mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2025-07-07T12:00:11.142309+00:00
This commit is contained in:
parent
1566fb1c75
commit
b3e09c81ca
56
CVE-2024/CVE-2024-433xx/CVE-2024-43334.json
Normal file
56
CVE-2024/CVE-2024-433xx/CVE-2024-43334.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43334",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2025-07-07T10:15:25.593",
|
||||||
|
"lastModified": "2025-07-07T10:15:25.593",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gavias Halpes allows Reflected XSS.This issue affects Halpes: from n/a before 1.2.5."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/wordpress/theme/halpes/vulnerability/wordpress-halpes-theme-1-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-30xx/CVE-2025-3044.json
Normal file
60
CVE-2025/CVE-2025-30xx/CVE-2025-3044.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3044",
|
||||||
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
|
"published": "2025-07-07T10:15:26.717",
|
||||||
|
"lastModified": "2025-07-07T10:15:26.717",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the ArxivReader class of the run-llama/llama_index repository, versions up to v0.12.22.post1, allows for MD5 hash collisions when generating filenames for downloaded papers. This can lead to data loss as papers with identical titles but different contents may overwrite each other, preventing some papers from being processed for AI model training. The issue is resolved in version 0.12.28."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-440"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/run-llama/llama_index/commit/0008041e8dde8e519621388e5d6f558bde6ef42e",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/80182c3a-876f-422f-8bac-38267e0345d6",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-30xx/CVE-2025-3046.json
Normal file
60
CVE-2025/CVE-2025-30xx/CVE-2025-3046.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3046",
|
||||||
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
|
"published": "2025-07-07T10:15:26.900",
|
||||||
|
"lastModified": "2025-07-07T10:15:26.900",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the `ObsidianReader` class of the run-llama/llama_index repository, versions 0.12.23 to 0.12.28, allows for arbitrary file read through symbolic links. The `ObsidianReader` fails to resolve symlinks to their real paths and does not validate whether the resolved paths lie within the intended directory. This flaw enables attackers to place symlinks pointing to files outside the vault directory, which are then processed as valid Markdown files, potentially exposing sensitive information."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-22"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/run-llama/llama_index/commit/0008041e8dde8e519621388e5d6f558bde6ef42e",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/90a1f1b2-bb82-4d66-9fc1-856ed5f904da",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-32xx/CVE-2025-3225.json
Normal file
60
CVE-2025/CVE-2025-32xx/CVE-2025-3225.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3225",
|
||||||
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
|
"published": "2025-07-07T10:15:27.047",
|
||||||
|
"lastModified": "2025-07-07T10:15:27.047",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An XML Entity Expansion vulnerability, also known as a 'billion laughs' attack, exists in the sitemap parser of the run-llama/llama_index repository, specifically affecting version v0.12.21. This vulnerability allows an attacker to supply a malicious Sitemap XML, leading to a Denial of Service (DoS) by exhausting system memory and potentially causing a system crash. The issue is resolved in version v0.12.29."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-776"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/run-llama/llama_index/commit/4f6ee062b19212106a2632af9c9521fc7f0a3584",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/e33c0699-e9a2-49aa-837b-5363205637a2",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-32xx/CVE-2025-3262.json
Normal file
60
CVE-2025/CVE-2025-32xx/CVE-2025-3262.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3262",
|
||||||
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
|
"published": "2025-07-07T10:15:27.200",
|
||||||
|
"lastModified": "2025-07-07T10:15:27.200",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the huggingface/transformers repository, specifically in version 4.49.0. The vulnerability is due to inefficient regular expression complexity in the `SETTING_RE` variable within the `transformers/commands/chat.py` file. The regex contains repetition groups and non-optimized quantifiers, leading to exponential backtracking when processing 'almost matching' payloads. This can degrade application performance and potentially result in a denial-of-service (DoS) when handling specially crafted input strings. The issue is fixed in version 4.51.0."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1333"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/huggingface/transformers/commit/0720e206c6ba28887e4d60ef60a6a089f6c1cc76",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/ecf5ccc4-39e7-4fb3-b547-14a41d31a184",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-32xx/CVE-2025-3263.json
Normal file
60
CVE-2025/CVE-2025-32xx/CVE-2025-3263.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3263",
|
||||||
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
|
"published": "2025-07-07T10:15:27.350",
|
||||||
|
"lastModified": "2025-07-07T10:15:27.350",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically in the `get_configuration_file()` function within the `transformers.configuration_utils` module. The affected version is 4.49.0, and the issue is resolved in version 4.51.0. The vulnerability arises from the use of a regular expression pattern `config\\.(.*)\\.json` that can be exploited to cause excessive CPU consumption through crafted input strings, leading to catastrophic backtracking. This can result in model serving disruption, resource exhaustion, and increased latency in applications using the library."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1333"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/huggingface/transformers/commit/0720e206c6ba28887e4d60ef60a6a089f6c1cc76",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/c7a69150-54f8-4e81-8094-791e7a2a0f29",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-32xx/CVE-2025-3264.json
Normal file
60
CVE-2025/CVE-2025-32xx/CVE-2025-3264.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3264",
|
||||||
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
|
"published": "2025-07-07T10:15:27.500",
|
||||||
|
"lastModified": "2025-07-07T10:15:27.500",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically in the `get_imports()` function within `dynamic_module_utils.py`. This vulnerability affects versions 4.49.0 and is fixed in version 4.51.0. The issue arises from a regular expression pattern `\\s*try\\s*:.*?except.*?:` used to filter out try/except blocks from Python code, which can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. This vulnerability can lead to remote code loading disruption, resource exhaustion in model serving, supply chain attack vectors, and development pipeline disruption."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1333"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/huggingface/transformers/commit/0720e206c6ba28887e4d60ef60a6a089f6c1cc76",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/3c6f7822-9992-476d-8cf0-b0b1623427df",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-34xx/CVE-2025-3466.json
Normal file
60
CVE-2025/CVE-2025-34xx/CVE-2025-3466.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3466",
|
||||||
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
|
"published": "2025-07-07T10:15:27.640",
|
||||||
|
"lastModified": "2025-07-07T10:15:27.640",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such as parseInt, before sandbox security restrictions are imposed. This can lead to unauthorized access to secret keys, internal network servers, and lateral movement within dify.ai. The issue is resolved in version 1.1.3."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1100"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/langgenius/dify/commit/1be0d26c1feb4bcbbdd2b4ae4eeb25874aadaddb",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/f8dc17a3-5536-4944-a680-24070903cd2d",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-34xx/CVE-2025-3467.json
Normal file
60
CVE-2025/CVE-2025-34xx/CVE-2025-3467.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3467",
|
||||||
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
|
"published": "2025-07-07T10:15:27.793",
|
||||||
|
"lastModified": "2025-07-07T10:15:27.793",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An XSS vulnerability exists in langgenius/dify versions prior to 1.1.3, specifically affecting Firefox browsers. This vulnerability allows an attacker to obtain the administrator's token by sending a payload in the published chat. When the administrator views the conversation content through the monitoring/log function using Firefox, the XSS vulnerability is triggered, potentially exposing sensitive token information to the attacker."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.0,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/langgenius/dify/commit/72deb3bed0b0d5d98d7cf44b525cc44bb278f6a7",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/21723441-7b55-425c-abc4-b1331a713591",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-36xx/CVE-2025-3626.json
Normal file
56
CVE-2025/CVE-2025-36xx/CVE-2025-3626.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3626",
|
||||||
|
"sourceIdentifier": "info@cert.vde.com",
|
||||||
|
"published": "2025-07-07T10:15:27.967",
|
||||||
|
"lastModified": "2025-07-07T10:15:27.967",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A remote attacker with administrator account can gain full control of the device due to improper neutralization of special elements used in an OS Command ('OS Command Injection') while uploading a config file via webUI."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "info@cert.vde.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.1,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "info@cert.vde.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://certvde.com/en/advisories/VDE-2025-030",
|
||||||
|
"source": "info@cert.vde.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-37xx/CVE-2025-3705.json
Normal file
56
CVE-2025/CVE-2025-37xx/CVE-2025-3705.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3705",
|
||||||
|
"sourceIdentifier": "info@cert.vde.com",
|
||||||
|
"published": "2025-07-07T10:15:28.133",
|
||||||
|
"lastModified": "2025-07-07T10:15:28.133",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A physical attacker with no privileges can gain full control of the affected device due to improper neutralization of special elements used in an OS Command ('OS Command Injection') when loading a config file from a USB drive."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "info@cert.vde.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 6.8,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "PHYSICAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "info@cert.vde.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://certvde.com/en/advisories/VDE-2025-030",
|
||||||
|
"source": "info@cert.vde.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-37xx/CVE-2025-3777.json
Normal file
60
CVE-2025/CVE-2025-37xx/CVE-2025-3777.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3777",
|
||||||
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
|
"published": "2025-07-07T10:15:28.297",
|
||||||
|
"lastModified": "2025-07-07T10:15:28.297",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Hugging Face Transformers versions up to 4.49.0 are affected by an improper input validation vulnerability in the `image_utils.py` file. The vulnerability arises from insecure URL validation using the `startswith()` method, which can be bypassed through URL username injection. This allows attackers to craft URLs that appear to be from YouTube but resolve to malicious domains, potentially leading to phishing attacks, malware distribution, or data exfiltration. The issue is fixed in version 4.52.1."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
|
||||||
|
"baseScore": 3.5,
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-20"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/huggingface/transformers/commit/4dda5f71b35fb70cf602187eef84bb17a50b9082",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/ccba0730-9248-4853-b7ff-5c20e6364f09",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-47xx/CVE-2025-4779.json
Normal file
60
CVE-2025/CVE-2025-47xx/CVE-2025-4779.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-4779",
|
||||||
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
|
"published": "2025-07-07T10:15:28.717",
|
||||||
|
"lastModified": "2025-07-07T10:15:28.717",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "lunary-ai/lunary versions prior to 1.9.24 are vulnerable to stored cross-site scripting (XSS). An unauthenticated attacker can inject malicious JavaScript into the `v1/runs/ingest` endpoint by adding an empty `citations` field, triggering a code path where `dangerouslySetInnerHTML` is used to render attacker-controlled text. This vulnerability allows the execution of arbitrary JavaScript in the context of the user's browser, potentially leading to session hijacking, data theft, or other malicious actions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 9.1,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/lunary-ai/lunary/commit/18750294a76ff6c0f3f1b6af4ac1a23399836b16",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/c603b64e-5171-4eed-8983-a7f656ce2c4d",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-54xx/CVE-2025-5472.json
Normal file
60
CVE-2025/CVE-2025-54xx/CVE-2025-5472.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-5472",
|
||||||
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
|
"published": "2025-07-07T10:15:28.873",
|
||||||
|
"lastModified": "2025-07-07T10:15:28.873",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The JSONReader in run-llama/llama_index versions 0.12.28 is vulnerable to a stack overflow due to uncontrolled recursive JSON parsing. This vulnerability allows attackers to trigger a Denial of Service (DoS) by submitting deeply nested JSON structures, leading to a RecursionError and crashing applications. The root cause is the unsafe recursive traversal design and lack of depth validation, which makes the JSONReader susceptible to stack overflow when processing deeply nested JSON. This impacts the availability of services, making them unreliable and disrupting workflows. The issue is resolved in version 0.12.38."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-674"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/run-llama/llama_index/commit/c032843a02ce38fd8f284b2aa5a37fd1c17ae635",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/df187bda-7911-4823-a19a-e15b2c66b0d4",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-62xx/CVE-2025-6210.json
Normal file
60
CVE-2025/CVE-2025-62xx/CVE-2025-6210.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-6210",
|
||||||
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
|
"published": "2025-07-07T10:15:29.040",
|
||||||
|
"lastModified": "2025-07-07T10:15:29.040",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 6.2,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.5,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-22"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/run-llama/llama_index/commit/a86c96ae0e662492eeb471b658ae849a93f628ff",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/a654b322-a509-4448-a1f5-0f22850b4687",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-63xx/CVE-2025-6386.json
Normal file
60
CVE-2025/CVE-2025-63xx/CVE-2025-6386.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-6386",
|
||||||
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
|
"published": "2025-07-07T10:15:29.187",
|
||||||
|
"lastModified": "2025-07-07T10:15:29.187",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The parisneo/lollms repository is affected by a timing attack vulnerability in the `authenticate_user` function within the `lollms_authentication.py` file. This vulnerability allows attackers to enumerate valid usernames and guess passwords incrementally by analyzing response time differences. The affected version is the latest, and the issue is resolved in version 20.1. The vulnerability arises from the use of Python's default string equality operator for password comparison, which compares characters sequentially and exits on the first mismatch, leading to variable response times based on the number of matching initial characters."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-203"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/parisneo/lollms/commit/f78437f7b5aa39a78c6201912faf4e0645a38c48",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/6da05485-d219-4f18-9ffc-991053524b67",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
145
CVE-2025/CVE-2025-71xx/CVE-2025-7122.json
Normal file
145
CVE-2025/CVE-2025-71xx/CVE-2025-7122.json
Normal file
@ -0,0 +1,145 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-7122",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-07-07T10:15:29.333",
|
||||||
|
"lastModified": "2025-07-07T10:15:29.333",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in Campcodes Complaint Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/index.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 6.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "LOW",
|
||||||
|
"vulnIntegrityImpact": "LOW",
|
||||||
|
"vulnAvailabilityImpact": "LOW",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 7.3,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL"
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-74"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ez-lbz/poc/issues/45",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.315034",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.315034",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.605914",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.campcodes.com/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
149
CVE-2025/CVE-2025-71xx/CVE-2025-7123.json
Normal file
149
CVE-2025/CVE-2025-71xx/CVE-2025-7123.json
Normal file
@ -0,0 +1,149 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-7123",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-07-07T10:15:29.580",
|
||||||
|
"lastModified": "2025-07-07T10:15:29.580",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in Campcodes Complaint Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/complaint-details.php. The manipulation of the argument cid/uid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 5.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "LOW",
|
||||||
|
"vulnIntegrityImpact": "LOW",
|
||||||
|
"vulnAvailabilityImpact": "LOW",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||||
|
"baseScore": 5.8,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "MULTIPLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL"
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 6.4,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-74"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/y2xsec324/cve/issues/2",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.315035",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.315035",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.605927",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.605929",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.campcodes.com/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
145
CVE-2025/CVE-2025-71xx/CVE-2025-7124.json
Normal file
145
CVE-2025/CVE-2025-71xx/CVE-2025-7124.json
Normal file
@ -0,0 +1,145 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-7124",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-07-07T11:15:51.483",
|
||||||
|
"lastModified": "2025-07-07T11:15:51.483",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as critical has been found in code-projects Online Note Sharing 1.0. Affected is an unknown function of the file /dashboard/userprofile.php of the component Profile Image Handler. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "LOW",
|
||||||
|
"vulnIntegrityImpact": "LOW",
|
||||||
|
"vulnAvailabilityImpact": "LOW",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL"
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-284"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://code-projects.org/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/yihaofuweng/cve/issues/2",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.315036",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.315036",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.605925",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
145
CVE-2025/CVE-2025-71xx/CVE-2025-7125.json
Normal file
145
CVE-2025/CVE-2025-71xx/CVE-2025-7125.json
Normal file
@ -0,0 +1,145 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-7125",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-07-07T11:15:52.217",
|
||||||
|
"lastModified": "2025-07-07T11:15:52.217",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as critical was found in itsourcecode Employee Management System up to 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/editempeducation.php. The manipulation of the argument coursepg leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "LOW",
|
||||||
|
"vulnIntegrityImpact": "LOW",
|
||||||
|
"vulnAvailabilityImpact": "LOW",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL"
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-74"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/manyufann/CVE/issues/1",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://itsourcecode.com/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.315037",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.315037",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.605933",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
43
README.md
43
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-07-07T10:00:11.370159+00:00
|
2025-07-07T12:00:11.142309+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-07-07T09:15:27.290000+00:00
|
2025-07-07T11:15:52.217000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,32 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
300579
|
300599
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `5`
|
Recently added CVEs: `20`
|
||||||
|
|
||||||
- [CVE-2025-3920](CVE-2025/CVE-2025-39xx/CVE-2025-3920.json) (`2025-07-07T09:15:26.587`)
|
- [CVE-2024-43334](CVE-2024/CVE-2024-433xx/CVE-2024-43334.json) (`2025-07-07T10:15:25.593`)
|
||||||
- [CVE-2025-7118](CVE-2025/CVE-2025-71xx/CVE-2025-7118.json) (`2025-07-07T08:15:25.603`)
|
- [CVE-2025-3044](CVE-2025/CVE-2025-30xx/CVE-2025-3044.json) (`2025-07-07T10:15:26.717`)
|
||||||
- [CVE-2025-7119](CVE-2025/CVE-2025-71xx/CVE-2025-7119.json) (`2025-07-07T08:15:25.787`)
|
- [CVE-2025-3046](CVE-2025/CVE-2025-30xx/CVE-2025-3046.json) (`2025-07-07T10:15:26.900`)
|
||||||
- [CVE-2025-7120](CVE-2025/CVE-2025-71xx/CVE-2025-7120.json) (`2025-07-07T09:15:27.097`)
|
- [CVE-2025-3225](CVE-2025/CVE-2025-32xx/CVE-2025-3225.json) (`2025-07-07T10:15:27.047`)
|
||||||
- [CVE-2025-7121](CVE-2025/CVE-2025-71xx/CVE-2025-7121.json) (`2025-07-07T09:15:27.290`)
|
- [CVE-2025-3262](CVE-2025/CVE-2025-32xx/CVE-2025-3262.json) (`2025-07-07T10:15:27.200`)
|
||||||
|
- [CVE-2025-3263](CVE-2025/CVE-2025-32xx/CVE-2025-3263.json) (`2025-07-07T10:15:27.350`)
|
||||||
|
- [CVE-2025-3264](CVE-2025/CVE-2025-32xx/CVE-2025-3264.json) (`2025-07-07T10:15:27.500`)
|
||||||
|
- [CVE-2025-3466](CVE-2025/CVE-2025-34xx/CVE-2025-3466.json) (`2025-07-07T10:15:27.640`)
|
||||||
|
- [CVE-2025-3467](CVE-2025/CVE-2025-34xx/CVE-2025-3467.json) (`2025-07-07T10:15:27.793`)
|
||||||
|
- [CVE-2025-3626](CVE-2025/CVE-2025-36xx/CVE-2025-3626.json) (`2025-07-07T10:15:27.967`)
|
||||||
|
- [CVE-2025-3705](CVE-2025/CVE-2025-37xx/CVE-2025-3705.json) (`2025-07-07T10:15:28.133`)
|
||||||
|
- [CVE-2025-3777](CVE-2025/CVE-2025-37xx/CVE-2025-3777.json) (`2025-07-07T10:15:28.297`)
|
||||||
|
- [CVE-2025-4779](CVE-2025/CVE-2025-47xx/CVE-2025-4779.json) (`2025-07-07T10:15:28.717`)
|
||||||
|
- [CVE-2025-5472](CVE-2025/CVE-2025-54xx/CVE-2025-5472.json) (`2025-07-07T10:15:28.873`)
|
||||||
|
- [CVE-2025-6210](CVE-2025/CVE-2025-62xx/CVE-2025-6210.json) (`2025-07-07T10:15:29.040`)
|
||||||
|
- [CVE-2025-6386](CVE-2025/CVE-2025-63xx/CVE-2025-6386.json) (`2025-07-07T10:15:29.187`)
|
||||||
|
- [CVE-2025-7122](CVE-2025/CVE-2025-71xx/CVE-2025-7122.json) (`2025-07-07T10:15:29.333`)
|
||||||
|
- [CVE-2025-7123](CVE-2025/CVE-2025-71xx/CVE-2025-7123.json) (`2025-07-07T10:15:29.580`)
|
||||||
|
- [CVE-2025-7124](CVE-2025/CVE-2025-71xx/CVE-2025-7124.json) (`2025-07-07T11:15:51.483`)
|
||||||
|
- [CVE-2025-7125](CVE-2025/CVE-2025-71xx/CVE-2025-7125.json) (`2025-07-07T11:15:52.217`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `8`
|
Recently modified CVEs: `0`
|
||||||
|
|
||||||
- [CVE-2025-23968](CVE-2025/CVE-2025-239xx/CVE-2025-23968.json) (`2025-07-07T09:15:24.970`)
|
|
||||||
- [CVE-2025-27358](CVE-2025/CVE-2025-273xx/CVE-2025-27358.json) (`2025-07-07T09:15:25.140`)
|
|
||||||
- [CVE-2025-49175](CVE-2025/CVE-2025-491xx/CVE-2025-49175.json) (`2025-07-07T08:15:23.817`)
|
|
||||||
- [CVE-2025-49176](CVE-2025/CVE-2025-491xx/CVE-2025-49176.json) (`2025-07-07T08:15:24.947`)
|
|
||||||
- [CVE-2025-49178](CVE-2025/CVE-2025-491xx/CVE-2025-49178.json) (`2025-07-07T09:15:26.937`)
|
|
||||||
- [CVE-2025-49179](CVE-2025/CVE-2025-491xx/CVE-2025-49179.json) (`2025-07-07T08:15:25.130`)
|
|
||||||
- [CVE-2025-49180](CVE-2025/CVE-2025-491xx/CVE-2025-49180.json) (`2025-07-07T08:15:25.293`)
|
|
||||||
- [CVE-2025-6020](CVE-2025/CVE-2025-60xx/CVE-2025-6020.json) (`2025-07-07T08:15:25.460`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
46
_state.csv
46
_state.csv
@ -268329,6 +268329,7 @@ CVE-2024-43330,0,0,f2ec3d961afcbca3f9e7e4bba594e0e74b7f8e85a1889c6773f7c1bb45b52
|
|||||||
CVE-2024-43331,0,0,025664322110c0c027d99cd84710e694013a5a44ce0687284a3850fe3e9da36e,2025-03-19T18:52:24.573000
|
CVE-2024-43331,0,0,025664322110c0c027d99cd84710e694013a5a44ce0687284a3850fe3e9da36e,2025-03-19T18:52:24.573000
|
||||||
CVE-2024-43332,0,0,f167203969591a662d9eb35fd96489f40bda598ba4d24753bb004adb26d22093,2024-11-13T01:25:08.657000
|
CVE-2024-43332,0,0,f167203969591a662d9eb35fd96489f40bda598ba4d24753bb004adb26d22093,2024-11-13T01:25:08.657000
|
||||||
CVE-2024-43333,0,0,fa6b02dae1883de1fb148b98324c0e9a99a1742032b0f262d9477cb0c1c7f458,2025-02-03T15:15:17.207000
|
CVE-2024-43333,0,0,fa6b02dae1883de1fb148b98324c0e9a99a1742032b0f262d9477cb0c1c7f458,2025-02-03T15:15:17.207000
|
||||||
|
CVE-2024-43334,1,1,076c631a1b63b1ef02d791814410592d6ad39a5eacc535b64ae417d5e6cd790e,2025-07-07T10:15:25.593000
|
||||||
CVE-2024-43335,0,0,c1f646d4628edb84bd6ad7ba250c6419e109e4d8bcd82ce3fac5dd3b0e24a156,2024-09-13T14:25:12.027000
|
CVE-2024-43335,0,0,c1f646d4628edb84bd6ad7ba250c6419e109e4d8bcd82ce3fac5dd3b0e24a156,2024-09-13T14:25:12.027000
|
||||||
CVE-2024-43336,0,0,6c7a22fd3fd46088392b6f5f13736be099aec72322eac4ffcdfa6014e121cc97,2024-08-27T16:00:25.177000
|
CVE-2024-43336,0,0,6c7a22fd3fd46088392b6f5f13736be099aec72322eac4ffcdfa6014e121cc97,2024-08-27T16:00:25.177000
|
||||||
CVE-2024-43337,0,0,33ef43135fde72666f7ac01bebe36bf95e345a40214f9090867b8b64d2e4ca1f,2024-08-27T15:59:57.127000
|
CVE-2024-43337,0,0,33ef43135fde72666f7ac01bebe36bf95e345a40214f9090867b8b64d2e4ca1f,2024-08-27T15:59:57.127000
|
||||||
@ -287631,7 +287632,7 @@ CVE-2025-23964,0,0,5329b05c42aea8add2b00e40cec17b27a1ae63702685a3839a52b5da9454e
|
|||||||
CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000
|
CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000
|
||||||
CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926bedb,2025-01-22T15:15:26.950000
|
CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926bedb,2025-01-22T15:15:26.950000
|
||||||
CVE-2025-23967,0,0,7fc0380a265ec940f2b60470b1cf9713d9094d8329ba8cde3022afd9bd781bb0,2025-06-30T18:38:48.477000
|
CVE-2025-23967,0,0,7fc0380a265ec940f2b60470b1cf9713d9094d8329ba8cde3022afd9bd781bb0,2025-06-30T18:38:48.477000
|
||||||
CVE-2025-23968,0,1,53c78b686cd251ef8305ce0b503ba1535e0fa3f23326f24f994ae5539203ed5b,2025-07-07T09:15:24.970000
|
CVE-2025-23968,0,0,53c78b686cd251ef8305ce0b503ba1535e0fa3f23326f24f994ae5539203ed5b,2025-07-07T09:15:24.970000
|
||||||
CVE-2025-23969,0,0,487de04033365abaa60e5ffa75aa91d7c86b6db89eb8475ac28535f85fa6cbae,2025-06-06T14:06:58.193000
|
CVE-2025-23969,0,0,487de04033365abaa60e5ffa75aa91d7c86b6db89eb8475ac28535f85fa6cbae,2025-06-06T14:06:58.193000
|
||||||
CVE-2025-2397,0,0,1d9d522b7da574d99450a0c926cba6b95d7f81a170fb089caa03fceac1350b83,2025-03-18T15:16:01.257000
|
CVE-2025-2397,0,0,1d9d522b7da574d99450a0c926cba6b95d7f81a170fb089caa03fceac1350b83,2025-03-18T15:16:01.257000
|
||||||
CVE-2025-23970,0,0,59a2f93282d0ee816872cd9efa0e07ec38c23a282c2850aeeef1bedd7bc6d785,2025-07-04T12:15:25.697000
|
CVE-2025-23970,0,0,59a2f93282d0ee816872cd9efa0e07ec38c23a282c2850aeeef1bedd7bc6d785,2025-07-04T12:15:25.697000
|
||||||
@ -290012,7 +290013,7 @@ CVE-2025-27354,0,0,1ce044a1079e0d294750814be6f1c0954b6a5514512ac17e37801e1c88cfd
|
|||||||
CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000
|
CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000
|
||||||
CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000
|
CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000
|
||||||
CVE-2025-27357,0,0,906169a569eb5a8ab170c576da5f537f983e8f3b76fbc6f0db581847c8ddd5b6,2025-02-24T15:15:21.233000
|
CVE-2025-27357,0,0,906169a569eb5a8ab170c576da5f537f983e8f3b76fbc6f0db581847c8ddd5b6,2025-02-24T15:15:21.233000
|
||||||
CVE-2025-27358,0,1,3ac040af36b755118d90ba7ed16b171c1f279c10a3fe88c82bac61e2493f2192,2025-07-07T09:15:25.140000
|
CVE-2025-27358,0,0,3ac040af36b755118d90ba7ed16b171c1f279c10a3fe88c82bac61e2493f2192,2025-07-07T09:15:25.140000
|
||||||
CVE-2025-27359,0,0,bc075bb86fca4f63cce935506a3dbbf1e76155fbe5cec01080355e7b3cf26a58,2025-06-06T14:06:58.193000
|
CVE-2025-27359,0,0,bc075bb86fca4f63cce935506a3dbbf1e76155fbe5cec01080355e7b3cf26a58,2025-06-06T14:06:58.193000
|
||||||
CVE-2025-2736,0,0,33c3006167b33de591f1a27264763826544e0569703dfd7d13e6e1e623d6c471,2025-05-15T19:29:57.387000
|
CVE-2025-2736,0,0,33c3006167b33de591f1a27264763826544e0569703dfd7d13e6e1e623d6c471,2025-05-15T19:29:57.387000
|
||||||
CVE-2025-27360,0,0,fc7c10146447c977dacf60af6e89aa6249adc1ba87fdcfe0e5e9aa04faaa557f,2025-06-06T14:06:58.193000
|
CVE-2025-27360,0,0,fc7c10146447c977dacf60af6e89aa6249adc1ba87fdcfe0e5e9aa04faaa557f,2025-06-06T14:06:58.193000
|
||||||
@ -291537,6 +291538,7 @@ CVE-2025-30436,0,0,157aafbe97a61fabf3b83b6046cff85de7b0e0356b70ebd32bc3b0b912532
|
|||||||
CVE-2025-30437,0,0,0c24503326977574ab0f815363d5d51518a36fd46250ca4580863efffe2ff229,2025-04-04T19:33:46.400000
|
CVE-2025-30437,0,0,0c24503326977574ab0f815363d5d51518a36fd46250ca4580863efffe2ff229,2025-04-04T19:33:46.400000
|
||||||
CVE-2025-30438,0,0,74656afde9b35f2b81392e23e2548ae49f2fb93278be9270035970969d725c46,2025-04-07T13:33:38.493000
|
CVE-2025-30438,0,0,74656afde9b35f2b81392e23e2548ae49f2fb93278be9270035970969d725c46,2025-04-07T13:33:38.493000
|
||||||
CVE-2025-30439,0,0,da2ca7ddbba55c6600a20f55dae4819460d11b882f4097a091f5482180051fe6,2025-04-07T13:33:28.633000
|
CVE-2025-30439,0,0,da2ca7ddbba55c6600a20f55dae4819460d11b882f4097a091f5482180051fe6,2025-04-07T13:33:28.633000
|
||||||
|
CVE-2025-3044,1,1,ff88ee139e3320a339b7b9119d7c7a119384af57bd5c9bf4e04db15a0ec69f5a,2025-07-07T10:15:26.717000
|
||||||
CVE-2025-30440,0,0,aa17715c0e9c198507565f90d517e1bf0a74ce622e9572e90458cb436f7c3146,2025-05-27T21:30:02.733000
|
CVE-2025-30440,0,0,aa17715c0e9c198507565f90d517e1bf0a74ce622e9572e90458cb436f7c3146,2025-05-27T21:30:02.733000
|
||||||
CVE-2025-30441,0,0,0c04a93a6f174bf42d94b9b28150654c6cdebea87baad1c1bed2a17317c45cac,2025-04-04T19:40:24.640000
|
CVE-2025-30441,0,0,0c04a93a6f174bf42d94b9b28150654c6cdebea87baad1c1bed2a17317c45cac,2025-04-04T19:40:24.640000
|
||||||
CVE-2025-30442,0,0,94b2fd018b3727c786e128b7d801c1ec933a7c10df3f3083321d38dbb3c0aa34,2025-05-27T13:58:18.607000
|
CVE-2025-30442,0,0,94b2fd018b3727c786e128b7d801c1ec933a7c10df3f3083321d38dbb3c0aa34,2025-05-27T13:58:18.607000
|
||||||
@ -291557,6 +291559,7 @@ CVE-2025-30455,0,0,654cb21164007decaef072b7e27df68e3e39b483c4e2d8a2b7a776151d092
|
|||||||
CVE-2025-30456,0,0,a4adbf3fb3bfda6c1ff7ac3e59f722d6890d88837b4dfbbcb9888cc15a9a477a,2025-04-04T18:13:02.067000
|
CVE-2025-30456,0,0,a4adbf3fb3bfda6c1ff7ac3e59f722d6890d88837b4dfbbcb9888cc15a9a477a,2025-04-04T18:13:02.067000
|
||||||
CVE-2025-30457,0,0,9931b57801603e5171d9b9131e7fbe4120bea818d45e3d4b53b5782cd0d5fd9e,2025-04-04T18:12:47.103000
|
CVE-2025-30457,0,0,9931b57801603e5171d9b9131e7fbe4120bea818d45e3d4b53b5782cd0d5fd9e,2025-04-04T18:12:47.103000
|
||||||
CVE-2025-30458,0,0,d44cd0a8f35468ff3b2dcecdff85e9434b31c8f37fa6b8dfb1a82259a2d7a917,2025-04-04T18:12:42.757000
|
CVE-2025-30458,0,0,d44cd0a8f35468ff3b2dcecdff85e9434b31c8f37fa6b8dfb1a82259a2d7a917,2025-04-04T18:12:42.757000
|
||||||
|
CVE-2025-3046,1,1,c5e7899e6facfb262035b6b55b1df620416a5497d4b5d1d23fe0501f56d9d665,2025-07-07T10:15:26.900000
|
||||||
CVE-2025-30460,0,0,d80e5d42755983a665f916c748c78211e6afa7b0e15e1ebb79456909187cd900,2025-04-04T18:12:36.290000
|
CVE-2025-30460,0,0,d80e5d42755983a665f916c748c78211e6afa7b0e15e1ebb79456909187cd900,2025-04-04T18:12:36.290000
|
||||||
CVE-2025-30461,0,0,902c186691796d41fb6442de848f3f6d1e6de072cdbd4e5592409d68df7c6d6d,2025-04-04T18:12:32.693000
|
CVE-2025-30461,0,0,902c186691796d41fb6442de848f3f6d1e6de072cdbd4e5592409d68df7c6d6d,2025-04-04T18:12:32.693000
|
||||||
CVE-2025-30462,0,0,4bdec634bf22dfe7000ec2114c1948d8376bfcc7de65e9822131d6f1494f76e3,2025-04-04T18:12:28.400000
|
CVE-2025-30462,0,0,4bdec634bf22dfe7000ec2114c1948d8376bfcc7de65e9822131d6f1494f76e3,2025-04-04T18:12:28.400000
|
||||||
@ -293123,6 +293126,7 @@ CVE-2025-32246,0,0,d856ec5e5b1b873352a68bef14e07ea076ee5b077a5931df46c2d77e7e8d2
|
|||||||
CVE-2025-32247,0,0,0d56fee34759037d409571994dd91158b660749bcd59705bc8f944a1d5ba10d2,2025-04-07T14:18:15.560000
|
CVE-2025-32247,0,0,0d56fee34759037d409571994dd91158b660749bcd59705bc8f944a1d5ba10d2,2025-04-07T14:18:15.560000
|
||||||
CVE-2025-32248,0,0,6b2b5e8625a101ef23ee5c68f566a106fd34e4e4c0a4a3f89d00a14514aa0d58,2025-04-07T14:18:15.560000
|
CVE-2025-32248,0,0,6b2b5e8625a101ef23ee5c68f566a106fd34e4e4c0a4a3f89d00a14514aa0d58,2025-04-07T14:18:15.560000
|
||||||
CVE-2025-32249,0,0,a74f78058e495c5c8058610d8e1d8eb92dda755f2cd6faf0c496fef809b79cf4,2025-04-07T14:18:15.560000
|
CVE-2025-32249,0,0,a74f78058e495c5c8058610d8e1d8eb92dda755f2cd6faf0c496fef809b79cf4,2025-04-07T14:18:15.560000
|
||||||
|
CVE-2025-3225,1,1,69f11a04828ad7be3915ff17d8cfee8f4f9a6237935a1987ce33087a09db17e1,2025-07-07T10:15:27.047000
|
||||||
CVE-2025-32250,0,0,5b65026d5b7900354f67df291c93dfbcf40a31e291957b7b2b193e0f08a73d18,2025-04-07T14:18:15.560000
|
CVE-2025-32250,0,0,5b65026d5b7900354f67df291c93dfbcf40a31e291957b7b2b193e0f08a73d18,2025-04-07T14:18:15.560000
|
||||||
CVE-2025-32251,0,0,db9e83682192d1c9ea6c6eb3ac5a5992ef43dadbd98f75e240c797354c7129f6,2025-04-07T14:18:15.560000
|
CVE-2025-32251,0,0,db9e83682192d1c9ea6c6eb3ac5a5992ef43dadbd98f75e240c797354c7129f6,2025-04-07T14:18:15.560000
|
||||||
CVE-2025-32252,0,0,00dd1f6e7f173ba4ff86679e2c6bc51fcd619cdfd9d0c4d1e5a69ec083c8b123,2025-04-07T14:18:15.560000
|
CVE-2025-32252,0,0,00dd1f6e7f173ba4ff86679e2c6bc51fcd619cdfd9d0c4d1e5a69ec083c8b123,2025-04-07T14:18:15.560000
|
||||||
@ -293440,6 +293444,7 @@ CVE-2025-32616,0,0,60896a25617451753658cf2cd6019c47ed9948e1a164f38e18b95e9ff8020
|
|||||||
CVE-2025-32617,0,0,9661b5a949800c62844427fa5e646378c73c47d1848559445bcbac54968a81d7,2025-04-09T20:02:41.860000
|
CVE-2025-32617,0,0,9661b5a949800c62844427fa5e646378c73c47d1848559445bcbac54968a81d7,2025-04-09T20:02:41.860000
|
||||||
CVE-2025-32618,0,0,3e2dffa868b047a20340a7319c6706a3dde352ae7874207c3d70a1597ad9a558,2025-04-11T15:39:52.920000
|
CVE-2025-32618,0,0,3e2dffa868b047a20340a7319c6706a3dde352ae7874207c3d70a1597ad9a558,2025-04-11T15:39:52.920000
|
||||||
CVE-2025-32619,0,0,04b1be8036bf1c25a4e2653334fbdb6d637490b7f9c97555a40f71ef05d59815,2025-04-09T20:02:41.860000
|
CVE-2025-32619,0,0,04b1be8036bf1c25a4e2653334fbdb6d637490b7f9c97555a40f71ef05d59815,2025-04-09T20:02:41.860000
|
||||||
|
CVE-2025-3262,1,1,32c27c9140fd692993f9736af8b80e1d8d8040ba8bbf51a5105804fa07d78fe4,2025-07-07T10:15:27.200000
|
||||||
CVE-2025-32620,0,0,752c95b518c1c86908f8276831e75f69148f83ddf678c09a4b2db5d818e0b6f5,2025-04-17T20:21:05.203000
|
CVE-2025-32620,0,0,752c95b518c1c86908f8276831e75f69148f83ddf678c09a4b2db5d818e0b6f5,2025-04-17T20:21:05.203000
|
||||||
CVE-2025-32621,0,0,9afac0f9430fb7aa06a88042a84e3d0fdf6ad0626a0d9442f17bea6025ffa1ae,2025-04-09T20:02:41.860000
|
CVE-2025-32621,0,0,9afac0f9430fb7aa06a88042a84e3d0fdf6ad0626a0d9442f17bea6025ffa1ae,2025-04-09T20:02:41.860000
|
||||||
CVE-2025-32622,0,0,bb20d6b1b3e9da9aafe09a3e0f7186f182c77219f6d53914ac058a6b3c0c79cc,2025-04-17T20:21:05.203000
|
CVE-2025-32622,0,0,bb20d6b1b3e9da9aafe09a3e0f7186f182c77219f6d53914ac058a6b3c0c79cc,2025-04-17T20:21:05.203000
|
||||||
@ -293450,6 +293455,7 @@ CVE-2025-32626,0,0,3931e7c17dd39d915fe1e5820ff5c97f69ad28fe8246a3ca70e178e524555
|
|||||||
CVE-2025-32627,0,0,2ce05adac593c463246ee439e6e044a763c1c4fc0542c6bc6722a701c6ebfac4,2025-04-11T15:39:52.920000
|
CVE-2025-32627,0,0,2ce05adac593c463246ee439e6e044a763c1c4fc0542c6bc6722a701c6ebfac4,2025-04-11T15:39:52.920000
|
||||||
CVE-2025-32628,0,0,4d2c7a01aa94c792f7990d7dd71254f93c942e443dedefba2dd6bb593b4656cc,2025-04-17T20:21:05.203000
|
CVE-2025-32628,0,0,4d2c7a01aa94c792f7990d7dd71254f93c942e443dedefba2dd6bb593b4656cc,2025-04-17T20:21:05.203000
|
||||||
CVE-2025-32629,0,0,a92f9907d30b0b6db2afce1e3db24313c9b35b2708ccf75f8c93c0c10a9249d1,2025-04-11T15:39:52.920000
|
CVE-2025-32629,0,0,a92f9907d30b0b6db2afce1e3db24313c9b35b2708ccf75f8c93c0c10a9249d1,2025-04-11T15:39:52.920000
|
||||||
|
CVE-2025-3263,1,1,1c203ae688cab0ef8b5c50c483cfe2b6ceb7fc9d6423c4d0a937c2869bc7bf67,2025-07-07T10:15:27.350000
|
||||||
CVE-2025-32630,0,0,b4cbe301acb68fb7684bb9c2133635edfbcd3e2a04a332d8b0df9750d01d9505,2025-04-17T20:21:05.203000
|
CVE-2025-32630,0,0,b4cbe301acb68fb7684bb9c2133635edfbcd3e2a04a332d8b0df9750d01d9505,2025-04-17T20:21:05.203000
|
||||||
CVE-2025-32631,0,0,98a4a957df97acffc58c06a08d29807a3e2ddf6d4d4dfbf07dcb3cd84a59cb05,2025-04-11T15:39:52.920000
|
CVE-2025-32631,0,0,98a4a957df97acffc58c06a08d29807a3e2ddf6d4d4dfbf07dcb3cd84a59cb05,2025-04-11T15:39:52.920000
|
||||||
CVE-2025-32632,0,0,26e39bc54319c3de0a0c10d557b9f9955da9030c6dcde1ffebb8eaee6fe7bfaa,2025-04-11T15:39:52.920000
|
CVE-2025-32632,0,0,26e39bc54319c3de0a0c10d557b9f9955da9030c6dcde1ffebb8eaee6fe7bfaa,2025-04-11T15:39:52.920000
|
||||||
@ -293460,6 +293466,7 @@ CVE-2025-32636,0,0,46c5ab1255e66cc2f15290ac98f7ba9ef721abddf5f02afe48be54a35083f
|
|||||||
CVE-2025-32637,0,0,1927dfdf1c16211f4bc20ad3d946138aa50dcf26453cc46cfa4f17a2027f010f,2025-04-17T20:21:05.203000
|
CVE-2025-32637,0,0,1927dfdf1c16211f4bc20ad3d946138aa50dcf26453cc46cfa4f17a2027f010f,2025-04-17T20:21:05.203000
|
||||||
CVE-2025-32638,0,0,d66c5e14690133298e4def8df71f876e4a0182aa854b235d75b391a9d2cb2037,2025-04-17T20:21:05.203000
|
CVE-2025-32638,0,0,d66c5e14690133298e4def8df71f876e4a0182aa854b235d75b391a9d2cb2037,2025-04-17T20:21:05.203000
|
||||||
CVE-2025-32639,0,0,8e4f9b910ec2cbe7d93f4a3d8fdcdcebf05317deb0404fe24a83cc58d9c07d91,2025-04-17T20:21:05.203000
|
CVE-2025-32639,0,0,8e4f9b910ec2cbe7d93f4a3d8fdcdcebf05317deb0404fe24a83cc58d9c07d91,2025-04-17T20:21:05.203000
|
||||||
|
CVE-2025-3264,1,1,da651e1c37ffe7ea0205968e82a4db6bbdec76969cd78a61b48a85cff4533b2c,2025-07-07T10:15:27.500000
|
||||||
CVE-2025-32640,0,0,cf49f8ad76a904999cf27486d117c795b1de02a1d0b705263cab94cab97b30be,2025-04-09T20:02:41.860000
|
CVE-2025-32640,0,0,cf49f8ad76a904999cf27486d117c795b1de02a1d0b705263cab94cab97b30be,2025-04-09T20:02:41.860000
|
||||||
CVE-2025-32641,0,0,d04a6f9084570cae3bdbe21b3d3e6cbeacbb39d50f117e6bae39942bd0102f2b,2025-04-09T20:02:41.860000
|
CVE-2025-32641,0,0,d04a6f9084570cae3bdbe21b3d3e6cbeacbb39d50f117e6bae39942bd0102f2b,2025-04-09T20:02:41.860000
|
||||||
CVE-2025-32642,0,0,aa532dd331e1bd53f2e3ad431d5751486f9683adee9f60d6fbaabda798c828d0,2025-04-09T20:02:41.860000
|
CVE-2025-32642,0,0,aa532dd331e1bd53f2e3ad431d5751486f9683adee9f60d6fbaabda798c828d0,2025-04-09T20:02:41.860000
|
||||||
@ -294051,6 +294058,8 @@ CVE-2025-3461,0,0,b711842f3138044403b9c62c870e92a946a81dbd27b6e170abe8935ae6232c
|
|||||||
CVE-2025-3462,0,0,96a08229937a9712440a065f7abf8858b2712ba35f45d182986e12e301979bf4,2025-05-12T17:32:52.810000
|
CVE-2025-3462,0,0,96a08229937a9712440a065f7abf8858b2712ba35f45d182986e12e301979bf4,2025-05-12T17:32:52.810000
|
||||||
CVE-2025-3463,0,0,b9c293fc915bcaaa130da553f49fb5680a86dfb762948cd4b867acf35ebae4a2,2025-05-12T17:32:52.810000
|
CVE-2025-3463,0,0,b9c293fc915bcaaa130da553f49fb5680a86dfb762948cd4b867acf35ebae4a2,2025-05-12T17:32:52.810000
|
||||||
CVE-2025-3464,0,0,38d4a563f02ab0b6699d61c78e67bf5bbd6f38fb8aef752a88c9119a8e063079,2025-06-17T01:15:22.120000
|
CVE-2025-3464,0,0,38d4a563f02ab0b6699d61c78e67bf5bbd6f38fb8aef752a88c9119a8e063079,2025-06-17T01:15:22.120000
|
||||||
|
CVE-2025-3466,1,1,f9d9c57d7ed9862bb4a0577b8e28a9851a72eb0a03732c310c4cd5ef28e0eac2,2025-07-07T10:15:27.640000
|
||||||
|
CVE-2025-3467,1,1,875cfa42033e493d5f366775e6159e85348f40b76af1a31401a252da2c670d12,2025-07-07T10:15:27.793000
|
||||||
CVE-2025-3468,0,0,136950783d88ce0e5a3cbb5efc9cbb24284feffc83746ee503e38c1107465276,2025-06-04T22:54:54.960000
|
CVE-2025-3468,0,0,136950783d88ce0e5a3cbb5efc9cbb24284feffc83746ee503e38c1107465276,2025-06-04T22:54:54.960000
|
||||||
CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc139092,2025-04-11T15:39:52.920000
|
CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc139092,2025-04-11T15:39:52.920000
|
||||||
CVE-2025-3470,0,0,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000
|
CVE-2025-3470,0,0,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000
|
||||||
@ -294220,6 +294229,7 @@ CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac8
|
|||||||
CVE-2025-3623,0,0,617cffe0141337c7867deb96e2a7d70a856c2a880b7f99e53e2fda3baeae607b,2025-06-13T14:15:21.147000
|
CVE-2025-3623,0,0,617cffe0141337c7867deb96e2a7d70a856c2a880b7f99e53e2fda3baeae607b,2025-06-13T14:15:21.147000
|
||||||
CVE-2025-3624,0,0,7ed4cd410ce03398fb8e34cfd1d803d6ee7ef277c76293f0adef5df6e973fd9d,2025-05-16T14:42:18.700000
|
CVE-2025-3624,0,0,7ed4cd410ce03398fb8e34cfd1d803d6ee7ef277c76293f0adef5df6e973fd9d,2025-05-16T14:42:18.700000
|
||||||
CVE-2025-3625,0,0,4c43dccfb8b4b9a35f3c2ae60e7f1e31e5068a47ae5b8c8372c26fb8bdf705cb,2025-06-24T16:17:15.723000
|
CVE-2025-3625,0,0,4c43dccfb8b4b9a35f3c2ae60e7f1e31e5068a47ae5b8c8372c26fb8bdf705cb,2025-06-24T16:17:15.723000
|
||||||
|
CVE-2025-3626,1,1,e6ac371e85d81a280684ada51e305ef917920a139ffe064fa5eb2e1fe5f8e8ed,2025-07-07T10:15:27.967000
|
||||||
CVE-2025-3627,0,0,c4ad094052a3d6023e19e3ca7cf702b4f4817bb1e5084b3a895c077f2e88944d,2025-06-24T16:17:23.420000
|
CVE-2025-3627,0,0,c4ad094052a3d6023e19e3ca7cf702b4f4817bb1e5084b3a895c077f2e88944d,2025-06-24T16:17:23.420000
|
||||||
CVE-2025-3628,0,0,b2ac3aafba07c87de6ae982e897cbd81a37d87151c789a9585a83fdcbb4550a7,2025-06-24T16:19:13.647000
|
CVE-2025-3628,0,0,b2ac3aafba07c87de6ae982e897cbd81a37d87151c789a9585a83fdcbb4550a7,2025-06-24T16:19:13.647000
|
||||||
CVE-2025-3629,0,0,363ba61764040fb0b8551a08a41f953b5bb4359c77899b7073800f560de90fb4,2025-06-23T20:16:21.633000
|
CVE-2025-3629,0,0,363ba61764040fb0b8551a08a41f953b5bb4359c77899b7073800f560de90fb4,2025-06-23T20:16:21.633000
|
||||||
@ -294310,6 +294320,7 @@ CVE-2025-3698,0,0,3410d174ae31c43abb68f418121b89dca3911c4e48575a9281b05507afa201
|
|||||||
CVE-2025-3699,0,0,d02a1cd04c24f3e630d7aa0838897d4c7fa576fd6ceb0be9ab7fddd90a36396b,2025-06-30T18:38:48.477000
|
CVE-2025-3699,0,0,d02a1cd04c24f3e630d7aa0838897d4c7fa576fd6ceb0be9ab7fddd90a36396b,2025-06-30T18:38:48.477000
|
||||||
CVE-2025-3702,0,0,6c9d3b4be22efb62cccd37cd7e92146e02fd0e412dcd144b7f19d652d3921939,2025-07-03T15:13:53.147000
|
CVE-2025-3702,0,0,6c9d3b4be22efb62cccd37cd7e92146e02fd0e412dcd144b7f19d652d3921939,2025-07-03T15:13:53.147000
|
||||||
CVE-2025-3704,0,0,fa4a3eb7f97cc05cb29111ef6884110e54a213e5cd6aeb5d02530af4ecd14db2,2025-05-28T15:01:30.720000
|
CVE-2025-3704,0,0,fa4a3eb7f97cc05cb29111ef6884110e54a213e5cd6aeb5d02530af4ecd14db2,2025-05-28T15:01:30.720000
|
||||||
|
CVE-2025-3705,1,1,5d381cd0b2ffbf4873c21c04155361efa046afde7e0ad77cc3c79dfe5f185c39,2025-07-07T10:15:28.133000
|
||||||
CVE-2025-3706,0,0,af36967002cae35edc22a037b5e4639098ca61a00f66dc40237f6cb847234a6c,2025-04-29T13:52:10.697000
|
CVE-2025-3706,0,0,af36967002cae35edc22a037b5e4639098ca61a00f66dc40237f6cb847234a6c,2025-04-29T13:52:10.697000
|
||||||
CVE-2025-3707,0,0,19f2a3789a7c8f868baebd7065af2264b477a736f48157fc6f27b30ec7dd06ec,2025-05-07T16:50:32.967000
|
CVE-2025-3707,0,0,19f2a3789a7c8f868baebd7065af2264b477a736f48157fc6f27b30ec7dd06ec,2025-05-07T16:50:32.967000
|
||||||
CVE-2025-3708,0,0,d78aa125c93a2dcfe7efdd0fc06a6ffc03cde5530d4cb9fd272dabdbcad493c7,2025-05-07T16:50:44.930000
|
CVE-2025-3708,0,0,d78aa125c93a2dcfe7efdd0fc06a6ffc03cde5530d4cb9fd272dabdbcad493c7,2025-05-07T16:50:44.930000
|
||||||
@ -294413,6 +294424,7 @@ CVE-2025-37766,0,0,7b20a13e8cec563c892476ead16d575857de0070e194be31f8408ede70259
|
|||||||
CVE-2025-37767,0,0,6cfb108406975b58d0bfc5e9e409d4b6397489c1f9263746acfbf65636b31444,2025-05-02T13:53:20.943000
|
CVE-2025-37767,0,0,6cfb108406975b58d0bfc5e9e409d4b6397489c1f9263746acfbf65636b31444,2025-05-02T13:53:20.943000
|
||||||
CVE-2025-37768,0,0,990673ed1fb392644fd0554511c9e81baf774d1c59dfbb2cc705c8e93fd9a739,2025-05-02T13:53:20.943000
|
CVE-2025-37768,0,0,990673ed1fb392644fd0554511c9e81baf774d1c59dfbb2cc705c8e93fd9a739,2025-05-02T13:53:20.943000
|
||||||
CVE-2025-37769,0,0,31f8816726f0cb7d9fc561749e11f61866264d9740a90f5a23372f1bbcc636d5,2025-05-02T13:53:20.943000
|
CVE-2025-37769,0,0,31f8816726f0cb7d9fc561749e11f61866264d9740a90f5a23372f1bbcc636d5,2025-05-02T13:53:20.943000
|
||||||
|
CVE-2025-3777,1,1,2c4a25b1a83c0297f1f26ece8c7f71039618abf5b7a0fd36686e76e32f4f290a,2025-07-07T10:15:28.297000
|
||||||
CVE-2025-37770,0,0,b7acc6c4d0b48391b6746baae7cdeca2311b8071ac645fb37cfb183ae4243ea0,2025-05-02T13:53:20.943000
|
CVE-2025-37770,0,0,b7acc6c4d0b48391b6746baae7cdeca2311b8071ac645fb37cfb183ae4243ea0,2025-05-02T13:53:20.943000
|
||||||
CVE-2025-37771,0,0,89ab04b910122c0bcc270e5faf2ad24c0fe4ffc4099557f0d2b18035337bf618,2025-05-02T13:53:20.943000
|
CVE-2025-37771,0,0,89ab04b910122c0bcc270e5faf2ad24c0fe4ffc4099557f0d2b18035337bf618,2025-05-02T13:53:20.943000
|
||||||
CVE-2025-37772,0,0,8c5be2ed5cd8d3ea9baceb92b32b128808b5fcd57207f5b56b4515e9be91b7f9,2025-05-02T13:53:20.943000
|
CVE-2025-37772,0,0,8c5be2ed5cd8d3ea9baceb92b32b128808b5fcd57207f5b56b4515e9be91b7f9,2025-05-02T13:53:20.943000
|
||||||
@ -295016,7 +295028,7 @@ CVE-2025-3916,0,0,045ece3601bd5ccbedc31ea0240de6aa0afd0b9d1478dcdfa2e80b8a58fde7
|
|||||||
CVE-2025-3917,0,0,c5171151eebd44803f90dc57bca3ca581e3f3a3b4495aa64f3e44a3933917ede,2025-05-16T14:43:26.160000
|
CVE-2025-3917,0,0,c5171151eebd44803f90dc57bca3ca581e3f3a3b4495aa64f3e44a3933917ede,2025-05-16T14:43:26.160000
|
||||||
CVE-2025-3918,0,0,63b01e62f8046021d2f78807719fa3fd3623a650f7755e4a8a67c57ed80094c1,2025-05-05T20:54:19.760000
|
CVE-2025-3918,0,0,63b01e62f8046021d2f78807719fa3fd3623a650f7755e4a8a67c57ed80094c1,2025-05-05T20:54:19.760000
|
||||||
CVE-2025-3919,0,0,a87264f5c964c1b9f0e2df5faae10e0481d418f0fb1502b0ee9da33cc507ee91,2025-06-04T14:54:33.783000
|
CVE-2025-3919,0,0,a87264f5c964c1b9f0e2df5faae10e0481d418f0fb1502b0ee9da33cc507ee91,2025-06-04T14:54:33.783000
|
||||||
CVE-2025-3920,1,1,31c433673f0c0524a4643f80060a30fb3eb7a739da1bf0a4b8e4f7d0512fbf46,2025-07-07T09:15:26.587000
|
CVE-2025-3920,0,0,31c433673f0c0524a4643f80060a30fb3eb7a739da1bf0a4b8e4f7d0512fbf46,2025-07-07T09:15:26.587000
|
||||||
CVE-2025-39201,0,0,ac494421fef95e7246be675844d0567c84bbd09125124991a997be6495bbeb5a,2025-06-26T18:58:14.280000
|
CVE-2025-39201,0,0,ac494421fef95e7246be675844d0567c84bbd09125124991a997be6495bbeb5a,2025-06-26T18:58:14.280000
|
||||||
CVE-2025-39202,0,0,e4a1b79ce1102dbd814273d9c11f72b989b247a4b565087c308a3675cabe0e1b,2025-06-26T18:58:14.280000
|
CVE-2025-39202,0,0,e4a1b79ce1102dbd814273d9c11f72b989b247a4b565087c308a3675cabe0e1b,2025-06-26T18:58:14.280000
|
||||||
CVE-2025-39203,0,0,c8c71b1662e8236b6c8f7605df9f1ed02dd5c9c88a46d156bc91dee5c5d83d9f,2025-06-26T18:58:14.280000
|
CVE-2025-39203,0,0,c8c71b1662e8236b6c8f7605df9f1ed02dd5c9c88a46d156bc91dee5c5d83d9f,2025-06-26T18:58:14.280000
|
||||||
@ -297581,6 +297593,7 @@ CVE-2025-47786,0,0,04d15aa36906f407ce9503b5e85686cf0003a20f24e1aaa4e03a652f6d18b
|
|||||||
CVE-2025-47787,0,0,8b3f006971f3c77e8bfe09c8095c5ff79a4ccd86822488783708679fc0bca11b,2025-07-01T14:42:21.900000
|
CVE-2025-47787,0,0,8b3f006971f3c77e8bfe09c8095c5ff79a4ccd86822488783708679fc0bca11b,2025-07-01T14:42:21.900000
|
||||||
CVE-2025-47788,0,0,6b5e38cbcfc946bfd59d42d46514cb0def4592e040d374abdc709005316d2f44,2025-05-19T15:15:25.200000
|
CVE-2025-47788,0,0,6b5e38cbcfc946bfd59d42d46514cb0def4592e040d374abdc709005316d2f44,2025-05-19T15:15:25.200000
|
||||||
CVE-2025-47789,0,0,45dc770bb0c94c5e8c48030b8884b90c652471ebe6c8c411f93ca31ef83185f9,2025-05-16T14:42:18.700000
|
CVE-2025-47789,0,0,45dc770bb0c94c5e8c48030b8884b90c652471ebe6c8c411f93ca31ef83185f9,2025-05-16T14:42:18.700000
|
||||||
|
CVE-2025-4779,1,1,e76da2c4ccde5f0f2dae7a8b55398d14c015ceea85d1e38685454ed6f4b4b6fc,2025-07-07T10:15:28.717000
|
||||||
CVE-2025-47790,0,0,a6351ab24f93f0d386dbb08791d6aca496319ae8a2ceb95e2ce6b8ad46d620c7,2025-05-16T14:42:18.700000
|
CVE-2025-47790,0,0,a6351ab24f93f0d386dbb08791d6aca496319ae8a2ceb95e2ce6b8ad46d620c7,2025-05-16T14:42:18.700000
|
||||||
CVE-2025-47791,0,0,ca1f70ef41d3a1ed585c10f4aaea46f0cbe8cd3b5251cfe28c38668da573721f,2025-05-19T13:35:50.497000
|
CVE-2025-47791,0,0,ca1f70ef41d3a1ed585c10f4aaea46f0cbe8cd3b5251cfe28c38668da573721f,2025-05-19T13:35:50.497000
|
||||||
CVE-2025-47792,0,0,5db4e1b0099c338d37989cd3de0ee62c1464ff8fe0f69042bbd11e43a23f0241,2025-05-19T13:35:50.497000
|
CVE-2025-47792,0,0,5db4e1b0099c338d37989cd3de0ee62c1464ff8fe0f69042bbd11e43a23f0241,2025-05-19T13:35:50.497000
|
||||||
@ -298249,13 +298262,13 @@ CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa
|
|||||||
CVE-2025-49163,0,0,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000
|
CVE-2025-49163,0,0,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000
|
||||||
CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000
|
CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000
|
||||||
CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000
|
CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000
|
||||||
CVE-2025-49175,0,1,63df3c1b3c0c8ed032725328034a50a6ededb8b8dfd2f206f53445685d1573c0,2025-07-07T08:15:23.817000
|
CVE-2025-49175,0,0,63df3c1b3c0c8ed032725328034a50a6ededb8b8dfd2f206f53445685d1573c0,2025-07-07T08:15:23.817000
|
||||||
CVE-2025-49176,0,1,169a9b600aed8d1d15d26cd8d0d96220c98dbdcac3071d4fa0af7582843e384f,2025-07-07T08:15:24.947000
|
CVE-2025-49176,0,0,169a9b600aed8d1d15d26cd8d0d96220c98dbdcac3071d4fa0af7582843e384f,2025-07-07T08:15:24.947000
|
||||||
CVE-2025-49177,0,0,2776354ba86cd7216ed2eee07d464dd343e2260aa14001f109fcd75b0e6568d1,2025-07-02T20:15:30.943000
|
CVE-2025-49177,0,0,2776354ba86cd7216ed2eee07d464dd343e2260aa14001f109fcd75b0e6568d1,2025-07-02T20:15:30.943000
|
||||||
CVE-2025-49178,0,1,3da142d00062cd7b9f7ac77c10b6d92e7ab04fb8e0fd6fff1c8f9c2fc71b860a,2025-07-07T09:15:26.937000
|
CVE-2025-49178,0,0,3da142d00062cd7b9f7ac77c10b6d92e7ab04fb8e0fd6fff1c8f9c2fc71b860a,2025-07-07T09:15:26.937000
|
||||||
CVE-2025-49179,0,1,a2758d12aacaaae195271814f5ad69f46d3061af6963f0a57dccf1f6348fd3d5,2025-07-07T08:15:25.130000
|
CVE-2025-49179,0,0,a2758d12aacaaae195271814f5ad69f46d3061af6963f0a57dccf1f6348fd3d5,2025-07-07T08:15:25.130000
|
||||||
CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000
|
CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000
|
||||||
CVE-2025-49180,0,1,b6e779f44595b916365a8a1a8cb1c8c8be415766de030a80badfab752e88d39d,2025-07-07T08:15:25.293000
|
CVE-2025-49180,0,0,b6e779f44595b916365a8a1a8cb1c8c8be415766de030a80badfab752e88d39d,2025-07-07T08:15:25.293000
|
||||||
CVE-2025-49181,0,0,65f8ea01de63d019d8688de775c40b302b8c0b1e44c040e53e46324e69435218,2025-06-12T16:06:20.180000
|
CVE-2025-49181,0,0,65f8ea01de63d019d8688de775c40b302b8c0b1e44c040e53e46324e69435218,2025-06-12T16:06:20.180000
|
||||||
CVE-2025-49182,0,0,8adc8833944dbbffb6c925bafc811eee2574582f2d7b7b09537e334080770141,2025-06-13T09:15:20.130000
|
CVE-2025-49182,0,0,8adc8833944dbbffb6c925bafc811eee2574582f2d7b7b09537e334080770141,2025-06-13T09:15:20.130000
|
||||||
CVE-2025-49183,0,0,c9c3ab65e477d8e9a4d5c9adaf45822d49f0873835d0971680386eb894e72562,2025-06-12T16:06:20.180000
|
CVE-2025-49183,0,0,c9c3ab65e477d8e9a4d5c9adaf45822d49f0873835d0971680386eb894e72562,2025-06-12T16:06:20.180000
|
||||||
@ -299447,6 +299460,7 @@ CVE-2025-5446,0,0,e5b8442225b2596d4e485375bec906c695e65ec084b20c8f1887efd794228e
|
|||||||
CVE-2025-5447,0,0,b48376ecfe2b08edb6956c77815c7714ff97e9cabd629e0b7d61c068b2578472,2025-07-02T01:07:18.147000
|
CVE-2025-5447,0,0,b48376ecfe2b08edb6956c77815c7714ff97e9cabd629e0b7d61c068b2578472,2025-07-02T01:07:18.147000
|
||||||
CVE-2025-5455,0,0,c1321d8b95e99a1a6b4bd58591f4d8f5ad84a8f09a18d929f7bc30e94a33953f,2025-06-02T17:32:17.397000
|
CVE-2025-5455,0,0,c1321d8b95e99a1a6b4bd58591f4d8f5ad84a8f09a18d929f7bc30e94a33953f,2025-06-02T17:32:17.397000
|
||||||
CVE-2025-5459,0,0,bfef67fb6bc5a0d62d15f9ee68a0d9240ec3720f0fb55d24a02c5d3644fba822,2025-06-26T18:57:43.670000
|
CVE-2025-5459,0,0,bfef67fb6bc5a0d62d15f9ee68a0d9240ec3720f0fb55d24a02c5d3644fba822,2025-06-26T18:57:43.670000
|
||||||
|
CVE-2025-5472,1,1,55eaaf5a87aad78c4ffc41fabcd4c3cb9952754e5860fc78a428b87287d41350,2025-07-07T10:15:28.873000
|
||||||
CVE-2025-5473,0,0,71e9a0d8879b30e10102aac4dbfd9c373861b74ea445d6f4d1c1466cb063c6e4,2025-06-09T12:15:47.880000
|
CVE-2025-5473,0,0,71e9a0d8879b30e10102aac4dbfd9c373861b74ea445d6f4d1c1466cb063c6e4,2025-06-09T12:15:47.880000
|
||||||
CVE-2025-5474,0,0,ff56ae6d33a817b3b5972773cb7c3e3407b0f73c6768464aca7201e3d55867a2,2025-06-09T12:15:47.880000
|
CVE-2025-5474,0,0,ff56ae6d33a817b3b5972773cb7c3e3407b0f73c6768464aca7201e3d55867a2,2025-06-09T12:15:47.880000
|
||||||
CVE-2025-5475,0,0,6d8021f8ceef8e2068d7ae34c003ad4b76f386b031597decaa22f19a4b2e44e0,2025-06-23T20:16:21.633000
|
CVE-2025-5475,0,0,6d8021f8ceef8e2068d7ae34c003ad4b76f386b031597decaa22f19a4b2e44e0,2025-06-23T20:16:21.633000
|
||||||
@ -299896,7 +299910,7 @@ CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca
|
|||||||
CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000
|
CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000
|
||||||
CVE-2025-6017,0,0,cdf296e1429037cbf00bd284008bfaf96f2ac3ba0f0da1dc4e6958978cbc6e8e,2025-07-03T15:13:53.147000
|
CVE-2025-6017,0,0,cdf296e1429037cbf00bd284008bfaf96f2ac3ba0f0da1dc4e6958978cbc6e8e,2025-07-03T15:13:53.147000
|
||||||
CVE-2025-6019,0,0,5477ec15a82be0c2a93ed9a3473af3a8dab5cb2afdbbfee75cdeb137fdc5af5e,2025-06-30T03:15:25.990000
|
CVE-2025-6019,0,0,5477ec15a82be0c2a93ed9a3473af3a8dab5cb2afdbbfee75cdeb137fdc5af5e,2025-06-30T03:15:25.990000
|
||||||
CVE-2025-6020,0,1,d93c7b29d895d9b8150932df3a20e117e2c9d41feac2f952996e06083758c92f,2025-07-07T08:15:25.460000
|
CVE-2025-6020,0,0,d93c7b29d895d9b8150932df3a20e117e2c9d41feac2f952996e06083758c92f,2025-07-07T08:15:25.460000
|
||||||
CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000
|
CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000
|
||||||
CVE-2025-6022,0,0,673713355118472c1ebaabd5c5e4854e0f9320e04b049cdd5cc68d5d0f25f012,2025-07-05T23:15:26.353000
|
CVE-2025-6022,0,0,673713355118472c1ebaabd5c5e4854e0f9320e04b049cdd5cc68d5d0f25f012,2025-07-05T23:15:26.353000
|
||||||
CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000
|
CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000
|
||||||
@ -300019,6 +300033,7 @@ CVE-2025-6196,0,0,ebd0476f8627cd400d4a2990bf388e707195c795d8a7681502291e5ed83c18
|
|||||||
CVE-2025-6199,0,0,27de73d7bdfbcb0d047107c059b4fb0beddf1f77ad32bc36681bc8884ca65c55,2025-06-17T20:50:23.507000
|
CVE-2025-6199,0,0,27de73d7bdfbcb0d047107c059b4fb0beddf1f77ad32bc36681bc8884ca65c55,2025-06-17T20:50:23.507000
|
||||||
CVE-2025-6201,0,0,09953b11a7588a9edc2f3925b0cbb84add185ea803d7765dc4a2a786cd413a85,2025-06-23T20:16:59.783000
|
CVE-2025-6201,0,0,09953b11a7588a9edc2f3925b0cbb84add185ea803d7765dc4a2a786cd413a85,2025-06-23T20:16:59.783000
|
||||||
CVE-2025-6206,0,0,c66ee500876bc4abb021bb9d77aeda45e0e42d83e894cdd37485d8f28334b052,2025-06-26T18:58:14.280000
|
CVE-2025-6206,0,0,c66ee500876bc4abb021bb9d77aeda45e0e42d83e894cdd37485d8f28334b052,2025-06-26T18:58:14.280000
|
||||||
|
CVE-2025-6210,1,1,14d31ee2b00a58e0d63a7ab89552e4950b1424b800527d9bb45e7fdd7c86ee97,2025-07-07T10:15:29.040000
|
||||||
CVE-2025-6212,0,0,5dac9bfcd47bb22b8482f7b90b8ca95e9033fb4dc0dc0c238430c68c18eda7f4,2025-06-26T18:57:43.670000
|
CVE-2025-6212,0,0,5dac9bfcd47bb22b8482f7b90b8ca95e9033fb4dc0dc0c238430c68c18eda7f4,2025-06-26T18:57:43.670000
|
||||||
CVE-2025-6216,0,0,fa2fdcc5033cf3a1df6342a01f2acd273f87b99c1664b4ca0db573d99035212e,2025-06-23T20:16:21.633000
|
CVE-2025-6216,0,0,fa2fdcc5033cf3a1df6342a01f2acd273f87b99c1664b4ca0db573d99035212e,2025-06-23T20:16:21.633000
|
||||||
CVE-2025-6217,0,0,0d2c65c94d7cc4fabd9027df56e983345e1f33543f29c53f0c45cf319713d14d,2025-06-23T20:16:21.633000
|
CVE-2025-6217,0,0,0d2c65c94d7cc4fabd9027df56e983345e1f33543f29c53f0c45cf319713d14d,2025-06-23T20:16:21.633000
|
||||||
@ -300136,6 +300151,7 @@ CVE-2025-6379,0,0,1f3ce0338cba737975d34ef3c6f366045d271231fad354ccd5fd7285086b32
|
|||||||
CVE-2025-6381,0,0,05fb40aefc38aca74c97a648ce5e29eeebdaf346b83dbed374235dabaa8ad14a,2025-06-30T18:38:23.493000
|
CVE-2025-6381,0,0,05fb40aefc38aca74c97a648ce5e29eeebdaf346b83dbed374235dabaa8ad14a,2025-06-30T18:38:23.493000
|
||||||
CVE-2025-6383,0,0,b46c3e86435c1dc7ff6465355979b367a1d819d4bbf46e0422c7cfd37cfbac42,2025-06-26T18:57:43.670000
|
CVE-2025-6383,0,0,b46c3e86435c1dc7ff6465355979b367a1d819d4bbf46e0422c7cfd37cfbac42,2025-06-26T18:57:43.670000
|
||||||
CVE-2025-6384,0,0,97aa0c1b3518730f2ff1ac0c6e40e6df53f12abb019ae8c41f191d17b86f6691,2025-06-23T20:16:40.143000
|
CVE-2025-6384,0,0,97aa0c1b3518730f2ff1ac0c6e40e6df53f12abb019ae8c41f191d17b86f6691,2025-06-23T20:16:40.143000
|
||||||
|
CVE-2025-6386,1,1,b2a078e22a659d4d88f448dea0064464b20c22ed2491c180557e36b6a04d2807,2025-07-07T10:15:29.187000
|
||||||
CVE-2025-6393,0,0,32247b5db96e134f65a8c77173062a4edd972dbb6c0ac396c8f0bf9ce435cde7,2025-06-23T20:16:21.633000
|
CVE-2025-6393,0,0,32247b5db96e134f65a8c77173062a4edd972dbb6c0ac396c8f0bf9ce435cde7,2025-06-23T20:16:21.633000
|
||||||
CVE-2025-6394,0,0,a6663654d9b1668d091d362eee2cdb7e6cb13133cb16bf86aada9168ce7b98ea,2025-06-25T20:12:10.560000
|
CVE-2025-6394,0,0,a6663654d9b1668d091d362eee2cdb7e6cb13133cb16bf86aada9168ce7b98ea,2025-06-25T20:12:10.560000
|
||||||
CVE-2025-6399,0,0,1cc4662a693a649a9f407a6e359aaca52fe988ef413a3d7e4dcc120f8e622da2,2025-06-25T20:13:30.100000
|
CVE-2025-6399,0,0,1cc4662a693a649a9f407a6e359aaca52fe988ef413a3d7e4dcc120f8e622da2,2025-06-25T20:13:30.100000
|
||||||
@ -300573,8 +300589,12 @@ CVE-2025-7114,0,0,9d06a1babc2fc64b84b5f67f39ccb61a42d8da4c9464746f9e7739bb6c3e23
|
|||||||
CVE-2025-7115,0,0,a27187f501d5b24d8e7d6eaf0ef282b8ac25689fb83bfe16b7f5d432aff3cba9,2025-07-07T06:15:30.590000
|
CVE-2025-7115,0,0,a27187f501d5b24d8e7d6eaf0ef282b8ac25689fb83bfe16b7f5d432aff3cba9,2025-07-07T06:15:30.590000
|
||||||
CVE-2025-7116,0,0,cc5179054b7f8edc49775a1e5decef8897db32cec0c77104e2cab64c15ab718a,2025-07-07T07:15:24.313000
|
CVE-2025-7116,0,0,cc5179054b7f8edc49775a1e5decef8897db32cec0c77104e2cab64c15ab718a,2025-07-07T07:15:24.313000
|
||||||
CVE-2025-7117,0,0,455a2b4b9fc464fde36d6a44b78e44e87fde0a0848f99ff1630ba6a0b0dffb2a,2025-07-07T07:15:24.563000
|
CVE-2025-7117,0,0,455a2b4b9fc464fde36d6a44b78e44e87fde0a0848f99ff1630ba6a0b0dffb2a,2025-07-07T07:15:24.563000
|
||||||
CVE-2025-7118,1,1,e4d79629f51a9edcc0bbe4a8c178b2de8e9b8588aa684f600d751924fbf7390d,2025-07-07T08:15:25.603000
|
CVE-2025-7118,0,0,e4d79629f51a9edcc0bbe4a8c178b2de8e9b8588aa684f600d751924fbf7390d,2025-07-07T08:15:25.603000
|
||||||
CVE-2025-7119,1,1,b16a4f864769be4b66582abb99e7b71db1e4a258dd69d5f0d6b278c8aea660d3,2025-07-07T08:15:25.787000
|
CVE-2025-7119,0,0,b16a4f864769be4b66582abb99e7b71db1e4a258dd69d5f0d6b278c8aea660d3,2025-07-07T08:15:25.787000
|
||||||
CVE-2025-7120,1,1,f25a21d5a89a8851fe91016c0f04a2e392d5690316ddffea1337e8c150af23e2,2025-07-07T09:15:27.097000
|
CVE-2025-7120,0,0,f25a21d5a89a8851fe91016c0f04a2e392d5690316ddffea1337e8c150af23e2,2025-07-07T09:15:27.097000
|
||||||
CVE-2025-7121,1,1,f98592b90bae8673a1acf1562a82f201f4107122965f0fa7be2fd44e609ee989,2025-07-07T09:15:27.290000
|
CVE-2025-7121,0,0,f98592b90bae8673a1acf1562a82f201f4107122965f0fa7be2fd44e609ee989,2025-07-07T09:15:27.290000
|
||||||
|
CVE-2025-7122,1,1,adf256896ed5cbb8629aa9cde7fbd52d5f1bfa96f6bba07e9740464a39062f0c,2025-07-07T10:15:29.333000
|
||||||
|
CVE-2025-7123,1,1,d658a23f3c64568d145a25898383fe8c81303a99ce38c2feb3ec256ae1454ce8,2025-07-07T10:15:29.580000
|
||||||
|
CVE-2025-7124,1,1,522137e44a576022dd9df4ff44053e0ecc7e9aaf32ee911cb3298096b5ac7633,2025-07-07T11:15:51.483000
|
||||||
|
CVE-2025-7125,1,1,138e4d9c171b2eeadb42478a73203b9e6dbed15caf9bef9fc64eb47451c5fa49,2025-07-07T11:15:52.217000
|
||||||
CVE-2025-7145,0,0,0431922fce794ebe2fb76c85f6a92686a8078a8927733582f3cad39cb892c9b6,2025-07-07T03:15:30.917000
|
CVE-2025-7145,0,0,0431922fce794ebe2fb76c85f6a92686a8078a8927733582f3cad39cb892c9b6,2025-07-07T03:15:30.917000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user