Auto-Update: 2025-07-07T12:00:11.142309+00:00

This commit is contained in:
cad-safe-bot 2025-07-07 12:03:49 +00:00
parent 1566fb1c75
commit b3e09c81ca
22 changed files with 1590 additions and 31 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43334",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-07T10:15:25.593",
"lastModified": "2025-07-07T10:15:25.593",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gavias Halpes allows Reflected XSS.This issue affects Halpes: from n/a before 1.2.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/theme/halpes/vulnerability/wordpress-halpes-theme-1-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3044",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:26.717",
"lastModified": "2025-07-07T10:15:26.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the ArxivReader class of the run-llama/llama_index repository, versions up to v0.12.22.post1, allows for MD5 hash collisions when generating filenames for downloaded papers. This can lead to data loss as papers with identical titles but different contents may overwrite each other, preventing some papers from being processed for AI model training. The issue is resolved in version 0.12.28."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-440"
}
]
}
],
"references": [
{
"url": "https://github.com/run-llama/llama_index/commit/0008041e8dde8e519621388e5d6f558bde6ef42e",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/80182c3a-876f-422f-8bac-38267e0345d6",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3046",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:26.900",
"lastModified": "2025-07-07T10:15:26.900",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the `ObsidianReader` class of the run-llama/llama_index repository, versions 0.12.23 to 0.12.28, allows for arbitrary file read through symbolic links. The `ObsidianReader` fails to resolve symlinks to their real paths and does not validate whether the resolved paths lie within the intended directory. This flaw enables attackers to place symlinks pointing to files outside the vault directory, which are then processed as valid Markdown files, potentially exposing sensitive information."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/run-llama/llama_index/commit/0008041e8dde8e519621388e5d6f558bde6ef42e",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/90a1f1b2-bb82-4d66-9fc1-856ed5f904da",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3225",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:27.047",
"lastModified": "2025-07-07T10:15:27.047",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An XML Entity Expansion vulnerability, also known as a 'billion laughs' attack, exists in the sitemap parser of the run-llama/llama_index repository, specifically affecting version v0.12.21. This vulnerability allows an attacker to supply a malicious Sitemap XML, leading to a Denial of Service (DoS) by exhausting system memory and potentially causing a system crash. The issue is resolved in version v0.12.29."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-776"
}
]
}
],
"references": [
{
"url": "https://github.com/run-llama/llama_index/commit/4f6ee062b19212106a2632af9c9521fc7f0a3584",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/e33c0699-e9a2-49aa-837b-5363205637a2",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3262",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:27.200",
"lastModified": "2025-07-07T10:15:27.200",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the huggingface/transformers repository, specifically in version 4.49.0. The vulnerability is due to inefficient regular expression complexity in the `SETTING_RE` variable within the `transformers/commands/chat.py` file. The regex contains repetition groups and non-optimized quantifiers, leading to exponential backtracking when processing 'almost matching' payloads. This can degrade application performance and potentially result in a denial-of-service (DoS) when handling specially crafted input strings. The issue is fixed in version 4.51.0."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"references": [
{
"url": "https://github.com/huggingface/transformers/commit/0720e206c6ba28887e4d60ef60a6a089f6c1cc76",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/ecf5ccc4-39e7-4fb3-b547-14a41d31a184",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3263",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:27.350",
"lastModified": "2025-07-07T10:15:27.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically in the `get_configuration_file()` function within the `transformers.configuration_utils` module. The affected version is 4.49.0, and the issue is resolved in version 4.51.0. The vulnerability arises from the use of a regular expression pattern `config\\.(.*)\\.json` that can be exploited to cause excessive CPU consumption through crafted input strings, leading to catastrophic backtracking. This can result in model serving disruption, resource exhaustion, and increased latency in applications using the library."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"references": [
{
"url": "https://github.com/huggingface/transformers/commit/0720e206c6ba28887e4d60ef60a6a089f6c1cc76",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/c7a69150-54f8-4e81-8094-791e7a2a0f29",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3264",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:27.500",
"lastModified": "2025-07-07T10:15:27.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically in the `get_imports()` function within `dynamic_module_utils.py`. This vulnerability affects versions 4.49.0 and is fixed in version 4.51.0. The issue arises from a regular expression pattern `\\s*try\\s*:.*?except.*?:` used to filter out try/except blocks from Python code, which can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. This vulnerability can lead to remote code loading disruption, resource exhaustion in model serving, supply chain attack vectors, and development pipeline disruption."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"references": [
{
"url": "https://github.com/huggingface/transformers/commit/0720e206c6ba28887e4d60ef60a6a089f6c1cc76",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/3c6f7822-9992-476d-8cf0-b0b1623427df",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3466",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:27.640",
"lastModified": "2025-07-07T10:15:27.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such as parseInt, before sandbox security restrictions are imposed. This can lead to unauthorized access to secret keys, internal network servers, and lateral movement within dify.ai. The issue is resolved in version 1.1.3."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1100"
}
]
}
],
"references": [
{
"url": "https://github.com/langgenius/dify/commit/1be0d26c1feb4bcbbdd2b4ae4eeb25874aadaddb",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/f8dc17a3-5536-4944-a680-24070903cd2d",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3467",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:27.793",
"lastModified": "2025-07-07T10:15:27.793",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An XSS vulnerability exists in langgenius/dify versions prior to 1.1.3, specifically affecting Firefox browsers. This vulnerability allows an attacker to obtain the administrator's token by sending a payload in the published chat. When the administrator views the conversation content through the monitoring/log function using Firefox, the XSS vulnerability is triggered, potentially exposing sensitive token information to the attacker."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/langgenius/dify/commit/72deb3bed0b0d5d98d7cf44b525cc44bb278f6a7",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/21723441-7b55-425c-abc4-b1331a713591",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-3626",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-07T10:15:27.967",
"lastModified": "2025-07-07T10:15:27.967",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote attacker with administrator account can gain full control of the device due to improper neutralization of special elements used in an OS Command ('OS Command Injection') while uploading a config file via webUI."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-030",
"source": "info@cert.vde.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-3705",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-07T10:15:28.133",
"lastModified": "2025-07-07T10:15:28.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A physical attacker with no privileges can gain full control of the affected device due to improper neutralization of special elements used in an OS Command ('OS Command Injection') when loading a config file from a USB drive."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-030",
"source": "info@cert.vde.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3777",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:28.297",
"lastModified": "2025-07-07T10:15:28.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hugging Face Transformers versions up to 4.49.0 are affected by an improper input validation vulnerability in the `image_utils.py` file. The vulnerability arises from insecure URL validation using the `startswith()` method, which can be bypassed through URL username injection. This allows attackers to craft URLs that appear to be from YouTube but resolve to malicious domains, potentially leading to phishing attacks, malware distribution, or data exfiltration. The issue is fixed in version 4.52.1."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/huggingface/transformers/commit/4dda5f71b35fb70cf602187eef84bb17a50b9082",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/ccba0730-9248-4853-b7ff-5c20e6364f09",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-4779",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:28.717",
"lastModified": "2025-07-07T10:15:28.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "lunary-ai/lunary versions prior to 1.9.24 are vulnerable to stored cross-site scripting (XSS). An unauthenticated attacker can inject malicious JavaScript into the `v1/runs/ingest` endpoint by adding an empty `citations` field, triggering a code path where `dangerouslySetInnerHTML` is used to render attacker-controlled text. This vulnerability allows the execution of arbitrary JavaScript in the context of the user's browser, potentially leading to session hijacking, data theft, or other malicious actions."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/lunary-ai/lunary/commit/18750294a76ff6c0f3f1b6af4ac1a23399836b16",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/c603b64e-5171-4eed-8983-a7f656ce2c4d",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-5472",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:28.873",
"lastModified": "2025-07-07T10:15:28.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The JSONReader in run-llama/llama_index versions 0.12.28 is vulnerable to a stack overflow due to uncontrolled recursive JSON parsing. This vulnerability allows attackers to trigger a Denial of Service (DoS) by submitting deeply nested JSON structures, leading to a RecursionError and crashing applications. The root cause is the unsafe recursive traversal design and lack of depth validation, which makes the JSONReader susceptible to stack overflow when processing deeply nested JSON. This impacts the availability of services, making them unreliable and disrupting workflows. The issue is resolved in version 0.12.38."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-674"
}
]
}
],
"references": [
{
"url": "https://github.com/run-llama/llama_index/commit/c032843a02ce38fd8f284b2aa5a37fd1c17ae635",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/df187bda-7911-4823-a19a-e15b2c66b0d4",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6210",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:29.040",
"lastModified": "2025-07-07T10:15:29.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/run-llama/llama_index/commit/a86c96ae0e662492eeb471b658ae849a93f628ff",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/a654b322-a509-4448-a1f5-0f22850b4687",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6386",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:29.187",
"lastModified": "2025-07-07T10:15:29.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The parisneo/lollms repository is affected by a timing attack vulnerability in the `authenticate_user` function within the `lollms_authentication.py` file. This vulnerability allows attackers to enumerate valid usernames and guess passwords incrementally by analyzing response time differences. The affected version is the latest, and the issue is resolved in version 20.1. The vulnerability arises from the use of Python's default string equality operator for password comparison, which compares characters sequentially and exits on the first mismatch, leading to variable response times based on the number of matching initial characters."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"references": [
{
"url": "https://github.com/parisneo/lollms/commit/f78437f7b5aa39a78c6201912faf4e0645a38c48",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/6da05485-d219-4f18-9ffc-991053524b67",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-7122",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T10:15:29.333",
"lastModified": "2025-07-07T10:15:29.333",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Complaint Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/index.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/ez-lbz/poc/issues/45",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315034",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315034",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.605914",
"source": "cna@vuldb.com"
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2025-7123",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T10:15:29.580",
"lastModified": "2025-07-07T10:15:29.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Complaint Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/complaint-details.php. The manipulation of the argument cid/uid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"baseScore": 5.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/y2xsec324/cve/issues/2",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315035",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315035",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.605927",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.605929",
"source": "cna@vuldb.com"
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-7124",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T11:15:51.483",
"lastModified": "2025-07-07T11:15:51.483",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in code-projects Online Note Sharing 1.0. Affected is an unknown function of the file /dashboard/userprofile.php of the component Profile Image Handler. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/yihaofuweng/cve/issues/2",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315036",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315036",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.605925",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-7125",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T11:15:52.217",
"lastModified": "2025-07-07T11:15:52.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in itsourcecode Employee Management System up to 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/editempeducation.php. The manipulation of the argument coursepg leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/manyufann/CVE/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://itsourcecode.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315037",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315037",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.605933",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-07-07T10:00:11.370159+00:00 2025-07-07T12:00:11.142309+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-07-07T09:15:27.290000+00:00 2025-07-07T11:15:52.217000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,32 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
300579 300599
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `5` Recently added CVEs: `20`
- [CVE-2025-3920](CVE-2025/CVE-2025-39xx/CVE-2025-3920.json) (`2025-07-07T09:15:26.587`) - [CVE-2024-43334](CVE-2024/CVE-2024-433xx/CVE-2024-43334.json) (`2025-07-07T10:15:25.593`)
- [CVE-2025-7118](CVE-2025/CVE-2025-71xx/CVE-2025-7118.json) (`2025-07-07T08:15:25.603`) - [CVE-2025-3044](CVE-2025/CVE-2025-30xx/CVE-2025-3044.json) (`2025-07-07T10:15:26.717`)
- [CVE-2025-7119](CVE-2025/CVE-2025-71xx/CVE-2025-7119.json) (`2025-07-07T08:15:25.787`) - [CVE-2025-3046](CVE-2025/CVE-2025-30xx/CVE-2025-3046.json) (`2025-07-07T10:15:26.900`)
- [CVE-2025-7120](CVE-2025/CVE-2025-71xx/CVE-2025-7120.json) (`2025-07-07T09:15:27.097`) - [CVE-2025-3225](CVE-2025/CVE-2025-32xx/CVE-2025-3225.json) (`2025-07-07T10:15:27.047`)
- [CVE-2025-7121](CVE-2025/CVE-2025-71xx/CVE-2025-7121.json) (`2025-07-07T09:15:27.290`) - [CVE-2025-3262](CVE-2025/CVE-2025-32xx/CVE-2025-3262.json) (`2025-07-07T10:15:27.200`)
- [CVE-2025-3263](CVE-2025/CVE-2025-32xx/CVE-2025-3263.json) (`2025-07-07T10:15:27.350`)
- [CVE-2025-3264](CVE-2025/CVE-2025-32xx/CVE-2025-3264.json) (`2025-07-07T10:15:27.500`)
- [CVE-2025-3466](CVE-2025/CVE-2025-34xx/CVE-2025-3466.json) (`2025-07-07T10:15:27.640`)
- [CVE-2025-3467](CVE-2025/CVE-2025-34xx/CVE-2025-3467.json) (`2025-07-07T10:15:27.793`)
- [CVE-2025-3626](CVE-2025/CVE-2025-36xx/CVE-2025-3626.json) (`2025-07-07T10:15:27.967`)
- [CVE-2025-3705](CVE-2025/CVE-2025-37xx/CVE-2025-3705.json) (`2025-07-07T10:15:28.133`)
- [CVE-2025-3777](CVE-2025/CVE-2025-37xx/CVE-2025-3777.json) (`2025-07-07T10:15:28.297`)
- [CVE-2025-4779](CVE-2025/CVE-2025-47xx/CVE-2025-4779.json) (`2025-07-07T10:15:28.717`)
- [CVE-2025-5472](CVE-2025/CVE-2025-54xx/CVE-2025-5472.json) (`2025-07-07T10:15:28.873`)
- [CVE-2025-6210](CVE-2025/CVE-2025-62xx/CVE-2025-6210.json) (`2025-07-07T10:15:29.040`)
- [CVE-2025-6386](CVE-2025/CVE-2025-63xx/CVE-2025-6386.json) (`2025-07-07T10:15:29.187`)
- [CVE-2025-7122](CVE-2025/CVE-2025-71xx/CVE-2025-7122.json) (`2025-07-07T10:15:29.333`)
- [CVE-2025-7123](CVE-2025/CVE-2025-71xx/CVE-2025-7123.json) (`2025-07-07T10:15:29.580`)
- [CVE-2025-7124](CVE-2025/CVE-2025-71xx/CVE-2025-7124.json) (`2025-07-07T11:15:51.483`)
- [CVE-2025-7125](CVE-2025/CVE-2025-71xx/CVE-2025-7125.json) (`2025-07-07T11:15:52.217`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `8` Recently modified CVEs: `0`
- [CVE-2025-23968](CVE-2025/CVE-2025-239xx/CVE-2025-23968.json) (`2025-07-07T09:15:24.970`)
- [CVE-2025-27358](CVE-2025/CVE-2025-273xx/CVE-2025-27358.json) (`2025-07-07T09:15:25.140`)
- [CVE-2025-49175](CVE-2025/CVE-2025-491xx/CVE-2025-49175.json) (`2025-07-07T08:15:23.817`)
- [CVE-2025-49176](CVE-2025/CVE-2025-491xx/CVE-2025-49176.json) (`2025-07-07T08:15:24.947`)
- [CVE-2025-49178](CVE-2025/CVE-2025-491xx/CVE-2025-49178.json) (`2025-07-07T09:15:26.937`)
- [CVE-2025-49179](CVE-2025/CVE-2025-491xx/CVE-2025-49179.json) (`2025-07-07T08:15:25.130`)
- [CVE-2025-49180](CVE-2025/CVE-2025-491xx/CVE-2025-49180.json) (`2025-07-07T08:15:25.293`)
- [CVE-2025-6020](CVE-2025/CVE-2025-60xx/CVE-2025-6020.json) (`2025-07-07T08:15:25.460`)
## Download and Usage ## Download and Usage

View File

@ -268329,6 +268329,7 @@ CVE-2024-43330,0,0,f2ec3d961afcbca3f9e7e4bba594e0e74b7f8e85a1889c6773f7c1bb45b52
CVE-2024-43331,0,0,025664322110c0c027d99cd84710e694013a5a44ce0687284a3850fe3e9da36e,2025-03-19T18:52:24.573000 CVE-2024-43331,0,0,025664322110c0c027d99cd84710e694013a5a44ce0687284a3850fe3e9da36e,2025-03-19T18:52:24.573000
CVE-2024-43332,0,0,f167203969591a662d9eb35fd96489f40bda598ba4d24753bb004adb26d22093,2024-11-13T01:25:08.657000 CVE-2024-43332,0,0,f167203969591a662d9eb35fd96489f40bda598ba4d24753bb004adb26d22093,2024-11-13T01:25:08.657000
CVE-2024-43333,0,0,fa6b02dae1883de1fb148b98324c0e9a99a1742032b0f262d9477cb0c1c7f458,2025-02-03T15:15:17.207000 CVE-2024-43333,0,0,fa6b02dae1883de1fb148b98324c0e9a99a1742032b0f262d9477cb0c1c7f458,2025-02-03T15:15:17.207000
CVE-2024-43334,1,1,076c631a1b63b1ef02d791814410592d6ad39a5eacc535b64ae417d5e6cd790e,2025-07-07T10:15:25.593000
CVE-2024-43335,0,0,c1f646d4628edb84bd6ad7ba250c6419e109e4d8bcd82ce3fac5dd3b0e24a156,2024-09-13T14:25:12.027000 CVE-2024-43335,0,0,c1f646d4628edb84bd6ad7ba250c6419e109e4d8bcd82ce3fac5dd3b0e24a156,2024-09-13T14:25:12.027000
CVE-2024-43336,0,0,6c7a22fd3fd46088392b6f5f13736be099aec72322eac4ffcdfa6014e121cc97,2024-08-27T16:00:25.177000 CVE-2024-43336,0,0,6c7a22fd3fd46088392b6f5f13736be099aec72322eac4ffcdfa6014e121cc97,2024-08-27T16:00:25.177000
CVE-2024-43337,0,0,33ef43135fde72666f7ac01bebe36bf95e345a40214f9090867b8b64d2e4ca1f,2024-08-27T15:59:57.127000 CVE-2024-43337,0,0,33ef43135fde72666f7ac01bebe36bf95e345a40214f9090867b8b64d2e4ca1f,2024-08-27T15:59:57.127000
@ -287631,7 +287632,7 @@ CVE-2025-23964,0,0,5329b05c42aea8add2b00e40cec17b27a1ae63702685a3839a52b5da9454e
CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000 CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000
CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926bedb,2025-01-22T15:15:26.950000 CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926bedb,2025-01-22T15:15:26.950000
CVE-2025-23967,0,0,7fc0380a265ec940f2b60470b1cf9713d9094d8329ba8cde3022afd9bd781bb0,2025-06-30T18:38:48.477000 CVE-2025-23967,0,0,7fc0380a265ec940f2b60470b1cf9713d9094d8329ba8cde3022afd9bd781bb0,2025-06-30T18:38:48.477000
CVE-2025-23968,0,1,53c78b686cd251ef8305ce0b503ba1535e0fa3f23326f24f994ae5539203ed5b,2025-07-07T09:15:24.970000 CVE-2025-23968,0,0,53c78b686cd251ef8305ce0b503ba1535e0fa3f23326f24f994ae5539203ed5b,2025-07-07T09:15:24.970000
CVE-2025-23969,0,0,487de04033365abaa60e5ffa75aa91d7c86b6db89eb8475ac28535f85fa6cbae,2025-06-06T14:06:58.193000 CVE-2025-23969,0,0,487de04033365abaa60e5ffa75aa91d7c86b6db89eb8475ac28535f85fa6cbae,2025-06-06T14:06:58.193000
CVE-2025-2397,0,0,1d9d522b7da574d99450a0c926cba6b95d7f81a170fb089caa03fceac1350b83,2025-03-18T15:16:01.257000 CVE-2025-2397,0,0,1d9d522b7da574d99450a0c926cba6b95d7f81a170fb089caa03fceac1350b83,2025-03-18T15:16:01.257000
CVE-2025-23970,0,0,59a2f93282d0ee816872cd9efa0e07ec38c23a282c2850aeeef1bedd7bc6d785,2025-07-04T12:15:25.697000 CVE-2025-23970,0,0,59a2f93282d0ee816872cd9efa0e07ec38c23a282c2850aeeef1bedd7bc6d785,2025-07-04T12:15:25.697000
@ -290012,7 +290013,7 @@ CVE-2025-27354,0,0,1ce044a1079e0d294750814be6f1c0954b6a5514512ac17e37801e1c88cfd
CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000 CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000
CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000 CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000
CVE-2025-27357,0,0,906169a569eb5a8ab170c576da5f537f983e8f3b76fbc6f0db581847c8ddd5b6,2025-02-24T15:15:21.233000 CVE-2025-27357,0,0,906169a569eb5a8ab170c576da5f537f983e8f3b76fbc6f0db581847c8ddd5b6,2025-02-24T15:15:21.233000
CVE-2025-27358,0,1,3ac040af36b755118d90ba7ed16b171c1f279c10a3fe88c82bac61e2493f2192,2025-07-07T09:15:25.140000 CVE-2025-27358,0,0,3ac040af36b755118d90ba7ed16b171c1f279c10a3fe88c82bac61e2493f2192,2025-07-07T09:15:25.140000
CVE-2025-27359,0,0,bc075bb86fca4f63cce935506a3dbbf1e76155fbe5cec01080355e7b3cf26a58,2025-06-06T14:06:58.193000 CVE-2025-27359,0,0,bc075bb86fca4f63cce935506a3dbbf1e76155fbe5cec01080355e7b3cf26a58,2025-06-06T14:06:58.193000
CVE-2025-2736,0,0,33c3006167b33de591f1a27264763826544e0569703dfd7d13e6e1e623d6c471,2025-05-15T19:29:57.387000 CVE-2025-2736,0,0,33c3006167b33de591f1a27264763826544e0569703dfd7d13e6e1e623d6c471,2025-05-15T19:29:57.387000
CVE-2025-27360,0,0,fc7c10146447c977dacf60af6e89aa6249adc1ba87fdcfe0e5e9aa04faaa557f,2025-06-06T14:06:58.193000 CVE-2025-27360,0,0,fc7c10146447c977dacf60af6e89aa6249adc1ba87fdcfe0e5e9aa04faaa557f,2025-06-06T14:06:58.193000
@ -291537,6 +291538,7 @@ CVE-2025-30436,0,0,157aafbe97a61fabf3b83b6046cff85de7b0e0356b70ebd32bc3b0b912532
CVE-2025-30437,0,0,0c24503326977574ab0f815363d5d51518a36fd46250ca4580863efffe2ff229,2025-04-04T19:33:46.400000 CVE-2025-30437,0,0,0c24503326977574ab0f815363d5d51518a36fd46250ca4580863efffe2ff229,2025-04-04T19:33:46.400000
CVE-2025-30438,0,0,74656afde9b35f2b81392e23e2548ae49f2fb93278be9270035970969d725c46,2025-04-07T13:33:38.493000 CVE-2025-30438,0,0,74656afde9b35f2b81392e23e2548ae49f2fb93278be9270035970969d725c46,2025-04-07T13:33:38.493000
CVE-2025-30439,0,0,da2ca7ddbba55c6600a20f55dae4819460d11b882f4097a091f5482180051fe6,2025-04-07T13:33:28.633000 CVE-2025-30439,0,0,da2ca7ddbba55c6600a20f55dae4819460d11b882f4097a091f5482180051fe6,2025-04-07T13:33:28.633000
CVE-2025-3044,1,1,ff88ee139e3320a339b7b9119d7c7a119384af57bd5c9bf4e04db15a0ec69f5a,2025-07-07T10:15:26.717000
CVE-2025-30440,0,0,aa17715c0e9c198507565f90d517e1bf0a74ce622e9572e90458cb436f7c3146,2025-05-27T21:30:02.733000 CVE-2025-30440,0,0,aa17715c0e9c198507565f90d517e1bf0a74ce622e9572e90458cb436f7c3146,2025-05-27T21:30:02.733000
CVE-2025-30441,0,0,0c04a93a6f174bf42d94b9b28150654c6cdebea87baad1c1bed2a17317c45cac,2025-04-04T19:40:24.640000 CVE-2025-30441,0,0,0c04a93a6f174bf42d94b9b28150654c6cdebea87baad1c1bed2a17317c45cac,2025-04-04T19:40:24.640000
CVE-2025-30442,0,0,94b2fd018b3727c786e128b7d801c1ec933a7c10df3f3083321d38dbb3c0aa34,2025-05-27T13:58:18.607000 CVE-2025-30442,0,0,94b2fd018b3727c786e128b7d801c1ec933a7c10df3f3083321d38dbb3c0aa34,2025-05-27T13:58:18.607000
@ -291557,6 +291559,7 @@ CVE-2025-30455,0,0,654cb21164007decaef072b7e27df68e3e39b483c4e2d8a2b7a776151d092
CVE-2025-30456,0,0,a4adbf3fb3bfda6c1ff7ac3e59f722d6890d88837b4dfbbcb9888cc15a9a477a,2025-04-04T18:13:02.067000 CVE-2025-30456,0,0,a4adbf3fb3bfda6c1ff7ac3e59f722d6890d88837b4dfbbcb9888cc15a9a477a,2025-04-04T18:13:02.067000
CVE-2025-30457,0,0,9931b57801603e5171d9b9131e7fbe4120bea818d45e3d4b53b5782cd0d5fd9e,2025-04-04T18:12:47.103000 CVE-2025-30457,0,0,9931b57801603e5171d9b9131e7fbe4120bea818d45e3d4b53b5782cd0d5fd9e,2025-04-04T18:12:47.103000
CVE-2025-30458,0,0,d44cd0a8f35468ff3b2dcecdff85e9434b31c8f37fa6b8dfb1a82259a2d7a917,2025-04-04T18:12:42.757000 CVE-2025-30458,0,0,d44cd0a8f35468ff3b2dcecdff85e9434b31c8f37fa6b8dfb1a82259a2d7a917,2025-04-04T18:12:42.757000
CVE-2025-3046,1,1,c5e7899e6facfb262035b6b55b1df620416a5497d4b5d1d23fe0501f56d9d665,2025-07-07T10:15:26.900000
CVE-2025-30460,0,0,d80e5d42755983a665f916c748c78211e6afa7b0e15e1ebb79456909187cd900,2025-04-04T18:12:36.290000 CVE-2025-30460,0,0,d80e5d42755983a665f916c748c78211e6afa7b0e15e1ebb79456909187cd900,2025-04-04T18:12:36.290000
CVE-2025-30461,0,0,902c186691796d41fb6442de848f3f6d1e6de072cdbd4e5592409d68df7c6d6d,2025-04-04T18:12:32.693000 CVE-2025-30461,0,0,902c186691796d41fb6442de848f3f6d1e6de072cdbd4e5592409d68df7c6d6d,2025-04-04T18:12:32.693000
CVE-2025-30462,0,0,4bdec634bf22dfe7000ec2114c1948d8376bfcc7de65e9822131d6f1494f76e3,2025-04-04T18:12:28.400000 CVE-2025-30462,0,0,4bdec634bf22dfe7000ec2114c1948d8376bfcc7de65e9822131d6f1494f76e3,2025-04-04T18:12:28.400000
@ -293123,6 +293126,7 @@ CVE-2025-32246,0,0,d856ec5e5b1b873352a68bef14e07ea076ee5b077a5931df46c2d77e7e8d2
CVE-2025-32247,0,0,0d56fee34759037d409571994dd91158b660749bcd59705bc8f944a1d5ba10d2,2025-04-07T14:18:15.560000 CVE-2025-32247,0,0,0d56fee34759037d409571994dd91158b660749bcd59705bc8f944a1d5ba10d2,2025-04-07T14:18:15.560000
CVE-2025-32248,0,0,6b2b5e8625a101ef23ee5c68f566a106fd34e4e4c0a4a3f89d00a14514aa0d58,2025-04-07T14:18:15.560000 CVE-2025-32248,0,0,6b2b5e8625a101ef23ee5c68f566a106fd34e4e4c0a4a3f89d00a14514aa0d58,2025-04-07T14:18:15.560000
CVE-2025-32249,0,0,a74f78058e495c5c8058610d8e1d8eb92dda755f2cd6faf0c496fef809b79cf4,2025-04-07T14:18:15.560000 CVE-2025-32249,0,0,a74f78058e495c5c8058610d8e1d8eb92dda755f2cd6faf0c496fef809b79cf4,2025-04-07T14:18:15.560000
CVE-2025-3225,1,1,69f11a04828ad7be3915ff17d8cfee8f4f9a6237935a1987ce33087a09db17e1,2025-07-07T10:15:27.047000
CVE-2025-32250,0,0,5b65026d5b7900354f67df291c93dfbcf40a31e291957b7b2b193e0f08a73d18,2025-04-07T14:18:15.560000 CVE-2025-32250,0,0,5b65026d5b7900354f67df291c93dfbcf40a31e291957b7b2b193e0f08a73d18,2025-04-07T14:18:15.560000
CVE-2025-32251,0,0,db9e83682192d1c9ea6c6eb3ac5a5992ef43dadbd98f75e240c797354c7129f6,2025-04-07T14:18:15.560000 CVE-2025-32251,0,0,db9e83682192d1c9ea6c6eb3ac5a5992ef43dadbd98f75e240c797354c7129f6,2025-04-07T14:18:15.560000
CVE-2025-32252,0,0,00dd1f6e7f173ba4ff86679e2c6bc51fcd619cdfd9d0c4d1e5a69ec083c8b123,2025-04-07T14:18:15.560000 CVE-2025-32252,0,0,00dd1f6e7f173ba4ff86679e2c6bc51fcd619cdfd9d0c4d1e5a69ec083c8b123,2025-04-07T14:18:15.560000
@ -293440,6 +293444,7 @@ CVE-2025-32616,0,0,60896a25617451753658cf2cd6019c47ed9948e1a164f38e18b95e9ff8020
CVE-2025-32617,0,0,9661b5a949800c62844427fa5e646378c73c47d1848559445bcbac54968a81d7,2025-04-09T20:02:41.860000 CVE-2025-32617,0,0,9661b5a949800c62844427fa5e646378c73c47d1848559445bcbac54968a81d7,2025-04-09T20:02:41.860000
CVE-2025-32618,0,0,3e2dffa868b047a20340a7319c6706a3dde352ae7874207c3d70a1597ad9a558,2025-04-11T15:39:52.920000 CVE-2025-32618,0,0,3e2dffa868b047a20340a7319c6706a3dde352ae7874207c3d70a1597ad9a558,2025-04-11T15:39:52.920000
CVE-2025-32619,0,0,04b1be8036bf1c25a4e2653334fbdb6d637490b7f9c97555a40f71ef05d59815,2025-04-09T20:02:41.860000 CVE-2025-32619,0,0,04b1be8036bf1c25a4e2653334fbdb6d637490b7f9c97555a40f71ef05d59815,2025-04-09T20:02:41.860000
CVE-2025-3262,1,1,32c27c9140fd692993f9736af8b80e1d8d8040ba8bbf51a5105804fa07d78fe4,2025-07-07T10:15:27.200000
CVE-2025-32620,0,0,752c95b518c1c86908f8276831e75f69148f83ddf678c09a4b2db5d818e0b6f5,2025-04-17T20:21:05.203000 CVE-2025-32620,0,0,752c95b518c1c86908f8276831e75f69148f83ddf678c09a4b2db5d818e0b6f5,2025-04-17T20:21:05.203000
CVE-2025-32621,0,0,9afac0f9430fb7aa06a88042a84e3d0fdf6ad0626a0d9442f17bea6025ffa1ae,2025-04-09T20:02:41.860000 CVE-2025-32621,0,0,9afac0f9430fb7aa06a88042a84e3d0fdf6ad0626a0d9442f17bea6025ffa1ae,2025-04-09T20:02:41.860000
CVE-2025-32622,0,0,bb20d6b1b3e9da9aafe09a3e0f7186f182c77219f6d53914ac058a6b3c0c79cc,2025-04-17T20:21:05.203000 CVE-2025-32622,0,0,bb20d6b1b3e9da9aafe09a3e0f7186f182c77219f6d53914ac058a6b3c0c79cc,2025-04-17T20:21:05.203000
@ -293450,6 +293455,7 @@ CVE-2025-32626,0,0,3931e7c17dd39d915fe1e5820ff5c97f69ad28fe8246a3ca70e178e524555
CVE-2025-32627,0,0,2ce05adac593c463246ee439e6e044a763c1c4fc0542c6bc6722a701c6ebfac4,2025-04-11T15:39:52.920000 CVE-2025-32627,0,0,2ce05adac593c463246ee439e6e044a763c1c4fc0542c6bc6722a701c6ebfac4,2025-04-11T15:39:52.920000
CVE-2025-32628,0,0,4d2c7a01aa94c792f7990d7dd71254f93c942e443dedefba2dd6bb593b4656cc,2025-04-17T20:21:05.203000 CVE-2025-32628,0,0,4d2c7a01aa94c792f7990d7dd71254f93c942e443dedefba2dd6bb593b4656cc,2025-04-17T20:21:05.203000
CVE-2025-32629,0,0,a92f9907d30b0b6db2afce1e3db24313c9b35b2708ccf75f8c93c0c10a9249d1,2025-04-11T15:39:52.920000 CVE-2025-32629,0,0,a92f9907d30b0b6db2afce1e3db24313c9b35b2708ccf75f8c93c0c10a9249d1,2025-04-11T15:39:52.920000
CVE-2025-3263,1,1,1c203ae688cab0ef8b5c50c483cfe2b6ceb7fc9d6423c4d0a937c2869bc7bf67,2025-07-07T10:15:27.350000
CVE-2025-32630,0,0,b4cbe301acb68fb7684bb9c2133635edfbcd3e2a04a332d8b0df9750d01d9505,2025-04-17T20:21:05.203000 CVE-2025-32630,0,0,b4cbe301acb68fb7684bb9c2133635edfbcd3e2a04a332d8b0df9750d01d9505,2025-04-17T20:21:05.203000
CVE-2025-32631,0,0,98a4a957df97acffc58c06a08d29807a3e2ddf6d4d4dfbf07dcb3cd84a59cb05,2025-04-11T15:39:52.920000 CVE-2025-32631,0,0,98a4a957df97acffc58c06a08d29807a3e2ddf6d4d4dfbf07dcb3cd84a59cb05,2025-04-11T15:39:52.920000
CVE-2025-32632,0,0,26e39bc54319c3de0a0c10d557b9f9955da9030c6dcde1ffebb8eaee6fe7bfaa,2025-04-11T15:39:52.920000 CVE-2025-32632,0,0,26e39bc54319c3de0a0c10d557b9f9955da9030c6dcde1ffebb8eaee6fe7bfaa,2025-04-11T15:39:52.920000
@ -293460,6 +293466,7 @@ CVE-2025-32636,0,0,46c5ab1255e66cc2f15290ac98f7ba9ef721abddf5f02afe48be54a35083f
CVE-2025-32637,0,0,1927dfdf1c16211f4bc20ad3d946138aa50dcf26453cc46cfa4f17a2027f010f,2025-04-17T20:21:05.203000 CVE-2025-32637,0,0,1927dfdf1c16211f4bc20ad3d946138aa50dcf26453cc46cfa4f17a2027f010f,2025-04-17T20:21:05.203000
CVE-2025-32638,0,0,d66c5e14690133298e4def8df71f876e4a0182aa854b235d75b391a9d2cb2037,2025-04-17T20:21:05.203000 CVE-2025-32638,0,0,d66c5e14690133298e4def8df71f876e4a0182aa854b235d75b391a9d2cb2037,2025-04-17T20:21:05.203000
CVE-2025-32639,0,0,8e4f9b910ec2cbe7d93f4a3d8fdcdcebf05317deb0404fe24a83cc58d9c07d91,2025-04-17T20:21:05.203000 CVE-2025-32639,0,0,8e4f9b910ec2cbe7d93f4a3d8fdcdcebf05317deb0404fe24a83cc58d9c07d91,2025-04-17T20:21:05.203000
CVE-2025-3264,1,1,da651e1c37ffe7ea0205968e82a4db6bbdec76969cd78a61b48a85cff4533b2c,2025-07-07T10:15:27.500000
CVE-2025-32640,0,0,cf49f8ad76a904999cf27486d117c795b1de02a1d0b705263cab94cab97b30be,2025-04-09T20:02:41.860000 CVE-2025-32640,0,0,cf49f8ad76a904999cf27486d117c795b1de02a1d0b705263cab94cab97b30be,2025-04-09T20:02:41.860000
CVE-2025-32641,0,0,d04a6f9084570cae3bdbe21b3d3e6cbeacbb39d50f117e6bae39942bd0102f2b,2025-04-09T20:02:41.860000 CVE-2025-32641,0,0,d04a6f9084570cae3bdbe21b3d3e6cbeacbb39d50f117e6bae39942bd0102f2b,2025-04-09T20:02:41.860000
CVE-2025-32642,0,0,aa532dd331e1bd53f2e3ad431d5751486f9683adee9f60d6fbaabda798c828d0,2025-04-09T20:02:41.860000 CVE-2025-32642,0,0,aa532dd331e1bd53f2e3ad431d5751486f9683adee9f60d6fbaabda798c828d0,2025-04-09T20:02:41.860000
@ -294051,6 +294058,8 @@ CVE-2025-3461,0,0,b711842f3138044403b9c62c870e92a946a81dbd27b6e170abe8935ae6232c
CVE-2025-3462,0,0,96a08229937a9712440a065f7abf8858b2712ba35f45d182986e12e301979bf4,2025-05-12T17:32:52.810000 CVE-2025-3462,0,0,96a08229937a9712440a065f7abf8858b2712ba35f45d182986e12e301979bf4,2025-05-12T17:32:52.810000
CVE-2025-3463,0,0,b9c293fc915bcaaa130da553f49fb5680a86dfb762948cd4b867acf35ebae4a2,2025-05-12T17:32:52.810000 CVE-2025-3463,0,0,b9c293fc915bcaaa130da553f49fb5680a86dfb762948cd4b867acf35ebae4a2,2025-05-12T17:32:52.810000
CVE-2025-3464,0,0,38d4a563f02ab0b6699d61c78e67bf5bbd6f38fb8aef752a88c9119a8e063079,2025-06-17T01:15:22.120000 CVE-2025-3464,0,0,38d4a563f02ab0b6699d61c78e67bf5bbd6f38fb8aef752a88c9119a8e063079,2025-06-17T01:15:22.120000
CVE-2025-3466,1,1,f9d9c57d7ed9862bb4a0577b8e28a9851a72eb0a03732c310c4cd5ef28e0eac2,2025-07-07T10:15:27.640000
CVE-2025-3467,1,1,875cfa42033e493d5f366775e6159e85348f40b76af1a31401a252da2c670d12,2025-07-07T10:15:27.793000
CVE-2025-3468,0,0,136950783d88ce0e5a3cbb5efc9cbb24284feffc83746ee503e38c1107465276,2025-06-04T22:54:54.960000 CVE-2025-3468,0,0,136950783d88ce0e5a3cbb5efc9cbb24284feffc83746ee503e38c1107465276,2025-06-04T22:54:54.960000
CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc139092,2025-04-11T15:39:52.920000 CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc139092,2025-04-11T15:39:52.920000
CVE-2025-3470,0,0,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000 CVE-2025-3470,0,0,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000
@ -294220,6 +294229,7 @@ CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac8
CVE-2025-3623,0,0,617cffe0141337c7867deb96e2a7d70a856c2a880b7f99e53e2fda3baeae607b,2025-06-13T14:15:21.147000 CVE-2025-3623,0,0,617cffe0141337c7867deb96e2a7d70a856c2a880b7f99e53e2fda3baeae607b,2025-06-13T14:15:21.147000
CVE-2025-3624,0,0,7ed4cd410ce03398fb8e34cfd1d803d6ee7ef277c76293f0adef5df6e973fd9d,2025-05-16T14:42:18.700000 CVE-2025-3624,0,0,7ed4cd410ce03398fb8e34cfd1d803d6ee7ef277c76293f0adef5df6e973fd9d,2025-05-16T14:42:18.700000
CVE-2025-3625,0,0,4c43dccfb8b4b9a35f3c2ae60e7f1e31e5068a47ae5b8c8372c26fb8bdf705cb,2025-06-24T16:17:15.723000 CVE-2025-3625,0,0,4c43dccfb8b4b9a35f3c2ae60e7f1e31e5068a47ae5b8c8372c26fb8bdf705cb,2025-06-24T16:17:15.723000
CVE-2025-3626,1,1,e6ac371e85d81a280684ada51e305ef917920a139ffe064fa5eb2e1fe5f8e8ed,2025-07-07T10:15:27.967000
CVE-2025-3627,0,0,c4ad094052a3d6023e19e3ca7cf702b4f4817bb1e5084b3a895c077f2e88944d,2025-06-24T16:17:23.420000 CVE-2025-3627,0,0,c4ad094052a3d6023e19e3ca7cf702b4f4817bb1e5084b3a895c077f2e88944d,2025-06-24T16:17:23.420000
CVE-2025-3628,0,0,b2ac3aafba07c87de6ae982e897cbd81a37d87151c789a9585a83fdcbb4550a7,2025-06-24T16:19:13.647000 CVE-2025-3628,0,0,b2ac3aafba07c87de6ae982e897cbd81a37d87151c789a9585a83fdcbb4550a7,2025-06-24T16:19:13.647000
CVE-2025-3629,0,0,363ba61764040fb0b8551a08a41f953b5bb4359c77899b7073800f560de90fb4,2025-06-23T20:16:21.633000 CVE-2025-3629,0,0,363ba61764040fb0b8551a08a41f953b5bb4359c77899b7073800f560de90fb4,2025-06-23T20:16:21.633000
@ -294310,6 +294320,7 @@ CVE-2025-3698,0,0,3410d174ae31c43abb68f418121b89dca3911c4e48575a9281b05507afa201
CVE-2025-3699,0,0,d02a1cd04c24f3e630d7aa0838897d4c7fa576fd6ceb0be9ab7fddd90a36396b,2025-06-30T18:38:48.477000 CVE-2025-3699,0,0,d02a1cd04c24f3e630d7aa0838897d4c7fa576fd6ceb0be9ab7fddd90a36396b,2025-06-30T18:38:48.477000
CVE-2025-3702,0,0,6c9d3b4be22efb62cccd37cd7e92146e02fd0e412dcd144b7f19d652d3921939,2025-07-03T15:13:53.147000 CVE-2025-3702,0,0,6c9d3b4be22efb62cccd37cd7e92146e02fd0e412dcd144b7f19d652d3921939,2025-07-03T15:13:53.147000
CVE-2025-3704,0,0,fa4a3eb7f97cc05cb29111ef6884110e54a213e5cd6aeb5d02530af4ecd14db2,2025-05-28T15:01:30.720000 CVE-2025-3704,0,0,fa4a3eb7f97cc05cb29111ef6884110e54a213e5cd6aeb5d02530af4ecd14db2,2025-05-28T15:01:30.720000
CVE-2025-3705,1,1,5d381cd0b2ffbf4873c21c04155361efa046afde7e0ad77cc3c79dfe5f185c39,2025-07-07T10:15:28.133000
CVE-2025-3706,0,0,af36967002cae35edc22a037b5e4639098ca61a00f66dc40237f6cb847234a6c,2025-04-29T13:52:10.697000 CVE-2025-3706,0,0,af36967002cae35edc22a037b5e4639098ca61a00f66dc40237f6cb847234a6c,2025-04-29T13:52:10.697000
CVE-2025-3707,0,0,19f2a3789a7c8f868baebd7065af2264b477a736f48157fc6f27b30ec7dd06ec,2025-05-07T16:50:32.967000 CVE-2025-3707,0,0,19f2a3789a7c8f868baebd7065af2264b477a736f48157fc6f27b30ec7dd06ec,2025-05-07T16:50:32.967000
CVE-2025-3708,0,0,d78aa125c93a2dcfe7efdd0fc06a6ffc03cde5530d4cb9fd272dabdbcad493c7,2025-05-07T16:50:44.930000 CVE-2025-3708,0,0,d78aa125c93a2dcfe7efdd0fc06a6ffc03cde5530d4cb9fd272dabdbcad493c7,2025-05-07T16:50:44.930000
@ -294413,6 +294424,7 @@ CVE-2025-37766,0,0,7b20a13e8cec563c892476ead16d575857de0070e194be31f8408ede70259
CVE-2025-37767,0,0,6cfb108406975b58d0bfc5e9e409d4b6397489c1f9263746acfbf65636b31444,2025-05-02T13:53:20.943000 CVE-2025-37767,0,0,6cfb108406975b58d0bfc5e9e409d4b6397489c1f9263746acfbf65636b31444,2025-05-02T13:53:20.943000
CVE-2025-37768,0,0,990673ed1fb392644fd0554511c9e81baf774d1c59dfbb2cc705c8e93fd9a739,2025-05-02T13:53:20.943000 CVE-2025-37768,0,0,990673ed1fb392644fd0554511c9e81baf774d1c59dfbb2cc705c8e93fd9a739,2025-05-02T13:53:20.943000
CVE-2025-37769,0,0,31f8816726f0cb7d9fc561749e11f61866264d9740a90f5a23372f1bbcc636d5,2025-05-02T13:53:20.943000 CVE-2025-37769,0,0,31f8816726f0cb7d9fc561749e11f61866264d9740a90f5a23372f1bbcc636d5,2025-05-02T13:53:20.943000
CVE-2025-3777,1,1,2c4a25b1a83c0297f1f26ece8c7f71039618abf5b7a0fd36686e76e32f4f290a,2025-07-07T10:15:28.297000
CVE-2025-37770,0,0,b7acc6c4d0b48391b6746baae7cdeca2311b8071ac645fb37cfb183ae4243ea0,2025-05-02T13:53:20.943000 CVE-2025-37770,0,0,b7acc6c4d0b48391b6746baae7cdeca2311b8071ac645fb37cfb183ae4243ea0,2025-05-02T13:53:20.943000
CVE-2025-37771,0,0,89ab04b910122c0bcc270e5faf2ad24c0fe4ffc4099557f0d2b18035337bf618,2025-05-02T13:53:20.943000 CVE-2025-37771,0,0,89ab04b910122c0bcc270e5faf2ad24c0fe4ffc4099557f0d2b18035337bf618,2025-05-02T13:53:20.943000
CVE-2025-37772,0,0,8c5be2ed5cd8d3ea9baceb92b32b128808b5fcd57207f5b56b4515e9be91b7f9,2025-05-02T13:53:20.943000 CVE-2025-37772,0,0,8c5be2ed5cd8d3ea9baceb92b32b128808b5fcd57207f5b56b4515e9be91b7f9,2025-05-02T13:53:20.943000
@ -295016,7 +295028,7 @@ CVE-2025-3916,0,0,045ece3601bd5ccbedc31ea0240de6aa0afd0b9d1478dcdfa2e80b8a58fde7
CVE-2025-3917,0,0,c5171151eebd44803f90dc57bca3ca581e3f3a3b4495aa64f3e44a3933917ede,2025-05-16T14:43:26.160000 CVE-2025-3917,0,0,c5171151eebd44803f90dc57bca3ca581e3f3a3b4495aa64f3e44a3933917ede,2025-05-16T14:43:26.160000
CVE-2025-3918,0,0,63b01e62f8046021d2f78807719fa3fd3623a650f7755e4a8a67c57ed80094c1,2025-05-05T20:54:19.760000 CVE-2025-3918,0,0,63b01e62f8046021d2f78807719fa3fd3623a650f7755e4a8a67c57ed80094c1,2025-05-05T20:54:19.760000
CVE-2025-3919,0,0,a87264f5c964c1b9f0e2df5faae10e0481d418f0fb1502b0ee9da33cc507ee91,2025-06-04T14:54:33.783000 CVE-2025-3919,0,0,a87264f5c964c1b9f0e2df5faae10e0481d418f0fb1502b0ee9da33cc507ee91,2025-06-04T14:54:33.783000
CVE-2025-3920,1,1,31c433673f0c0524a4643f80060a30fb3eb7a739da1bf0a4b8e4f7d0512fbf46,2025-07-07T09:15:26.587000 CVE-2025-3920,0,0,31c433673f0c0524a4643f80060a30fb3eb7a739da1bf0a4b8e4f7d0512fbf46,2025-07-07T09:15:26.587000
CVE-2025-39201,0,0,ac494421fef95e7246be675844d0567c84bbd09125124991a997be6495bbeb5a,2025-06-26T18:58:14.280000 CVE-2025-39201,0,0,ac494421fef95e7246be675844d0567c84bbd09125124991a997be6495bbeb5a,2025-06-26T18:58:14.280000
CVE-2025-39202,0,0,e4a1b79ce1102dbd814273d9c11f72b989b247a4b565087c308a3675cabe0e1b,2025-06-26T18:58:14.280000 CVE-2025-39202,0,0,e4a1b79ce1102dbd814273d9c11f72b989b247a4b565087c308a3675cabe0e1b,2025-06-26T18:58:14.280000
CVE-2025-39203,0,0,c8c71b1662e8236b6c8f7605df9f1ed02dd5c9c88a46d156bc91dee5c5d83d9f,2025-06-26T18:58:14.280000 CVE-2025-39203,0,0,c8c71b1662e8236b6c8f7605df9f1ed02dd5c9c88a46d156bc91dee5c5d83d9f,2025-06-26T18:58:14.280000
@ -297581,6 +297593,7 @@ CVE-2025-47786,0,0,04d15aa36906f407ce9503b5e85686cf0003a20f24e1aaa4e03a652f6d18b
CVE-2025-47787,0,0,8b3f006971f3c77e8bfe09c8095c5ff79a4ccd86822488783708679fc0bca11b,2025-07-01T14:42:21.900000 CVE-2025-47787,0,0,8b3f006971f3c77e8bfe09c8095c5ff79a4ccd86822488783708679fc0bca11b,2025-07-01T14:42:21.900000
CVE-2025-47788,0,0,6b5e38cbcfc946bfd59d42d46514cb0def4592e040d374abdc709005316d2f44,2025-05-19T15:15:25.200000 CVE-2025-47788,0,0,6b5e38cbcfc946bfd59d42d46514cb0def4592e040d374abdc709005316d2f44,2025-05-19T15:15:25.200000
CVE-2025-47789,0,0,45dc770bb0c94c5e8c48030b8884b90c652471ebe6c8c411f93ca31ef83185f9,2025-05-16T14:42:18.700000 CVE-2025-47789,0,0,45dc770bb0c94c5e8c48030b8884b90c652471ebe6c8c411f93ca31ef83185f9,2025-05-16T14:42:18.700000
CVE-2025-4779,1,1,e76da2c4ccde5f0f2dae7a8b55398d14c015ceea85d1e38685454ed6f4b4b6fc,2025-07-07T10:15:28.717000
CVE-2025-47790,0,0,a6351ab24f93f0d386dbb08791d6aca496319ae8a2ceb95e2ce6b8ad46d620c7,2025-05-16T14:42:18.700000 CVE-2025-47790,0,0,a6351ab24f93f0d386dbb08791d6aca496319ae8a2ceb95e2ce6b8ad46d620c7,2025-05-16T14:42:18.700000
CVE-2025-47791,0,0,ca1f70ef41d3a1ed585c10f4aaea46f0cbe8cd3b5251cfe28c38668da573721f,2025-05-19T13:35:50.497000 CVE-2025-47791,0,0,ca1f70ef41d3a1ed585c10f4aaea46f0cbe8cd3b5251cfe28c38668da573721f,2025-05-19T13:35:50.497000
CVE-2025-47792,0,0,5db4e1b0099c338d37989cd3de0ee62c1464ff8fe0f69042bbd11e43a23f0241,2025-05-19T13:35:50.497000 CVE-2025-47792,0,0,5db4e1b0099c338d37989cd3de0ee62c1464ff8fe0f69042bbd11e43a23f0241,2025-05-19T13:35:50.497000
@ -298249,13 +298262,13 @@ CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa
CVE-2025-49163,0,0,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000 CVE-2025-49163,0,0,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000
CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000 CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000
CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000 CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000
CVE-2025-49175,0,1,63df3c1b3c0c8ed032725328034a50a6ededb8b8dfd2f206f53445685d1573c0,2025-07-07T08:15:23.817000 CVE-2025-49175,0,0,63df3c1b3c0c8ed032725328034a50a6ededb8b8dfd2f206f53445685d1573c0,2025-07-07T08:15:23.817000
CVE-2025-49176,0,1,169a9b600aed8d1d15d26cd8d0d96220c98dbdcac3071d4fa0af7582843e384f,2025-07-07T08:15:24.947000 CVE-2025-49176,0,0,169a9b600aed8d1d15d26cd8d0d96220c98dbdcac3071d4fa0af7582843e384f,2025-07-07T08:15:24.947000
CVE-2025-49177,0,0,2776354ba86cd7216ed2eee07d464dd343e2260aa14001f109fcd75b0e6568d1,2025-07-02T20:15:30.943000 CVE-2025-49177,0,0,2776354ba86cd7216ed2eee07d464dd343e2260aa14001f109fcd75b0e6568d1,2025-07-02T20:15:30.943000
CVE-2025-49178,0,1,3da142d00062cd7b9f7ac77c10b6d92e7ab04fb8e0fd6fff1c8f9c2fc71b860a,2025-07-07T09:15:26.937000 CVE-2025-49178,0,0,3da142d00062cd7b9f7ac77c10b6d92e7ab04fb8e0fd6fff1c8f9c2fc71b860a,2025-07-07T09:15:26.937000
CVE-2025-49179,0,1,a2758d12aacaaae195271814f5ad69f46d3061af6963f0a57dccf1f6348fd3d5,2025-07-07T08:15:25.130000 CVE-2025-49179,0,0,a2758d12aacaaae195271814f5ad69f46d3061af6963f0a57dccf1f6348fd3d5,2025-07-07T08:15:25.130000
CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000 CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000
CVE-2025-49180,0,1,b6e779f44595b916365a8a1a8cb1c8c8be415766de030a80badfab752e88d39d,2025-07-07T08:15:25.293000 CVE-2025-49180,0,0,b6e779f44595b916365a8a1a8cb1c8c8be415766de030a80badfab752e88d39d,2025-07-07T08:15:25.293000
CVE-2025-49181,0,0,65f8ea01de63d019d8688de775c40b302b8c0b1e44c040e53e46324e69435218,2025-06-12T16:06:20.180000 CVE-2025-49181,0,0,65f8ea01de63d019d8688de775c40b302b8c0b1e44c040e53e46324e69435218,2025-06-12T16:06:20.180000
CVE-2025-49182,0,0,8adc8833944dbbffb6c925bafc811eee2574582f2d7b7b09537e334080770141,2025-06-13T09:15:20.130000 CVE-2025-49182,0,0,8adc8833944dbbffb6c925bafc811eee2574582f2d7b7b09537e334080770141,2025-06-13T09:15:20.130000
CVE-2025-49183,0,0,c9c3ab65e477d8e9a4d5c9adaf45822d49f0873835d0971680386eb894e72562,2025-06-12T16:06:20.180000 CVE-2025-49183,0,0,c9c3ab65e477d8e9a4d5c9adaf45822d49f0873835d0971680386eb894e72562,2025-06-12T16:06:20.180000
@ -299447,6 +299460,7 @@ CVE-2025-5446,0,0,e5b8442225b2596d4e485375bec906c695e65ec084b20c8f1887efd794228e
CVE-2025-5447,0,0,b48376ecfe2b08edb6956c77815c7714ff97e9cabd629e0b7d61c068b2578472,2025-07-02T01:07:18.147000 CVE-2025-5447,0,0,b48376ecfe2b08edb6956c77815c7714ff97e9cabd629e0b7d61c068b2578472,2025-07-02T01:07:18.147000
CVE-2025-5455,0,0,c1321d8b95e99a1a6b4bd58591f4d8f5ad84a8f09a18d929f7bc30e94a33953f,2025-06-02T17:32:17.397000 CVE-2025-5455,0,0,c1321d8b95e99a1a6b4bd58591f4d8f5ad84a8f09a18d929f7bc30e94a33953f,2025-06-02T17:32:17.397000
CVE-2025-5459,0,0,bfef67fb6bc5a0d62d15f9ee68a0d9240ec3720f0fb55d24a02c5d3644fba822,2025-06-26T18:57:43.670000 CVE-2025-5459,0,0,bfef67fb6bc5a0d62d15f9ee68a0d9240ec3720f0fb55d24a02c5d3644fba822,2025-06-26T18:57:43.670000
CVE-2025-5472,1,1,55eaaf5a87aad78c4ffc41fabcd4c3cb9952754e5860fc78a428b87287d41350,2025-07-07T10:15:28.873000
CVE-2025-5473,0,0,71e9a0d8879b30e10102aac4dbfd9c373861b74ea445d6f4d1c1466cb063c6e4,2025-06-09T12:15:47.880000 CVE-2025-5473,0,0,71e9a0d8879b30e10102aac4dbfd9c373861b74ea445d6f4d1c1466cb063c6e4,2025-06-09T12:15:47.880000
CVE-2025-5474,0,0,ff56ae6d33a817b3b5972773cb7c3e3407b0f73c6768464aca7201e3d55867a2,2025-06-09T12:15:47.880000 CVE-2025-5474,0,0,ff56ae6d33a817b3b5972773cb7c3e3407b0f73c6768464aca7201e3d55867a2,2025-06-09T12:15:47.880000
CVE-2025-5475,0,0,6d8021f8ceef8e2068d7ae34c003ad4b76f386b031597decaa22f19a4b2e44e0,2025-06-23T20:16:21.633000 CVE-2025-5475,0,0,6d8021f8ceef8e2068d7ae34c003ad4b76f386b031597decaa22f19a4b2e44e0,2025-06-23T20:16:21.633000
@ -299896,7 +299910,7 @@ CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca
CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000 CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000
CVE-2025-6017,0,0,cdf296e1429037cbf00bd284008bfaf96f2ac3ba0f0da1dc4e6958978cbc6e8e,2025-07-03T15:13:53.147000 CVE-2025-6017,0,0,cdf296e1429037cbf00bd284008bfaf96f2ac3ba0f0da1dc4e6958978cbc6e8e,2025-07-03T15:13:53.147000
CVE-2025-6019,0,0,5477ec15a82be0c2a93ed9a3473af3a8dab5cb2afdbbfee75cdeb137fdc5af5e,2025-06-30T03:15:25.990000 CVE-2025-6019,0,0,5477ec15a82be0c2a93ed9a3473af3a8dab5cb2afdbbfee75cdeb137fdc5af5e,2025-06-30T03:15:25.990000
CVE-2025-6020,0,1,d93c7b29d895d9b8150932df3a20e117e2c9d41feac2f952996e06083758c92f,2025-07-07T08:15:25.460000 CVE-2025-6020,0,0,d93c7b29d895d9b8150932df3a20e117e2c9d41feac2f952996e06083758c92f,2025-07-07T08:15:25.460000
CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000 CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000
CVE-2025-6022,0,0,673713355118472c1ebaabd5c5e4854e0f9320e04b049cdd5cc68d5d0f25f012,2025-07-05T23:15:26.353000 CVE-2025-6022,0,0,673713355118472c1ebaabd5c5e4854e0f9320e04b049cdd5cc68d5d0f25f012,2025-07-05T23:15:26.353000
CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000 CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000
@ -300019,6 +300033,7 @@ CVE-2025-6196,0,0,ebd0476f8627cd400d4a2990bf388e707195c795d8a7681502291e5ed83c18
CVE-2025-6199,0,0,27de73d7bdfbcb0d047107c059b4fb0beddf1f77ad32bc36681bc8884ca65c55,2025-06-17T20:50:23.507000 CVE-2025-6199,0,0,27de73d7bdfbcb0d047107c059b4fb0beddf1f77ad32bc36681bc8884ca65c55,2025-06-17T20:50:23.507000
CVE-2025-6201,0,0,09953b11a7588a9edc2f3925b0cbb84add185ea803d7765dc4a2a786cd413a85,2025-06-23T20:16:59.783000 CVE-2025-6201,0,0,09953b11a7588a9edc2f3925b0cbb84add185ea803d7765dc4a2a786cd413a85,2025-06-23T20:16:59.783000
CVE-2025-6206,0,0,c66ee500876bc4abb021bb9d77aeda45e0e42d83e894cdd37485d8f28334b052,2025-06-26T18:58:14.280000 CVE-2025-6206,0,0,c66ee500876bc4abb021bb9d77aeda45e0e42d83e894cdd37485d8f28334b052,2025-06-26T18:58:14.280000
CVE-2025-6210,1,1,14d31ee2b00a58e0d63a7ab89552e4950b1424b800527d9bb45e7fdd7c86ee97,2025-07-07T10:15:29.040000
CVE-2025-6212,0,0,5dac9bfcd47bb22b8482f7b90b8ca95e9033fb4dc0dc0c238430c68c18eda7f4,2025-06-26T18:57:43.670000 CVE-2025-6212,0,0,5dac9bfcd47bb22b8482f7b90b8ca95e9033fb4dc0dc0c238430c68c18eda7f4,2025-06-26T18:57:43.670000
CVE-2025-6216,0,0,fa2fdcc5033cf3a1df6342a01f2acd273f87b99c1664b4ca0db573d99035212e,2025-06-23T20:16:21.633000 CVE-2025-6216,0,0,fa2fdcc5033cf3a1df6342a01f2acd273f87b99c1664b4ca0db573d99035212e,2025-06-23T20:16:21.633000
CVE-2025-6217,0,0,0d2c65c94d7cc4fabd9027df56e983345e1f33543f29c53f0c45cf319713d14d,2025-06-23T20:16:21.633000 CVE-2025-6217,0,0,0d2c65c94d7cc4fabd9027df56e983345e1f33543f29c53f0c45cf319713d14d,2025-06-23T20:16:21.633000
@ -300136,6 +300151,7 @@ CVE-2025-6379,0,0,1f3ce0338cba737975d34ef3c6f366045d271231fad354ccd5fd7285086b32
CVE-2025-6381,0,0,05fb40aefc38aca74c97a648ce5e29eeebdaf346b83dbed374235dabaa8ad14a,2025-06-30T18:38:23.493000 CVE-2025-6381,0,0,05fb40aefc38aca74c97a648ce5e29eeebdaf346b83dbed374235dabaa8ad14a,2025-06-30T18:38:23.493000
CVE-2025-6383,0,0,b46c3e86435c1dc7ff6465355979b367a1d819d4bbf46e0422c7cfd37cfbac42,2025-06-26T18:57:43.670000 CVE-2025-6383,0,0,b46c3e86435c1dc7ff6465355979b367a1d819d4bbf46e0422c7cfd37cfbac42,2025-06-26T18:57:43.670000
CVE-2025-6384,0,0,97aa0c1b3518730f2ff1ac0c6e40e6df53f12abb019ae8c41f191d17b86f6691,2025-06-23T20:16:40.143000 CVE-2025-6384,0,0,97aa0c1b3518730f2ff1ac0c6e40e6df53f12abb019ae8c41f191d17b86f6691,2025-06-23T20:16:40.143000
CVE-2025-6386,1,1,b2a078e22a659d4d88f448dea0064464b20c22ed2491c180557e36b6a04d2807,2025-07-07T10:15:29.187000
CVE-2025-6393,0,0,32247b5db96e134f65a8c77173062a4edd972dbb6c0ac396c8f0bf9ce435cde7,2025-06-23T20:16:21.633000 CVE-2025-6393,0,0,32247b5db96e134f65a8c77173062a4edd972dbb6c0ac396c8f0bf9ce435cde7,2025-06-23T20:16:21.633000
CVE-2025-6394,0,0,a6663654d9b1668d091d362eee2cdb7e6cb13133cb16bf86aada9168ce7b98ea,2025-06-25T20:12:10.560000 CVE-2025-6394,0,0,a6663654d9b1668d091d362eee2cdb7e6cb13133cb16bf86aada9168ce7b98ea,2025-06-25T20:12:10.560000
CVE-2025-6399,0,0,1cc4662a693a649a9f407a6e359aaca52fe988ef413a3d7e4dcc120f8e622da2,2025-06-25T20:13:30.100000 CVE-2025-6399,0,0,1cc4662a693a649a9f407a6e359aaca52fe988ef413a3d7e4dcc120f8e622da2,2025-06-25T20:13:30.100000
@ -300573,8 +300589,12 @@ CVE-2025-7114,0,0,9d06a1babc2fc64b84b5f67f39ccb61a42d8da4c9464746f9e7739bb6c3e23
CVE-2025-7115,0,0,a27187f501d5b24d8e7d6eaf0ef282b8ac25689fb83bfe16b7f5d432aff3cba9,2025-07-07T06:15:30.590000 CVE-2025-7115,0,0,a27187f501d5b24d8e7d6eaf0ef282b8ac25689fb83bfe16b7f5d432aff3cba9,2025-07-07T06:15:30.590000
CVE-2025-7116,0,0,cc5179054b7f8edc49775a1e5decef8897db32cec0c77104e2cab64c15ab718a,2025-07-07T07:15:24.313000 CVE-2025-7116,0,0,cc5179054b7f8edc49775a1e5decef8897db32cec0c77104e2cab64c15ab718a,2025-07-07T07:15:24.313000
CVE-2025-7117,0,0,455a2b4b9fc464fde36d6a44b78e44e87fde0a0848f99ff1630ba6a0b0dffb2a,2025-07-07T07:15:24.563000 CVE-2025-7117,0,0,455a2b4b9fc464fde36d6a44b78e44e87fde0a0848f99ff1630ba6a0b0dffb2a,2025-07-07T07:15:24.563000
CVE-2025-7118,1,1,e4d79629f51a9edcc0bbe4a8c178b2de8e9b8588aa684f600d751924fbf7390d,2025-07-07T08:15:25.603000 CVE-2025-7118,0,0,e4d79629f51a9edcc0bbe4a8c178b2de8e9b8588aa684f600d751924fbf7390d,2025-07-07T08:15:25.603000
CVE-2025-7119,1,1,b16a4f864769be4b66582abb99e7b71db1e4a258dd69d5f0d6b278c8aea660d3,2025-07-07T08:15:25.787000 CVE-2025-7119,0,0,b16a4f864769be4b66582abb99e7b71db1e4a258dd69d5f0d6b278c8aea660d3,2025-07-07T08:15:25.787000
CVE-2025-7120,1,1,f25a21d5a89a8851fe91016c0f04a2e392d5690316ddffea1337e8c150af23e2,2025-07-07T09:15:27.097000 CVE-2025-7120,0,0,f25a21d5a89a8851fe91016c0f04a2e392d5690316ddffea1337e8c150af23e2,2025-07-07T09:15:27.097000
CVE-2025-7121,1,1,f98592b90bae8673a1acf1562a82f201f4107122965f0fa7be2fd44e609ee989,2025-07-07T09:15:27.290000 CVE-2025-7121,0,0,f98592b90bae8673a1acf1562a82f201f4107122965f0fa7be2fd44e609ee989,2025-07-07T09:15:27.290000
CVE-2025-7122,1,1,adf256896ed5cbb8629aa9cde7fbd52d5f1bfa96f6bba07e9740464a39062f0c,2025-07-07T10:15:29.333000
CVE-2025-7123,1,1,d658a23f3c64568d145a25898383fe8c81303a99ce38c2feb3ec256ae1454ce8,2025-07-07T10:15:29.580000
CVE-2025-7124,1,1,522137e44a576022dd9df4ff44053e0ecc7e9aaf32ee911cb3298096b5ac7633,2025-07-07T11:15:51.483000
CVE-2025-7125,1,1,138e4d9c171b2eeadb42478a73203b9e6dbed15caf9bef9fc64eb47451c5fa49,2025-07-07T11:15:52.217000
CVE-2025-7145,0,0,0431922fce794ebe2fb76c85f6a92686a8078a8927733582f3cad39cb892c9b6,2025-07-07T03:15:30.917000 CVE-2025-7145,0,0,0431922fce794ebe2fb76c85f6a92686a8078a8927733582f3cad39cb892c9b6,2025-07-07T03:15:30.917000

Can't render this file because it is too large.