Auto-Update: 2025-07-03T22:00:12.312723+00:00

This commit is contained in:
cad-safe-bot 2025-07-03 22:03:49 +00:00
parent a74312c6f0
commit b08f3b98de
48 changed files with 2288 additions and 188 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-13065",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-07-03T12:29:00.280",
"lastModified": "2024-11-21T03:46:19.947",
"lastModified": "2025-07-03T20:59:18.650",
"vulnStatus": "Modified",
"cveTags": [
{
@ -92,8 +92,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trustwave:modsecurity:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FDF4D909-3D3C-4892-AB0A-4ED0D5892D27"
"criteria": "cpe:2.3:a:owasp:modsecurity:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BD24C8F2-171D-4F9B-A330-8C5AB8A0AB8A"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19886",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-21T22:15:15.667",
"lastModified": "2024-11-21T04:35:35.320",
"lastModified": "2025-07-03T20:59:18.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -85,10 +85,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndIncluding": "3.0.3",
"matchCriteriaId": "7055FD9B-AAC8-4DD0-9A8E-F4706D9B9567"
"matchCriteriaId": "BC1A8633-B080-4068-84D1-B78F169C8433"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-25043",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-06T17:15:07.870",
"lastModified": "2024-11-21T04:39:48.770",
"lastModified": "2025-07-03T20:59:18.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -85,10 +85,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.4",
"matchCriteriaId": "AD97575A-E930-4326-9DA8-6FED031AAE9E"
"matchCriteriaId": "13225CD3-317E-4091-BD30-C747AD5AD6D3"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-15598",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-10-06T14:15:12.197",
"lastModified": "2024-11-21T05:05:49.910",
"lastModified": "2025-07-03T20:59:18.650",
"vulnStatus": "Modified",
"cveTags": [
{
@ -92,10 +92,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndIncluding": "3.0.4",
"matchCriteriaId": "ADACE97D-F823-4A69-B0A3-065D7AFACCB2"
"matchCriteriaId": "11AA43E8-866E-45AD-91B6-06AAC118DECC"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-20455",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-07T16:15:27.430",
"lastModified": "2025-01-07T16:15:27.430",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:49:27.313",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndIncluding": "11.0.1",
"matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7179163",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-42717",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-07T22:15:06.950",
"lastModified": "2024-11-21T06:28:01.980",
"lastModified": "2025-07-03T20:59:18.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -85,17 +85,17 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.9.5",
"matchCriteriaId": "A7085082-64B3-4129-89D3-DCABF3C627A4"
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.6",
"matchCriteriaId": "989FAEB2-1A84-481E-BB56-793113C4714C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.6",
"matchCriteriaId": "8A1F00F0-6D1E-42BC-850E-BFBB7685BE0C"
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.9.5",
"matchCriteriaId": "A7085082-64B3-4129-89D3-DCABF3C627A4"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-22363",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-07T16:15:28.050",
"lastModified": "2025-01-07T16:15:28.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:49:29.930",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndIncluding": "11.0.1",
"matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7179163",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39163",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-03-26T14:15:20.793",
"lastModified": "2025-03-27T16:45:27.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:52:01.790",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndIncluding": "11.0.1",
"matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7192746",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48279",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-20T19:15:17.783",
"lastModified": "2025-04-03T19:15:38.917",
"lastModified": "2025-07-03T20:59:18.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -90,16 +90,16 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.9.6",
"matchCriteriaId": "54497FC8-5BF6-4E81-9C7E-F01AEBCB2AD1"
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.8",
"matchCriteriaId": "69019657-283B-4BA6-8983-57318F8736EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.8",
"matchCriteriaId": "D3B974C9-92E4-4493-9C5F-8CF1F8A74068"
"versionEndExcluding": "2.9.6",
"matchCriteriaId": "54497FC8-5BF6-4E81-9C7E-F01AEBCB2AD1"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28882",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-28T04:15:38.017",
"lastModified": "2025-01-30T21:15:10.640",
"lastModified": "2025-07-03T20:59:18.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -86,10 +86,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.5",
"versionEndExcluding": "3.0.9",
"matchCriteriaId": "E45908C1-75D7-49A7-86EE-07B4305BDA04"
"matchCriteriaId": "F57A821A-277E-4B3D-BC5D-395812BF62A1"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38285",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-26T21:15:10.207",
"lastModified": "2024-11-21T08:13:13.803",
"lastModified": "2025-07-03T20:59:18.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -56,10 +56,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.10",
"matchCriteriaId": "314D5544-E20D-482F-9F39-DE5AA72B1972"
"matchCriteriaId": "792A16CE-6CB0-40F7-AC60-157D78EF3B6E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1019",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-01-30T16:15:47.123",
"lastModified": "2025-02-13T18:16:18.837",
"lastModified": "2025-07-03T20:59:18.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -90,10 +90,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.12",
"matchCriteriaId": "52EBFAFE-523F-46B7-9631-4FA866ABC2D0"
"matchCriteriaId": "2DEAC2CF-18AC-4EE6-960B-D07FD3ABBCA5"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25037",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-07T16:15:32.937",
"lastModified": "2025-01-07T16:15:32.937",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:49:32.580",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndIncluding": "11.0.1",
"matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7179163",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25048",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-04-27T12:15:10.517",
"lastModified": "2024-11-21T09:00:09.860",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:45:20.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,60 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "9.3.0.0",
"versionEndExcluding": "9.3.0.17",
"matchCriteriaId": "82C3FB30-0B59-4831-A99E-542B8EA1A39D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*",
"versionStartIncluding": "9.3.0.0",
"versionEndExcluding": "9.3.5",
"matchCriteriaId": "FC53A9D0-EC7C-4576-9D95-59BDE4DFCA99"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283137",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7149481",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283137",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7149481",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28778",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-07T16:15:33.113",
"lastModified": "2025-01-07T16:15:33.113",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:49:35.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndIncluding": "11.0.1",
"matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7179163",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31879",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-18T16:15:47.253",
"lastModified": "2024-11-21T09:14:04.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:54:15.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,73 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287539",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7154380",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287539",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7154380",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35122",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-24T18:15:31.680",
"lastModified": "2025-01-24T18:15:31.680",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:54:09.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,69 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7178317",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40702",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-07T16:15:33.463",
"lastModified": "2025-01-07T16:15:33.463",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:49:39.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndIncluding": "11.0.1",
"matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7179163",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47104",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-12-18T11:15:05.763",
"lastModified": "2024-12-18T11:15:05.763",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:54:13.533",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,47 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7179158",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51463",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-12-21T14:15:21.453",
"lastModified": "2024-12-21T14:15:21.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:54:12.200",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,52 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7179509",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51464",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-12-21T14:15:21.627",
"lastModified": "2024-12-31T07:15:11.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:54:10.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,59 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7179509",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Dec/20",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51471",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-12-19T18:15:23.153",
"lastModified": "2024-12-19T18:15:23.153",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:23:41.563",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "9.3.0.0",
"versionEndIncluding": "9.3.0.26",
"matchCriteriaId": "EA509E6E-9C3B-4468-AD5B-58132A4E181F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*",
"versionStartIncluding": "9.3.0.0",
"versionEndIncluding": "9.4.0.7",
"matchCriteriaId": "EF207429-0AA6-4061-83E8-3DE1DC9C38BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "9.4.0.0",
"versionEndIncluding": "9.4.0.7",
"matchCriteriaId": "F6E0C4F1-A99A-4529-B112-E09801488CC6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7178243",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52895",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-14T15:15:09.210",
"lastModified": "2025-02-14T15:15:09.210",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:54:07.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,52 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C189EC3-7D9F-4303-BB5C-1013FAE59B1E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183052",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52898",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-14T17:15:17.513",
"lastModified": "2025-01-14T17:15:17.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:10:10.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,68 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq:*:*:*:*:continuous_delivery:*:*:*",
"versionStartIncluding": "9.3.0",
"versionEndIncluding": "9.4.1.1",
"matchCriteriaId": "28ABEF51-4E90-4FBB-860F-90B998AA1566"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "9.3.0.0",
"versionEndIncluding": "9.3.0.26",
"matchCriteriaId": "13020BB1-FE49-496E-A07B-C0A9FA3C90B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "9.4.0.0",
"versionEndIncluding": "9.4.0.7",
"matchCriteriaId": "EDBDC0CD-0CDB-45F2-92F6-23FB06DC4C69"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:ibm:linux_on_ibm_z:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B955E472-47E3-4C32-847B-F6BB05594BA3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7179150",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54173",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-28T03:15:09.357",
"lastModified": "2025-02-28T03:15:09.357",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:44:08.330",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*",
"versionEndExcluding": "9.4.2",
"matchCriteriaId": "55660FDA-F75A-4E16-B669-460A7AE0257D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "9.3.0.0",
"versionEndExcluding": "9.3.0.27",
"matchCriteriaId": "ADBA5611-3469-4892-9634-CDF2B50C07A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "9.4.0.0",
"versionEndExcluding": "9.4.0.10",
"matchCriteriaId": "83CB7333-6E78-431C-AEE1-AB60FEB0425F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183370",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55898",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-24T02:15:31.940",
"lastModified": "2025-02-24T02:15:31.940",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:52:55.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,57 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183835",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0975",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-28T03:15:10.653",
"lastModified": "2025-02-28T03:15:10.653",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:41:35.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*",
"versionStartIncluding": "9.3.0",
"versionEndIncluding": "9.4.2",
"matchCriteriaId": "F690720D-CBF3-4021-8CBC-8B208C438A6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "9.3.0.0",
"versionEndIncluding": "9.3.0.27",
"matchCriteriaId": "4612ED09-CAC4-44A2-A638-C7D41DB68D79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "9.4.0.0",
"versionEndIncluding": "9.4.0.10",
"matchCriteriaId": "88ABC52C-FBCA-4647-AE56-0969138712CA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183467",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23225",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-28T03:15:10.807",
"lastModified": "2025-02-28T03:15:10.807",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:25:35.343",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*",
"versionEndIncluding": "9.4.2",
"matchCriteriaId": "0938AD98-E093-4E0E-B0FB-2257E9DF2159"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "9.3.0.0",
"versionEndIncluding": "9.3.0.27",
"matchCriteriaId": "4612ED09-CAC4-44A2-A638-C7D41DB68D79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "9.4.0.0",
"versionEndIncluding": "9.4.0.10",
"matchCriteriaId": "88ABC52C-FBCA-4647-AE56-0969138712CA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183372",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-2866",
"sourceIdentifier": "security@documentfoundation.org",
"published": "2025-04-27T19:15:15.137",
"lastModified": "2025-05-12T19:05:52.590",
"lastModified": "2025-07-03T21:26:26.980",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -66,20 +66,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2950",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-04-18T15:15:58.937",
"lastModified": "2025-04-21T14:23:45.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:53:15.263",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,57 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C189EC3-7D9F-4303-BB5C-1013FAE59B1E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7231320",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3218",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-07T02:15:31.860",
"lastModified": "2025-05-07T14:13:20.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:53:29.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,62 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C189EC3-7D9F-4303-BB5C-1013FAE59B1E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7232750",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-33122",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-17T18:15:25.580",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:53:32.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 could allow a user to gain elevated privileges due to an unqualified library call in IBM Advanced Job Scheduler for i. A malicious actor could cause user-controlled code to run with administrator privilege."
},
{
"lang": "es",
"value": "IBM i 7.2, 7.3, 7.4, 7.5 y 7.6 podr\u00eda permitir que un usuario obtenga privilegios elevados debido a una llamada de librer\u00eda no cualificada en IBM Advanced Job Scheduler para i. Un agente malicioso podr\u00eda provocar que c\u00f3digo controlado por el usuario se ejecute con privilegios de administrador."
}
],
"metrics": {
@ -47,10 +51,62 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C189EC3-7D9F-4303-BB5C-1013FAE59B1E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7237040",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-34061",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-03T20:15:21.570",
"lastModified": "2025-07-03T20:15:21.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A backdoor in PHPStudy versions 2016 through 2018 allows unauthenticated remote attackers to execute arbitrary PHP code on affected installations. The backdoor listens for base64-encoded PHP payloads in the Accept-Charset HTTP header of incoming requests, decodes and executes the payload without proper validation. This leads to remote code execution as the web server user, compromising the affected system."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/phpstudy_backdoor_rce.rb",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.xp.cn/phpstudy",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-34082",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-03T20:15:22.540",
"lastModified": "2025-07-03T20:15:22.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command injection vulnerability exists in IGEL OS versions prior to 11.04.270 within the Secure Terminal and Secure Shadow services. The flaw arises due to improper input sanitization in the handling of specially crafted PROXYCMD commands on TCP ports 30022 and 5900. An unauthenticated attacker with network access to a vulnerable device can inject arbitrary commands, leading to remote code execution with elevated privileges.\n\nNOTE: IGEL OS v10.x has reached end-of-life (EOL) status."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://kb.igel.com/security-safety/current/isn-2021-01-igel-os-remote-command-execution-vulne",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/misc/igel_command_injection.rb",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/igel-os-secure-terminal-shadow-rce",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.igel.com/wp-content/uploads/2021/02/lxos_11.04.270.txt",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,102 @@
{
"id": "CVE-2025-34086",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-03T20:15:22.683",
"lastModified": "2025-07-03T20:15:22.683",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Bolt CMS versions 3.7.0 and earlier contain a chain of vulnerabilities that together allow an authenticated user to achieve remote code execution. A user with valid credentials can inject arbitrary PHP code into the displayname field of the user profile, which is rendered unsanitized in backend templates. The attacker can then list and rename cached session files via the /async/browse/cache/.sessions and /async/folder/rename endpoints. By renaming a .session file to a path under the publicly accessible /files/ directory with a .php extension, the attacker can turn the injected code into an executable web shell. Finally, the attacker triggers the payload via a crafted HTTP GET request to the rogue file.\n\nNOTE: The vendor announced that Bolt 3 reached end-of-life after 31 December 2021."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://boltcms.io/newsitem/major-announcements-bolt-3-eol-bolt-4-2-5-0-releases",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://github.com/bolt/bolt",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://github.com/bolt/bolt/releases/tag/3.7.1",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/bolt_authenticated_rce.rb",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/48296",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.rapid7.com/db/modules/exploit/unix/webapp/bolt_authenticated_rce/",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,94 @@
{
"id": "CVE-2025-34087",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-03T20:15:22.843",
"lastModified": "2025-07-03T20:15:22.843",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated command injection vulnerability exists in Pi-hole versions up to 3.3. When adding a domain to the allowlist via the web interface, the domain parameter is not properly sanitized, allowing an attacker to append OS commands to the domain string. These commands are executed on the underlying operating system with the privileges of the Pi-hole service user.\n\n\n\n\nThis behavior was present in the legacy AdminLTE interface and has since been patched in later versions."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/pi-hole/web/releases/tag/v4.0",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://pi-hole.net/",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://pulsesecurity.co.nz/advisories/pihole-v3.3-vulns",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/http/pihole_whitelist_exec.rb",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/pihole-adminlte-whitelist-rce",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,94 @@
{
"id": "CVE-2025-34088",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-03T20:15:23.007",
"lastModified": "2025-07-03T20:15:23.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated remote code execution vulnerability exists in Pandora FMS version 7.0NG and earlier. The net_tools.php functionality allows authenticated users to execute arbitrary OS commands via the select_ips parameter when performing network tools operations, such as pinging. This occurs because user input is not properly sanitized before being passed to system commands, enabling command injection."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/pandorafms/pandorafms",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/pandora_ping_cmd_exec.rb",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/pandora-fms-rce-via-ping",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/48334",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.rapid7.com/db/modules/exploit/linux/http/pandora_ping_cmd_exec/",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,98 @@
{
"id": "CVE-2025-34089",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-03T20:15:23.157",
"lastModified": "2025-07-03T20:15:23.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote code execution vulnerability exists in Remote for Mac, a macOS remote control utility developed by Aexol Studio, in versions up to and including 2025.7. When the application is configured with authentication disabled (i.e., the \"Allow unknown devices\" option is enabled), the /api/executeScript endpoint is exposed without access control. This allows unauthenticated remote attackers to inject arbitrary AppleScript payloads via the X-Script HTTP header, resulting in code execution using do shell script. Successful exploitation grants attackers the ability to run arbitrary commands on the macOS host with the privileges of the Remote for Mac background process."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
},
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://apps.apple.com/us/app/remote-for-mac/id1086962925",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://packetstorm.news/files/id/195347",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/osx/http/remote_for_mac_rce.rb",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/remote-for-mac-rce",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.rapid7.com/db/modules/exploit/osx/http/remote_for_mac_rce/",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-36004",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-25T03:15:27.687",
"lastModified": "2025-06-26T18:58:14.280",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-03T20:53:35.667",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,57 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7237732",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2025-49005",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T21:15:26.787",
"lastModified": "2025-07-03T21:15:26.787",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Next.js is a React framework for building full-stack web applications. In Next.js App Router from 15.3.0 to before 15.3.3 and Vercel CLI from 41.4.1 to 42.2.0, a cache poisoning vulnerability was found. The issue allowed page requests for HTML content to return a React Server Component (RSC) payload instead under certain conditions. When deployed to Vercel, this would only impact the browser cache, and would not lead to the CDN being poisoned. When self-hosted and deployed externally, this could lead to cache poisoning if the CDN does not properly distinguish between RSC / HTML in the cache keys. This issue has been resolved in Next.js 15.3.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-444"
}
]
}
],
"references": [
{
"url": "https://github.com/vercel/next.js/commit/ec202eccf05820b60c6126d6411fe16766ecc066",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vercel/next.js/issues/79346",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vercel/next.js/releases/tag/v15.3.3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vercel/next.js/security/advisories/GHSA-r2fc-ccr8-96c4",
"source": "security-advisories@github.com"
},
{
"url": "https://vercel.com/changelog/cve-2025-49005",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-49826",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T21:15:27.287",
"lastModified": "2025-07-03T21:15:27.287",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Next.js is a React framework for building full-stack web applications. From versions 15.1.0 to before 15.1.8, a cache poisoning bug leading to a Denial of Service (DoS) condition was found in Next.js. This issue does not impact customers hosted on Vercel. Under certain conditions, this issue may allow a HTTP 204 response to be cached for static pages, leading to the 204 response being served to all users attempting to access the page. This issue has been addressed in version 15.1.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-444"
}
]
}
],
"references": [
{
"url": "https://github.com/vercel/next.js/commit/a15b974ed707d63ad4da5b74c1441f5b7b120e93",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vercel/next.js/releases/tag/v15.1.8",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vercel/next.js/security/advisories/GHSA-67rr-84xm-4c7r",
"source": "security-advisories@github.com"
},
{
"url": "https://vercel.com/changelog/cve-2025-49826",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-52554",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T20:15:23.423",
"lastModified": "2025-07-03T20:15:23.423",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "n8n is a workflow automation platform. Prior to version 1.99.1, an authorization vulnerability was discovered in the /rest/executions/:id/stop endpoint of n8n. An authenticated user can stop workflow executions that they do not own or that have not been shared with them, leading to potential business disruption. This issue has been patched in version 1.99.1. A workaround involves restricting access to the /rest/executions/:id/stop endpoint via reverse proxy or API gateway."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://github.com/dudanogueira/n8n/commit/ca2f90c7fbaa1d661ade2f45d587d9469bc287e1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/n8n-io/n8n/commit/e5edc60e344924230baafb11fa1f0af788e9ca9a",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/n8n-io/n8n/pull/16405",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/n8n-io/n8n/security/advisories/GHSA-gq57-v332-7666",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-53367",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T21:15:27.493",
"lastModified": "2025-07-03T21:15:27.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DjVuLibre is a GPL implementation of DjVu, a web-centric format for distributing documents and images. Prior to version 3.5.29, the MMRDecoder::scanruns method is affected by an OOB-write vulnerability, because it does not check that the xr pointer stays within the bounds of the allocated buffer. This can lead to writes beyond the allocated memory, resulting in a heap corruption condition. An out-of-bounds read with pr is also possible for the same reason. This issue has been patched in version 3.5.29."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://github.blog/security/vulnerability-research/cve-2025-53367-an-exploitable-out-of-bounds-write-in-djvulibre/",
"source": "security-advisories@github.com"
},
{
"url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/33f645196593d70bd5e37f55b63886c31c82c3da",
"source": "security-advisories@github.com"
},
{
"url": "https://www.openwall.com/lists/oss-security/2025/07/03/1",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-53368",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T20:15:23.577",
"lastModified": "2025-07-03T20:15:23.577",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. From versions 1.9.4 to before 3.4.0, page descriptions are inserted into raw HTML without proper sanitization by the Citizen skin when using the old search bar. Any user with page editing privileges can insert cross-site scripting (XSS) payloads into the DOM for other users who are searching for specific pages. This issue has been patched in version 3.4.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/commit/aedbceb3380bb48db6b59e272fc187529c71c8ca",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/releases/tag/v3.4.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-rq6g-6g94-jfr4",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-53369",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T20:15:23.737",
"lastModified": "2025-07-03T20:15:23.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Short Description is a MediaWiki extension that provides local short description support. In version 4.0.0, short descriptions are not properly sanitized before being inserted as HTML using mw.util.addSubtitle, allowing any user to insert arbitrary HTML into the DOM by editing a page. This issue has been patched in version 4.0.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/StarCitizenTools/mediawiki-extensions-ShortDescription/commit/bc4fdbaeb1dff127fb6d08c0d385b64aa128c8f8",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/StarCitizenTools/mediawiki-extensions-ShortDescription/security/advisories/GHSA-p85q-mww9-gwqf",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-53370",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T20:15:23.893",
"lastModified": "2025-07-03T20:15:23.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. From versions 1.9.4 to before 3.4.0, short descriptions set via the ShortDescription extension are inserted as raw HTML by the Citizen skin, allowing any user to insert arbitrary HTML into the DOM by editing a page. This issue has been patched in version 3.4.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/commit/c85a40bddc8651fff66df83a72debddcb34f0521",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/releases/tag/v3.4.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-prmv-7r8c-794g",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-07-03T20:00:10.776070+00:00
2025-07-03T22:00:12.312723+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-07-03T19:55:16.553000+00:00
2025-07-03T21:26:26.980000+00:00
```
### Last Data Feed Release
@ -33,33 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
300236
300249
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `13`
- [CVE-2025-23968](CVE-2025/CVE-2025-239xx/CVE-2025-23968.json) (`2025-07-03T19:15:23.043`)
- [CVE-2025-45809](CVE-2025/CVE-2025-458xx/CVE-2025-45809.json) (`2025-07-03T19:15:24.027`)
- [CVE-2025-34061](CVE-2025/CVE-2025-340xx/CVE-2025-34061.json) (`2025-07-03T20:15:21.570`)
- [CVE-2025-34082](CVE-2025/CVE-2025-340xx/CVE-2025-34082.json) (`2025-07-03T20:15:22.540`)
- [CVE-2025-34086](CVE-2025/CVE-2025-340xx/CVE-2025-34086.json) (`2025-07-03T20:15:22.683`)
- [CVE-2025-34087](CVE-2025/CVE-2025-340xx/CVE-2025-34087.json) (`2025-07-03T20:15:22.843`)
- [CVE-2025-34088](CVE-2025/CVE-2025-340xx/CVE-2025-34088.json) (`2025-07-03T20:15:23.007`)
- [CVE-2025-34089](CVE-2025/CVE-2025-340xx/CVE-2025-34089.json) (`2025-07-03T20:15:23.157`)
- [CVE-2025-49005](CVE-2025/CVE-2025-490xx/CVE-2025-49005.json) (`2025-07-03T21:15:26.787`)
- [CVE-2025-49826](CVE-2025/CVE-2025-498xx/CVE-2025-49826.json) (`2025-07-03T21:15:27.287`)
- [CVE-2025-52554](CVE-2025/CVE-2025-525xx/CVE-2025-52554.json) (`2025-07-03T20:15:23.423`)
- [CVE-2025-53367](CVE-2025/CVE-2025-533xx/CVE-2025-53367.json) (`2025-07-03T21:15:27.493`)
- [CVE-2025-53368](CVE-2025/CVE-2025-533xx/CVE-2025-53368.json) (`2025-07-03T20:15:23.577`)
- [CVE-2025-53369](CVE-2025/CVE-2025-533xx/CVE-2025-53369.json) (`2025-07-03T20:15:23.737`)
- [CVE-2025-53370](CVE-2025/CVE-2025-533xx/CVE-2025-53370.json) (`2025-07-03T20:15:23.893`)
### CVEs modified in the last Commit
Recently modified CVEs: `12`
Recently modified CVEs: `33`
- [CVE-2023-45177](CVE-2023/CVE-2023-451xx/CVE-2023-45177.json) (`2025-07-03T19:37:40.087`)
- [CVE-2024-10013](CVE-2024/CVE-2024-100xx/CVE-2024-10013.json) (`2025-07-03T18:30:06.820`)
- [CVE-2024-3892](CVE-2024/CVE-2024-38xx/CVE-2024-3892.json) (`2025-07-03T18:30:06.820`)
- [CVE-2024-52896](CVE-2024/CVE-2024-528xx/CVE-2024-52896.json) (`2025-07-03T19:52:42.310`)
- [CVE-2024-52897](CVE-2024/CVE-2024-528xx/CVE-2024-52897.json) (`2025-07-03T19:55:16.553`)
- [CVE-2025-0332](CVE-2025/CVE-2025-03xx/CVE-2025-0332.json) (`2025-07-03T18:30:06.820`)
- [CVE-2025-53489](CVE-2025/CVE-2025-534xx/CVE-2025-53489.json) (`2025-07-03T18:15:21.710`)
- [CVE-2025-53490](CVE-2025/CVE-2025-534xx/CVE-2025-53490.json) (`2025-07-03T18:15:22.000`)
- [CVE-2025-53500](CVE-2025/CVE-2025-535xx/CVE-2025-53500.json) (`2025-07-03T18:15:22.140`)
- [CVE-2025-53501](CVE-2025/CVE-2025-535xx/CVE-2025-53501.json) (`2025-07-03T18:15:22.300`)
- [CVE-2025-53502](CVE-2025/CVE-2025-535xx/CVE-2025-53502.json) (`2025-07-03T18:15:22.530`)
- [CVE-2025-6926](CVE-2025/CVE-2025-69xx/CVE-2025-6926.json) (`2025-07-03T18:15:22.797`)
- [CVE-2022-48279](CVE-2022/CVE-2022-482xx/CVE-2022-48279.json) (`2025-07-03T20:59:18.650`)
- [CVE-2023-28882](CVE-2023/CVE-2023-288xx/CVE-2023-28882.json) (`2025-07-03T20:59:18.650`)
- [CVE-2023-38285](CVE-2023/CVE-2023-382xx/CVE-2023-38285.json) (`2025-07-03T20:59:18.650`)
- [CVE-2024-1019](CVE-2024/CVE-2024-10xx/CVE-2024-1019.json) (`2025-07-03T20:59:18.650`)
- [CVE-2024-25037](CVE-2024/CVE-2024-250xx/CVE-2024-25037.json) (`2025-07-03T20:49:32.580`)
- [CVE-2024-25048](CVE-2024/CVE-2024-250xx/CVE-2024-25048.json) (`2025-07-03T20:45:20.627`)
- [CVE-2024-28778](CVE-2024/CVE-2024-287xx/CVE-2024-28778.json) (`2025-07-03T20:49:35.697`)
- [CVE-2024-31879](CVE-2024/CVE-2024-318xx/CVE-2024-31879.json) (`2025-07-03T20:54:15.167`)
- [CVE-2024-35122](CVE-2024/CVE-2024-351xx/CVE-2024-35122.json) (`2025-07-03T20:54:09.190`)
- [CVE-2024-40702](CVE-2024/CVE-2024-407xx/CVE-2024-40702.json) (`2025-07-03T20:49:39.400`)
- [CVE-2024-47104](CVE-2024/CVE-2024-471xx/CVE-2024-47104.json) (`2025-07-03T20:54:13.533`)
- [CVE-2024-51463](CVE-2024/CVE-2024-514xx/CVE-2024-51463.json) (`2025-07-03T20:54:12.200`)
- [CVE-2024-51464](CVE-2024/CVE-2024-514xx/CVE-2024-51464.json) (`2025-07-03T20:54:10.780`)
- [CVE-2024-51471](CVE-2024/CVE-2024-514xx/CVE-2024-51471.json) (`2025-07-03T20:23:41.563`)
- [CVE-2024-52895](CVE-2024/CVE-2024-528xx/CVE-2024-52895.json) (`2025-07-03T20:54:07.270`)
- [CVE-2024-52898](CVE-2024/CVE-2024-528xx/CVE-2024-52898.json) (`2025-07-03T20:10:10.747`)
- [CVE-2024-54173](CVE-2024/CVE-2024-541xx/CVE-2024-54173.json) (`2025-07-03T20:44:08.330`)
- [CVE-2024-55898](CVE-2024/CVE-2024-558xx/CVE-2024-55898.json) (`2025-07-03T20:52:55.190`)
- [CVE-2025-0975](CVE-2025/CVE-2025-09xx/CVE-2025-0975.json) (`2025-07-03T20:41:35.323`)
- [CVE-2025-23225](CVE-2025/CVE-2025-232xx/CVE-2025-23225.json) (`2025-07-03T20:25:35.343`)
- [CVE-2025-2866](CVE-2025/CVE-2025-28xx/CVE-2025-2866.json) (`2025-07-03T21:26:26.980`)
- [CVE-2025-2950](CVE-2025/CVE-2025-29xx/CVE-2025-2950.json) (`2025-07-03T20:53:15.263`)
- [CVE-2025-3218](CVE-2025/CVE-2025-32xx/CVE-2025-3218.json) (`2025-07-03T20:53:29.017`)
- [CVE-2025-33122](CVE-2025/CVE-2025-331xx/CVE-2025-33122.json) (`2025-07-03T20:53:32.687`)
- [CVE-2025-36004](CVE-2025/CVE-2025-360xx/CVE-2025-36004.json) (`2025-07-03T20:53:35.667`)
## Download and Usage

View File

@ -113985,7 +113985,7 @@ CVE-2018-13056,0,0,0fe23317749ed9e00eea9e1415167bad25a33fd9014ba67553969854f4d8b
CVE-2018-1306,0,0,bea8d94d1ff00097ede200bb8253961481c96dc48f2e4a96aa7d101d8debe63d,2024-11-21T03:59:35.460000
CVE-2018-13060,0,0,c522cb37a1f3774c83ab34cbb6e27000ebbe2b8a156b8f52bc6d7459a79e68e6,2024-11-21T03:46:19.630000
CVE-2018-13063,0,0,0e11be1d5aad4df7e337ae005766a3afa8674f066434f6214dfd250748990d16,2024-11-21T03:46:19.790000
CVE-2018-13065,0,0,89b481bec61119cddb3f2f4240656749684025cf7a76df7dab011e086f4cac3b,2024-11-21T03:46:19.947000
CVE-2018-13065,0,1,0502a4f1dc05687fba6123886f42924f613161909d0df4c42d77434c8982f0be,2025-07-03T20:59:18.650000
CVE-2018-13066,0,0,21e20efd85d39a57bc9b5ebebbaaf4771027b0bf7ca80559a34b9ceaea6c7336,2024-11-21T03:46:20.107000
CVE-2018-13067,0,0,d5036c38c930e399d7060991deafcb053fe598803de1a2ac57a8fd2d6a706507,2024-11-21T03:46:20.270000
CVE-2018-13068,0,0,01deaf6eb236af2a55573c44ce70976cf2524087499819ace8814b9b0594b0bf,2024-11-21T03:46:20.417000
@ -137056,7 +137056,7 @@ CVE-2019-1988,0,0,f100b83ccfaba7ac4700c888f14bea035bc1262d0feb6bef34125e141a251c
CVE-2019-19880,0,0,56961bcc385f69fbb5b57ddd5e17bff3bd73630c6cf0ad3907bfb47c76c37e44,2024-11-21T04:35:34.813000
CVE-2019-19882,0,0,4767c9ebb7c6699e7c88b9cc474d234bb2e31557fb910057b1d1e699a05a78fb,2024-11-21T04:35:35.013000
CVE-2019-19885,0,0,24a089eab974adab3f76ba1ba829d2c87ff36861d9794773b609c3774166fe93,2024-11-21T04:35:35.163000
CVE-2019-19886,0,0,24b939b844b1ec4c29e868c80db6d58fbf4f3a7328df89f3158a45c93938e229,2024-11-21T04:35:35.320000
CVE-2019-19886,0,1,b626cf3a74ad36a01562907f0eb3c1efb7422f7ea3f351dcb7f8cde84dccbe76,2025-07-03T20:59:18.650000
CVE-2019-19887,0,0,1b4c27ab499ac3f3ccb18644603feffef958a61c4c45a5d42a0ace21858142e8,2024-11-21T04:35:35.500000
CVE-2019-19888,0,0,fad83f1b8af6cd0f8e3831ff707d49102c570b14945cb23e87498fde8917270e,2024-11-21T04:35:35.640000
CVE-2019-19889,0,0,59fc9e68439967ccb5d76d16a64c226308cc1e55167f61cb61edc60a919db7a9,2024-11-21T04:35:35.787000
@ -138508,7 +138508,7 @@ CVE-2019-2504,0,0,828265ff26ba1344fe2e1e504631d1632cc3a3fe08704ef346e38654e8527e
CVE-2019-25040,0,0,1c39a614425d0a185dfd14341e0b8c22fffc999d43ec160f83c6474149a5c19c,2024-11-21T04:39:48.307000
CVE-2019-25041,0,0,0d0ea1d986f3a7461a6d93c1215cf294d8802d79216324a1c0c7cb0b80e19ce4,2024-11-21T04:39:48.453000
CVE-2019-25042,0,0,83afcef9d75ed34828028c7484fd7556082f7fb32f3d7e7a8ad987926566d468,2024-11-21T04:39:48.607000
CVE-2019-25043,0,0,cc51ab83eabde837ae10afbfa927618df243a08eeaaa2df38bb7d0973a893f0d,2024-11-21T04:39:48.770000
CVE-2019-25043,0,1,1b8a0ecc3020f888e8116775c6819123ebc62ab8b1a128990183a193879a2c50,2025-07-03T20:59:18.650000
CVE-2019-25044,0,0,61810aeb3c5910554b2d4bc8386d706023333efbd359f8c2d7c953b44c453ec1,2024-11-21T04:39:48.930000
CVE-2019-25045,0,0,09cabcaeef9138cb6329bdd81653131ddf30e9cd9e30914fbfb5e875a6393b90,2024-11-21T04:39:49.103000
CVE-2019-25046,0,0,3228c054ae15690663d91427ed8cd669122e632af2a8a2c645da7ff9f8046730,2024-11-21T04:39:49.297000
@ -150574,7 +150574,7 @@ CVE-2020-15594,0,0,be4e813712be0c93c32425fede324d29afa166740217fabb21cb1f62dc5d3
CVE-2020-15595,0,0,8d9f887128952abfb7f74b9a19177926670ce837d312ed86cf29d1545ff624cb,2025-05-30T16:15:25.327000
CVE-2020-15596,0,0,5d9ab39ec3b111e8938db8208890e181a90bde06b1b2a36366757c162e681123,2024-11-21T05:05:49.603000
CVE-2020-15597,0,0,d5b4e5f41d3f76ac8685edcd9a62e7527d62e39b918aad59a53ee5a5f346da35,2024-11-21T05:05:49.757000
CVE-2020-15598,0,0,29c4cf6a206458a549a864bb573a7abc87e995b8609723825d1a72deba575b91,2024-11-21T05:05:49.910000
CVE-2020-15598,0,1,045b3e91055f09b47a6144205af5e53d82229ab01aa5d376c7dcf4714fc8bebf,2025-07-03T20:59:18.650000
CVE-2020-15599,0,0,4a9d09c4825dd24a93936708ad5e98cdc3b59f170d446b04fe6fecb5c9c2b10d,2024-11-21T05:05:50.060000
CVE-2020-1560,0,0,a8c70000015369f2d5cdfb750b25fa728bd280d91bb589c67133201d988a8b3d,2024-11-21T05:10:50.673000
CVE-2020-15600,0,0,b237b8b11dc3a5a6dc73908b11ddd5f11fbb129c4743fe1e8b243a02778edc88,2024-11-21T05:05:50.203000
@ -167143,7 +167143,7 @@ CVE-2021-20450,0,0,0f5b27cc615135d792da5b34d212ed5f0166f47e7783a945ae6abd057d407
CVE-2021-20451,0,0,9dc775fdb57d0d30485c9dab41a5d5be1763fda2e61b939d002a71ad3f1c3e6d,2025-01-07T19:25:37.353000
CVE-2021-20453,0,0,69cac692ccb994b91ee56611307326b4371e627412e63b371dd093ede4578a39,2024-11-21T05:46:37.100000
CVE-2021-20454,0,0,b5a9b823983a12936ec287dc3098e2bed23b7aa3e8189b7deea101639225c258,2024-11-21T05:46:37.220000
CVE-2021-20455,0,0,9579d97eb104245cf663ed351f720c9d41cda049c2ac8a45b98c17103813e9a9,2025-01-07T16:15:27.430000
CVE-2021-20455,0,1,6533c862372ca8a160431b3595ab5e17630d090ffd4a6d5df03a586b43449f2b,2025-07-03T20:49:27.313000
CVE-2021-2046,0,0,ad9de75bfb455d28bedfc8d0200a0362300a00bb9087c78e5ba220afb8420fbc,2024-11-21T06:02:15.540000
CVE-2021-20461,0,0,32bb741266cc653229bac24a9612d59bf6c19ecf87f4dbca4826c2185db1cdaf,2024-11-21T05:46:37.343000
CVE-2021-20464,0,0,47ae6cb8b812d3b3a5c9f84cd7749fc1250c97a6b5585c32f4656f620f51f5cf,2024-11-21T05:46:37.480000
@ -184347,7 +184347,7 @@ CVE-2021-42713,0,0,783571f521cb4c14c813efc36beb03a31d0b9369881123ae5eda01358e608
CVE-2021-42714,0,0,140a3cd5e613fc165c37326bf38fb922982c9fd894685b7a4d43fefb24c5cd29,2024-11-21T06:28:01.450000
CVE-2021-42715,0,0,c8bde02f0ab72afb9d2fb48b644a9a783de2cde5ac488a27334e06356251e70d,2024-11-21T06:28:01.600000
CVE-2021-42716,0,0,e8b94a98a1f8c8c4ace912bdc692f2844b824dcc8731c978eb1cf416bf562dab,2024-11-21T06:28:01.797000
CVE-2021-42717,0,0,e0cf32cf401f390ee5050d72c9219b1b18cae5d87b497dbc59e68726d57c7a54,2024-11-21T06:28:01.980000
CVE-2021-42717,0,1,ea16797cfdb005a2e3512f7c7575a272a18fbb601f7e772ba9df74fb015d5c99,2025-07-03T20:59:18.650000
CVE-2021-42718,0,0,f953d3282057f93e0ecf49380a977e688d87af4fa7b770ecfb8f3d28fe970821,2025-01-24T15:15:08.273000
CVE-2021-42719,0,0,232b901bd7344df0e76a38bf0733064f0ffc60bd5a3326d6e3679ce2d8d049d8,2024-11-21T06:28:02.177000
CVE-2021-4272,0,0,006f9c0c258b6542fa695fbce9f3e6480d068f1e6d826347b4056504eefe3da7,2024-11-21T06:37:17.187000
@ -192230,7 +192230,7 @@ CVE-2022-22358,0,0,84767261124809a9d1ed519f9f64155fc6ba5ec9fdf71fddbcd7410488522
CVE-2022-22359,0,0,2bf01eb540622dca847eaacee6236e255186c1277196c7cc79e981387a737156,2024-11-21T06:46:41.857000
CVE-2022-22360,0,0,565952d652a3bdb7d639feb074a1b0e26498767df3453bcf21d65b3148621e6f,2024-11-21T06:46:41.973000
CVE-2022-22361,0,0,10b0f271693e25631ef1989315b59440c197a948d70ee3735bfc385e81ac916f,2024-11-21T06:46:42.090000
CVE-2022-22363,0,0,2b202a27d134c656ca3512bf7b46a7d1186447ca8d907c5ddc1cf75f17241bc9,2025-01-07T16:15:28.050000
CVE-2022-22363,0,1,7f77ac2626643aa5ab0760205911c6adc830daa1b8e544a902015cd36275489f,2025-07-03T20:49:29.930000
CVE-2022-22364,0,0,699859f56e67a1509bb3bd386cabe5337a40af606a12e422bc971d532159bce0,2025-01-07T20:16:36.033000
CVE-2022-22365,0,0,93b131a9b6677b900794e8bfb444f14fa30b748b1163134645f09fea46b11764,2024-11-21T06:46:42.330000
CVE-2022-22366,0,0,09a7cac2af7c3326b1c4db129ec697d7b77dfaf6bb69f773673a6a77e39cac91,2024-11-21T06:46:42.450000
@ -206105,7 +206105,7 @@ CVE-2022-39159,0,0,9bab48ae0c7ec6d829fcebbd383c88265471d1b8930e73570a0438b68d4ee
CVE-2022-3916,0,0,4aca84e566526af675a57765ef3d1d206a38f133fdf84532ec163834cff42294,2024-11-21T07:20:31.480000
CVE-2022-39160,0,0,e1c05f7218e8e8c347b91de7f55a473fd143199ecd24c9add0e4d0df07948ae7,2024-11-21T07:17:41.700000
CVE-2022-39161,0,0,374db153ea4a7818f93713bd5ddf1964b7dab3b6fb9e2bcd84c5b50b129436ed,2024-11-21T07:17:41.823000
CVE-2022-39163,0,0,ffd0bbf2a05437ed15c90e539db34f6a36d44e1bf852ec0272b57d1c453312c7,2025-03-27T16:45:27.850000
CVE-2022-39163,0,1,d6696a680484cb84b1cf221cfc56ef4602bd37d0ed911e185893320a8d1fb2e8,2025-07-03T20:52:01.790000
CVE-2022-39164,0,0,910c2790ec8cc2e31e30c18869d1a9b96cc73805e1c939b688a6b0f694e0332b,2024-11-21T07:17:41.963000
CVE-2022-39165,0,0,eb42fbb702d7c8841cd5ed9b6b61d837644be9416d74e6640b40197ec0d8edd5,2024-11-21T07:17:42.097000
CVE-2022-39166,0,0,c00a1e6b7adee19072cf36acc9786c3a6960ebaac27b755287ac7dc95805c61a,2024-11-21T07:17:42.233000
@ -212711,7 +212711,7 @@ CVE-2022-4826,0,0,014fbd0a7a06eb9a1efd2ae2475857eaa8bde551368d94326a82d9f9341786
CVE-2022-48260,0,0,e7e60af9c858f5b5288b0031686d03e5e613b16cb37780d86f8482f3a30603dc,2025-03-11T18:15:27.073000
CVE-2022-48261,0,0,8fec913aab803791099630bb3b4add731b2952c5677136c8ab14d8481622c16b,2025-03-11T18:15:27.267000
CVE-2022-4827,0,0,5ac498be8b6ac9b553ca8c1e0b150917682d7d16bb58dc61446603771084fd8a,2025-04-23T17:16:23.617000
CVE-2022-48279,0,0,01836a4da1b7ce33e84695b35b552ef61727c50cbe51395ee9a861662f5c5378,2025-04-03T19:15:38.917000
CVE-2022-48279,0,1,930583aa07aa185824fc8b5024f19681066ccdc3a4efd197e8d6aa831ebd19b8,2025-07-03T20:59:18.650000
CVE-2022-4828,0,0,f9377bb9daa067b01cffcf1f42848ce8342ba75803a1ce5ee33b3c860a178da6,2025-03-27T21:15:41.490000
CVE-2022-48281,0,0,2931678421d6077742f37a8731a53914432b8c85d40568b108e6c860c0111b9e,2025-04-03T14:15:23.037000
CVE-2022-48282,0,0,faac8c954d78b5ceb7c5ce11efc8ecb3c4678623d448b6402cf0eab59411b9fa,2024-11-21T07:33:04.807000
@ -224143,7 +224143,7 @@ CVE-2023-28876,0,0,c1806b7567a07b6cd5bad89db8f8e663f0abfbc4dc05ab4f0a81a9cd8dd1c
CVE-2023-28877,0,0,e59a97403cb2ba7ba7084f8cef40e5ea548a51e665c965485b0b5cdf23b925a8,2025-02-14T20:15:33.210000
CVE-2023-28879,0,0,642e2788c974b60f2db4909bf76b55c9019d3ebeace195e897c8809c61b362e1,2025-02-14T20:15:33.373000
CVE-2023-2888,0,0,733c180cbb32ecf6bf022f0642b31e69e75e65e424d1dfab8b5653572373f8cd,2024-11-21T07:59:30.160000
CVE-2023-28882,0,0,bc3618c2bba907bca3f9aa9f8805ff257885286929515e723c141b37d4fc5cf0,2025-01-30T21:15:10.640000
CVE-2023-28882,0,1,b38b7b5b1152561383f3a10a2ec26e2428c241f5236e91874ab6fbba12e3ef24,2025-07-03T20:59:18.650000
CVE-2023-28883,0,0,c0783168b291b29018ec24adbce6f8c48381e8da25a234ae37ceb4b4c668cda1,2025-02-19T17:15:13.590000
CVE-2023-28884,0,0,4f01d869cc02df48ff436a2fda2a2686d4bd4e20ae90aed5def51856ad72acc5,2024-11-21T07:56:13.503000
CVE-2023-28885,0,0,635855f321f101263fbcb2e9276aa47098826711d6bc3fcc28c5b70da3ffb2db,2025-02-19T17:15:13.793000
@ -231358,7 +231358,7 @@ CVE-2023-38276,0,0,ba9fab32a121dc0ef42130086f4b44807496059dba59bbea2f2970476887b
CVE-2023-3828,0,0,d9a69961c7e52c406634fa1bb313f20f14ba2e56402fe2ed2036a17d4012d956,2024-11-21T08:18:09.677000
CVE-2023-38280,0,0,13ce1c3aab6ff4856bdf7e3dd50986942fbf0c0d949ac6c9de6fa3bc10d69b4c,2024-11-21T08:13:13.490000
CVE-2023-38283,0,0,b0b9e30c65f4e0290339c964c9b5f85a6289c436d14867fe2ee4e5cb1d122753,2024-11-21T08:13:13.623000
CVE-2023-38285,0,0,da2582a0480178b31e05ee6a7f3183d4ab37b3ffa572c3a62ae78b08a04a99ff,2024-11-21T08:13:13.803000
CVE-2023-38285,0,1,be61181598184d6c61a4d09916902df2a8a290bf4f8cdc904517d784094179ea,2025-07-03T20:59:18.650000
CVE-2023-38286,0,0,83ef3a91737412b90009913e8ebff4ab764f5945a5ae33dca40d59f89c0c473b,2024-11-21T08:13:13.970000
CVE-2023-38288,0,0,42c04372f9c2c296311a892fdbf8f35822187c00273983f0c4b682148291e84e,2023-11-07T04:17:14.293000
CVE-2023-38289,0,0,c8755455b071e1ec7b67b9a4bd95e1294de3beff6892cce5c0504ddaeac21ce7,2023-11-07T04:17:14.330000
@ -236517,7 +236517,7 @@ CVE-2023-45173,0,0,ffc716553fc8735b94a901938d8197347ed303ddb90fe6dbdb91daa629d19
CVE-2023-45174,0,0,d6ae1170ae2c49c643c98705c7fcf42aed789ae182e7f2b21d1825a4cffe6ae1,2024-11-21T08:26:29.337000
CVE-2023-45175,0,0,e9d9dc1b8b95108a0e1028f29977b9916a775f3be496d71ef4dd38838b079bc5,2024-11-21T08:26:29.457000
CVE-2023-45176,0,0,7178f1a37d445800432754a582331c7315b084328b371f787f4982876607744e,2024-11-21T08:26:29.583000
CVE-2023-45177,0,1,051509b012e93a33d01bb6006afc4c995176bdcf53452d68b6d4a85f1d62941e,2025-07-03T19:37:40.087000
CVE-2023-45177,0,0,051509b012e93a33d01bb6006afc4c995176bdcf53452d68b6d4a85f1d62941e,2025-07-03T19:37:40.087000
CVE-2023-45178,0,0,48388e75ddb993ec5586822f1d414e30860b1c6dcdaa07936969263e3fcf2e1e,2024-11-21T08:26:29.833000
CVE-2023-4518,0,0,fbb75b273529deda855092a1cb67f347a0b773f2071130e9f10d7bdcaab77a98,2024-11-21T08:35:20.213000
CVE-2023-45181,0,0,13982b18a025246bb7ecf9ae43875f8b1c8b9fd7529debd7010d36d0494c7c4b,2025-01-14T19:46:20.940000
@ -245429,7 +245429,7 @@ CVE-2024-1001,0,0,140fc173e33ae8fa7b986d187129f7b01af76bf1cd74c6ed57f4103bfb5a0f
CVE-2024-10010,0,0,1371437a2294aadc15143f54d1c01735af263ef48293853d7cb88175f4d2421b,2025-05-07T13:28:46.577000
CVE-2024-10011,0,0,37a7a2add316aa62fc644e677a8222291d1b4d2f7d89a6ec187d4cc2ee2d4a93,2024-11-06T16:01:39.573000
CVE-2024-10012,0,0,413f959de4d29d2f4e53fa8b9bc452a97984c8f8ba413b5fa50db942e716664a,2025-01-07T15:59:23.043000
CVE-2024-10013,0,1,a8bb9a370fd465c66ff161b98297d78ae5858d463ee55adf8fe2484bcb94bec1,2025-07-03T18:30:06.820000
CVE-2024-10013,0,0,a8bb9a370fd465c66ff161b98297d78ae5858d463ee55adf8fe2484bcb94bec1,2025-07-03T18:30:06.820000
CVE-2024-10014,0,0,50214c84cef4e2fd21abb109362711999bfa6a60090d35936fd0e9cba0811d5b,2024-10-29T16:58:48.127000
CVE-2024-10015,0,0,217a292c789a9f8ea3b1717a9a4b42a5c13589b9293af6ac699c09a1f0997322,2024-11-18T17:11:17.393000
CVE-2024-10016,0,0,f77f52c803ffaca4f851d3ea7a048b10f89ed8d8abf952ae01a553fb73da8ac4,2024-10-25T12:56:07.750000
@ -245602,7 +245602,7 @@ CVE-2024-10186,0,0,deebe816c0e4f08a12b999c50b1e61e2e73183dc813c2bde7d36107ba44b3
CVE-2024-10187,0,0,a05dc95bdb255244bd9cd3e7f7c3dbb2a64f03bc15ef2f7a3415c834e22630e5,2024-11-13T20:31:08.157000
CVE-2024-10188,0,0,c61f687671a4edea114714cc7533a2f1c32c140ba4fc49445959f7719db461e3,2025-03-20T10:15:14.993000
CVE-2024-10189,0,0,1a400dd56ae1b7b1d718254797ad2f77484ada3a81ab72653060886e14ceca61,2024-10-29T15:27:55.550000
CVE-2024-1019,0,0,1d5868235f9b69470d2bff7bf38b7f5b3053179444fd5cce0cf4654caf1e5802,2025-02-13T18:16:18.837000
CVE-2024-1019,0,1,3dbcc1303d05cdc8631d4dc3a224a6115ad2ae02d69b8efb76d46b873a91082a,2025-07-03T20:59:18.650000
CVE-2024-10190,0,0,08abe739589f974d34204d886ba2ba057303723bf0c1d7e7227eac9b798cba5e,2025-03-20T10:15:15.117000
CVE-2024-10191,0,0,61621cf6b67194bdcbf07d4a6dcee79a415e1ad518641f80cacab0f808ca6b2e,2024-10-22T14:33:12.313000
CVE-2024-10192,0,0,2c299aa344138878b9ae6bbdfd084cd35f4786dba4f095300fa5d40e9fa506cb,2024-10-22T15:09:16.517000
@ -254092,13 +254092,13 @@ CVE-2024-25031,0,0,336ae1209bec97edf2f576f0dbcab4e5fecb1cf28a1e1d867216b37694f08
CVE-2024-25034,0,0,e9b1d3dd19b3d9085249eaa87289ff98427e36dc25cae58e678d863839e43374,2025-03-05T16:01:58.133000
CVE-2024-25035,0,0,b7214df75690f8a2c0cde375218fa064c6af31099cab5de418b369cfbfb53d96,2024-12-11T03:36:11.700000
CVE-2024-25036,0,0,a0130984c78d987e616d5d6732535de3078a91e4d686daa4bfe8d88a169b88cd,2024-12-11T03:35:51.663000
CVE-2024-25037,0,0,406a4670a9668946e91205c5e64e1ad1fa02a4e9c65ab719dde554f47a137fd7,2025-01-07T16:15:32.937000
CVE-2024-25037,0,1,693a224fa9cc33ca3eaa1e9222b26e6d08a7a7512e2e1e2803794e3f155c3188,2025-07-03T20:49:32.580000
CVE-2024-2504,0,0,627d67f7b2aef584579966e521c1bbe6f2f5dd132eca6ffd2bb0ce28b95c0aa0,2025-02-27T15:09:59.800000
CVE-2024-25041,0,0,c2ef0b11a47c5fcb85869011d777be135ff05637ba0b82b517f0e1a3d01142a3,2024-11-21T09:00:09.433000
CVE-2024-25042,0,0,e80197f616e9fc7028a38b26e43b05d859fe7534b854846d6b61625c0e95d8c2,2025-01-10T19:31:43.540000
CVE-2024-25046,0,0,6d8e792cef5c8fede291cc9590b8ac4d68cf095d20735d2e477f72f779be0432,2025-01-31T17:52:39.340000
CVE-2024-25047,0,0,343df0aa34a2277d182830d3c20824917058fcf8f5e38af715146355ffc2bf9f,2025-07-02T15:41:45.863000
CVE-2024-25048,0,0,fcc137b6f9efc3b0ed3d7c907f7c740493e10a50797f026d50e6e36a054b2c38,2024-11-21T09:00:09.860000
CVE-2024-25048,0,1,db78eeef9b02f6cdfc72464414e0a77695520f1116df726e96121c1cb732e8e9,2025-07-03T20:45:20.627000
CVE-2024-2505,0,0,a8b70d12eef18da213620a09faff6413a81044ca87b033ce08a31a9bd95ca2e1,2025-05-08T18:24:45.817000
CVE-2024-25050,0,0,ee2886e2c70d5cd7c3164455e75aa374ff627d446d4a73168310c81dc4d1f42d,2024-11-21T09:00:10.010000
CVE-2024-25051,0,0,77d07f07b5cec1ab3016e0be0efacec83d139c6a39d019cb400288b3180b83ed,2025-04-07T14:18:49.830000
@ -256971,7 +256971,7 @@ CVE-2024-28772,0,0,78e1b65ccd01d2b2cb5151ac2638f146b229ea64b2c3771ff8b54d177679e
CVE-2024-28775,0,0,48c24c963c3e0dc8c46f3ff427e4b5da1fb0e2f7af209370007a02ed2f945218,2025-04-11T14:09:38.493000
CVE-2024-28776,0,0,c37ad1b4bcd037947f008aab1cf6e8a8743a02c8497909c23a1d3fa75f493c32,2025-02-19T16:15:38.870000
CVE-2024-28777,0,0,27c5e3ffaadd4e49f8dfbbc74625f52a6acf48cb042bb3697feff05585a742a7,2025-02-19T16:15:39.363000
CVE-2024-28778,0,0,ec5802dfee3b138bf2f66b9c23844fcaeb53806b2668ca7c9490ad6fae2b4a1f,2025-01-07T16:15:33.113000
CVE-2024-28778,0,1,d547882bf17f722197b5c52bac5400254420c54ab88fe8ea636f1ea3d135291c,2025-07-03T20:49:35.697000
CVE-2024-2878,0,0,b3b25e9c748a349ffeda379f2bd7a905843c474a769aa05853c935e7ae823531,2025-02-05T20:15:44.637000
CVE-2024-28780,0,0,a45f8990f216243f42066ef01e1828e72f29ab69751d99d31d3cd7fb3b73695c,2025-02-19T16:15:39.510000
CVE-2024-28781,0,0,ae474e03d5676937911aeaacf31d3abd594523c107a9f5f41f2af0a6977c4689,2025-01-27T18:31:09.747000
@ -259331,7 +259331,7 @@ CVE-2024-31872,0,0,6a025a79f1912bff173929833a33ebaa07e5ebecd167df86154090852134e
CVE-2024-31873,0,0,15c94cc3fd11f0c8c1d9b72b533e2e14debd87b07493c30645b670b791c1dfaf,2025-01-28T21:13:10.063000
CVE-2024-31874,0,0,08d97743873b504cf45e78bca1a14f05191c21552dceacefeba0a8daf5d6fcb2,2025-01-28T17:31:15.617000
CVE-2024-31878,0,0,2cdf4c028654e8fbf3c35b620eb5619fea9f488afd53ab3b9767908578e7f92c,2024-11-21T09:14:04.550000
CVE-2024-31879,0,0,daa01d9448ebcd5d37ce13841b8ea893e99fc319219124230413ac967ea6f1d6,2024-11-21T09:14:04.690000
CVE-2024-31879,0,1,2c95bd49164b8d708bae7214defb4602e42b21e479fd465970d0453e45f7af39,2025-07-03T20:54:15.167000
CVE-2024-3188,0,0,a1e19cbfd3c67a64e51d824fb2d7e6139fba2de5517a694aee51a6a0f5915063,2025-05-14T17:31:10.813000
CVE-2024-31880,0,0,f941979502e23b306c091a056d19219b757e25a95ffe27e8cec0411fdb511500,2024-11-06T20:39:55.200000
CVE-2024-31881,0,0,e09f1658aa69d8655212ad42dabc043e14e33323dbef71ee6054873933c3493c,2024-11-21T09:14:04.890000
@ -261816,7 +261816,7 @@ CVE-2024-35117,0,0,f66294b4c69565a3ee8ba95a79f2f950741471afdd1e911de20d556fafc67
CVE-2024-35118,0,0,4324926efe207392a4ed876fb67f7b1d20226a5f3a177cb56ee4d7f8d8101687,2024-09-19T15:53:25.123000
CVE-2024-35119,0,0,d30b5118f01127b72a967e41cbcd9127e0dc9e2965ef5097a86f08236d88d108,2024-11-21T09:19:48.800000
CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000
CVE-2024-35122,0,0,493d1491bd5ae7a5e59b43805ddb7588eafbd0d87c32f52529417f281085d342,2025-01-24T18:15:31.680000
CVE-2024-35122,0,1,4e3dd883b82c03bae612318c6dad1e0a37d657bc830b145e93ba6b287a2b8c25,2025-07-03T20:54:09.190000
CVE-2024-35124,0,0,a922d1c3a3958629dbb0cd51b2de664bb7e7c9433c590d1267fd4128399d23a0,2024-08-22T13:31:16.353000
CVE-2024-3513,0,0,f3b60a2341228082c6b2c058a60950acb3fa7e0ac56c3c9b7f478ff2d11ae041,2024-11-21T09:29:45.410000
CVE-2024-35133,0,0,c27bb2f028f480c71f80a658c5187f1d60bf9d11ef3f138f496564d01c9e391f,2024-09-21T10:15:05.527000
@ -265056,7 +265056,7 @@ CVE-2024-38903,0,0,bb8eb3b19953647f1fa790b248a4aaef61b725deca797759dfe3998f4fd40
CVE-2024-38909,0,0,e855d3e4bcc6debe8825dcac1f84960c0ea9fdd610320e92597c28f7d4585441,2025-04-28T14:35:52.783000
CVE-2024-3891,0,0,4d72bc4ea7906c74fa96e7962b045759b217e44e525621a88b5a5a6135790d8b,2025-01-07T18:11:13.230000
CVE-2024-38910,0,0,d2dff3af8a966f6c22ba1ee4e9572a11e68c5f4930901faf724b461844929ff4,2024-12-06T20:15:26.337000
CVE-2024-3892,0,1,45d9dfdcfc78a4f7e641d089494af68d7a7315ac3a6524e43641e7d01774370b,2025-07-03T18:30:06.820000
CVE-2024-3892,0,0,45d9dfdcfc78a4f7e641d089494af68d7a7315ac3a6524e43641e7d01774370b,2025-07-03T18:30:06.820000
CVE-2024-38920,0,0,b3f18b36d081bdf4f139117e79ad8be02343cb455f4901876d3fc1cdb41ab339,2024-12-06T19:15:11.923000
CVE-2024-38921,0,0,e5a7581e9bd5abc0fb31d345eb112f5a09c1a2670be9a4d75822f554e0cba56c,2024-12-17T20:29:13.017000
CVE-2024-38922,0,0,1cb7de42e969a5471961ae5661769bd0d87aee5b0c1bc49312ac353ff58554e4,2024-12-17T20:29:01.117000
@ -266196,7 +266196,7 @@ CVE-2024-40696,0,0,3dc472795bb4f5dee7e2998290829b14be08b72462d89040ef95045aa3c7b
CVE-2024-40697,0,0,9675ffc87015078088b6658ddad78e8bbe317856a9033b7e633b65273e34d419,2024-08-22T13:27:20.743000
CVE-2024-4070,0,0,dcefff140a08880697e00447eb5b9d3cf4e8bc626b549ead85b0012e24179a9f,2025-02-27T17:51:08.270000
CVE-2024-40700,0,0,2d9c229abc1faaac1cc418f4ae90c891c929abab0867d534c439a3cc25c44edd,2025-02-04T21:15:26.380000
CVE-2024-40702,0,0,0010d40778f1fffdc1b0664781c513393e67c7620d1ff605f896e7ca8cbe8a85,2025-01-07T16:15:33.463000
CVE-2024-40702,0,1,b61c21ac8adb150709ee8aff5de31157a598177c97cc57db17322512c4a11170,2025-07-03T20:49:39.400000
CVE-2024-40703,0,0,e703b61d3f8dfe06de226d6f2873ad12453588e6ae0585ecf895673088efbbbb,2024-09-27T16:49:46.177000
CVE-2024-40704,0,0,f1eefecca06d931cc6fa5c315f3cff483d4ea73258582e293da29f36971e3c43,2024-08-15T20:03:13.530000
CVE-2024-40705,0,0,498d1b36f9941cc45abf0a56c450cafece4560bbcc29015fb60565ec3b88fad7,2024-08-15T19:57:34.780000
@ -271107,7 +271107,7 @@ CVE-2024-4710,0,0,9c507813f9fc80a7b0290c71ebb56c5cafbe3613f57bf93e1120a9c56f5290
CVE-2024-47100,0,0,bc33fc5a76be564a723b9fb2ec38b7be22b37ba75ce50545dbf45808d11df9cc,2025-01-14T11:15:16.573000
CVE-2024-47102,0,0,0864a20740f0de5ffc38497db2f0d4f8389b304278d9ae91ba201d1cd5b77740,2024-12-25T15:15:06.583000
CVE-2024-47103,0,0,f2d938e35b4cd88b650fd9ebaf68a8a9213474b354e226db1e4a7eca8a26d434,2025-03-05T18:25:14.727000
CVE-2024-47104,0,0,9f2e725614bb591f1dee85b094aedf7e5ce884d4ec064c7905e6916502af1c82,2024-12-18T11:15:05.763000
CVE-2024-47104,0,1,026a8809af30dacccbc64737eb70987e43cd6e62a5365c6f0054001c1f3d6d78,2025-07-03T20:54:13.533000
CVE-2024-47106,0,0,5ade2f3c5d39fefc0f00abff980ec9cc063f3a12c8a4e05c1472820e919f3997,2025-01-18T16:15:37.883000
CVE-2024-47107,0,0,83a68ca10aff101a96de3250c1131824959ac1049e7605a6db7f1c75f87fa7cd,2024-12-07T15:15:04.123000
CVE-2024-47109,0,0,3df70960f3fd8a2d18b204a885afcd8f024202ba7b8dc307176911f567b1bbe1,2025-03-10T16:15:12.703000
@ -274350,13 +274350,13 @@ CVE-2024-5146,0,0,5b449c1c90a12e7a7e9baafe2349df6bbeba71c937f98b023ebea1c53ce310
CVE-2024-51460,0,0,df7bada56a61ae8e12a2e4d5be2899c3081302373c6923b3ae2a7f5e2e034bd4,2025-01-14T19:40:36.670000
CVE-2024-51461,0,0,4876f12da7901555341c0b584ea1abd3abac7ec3d8f7f415a970047d9bfbda24,2025-04-11T15:39:52.920000
CVE-2024-51462,0,0,e409bb58b33b455caed173bb21388906f853ca63445a80f0344bbaf4e996dab1,2025-01-17T03:15:07.527000
CVE-2024-51463,0,0,c0364c05afe1e0b2d0890e7f96c1b512b7afe4d3c2862d4a930e0585099ce1e6,2024-12-21T14:15:21.453000
CVE-2024-51464,0,0,1b2031370218977af474f39ea7b9c6eb15448100f9427860fc8d10cdd981ce8b,2024-12-31T07:15:11.307000
CVE-2024-51463,0,1,087d0cc54c059cce6e0a62215ea81fc0f4886c162872024ffd7cd1a929dda70a,2025-07-03T20:54:12.200000
CVE-2024-51464,0,1,ad9faf77a7bb18211133ce4e655e4499a0a5f1cbe82f262708e86a575ec1837c,2025-07-03T20:54:10.780000
CVE-2024-51465,0,0,b984a1f47331a027471db6ecd22c9db67a7b4679236a111706732d4e42cb3082,2024-12-04T14:15:20.223000
CVE-2024-51466,0,0,8dbff8e38d974242f854fc216ba0ae34b3549115af35c681b8d8f30eb338719e,2025-07-02T15:58:56.447000
CVE-2024-5147,0,0,ab91f72de430745aa06435c0b83e5065e058ec932697e33cc7f6207ac6142bf9,2025-02-05T14:52:39.890000
CVE-2024-51470,0,0,e89d5ef183a7d29ac11af41a2499db74df261ac8afb07d8bd5315410d8114abd,2024-12-18T20:15:23.233000
CVE-2024-51471,0,0,124b7b8875d261820d9fc9a3eefcc2e273bec0e6de9ec2bd5f9981a02008418a,2024-12-19T18:15:23.153000
CVE-2024-51471,0,1,d1fabbd389ed07f88438083abab4daf0fc4c0b3ce9d11260a2ff188a030a15db,2025-07-03T20:23:41.563000
CVE-2024-51472,0,0,5a04f10a5b66fac72ae0a16c46c0e3a3ed989854125dc73bcc8f365a713b587f,2025-01-06T17:15:38.517000
CVE-2024-51475,0,0,0d2172b69a6bc7db542afd1e2958e9264f2599ff4e6bf7e2f043416bbf357c7b,2025-06-04T20:02:45.390000
CVE-2024-51476,0,0,60d94814215175c301437be50b363df906a0a0e446e91badb985325a9fb5b1b8,2025-03-06T17:15:19.763000
@ -275483,10 +275483,10 @@ CVE-2024-5289,0,0,45ad6e1c3a8134226122bea6b70bcd4aeb55721ddc7a695e24fb24c5dc173e
CVE-2024-52891,0,0,19cf1f0011549768783225ac0d2a7012d880fe1910f8d0f6b1608f8ed0254a59,2025-03-04T20:04:21.467000
CVE-2024-52892,0,0,9eba69a4b423ab3b0faed8136763965b521ef23cc8c0984c63b5b975c522a8cc,2025-02-06T20:15:39.763000
CVE-2024-52893,0,0,bccb93e15c9c9d6c11e2a27d5bd916177aef96d8789ceb265a7ba2b1644d0c16,2025-03-04T20:02:14.490000
CVE-2024-52895,0,0,776381c39f26d27f642d71ec1be88368d50de1a99de3a3998fc1acb8e968c6e5,2025-02-14T15:15:09.210000
CVE-2024-52896,0,1,1c400ceb5bfc9b44b9e4519b4e35925648aa72a3bd9075d5c6df817d0e414b72,2025-07-03T19:52:42.310000
CVE-2024-52897,0,1,ed26699dc7689dfe23bbdef47680c93078bbc0b5ec70e7e94f15777c74df9904,2025-07-03T19:55:16.553000
CVE-2024-52898,0,0,d7b7f6b11bb044b80bea87d96314b701a1a2f838c26b331c4312588e6e64f889,2025-01-14T17:15:17.513000
CVE-2024-52895,0,1,fe099d7f6eafe1018d4b77d98297c83649163133debc7615bac574428c6668fb,2025-07-03T20:54:07.270000
CVE-2024-52896,0,0,1c400ceb5bfc9b44b9e4519b4e35925648aa72a3bd9075d5c6df817d0e414b72,2025-07-03T19:52:42.310000
CVE-2024-52897,0,0,ed26699dc7689dfe23bbdef47680c93078bbc0b5ec70e7e94f15777c74df9904,2025-07-03T19:55:16.553000
CVE-2024-52898,0,1,87db9d39a9720e5bdd81ebc81e0e62681f07f034f96292698b31c775dd6825c3,2025-07-03T20:10:10.747000
CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000
CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000
CVE-2024-52900,0,0,eb5792f5cbf6bef0b7f202086fd8227cab024e3d455878961eaf67a9379ec510,2025-07-01T18:07:20.727000
@ -276471,7 +276471,7 @@ CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc255
CVE-2024-54170,0,0,42dce6648e1132820da06b0e9c69e1655ebe361e65ea7d3b232a8af6a5ebbee4,2025-02-27T15:15:39.240000
CVE-2024-54171,0,0,76fdd9d793c7b352d23e0d64a823cd883e5b81bbb06d5f2cffeb90d9ca7786b4,2025-02-06T21:15:21.453000
CVE-2024-54172,0,0,89b8cf2473aa1d00b65e0aad499d5269d148da59212888517d4b625d48cc59f2,2025-06-23T20:16:59.783000
CVE-2024-54173,0,0,9626ebf00dbcb8d683d602e32e68262d1ef27b7e0ae499ee14c2f9df981917bf,2025-02-28T03:15:09.357000
CVE-2024-54173,0,1,aeb4bf587211b71aeccc6b5cd1518dde81918890bfbe72f41ce8080bb57e6159,2025-07-03T20:44:08.330000
CVE-2024-54175,0,0,ac0e271a7a86253c9d856e43e336a7196fed14605337f3e646841823ba1fb5bc,2025-06-20T15:32:46.470000
CVE-2024-54176,0,0,5463f590e796ae65427debb4e96d6df8b03f447d67021c1f3c7471918becbe24,2025-02-08T17:15:21.643000
CVE-2024-54179,0,0,cc40342456ec0e93880ba1ff6de6912ca898fe0485f93a482cde3b645de39dc5,2025-03-03T14:15:33.960000
@ -277291,7 +277291,7 @@ CVE-2024-55894,0,0,6bc1464368d973e1c6c827bc429d51ce1a3c9546ee8e3c46e48ea85daab94
CVE-2024-55895,0,0,9535eec07671a5cc5686d5a56d310d295b3f57a3a5c97ada2ccb31411af81b64,2025-04-01T20:26:30.593000
CVE-2024-55896,0,0,d7dd07510a57c238a16c0fe0788b36dab26d7ddf0b08fae01a783db92ce18bc7,2025-01-03T23:15:08.437000
CVE-2024-55897,0,0,e14dae99444da602a8cbcded6e75f3a296335e8970296d8e95d83228933505c5,2025-03-13T16:15:25.453000
CVE-2024-55898,0,0,adcc5d516d89a41277ae34a6de418cf17da58482170efe79dea1e265741329cc,2025-02-24T02:15:31.940000
CVE-2024-55898,0,1,ded8754e2961bc9ea3e7980cff04a20ee5fb7e167416f260c041b987f5dfd3a3,2025-07-03T20:52:55.190000
CVE-2024-5590,0,0,a9d8f7434d1cfc7abf37860d9a247732a7fac6c4e092fe54bdbe5eeebe8c2afb,2025-02-07T15:10:57.540000
CVE-2024-55904,0,0,985e264a3f8f59b658a98ed276a5675a14d822dac410c29893607d517450a9ef,2025-02-14T04:15:08.753000
CVE-2024-55907,0,0,4c1e415bdf8f7641a1b178418bde0f344146cbdd158b634787f9c31634de79bd,2025-03-02T16:15:34.577000
@ -283057,7 +283057,7 @@ CVE-2025-0328,0,0,25c0760d244498984cda91678b883cf89d3e8fcbb9c37fd0d45c67359c7184
CVE-2025-0329,0,0,03b8cf30421e1ae0f8fd0e493ceb87146261c231c81ab91ad0614180095edb90,2025-06-12T16:35:31.733000
CVE-2025-0330,0,0,79cf8fdee51afbda4105bc5823be00a341e7d6a4bdcc3c5735bb642d735615ae,2025-03-20T10:15:52.763000
CVE-2025-0331,0,0,afe60233c7b6cdef8297092a16561204e8a753655f7ac938d1ebdf4ff4457d4f,2025-01-09T17:15:17.933000
CVE-2025-0332,0,1,d0def84faa8b12076ff1e558a0ac55eb8953dfc2704b434c753c7e4d2ff98363,2025-07-03T18:30:06.820000
CVE-2025-0332,0,0,d0def84faa8b12076ff1e558a0ac55eb8953dfc2704b434c753c7e4d2ff98363,2025-07-03T18:30:06.820000
CVE-2025-0333,0,0,81e4cc439859af53c1b986765c85b9db6681ddfd15355f617bb0f4d13181d40e,2025-01-09T17:15:18.077000
CVE-2025-0334,0,0,a2752894f0956fdde9f25172948b20b0ef85e697939129012141ceedb1b495bc,2025-01-09T06:15:15.610000
CVE-2025-0335,0,0,12528d0865cacb7295fe5a0c5bf2a492f9357b1638988dc28820f4aad345e47c,2025-02-26T22:08:38.937000
@ -283581,7 +283581,7 @@ CVE-2025-0971,0,0,5b8e3a772e26bf816abefc74071cc81ffef57f2dca25d3ca940637bd90f99d
CVE-2025-0972,0,0,e5956f37d0d2c05528deb236852ccd083e64a88ec4620fb922e8c6291dff82ac,2025-02-03T00:15:28.007000
CVE-2025-0973,0,0,c5f9ce06d2802593a7f76334f1b83941107fa5a0a0fa48c68dc58147471b9a7a,2025-02-28T22:33:55.367000
CVE-2025-0974,0,0,d5c477dc78b0d3fe8557a020be3504381bf16f4fc509c0d46fe50fb97cb7b86b,2025-02-03T02:15:26.433000
CVE-2025-0975,0,0,66ea3569903c32b0f1028941b4e2b9b642924beee794715a495485e8fe53b539,2025-02-28T03:15:10.653000
CVE-2025-0975,0,1,02dd45c6bbfc82af5cbb5c0c31b7d0e315ef08d4af0e0fdefd618452673c8579,2025-07-03T20:41:35.323000
CVE-2025-0981,0,0,c89c9554a0a46e5bb181583fd08bedc64f240c126360b9216686d47b4afcea4a,2025-02-21T15:23:43.717000
CVE-2025-0982,0,0,521fffa92ca7a4349f9839f1725ef4c0f2728323e40055a01784086e989d43e4,2025-02-06T12:15:27.267000
CVE-2025-0984,0,0,92704a0a035030fb5061e4659d37ae85bc1b4e3f45305a9920fa63c1ad964976,2025-05-07T14:13:20.483000
@ -286901,7 +286901,7 @@ CVE-2025-2322,0,0,78ab742f31174d7df93575224a83318d524a8c032820e93e629a06208bce3a
CVE-2025-23220,0,0,7c8179759fa74d6aae16fc3306b1fc79ab502a5b9e56a156b81b01f528524ae2,2025-02-28T19:22:56.600000
CVE-2025-23221,0,0,66ab94f1e6d3ea457770d55c62f0e0360d1ef2f8abc298fcd5936362cd0cc294,2025-01-20T17:15:07.987000
CVE-2025-23222,0,0,18aa2a1e2bf6061bb8eb2028cc63aa7a30f3ae667c4d6d42b09c703374489ff5,2025-01-24T17:15:15.730000
CVE-2025-23225,0,0,e7172a29691256f5cd7802e83d2f56fad7175879b765e935ded8f42967016101,2025-02-28T03:15:10.807000
CVE-2025-23225,0,1,cd0fe8dc7e7b130240b30e150cacd03b434741e27183450c53f033f6397dd305,2025-07-03T20:25:35.343000
CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe29c,2025-01-23T18:15:33.440000
CVE-2025-2323,0,0,38dc6c42b7b635e3caddc5b01ae9aa4a1f84282e9ca11a611a0d7850c76ef099,2025-03-15T17:15:36.610000
CVE-2025-23233,0,0,9d0894e8f043e8d2e3d9f99b4c5bfc27819eaf2a631a882e6cbd474030b88962,2025-05-16T14:43:56.797000
@ -287583,7 +287583,7 @@ CVE-2025-23964,0,0,5329b05c42aea8add2b00e40cec17b27a1ae63702685a3839a52b5da9454e
CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000
CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926bedb,2025-01-22T15:15:26.950000
CVE-2025-23967,0,0,7fc0380a265ec940f2b60470b1cf9713d9094d8329ba8cde3022afd9bd781bb0,2025-06-30T18:38:48.477000
CVE-2025-23968,1,1,955f5380954e813c7e88fece29af528205d4507019306da5a36ed360685211a7,2025-07-03T19:15:23.043000
CVE-2025-23968,0,0,955f5380954e813c7e88fece29af528205d4507019306da5a36ed360685211a7,2025-07-03T19:15:23.043000
CVE-2025-23969,0,0,487de04033365abaa60e5ffa75aa91d7c86b6db89eb8475ac28535f85fa6cbae,2025-06-06T14:06:58.193000
CVE-2025-2397,0,0,1d9d522b7da574d99450a0c926cba6b95d7f81a170fb089caa03fceac1350b83,2025-03-18T15:16:01.257000
CVE-2025-23971,0,0,b92b26502e7bf23962c464265b1f8680f1f27660b2e187da01a8acb71a6d5407,2025-06-06T14:06:58.193000
@ -290564,7 +290564,7 @@ CVE-2025-2862,0,0,d42da37ae120383972bca9b3c34491a1998bf94496751edff9d3b8653ccd4e
CVE-2025-2863,0,0,89f439925468e699ad113743583fdeda2696a66656c397c031b5ea7d3d0ecb34,2025-03-28T18:11:40.180000
CVE-2025-2864,0,0,1f66654aa924832c01c946b8c047f8723266750dca2c13c7a67536d81d107cad,2025-03-28T18:11:40.180000
CVE-2025-2865,0,0,ec0c359364e90a26d27d62ffa0653d855c3daf1b4b8f1b737e51327fd1068f74,2025-03-28T18:11:40.180000
CVE-2025-2866,0,0,ef04e1a1e0041aba9fde40dc98be2e2b7c8bb136a3622c61e4c49c0fd00132d4,2025-05-12T19:05:52.590000
CVE-2025-2866,0,1,3428fe3ce7007027a58cd386cbee1cc3a467ae571e343e8aadf4b3a4c255f1bd,2025-07-03T21:26:26.980000
CVE-2025-2867,0,0,64215baabccd6fdf04d8b048452d95e3b2ff4d5237bc2e15b566982b293865f3,2025-03-27T16:45:12.210000
CVE-2025-2868,0,0,8956298391ba0923e590541b3fae1d38dc061830ea826ef81d09ab51842ff44b,2025-03-28T18:11:40.180000
CVE-2025-2869,0,0,c096e0a3f8c1567897f984075f9b7eae7e0b2ff1c1febfd4a8d8f0861bac0208,2025-03-28T18:11:40.180000
@ -290898,7 +290898,7 @@ CVE-2025-29493,0,0,ce433e12ff6f67070d20d51618679346fee9463a5376a363b288e013cda07
CVE-2025-29494,0,0,37dc6ae3cff76e33477c0d21d9e70a2e17e406dc0fef9f8cf0d74528f1edd9be,2025-04-01T15:46:09.550000
CVE-2025-29496,0,0,1ab18872c422fd3ad83b844719caba98a63d63be68d84ae73e73abccf7b846be,2025-04-01T15:46:19.427000
CVE-2025-29497,0,0,f8eaaaad66a08f36734d69d9f1541fb908a272f91f31ad8a75e2ab1b4e1231c2,2025-04-01T15:45:58.123000
CVE-2025-2950,0,0,3b933802cf00212e8d12e44372cb1acb183887c45922a207791d57e7adc54e1a,2025-04-21T14:23:45.950000
CVE-2025-2950,0,1,7a7b79d92bcd3fc1d6e12e77c95f84880785d2919929e3b4dc42854292e0cc3c,2025-07-03T20:53:15.263000
CVE-2025-29504,0,0,509d78872cdb4e1135eb7746b776c8eb568355cb805a55a3297f7c964bf210eb,2025-04-07T14:18:34.453000
CVE-2025-29509,0,0,095f2bddd5b7ebbce275436f36ff3580aad46e0210f9776b5d03d79fa13631fc,2025-05-12T17:32:32.760000
CVE-2025-2951,0,0,6a15654c1eca83ff82a596d5e3e3899275c59561438cb927263c33c03b7a3c34,2025-04-15T17:07:45.753000
@ -292957,7 +292957,7 @@ CVE-2025-32176,0,0,6159199ced4d1cc4cc3fc0a4b90bac4e5cc8fe8b49b458ef45302e363899f
CVE-2025-32177,0,0,5421d91f07d2d127d019747a3f9da6a81b9de3ec00f222f0047063dbcd68001b,2025-04-07T14:18:15.560000
CVE-2025-32178,0,0,f4356b18673933a5717ebcb4f61fc7f6619aff8d61f40c6a6d6d698282497ddf,2025-04-07T14:18:15.560000
CVE-2025-32179,0,0,69ff8c557b664411b6521be65ad34b2b830276fe6b94886ffd74ded06aafb4ed,2025-04-07T14:18:15.560000
CVE-2025-3218,0,0,e603beba6e7b5090391d82ad2d9fd742d9df060a981975da316ab7140117d86a,2025-05-07T14:13:20.483000
CVE-2025-3218,0,1,b8d3f1a18757671501e9731ba5b9843e9f9d5dc81949aaf6b4a803d34d3bd667,2025-07-03T20:53:29.017000
CVE-2025-32180,0,0,a409b84ad0fee336d39330cd0990e4e1a933b45ae7f9c8d16a8202c2417aeef4,2025-05-19T13:35:50.497000
CVE-2025-32181,0,0,2a12ab8650c9715ea1bfc7baa58bd93bf89537d12ec9678a79f27189aa5acd2d,2025-04-07T14:18:15.560000
CVE-2025-32182,0,0,84b7180d6f1c0263bfb88570f76edf08f572fc8320cfdd5c0eb29ab9580520de,2025-04-07T14:18:15.560000
@ -293743,7 +293743,7 @@ CVE-2025-33112,0,0,fbe29f1f149f7078871a044a5ed14a43938b4d758348625746eeccccfd89d
CVE-2025-33117,0,0,de9e738b8198492bbddc214157b0f962656ea2e6b12c9d53170d48d5dfe82538,2025-06-23T20:16:59.783000
CVE-2025-3312,0,0,d314cd0e3d98597c32289b5f3f4209f174e16c52e8e6ba2862a75de1162b07d0,2025-05-07T16:45:29.103000
CVE-2025-33121,0,0,28ac3ca3ae4da8b87a7363c4e87e84438fcfac10cceb19732260209ba8ef9596,2025-06-23T20:16:40.143000
CVE-2025-33122,0,0,8bf405156970be92dc185289ab40adc88619763aed68fcabb2d93a6d0c25beb5,2025-06-17T20:50:23.507000
CVE-2025-33122,0,1,ddb2854c5b32b139f034678d802f29870b729be2b69f125a8d51de9fcfdf68ee,2025-07-03T20:53:32.687000
CVE-2025-3313,0,0,8c3e746212b0f7e34691b425d570770595ed2ddcf9c85476d8c05485bbf5b80a,2025-05-07T16:45:47.623000
CVE-2025-33136,0,0,27a78f34bfe266c2ec4d98dca65066403e26999ef14696ceea2068909ce50e9f,2025-05-30T01:19:40.167000
CVE-2025-33137,0,0,7682521c272fc983898f262d7a26ae95a5457c4ccfa28cf239219cc364559be5,2025-05-30T01:19:24.883000
@ -293873,6 +293873,7 @@ CVE-2025-34058,0,0,fd1d6135cbcb5a939cf5a00698e2051104b6bd46ef2e608640ce59a67cf5e
CVE-2025-34059,0,0,45a6f5a690de4057ca2d091f2ebd0e7868dff26548a7187ca235baafdf4d8729,2025-07-03T15:14:12.767000
CVE-2025-3406,0,0,7ba1ebe9a4174ed6e20c2f4fe1e75a4864d330055141a3dcb596eb92ec7fbc3a,2025-04-08T18:13:53.347000
CVE-2025-34060,0,0,c9e66c79fa3e22979f6d536300a3a69b4248f557ef4ce60fb59bc75630daece1,2025-07-03T15:14:12.767000
CVE-2025-34061,1,1,85dfe74227cfb8d6fb527f09d52021638f8c7d3658a36d67197b197c95332243,2025-07-03T20:15:21.570000
CVE-2025-34062,0,0,b716d5649a0b2ab449b7a4e5deda5a7ed68b48d3e9d485331bef321a595836de,2025-07-03T15:14:12.767000
CVE-2025-34063,0,0,fbf50ba1666892a680b7e726cc84b450cde981ed5af9e60f07742062b62bf6a1,2025-07-03T15:14:12.767000
CVE-2025-34064,0,0,eb471144a9811114d1d1834fe8327f3c07a293fa4bbcfab9e78da16542b662d1,2025-07-03T15:14:12.767000
@ -293893,6 +293894,11 @@ CVE-2025-34079,0,0,e6d733d75639f74da638a863b1673b04916d219d5fe2f30c247d053c7c8a4
CVE-2025-3408,0,0,a88be7d5c921572f767d8ba3e6ebc652be3930b6ee80cf6e4b3b3197df125283,2025-04-08T18:13:53.347000
CVE-2025-34080,0,0,7facaa51cd8a6d5555f1a7d11ff6b11423d2fee5e31c80ebe182ad59860e92d0,2025-07-03T15:14:12.767000
CVE-2025-34081,0,0,ad8db7fe69d8caab8acca643e7b73c50072fd91c7954d3079104dc722a9fd721,2025-07-03T15:14:12.767000
CVE-2025-34082,1,1,68a6b8d6d0b0897ed20277aae825943a68a01da0e3acaff885e71579942468db,2025-07-03T20:15:22.540000
CVE-2025-34086,1,1,ca489dad657f1ad721cbdf0ea69a6597ded3f4016d530d86e9bb427a861153d9,2025-07-03T20:15:22.683000
CVE-2025-34087,1,1,f301a7c0eca035635293ee08170a251d82a0cd91ae05482ba7360abebf568d92,2025-07-03T20:15:22.843000
CVE-2025-34088,1,1,4616bd76fa51987210408713378568b6429093ff5258f16bf1870e7a67ded677,2025-07-03T20:15:23.007000
CVE-2025-34089,1,1,9d131e63568006f8f73ec5e6a9d6fb3a0b725a4a942bd750ce78d19c0d87a2e7,2025-07-03T20:15:23.157000
CVE-2025-3409,0,0,f59095d51838a53941b8bd9796d34dc98a766466b963796da5b26614478f737a,2025-04-08T18:13:53.347000
CVE-2025-34090,0,0,99b025483d49e908b46ca3c0b6df1bcd3eb9785bb16ccf0a289b98bcd9ea5094,2025-07-03T15:13:53.147000
CVE-2025-34091,0,0,80903fb8a73bb14ecdbce066930269d024e03e7b850e9a6f8bfa9891a350a26e,2025-07-03T15:13:53.147000
@ -294084,7 +294090,7 @@ CVE-2025-3599,0,0,50511407f557708506d42c82ca157e4b27ffcaf91e7ac0f0029a3b3d58f00d
CVE-2025-35995,0,0,a590f4d82a5b6a6ddf49e3e9ff3fcb9f7ad4db6e56f789349ace8583f960ea2e,2025-05-08T14:39:09.683000
CVE-2025-35996,0,0,a68f8bf3039aca0fabffa5365ae47dde1016d171f7f66e0132baceb8c4b864b9,2025-05-02T13:52:51.693000
CVE-2025-3600,0,0,7cb206206065fd210a153f067dfc260287fb233b025f8a59e4c30ab1efc7f613,2025-05-16T14:43:56.797000
CVE-2025-36004,0,0,0a01f92ec8ed981f105aaa2da46bf8f144b50e5b88bce227ac7752c1ea333d5a,2025-06-26T18:58:14.280000
CVE-2025-36004,0,1,a7606dc7f0db1d2572a7485d0d3bb38993c9f09ef8a130e8809723820465f823,2025-07-03T20:53:35.667000
CVE-2025-36016,0,0,af37919821fdd574b942ee9d20d1ecfb430b58097892e9a643523ecf7010f2dd,2025-06-23T20:16:21.633000
CVE-2025-3602,0,0,9dae34871a5aa21ddbebfa01b8417ba4c26394066febdada550c394e6505596c,2025-06-17T20:50:23.507000
CVE-2025-36026,0,0,af5d1cd39202bd9c522b391511525b9286e9d9645df4651893a8424afeeff6cc,2025-07-01T14:22:26.260000
@ -296209,7 +296215,7 @@ CVE-2025-45797,0,0,9ceb633e87e0ccdd08b067f487627f7a3614f4d7f4f938b0faf7b483b05c0
CVE-2025-45798,0,0,1e256e91813f740bb0ddebf5c159b4041ec84583a75a9898cffd38b365095dd3,2025-05-19T15:08:18.653000
CVE-2025-4580,0,0,2c434f3aced55b1225815c7de47b3cc229863447aaf3ca455a84427f71dfeaeb,2025-06-04T20:04:21.700000
CVE-2025-45800,0,0,2adeb4a59c132c5d4a56fe8afda223e1c5b86658a949bac17c9d9bc540ba8292,2025-06-04T17:26:02.743000
CVE-2025-45809,1,1,761c39099d492fdb34e718803ab4d94f39f05bc4978719e2f84573e3b170d1ca,2025-07-03T19:15:24.027000
CVE-2025-45809,0,0,761c39099d492fdb34e718803ab4d94f39f05bc4978719e2f84573e3b170d1ca,2025-07-03T19:15:24.027000
CVE-2025-45813,0,0,1cdb35349454355ea90284f73a3a629e371e03fd1917b24cadfbc183cc8f1c12,2025-07-03T15:13:53.147000
CVE-2025-45814,0,0,8e500fbe650a74a0fb125601ba4882cc600d6293d2674f68472c4b342456b8fe,2025-07-03T15:13:53.147000
CVE-2025-45818,0,0,9a72de08da5294536bea0753f94263b2b855db9b94abd12b9c3b0d1fd37d9e3b,2025-06-17T19:42:01.770000
@ -297985,6 +297991,7 @@ CVE-2025-49001,0,0,8dc4548fe390fc22a5faf69cde327e5fe5b96046e91fdc466cb08c1aca094
CVE-2025-49002,0,0,216cade8987f40e7e1bae00fef99c6cc70caf989f13acf7e248d90eb2faa16c6,2025-06-05T14:07:36.847000
CVE-2025-49003,0,0,fba2fa2a264a5c8271213cb9de26bd128e1b1ae572a3e285db1d3ea73352c4b7,2025-06-26T18:57:43.670000
CVE-2025-49004,0,0,89d47ac006a07f0278b924493f5a5a2553c688202c5da141c2c812c60b3a1cb1,2025-06-12T16:06:47.857000
CVE-2025-49005,1,1,f5da460018e782ea866a592b7801484459ecd48c23166d1ec275b3a62e9024d1,2025-07-03T21:15:26.787000
CVE-2025-49006,0,0,69cfb489d390e5afe2e42023086b2832eeed6d765863e99bd3de00a5d46a4fa7,2025-06-12T16:06:47.857000
CVE-2025-49007,0,0,d1c6d78f4ed2af74dee6497de444888fe48e0c945fb3e3b2be2f74b557cd31b9,2025-06-05T20:12:23.777000
CVE-2025-49008,0,0,5906f158b4998a3ea295f4b31b7f6d29c67e9e9abb77b31bc6681c8bf5f684d0,2025-06-05T20:12:23.777000
@ -298360,6 +298367,7 @@ CVE-2025-49822,0,0,de49443b576bc1f584b5a6900459b73ba17d0494708f2396f6ea98c8b4c73
CVE-2025-49823,0,0,552cd4fad516f02486ff3428bf048ea275d9b1dd6acc2c30a167deddc98bdc84,2025-06-17T20:50:23.507000
CVE-2025-49824,0,0,974ad385597c7ebe1657b4c04293530cc71abe0711af75ee866eb4ab4d2dd957,2025-06-18T13:46:52.973000
CVE-2025-49825,0,0,f444b584006d5aede2c38e3ee10f0e113cb3d3f832999c3a3531ef94f625084b,2025-06-18T13:46:52.973000
CVE-2025-49826,1,1,bdcff8f3ca585f0644a6ec8691cba9051d6c219e38e7afe53977ef4fd356b423,2025-07-03T21:15:27.287000
CVE-2025-4983,0,0,8b53f9fcac717498609c6596ba194e3872474340efe5891a55ff7cfbe70e31d1,2025-05-30T16:31:03.107000
CVE-2025-4984,0,0,8011ca13e469a81f6afb4511e42cccafc7f5c3edf7ae8617debc1cb5fd406589,2025-05-30T16:31:03.107000
CVE-2025-49842,0,0,25f68be05f1cee4c74ac248773f32070b2173a4b15896e09f4b989979b7acc44,2025-06-17T20:50:23.507000
@ -298757,6 +298765,7 @@ CVE-2025-52542,0,0,6a356dbb016e8c78bba3561542110106778fbb5f08761ae704acc7dfbd8bd
CVE-2025-5255,0,0,b023caeeba2421cb86c7482514e264205e254122220d82c6bc67ef741a68d935,2025-06-23T20:16:40.143000
CVE-2025-52552,0,0,355ff6e466a39f4325662bbaa49db2816c79c0533f84f99cc3e34c03831df356,2025-06-23T20:16:21.633000
CVE-2025-52553,0,0,a39f718ab824da2cdd9dc21d65a0414d2ad7d6b511be6b992312d854e52baa0a,2025-06-30T18:38:23.493000
CVE-2025-52554,1,1,b1acdad6caf49f3b451c50125dfcbd7aca94dab5d45e04b2d092965e656df2fa,2025-07-03T20:15:23.423000
CVE-2025-52555,0,0,6a75b391ee3c8272fca348930578b6893d5d810e2019dea636affd2993361902,2025-06-30T18:38:48.477000
CVE-2025-52556,0,0,01d14cdcd651409b8ec6f2a117321e576266f60affdb5d61d3b6cf66da0be9ba,2025-06-23T20:16:21.633000
CVE-2025-52557,0,0,d6ac46828bdd4bd5689e0ed9e6db622a0cd2c5e50b4932c5603e932a5d57d26a,2025-06-23T20:16:21.633000
@ -299070,7 +299079,11 @@ CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad959346
CVE-2025-53358,0,0,3d97a4954e653a509d4005c71cf64fbb269b7293bb5ffaddd5ae485b7c74944b,2025-07-03T15:13:53.147000
CVE-2025-53359,0,0,45ed40db77640f47ba583ca32d5c60d80ffbacd98c4463b392cad98fdcfa3117,2025-07-03T15:13:53.147000
CVE-2025-5336,0,0,51ebbfc8a6c001d043ad92fbb70974a3ccedacbc8290bd5643cc8faeb9732c02,2025-06-16T12:32:18.840000
CVE-2025-53367,1,1,98ccbfda09d8ace8af64393016345c61888d50f9c101c3aa87422d100c99dc24,2025-07-03T21:15:27.493000
CVE-2025-53368,1,1,be3c0a7f58e2bbd4e68679c536da2e841620327ebe3522ae8a918c23f429e2ff,2025-07-03T20:15:23.577000
CVE-2025-53369,1,1,935c1344485ff5b914be62cc3781976d8c660c47c3bc47debabf78b9f979ea5a,2025-07-03T20:15:23.737000
CVE-2025-5337,0,0,f5b214301a56cadaeebc0b9a86ddeaf885fbd4e9b8e681558e7ccfb718bae2b0,2025-06-16T12:32:18.840000
CVE-2025-53370,1,1,ab22dbf75672a7a4f2267e5b00d1bde032c4143aa87d40c57e89361f247504be,2025-07-03T20:15:23.893000
CVE-2025-5338,0,0,7d03b6675327abe3166794a3aea1334fe78b5ed9861d33098569022851345f63,2025-06-26T18:57:43.670000
CVE-2025-53380,0,0,778a4ed3b4b51402648379b0a66e0653fc3388939d52b44cfb536c593d391f6d,2025-06-28T03:15:24.373000
CVE-2025-53381,0,0,5bca2379c91be4fadf0c25a7392b9c1b3f109e154b7525c42492575516c349ca,2025-06-28T03:15:25.393000
@ -299089,15 +299102,15 @@ CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2c
CVE-2025-5341,0,0,2f7555dddd47395f556aef803e272926d99b2be1a7b798f5f5a29577ec1f1191,2025-06-05T20:12:23.777000
CVE-2025-53415,0,0,a69e8e91492110c4dbcf675778ea91b79a25d896361aa62120c18b659d9f38c5,2025-07-01T08:15:24.610000
CVE-2025-53416,0,0,5766bb5741c2eb8f5d7acde7664083885dadd438f2f420d57a6193893c29ac92,2025-06-30T10:15:26.127000
CVE-2025-53489,0,1,6769a7875609bf94b88a0e114ee9f59c80c8131a1c840fb5a9a3308771e635ea,2025-07-03T18:15:21.710000
CVE-2025-53489,0,0,6769a7875609bf94b88a0e114ee9f59c80c8131a1c840fb5a9a3308771e635ea,2025-07-03T18:15:21.710000
CVE-2025-5349,0,0,c3dba6df59d2293dc5933fab4b44180a83c69961191d6e1c8668a3b028af5d72,2025-06-17T20:50:23.507000
CVE-2025-53490,0,1,e9251db1fea5e6093c2fe7b28bed6cbf3c105295c53f6dbe7693f6d5d13423ff,2025-07-03T18:15:22
CVE-2025-53490,0,0,e9251db1fea5e6093c2fe7b28bed6cbf3c105295c53f6dbe7693f6d5d13423ff,2025-07-03T18:15:22
CVE-2025-53492,0,0,07f001f0a2f7c95ac8b92c2b5a1246aeb8bc752b3d49fd1f7521c3a7a3a64667,2025-07-03T16:15:23.957000
CVE-2025-53493,0,0,8ff8929aef43b08923f020bb2cb71110d90a8f67f30ed1d7a0b2012c8c2477af,2025-07-03T16:15:24.123000
CVE-2025-53494,0,0,208fc72eecce6b5a15d2bab2c5d282523f9dc3860f6acdfd211e204b9a94e60e,2025-07-03T15:13:53.147000
CVE-2025-53500,0,1,4e600160e0338af8f29e334cc4de18af82b5375f94d3896f9cbf3cc874d5159e,2025-07-03T18:15:22.140000
CVE-2025-53501,0,1,21c335a8cee7517960e84f19187025efcea385227ba1fb22ef8cc3a8c10a8e56,2025-07-03T18:15:22.300000
CVE-2025-53502,0,1,8620e1fa54158c5ea47ec511c9a4e70659635a1ba5079b6185bdce67f385eae0,2025-07-03T18:15:22.530000
CVE-2025-53500,0,0,4e600160e0338af8f29e334cc4de18af82b5375f94d3896f9cbf3cc874d5159e,2025-07-03T18:15:22.140000
CVE-2025-53501,0,0,21c335a8cee7517960e84f19187025efcea385227ba1fb22ef8cc3a8c10a8e56,2025-07-03T18:15:22.300000
CVE-2025-53502,0,0,8620e1fa54158c5ea47ec511c9a4e70659635a1ba5079b6185bdce67f385eae0,2025-07-03T18:15:22.530000
CVE-2025-5353,0,0,a9d9e9f405a59eeaccd7ee5466c700cdd9eae2ba20f2bc9c98c5c42953abdf75,2025-06-12T16:06:39.330000
CVE-2025-5356,0,0,230423e916dccb3eed4f4eea6b8b3a9d8afef34a102c6f9d5aed25dc46913046,2025-06-24T15:20:27.113000
CVE-2025-5357,0,0,907468d4a23bb292098ec30159d44f17f5a58704c8b53f5a961af7ce379d277f,2025-06-16T16:26:46.080000
@ -300208,7 +300221,7 @@ CVE-2025-6916,0,0,524850ebae15b52ae083b8140e4ab97ad9b5dd7a5e34956ff208001c526a5f
CVE-2025-6917,0,0,129e7ed7538995bd47122ea1abcbbb313d42d5948a17ca0bbad09769943187c8,2025-06-30T18:38:23.493000
CVE-2025-6920,0,0,92f153f201754cb01ae808c528460cedb35114cf4759cf0d03fac580d4198aee,2025-07-03T15:14:12.767000
CVE-2025-6925,0,0,9b6fc4858861f5dc5e36531cf5cf597ec00fe77481d8d8c4445a1b8259bb2b27,2025-06-30T19:15:25.920000
CVE-2025-6926,0,1,7fab1723fdac5be2c9c2a2d693667480fa6a04b2dd5cc589a2b96bc15ab8525f,2025-07-03T18:15:22.797000
CVE-2025-6926,0,0,7fab1723fdac5be2c9c2a2d693667480fa6a04b2dd5cc589a2b96bc15ab8525f,2025-07-03T18:15:22.797000
CVE-2025-6929,0,0,06dc8ff62d3e6d602a7ed0d7b089f7cc33d58dd53c0466cf2fa3f70110505908,2025-07-03T15:14:12.767000
CVE-2025-6930,0,0,5fa54aec3bce753c0cb7b9bc216390a901032fb371a178f32c2e5f88307f3800,2025-07-03T15:14:12.767000
CVE-2025-6931,0,0,ea2ff5a0469a3df9ef65d87bf71684c0690aa2650e532d6b10eadd6580773a20,2025-07-03T15:14:12.767000

Can't render this file because it is too large.