BBA9C2C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:citrix:netscaler_console:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.1-4.42",
|
||||
"versionEndExcluding": "14.1-25.53",
|
||||
"matchCriteriaId": "D9A1C950-BACE-44C1-B0D5-F00F46D280F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:citrix:netscaler_sdx:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0-91.12",
|
||||
"versionEndExcluding": "13.0-92.31",
|
||||
"matchCriteriaId": "10E845C6-2516-4DBB-9A8F-1EB852B93EB8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:citrix:netscaler_sdx:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.1-49.13",
|
||||
"versionEndExcluding": "13.1-53.17",
|
||||
"matchCriteriaId": "F24241B9-7586-4BC8-87B0-11F60190676E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:citrix:netscaler_sdx:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.1-4.42",
|
||||
"versionEndExcluding": "14.1-25.53",
|
||||
"matchCriteriaId": "3A55F7F3-B702-48E9-B8BD-8D85A850B76E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.citrix.com/article/CTX677998",
|
||||
"source": "secure@citrix.com"
|
||||
"source": "secure@citrix.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.citrix.com/article/CTX677998",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-23097",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-03T20:15:20.883",
|
||||
"lastModified": "2025-06-04T19:15:24.113",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:45:47.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D381478B-C638-4663-BD71-144BE4B02E46"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61E72146-72FE-4B54-AB79-3C665E7F016C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23097/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-23098",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-03T20:15:21.760",
|
||||
"lastModified": "2025-06-04T19:15:24.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:44:58.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,211 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F18F62E-2012-442E-BE60-6E76325D1824"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D8701B6-6989-44D1-873A-A1823BFD7CCC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_990_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BCF6C91D-DECE-4630-85FE-C22EF2B9160A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_990:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87FE8214-E165-4874-BB5A-3C4298708039"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1080_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43DE4D6F-D662-46F2-93BC-9AE950320BDE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE06CD56-8BFD-4208-843A-179E3E6F5C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2100_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89B88BFE-3C82-498C-8EC1-5784836DB1A1"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9385885D-654A-496E-8029-7C6D9B077193"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD1A7B09-9031-4E54-A24F-3237C054166B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFC68046-2F08-40D1-B158-89D8D9263541"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D381478B-C638-4663-BD71-144BE4B02E46"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61E72146-72FE-4B54-AB79-3C665E7F016C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23098/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-23100",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-03T20:15:21.880",
|
||||
"lastModified": "2025-06-04T19:15:24.867",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:45:16.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,157 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD1A7B09-9031-4E54-A24F-3237C054166B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFC68046-2F08-40D1-B158-89D8D9263541"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D381478B-C638-4663-BD71-144BE4B02E46"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61E72146-72FE-4B54-AB79-3C665E7F016C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1480_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64897B0D-EBF6-4BEB-BF54-ABCDBFAB45E0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1480:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3F328B4-0442-4748-B5EE-DD1CEE50D6CF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16D9272E-1794-48FF-B6A4-8F48395BA38E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "932F5FB3-5527-44D7-9DD9-EF03963E3CA3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23100/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-23102",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-03T19:15:38.807",
|
||||
"lastModified": "2025-06-04T14:54:33.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:49:02.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,265 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_9820_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07729C7A-BC6B-482E-86C1-0B5047A98BEC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_9820:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "59BBB1C0-06B0-4912-9A60-DB6DF7ECF7CD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_9825_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88933009-790A-44A6-ABAB-02B3FAEDD2A7"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_9825:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23C2C4F9-5F26-4FF7-BCDF-AE3D47EBE78B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_980_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A2AFC23-2E28-48A2-96AD-7637479F58C0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_980:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4644455-7E6F-44AD-8739-D1BD2081968C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_990_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5517D822-4960-4DDA-B972-4EEFBB4FD5DE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_990:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "094E26DF-52C7-419A-ACC3-7D50E74DB77F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_1080_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD320084-5B49-4770-A097-992533EBBF43"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_1080:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F61DC81-BF95-4169-B9E1-30CD33EF0EB3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_2100_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AECB9FE-C536-468C-9234-8FD3AD9B4468"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_2100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B901CCD1-A13D-4A20-81C7-94DCCB6949F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_1280_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D714D07-E89C-4B7F-AA0C-3D95D34FF1D2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_1280:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53CEA16B-5800-41FF-9788-D10674EC9DB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_2200_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2F71CFA-9C51-4FA5-B0E5-0A1409E61B6F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_2200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C12886E-27FA-45F4-96F7-B1D8D3BE80D2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:*:exynos_1380_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "189FE096-4B41-47F6-A159-3E0091005F60"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:*:exynos_1380:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE6559C6-78E4-4985-811F-DD4983C4B445"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23102/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-23103",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-03T16:15:23.650",
|
||||
"lastModified": "2025-06-04T14:54:33.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:49:19.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,76 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1480_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64897B0D-EBF6-4BEB-BF54-ABCDBFAB45E0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1480:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3F328B4-0442-4748-B5EE-DD1CEE50D6CF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16D9272E-1794-48FF-B6A4-8F48395BA38E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "932F5FB3-5527-44D7-9DD9-EF03963E3CA3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23103/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-23107",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-03T17:15:21.327",
|
||||
"lastModified": "2025-06-04T14:54:33.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:49:12.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,76 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1480_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64897B0D-EBF6-4BEB-BF54-ABCDBFAB45E0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1480:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3F328B4-0442-4748-B5EE-DD1CEE50D6CF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16D9272E-1794-48FF-B6A4-8F48395BA38E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "932F5FB3-5527-44D7-9DD9-EF03963E3CA3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23107/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-27xx/CVE-2025-2766.json
Normal file
56
CVE-2025/CVE-2025-27xx/CVE-2025-2766.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-2766",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-06T19:15:26.930",
|
||||
"lastModified": "2025-06-06T19:15:26.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "70mai A510 Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of 70mai A510. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the default configuration of user accounts. The configuration contains default password. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the root. Was ZDI-CAN-24996."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1393"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-180/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-34xx/CVE-2025-3485.json
Normal file
60
CVE-2025/CVE-2025-34xx/CVE-2025-3485.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-3485",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-06T19:15:27.140",
|
||||
"lastModified": "2025-06-06T19:15:27.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Allegra extractFileFromZip Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the extractFileFromZip method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26524."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://alltena.com/en/resources/release-notes/release-notes-for-release-8-1-2",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-254/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2025/CVE-2025-479xx/CVE-2025-47950.json
Normal file
72
CVE-2025/CVE-2025-479xx/CVE-2025-47950.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2025-47950",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-06T18:15:35.330",
|
||||
"lastModified": "2025-06-06T18:15:35.330",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CoreDNS is a DNS server that chains plugins. In versions prior to 1.21.2, a Denial of Service (DoS) vulnerability exists in the CoreDNS DNS-over-QUIC (DoQ) server implementation. The server previously created a new goroutine for every incoming QUIC stream without imposing any limits on the number of concurrent streams or goroutines. A remote, unauthenticated attacker could open a large number of streams, leading to uncontrolled memory consumption and eventually causing an Out Of Memory (OOM) crash \u2014 especially in containerized or memory-constrained environments. The patch in version 1.21.2 introduces two key mitigation mechanisms: `max_streams`, which caps the number of concurrent QUIC streams per connection with a default value of `256`; and `worker_pool_size`, which Introduces a server-wide, bounded worker pool to process incoming streams with a default value of `1024`. This eliminates the 1:1 stream-to-goroutine model and ensures that CoreDNS remains resilient under high concurrency. Some workarounds are available for those who are unable to upgrade. Disable QUIC support by removing or commenting out the `quic://` block in the Corefile, use container runtime resource limits to detect and isolate excessive memory usage, and/or monitor QUIC connection patterns and alert on anomalies."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://datatracker.ietf.org/doc/html/rfc9250",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/coredns/coredns/commit/efaed02c6a480ec147b1f799aab7cf815b17dfe1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/coredns/coredns/security/advisories/GHSA-cvx7-x8pj-x2gw",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/quic-go/quic-go",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.usenix.org/conference/usenixsecurity23/presentation/botella",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-490xx/CVE-2025-49011.json
Normal file
64
CVE-2025/CVE-2025-490xx/CVE-2025-49011.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-49011",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-06T18:15:35.497",
|
||||
"lastModified": "2025-06-06T18:15:35.497",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SpiceDB is an open source database for storing and querying fine-grained authorization data. Prior to version 1.44.2, on schemas involving arrows with caveats on the arrow\u2019ed relation, when the path to resolve a CheckPermission request involves the evaluation of multiple caveated branches, requests may return a negative response when a positive response is expected. Version 1.44.2 fixes the issue. As a workaround, do not use caveats in the schema over an arrow\u2019ed relation."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-358"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/authzed/spicedb/commit/fe8dd9f491f6975b3408c401e413a530eb181a67",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/authzed/spicedb/releases/tag/v1.44.2",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/authzed/spicedb/security/advisories/GHSA-cwwm-hr97-qfxm",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-49223",
|
||||
"sourceIdentifier": "cve@navercorp.com",
|
||||
"published": "2025-06-04T03:15:27.190",
|
||||
"lastModified": "2025-06-04T14:54:33.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T19:30:16.060",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:naver:billboard.js:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.15.1",
|
||||
"matchCriteriaId": "221EEEB3-105E-4CDD-8F53-23BDAC46A61C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cve.naver.com/detail/cve-2025-49223.html",
|
||||
"source": "cve@navercorp.com"
|
||||
"source": "cve@navercorp.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-54xx/CVE-2025-5473.json
Normal file
60
CVE-2025/CVE-2025-54xx/CVE-2025-5473.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-5473",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-06T19:15:27.463",
|
||||
"lastModified": "2025-06-06T19:15:27.463",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GIMP ICO File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of ICO files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26752."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.gimp.org/news/2025/05/18/gimp-3-0-4-released/#general-bugfixes",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-321/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-54xx/CVE-2025-5474.json
Normal file
56
CVE-2025/CVE-2025-54xx/CVE-2025-5474.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-5474",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-06T19:15:27.613",
|
||||
"lastModified": "2025-06-06T19:15:27.613",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "2BrightSparks SyncBackFree Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of 2BrightSparks SyncBackFree. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. User interaction on the part of an administrator is also required.\n\nThe specific flaw exists within the Mirror functionality. By creating a junction, an attacker can abuse the service to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26962."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-322/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-54xx/CVE-2025-5480.json
Normal file
60
CVE-2025/CVE-2025-54xx/CVE-2025-5480.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-5480",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-06T19:15:27.757",
|
||||
"lastModified": "2025-06-06T19:15:27.757",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Action1 Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Action1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26767."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.action1.com/blog/acknowledging-zdi-can-26767-high-severity-vulnerability-in-action1-agent/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-323/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-54xx/CVE-2025-5481.json
Normal file
56
CVE-2025/CVE-2025-54xx/CVE-2025-5481.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-5481",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-06T19:15:27.903",
|
||||
"lastModified": "2025-06-06T19:15:27.903",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sante DICOM Viewer Pro DCM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26168."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-324/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5542",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-03T22:15:21.807",
|
||||
"lastModified": "2025-06-04T14:54:33.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:47:37.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,92 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230726.1108:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "597534B0-5451-4B51-AEFA-099DB4DC505E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/X2000R/XSS_Virtual_Server",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.310992",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.310992",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.585726",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/X2000R/XSS_Virtual_Server",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5543",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-03T23:15:20.953",
|
||||
"lastModified": "2025-06-04T14:54:33.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:47:47.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,92 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230726.1108:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "597534B0-5451-4B51-AEFA-099DB4DC505E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/X2000R/XSS_parent_control",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.310993",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.310993",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.585728",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/X2000R/XSS_parent_control",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5572",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-04T06:15:22.437",
|
||||
"lastModified": "2025-06-04T14:54:33.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:48:37.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
@ -87,6 +87,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -129,32 +149,92 @@
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dcs-932l_firmware:2.18.01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AD4BC0A-6ADE-47C3-83D9-288D46A60EA4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dcs-932l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34775D9A-F16B-43C5-A8F4-88C0F9760364"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_43/43.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311029",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311029",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.588466",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_43/43.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5573",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-04T06:15:22.677",
|
||||
"lastModified": "2025-06-04T14:54:33.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:48:46.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
@ -87,6 +87,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -129,32 +149,92 @@
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dcs-932l_firmware:2.18.01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AD4BC0A-6ADE-47C3-83D9-288D46A60EA4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dcs-932l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34775D9A-F16B-43C5-A8F4-88C0F9760364"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_44/44.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311030",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311030",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.588467",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_44/44.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-5652",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T10:15:23.477",
|
||||
"lastModified": "2025-06-05T20:12:23.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:31:53.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in PHPGurukul Complaint Management System 2.0. Affected is an unknown function of the file /admin/between-date-complaintreport.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Complaint Management System 2.0. La vulnerabilidad afecta a una funci\u00f3n desconocida del archivo /admin/between-date-complaintreport.php. La manipulaci\u00f3n del argumento fromdate/todate provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,32 +142,81 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9408DA9-0416-443D-8CDF-66677CF98CF1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/41",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311142",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311142",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.589963",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/41",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-5659",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T13:15:21.907",
|
||||
"lastModified": "2025-06-05T20:12:23.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:42:31.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in PHPGurukul Complaint Management System 2.0. Affected by this vulnerability is an unknown functionality of the file /user/profile.php. The manipulation of the argument pincode leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Complaint Management System 2.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /user/profile.php. La manipulaci\u00f3n del argumento pincode provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,32 +142,81 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:2.0:*:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "8C6D9515-0DC3-4727-B5B5-2E6C34362BF7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/48",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311149",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311149",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.589980",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/48",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-5660",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T13:15:22.123",
|
||||
"lastModified": "2025-06-05T20:12:23.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:42:59.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Complaint Management System 2.0. Affected by this issue is some unknown functionality of the file /user/register-complaint.php. The manipulation of the argument noc leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Complaint Management System 2.0. Este problema afecta a una funcionalidad desconocida del archivo /user/register-complaint.php. La manipulaci\u00f3n del argumento noc provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,32 +142,81 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:2.0:*:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "8C6D9515-0DC3-4727-B5B5-2E6C34362BF7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/49",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311150",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311150",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.589981",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/49",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-5663",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T14:15:38.567",
|
||||
"lastModified": "2025-06-05T20:12:23.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T18:43:14.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in PHPGurukul Auto Taxi Stand Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/search-autoortaxi.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en PHPGurukul Auto Taxi Stand Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/search-autoortaxi.php. La manipulaci\u00f3n del argumento \"searchdata\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,32 +142,81 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:auto\\/taxi_stand_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "341E1FB8-0A7F-4621-972C-CF3EED2F67E6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Pjwww13447/pjwww/issues/20",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311152",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311152",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.590055",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Pjwww13447/pjwww/issues/20",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-5669",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T17:15:29.917",
|
||||
"lastModified": "2025-06-05T20:12:23.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T19:39:31.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in PHPGurukul Medical Card Generation System 1.0. This vulnerability affects unknown code of the file /admin/unreadenq.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad cr\u00edtica en PHPGurukul Medical Card Generation System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/unreadenq.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,32 +142,81 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/51",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311158",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311158",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.590065",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/51",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-5670",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T17:15:30.117",
|
||||
"lastModified": "2025-06-05T20:12:23.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-06T19:40:14.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Medical Card Generation System 1.0. This issue affects some unknown processing of the file /admin/manage-card.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Medical Card Generation System 1.0. Este problema afecta a un procesamiento desconocido del archivo /admin/manage-card.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,32 +142,81 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/52",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311159",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311159",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.590066",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/52",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-57xx/CVE-2025-5789.json
Normal file
145
CVE-2025/CVE-2025-57xx/CVE-2025-5789.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5789",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-06T18:15:35.650",
|
||||
"lastModified": "2025-06-06T18:15:35.650",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in TOTOLINK X15 1.0.0-B20230714.1105. This affects an unknown part of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/awindog/cve/blob/main/11.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311337",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311337",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.591218",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-57xx/CVE-2025-5790.json
Normal file
145
CVE-2025/CVE-2025-57xx/CVE-2025-5790.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5790",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-06T18:15:35.840",
|
||||
"lastModified": "2025-06-06T18:15:35.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in TOTOLINK X15 1.0.0-B20230714.1105. This vulnerability affects unknown code of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation of the argument mac leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/awindog/cve/blob/main/12.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311338",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311338",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.591219",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-57xx/CVE-2025-5792.json
Normal file
145
CVE-2025/CVE-2025-57xx/CVE-2025-5792.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5792",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-06T18:15:36.030",
|
||||
"lastModified": "2025-06-06T18:15:36.030",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This issue affects some unknown processing of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/byxs0x0/cve2/blob/main/1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311339",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311339",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.591220",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-57xx/CVE-2025-5793.json
Normal file
145
CVE-2025/CVE-2025-57xx/CVE-2025-5793.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5793",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-06T18:15:36.227",
|
||||
"lastModified": "2025-06-06T18:15:36.227",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/byxs0x0/cve2/blob/main/2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311340",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311340",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.591222",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-57xx/CVE-2025-5794.json
Normal file
145
CVE-2025/CVE-2025-57xx/CVE-2025-5794.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5794",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-06T19:15:28.393",
|
||||
"lastModified": "2025-06-06T19:15:28.393",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Tenda AC5 15.03.06.47. Affected by this issue is the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC5-formSetPPTPUserList-20a53a41781f806faf61cef61ed929c0?source=copy_link",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311348",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311348",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.591223",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-57xx/CVE-2025-5795.json
Normal file
145
CVE-2025/CVE-2025-57xx/CVE-2025-5795.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5795",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-06T19:15:28.617",
|
||||
"lastModified": "2025-06-06T19:15:28.617",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in Tenda AC5 1.0/15.03.06.47. This affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC5-fromadvsetlanip-20a53a41781f805389dcd51fa04bc530?source=copy_link",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311349",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311349",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.591224",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-57xx/CVE-2025-5796.json
Normal file
145
CVE-2025/CVE-2025-57xx/CVE-2025-5796.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5796",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-06T19:15:28.817",
|
||||
"lastModified": "2025-06-06T19:15:28.817",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in code-projects Laundry System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /data/edit_type.php. The manipulation of the argument Type leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/tuooo/CVE/issues/8",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311350",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311350",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.591267",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-57xx/CVE-2025-5797.json
Normal file
141
CVE-2025/CVE-2025-57xx/CVE-2025-5797.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-5797",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-06T19:15:29.020",
|
||||
"lastModified": "2025-06-06T19:15:29.020",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Laundry Laundry System 1.0 and classified as problematic. This issue affects some unknown processing of the file /data/insert_type.php. The manipulation of the argument Type leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/tuooo/CVE/issues/9",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311351",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311351",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.591315",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
101
README.md
101
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-06T18:00:19.694569+00:00
|
||||
2025-06-06T20:00:23.555194+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-06T17:59:21.903000+00:00
|
||||
2025-06-06T19:40:14.910000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
296938
|
||||
296954
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `33`
|
||||
Recently added CVEs: `16`
|
||||
|
||||
- [CVE-2025-22490](CVE-2025/CVE-2025-224xx/CVE-2025-22490.json) (`2025-06-06T16:15:24.487`)
|
||||
- [CVE-2025-29871](CVE-2025/CVE-2025-298xx/CVE-2025-29871.json) (`2025-06-06T16:15:24.637`)
|
||||
- [CVE-2025-29872](CVE-2025/CVE-2025-298xx/CVE-2025-29872.json) (`2025-06-06T16:15:24.803`)
|
||||
- [CVE-2025-29873](CVE-2025/CVE-2025-298xx/CVE-2025-29873.json) (`2025-06-06T16:15:24.950`)
|
||||
- [CVE-2025-29876](CVE-2025/CVE-2025-298xx/CVE-2025-29876.json) (`2025-06-06T16:15:25.090`)
|
||||
- [CVE-2025-29877](CVE-2025/CVE-2025-298xx/CVE-2025-29877.json) (`2025-06-06T16:15:25.230`)
|
||||
- [CVE-2025-29883](CVE-2025/CVE-2025-298xx/CVE-2025-29883.json) (`2025-06-06T16:15:25.370`)
|
||||
- [CVE-2025-29884](CVE-2025/CVE-2025-298xx/CVE-2025-29884.json) (`2025-06-06T16:15:25.510`)
|
||||
- [CVE-2025-29885](CVE-2025/CVE-2025-298xx/CVE-2025-29885.json) (`2025-06-06T16:15:25.643`)
|
||||
- [CVE-2025-29892](CVE-2025/CVE-2025-298xx/CVE-2025-29892.json) (`2025-06-06T16:15:25.783`)
|
||||
- [CVE-2025-30279](CVE-2025/CVE-2025-302xx/CVE-2025-30279.json) (`2025-06-06T16:15:26.030`)
|
||||
- [CVE-2025-33031](CVE-2025/CVE-2025-330xx/CVE-2025-33031.json) (`2025-06-06T16:15:28.203`)
|
||||
- [CVE-2025-33035](CVE-2025/CVE-2025-330xx/CVE-2025-33035.json) (`2025-06-06T16:15:28.353`)
|
||||
- [CVE-2025-49599](CVE-2025/CVE-2025-495xx/CVE-2025-49599.json) (`2025-06-06T17:15:36.147`)
|
||||
- [CVE-2025-5747](CVE-2025/CVE-2025-57xx/CVE-2025-5747.json) (`2025-06-06T16:15:29.803`)
|
||||
- [CVE-2025-5748](CVE-2025/CVE-2025-57xx/CVE-2025-5748.json) (`2025-06-06T16:15:29.973`)
|
||||
- [CVE-2025-5749](CVE-2025/CVE-2025-57xx/CVE-2025-5749.json) (`2025-06-06T16:15:30.120`)
|
||||
- [CVE-2025-5750](CVE-2025/CVE-2025-57xx/CVE-2025-5750.json) (`2025-06-06T16:15:30.273`)
|
||||
- [CVE-2025-5751](CVE-2025/CVE-2025-57xx/CVE-2025-5751.json) (`2025-06-06T16:15:30.413`)
|
||||
- [CVE-2025-5783](CVE-2025/CVE-2025-57xx/CVE-2025-5783.json) (`2025-06-06T16:15:30.960`)
|
||||
- [CVE-2025-5784](CVE-2025/CVE-2025-57xx/CVE-2025-5784.json) (`2025-06-06T16:15:31.180`)
|
||||
- [CVE-2025-5785](CVE-2025/CVE-2025-57xx/CVE-2025-5785.json) (`2025-06-06T16:15:31.370`)
|
||||
- [CVE-2025-5786](CVE-2025/CVE-2025-57xx/CVE-2025-5786.json) (`2025-06-06T17:15:39.037`)
|
||||
- [CVE-2025-5787](CVE-2025/CVE-2025-57xx/CVE-2025-5787.json) (`2025-06-06T17:15:40.630`)
|
||||
- [CVE-2025-5788](CVE-2025/CVE-2025-57xx/CVE-2025-5788.json) (`2025-06-06T17:15:41.797`)
|
||||
- [CVE-2025-2766](CVE-2025/CVE-2025-27xx/CVE-2025-2766.json) (`2025-06-06T19:15:26.930`)
|
||||
- [CVE-2025-3485](CVE-2025/CVE-2025-34xx/CVE-2025-3485.json) (`2025-06-06T19:15:27.140`)
|
||||
- [CVE-2025-47950](CVE-2025/CVE-2025-479xx/CVE-2025-47950.json) (`2025-06-06T18:15:35.330`)
|
||||
- [CVE-2025-49011](CVE-2025/CVE-2025-490xx/CVE-2025-49011.json) (`2025-06-06T18:15:35.497`)
|
||||
- [CVE-2025-5473](CVE-2025/CVE-2025-54xx/CVE-2025-5473.json) (`2025-06-06T19:15:27.463`)
|
||||
- [CVE-2025-5474](CVE-2025/CVE-2025-54xx/CVE-2025-5474.json) (`2025-06-06T19:15:27.613`)
|
||||
- [CVE-2025-5480](CVE-2025/CVE-2025-54xx/CVE-2025-5480.json) (`2025-06-06T19:15:27.757`)
|
||||
- [CVE-2025-5481](CVE-2025/CVE-2025-54xx/CVE-2025-5481.json) (`2025-06-06T19:15:27.903`)
|
||||
- [CVE-2025-5789](CVE-2025/CVE-2025-57xx/CVE-2025-5789.json) (`2025-06-06T18:15:35.650`)
|
||||
- [CVE-2025-5790](CVE-2025/CVE-2025-57xx/CVE-2025-5790.json) (`2025-06-06T18:15:35.840`)
|
||||
- [CVE-2025-5792](CVE-2025/CVE-2025-57xx/CVE-2025-5792.json) (`2025-06-06T18:15:36.030`)
|
||||
- [CVE-2025-5793](CVE-2025/CVE-2025-57xx/CVE-2025-5793.json) (`2025-06-06T18:15:36.227`)
|
||||
- [CVE-2025-5794](CVE-2025/CVE-2025-57xx/CVE-2025-5794.json) (`2025-06-06T19:15:28.393`)
|
||||
- [CVE-2025-5795](CVE-2025/CVE-2025-57xx/CVE-2025-5795.json) (`2025-06-06T19:15:28.617`)
|
||||
- [CVE-2025-5796](CVE-2025/CVE-2025-57xx/CVE-2025-5796.json) (`2025-06-06T19:15:28.817`)
|
||||
- [CVE-2025-5797](CVE-2025/CVE-2025-57xx/CVE-2025-5797.json) (`2025-06-06T19:15:29.020`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `30`
|
||||
Recently modified CVEs: `27`
|
||||
|
||||
- [CVE-2024-38892](CVE-2024/CVE-2024-388xx/CVE-2024-38892.json) (`2025-06-06T17:16:48.147`)
|
||||
- [CVE-2024-38894](CVE-2024/CVE-2024-388xx/CVE-2024-38894.json) (`2025-06-06T17:16:55.567`)
|
||||
- [CVE-2024-38895](CVE-2024/CVE-2024-388xx/CVE-2024-38895.json) (`2025-06-06T17:13:32.390`)
|
||||
- [CVE-2024-38896](CVE-2024/CVE-2024-388xx/CVE-2024-38896.json) (`2025-06-06T17:13:15.750`)
|
||||
- [CVE-2024-38897](CVE-2024/CVE-2024-388xx/CVE-2024-38897.json) (`2025-06-06T17:10:46.100`)
|
||||
- [CVE-2024-38949](CVE-2024/CVE-2024-389xx/CVE-2024-38949.json) (`2025-06-06T17:15:02.730`)
|
||||
- [CVE-2024-38950](CVE-2024/CVE-2024-389xx/CVE-2024-38950.json) (`2025-06-06T17:15:28.550`)
|
||||
- [CVE-2024-5155](CVE-2024/CVE-2024-51xx/CVE-2024-5155.json) (`2025-06-06T16:18:02.717`)
|
||||
- [CVE-2024-57049](CVE-2024/CVE-2024-570xx/CVE-2024-57049.json) (`2025-06-06T17:59:07.280`)
|
||||
- [CVE-2024-57050](CVE-2024/CVE-2024-570xx/CVE-2024-57050.json) (`2025-06-06T17:59:21.903`)
|
||||
- [CVE-2024-57603](CVE-2024/CVE-2024-576xx/CVE-2024-57603.json) (`2025-06-06T17:53:07.037`)
|
||||
- [CVE-2024-57604](CVE-2024/CVE-2024-576xx/CVE-2024-57604.json) (`2025-06-06T17:57:47.273`)
|
||||
- [CVE-2024-6390](CVE-2024/CVE-2024-63xx/CVE-2024-6390.json) (`2025-06-06T16:10:55.940`)
|
||||
- [CVE-2024-6477](CVE-2024/CVE-2024-64xx/CVE-2024-6477.json) (`2025-06-06T16:12:25.440`)
|
||||
- [CVE-2025-20188](CVE-2025/CVE-2025-201xx/CVE-2025-20188.json) (`2025-06-06T17:15:30.170`)
|
||||
- [CVE-2025-26157](CVE-2025/CVE-2025-261xx/CVE-2025-26157.json) (`2025-06-06T17:58:10.687`)
|
||||
- [CVE-2025-26158](CVE-2025/CVE-2025-261xx/CVE-2025-26158.json) (`2025-06-06T17:58:29.797`)
|
||||
- [CVE-2025-26773](CVE-2025/CVE-2025-267xx/CVE-2025-26773.json) (`2025-06-06T17:58:49.050`)
|
||||
- [CVE-2025-31200](CVE-2025/CVE-2025-312xx/CVE-2025-31200.json) (`2025-06-06T16:15:27.827`)
|
||||
- [CVE-2025-31201](CVE-2025/CVE-2025-312xx/CVE-2025-31201.json) (`2025-06-06T16:15:28.020`)
|
||||
- [CVE-2025-5502](CVE-2025/CVE-2025-55xx/CVE-2025-5502.json) (`2025-06-06T17:42:05.687`)
|
||||
- [CVE-2025-5516](CVE-2025/CVE-2025-55xx/CVE-2025-5516.json) (`2025-06-06T17:42:29.520`)
|
||||
- [CVE-2025-5525](CVE-2025/CVE-2025-55xx/CVE-2025-5525.json) (`2025-06-06T17:27:21.350`)
|
||||
- [CVE-2025-5685](CVE-2025/CVE-2025-56xx/CVE-2025-5685.json) (`2025-06-06T16:15:29.510`)
|
||||
- [CVE-2025-5806](CVE-2025/CVE-2025-58xx/CVE-2025-5806.json) (`2025-06-06T16:15:31.560`)
|
||||
- [CVE-2023-48909](CVE-2023/CVE-2023-489xx/CVE-2023-48909.json) (`2025-06-06T18:15:34.120`)
|
||||
- [CVE-2023-51955](CVE-2023/CVE-2023-519xx/CVE-2023-51955.json) (`2025-06-06T18:15:34.400`)
|
||||
- [CVE-2023-7231](CVE-2023/CVE-2023-72xx/CVE-2023-7231.json) (`2025-06-06T19:26:02.810`)
|
||||
- [CVE-2024-20382](CVE-2024/CVE-2024-203xx/CVE-2024-20382.json) (`2025-06-06T18:51:11.123`)
|
||||
- [CVE-2024-22533](CVE-2024/CVE-2024-225xx/CVE-2024-22533.json) (`2025-06-06T18:15:34.733`)
|
||||
- [CVE-2024-34067](CVE-2024/CVE-2024-340xx/CVE-2024-34067.json) (`2025-06-06T19:15:40.140`)
|
||||
- [CVE-2024-57727](CVE-2024/CVE-2024-577xx/CVE-2024-57727.json) (`2025-06-06T18:15:34.957`)
|
||||
- [CVE-2024-6236](CVE-2024/CVE-2024-62xx/CVE-2024-6236.json) (`2025-06-06T18:56:43.393`)
|
||||
- [CVE-2025-23097](CVE-2025/CVE-2025-230xx/CVE-2025-23097.json) (`2025-06-06T18:45:47.190`)
|
||||
- [CVE-2025-23098](CVE-2025/CVE-2025-230xx/CVE-2025-23098.json) (`2025-06-06T18:44:58.380`)
|
||||
- [CVE-2025-23100](CVE-2025/CVE-2025-231xx/CVE-2025-23100.json) (`2025-06-06T18:45:16.443`)
|
||||
- [CVE-2025-23102](CVE-2025/CVE-2025-231xx/CVE-2025-23102.json) (`2025-06-06T18:49:02.287`)
|
||||
- [CVE-2025-23103](CVE-2025/CVE-2025-231xx/CVE-2025-23103.json) (`2025-06-06T18:49:19.250`)
|
||||
- [CVE-2025-23107](CVE-2025/CVE-2025-231xx/CVE-2025-23107.json) (`2025-06-06T18:49:12.190`)
|
||||
- [CVE-2025-49223](CVE-2025/CVE-2025-492xx/CVE-2025-49223.json) (`2025-06-06T19:30:16.060`)
|
||||
- [CVE-2025-5542](CVE-2025/CVE-2025-55xx/CVE-2025-5542.json) (`2025-06-06T18:47:37.757`)
|
||||
- [CVE-2025-5543](CVE-2025/CVE-2025-55xx/CVE-2025-5543.json) (`2025-06-06T18:47:47.150`)
|
||||
- [CVE-2025-5572](CVE-2025/CVE-2025-55xx/CVE-2025-5572.json) (`2025-06-06T18:48:37.333`)
|
||||
- [CVE-2025-5573](CVE-2025/CVE-2025-55xx/CVE-2025-5573.json) (`2025-06-06T18:48:46.463`)
|
||||
- [CVE-2025-5652](CVE-2025/CVE-2025-56xx/CVE-2025-5652.json) (`2025-06-06T18:31:53.513`)
|
||||
- [CVE-2025-5659](CVE-2025/CVE-2025-56xx/CVE-2025-5659.json) (`2025-06-06T18:42:31.650`)
|
||||
- [CVE-2025-5660](CVE-2025/CVE-2025-56xx/CVE-2025-5660.json) (`2025-06-06T18:42:59.143`)
|
||||
- [CVE-2025-5663](CVE-2025/CVE-2025-56xx/CVE-2025-5663.json) (`2025-06-06T18:43:14.380`)
|
||||
- [CVE-2025-5669](CVE-2025/CVE-2025-56xx/CVE-2025-5669.json) (`2025-06-06T19:39:31.743`)
|
||||
- [CVE-2025-5670](CVE-2025/CVE-2025-56xx/CVE-2025-5670.json) (`2025-06-06T19:40:14.910`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
196
_state.csv
196
_state.csv
@ -126436,7 +126436,7 @@ CVE-2018-8635,0,0,2fa77610eae5127b69b72c8cd0c818352e2543174d574fb2deef54909e4fd4
|
||||
CVE-2018-8636,0,0,432a07941e0899dcde198ff4f6249981610b9fb745921cfa04dab18ffc106851,2024-11-21T04:14:09.333000
|
||||
CVE-2018-8637,0,0,14830137fe8bbc02788d245c16f9474c23cdbb327541d997f923df2c03a74013,2024-11-21T04:14:09.450000
|
||||
CVE-2018-8638,0,0,b65222b6ab3c08a5318c5cfa087d17966ae608ccda1cc49c66b47d657073eba3,2024-11-21T04:14:09.573000
|
||||
CVE-2018-8639,0,0,ef4e9f402807822491e83543e71a80371978253a4050a98333ee78dd9734c167,2025-03-05T16:24:58.477000
|
||||
CVE-2018-8639,0,1,90fdf5b7140ef53ab972e3c3276508c86638fccfc1dc42cff5e5414bd0922ef8,2025-06-06T18:15:33.090000
|
||||
CVE-2018-8641,0,0,a43394ac0283961ddab14e82a4299cbf7b8ac31c65f3064c1f9d8590d867ced2,2024-11-21T04:14:09.823000
|
||||
CVE-2018-8643,0,0,bb7f45a85641f4ae4900e37b2faa285774a0d13729ca5f355b4cb6670454fe5d,2024-11-21T04:14:09.953000
|
||||
CVE-2018-8649,0,0,c268dba9f2f7c15df48853255b474b1824af0b9b7086e1ed7148f8b0f4c9ee76,2024-11-21T04:14:10.080000
|
||||
@ -207850,7 +207850,7 @@ CVE-2022-41540,0,0,19ac2edf697f1fc6c5dfd1dfe6d5200efff00e2f3ab1dffbd94946a57ff74
|
||||
CVE-2022-41541,0,0,62bcbe88569c0af82de71dbc914961b1b38c22841d479a1da4ba20fbad5ada14,2025-05-15T15:16:06.270000
|
||||
CVE-2022-41542,0,0,26ea6d3b932a2bee517cdb50b34d83d1551d963c22b4d4528858778033c82a8e,2025-05-13T16:15:22.500000
|
||||
CVE-2022-41544,0,0,46d8d143e59c2bc610b24f2499524919e7dba9016c816d873e9908eae8c2c845,2025-05-13T20:15:23.060000
|
||||
CVE-2022-41545,0,0,2ca57bd36e23a7f6d797d20d750a7df1fc825ba3746def947c83a006ccc68f16,2025-03-20T17:15:36.803000
|
||||
CVE-2022-41545,0,1,a56d1359b39f94bdaaad138e9cd0a0aa57980f281030860c88a5fed2fdb76a3c,2025-06-06T18:01:39.573000
|
||||
CVE-2022-41547,0,0,2fed9ec6a690cfa5c6fc6dc8bf3ae65365b216d596d3712f522188a5bf1b240a,2025-05-10T03:15:21.323000
|
||||
CVE-2022-4155,0,0,a960c13c29b37d7343a3f366ea68ec0256f562d9d96944e083db3c30f6a2e202,2025-04-12T00:15:17.273000
|
||||
CVE-2022-41550,0,0,f59c06917890b3454de1d2e01b9b8e896175f34bf650dfb358537b915891d032,2025-05-20T16:15:23.060000
|
||||
@ -211839,7 +211839,7 @@ CVE-2022-46849,0,0,822dab7399fa42100e792735d7c8fcfc797401b26b250f9c75a35c1da7e91
|
||||
CVE-2022-4685,0,0,f811885dae02c5392d6262d2ce12d3efc8cce3de17cc4b2f0f68d631d60d55e0,2023-11-07T03:58:35.860000
|
||||
CVE-2022-46850,0,0,1ee7230cd0ce68747cdc4c15d295683ec86f9c361c32306e65b18b714c4fb38c,2024-11-21T07:31:10.100000
|
||||
CVE-2022-46851,0,0,4a1db3251a0659832fecab1e76f8718c9cb41559e0349c62362e9b3203e01012,2024-11-21T07:31:10.240000
|
||||
CVE-2022-46852,0,1,d457b7921b4bfb29df57d2105fbd69681131cb7da08f189dc1b8b274c391822f,2025-06-06T17:22:55.973000
|
||||
CVE-2022-46852,0,0,d457b7921b4bfb29df57d2105fbd69681131cb7da08f189dc1b8b274c391822f,2025-06-06T17:22:55.973000
|
||||
CVE-2022-46853,0,0,32abb78ff89d3fda6c8fdbaf825c5f057c2942b788ec490ccf7e8ad86f4a8269,2025-04-15T13:10:20.330000
|
||||
CVE-2022-46854,0,0,d381d825968efa10033cef77f8bb8812957b4f8331dc8462132ed31e02e39d2d,2024-11-21T07:31:10.627000
|
||||
CVE-2022-46855,0,0,67f8e0843ed691e23edcc11c7c4a6b8cf6e871728a48c0617b73618d68161f94,2024-11-21T07:31:10.750000
|
||||
@ -239068,7 +239068,7 @@ CVE-2023-48901,0,0,66995dd25bd1c4575966899b47e249f4f99e42673ebbe7904e356fbbaad77
|
||||
CVE-2023-48902,0,0,d987a8473188002d2b44d8e375ee03e7917b5724f96beef410565a4dc06d2433,2025-05-19T13:06:35.470000
|
||||
CVE-2023-48903,0,0,a46ebf8e8349110923b01983b804a1cad90901dc14db89a69922cbc7789d0fc7,2025-05-19T13:06:33.037000
|
||||
CVE-2023-48906,0,0,a3f7e82edcf93b86c130216880280929fbc9306c05db8190e2002e7925dfcec6,2025-03-28T20:15:18.650000
|
||||
CVE-2023-48909,0,0,26188ae4304731681e252b5cd6f1f2f155d508198abb79497f44faa48db08208,2024-11-21T08:32:36.543000
|
||||
CVE-2023-48909,0,1,a123f5c7a28d35ddc595c31cb43295e3ffb2daa1d64b1b184de6d644a0a5247a,2025-06-06T18:15:34.120000
|
||||
CVE-2023-4891,0,0,9ebdcad71a27c27fe0dfae467335b7edb7ecffb33128ac6fca07d743ca1730f9,2024-11-21T08:36:12.107000
|
||||
CVE-2023-48910,0,0,93d4d7091dcd3205186551dbeebc53525343dcbca06f87903f0e2169b1de7d02,2024-11-21T08:32:36.690000
|
||||
CVE-2023-48912,0,0,109e9984fc8e8e281750312e72adf3f51a1c3818871bbcf73f4d25c6abe5a0e5,2024-11-21T08:32:36.920000
|
||||
@ -241173,7 +241173,7 @@ CVE-2023-51951,0,0,5723b90f8ddbc77ac2ddda0fc1e2439842eb75405bb5261a8a3e2df9c2cf4
|
||||
CVE-2023-51952,0,0,3ff812a795eaa25f84bb2cdf16d16a7db5f97ece164e4994297049e490772af3,2024-11-21T08:38:57.857000
|
||||
CVE-2023-51953,0,0,e37612a11a9d71533ddd7b4d06ce9ab58a42bfa22633c0e0e14163f964928244,2024-11-21T08:38:58.023000
|
||||
CVE-2023-51954,0,0,85e766fbe54eb5b441d6d8b766aaaa8bbf9b36980c73e269479ea77b43aa8a5b,2025-06-03T15:15:48.140000
|
||||
CVE-2023-51955,0,0,5f78dd931fba7ab7497e17e4dfd1de6af1617d08da87d818625e30d5879ec9dd,2024-11-21T08:38:58.313000
|
||||
CVE-2023-51955,0,1,0d54fd57d962b6533aafc4b961c69093c67961ab1ad01487e02e25770da5bc50,2025-06-06T18:15:34.400000
|
||||
CVE-2023-51956,0,0,c9c9aba31f78dd96dd4adf02499c39dd256279663ddea11006140c39508764c3,2025-06-03T15:15:48.350000
|
||||
CVE-2023-51957,0,0,76e7b32685a00f4369bdf2c6a596ac0c87298633fbf5a80d5facb022abc68579,2024-11-21T08:38:58.610000
|
||||
CVE-2023-51958,0,0,e40fe21fa221ac8f194540f4f239f90de6fe1826c8d380d968a5794f965ba175,2024-11-21T08:38:58.840000
|
||||
@ -244069,7 +244069,7 @@ CVE-2023-7227,0,0,062837ad2a2bc1e11b2e3820e3d99d10d4b3ca1af13959e96c26537a624d2a
|
||||
CVE-2023-7228,0,0,1bd9f42c82350c0208f607611c9840befce0eeb766f860c11bce4b0fd8f2e36b,2025-05-28T14:26:18.270000
|
||||
CVE-2023-7229,0,0,9500a7b8af9ea07300db230c5a721e265019fea1d9c09d18491740993cb84676,2025-05-27T20:02:45.827000
|
||||
CVE-2023-7230,0,0,4762a4831ed2235747f0b5267c3da49fa895d3ca30fb5638ab94c71b28f9a928,2025-05-27T20:02:38.433000
|
||||
CVE-2023-7231,0,0,a136547a981845a571da9e8ef768322490eecbb93d7cd9ac71c1bea0ae005be9,2025-05-27T20:00:59.710000
|
||||
CVE-2023-7231,0,1,909ee1bf8f4b677665e46df50eea076f0b83b7bd8ad48ba2affaf981bf11a71d,2025-06-06T19:26:02.810000
|
||||
CVE-2023-7232,0,0,9f7a5c43edaf3b14982f9301a589e9c185378d046852750b8fde2c0fb8bd58c7,2025-05-07T01:29:49.817000
|
||||
CVE-2023-7233,0,0,cd57130e3a0adbdd71886028ffb489df6c2e5d6130f885e92fdc92adf16d35a6,2025-03-14T19:15:43.210000
|
||||
CVE-2023-7234,0,0,248e31b2cc999c8ba6f2ca9d8d8237c455eadccd42c135ee68f6b05bbf12972b,2024-11-21T08:45:34.383000
|
||||
@ -248223,8 +248223,8 @@ CVE-2024-13083,0,0,9baf862c4a01e16469f726f0f2436d28244783672ca85ea8f1f8981937170
|
||||
CVE-2024-13084,0,0,f2c72f4c09d45c5cd33a8dc82e8e6f76fce41bba98f78ae1d6ecedd64730d79d,2025-01-06T14:44:57.910000
|
||||
CVE-2024-13085,0,0,162bf1e91a247b7e6da6855dca3faf3ee63c65213e4a36036c19ad648c40fedb,2025-01-06T14:43:13.437000
|
||||
CVE-2024-13086,0,0,7ac42c524055e40fca53eb99442db6298fae490b3d2a5b9bd9dde151851588be,2025-03-07T17:15:18.430000
|
||||
CVE-2024-13087,1,1,35260f13a79cf139041023831654c64219b8f809a7b38814600971834708570f,2025-06-06T16:15:22.573000
|
||||
CVE-2024-13088,1,1,0272f4b3c968a816786485aafa87f084bd478cc6c925669a3769d54b35ce88a1,2025-06-06T16:15:23.323000
|
||||
CVE-2024-13087,0,0,35260f13a79cf139041023831654c64219b8f809a7b38814600971834708570f,2025-06-06T16:15:22.573000
|
||||
CVE-2024-13088,0,0,0272f4b3c968a816786485aafa87f084bd478cc6c925669a3769d54b35ce88a1,2025-06-06T16:15:23.323000
|
||||
CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000
|
||||
CVE-2024-13091,0,0,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff452d,2025-01-24T18:42:25.563000
|
||||
CVE-2024-13092,0,0,a2750c0c790f467a547694b70414fe45b0b02ded27bb4d4c2a0fae1c1a0700ca,2025-04-03T14:45:17.077000
|
||||
@ -250032,7 +250032,7 @@ CVE-2024-20379,0,0,f6b182aba1f5bea74c992ea3496378e31429790ebaa564f57ec1bdcd738a1
|
||||
CVE-2024-2038,0,0,a3a7a3e24ecae0b84a6a9e24c5c693be1d1fdd37db796b330eac6b7e8cd72018,2024-11-21T09:08:54.393000
|
||||
CVE-2024-20380,0,0,52ff045cdd3863bab68c233643aecbc307a3fb67fe28e04320763830e99a3824,2024-11-21T08:52:30.310000
|
||||
CVE-2024-20381,0,0,c0c1e72d09de162858c50f3eb24b8e3b2eaddf6db3013286ef5d0324b4df5094,2024-10-08T21:43:28.757000
|
||||
CVE-2024-20382,0,0,9c89ae49089bffd86661d49ef2c6768a3b7084c30720d9c506b89f16cf39e0d6,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20382,0,1,92d04b0d91cc1813c983467bab79d38c94510ff0bc760aa68a27e77d5960a671,2025-06-06T18:51:11.123000
|
||||
CVE-2024-20383,0,0,617126a1a30b56caa324787ca2c439bbb2e8383571de91ef560adba715caef73,2024-11-21T08:52:30.840000
|
||||
CVE-2024-20384,0,0,0a746f9fe8687840f9d3d1db9400d7af0ab805422e416850a25ec8a34da8c34a,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20385,0,0,7736e77dbc744ce9555e0ea6627eea3f34e81d95a75ed68714b7ae9537ea24d9,2024-10-08T14:22:34.120000
|
||||
@ -251984,7 +251984,7 @@ CVE-2024-22526,0,0,be0cd17245feb37010512e9e801fc3cf88fa259a228b2653acad22a5e1382
|
||||
CVE-2024-22529,0,0,6ff6964af6dcf37228963edad1e1a72d4daa6ec595720f814030f9445d7fd173,2025-06-04T22:15:24.783000
|
||||
CVE-2024-2253,0,0,fcaa54d611112bbef2bb576728350004bcfdf9fe077edec443da7f473b69b277,2024-11-21T09:09:21.307000
|
||||
CVE-2024-22532,0,0,5752a21af26f07df5f97f702cf28a5f0fbd30a7fc273fee426e54f038bc969a7,2025-05-13T14:43:59.507000
|
||||
CVE-2024-22533,0,0,5103c8569310cce602bdd9c2fb596174835a1b3141133217054fc95f31d140fe,2024-11-21T08:56:25.177000
|
||||
CVE-2024-22533,0,1,1bf8ec80297c6a6ca140823c44ddd3ce704fccbb5f2636812d119bad40122740,2025-06-06T18:15:34.733000
|
||||
CVE-2024-2254,0,0,156e422dd0111a66d9220d123185b3910ba66ffac4d50ed4595b56b3d5d0cb5a,2024-09-26T22:36:20.803000
|
||||
CVE-2024-22543,0,0,c2f2470fbb228b72d3dd746a2eebda28219c960f97fd57b7d45ac949003fdb46,2025-04-08T14:41:22.843000
|
||||
CVE-2024-22544,0,0,5c859c6b12795b2200448f24ca9a6011d7687074cfe2e34dadb24dd7fd5449bc,2025-04-08T14:42:14.787000
|
||||
@ -260117,7 +260117,7 @@ CVE-2024-33368,0,0,1aed4b18a1492d5e22723c399fa6202a83f88860ce0815b8c4855ef51f160
|
||||
CVE-2024-33369,0,0,b9490b3f7ca43c4b15f380a2b2afddef109797ed9310d8e0bbcf8d7a479d2906,2024-09-30T12:45:57.823000
|
||||
CVE-2024-3337,0,0,93fac470c900f6f8b15137cc4a36deefb5092aa95ff5568e01f2ecb87b3abff1,2025-01-28T18:10:03.600000
|
||||
CVE-2024-33371,0,0,f4bc90a82667f79cc8cefc7905503af52594d6365d0f0f5457d8b3ea11012e6e,2025-04-01T15:15:36.887000
|
||||
CVE-2024-33373,0,1,ea63a122d0d6ac8e36093298ccb6c4776867d4f28c870f80f2ff22c56bff3016,2025-06-06T17:16:30.690000
|
||||
CVE-2024-33373,0,0,ea63a122d0d6ac8e36093298ccb6c4776867d4f28c870f80f2ff22c56bff3016,2025-06-06T17:16:30.690000
|
||||
CVE-2024-33374,0,0,74f1d636f52a32c597b2978544934a629869471c51c9ae394bee1952eff3f9e7,2024-11-21T09:16:51.360000
|
||||
CVE-2024-33375,0,0,f88574a9cfe30e71bdaf143c28b4b8b85911fc72588a69430865cd1e2de2835f,2025-05-30T14:09:48.680000
|
||||
CVE-2024-33377,0,0,2b277b87eb958e279f3a13417178a00d041bd21f2ebf65fd66c2dceacfa92eb6,2025-05-30T14:12:07.740000
|
||||
@ -260661,7 +260661,7 @@ CVE-2024-34063,0,0,b643c186253dea78886cdc164848b2150252d41fc3260449c6470a9b018af
|
||||
CVE-2024-34064,0,0,d4829dc815189eceac871b0df2db5b56da09a3bb505bf219d3305b275816fd82,2025-02-04T17:15:18.667000
|
||||
CVE-2024-34065,0,0,4d85ab326ecb53235af3ff0a7f41a0c6b0f15838f98dde2b100e9a0c37c4fc30,2024-11-21T09:18:00.980000
|
||||
CVE-2024-34066,0,0,a6c7f9e2fa625444e66819f02de5f84ab05035e76b2d9a7a68ee6024511c806e,2025-02-21T15:15:38.680000
|
||||
CVE-2024-34067,0,0,a4874c94ab86be355218dd89763b57103c31949c31b72b41d00b759fa3049886,2024-11-21T09:18:01.257000
|
||||
CVE-2024-34067,0,1,5d5deae8f2f77faa31e4a9986e762cd18be423572286627c6567dc3891cf733a,2025-06-06T19:15:40.140000
|
||||
CVE-2024-34068,0,0,746c105ea0ce54757cf5de08407840037e20da226e2ff660f2606589bddf9680,2025-02-21T15:19:39.417000
|
||||
CVE-2024-34069,0,0,e06af822099f29af869bb5334ce574287bfc7df782eee0154ea8f805cc040597,2025-02-21T18:15:16.663000
|
||||
CVE-2024-3407,0,0,d37a2e3074bf6319620248c6e40abd52728bf6bf8a14bb51fb72602683c6c5ae,2025-05-15T14:21:34.543000
|
||||
@ -262483,7 +262483,7 @@ CVE-2024-3635,0,0,6b91ce08fb1c4fe8eb1c3b4b2db88c9ffd3abcddd772228d559fe4e3fab4a5
|
||||
CVE-2024-36353,0,0,caf07d2a6c34feb51886f1ce6edb50e9937e103b379c80565763a756df3ec242,2025-03-02T18:15:34.033000
|
||||
CVE-2024-36358,0,0,81b5623d6ec0aba632ed9ccbd9cbbeee602466b9c8b47e22ca90ce67f15c6d23,2025-03-13T14:15:26.933000
|
||||
CVE-2024-36359,0,0,681447f14a7123230c23ae85426c8aaf48135d70ce8470eeb85fe0cc08ab2eb1,2025-03-18T16:15:21.627000
|
||||
CVE-2024-3636,0,1,7998201ae43ad31a3690128e467b0e5b28dee8679cc095cec217932ed4c04872,2025-06-06T16:15:59.430000
|
||||
CVE-2024-3636,0,0,7998201ae43ad31a3690128e467b0e5b28dee8679cc095cec217932ed4c04872,2025-06-06T16:15:59.430000
|
||||
CVE-2024-36360,0,0,98643c3072e9d590b4c751843f231fe3cbac85b5add3945e111d686ffb57c7ef,2025-03-14T15:15:41.037000
|
||||
CVE-2024-36361,0,0,e4343f7ee38acd675bd11a78326fa9c9897eb116b95daf33a3c1581431d81b95,2024-11-21T09:22:01.357000
|
||||
CVE-2024-36362,0,0,3ff8b5091e460c716d44f313160232b1d6394a6c30faf8d66a18a697350ec2db,2024-12-16T15:41:48.623000
|
||||
@ -263567,8 +263567,8 @@ CVE-2024-37649,0,0,162c02fd634f3857ac43a4b48233920dfa2eaee3a75657af8d68aaa5ded5f
|
||||
CVE-2024-3765,0,0,c54b78e5adfc3aa0aeee5a0c713f8fc0d1f32174018a6d7be47506e453bfd25c,2024-11-21T09:30:21.087000
|
||||
CVE-2024-37654,0,0,907897ff6c2382fc56ee5ba07de58991906e2dbb80ef72616776edb5dc93d406,2024-11-21T19:15:08.990000
|
||||
CVE-2024-3766,0,0,5b1f97d45b8d13ab711b52176ff6a759c727cc812c4dd212fe3769d5cd7bfb0f,2024-11-21T09:30:21.280000
|
||||
CVE-2024-37661,0,1,ee08e04759841bbf9e002e732331f80dee9de5ef526cd60e9627ae7db039d225,2025-06-06T17:09:35.177000
|
||||
CVE-2024-37662,0,1,9fb609c29e351aae318bf190d1652757771b4257bef2c46e7c384208ed859872,2025-06-06T17:09:55.507000
|
||||
CVE-2024-37661,0,0,ee08e04759841bbf9e002e732331f80dee9de5ef526cd60e9627ae7db039d225,2025-06-06T17:09:35.177000
|
||||
CVE-2024-37662,0,0,9fb609c29e351aae318bf190d1652757771b4257bef2c46e7c384208ed859872,2025-06-06T17:09:55.507000
|
||||
CVE-2024-37663,0,0,fed344a0d61f1e567327514f6a8e91ad3162275e1c47738bf38d3802a419ffbb,2024-11-22T16:15:24.273000
|
||||
CVE-2024-37664,0,0,ec10d2a017c572696a305d5984bbbc6e09db1615173526af4be64eee6d7ed665,2024-11-22T16:15:24.463000
|
||||
CVE-2024-37665,0,0,1eb587434ded45d2e868af7abc77840ba8d1cc348193e8d80a8fd746774e5a12,2024-11-21T09:24:12.510000
|
||||
@ -264661,11 +264661,11 @@ CVE-2024-38889,0,0,0b2bee4dc124ba73567cd1246f3597be7d361d6616d364c8e433bdd324f98
|
||||
CVE-2024-3889,0,0,af0688b95d292dc92732b5c4e2393cb03293b12b4f4dd952db51aab4274a418d,2025-01-10T21:35:50.913000
|
||||
CVE-2024-38890,0,0,5e341dfa8295fd78a7ddede46ae19aab792fd75804339582eff535eaf7f9049a,2025-05-06T16:33:19.013000
|
||||
CVE-2024-38891,0,0,e5d32fdd9af0f421041a310471a5b5fa3a1fa250c57717f5413406e6e3afd997,2024-08-20T16:19:34.213000
|
||||
CVE-2024-38892,0,1,a20692a4afccd4041f8dc2fe8c93e7fcd33447ec53a49c40f7b3d23824613ad7,2025-06-06T17:16:48.147000
|
||||
CVE-2024-38894,0,1,c62c7e31976529f1d9044dbf96421f9722d660d8f91e291869d162c1c9093fa3,2025-06-06T17:16:55.567000
|
||||
CVE-2024-38895,0,1,336501c788694b0bacbb5c1d6e36e24802753d1f0e6949efd54ac8f19087ab23,2025-06-06T17:13:32.390000
|
||||
CVE-2024-38896,0,1,7bdbbc20cd07c668e0d394267e9d1f84542ed05a721ee1815b9486444df5b61a,2025-06-06T17:13:15.750000
|
||||
CVE-2024-38897,0,1,e9be4bceba81b51f2a25a86d2b7d1c6225938f83c91fd88f791fd2bea0e732ee,2025-06-06T17:10:46.100000
|
||||
CVE-2024-38892,0,0,a20692a4afccd4041f8dc2fe8c93e7fcd33447ec53a49c40f7b3d23824613ad7,2025-06-06T17:16:48.147000
|
||||
CVE-2024-38894,0,0,c62c7e31976529f1d9044dbf96421f9722d660d8f91e291869d162c1c9093fa3,2025-06-06T17:16:55.567000
|
||||
CVE-2024-38895,0,0,336501c788694b0bacbb5c1d6e36e24802753d1f0e6949efd54ac8f19087ab23,2025-06-06T17:13:32.390000
|
||||
CVE-2024-38896,0,0,7bdbbc20cd07c668e0d394267e9d1f84542ed05a721ee1815b9486444df5b61a,2025-06-06T17:13:15.750000
|
||||
CVE-2024-38897,0,0,e9be4bceba81b51f2a25a86d2b7d1c6225938f83c91fd88f791fd2bea0e732ee,2025-06-06T17:10:46.100000
|
||||
CVE-2024-3890,0,0,fce70548afac71463049803d99839c76f83c3f99644b737e71452f11bf39c15a,2025-01-07T18:13:29.557000
|
||||
CVE-2024-38902,0,0,a85f33770f60b7bf9df7e69ccad63c68feb9e8859d1f289821e024bb51b84ae8,2025-05-27T16:21:56.730000
|
||||
CVE-2024-38903,0,0,bb8eb3b19953647f1fa790b248a4aaef61b725deca797759dfe3998f4fd400e8,2025-05-27T16:21:20.807000
|
||||
@ -264684,9 +264684,9 @@ CVE-2024-38927,0,0,abfe11434474364e77539bf1ef520124ec57a47fc17409062fe7ded067bd7
|
||||
CVE-2024-3893,0,0,c2de55ea7ad77ebdebed1014688a507618f8fc49cf6b1d631dbe5d9590d23bf1,2025-04-23T19:35:15.900000
|
||||
CVE-2024-3894,0,0,b3a2aa3b7941117f799646b94fe80eaf70c3bf0a40df09c6ce1c103c909b6f7c,2024-11-21T09:30:38.890000
|
||||
CVE-2024-38944,0,0,aea38a4752802a1f34132bcbb575e35233d1954a8780f67f8d4f7cb5965d4f2d,2024-11-21T09:26:59.773000
|
||||
CVE-2024-38949,0,1,c2dc06410437d6b7466efea86067a9318190842975673bba6b77a4e1a5edd255,2025-06-06T17:15:02.730000
|
||||
CVE-2024-38949,0,0,c2dc06410437d6b7466efea86067a9318190842975673bba6b77a4e1a5edd255,2025-06-06T17:15:02.730000
|
||||
CVE-2024-3895,0,0,eec6aef993f3d43c7eb882a2a9d8a867f219e712647ca683547eabd57b58d62f,2025-02-27T16:42:58.907000
|
||||
CVE-2024-38950,0,1,b05ec5a7eea79ccf66874cc1c1e33b8a664ca20ede6d8633e744c6ba6aa1834a,2025-06-06T17:15:28.550000
|
||||
CVE-2024-38950,0,0,b05ec5a7eea79ccf66874cc1c1e33b8a664ca20ede6d8633e744c6ba6aa1834a,2025-06-06T17:15:28.550000
|
||||
CVE-2024-38951,0,0,17e6d72d6ddc33d1e74949cddb49cc4cea8c80a6d51eb19eb8f6f6dcf3bf4102,2024-11-21T09:27:00.490000
|
||||
CVE-2024-38952,0,0,f38baf84d36c6a8308d09b2d27a0d4f36a3cd4be5595209fae6a993eda0806ec,2024-11-21T09:27:00.710000
|
||||
CVE-2024-38953,0,0,fd9efa483bb26dd3f6907738be0603b61a425b96c3ed89017c91e47bd1d62539,2025-03-20T21:15:20.563000
|
||||
@ -273322,7 +273322,7 @@ CVE-2024-50402,0,0,28472c7defbbac1b7ee91e0374b734ad9c07484f87a0834b751e8761f9fd2
|
||||
CVE-2024-50403,0,0,a4aa183b6f66c4ffb2fd1f183c9279ee43b63cdcaf8bd051b52907975e4618c5,2024-12-06T17:15:09.900000
|
||||
CVE-2024-50404,0,0,b5b2cf7f4bf1d6f93ea84548591911fd77b0383a18caa9c4b41e9f2a677f47b0,2024-12-06T17:15:10.043000
|
||||
CVE-2024-50405,0,0,06e3b60885c6440ab76c773e978b8803975ccdad2c31fc890d225b2f4d48208f,2025-03-07T18:15:41.860000
|
||||
CVE-2024-50406,1,1,5d949256504083c95f77236e1d75ad6767e7a8c329c49774df341d7f1fc59d72,2025-06-06T16:15:23.500000
|
||||
CVE-2024-50406,0,0,5d949256504083c95f77236e1d75ad6767e7a8c329c49774df341d7f1fc59d72,2025-06-06T16:15:23.500000
|
||||
CVE-2024-50407,0,0,9866052bb59192baca2967b3bc2111164d6bd7872bf340b1aca3f2c160296628,2024-11-07T20:28:22.860000
|
||||
CVE-2024-50408,0,0,58a47a84acdf0f836c9f8a5fa3c21e90b2d2f3c587c1b70e5c24f5387d6b7c59,2024-10-29T16:01:08.447000
|
||||
CVE-2024-50409,0,0,d098af286ab64a0110f5be7e77620539ec040083e43f27de87ded5e888586c5d,2024-11-07T20:28:43.577000
|
||||
@ -274022,7 +274022,7 @@ CVE-2024-51546,0,0,2b7d2ed1b3c1d35cd65cf3d2239a5b0dfa667195eca1e04d6c8565ee65a61
|
||||
CVE-2024-51547,0,0,18d16c84e6b2591d6430e9b2ae1fb20f3a2a8a898f27919e7f6a3ea8e0cefa4a,2025-05-23T10:15:20.647000
|
||||
CVE-2024-51548,0,0,7d9709d0855401dfb9c745c0d11b58433dc7c72e7b3dac228ea835c7008ec03e,2025-02-27T17:23:44.833000
|
||||
CVE-2024-51549,0,0,7a913dd216baa7e7597ae6670d152495655b15a26cf3e96b08ca7c1c40542aab,2025-02-27T17:26:15.490000
|
||||
CVE-2024-5155,0,1,312cbcc7741760656a4b562fae5050285584be252dc31dbfe5037605e4b8cdb6,2025-06-06T16:18:02.717000
|
||||
CVE-2024-5155,0,0,312cbcc7741760656a4b562fae5050285584be252dc31dbfe5037605e4b8cdb6,2025-06-06T16:18:02.717000
|
||||
CVE-2024-51550,0,0,eab4f36e25fd77797f2adaaf892a3fe69a0f660642c8824bd8c29fe2dbbeb55c,2025-02-27T17:27:37.560000
|
||||
CVE-2024-51551,0,0,0f85b1616cbec771da8e420593f4961efb3c181b331a523fcec17a7d2e26ce47,2025-02-27T17:32:14.497000
|
||||
CVE-2024-51552,0,0,3688f9d65f1f96cbb3456ec0abfe23aca323bfcabb66858577920825e3552dd7,2025-05-23T15:54:42.643000
|
||||
@ -277653,7 +277653,7 @@ CVE-2024-56800,0,0,1070967245f97018d7931f1b8b9aae6488fa864b099e181ef436fe219b367
|
||||
CVE-2024-56801,0,0,6cef8dddf864e165aa4a99ecadbdf0b87f7bd86d5c6e0ade6e7a30e3abe18a7a,2025-02-07T15:24:01.100000
|
||||
CVE-2024-56802,0,0,ca8c864df520606afd51db2524a82ddab30d22123f6eef6cec3ac696eba93af5,2024-12-31T16:15:28.240000
|
||||
CVE-2024-56803,0,0,1584d41fd9d3e6beb3be7c57bb8ba96341667bc6ec41b946b6138146b4297f8b,2024-12-31T23:15:41.553000
|
||||
CVE-2024-56805,1,1,c3c4099e049365293de69b0d2010b61b03c0ed630a246eda3b08848a3c903feb,2025-06-06T16:15:23.660000
|
||||
CVE-2024-56805,0,0,c3c4099e049365293de69b0d2010b61b03c0ed630a246eda3b08848a3c903feb,2025-06-06T16:15:23.660000
|
||||
CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000
|
||||
CVE-2024-56810,0,0,194a35bc92d3f9958aea6b769fb050479e40c23a506bee57531c36053803ff2a,2025-02-27T15:15:39.930000
|
||||
CVE-2024-56811,0,0,a175c74dc672ed974260adb2523ba1d1cc36b446afb4b300e1f0c115c8f66a38,2025-02-27T15:15:40.067000
|
||||
@ -277760,9 +277760,9 @@ CVE-2024-57040,0,0,33933917891b5c81929460ab67ed0d7164ee900a0e5137644747b9fb793e4
|
||||
CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39
|
||||
CVE-2024-57045,0,0,fb5ea4e4f7a4b9889a1febeaf0802625e04c77b289c8befbcdbc515a09b01b01,2025-05-21T13:08:12.557000
|
||||
CVE-2024-57046,0,0,ed4764a2183714deed727de4acb95079ff6351d4a17070f6f3c7fbd3a859097c,2025-02-19T22:15:23.207000
|
||||
CVE-2024-57049,0,1,2a0005173d8041814a4147620684c257c9ca3c68d2751da229477245e15e8a12,2025-06-06T17:59:07.280000
|
||||
CVE-2024-57049,0,0,2a0005173d8041814a4147620684c257c9ca3c68d2751da229477245e15e8a12,2025-06-06T17:59:07.280000
|
||||
CVE-2024-5705,0,0,f3b79a5d6cb194f0bd96745c53b497323f2e376cb2b6ea3a0bd2883a13683047,2025-02-19T23:15:10.823000
|
||||
CVE-2024-57050,0,1,a8a23107a1e42d1b6ac3205cc9b597da829b10740486a542824fbd3889bb45fd,2025-06-06T17:59:21.903000
|
||||
CVE-2024-57050,0,0,a8a23107a1e42d1b6ac3205cc9b597da829b10740486a542824fbd3889bb45fd,2025-06-06T17:59:21.903000
|
||||
CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000
|
||||
CVE-2024-57055,0,0,10985f4d1644c583934097b7ec50c1a0dc3d6cc9f218e4bbfca50a2ea6ce6767,2025-02-19T21:15:15.227000
|
||||
CVE-2024-57056,0,0,5fa1c6daac1c565c60219576528f65f5f288f5ab9fda6e5efedccb351b0ddf0d,2025-02-18T22:15:14.653000
|
||||
@ -277994,8 +277994,8 @@ CVE-2024-57599,0,0,08a6b92156dbb47043a13e2f6a8f470b6ff2d84a2cc52c57a2605bc11a655
|
||||
CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000
|
||||
CVE-2024-57601,0,0,d978ee2acd4111ee755bc6d199e0b7a5b30d82c722a815c1a28b244c807873ce,2025-03-22T15:15:37.747000
|
||||
CVE-2024-57602,0,0,226d91ed331e63f738fd3b8b845736eb5a7fc570a3a123d5ea996b5176962aac,2025-03-18T16:15:25.597000
|
||||
CVE-2024-57603,0,1,8a9645debea5f521afc44c4af7ccadfc073cca6b3e81dc82e702421273405f96,2025-06-06T17:53:07.037000
|
||||
CVE-2024-57604,0,1,9e7671c8762e3f19760ed992a9c62647cd7a36bacd45d15f952664f88ca86047,2025-06-06T17:57:47.273000
|
||||
CVE-2024-57603,0,0,8a9645debea5f521afc44c4af7ccadfc073cca6b3e81dc82e702421273405f96,2025-06-06T17:53:07.037000
|
||||
CVE-2024-57604,0,0,9e7671c8762e3f19760ed992a9c62647cd7a36bacd45d15f952664f88ca86047,2025-06-06T17:57:47.273000
|
||||
CVE-2024-57605,0,0,c41e31bc0c6b4266a22e57b7929d37215234774341d010b325202d9b2f8dc9f2,2025-03-19T15:15:52.740000
|
||||
CVE-2024-57606,0,0,88fff29b8b35a01ed272a18dce87c845eb952014b7761d37d399b66c213e66c6,2025-03-22T14:15:16.170000
|
||||
CVE-2024-57608,0,0,f13d7092b69ab1bb8b9d9e29e8d71dd51ba622da797972897165fa9f6e4af609,2025-02-25T21:15:17.440000
|
||||
@ -278095,7 +278095,7 @@ CVE-2024-57723,0,0,2857c6a7267b9fbf709b31556ea3afe564d1a9d64d356af9ef40f193a9899
|
||||
CVE-2024-57724,0,0,2babbe669aa2ce36155d43831c1be93b71c465ce0ba8f60650d569e3901a0689,2025-04-15T17:09:32.053000
|
||||
CVE-2024-57725,0,0,37c96803862b631e561de51a48e8624822d17dc31067e76ef4d04e27dbd1c96e,2025-02-18T15:15:17.067000
|
||||
CVE-2024-57726,0,0,b06228a1f549336c575c9af51a5eec97f13915f9b87b92d879c22e35b9610a8c,2025-01-31T21:15:11.857000
|
||||
CVE-2024-57727,0,0,40a8243c73e2ffb483061a8498545f248d48c8fe22413e0fd73f6459bc3cda9b,2025-03-14T20:01:25.483000
|
||||
CVE-2024-57727,0,1,1a72302c48430c5cef509e2207fa76e384db74fbb47bfcd46f39442705e5813c,2025-06-06T18:15:34.957000
|
||||
CVE-2024-57728,0,0,300d732277cb2b6af20193b0ebd36f609253f83cb041dd620ac6c99126042718,2025-01-31T21:15:12.330000
|
||||
CVE-2024-5773,0,0,48a7b89c22eea357c17d55a9c448884ba410356aa0d0f8db39ef44b51213a084,2025-01-29T17:38:34.290000
|
||||
CVE-2024-5774,0,0,486fd90e135c6757b4aafe207d8db6c3d7877d00116c11e1cc252707663db7ad,2024-11-21T09:48:19.287000
|
||||
@ -278841,7 +278841,7 @@ CVE-2024-6231,0,0,dfc7c4e49166819861180a0da734d525f69cd21d8e997b2dea10bc7f0fbe16
|
||||
CVE-2024-6232,0,0,3c57f72839de7a6ce60aa8101fbe572f19dcd9de326f2f4d9acedbe78b53dea6,2025-03-20T18:15:18.197000
|
||||
CVE-2024-6233,0,0,4bbca18d3f336296f26771ea45741081bf89a79a8a0061f18ec10c1c6fe49357,2024-11-22T20:15:11.437000
|
||||
CVE-2024-6235,0,0,addba757604926755fff636abbd91835a1dc2053a79b8de1012976e7ed5e5f32,2025-05-14T15:16:05.077000
|
||||
CVE-2024-6236,0,0,17dbb30c163d97e105e41953d78892b4df1370e2d128ace3876adfaaa79aa5e2,2024-11-21T09:49:15.173000
|
||||
CVE-2024-6236,0,1,84733fc9da1a398e382ca6edaa4237a5e04370dc42762987f1e22f7d13cf7137,2025-06-06T18:56:43.393000
|
||||
CVE-2024-6237,0,0,a14607871063db3c3f01995985b5b45b18dd68a5122270f9c1651369f50a267f,2024-11-21T09:49:15.300000
|
||||
CVE-2024-6238,0,0,2bad0e3b748e19d0ccf220a01ba2c819474d4f59fa4eaf1d9bd3cb971f6eda4b,2024-11-21T09:49:15.450000
|
||||
CVE-2024-6239,0,0,fedb9c2b04e1868bbb3fff69404d082eaba26e41ad42c2361f2508e11cbb3e2a,2024-11-21T09:49:15.570000
|
||||
@ -278995,7 +278995,7 @@ CVE-2024-6386,0,0,43149b950114ada6c3d4e90aacbe6afb74f4514cd9a056703ffcdf09e7e5f8
|
||||
CVE-2024-6387,0,0,6240b1c210b0a863c90f8498ec69ea6546130804a79d4c5f6e7a20723fb009ba,2025-04-24T19:15:46.257000
|
||||
CVE-2024-6388,0,0,8ab7c0afc73e8c28d936009de43463daaaf6c3042744c1e4b0610db8f0664630,2024-11-21T09:49:33.430000
|
||||
CVE-2024-6389,0,0,a40c90713a887f7f448cc701bdb107fa8ebfad06c51056b2044132a6a26d93fa,2024-11-21T09:49:33.553000
|
||||
CVE-2024-6390,0,1,e77181fa254c64b82a508ff014b9e824ea740dd6223e203717fb624301944f5d,2025-06-06T16:10:55.940000
|
||||
CVE-2024-6390,0,0,e77181fa254c64b82a508ff014b9e824ea740dd6223e203717fb624301944f5d,2025-06-06T16:10:55.940000
|
||||
CVE-2024-6391,0,0,170666d5ac46c441c3231a73dd8199dff199e8d781e611d9f163aebb1ceb1ce3,2024-11-21T09:49:33.850000
|
||||
CVE-2024-6392,0,0,36e4666a41f8ae603d4a4e9d6e2055423bfd3ce9426341de5b4cc157e8a42494,2024-11-21T09:49:33.967000
|
||||
CVE-2024-6393,0,0,0ecfa1307884486a8815a0ce15547118b579ed9ce4c752d8d316c1d999d6922c,2025-05-15T15:36:18.983000
|
||||
@ -279074,7 +279074,7 @@ CVE-2024-6471,0,0,44599ea735cf4c0f59a4c46eec9f2dcd408bc3c08f93c8063ba5adf763f68b
|
||||
CVE-2024-6472,0,0,e26f0ed33b9352737fba2c7a5901be2204823366dc7f964b880fceddc7f136d1,2024-08-06T16:31:05.780000
|
||||
CVE-2024-6473,0,0,1dafd6b50b11af3a55a60927aceae7fdee5db46502c399f03ce389e747a46480,2024-09-05T14:19:45.153000
|
||||
CVE-2024-6476,0,0,a0cbdf8db7abbf40af298419f002b432eaa0907f370a1f5866689f4a683a61f6,2024-11-26T07:15:05.697000
|
||||
CVE-2024-6477,0,1,f8f6847d32a610415a7c2ca805a1a46e2c4ada6ffccb0f2d3fc8c2c8f1cf2f4b,2025-06-06T16:12:25.440000
|
||||
CVE-2024-6477,0,0,f8f6847d32a610415a7c2ca805a1a46e2c4ada6ffccb0f2d3fc8c2c8f1cf2f4b,2025-06-06T16:12:25.440000
|
||||
CVE-2024-6478,0,0,d355f87d3d08b7198675f904b84d8494a8a121b6cd2dde7851c549ddd2d28d25,2025-05-20T20:15:37.603000
|
||||
CVE-2024-6479,0,0,e61c30f16f0abfc9f93099b9bc147874bff7bedf1b6bcc46dd42e617eef67181,2024-11-01T12:57:03.417000
|
||||
CVE-2024-6480,0,0,4266a2448f7419be28cb4214e61c8f9e0c911904bbcd8a264d7b98190c25fc16,2024-11-01T12:57:03.417000
|
||||
@ -284098,7 +284098,7 @@ CVE-2025-20184,0,0,9eb256a52263cf40f2a0e3559972cb02a910d9338675658a6b6e99c16dd38
|
||||
CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000
|
||||
CVE-2025-20186,0,0,988f7f1d2645d1b97028fb13ba80ac27036d7d2054583bffc040f1b4de466626,2025-05-08T14:39:09.683000
|
||||
CVE-2025-20187,0,0,49cb1bb2460f1bf94d25f953e4816fb4704910b25f07a14f891f757e44af242f,2025-05-08T14:39:09.683000
|
||||
CVE-2025-20188,0,1,c76f1c516e8e4901deea9b39dafb36c1df8db0fd49768c43dfb84a9676fff7af,2025-06-06T17:15:30.170000
|
||||
CVE-2025-20188,0,0,c76f1c516e8e4901deea9b39dafb36c1df8db0fd49768c43dfb84a9676fff7af,2025-06-06T17:15:30.170000
|
||||
CVE-2025-20189,0,0,80748ec81ef3d0bfea0a8fd1c737694e12cc44ced3d0cbf30c347d4a66ab6799,2025-05-08T14:39:09.683000
|
||||
CVE-2025-2019,0,0,ce7a9cbc0a7eb98392e8b644905555ade42dac13612963c992df55a4ab3df595,2025-03-11T21:15:53.337000
|
||||
CVE-2025-20190,0,0,469a86e281a91f6666aba5167ba034aae7aaa490b577c894f7d420858aa81096,2025-05-08T14:39:09.683000
|
||||
@ -285711,12 +285711,12 @@ CVE-2025-22478,0,0,581a5f745c8e6e0231f6143e773a9eb6d230b0d53e7237fccf8d3d76cc422
|
||||
CVE-2025-22479,0,0,1020ed0786a0c53974ebfcb601d1f02d18778bef0e765c0c2884bd0e7b0f68ff,2025-05-13T20:18:11.457000
|
||||
CVE-2025-2248,0,0,c777d68e94acb7df7f51d66a6234f2e224456943a6065bd7a816052673458dc6,2025-06-04T20:03:58.247000
|
||||
CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000
|
||||
CVE-2025-22481,1,1,d74c9adfee1121da6a1e6f2d58cb11ada31a80bc7c544b0607c7fafc3d69ef0d,2025-06-06T16:15:23.877000
|
||||
CVE-2025-22482,1,1,a8e89db2e4260d7d21d7b67ed88b68525e45b5132a6520096bc2e01c9a58de16,2025-06-06T16:15:24.023000
|
||||
CVE-2025-22484,1,1,08224f26f52f4e16503913d7a9e727f145339af9b37a01b5624bd3cf87632d95,2025-06-06T16:15:24.187000
|
||||
CVE-2025-22486,1,1,0bf5f5a60a5cb32b416a663fa2e5e8c25d3442a416e7fa7e70186e2b43cf84a4,2025-06-06T16:15:24.330000
|
||||
CVE-2025-22481,0,0,d74c9adfee1121da6a1e6f2d58cb11ada31a80bc7c544b0607c7fafc3d69ef0d,2025-06-06T16:15:23.877000
|
||||
CVE-2025-22482,0,0,a8e89db2e4260d7d21d7b67ed88b68525e45b5132a6520096bc2e01c9a58de16,2025-06-06T16:15:24.023000
|
||||
CVE-2025-22484,0,0,08224f26f52f4e16503913d7a9e727f145339af9b37a01b5624bd3cf87632d95,2025-06-06T16:15:24.187000
|
||||
CVE-2025-22486,0,0,0bf5f5a60a5cb32b416a663fa2e5e8c25d3442a416e7fa7e70186e2b43cf84a4,2025-06-06T16:15:24.330000
|
||||
CVE-2025-2249,0,0,b8b4319df0eeaddaa08416535fc97107b599907518d1e8273137ec9437aa4b47,2025-04-01T20:26:30.593000
|
||||
CVE-2025-22490,1,1,7e5f2ff5a52a80d60adb4bf67b53061f31607fc04f0aef85cd22febbcd4a8465,2025-06-06T16:15:24.487000
|
||||
CVE-2025-22490,0,0,7e5f2ff5a52a80d60adb4bf67b53061f31607fc04f0aef85cd22febbcd4a8465,2025-06-06T16:15:24.487000
|
||||
CVE-2025-22491,0,0,ad85f2f60683d1b1d15d527fe2b105a5594d84c0da0f697daa4684f44b948c2e,2025-02-28T09:15:12.540000
|
||||
CVE-2025-22492,0,0,6675658809687c830ee351f78ca107f7df64e972ba8ef72f245dee116e840551,2025-02-28T09:15:12.680000
|
||||
CVE-2025-22493,0,0,d929c5d6113570551417420f2e90fa0b9e868f3eee937ae9b18c8bf109c1b5b2,2025-03-05T09:15:10.443000
|
||||
@ -286247,18 +286247,18 @@ CVE-2025-23093,0,0,7320826aecf4e98ab5895586ea1e6e8575244a0f095c3e1b8e12bb0d362e3
|
||||
CVE-2025-23094,0,0,7cea7e6e51afc006925b4e48de2308fe64516f9177080ff30f9a60f654ae9082,2025-02-11T22:15:30.597000
|
||||
CVE-2025-23095,0,0,af9f11f87a7c2b544be8c7031fb66369a2bd65f1e55cd07a7f0844e5f4a78e06,2025-06-05T20:12:23.777000
|
||||
CVE-2025-23096,0,0,938070ad0e686392e5ffe83ad3d5737b6fc864428d62110758b90471f896dc94,2025-06-05T20:12:23.777000
|
||||
CVE-2025-23097,0,0,ae11ec200a512e0157961b9111e0fddc588e6ce80ea01dec36109dca23db7bb6,2025-06-04T19:15:24.113000
|
||||
CVE-2025-23098,0,0,7a3d82787fd0dbd2f597db75a7f5627aba3635770e845622738fb5ecf46ba462,2025-06-04T19:15:24.687000
|
||||
CVE-2025-23097,0,1,4774d32d16478d23000e84838eba89ca903790355c35f9f93f408220eab71d8b,2025-06-06T18:45:47.190000
|
||||
CVE-2025-23098,0,1,38caacad0ce8434e1a4a06bf6456842d8a6ac9b59543ad3010a9645c867ef495,2025-06-06T18:44:58.380000
|
||||
CVE-2025-23099,0,0,76197de6f7075c8d8a9f0fc39558cb7eedbeb1e6ce55a9cdbe78882e1931cafa,2025-06-04T14:54:33.783000
|
||||
CVE-2025-2310,0,0,1254bedeef285364d4ce4cc304a3b27319f0e76b0b0498fd69d05aba0b6f3806,2025-05-28T18:12:42.130000
|
||||
CVE-2025-23100,0,0,6f153ee72c1bebba4cbbfbfd325af0460cdc055bf1d1806fffea41949fb6c2c4,2025-06-04T19:15:24.867000
|
||||
CVE-2025-23100,0,1,46b37fe2c3228425bf3c04fe972bc0cdefe57e7dc18dacde4550fc6f81a56a37,2025-06-06T18:45:16.443000
|
||||
CVE-2025-23101,0,0,cc19cf5c7434529aeced05e986d69324969dba24b6a740d7f092ac779d3d70fd,2025-06-05T20:12:23.777000
|
||||
CVE-2025-23102,0,0,6bec7573bbe7240a0cc6c4ad146f66173c15f86fae3427c8aa28807d6147b430,2025-06-04T14:54:33.783000
|
||||
CVE-2025-23103,0,0,c8c91a4a577fefcea451a589fa7a19f5057b093193fb8a60af72a8861235b66e,2025-06-04T14:54:33.783000
|
||||
CVE-2025-23102,0,1,14a807753e58dc9842375a0338c965d34317a66a2ddaaed297172fe1c936f158,2025-06-06T18:49:02.287000
|
||||
CVE-2025-23103,0,1,af7de4223ee48e5d5418763433d6687e1e0444809ae878b4ad8a4335b22ba78e,2025-06-06T18:49:19.250000
|
||||
CVE-2025-23104,0,0,6e3255de9b3e3eabf4e0883aa996b5d13398a20f89aed465be62f21cd861d0db,2025-06-04T14:54:53.980000
|
||||
CVE-2025-23105,0,0,0cfe1826e7f6e2704ce0e8c0045a2d064cd7652071b287e953f8c489e8a22a74,2025-06-04T14:54:33.783000
|
||||
CVE-2025-23106,0,0,7446272ace00eeeb413814cbfbb0a042b98e698b2d2698216672556a0d555e90,2025-06-05T20:12:23.777000
|
||||
CVE-2025-23107,0,0,b5923ffad40828aa0847fa30f2f0def8d61f468e0a49580d483e213869e12b9e,2025-06-04T14:54:33.783000
|
||||
CVE-2025-23107,0,1,473e9f3950324060da83c2e03546f7606cb24c446ae5eb77e417a460d4770978,2025-06-06T18:49:12.190000
|
||||
CVE-2025-23108,0,0,43dfea536f21c7dddc3256c2f1e274765fe5955541d1af65c01a12871277b7ff,2025-04-03T18:58:00.940000
|
||||
CVE-2025-23109,0,0,dab09ed4e1fbec86e8afd75398d8d3c5a65ca2a268fa35cb5d3a1b5459dc4d18,2025-04-03T18:52:57.410000
|
||||
CVE-2025-2311,0,0,0549a26ae70964117a933b4c0694a85dc38e847ae92918cf4a69583f79013968,2025-03-21T07:15:36.820000
|
||||
@ -288492,8 +288492,8 @@ CVE-2025-26137,0,0,004205e5376adff96c010e010531e03852f5eb4905a1a3c73ed331cf2f44f
|
||||
CVE-2025-26138,0,0,4c83b447574a31d9857c309d7f5649f5104ee78c2e6617a4327eaace6a44e40b,2025-04-01T20:37:28.490000
|
||||
CVE-2025-26153,0,0,fbd54e08d3ed017020223f9a7b6b482516a3990fb93f496abb0ee8889236b21e,2025-04-18T12:15:15.033000
|
||||
CVE-2025-26156,0,0,962eae3fa0ac2ee7ef9345ac9060a4193d262807409fdde8171c1e14753b4430,2025-04-02T18:49:33.170000
|
||||
CVE-2025-26157,0,1,38de05e421d679d343d79e185476ab67eea088104866559f392814d0f7cd1051,2025-06-06T17:58:10.687000
|
||||
CVE-2025-26158,0,1,9a9ccb779ce1e088ebdbc11b5b68d322452a852d85321db4285fa5c556e48796,2025-06-06T17:58:29.797000
|
||||
CVE-2025-26157,0,0,38de05e421d679d343d79e185476ab67eea088104866559f392814d0f7cd1051,2025-06-06T17:58:10.687000
|
||||
CVE-2025-26158,0,0,9a9ccb779ce1e088ebdbc11b5b68d322452a852d85321db4285fa5c556e48796,2025-06-06T17:58:29.797000
|
||||
CVE-2025-26159,0,0,5cb7b2e3d55f2fd4f39ad0eb0db7448231df9f032e32668063e620270ed021a5,2025-04-23T14:08:13.383000
|
||||
CVE-2025-2616,0,0,2f2b88794fbbb9efdd58fa5d5c325450c0adad88bc639add77ab6b1ee88ac735,2025-03-22T10:15:16.533000
|
||||
CVE-2025-26163,0,0,4ffd8c87a5a86411342dba92069be8d16487d70a2e7d1aa79a834090be3e95d6,2025-04-03T16:18:02.457000
|
||||
@ -288883,7 +288883,7 @@ CVE-2025-2677,0,0,52b47ab6f3d262b4155c1661620656e26b2dd05dba4f612127b0a1d50d697e
|
||||
CVE-2025-26770,0,0,58e7c71e0ac873fd5253876cd79624d523c33d6d728641b89a44e8229c67714d,2025-02-17T12:15:28.687000
|
||||
CVE-2025-26771,0,0,1cc6eb2ca32ed2c917944619e728f51549d1501ef8f0d116201d8e22b61cbf6f,2025-05-21T17:44:25.067000
|
||||
CVE-2025-26772,0,0,e0253b405d26c0acf4ac037cd41c093db348a26c0d4952d5f6ab78a89abbb9d5,2025-03-20T12:20:45.623000
|
||||
CVE-2025-26773,0,1,fa0000b8b1a5b47d442ad80cdc1c55dfe6f6ac9df74f5a7efa51f1ff36f8d37e,2025-06-06T17:58:49.050000
|
||||
CVE-2025-26773,0,0,fa0000b8b1a5b47d442ad80cdc1c55dfe6f6ac9df74f5a7efa51f1ff36f8d37e,2025-06-06T17:58:49.050000
|
||||
CVE-2025-26774,0,0,526dfe51d520753de4e60d175888e5d8ca8738aa723fd20bff017fe643f4fb4b,2025-02-22T16:15:32.060000
|
||||
CVE-2025-26775,0,0,52cdf659c6c58d7b65216ee908b2b8b467178ee216ba1f7aae1e466a75c0462c,2025-03-19T20:39:46.850000
|
||||
CVE-2025-26776,0,0,777b3d6f00f90c4800bb30405923ef1b3111a8007fa8cde8f118fda7de44f9fa,2025-02-22T16:15:32.203000
|
||||
@ -289556,6 +289556,7 @@ CVE-2025-27656,0,0,dc5fc2c3c8a07c3a3cfe1ee867d42fde63655b6c9bddf068a07c7bc74ae1a
|
||||
CVE-2025-27657,0,0,3eddb2d82080e689fb7a38a26491cf85af6f11c0b6c2f8b880fc98ccf7cbb284,2025-04-15T22:15:23.297000
|
||||
CVE-2025-27658,0,0,0a24404418538ac121d7c4c4d8f44e3f618fd8f7b009a95b9a16f5a27c30cc30,2025-04-01T20:52:35.280000
|
||||
CVE-2025-27659,0,0,6989eae856811847c2a58c863f54f44cb2dcbec3e10efcd978081087ac6c7169,2025-04-01T20:52:40.093000
|
||||
CVE-2025-2766,1,1,9b1f5f2e9dfc091985c96c027ccf7610a1d9f346d8550706c8f521f5867b908d,2025-06-06T19:15:26.930000
|
||||
CVE-2025-27660,0,0,3a0899dbc46812a2590e82860ab081b5510035133bae348d96e775c97781ae71,2025-04-01T20:52:30.800000
|
||||
CVE-2025-27661,0,0,869daaf4557f5365a322d5447c96a298787adea4b5ab9a153eff276733cb0538,2025-04-01T20:52:26.040000
|
||||
CVE-2025-27662,0,0,51f9a933b126beaf1b2bbf92aaf57c2055219e6474859e87b287385577c6458b,2025-04-01T20:49:44.823000
|
||||
@ -290371,17 +290372,17 @@ CVE-2025-2986,0,0,d4de6065b989c9ce03bdc42146227d2a6037461d4d3c99124dadaa602d2c97
|
||||
CVE-2025-29868,0,0,3cdd5d5bc9e5c1cb38e652f74faead4f53d8e8683a37455baaae14fba635a1fa,2025-04-15T13:07:54.393000
|
||||
CVE-2025-2987,0,0,c5ae0e320f83eaa0b28afb3c153f6c745fec2a59a31f1b5ca52889e16590e49b,2025-04-23T14:08:13.383000
|
||||
CVE-2025-29870,0,0,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000
|
||||
CVE-2025-29871,1,1,267c054edce34824e666ecdd086324cba2d0ad91df2d78d897370c789b93d154,2025-06-06T16:15:24.637000
|
||||
CVE-2025-29872,1,1,b47a1b5c44b1cec4607f515d79dc9aae42c499abba4c8945d5c4afffcf1c14f7,2025-06-06T16:15:24.803000
|
||||
CVE-2025-29873,1,1,5e72666f14aa6741fe6a4524e435490585627074d96ed7ba355cc9614d5635f9,2025-06-06T16:15:24.950000
|
||||
CVE-2025-29876,1,1,fe2c3191bf79fe8d06d6ad0018d1ce7d1ad17b7d81d15bac7cff381347084d4a,2025-06-06T16:15:25.090000
|
||||
CVE-2025-29877,1,1,f1f08b6cdc4ff5e4b56a31314ab6767a457d0032600ee9abbceb5ad1c6f484a2,2025-06-06T16:15:25.230000
|
||||
CVE-2025-29883,1,1,fafeb9b425444214e843df19142453900d78b3f422b3d198a360aa8d90917ef1,2025-06-06T16:15:25.370000
|
||||
CVE-2025-29884,1,1,23acd2be25dd92a8b18ffd732ff540f9d80942927e75a70459be534506abb4ef,2025-06-06T16:15:25.510000
|
||||
CVE-2025-29885,1,1,b9e6e9a126b1dcbba775375b61769f16c62852b42581d74bb3cd311c75e4ac0e,2025-06-06T16:15:25.643000
|
||||
CVE-2025-29871,0,0,267c054edce34824e666ecdd086324cba2d0ad91df2d78d897370c789b93d154,2025-06-06T16:15:24.637000
|
||||
CVE-2025-29872,0,0,b47a1b5c44b1cec4607f515d79dc9aae42c499abba4c8945d5c4afffcf1c14f7,2025-06-06T16:15:24.803000
|
||||
CVE-2025-29873,0,0,5e72666f14aa6741fe6a4524e435490585627074d96ed7ba355cc9614d5635f9,2025-06-06T16:15:24.950000
|
||||
CVE-2025-29876,0,0,fe2c3191bf79fe8d06d6ad0018d1ce7d1ad17b7d81d15bac7cff381347084d4a,2025-06-06T16:15:25.090000
|
||||
CVE-2025-29877,0,0,f1f08b6cdc4ff5e4b56a31314ab6767a457d0032600ee9abbceb5ad1c6f484a2,2025-06-06T16:15:25.230000
|
||||
CVE-2025-29883,0,0,fafeb9b425444214e843df19142453900d78b3f422b3d198a360aa8d90917ef1,2025-06-06T16:15:25.370000
|
||||
CVE-2025-29884,0,0,23acd2be25dd92a8b18ffd732ff540f9d80942927e75a70459be534506abb4ef,2025-06-06T16:15:25.510000
|
||||
CVE-2025-29885,0,0,b9e6e9a126b1dcbba775375b61769f16c62852b42581d74bb3cd311c75e4ac0e,2025-06-06T16:15:25.643000
|
||||
CVE-2025-2989,0,0,0766747cb0e01c92c737981bb238f9adb3ab95fb53aa49cc63ece17dfe385650,2025-04-07T14:15:04.880000
|
||||
CVE-2025-29891,0,0,752eb7db0cd8cf51c6f0df1d0540c6e0a94cdab3ef9ff768e6ace10510ce6968,2025-04-02T20:37:07.073000
|
||||
CVE-2025-29892,1,1,301ea0ffaebd07f242ba7f2696555bf21271f625f4d5c9ef3270e06efab1508f,2025-06-06T16:15:25.783000
|
||||
CVE-2025-29892,0,0,301ea0ffaebd07f242ba7f2696555bf21271f625f4d5c9ef3270e06efab1508f,2025-06-06T16:15:25.783000
|
||||
CVE-2025-2990,0,0,71ab3f8fbfc23333e9355c75b23bef4a236943bf94587f620db3828791ab7825,2025-04-07T14:14:41.947000
|
||||
CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000
|
||||
CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000
|
||||
@ -290618,7 +290619,7 @@ CVE-2025-30258,0,0,cc431d0d4fe6a8b6881434ff2ad3ef316269606a3845b529c54a958324c9a
|
||||
CVE-2025-30259,0,0,e7ad748a07d97a3ed7d8fd479d0bd66cf98f38cbfee97910d52cd90aa0d3bed9,2025-03-20T00:15:13.780000
|
||||
CVE-2025-3026,0,0,e1d5f90de5cffdef16fb6ac0720c6a50512e756b166ba5e7f995a1b9b9409a90,2025-04-01T20:26:30.593000
|
||||
CVE-2025-3027,0,0,f3696c958664e9365e1d42a21589288938608fca603179f411c899cdda3285f7,2025-04-01T20:26:30.593000
|
||||
CVE-2025-30279,1,1,0f1d8e34427e7e9b9347e6dd97295917263a9ff02ac454bcd4463da00b618f78,2025-06-06T16:15:26.030000
|
||||
CVE-2025-30279,0,0,0f1d8e34427e7e9b9347e6dd97295917263a9ff02ac454bcd4463da00b618f78,2025-06-06T16:15:26.030000
|
||||
CVE-2025-3028,0,0,b4904bcbef402a86d26a68f36c89c0f13bdfe9f0b82a73bc5473d3a54339d650,2025-04-07T13:31:38.947000
|
||||
CVE-2025-30280,0,0,30288d638eb0e9dbcf0aa5896bd69db9acfcecdbc6d868f34c8a52e27afc1001,2025-04-14T08:15:13.823000
|
||||
CVE-2025-30281,0,0,1559be2cc3af28eafdfdda2201e058111279b1728b928b15c90560429d8cd6de,2025-05-28T17:06:16.963000
|
||||
@ -291419,8 +291420,8 @@ CVE-2025-31197,0,0,3398c0e8feb5507293c959674dbfa0a4b75f3b8ba43cb526b7c5a4336b7dd
|
||||
CVE-2025-31198,0,0,c25fe22374cd402a6a70ef6d6ee86de60f25c282d03849893df8e7817d21ca2f,2025-06-02T16:00:30.577000
|
||||
CVE-2025-31199,0,0,2423eacc33f142b965fb47cc5ca2e34376b9469e02c2768289c9d601c82282c4,2025-06-02T16:00:21.060000
|
||||
CVE-2025-3120,0,0,5145ab91a3b905f41026add1f6ff9bff84c48f68b4513bce38bedbeffe905195,2025-05-07T15:45:50.257000
|
||||
CVE-2025-31200,0,1,d953dd1d59e98acc760e65903612e9f5f98c82ea59c0d2a876594783fdb2ecf9,2025-06-06T16:15:27.827000
|
||||
CVE-2025-31201,0,1,4854058fa0957ba98f267d21b7764dab34ce279bedbfaf07f60749960497a52a,2025-06-06T16:15:28.020000
|
||||
CVE-2025-31200,0,0,d953dd1d59e98acc760e65903612e9f5f98c82ea59c0d2a876594783fdb2ecf9,2025-06-06T16:15:27.827000
|
||||
CVE-2025-31201,0,0,4854058fa0957ba98f267d21b7764dab34ce279bedbfaf07f60749960497a52a,2025-06-06T16:15:28.020000
|
||||
CVE-2025-31202,0,0,3ecd0d77add2d84f0d79835e95e49a94c9e589accdbb5863c6bd37f956215a89,2025-05-05T20:07:59.807000
|
||||
CVE-2025-31203,0,0,b4dd46f64e252e7dee2b6e4e785b34065a46e842fe99f0583719bea8200b72fd,2025-05-05T20:08:22.600000
|
||||
CVE-2025-31204,0,0,8e915dbb1f5bac8a4d4715736c6831a5387646e3d2b9a8a2e94b0cfaf1b78c6d,2025-05-27T13:57:27.943000
|
||||
@ -292898,8 +292899,8 @@ CVE-2025-33026,0,0,16823ea87e15ed5dd06862f606f290dd47fd68e96dd8b001f96144de8d0be
|
||||
CVE-2025-33027,0,0,315132d50b588b2e2dcb36832e008e48471336783b88752c2b030500f9b618d4,2025-04-25T16:54:53.077000
|
||||
CVE-2025-33028,0,0,d10b7c0dfad3fcdf6e98b228bc3a645088136373e6ebf203ac0322a6c2690e9d,2025-05-06T01:15:50.660000
|
||||
CVE-2025-3303,0,0,a88559a89b09c7db23c32ee2c85028152291b57ba44bc3a0730626f1d4cddeda,2025-04-08T15:02:36.210000
|
||||
CVE-2025-33031,1,1,2d969a774af5ceaf66dd278f74553fa7ce9d1ba27a89b3a16d68fba80ac09e53,2025-06-06T16:15:28.203000
|
||||
CVE-2025-33035,1,1,db3cb0da6488f5b3a0815770af4b96e6b94c6f22fc359a699e9183c8dbff6539,2025-06-06T16:15:28.353000
|
||||
CVE-2025-33031,0,0,2d969a774af5ceaf66dd278f74553fa7ce9d1ba27a89b3a16d68fba80ac09e53,2025-06-06T16:15:28.203000
|
||||
CVE-2025-33035,0,0,db3cb0da6488f5b3a0815770af4b96e6b94c6f22fc359a699e9183c8dbff6539,2025-06-06T16:15:28.353000
|
||||
CVE-2025-3304,0,0,cd001e23659b91ac09e62e7f84c563c50c19190543e934899e672b5c50fb7073,2025-05-28T21:10:23.573000
|
||||
CVE-2025-33043,0,0,ef36d411d5cc19c9905c2483de7e4477e0680a0d20b28599d7397884fc4af7de,2025-05-29T14:29:50.247000
|
||||
CVE-2025-3305,0,0,caed50d99616da9f2a70f5ff8ff690cbc48b6002cca415c3290f8e367603d490,2025-04-08T16:46:55.203000
|
||||
@ -293069,6 +293070,7 @@ CVE-2025-3481,0,0,fc292950178293c5d7012f2f451427b1d8e213e39ec7c38473276a4ba3b782
|
||||
CVE-2025-3482,0,0,725e6811f786fa1a2964e3139476056bc5110112a084055b3ffcf507726db606,2025-05-23T15:55:02.040000
|
||||
CVE-2025-3483,0,0,67eec717b32d9cb5e3ef7b345bcc95d2e7c639bc1fc7069d55c953a17c519d44,2025-05-23T15:55:02.040000
|
||||
CVE-2025-3484,0,0,9b379aadd7d20c9c57369b6e7e822e1a6ac4b4258b87caf2b9dec82eec0f1f80,2025-05-23T15:55:02.040000
|
||||
CVE-2025-3485,1,1,1fca2d8d0a5ebe67549a5a24586ff9275e3df7d8dbde2a3dbcb10d69869ed26c,2025-06-06T19:15:27.140000
|
||||
CVE-2025-3486,0,0,7a44a599ea4a475c12a9f935494be9cbd4167bf7d281b57a4d4512713e92309b,2025-05-23T15:55:02.040000
|
||||
CVE-2025-3487,0,0,199b8611c8e5457bd92c751e347923a2fd3e3ae8117e5e7759eec299c03e5969,2025-05-28T17:53:05.963000
|
||||
CVE-2025-3488,0,0,c7eefb60f78d0958cd2e23946d634228ed1d24a7964a368a35db998af9592006,2025-05-06T13:42:26.630000
|
||||
@ -295827,6 +295829,7 @@ CVE-2025-47947,0,0,937e21e816ace6c7b2eea9b27977c70a0355dffa802eeb709a1580aec3fe9
|
||||
CVE-2025-47948,0,0,ba2e8c1cb0258308d0310ef150246d3504511a8f7fe9ed640ab9013bfefadd52,2025-05-19T15:15:25.400000
|
||||
CVE-2025-47949,0,0,dc86078901df64be63bcaee4a73ca319eec3de89fa5549a71818463921d49b3a,2025-05-21T20:25:16.407000
|
||||
CVE-2025-4795,0,0,3fd0e28eaafb548c1d9f9e6a41da631ae960e10221f6f4901b1a5e253e1ad775,2025-05-19T13:35:20.460000
|
||||
CVE-2025-47950,1,1,207559f497f03ff90d65bceef52d232aa5033ea1c293c9c2faf72621a8896397,2025-06-06T18:15:35.330000
|
||||
CVE-2025-47952,0,0,98063020cb9f5c2b480f0cb92a50eeedaf8c49e542ef7ba3da076028de108162,2025-05-30T16:31:03.107000
|
||||
CVE-2025-47966,0,0,9af6a33a751a4e930e5be1495300477ca1b17cde2c86ba4e4a2e9e219bcd8d40,2025-06-06T14:07:28.330000
|
||||
CVE-2025-4797,0,0,7955c65d02ae59cf8e91f669d1ef33f935d7dc4278caacac2c860c6a07f32d1d,2025-06-04T14:54:33.783000
|
||||
@ -296231,6 +296234,7 @@ CVE-2025-49007,0,0,d1c6d78f4ed2af74dee6497de444888fe48e0c945fb3e3b2be2f74b557cd3
|
||||
CVE-2025-49008,0,0,5906f158b4998a3ea295f4b31b7f6d29c67e9e9abb77b31bc6681c8bf5f684d0,2025-06-05T20:12:23.777000
|
||||
CVE-2025-49009,0,0,76d8be196b9fa55d517dc826120ab50a9788f285be9ce66c1a1960b2443dc26c,2025-06-05T20:12:23.777000
|
||||
CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e8d,2025-05-21T13:40:20.293000
|
||||
CVE-2025-49011,1,1,2e7da429b95a4f2254c5a8795b5999a44c06845c593ad460917245d4e9c39380,2025-06-06T18:15:35.497000
|
||||
CVE-2025-49012,0,0,2faa3b03d38706521ba412ef015f2b3ddc23776e15e89fc334c8483419ee59d3,2025-06-06T14:07:28.330000
|
||||
CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000
|
||||
CVE-2025-4903,0,0,69886136439184589d2514a03e48b62487582f2c9800b08c9aef0c9095fac7f7,2025-05-27T16:29:52.787000
|
||||
@ -296275,7 +296279,7 @@ CVE-2025-49208,0,0,a8e96108da8f9e7efa92e227e5541e40bf6024b1bdd55d38cbd0bffbcfb12
|
||||
CVE-2025-49209,0,0,293d4b58934d7545b7379d142ec4ec0556406a7f545f40e2a06e2176fbaac700,2025-06-04T03:15:27.057000
|
||||
CVE-2025-4921,0,0,6764dccda373512b657fe3c8300f9213acc595572fe2b42c347ebcd82da48e2d,2025-05-18T20:15:19.273000
|
||||
CVE-2025-49210,0,0,0d98b9f5865953f1015e0875c4ef02572a5474d0f348f574d55b17a2fdab9325,2025-06-04T03:15:27.127000
|
||||
CVE-2025-49223,0,0,cd4bc81f717f31f530cbbbcd345f91c89f8ab5a23dc20acec833942415054bef,2025-06-04T14:54:33.783000
|
||||
CVE-2025-49223,0,1,648cfa7c40c96de295e183f0ea98c44bf314195a3ae5c64b8746fcff08134939,2025-06-06T19:30:16.060000
|
||||
CVE-2025-4923,0,0,9beba7071c51eba6c1d71d0a324059e1f5260406f92dc4aea21591df042815db,2025-05-28T12:50:28.590000
|
||||
CVE-2025-49235,0,0,8c9fd6d5e7a7c75e9718e9d71425868ac554e5b2c4e799bbc755c0b8dcf21e57,2025-06-06T14:06:58.193000
|
||||
CVE-2025-49236,0,0,bb23158464a18cb15ee157f8739cdc9023b3122e136a86328a75f1543c7a1904,2025-06-06T14:06:58.193000
|
||||
@ -296377,7 +296381,7 @@ CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb
|
||||
CVE-2025-4948,0,0,2d8928ecccf769064199e618193b5181fd943840af74729dd43fad03a17cb71a,2025-06-04T04:15:53.497000
|
||||
CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000
|
||||
CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000
|
||||
CVE-2025-49599,1,1,f422e579100d81619126fdb05172f6f63b5a43123a5c3cb8a9e2e7d97f2a064c,2025-06-06T17:15:36.147000
|
||||
CVE-2025-49599,0,0,f422e579100d81619126fdb05172f6f63b5a43123a5c3cb8a9e2e7d97f2a064c,2025-06-06T17:15:36.147000
|
||||
CVE-2025-4963,0,0,bcea30a5657c56e720740d0c1da3f6ecccc2ea27495c62c19f4e987237e46939,2025-05-28T15:01:30.720000
|
||||
CVE-2025-4964,0,0,9a4175fc819c8903aae087508d79cb283240d351bb7e4f3f9bd0bc9b58a9f683,2025-06-06T14:07:28.330000
|
||||
CVE-2025-4966,0,0,8884eb97bbdf1a18517bed6dc84588ccbd4cf19bb3dff5ec3aa5d29bc4c7285b,2025-06-06T14:07:28.330000
|
||||
@ -296701,6 +296705,10 @@ CVE-2025-5445,0,0,4170f3c2f537d54cec187b705ba4828958c100062593b53f1a91ca989cc07f
|
||||
CVE-2025-5446,0,0,9d168da398a778ce0b0095a7e0a8e3bca462cdb12a826e6bb187c380e071a192,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5447,0,0,a5cb8bc4c7a4de9ae3bfa5d338b695456ece1a5a0b2112b238cb5da4d8fbdcc4,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5455,0,0,49ebfbc7472b909f08e0e5deb4e4ea5f4cedd298a2046130e62c9603cffb4aad,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5473,1,1,3fe62f0104bf9a4b0a1d8ab027088b8f175238f5a4bdc7e000632cb2da20271a,2025-06-06T19:15:27.463000
|
||||
CVE-2025-5474,1,1,36332de2185297aad47d710829277e2bb20c3868e01cf4164480d727b7485abb,2025-06-06T19:15:27.613000
|
||||
CVE-2025-5480,1,1,d99165dc939dd1b33cdd36787937414a81409d6ee0fe6550da8ac1874c25f128,2025-06-06T19:15:27.757000
|
||||
CVE-2025-5481,1,1,fc5f08f7dec8c8d23a03b3d531756e8b923ab5264d6e6fbb2c8804adad13ce9e,2025-06-06T19:15:27.903000
|
||||
CVE-2025-5482,0,0,010176165dc064c9d0f5c42c228b3c1b03d533e2fec3bc43624fb7ad3f4bc0b3,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5486,0,0,403a5f3fdf24114225af88123fd5df41b3fe4d4616779e15f6218229399593fb,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5492,0,0,5239a7cb50dec6b348e683d7a6c48897854a921e0d403f100d8eaef90a706bbd,2025-06-04T14:54:33.783000
|
||||
@ -296710,7 +296718,7 @@ CVE-2025-5497,0,0,c3fb93fb2741ce4b0d4d7875815abfbddcb0f0be37c2c2c614518d48b9a6c7
|
||||
CVE-2025-5498,0,0,3b5a38a2aa87d4a3bd8bdfa90b8081a42500b6e8cafb2140e4a5c2fe8a26b6b8,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5499,0,0,cd3d3ed5d5fb8c8fbe27922589daeaa9197814d18c151184287c55023aa5ed53,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5501,0,0,fec642688768e0515c9938a7b29759d6d9542fc6469b13587cb3286b2b89817f,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5502,0,1,99346326039ee5cdcdcfe00f2582c20a6c1d7dd58fe330abac7090df9f19ad78,2025-06-06T17:42:05.687000
|
||||
CVE-2025-5502,0,0,99346326039ee5cdcdcfe00f2582c20a6c1d7dd58fe330abac7090df9f19ad78,2025-06-06T17:42:05.687000
|
||||
CVE-2025-5503,0,0,0955847c248da4c18d595794b240de3862c80eb3860c7e19a8014999867ef785,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5504,0,0,6c560d6ba4b2d7e35dd18761fbbed3d7abd6c2042c66d950d638625a6ba59d03,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5505,0,0,446964e3eb0d4dd76d452f5358cb34395ed631d401919996fdbc4c2592cb8251,2025-06-04T14:54:33.783000
|
||||
@ -296723,12 +296731,12 @@ CVE-2025-5511,0,0,dc11727eeaf3ff134ac86f7744e483b4844b784d2fb5f0ebbc7688ff688397
|
||||
CVE-2025-5512,0,0,928bf241a04e6f233ea4797161d04d18b17e3498020465b77bbfd133375e0a8f,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5513,0,0,8b9deb8bfd077eaa06e3766c71deddefc7ec160546ad93b5bea3e81778183cb6,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5515,0,0,f79961a91b30f9e2454ef2ad8ea226c45534538ce6258faff70246141b067814,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5516,0,1,e46c0cac83b86ce3176774dfc5fcec7555beaf5b4cc847dd9f90d439ebb39443,2025-06-06T17:42:29.520000
|
||||
CVE-2025-5516,0,0,e46c0cac83b86ce3176774dfc5fcec7555beaf5b4cc847dd9f90d439ebb39443,2025-06-06T17:42:29.520000
|
||||
CVE-2025-5520,0,0,44141505222ef241703ec614a1ff4a30be75907eff83ac39140f2bf22fc427eb,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5521,0,0,2095aca7402553e86899f1ab452e6d8dccb9d483d7d614c6abf50daa71fc7d34,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5522,0,0,a6f0feb7c3dd1459fe736f4f5982460ecbcab99d78d309661631c0ee8cbfc4d4,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5523,0,0,3d6f767d22c6db3d901c9fe460993f574c4cc4a691383d638625efefbfde064b,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5525,0,1,8a6fda70c73f8d7caf337b44e8088af73f34b5d808b601ef429b01e524913c40,2025-06-06T17:27:21.350000
|
||||
CVE-2025-5525,0,0,8a6fda70c73f8d7caf337b44e8088af73f34b5d808b601ef429b01e524913c40,2025-06-06T17:27:21.350000
|
||||
CVE-2025-5527,0,0,5dead2f90bfa336b299d2790c248c3e2b665e86fc2c3c9c7ff0f4ee35f1af83c,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5531,0,0,6d27f31038761ad0a1ccad441f88039d5d4e8afb6e2422d32c208713130619d5,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5532,0,0,d307f7aa5ca0395a7c8a1bde45bdc53cca6e2426e0b9fc80212fdc7f65c5fbe7,2025-06-04T14:54:33.783000
|
||||
@ -296738,8 +296746,8 @@ CVE-2025-5536,0,0,7df71d1dab0ddadc1cf40e48870e67453a2cbb15d8332fa14fab505e504c5a
|
||||
CVE-2025-5538,0,0,762f67a9ba2152c03c8ac60e588d19c417662c15009fd5c6802487e853ce4da9,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5539,0,0,298ac745dff309bfc9c32d271927b52132f95cd6835d223a8ca6e238897e44d1,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5541,0,0,391135ebadea81125a316a68624bd1db152869e9dddfca42493d694df648dd89,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5542,0,0,d6f73127563d185f85d4ea7483a6651c4389b791fccb5a0f74ef856dec9c4d33,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5543,0,0,1d8a435ed88a5df21f363a761b25c4a0cbf09f84f022d0fbe70e5e84f11f1af7,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5542,0,1,3ecc2ef85a02a09c9be7e6dbf30040d86ff640f6ba754495a5d8dbf30a0806ed,2025-06-06T18:47:37.757000
|
||||
CVE-2025-5543,0,1,1ff545b0787bdb2f415332be5f3786ca673df4cb409c2ec190778560a2d9b13a,2025-06-06T18:47:47.150000
|
||||
CVE-2025-5544,0,0,020a516e79a3f89efe59dfb651e1ec3f5e799cf4a3d54ccd47ef877829750c60,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5545,0,0,389e1c995ff3b8301f082d6239329a262b969461cdde480fd8a11ba009de114a,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5546,0,0,c014aea6b5432f9ec15a4f9236a0abd58e7be7ace9bb9e49f7a344a566124468,2025-06-04T14:54:33.783000
|
||||
@ -296762,8 +296770,8 @@ CVE-2025-5565,0,0,69057d9fcda3a9d391a6fdd2d36028e43e46d962e75d2a96d0e0e06e8f6deb
|
||||
CVE-2025-5566,0,0,6cd1b19db0a2abdf35ae21538de449c05d1cecfb40c37f0b82d89c2ca9b4dcf9,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5569,0,0,4c30b6740d26360ebc0aa84c2a25fe04c9749eefc6a71facbba872eca1a65c71,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5571,0,0,88815a4b21737d58e162800981d93fa4afd05c1cd7a98afd3597a0eeba47b636,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5572,0,0,ca9b685d75a3c1fa1a949d4d1a510c131dde7d574a807080acd6298c1e9cc248,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5573,0,0,738f476890f8e2cd7666346bc7e6cc43335214dc033c038435905e50f2ac6faf,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5572,0,1,f58a8b0d677b3b1e3374f5b4bd151cd210da95aa5b9dd2a74ae8e59ebb8e1e16,2025-06-06T18:48:37.333000
|
||||
CVE-2025-5573,0,1,6e69e3f6614bb634486e032f3753cb8f537723c56a38d21eec74aa1f5111ea31,2025-06-06T18:48:46.463000
|
||||
CVE-2025-5574,0,0,d828c37825b04f9e6d6b2a7f019e3280cbd719b2e2fa72cc9964ddedc119f986,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5575,0,0,81a126dfb6ccad488366b77c36606cd2156f744efbd821f36b71a3dcd92de139,2025-06-05T14:07:21.913000
|
||||
CVE-2025-5576,0,0,9f8e91355100a3b7dd53af7604f262c00a18d00760bd7db63f9844a1c4222ed2,2025-06-04T18:28:36.393000
|
||||
@ -296835,24 +296843,24 @@ CVE-2025-5648,0,0,6ac7bd30998079a462b2bc55b6cfc8e5226c95680358c7ac74fbfcbda79704
|
||||
CVE-2025-5649,0,0,30d42caea517c90bf1f7021dff1f808d9270a04d62d708de625ff00d2719d5f5,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5650,0,0,2909155d6a53f122792d3e476ad36bbe0484dad5750217bd0dcf041153c745bb,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5651,0,0,24cde1636f70e4b89cb882e89c8eff4d2956b5eaffc93a7e1b7d2d1cf201e123,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5652,0,0,8a87f8eaf99a4d88a95d7891411b74b4ec9e1f9420d4d32e96d722622d8431f4,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5652,0,1,0724d88b1f9ce21bc0e0832801cf9e7e7f74020843d83266b3b7dd809f5e6ba7,2025-06-06T18:31:53.513000
|
||||
CVE-2025-5653,0,0,ebc9eb83de293a88516540da2ce2435411ee3546cd5862503970f7009364c6f2,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5654,0,0,470669381fa89a79219bdd6634bdeceab6ff857036f45afc019f916775f0a0f6,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5655,0,0,c796c17b7373b526172363b0234ec394ac17946bb8c4a3e20a583b4c47a9dc29,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5656,0,0,b338b16f85071743f3b302134535a1f857dec7cd2cee9533740ff897ea1f7bf5,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5657,0,0,71e7461c8138a6792ecd2f0932635df730ab7b98b19b67ac9a8e77bd098112dd,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5658,0,0,dcee7864d155df2523a869996e1acf244f160fa00194028f996c749af64c6996,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5659,0,0,990e75f573f949541aad2f9c14cd8bb661cce281dd970655f5ecb8436a243884,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5660,0,0,d93bfa8936934defdb85e831bc9e5ebfbff55c9ab265ac00b7e34e02faf73f8c,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5659,0,1,2e9f4a0e418de16bd3132ecd2481fb9b9879d63feb5400e7c03179d6af45fcfd,2025-06-06T18:42:31.650000
|
||||
CVE-2025-5660,0,1,d49a54f32a97bad23440ace013a3dd27ada7eeb7c7e0a58f71ba52213e92aef2,2025-06-06T18:42:59.143000
|
||||
CVE-2025-5661,0,0,8487e6a4666a69dba5b926ee889c5eb9849fbd0981bf9f397fc8b987e7d814e8,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5663,0,0,c85c62f4f2882aaabc99c9a2244b304eba3a3427a06d9ffa070775f45119e07a,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5663,0,1,8c93d873d2b9bcbc305e1d9b46e20f6f681f336f769ee36ddc277777629edd2b,2025-06-06T18:43:14.380000
|
||||
CVE-2025-5664,0,0,3013c13b7f28a8a34239b9d6327d4d3f98fd81c78564ff317f65ad36bff38c71,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5665,0,0,3cfde591a91c9aedc86fb3daccd90d9dab049587a7bfb0bf8cb91a53b3a7c91e,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5666,0,0,adc46dea78cf5d2df08a3aff0d414721e4e000d8a87176352724dcee0cf64ddb,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5667,0,0,fb9ad8936314077bd0556e4ab10f6636ff023079fcaf277e5878155eaea45611,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5668,0,0,d183036441983a427c09488fa2e462491d05d488edf66bb8ef75bbe12f2fe9d2,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5669,0,0,52ffb046c46c8b6d87fcb9f3b856748a4cce2a18ab8737f9f3cca1596d91ddfc,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5670,0,0,6bb709bbdfbb625b130a11f2f1c0d56a4e56cff4f4edbdffc064fdc51fcab56b,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5669,0,1,e41cf90831d0a6cf4929e129e10c87880a3b230cc5343d610b4f26d94c5ca251,2025-06-06T19:39:31.743000
|
||||
CVE-2025-5670,0,1,aa088ba5a44773ff1366ed76955e38f916db102440b97c97a352678ba98d3d07,2025-06-06T19:40:14.910000
|
||||
CVE-2025-5671,0,0,e1cb68a1a7e0ce2770bac37bb536d1554569874249823872f4fc248121eb36fe,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5672,0,0,bec0b00b183687e8a6e63d1c861d9a4aaa1eb1c6829029f9f585e4f4a769b3ca,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5674,0,0,f090282830840d43410a45e8dd19b0b1f93ee5e6b318e39fe0e7b2a1ab816f34,2025-06-05T20:12:23.777000
|
||||
@ -296862,7 +296870,7 @@ CVE-2025-5677,0,0,a001ea9b76f78f3f1863e938aa2b1752ac60e19c978feacb4aa67789658c45
|
||||
CVE-2025-5679,0,0,59c0e847ad907b313509a8a7262ed706ea6357cc7a8feeba56ceeee73456c780,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5680,0,0,951e9727eb6f85cb1826e5addda531b5a3ed92e200dcd69a9572852fb51b7dd6,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5683,0,0,1a3b3cb960b03a08fa5b7c4079149ff9fe6c9f4a5d5c8b0f22c43f750a1037ab,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5685,0,1,41f30934d37a68c0b6e306b8453424d3ff8a24b4556b1bfb8e01e5aa7db29ca9,2025-06-06T16:15:29.510000
|
||||
CVE-2025-5685,0,0,41f30934d37a68c0b6e306b8453424d3ff8a24b4556b1bfb8e01e5aa7db29ca9,2025-06-06T16:15:29.510000
|
||||
CVE-2025-5686,0,0,ceecb4c8c9b6240c3c4cf6461703c0b505d1b9b8eeadd71aabaf7a72390230d4,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5688,0,0,8859de4a9377955821b5e59f7a118128be39b8ffcd1a35e1ff851cd9073a522a,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5690,0,0,2e6ec95a91973b0c3c4a92b7ee6f9cd8669b2bfbe2e8890344ec60c22753f2e7,2025-06-05T20:12:23.777000
|
||||
@ -296908,11 +296916,11 @@ CVE-2025-5737,0,0,08daa88b0f47d96d464bb5d9df986f1f88b3c61d0636f7d9794766640f13fa
|
||||
CVE-2025-5738,0,0,40160f872c6c36d854905fad1108d58a096f60c1e64b8c34f437851763611290,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5739,0,0,a0de668636e833e77f2e9d40411491def3e08bcb75e4e696079fb6b5aab62971,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5745,0,0,3580be19c456f8a1a42e4194fda4fe5138a1c28c64f6ee9c28042cef6c57327d,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5747,1,1,22d5519f083be3f8d2a8c9eea97154a8a75de23ff5e22d049c2d58ba3d765e71,2025-06-06T16:15:29.803000
|
||||
CVE-2025-5748,1,1,d86ec27e31fd48801eed64b3d420979b10c849d0943186d84a02d1e8c61f06e3,2025-06-06T16:15:29.973000
|
||||
CVE-2025-5749,1,1,5f07eda7d9ba20a4657ed395d1656f3428448552c8d1d495fde6b025a8cbed2e,2025-06-06T16:15:30.120000
|
||||
CVE-2025-5750,1,1,d4ab220caeb76541db4ea4ba45af1a7a5802a84991eb08604daaac3330e5d24f,2025-06-06T16:15:30.273000
|
||||
CVE-2025-5751,1,1,69076bbb32593cf710292aa1be54c2442edb0bb6cc30f685087289be2ca2f2b7,2025-06-06T16:15:30.413000
|
||||
CVE-2025-5747,0,0,22d5519f083be3f8d2a8c9eea97154a8a75de23ff5e22d049c2d58ba3d765e71,2025-06-06T16:15:29.803000
|
||||
CVE-2025-5748,0,0,d86ec27e31fd48801eed64b3d420979b10c849d0943186d84a02d1e8c61f06e3,2025-06-06T16:15:29.973000
|
||||
CVE-2025-5749,0,0,5f07eda7d9ba20a4657ed395d1656f3428448552c8d1d495fde6b025a8cbed2e,2025-06-06T16:15:30.120000
|
||||
CVE-2025-5750,0,0,d4ab220caeb76541db4ea4ba45af1a7a5802a84991eb08604daaac3330e5d24f,2025-06-06T16:15:30.273000
|
||||
CVE-2025-5751,0,0,69076bbb32593cf710292aa1be54c2442edb0bb6cc30f685087289be2ca2f2b7,2025-06-06T16:15:30.413000
|
||||
CVE-2025-5755,0,0,28839a4284836d06b3eb4221f50b293458c660e12fcab8d4c7841bb6d8cb6c7a,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5756,0,0,983cab85761c36f1e1ac2363ae99121e28a102ce2360578e9cd88c0e790262ab,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5757,0,0,135c18e20d949031e9ce20b6a79d8818b9e53edc58f52d0f7788e7c2403d1718,2025-06-06T14:07:28.330000
|
||||
@ -296929,11 +296937,19 @@ CVE-2025-5778,0,0,7dd65f7b7d2079765d1c512eea3927ac3c646f8994e80c20cc78a723151d53
|
||||
CVE-2025-5779,0,0,b858bce2d1721a2ca6d0d019547451287def5b486cf9ff2d2fad7fb1ad003372,2025-06-06T15:15:27.177000
|
||||
CVE-2025-5780,0,0,a79d5bde6de9888e44d84f63ec0737d64a7984794aa0da81a48131d9e8e51862,2025-06-06T15:15:27.377000
|
||||
CVE-2025-5782,0,0,865cb59b6e6b56132012beaa7e218524dc300348ded3d8f9dcd3df0750fe6449,2025-06-06T15:15:27.557000
|
||||
CVE-2025-5783,1,1,eb7629d6e871a5ce50ba18dc59b688484697dd4904a8b7b212df38655ce738e2,2025-06-06T16:15:30.960000
|
||||
CVE-2025-5784,1,1,70d455f6ee88efdac40963af74a25cee89588a1583d5a5c837d38d806e9590ef,2025-06-06T16:15:31.180000
|
||||
CVE-2025-5785,1,1,361ed2e9929bd986f8e364266b2b1015221efe4c9e553e488ffb26ccf656b07c,2025-06-06T16:15:31.370000
|
||||
CVE-2025-5786,1,1,a3c7640def0bc2caebf515a3375c80f49c2cd1584462164c628634750210c4db,2025-06-06T17:15:39.037000
|
||||
CVE-2025-5787,1,1,8fb5d0c9a0922f6975e303c4a28ae967b1efa29d1c5a20cd9a2bad475ac5f635,2025-06-06T17:15:40.630000
|
||||
CVE-2025-5788,1,1,60dd3c5365aac2f4f1565cf49e3038f104fe13ca6eda25144b7b3512d60e5de2,2025-06-06T17:15:41.797000
|
||||
CVE-2025-5783,0,0,eb7629d6e871a5ce50ba18dc59b688484697dd4904a8b7b212df38655ce738e2,2025-06-06T16:15:30.960000
|
||||
CVE-2025-5784,0,0,70d455f6ee88efdac40963af74a25cee89588a1583d5a5c837d38d806e9590ef,2025-06-06T16:15:31.180000
|
||||
CVE-2025-5785,0,0,361ed2e9929bd986f8e364266b2b1015221efe4c9e553e488ffb26ccf656b07c,2025-06-06T16:15:31.370000
|
||||
CVE-2025-5786,0,0,a3c7640def0bc2caebf515a3375c80f49c2cd1584462164c628634750210c4db,2025-06-06T17:15:39.037000
|
||||
CVE-2025-5787,0,0,8fb5d0c9a0922f6975e303c4a28ae967b1efa29d1c5a20cd9a2bad475ac5f635,2025-06-06T17:15:40.630000
|
||||
CVE-2025-5788,0,0,60dd3c5365aac2f4f1565cf49e3038f104fe13ca6eda25144b7b3512d60e5de2,2025-06-06T17:15:41.797000
|
||||
CVE-2025-5789,1,1,333389dc54f6208be11c93c03d375d5fb9bd2bd30bfcc2fc0f7eacb3d14317eb,2025-06-06T18:15:35.650000
|
||||
CVE-2025-5790,1,1,39c11c121a77d487a0b0c7947fb18590cbb86e05dd264a93a0ba9b6e05670d5f,2025-06-06T18:15:35.840000
|
||||
CVE-2025-5791,0,0,4f64f57ffbcb47b155f217980406fa0c16d85c7d46fc83efc6ae0930e3d8ae52,2025-06-06T14:15:23.137000
|
||||
CVE-2025-5806,0,1,79933e1939f5bacaa56d4bc6218de84ebab11db530a087d329b01c15373f4e0d,2025-06-06T16:15:31.560000
|
||||
CVE-2025-5792,1,1,7defe825b7fe3099a7d2d69432cf358752c0d539c6590c8abc6d472feac2f339,2025-06-06T18:15:36.030000
|
||||
CVE-2025-5793,1,1,30ac5ca9089d062b3d4345fd7fad55ed1214a8cd144a2c8fba58fe48429537d2,2025-06-06T18:15:36.227000
|
||||
CVE-2025-5794,1,1,3f65c0d7298169a109cf0baabde8ecd5a15519770db304978c850a9071131391,2025-06-06T19:15:28.393000
|
||||
CVE-2025-5795,1,1,cc1a92a566920098ab15eb4a4114f8f42e0b319eb8a4d01ad7cb6009fadd75b2,2025-06-06T19:15:28.617000
|
||||
CVE-2025-5796,1,1,3cc1480c7cc1ebb4a1cd22150b9ab428e5376bc40b32f998106b4d663b5dfc11,2025-06-06T19:15:28.817000
|
||||
CVE-2025-5797,1,1,196ce35a658b91cc18ab5dfbb97ee346217de7ce5826d6722d929ab609520310,2025-06-06T19:15:29.020000
|
||||
CVE-2025-5806,0,0,79933e1939f5bacaa56d4bc6218de84ebab11db530a087d329b01c15373f4e0d,2025-06-06T16:15:31.560000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user