mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2025-06-24T22:00:24.828561+00:00
This commit is contained in:
parent
9f21af47cb
commit
bc654acd10
60
CVE-2024/CVE-2024-377xx/CVE-2024-37743.json
Normal file
60
CVE-2024/CVE-2024-377xx/CVE-2024-37743.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-37743",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-24T20:15:23.767",
|
||||
"lastModified": "2025-06-24T20:15:23.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in mmzdev KnowledgeGPT V.0.0.5 allows a remote attacker to execute arbitrary code via the Document Display Component."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mmz-001/knowledge_gpt/blob/main/knowledge_gpt/main.py",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://medium.com/@cnetsec/vulnerability-identified-in-knowledgegpt-version-0-0-5-5168ec081842",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48766",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-13T16:15:23.717",
|
||||
"lastModified": "2025-06-23T14:59:36.530",
|
||||
"lastModified": "2025-06-24T20:04:07.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -70,10 +70,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netalertxnetalertx:*:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:netalertx:netalertx:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.7.18",
|
||||
"versionEndExcluding": "24.10.12",
|
||||
"matchCriteriaId": "D2D19236-3E00-4144-B81D-56268DEC39C6"
|
||||
"matchCriteriaId": "F227D5E6-2F6A-46A0-90E6-80807725DDAB"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -93,8 +93,8 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Mitigation"
|
||||
"Mitigation",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -102,8 +102,8 @@
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Mitigation"
|
||||
"Mitigation",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-56916",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-24T18:15:24.240",
|
||||
"lastModified": "2025-06-24T18:15:24.240",
|
||||
"lastModified": "2025-06-24T20:15:24.643",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In Netbox Community 4.1.7, once authenticated, Configuration History > Add`is vulnerable to cross-site scripting (XSS) due to the `current value` field rendering user supplied html. An authenticated attacker can leverage this to add malicious JavaScript to the any banner field. Once a victim edits a Configuration History version or attempts to Add a new version, the XSS payload will trigger."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7",
|
||||
|
64
CVE-2024/CVE-2024-569xx/CVE-2024-56917.json
Normal file
64
CVE-2024/CVE-2024-569xx/CVE-2024-56917.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-56917",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-24T20:15:24.790",
|
||||
"lastModified": "2025-06-24T20:15:24.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Netbox Community 4.1.7 is vulnerable to Cross Site Scripting (XSS) via the maintenance banner` in maintenance mode."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/noxlumens/Vulnerability-Research/tree/main/CVE-2024-56917",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://youtu.be/GC8-PUlu2i8?si=eoScOk8IUJdwPDc_&t=172",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-56918",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-24T17:15:29.333",
|
||||
"lastModified": "2025-06-24T17:15:29.333",
|
||||
"lastModified": "2025-06-24T20:15:24.953",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In Netbox Community 4.1.7, the login page is vulnerable to cross-site scripting (XSS), which allows a privileged, authenticated attacker to exfiltrate user input from the login form."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-44531",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-24T16:15:27.703",
|
||||
"lastModified": "2025-06-24T16:15:27.703",
|
||||
"lastModified": "2025-06-24T20:15:25.100",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue in Realtek RTL8762EKF-EVB RTL8762E SDK v1.4.0 allows attackers to cause a Denial of Service (DoS) via sending a crafted before a pairing public key is received during a Bluetooth connection attempt."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://realtek.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-45878",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-17T17:15:33.487",
|
||||
"lastModified": "2025-06-19T01:16:08.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-24T20:15:25.250",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -69,6 +69,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstorm.news/files/cve/CVE-2025-45878",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.miliaris.it/",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-45880",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-17T17:15:33.603",
|
||||
"lastModified": "2025-06-20T11:16:37.750",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-24T20:15:25.410",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -69,6 +69,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstorm.news/files/cve/CVE-2025-45880",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.miliaris.it/",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-47438",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-05-23T13:15:37.550",
|
||||
"lastModified": "2025-05-23T15:54:42.643",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-24T20:31:59.710",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/wp-job-portal/vulnerability/wordpress-wp-job-portal-plugin-2-3-1-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpjobportal:wp_job_portal:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.3.2",
|
||||
"matchCriteriaId": "3EFCB840-A826-4382-8FCB-A4AA0AE160B4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/wp-job-portal/vulnerability/wordpress-wp-job-portal-plugin-2-3-1-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-48273",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-05-23T13:15:44.140",
|
||||
"lastModified": "2025-05-23T15:54:42.643",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-24T20:30:34.620",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/wp-job-portal/vulnerability/wordpress-wp-job-portal-2-3-2-arbitrary-file-download-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpjobportal:wp_job_portal:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.3.3",
|
||||
"matchCriteriaId": "EEF4383E-9AFB-4394-A6AC-4012ECB81089"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/wp-job-portal/vulnerability/wordpress-wp-job-portal-2-3-2-arbitrary-file-download-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-498xx/CVE-2025-49851.json
Normal file
78
CVE-2025/CVE-2025-498xx/CVE-2025-49851.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-49851",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-06-24T20:15:25.560",
|
||||
"lastModified": "2025-06-24T20:15:25.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to an Improper Authentication vulnerability which could allow an attacker to bypass authentication and gain permissions in the product."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-175-05",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-498xx/CVE-2025-49852.json
Normal file
78
CVE-2025/CVE-2025-498xx/CVE-2025-49852.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-49852",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-06-24T20:15:25.727",
|
||||
"lastModified": "2025-06-24T20:15:25.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to a Server-Side Request Forgery vulnerability which could allow an unauthenticated attacker to retrieve information from other servers."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-175-05",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-498xx/CVE-2025-49853.json
Normal file
78
CVE-2025/CVE-2025-498xx/CVE-2025-49853.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-49853",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-06-24T20:15:25.873",
|
||||
"lastModified": "2025-06-24T20:15:25.873",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to SQL injections which could allow an attacker to leak arbitrary information and insert arbitrary SQL syntax into SQL queries."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-175-05",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5139",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-25T01:15:23.710",
|
||||
"lastModified": "2025-06-11T14:15:37.437",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-24T20:29:44.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,78 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:qualitor:qualitor:8.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41C8B471-E62C-4185-91E8-C4360B35DFD9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:qualitor:qualitor:8.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40FD775B-0465-4EA0-8E11-97620D8431E1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/MatheuZSecurity/fe221fd5b2e5393abf76be42f11f52c3/raw/e8d9c63885f0b83b3374db3d31dbe2c69c868334/poc.sh",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.310220",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.310220",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.572477",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.youtube.com/watch?v=Dq4C5s9Uwyo",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
102
CVE-2025/CVE-2025-524xx/CVE-2025-52471.json
Normal file
102
CVE-2025/CVE-2025-524xx/CVE-2025-52471.json
Normal file
@ -0,0 +1,102 @@
|
||||
{
|
||||
"id": "CVE-2025-52471",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-24T20:15:26.033",
|
||||
"lastModified": "2025-06-24T20:15:26.033",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. An integer underflow vulnerability has been identified in the ESP-NOW protocol implementation within the ESP Wi-Fi component of versions 5.4.1, 5.3.3, 5.2.5, and 5.1.6 of the ESP-IDF framework. This issue stems from insufficient validation of user-supplied data length in the packet receive function. Under certain conditions, this may lead to out-of-bounds memory access and may allow arbitrary memory write operations. On systems without a memory protection scheme, this behavior could potentially be used to achieve remote code execution (RCE) on the target device. In versions 5.4.2, 5.3.4, 5.2.6, and 5.1.6, ESP-NOW has added more comprehensive validation logic on user-supplied data length during packet reception to prevent integer underflow caused by negative value calculations. For ESP-IDF v5.3 and earlier, a workaround can be applied by validating that the `data_len` parameter received in the RX callback (registered via `esp_now_register_recv_cb()`) is a positive value before further processing. For ESP-IDF v5.4 and later, no application-level workaround is available. Users are advised to upgrade to a patched version of ESP-IDF to take advantage of the built-in mitigation."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "UNREPORTED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-191"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/espressif/esp-idf/commit/b1a379d57430d265a53aca13d59ddfbf2e7ac409",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/espressif/esp-idf/commit/c5fc81917805f99e687c81cc56b68dc5df7ef8b5",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/espressif/esp-idf/commit/d4dafbdc3572387cd4f9a62b776580bc4ac3bde7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/espressif/esp-idf/commit/d6ec5a52255b17c1d6ef379e89f9de2c379042f8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/espressif/esp-idf/commit/df7757d8279871fa7a2f42ef3962c6c1ec88b8a2",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/espressif/esp-idf/commit/edc227c5eaeced999b5212943a9434379f8aad80",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/espressif/esp-idf/security/advisories/GHSA-hqhh-cp47-fv5g",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-525xx/CVE-2025-52571.json
Normal file
60
CVE-2025/CVE-2025-525xx/CVE-2025-52571.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-52571",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-24T20:15:26.213",
|
||||
"lastModified": "2025-06-24T20:15:26.213",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hikka is a Telegram userbot. A vulnerability affects all users of versions below 1.6.2, including most of the forks. It allows an unauthenticated attacker to gain access to Telegram account of a victim, as well as full access to the server. The issue is patched in version 1.6.2. No known workarounds are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hikariatama/Hikka/commit/9a0e4b1b387ef828c345c43d990421d5afcff5f6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/hikariatama/Hikka/security/advisories/GHSA-vwpq-wm8w-44wf",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-525xx/CVE-2025-52572.json
Normal file
60
CVE-2025/CVE-2025-525xx/CVE-2025-52572.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-52572",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-24T21:15:25.463",
|
||||
"lastModified": "2025-06-24T21:15:25.463",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hikka, a Telegram userbot, has vulnerability affects all users on all versions of Hikka. Two scenarios are possible. 1. Web interface does not have an authenticated session: attacker can use his own Telegram account to gain RCE to the server by authorizing in the dangling web interface. 2. Web interface does have an authenticated session: due to insufficient warning in the authentication message, users were tempted to click \"Allow\" in the \"Allow web application ops\" menu. This gave an attacker access not only to remote code execution, but also to Telegram accounts of owners. Scenario number 2 is known to have been exploited in the wild. No known patches are available, but some workarounds are available. Use `--no-web` flag and do not start userbot without it; after authorizing in the web interface, close the port on the server and/or start the userbot with `--no-web` flag; and do not click \"Allow\" in your helper bot unless it is your explicit action that needs to be allowed."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hikariatama/Hikka/security/advisories/GHSA-7x3c-335v-wxjj",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://t.me/bbcode/9",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-528xx/CVE-2025-52880.json
Normal file
60
CVE-2025/CVE-2025-528xx/CVE-2025-52880.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-52880",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-24T20:15:26.373",
|
||||
"lastModified": "2025-06-24T20:15:26.373",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Komga is a media server for comics, mangas, BDs, magazines and eBooks. A Cross-Site Scripting (XSS) vulnerability has been discovered in versions 1.8.0 through 1.21.3 when serving EPUB resources, either directly from the API, or when reading using the epub reader. The vulnerability lets an attacker perform actions on the victim's behalf. When targeting an admin user, this can be combined with controlling a server-side command to achieve arbitrary code execution. For this vulnerability to be exploited, a malicious EPUB file has to be present in a Komga library, and subsequently accessed in the Epub reader by an admin user. Version 1.22.0 contains a patch for the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-799"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gotson/komga/commit/5f9cc449b7846ed2066752c72c9ce7b20c3a85a7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gotson/komga/security/advisories/GHSA-m7mm-6jxp-2m4x",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-528xx/CVE-2025-52882.json
Normal file
78
CVE-2025/CVE-2025-528xx/CVE-2025-52882.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-52882",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-24T20:15:26.543",
|
||||
"lastModified": "2025-06-24T20:15:26.543",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Claude Code is an agentic coding tool. Claude Code extensions in VSCode and forks (e.g., Cursor, Windsurf, and VSCodium) and JetBrains IDEs (e.g., IntelliJ, Pycharm, and Android Studio) are vulnerable to unauthorized websocket connections from an attacker when visiting attacker-controlled webpages. Claude Code for VSCode IDE extensions versions 0.2.116 through 1.0.23 are vulnerable. For Jetbrains IDE plugins, Claude Code [beta] versions 0.1.1 through 0.1.8 are vulnerable. In VSCode (and forks), exploitation would allow an attacker to read arbitrary files, see the list of files open in the IDE, get selection and diagnostics events from the IDE, or execute code in limited situations where a user has an open Jupyter Notebook and accepts a malicious prompt. In JetBrains IDEs, an attacker could get selection events, a list of open files, and a list of syntax errors. Claude released a patch for this issue on June 13th, 2025. Although Claude Code auto-updates when a user launch it and auto-updates the extensions, users should take the following steps, though the exact steps depend on one's integrated development environment (IDE). For VSCode, Cursor, Windsurf, VSCodium, and other VSCode forks, check the extension Claude Code for VSCode. Open the list of Extensions (View->Extensions), look for Claude Code for VSCode among installed extensions, update or uninstall any version prior to 1.0.24, and restart the IDE. For JetBrains IDEs including IntelliJ, PyCharm, and Android Studio, check the plugin Claude Code [Beta]. Open the Plugins list, look for Claude Code [Beta] among installed extensions, update or uninstall any version prior to 0.1.9, and restart the IDE."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1385"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anthropics/claude-code/security/advisories/GHSA-9f65-56v6-gxw7",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-528xx/CVE-2025-52883.json
Normal file
60
CVE-2025/CVE-2025-528xx/CVE-2025-52883.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-52883",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-24T21:15:26.030",
|
||||
"lastModified": "2025-06-24T21:15:26.030",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Meshtastic-Android is an Android application for the mesh radio software Meshtastic. Prior to version 2.5.21, an attacker is able to send an unencrypted direct message to a victim impersonating any other node of the mesh. This message will be displayed in the same chat that the victim normally communicates with the other node and it will appear as using PKC, while it is not. This means that the victim will be provided with a false sense of security due to the green padlock displayed when using PKC and they'll read the attacker's message as legitimate. Version 2.5.21 contains a patch for the issue. It is suggested to implement a stricter control on whether a message has been received using PKC or using the shared Meshtastic channel key. Moreover, instead of showing no green padlock icon in the chat with no PKC, consider using an explicit indicator like, for example, the yellow half-open padlock displayed when in HAM mode. This remediation, however, applies to the client applications rather than the Meshtastic firmware."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/meshtastic/Meshtastic-Android/pull/1720",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/meshtastic/Meshtastic-Android/security/advisories/GHSA-h4rg-g6f3-ghh7",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
102
CVE-2025/CVE-2025-528xx/CVE-2025-52884.json
Normal file
102
CVE-2025/CVE-2025-528xx/CVE-2025-52884.json
Normal file
@ -0,0 +1,102 @@
|
||||
{
|
||||
"id": "CVE-2025-52884",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-24T21:15:26.207",
|
||||
"lastModified": "2025-06-24T21:15:26.207",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RISC Zero is a zero-knowledge verifiable general computing platform, with Ethereum integration. The risc0-ethereum repository contains Solidity verifier contracts, Steel EVM view call library, and supporting code. Prior to versions 2.1.1 and 2.2.0, the `Steel.validateCommitment` Solidity library function will return `true` for a crafted commitment with a digest value of zero. This violates the semantics of `validateCommitment`, as this does not commitment to a block that is in the current chain. Because the digest is zero, it does not correspond to any block and there exist no known openings. As a result, this commitment will never be produced by a correct zkVM guest using Steel and leveraging this bug to compromise the soundness of a program using Steel would require a separate bug or misuse of the Steel library, which is expected to be used to validate the root of state opening proofs. A fix has been released as part of `risc0-ethereum` 2.1.1 and 2.2.0. Users for the `Steel` Solidity library versions 2.1.0 or earlier should ensure they are using `Steel.validateCommitment` in tandem with zkVM proof verification of a Steel program, as shown in the ERC-20 counter example, and documentation. This is the correct usage of Steel, and users following this pattern are not at risk, and do not need to take action. Users not verifying a zkVM proof of a Steel program should update their application to do so, as this is incorrect usage of Steel."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 1.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "UNREPORTED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-159"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.beboundless.xyz/developers/steel/how-it-works#verifying-the-proof-onchain",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/risc0/risc0-ethereum/blob/ff0cb9253a87945b653b825711b8b5075f8b7545/examples/erc20-counter/contracts/src/Counter.sol#L56-L63",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/risc0/risc0-ethereum/commit/3bbac859c7132b21ba5fdf2d47f1dd52e7e73d98",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/risc0/risc0-ethereum/pull/605",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/risc0/risc0-ethereum/releases/tag/v2.1.1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/risc0/risc0-ethereum/releases/tag/v2.2.0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/risc0/risc0-ethereum/security/advisories/GHSA-gjv3-89hh-9xq2",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-528xx/CVE-2025-52888.json
Normal file
60
CVE-2025/CVE-2025-528xx/CVE-2025-52888.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-52888",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-24T20:15:26.700",
|
||||
"lastModified": "2025-06-24T20:15:26.700",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Allure 2 is the version 2.x branch of Allure Report, a multi-language test reporting tool. A critical XML External Entity (XXE) vulnerability exists in the xunit-xml-plugin used by Allure 2 prior to version 2.34.1. The plugin fails to securely configure the XML parser (`DocumentBuilderFactory`) and allows external entity expansion when processing test result .xml files. This allows attackers to read arbitrary files from the file system and potentially trigger server-side request forgery (SSRF). Version 2.34.1 contains a patch for the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/allure-framework/allure2/commit/cbcb33719851ff70adce85d38e15d20fc58d4eb7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/allure-framework/allure2/security/advisories/GHSA-h7qf-qmf3-85qg",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
71
CVE-2025/CVE-2025-530xx/CVE-2025-53021.json
Normal file
71
CVE-2025/CVE-2025-530xx/CVE-2025-53021.json
Normal file
@ -0,0 +1,71 @@
|
||||
{
|
||||
"id": "CVE-2025-53021",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-24T20:15:26.867",
|
||||
"lastModified": "2025-06-24T20:15:26.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A session fixation vulnerability in Moodle 3.x through 3.11.18 allows unauthenticated attackers to hijack user sessions via the sesskey parameter. The sesskey can be obtained without authentication and reused within the OAuth2 login flow, resulting in the victim's session being linked to the attacker's. Successful exploitation results in full account takeover. According to the Moodle Releases page, \"Bug fixes for security issues in 3.11.x ended 11 December 2023.\" NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-384"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/moodle/moodle/releases/tag/v3.11.18",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodledev.io/general/releases#moodle-311",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://rentry.co/moodle-oauth2-cve",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6122",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T13:15:21.397",
|
||||
"lastModified": "2025-06-17T20:50:33.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-24T20:14:31.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,83 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabian:restaurant_order_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF358A06-EDAE-4512-B8F3-60EF2AFE61EF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ez-lbz/poc/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312591",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312591",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592617",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592624",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6123",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T13:15:22.190",
|
||||
"lastModified": "2025-06-17T20:50:33.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-24T20:12:20.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabian:restaurant_order_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF358A06-EDAE-4512-B8F3-60EF2AFE61EF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ez-lbz/poc/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312592",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312592",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592621",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6124",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T14:15:22.777",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-24T20:03:26.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabian:restaurant_order_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF358A06-EDAE-4512-B8F3-60EF2AFE61EF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ez-lbz/poc/issues/4",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312593",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312593",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592625",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
70
CVE-2025/CVE-2025-65xx/CVE-2025-6555.json
Normal file
70
CVE-2025/CVE-2025-65xx/CVE-2025-6555.json
Normal file
@ -0,0 +1,70 @@
|
||||
{
|
||||
"id": "CVE-2025-6555",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-06-24T20:15:27.100",
|
||||
"lastModified": "2025-06-24T21:15:26.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in Animation in Google Chrome prior to 138.0.7204.49 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_24.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/407328533",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-65xx/CVE-2025-6556.json
Normal file
60
CVE-2025/CVE-2025-65xx/CVE-2025-6556.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-6556",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-06-24T20:15:27.227",
|
||||
"lastModified": "2025-06-24T21:15:26.553",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient policy enforcement in Loader in Google Chrome prior to 138.0.7204.49 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-288"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_24.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/40062462",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-65xx/CVE-2025-6557.json
Normal file
60
CVE-2025/CVE-2025-65xx/CVE-2025-6557.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-6557",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-06-24T20:15:27.333",
|
||||
"lastModified": "2025-06-24T21:15:26.697",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient data validation in DevTools in Google Chrome on Windows prior to 138.0.7204.49 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Low)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1021"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_24.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/406631048",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-65xx/CVE-2025-6578.json
Normal file
145
CVE-2025/CVE-2025-65xx/CVE-2025-6578.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-6578",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-24T20:15:27.433",
|
||||
"lastModified": "2025-06-24T20:15:27.433",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/delete_account.php. The manipulation of the argument admin_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yangfan-lang/cve/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313774",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313774",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.601763",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-65xx/CVE-2025-6579.json
Normal file
145
CVE-2025/CVE-2025-65xx/CVE-2025-6579.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-6579",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-24T20:15:27.630",
|
||||
"lastModified": "2025-06-24T20:15:27.630",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Car Rental System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /message_admin.php. The manipulation of the argument Message leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yangfan-lang/cve/issues/4",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313775",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313775",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.601764",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
72
README.md
72
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-24T20:00:20.349462+00:00
|
||||
2025-06-24T22:00:24.828561+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-24T19:49:04.033000+00:00
|
||||
2025-06-24T21:15:26.697000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,50 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
299236
|
||||
299255
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `19`
|
||||
|
||||
- [CVE-2024-56916](CVE-2024/CVE-2024-569xx/CVE-2024-56916.json) (`2025-06-24T18:15:24.240`)
|
||||
- [CVE-2025-23260](CVE-2025/CVE-2025-232xx/CVE-2025-23260.json) (`2025-06-24T18:15:24.533`)
|
||||
- [CVE-2025-2566](CVE-2025/CVE-2025-25xx/CVE-2025-2566.json) (`2025-06-24T19:15:23.520`)
|
||||
- [CVE-2025-49147](CVE-2025/CVE-2025-491xx/CVE-2025-49147.json) (`2025-06-24T18:15:25.247`)
|
||||
- [CVE-2025-5087](CVE-2025/CVE-2025-50xx/CVE-2025-5087.json) (`2025-06-24T19:15:23.757`)
|
||||
- [CVE-2025-53073](CVE-2025/CVE-2025-530xx/CVE-2025-53073.json) (`2025-06-24T18:15:26.813`)
|
||||
- [CVE-2024-37743](CVE-2024/CVE-2024-377xx/CVE-2024-37743.json) (`2025-06-24T20:15:23.767`)
|
||||
- [CVE-2024-56917](CVE-2024/CVE-2024-569xx/CVE-2024-56917.json) (`2025-06-24T20:15:24.790`)
|
||||
- [CVE-2025-49851](CVE-2025/CVE-2025-498xx/CVE-2025-49851.json) (`2025-06-24T20:15:25.560`)
|
||||
- [CVE-2025-49852](CVE-2025/CVE-2025-498xx/CVE-2025-49852.json) (`2025-06-24T20:15:25.727`)
|
||||
- [CVE-2025-49853](CVE-2025/CVE-2025-498xx/CVE-2025-49853.json) (`2025-06-24T20:15:25.873`)
|
||||
- [CVE-2025-52471](CVE-2025/CVE-2025-524xx/CVE-2025-52471.json) (`2025-06-24T20:15:26.033`)
|
||||
- [CVE-2025-52571](CVE-2025/CVE-2025-525xx/CVE-2025-52571.json) (`2025-06-24T20:15:26.213`)
|
||||
- [CVE-2025-52572](CVE-2025/CVE-2025-525xx/CVE-2025-52572.json) (`2025-06-24T21:15:25.463`)
|
||||
- [CVE-2025-52880](CVE-2025/CVE-2025-528xx/CVE-2025-52880.json) (`2025-06-24T20:15:26.373`)
|
||||
- [CVE-2025-52882](CVE-2025/CVE-2025-528xx/CVE-2025-52882.json) (`2025-06-24T20:15:26.543`)
|
||||
- [CVE-2025-52883](CVE-2025/CVE-2025-528xx/CVE-2025-52883.json) (`2025-06-24T21:15:26.030`)
|
||||
- [CVE-2025-52884](CVE-2025/CVE-2025-528xx/CVE-2025-52884.json) (`2025-06-24T21:15:26.207`)
|
||||
- [CVE-2025-52888](CVE-2025/CVE-2025-528xx/CVE-2025-52888.json) (`2025-06-24T20:15:26.700`)
|
||||
- [CVE-2025-53021](CVE-2025/CVE-2025-530xx/CVE-2025-53021.json) (`2025-06-24T20:15:26.867`)
|
||||
- [CVE-2025-6555](CVE-2025/CVE-2025-65xx/CVE-2025-6555.json) (`2025-06-24T20:15:27.100`)
|
||||
- [CVE-2025-6556](CVE-2025/CVE-2025-65xx/CVE-2025-6556.json) (`2025-06-24T20:15:27.227`)
|
||||
- [CVE-2025-6557](CVE-2025/CVE-2025-65xx/CVE-2025-6557.json) (`2025-06-24T20:15:27.333`)
|
||||
- [CVE-2025-6578](CVE-2025/CVE-2025-65xx/CVE-2025-6578.json) (`2025-06-24T20:15:27.433`)
|
||||
- [CVE-2025-6579](CVE-2025/CVE-2025-65xx/CVE-2025-6579.json) (`2025-06-24T20:15:27.630`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `37`
|
||||
Recently modified CVEs: `12`
|
||||
|
||||
- [CVE-2025-30281](CVE-2025/CVE-2025-302xx/CVE-2025-30281.json) (`2025-06-24T18:15:24.700`)
|
||||
- [CVE-2025-32442](CVE-2025/CVE-2025-324xx/CVE-2025-32442.json) (`2025-06-24T18:14:31.943`)
|
||||
- [CVE-2025-44528](CVE-2025/CVE-2025-445xx/CVE-2025-44528.json) (`2025-06-24T18:15:24.873`)
|
||||
- [CVE-2025-45475](CVE-2025/CVE-2025-454xx/CVE-2025-45475.json) (`2025-06-24T18:42:50.893`)
|
||||
- [CVE-2025-46570](CVE-2025/CVE-2025-465xx/CVE-2025-46570.json) (`2025-06-24T18:25:31.883`)
|
||||
- [CVE-2025-46722](CVE-2025/CVE-2025-467xx/CVE-2025-46722.json) (`2025-06-24T18:12:30.023`)
|
||||
- [CVE-2025-48026](CVE-2025/CVE-2025-480xx/CVE-2025-48026.json) (`2025-06-24T18:15:25.070`)
|
||||
- [CVE-2025-48746](CVE-2025/CVE-2025-487xx/CVE-2025-48746.json) (`2025-06-24T18:40:18.270`)
|
||||
- [CVE-2025-48988](CVE-2025/CVE-2025-489xx/CVE-2025-48988.json) (`2025-06-24T19:49:04.033`)
|
||||
- [CVE-2025-50213](CVE-2025/CVE-2025-502xx/CVE-2025-50213.json) (`2025-06-24T18:15:25.427`)
|
||||
- [CVE-2025-50348](CVE-2025/CVE-2025-503xx/CVE-2025-50348.json) (`2025-06-24T18:15:25.610`)
|
||||
- [CVE-2025-50349](CVE-2025/CVE-2025-503xx/CVE-2025-50349.json) (`2025-06-24T18:15:25.830`)
|
||||
- [CVE-2025-50693](CVE-2025/CVE-2025-506xx/CVE-2025-50693.json) (`2025-06-24T18:15:26.080`)
|
||||
- [CVE-2025-50695](CVE-2025/CVE-2025-506xx/CVE-2025-50695.json) (`2025-06-24T18:15:26.250`)
|
||||
- [CVE-2025-50699](CVE-2025/CVE-2025-506xx/CVE-2025-50699.json) (`2025-06-24T18:15:26.433`)
|
||||
- [CVE-2025-6020](CVE-2025/CVE-2025-60xx/CVE-2025-6020.json) (`2025-06-24T19:15:23.937`)
|
||||
- [CVE-2025-6133](CVE-2025/CVE-2025-61xx/CVE-2025-6133.json) (`2025-06-24T19:44:40.803`)
|
||||
- [CVE-2025-6404](CVE-2025/CVE-2025-64xx/CVE-2025-6404.json) (`2025-06-24T19:33:00.033`)
|
||||
- [CVE-2025-6405](CVE-2025/CVE-2025-64xx/CVE-2025-6405.json) (`2025-06-24T19:16:58.253`)
|
||||
- [CVE-2025-6406](CVE-2025/CVE-2025-64xx/CVE-2025-6406.json) (`2025-06-24T19:09:54.780`)
|
||||
- [CVE-2025-6407](CVE-2025/CVE-2025-64xx/CVE-2025-6407.json) (`2025-06-24T19:04:59.000`)
|
||||
- [CVE-2025-6408](CVE-2025/CVE-2025-64xx/CVE-2025-6408.json) (`2025-06-24T18:59:35.810`)
|
||||
- [CVE-2025-6409](CVE-2025/CVE-2025-64xx/CVE-2025-6409.json) (`2025-06-24T18:55:59.940`)
|
||||
- [CVE-2025-6418](CVE-2025/CVE-2025-64xx/CVE-2025-6418.json) (`2025-06-24T18:51:41.453`)
|
||||
- [CVE-2025-6436](CVE-2025/CVE-2025-64xx/CVE-2025-6436.json) (`2025-06-24T19:15:24.063`)
|
||||
- [CVE-2024-48766](CVE-2024/CVE-2024-487xx/CVE-2024-48766.json) (`2025-06-24T20:04:07.863`)
|
||||
- [CVE-2024-56916](CVE-2024/CVE-2024-569xx/CVE-2024-56916.json) (`2025-06-24T20:15:24.643`)
|
||||
- [CVE-2024-56918](CVE-2024/CVE-2024-569xx/CVE-2024-56918.json) (`2025-06-24T20:15:24.953`)
|
||||
- [CVE-2025-44531](CVE-2025/CVE-2025-445xx/CVE-2025-44531.json) (`2025-06-24T20:15:25.100`)
|
||||
- [CVE-2025-45878](CVE-2025/CVE-2025-458xx/CVE-2025-45878.json) (`2025-06-24T20:15:25.250`)
|
||||
- [CVE-2025-45880](CVE-2025/CVE-2025-458xx/CVE-2025-45880.json) (`2025-06-24T20:15:25.410`)
|
||||
- [CVE-2025-47438](CVE-2025/CVE-2025-474xx/CVE-2025-47438.json) (`2025-06-24T20:31:59.710`)
|
||||
- [CVE-2025-48273](CVE-2025/CVE-2025-482xx/CVE-2025-48273.json) (`2025-06-24T20:30:34.620`)
|
||||
- [CVE-2025-5139](CVE-2025/CVE-2025-51xx/CVE-2025-5139.json) (`2025-06-24T20:29:44.870`)
|
||||
- [CVE-2025-6122](CVE-2025/CVE-2025-61xx/CVE-2025-6122.json) (`2025-06-24T20:14:31.217`)
|
||||
- [CVE-2025-6123](CVE-2025/CVE-2025-61xx/CVE-2025-6123.json) (`2025-06-24T20:12:20.880`)
|
||||
- [CVE-2025-6124](CVE-2025/CVE-2025-61xx/CVE-2025-6124.json) (`2025-06-24T20:03:26.497`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
127
_state.csv
127
_state.csv
@ -182643,7 +182643,7 @@ CVE-2021-40422,0,0,b971fd01b5bc057c3e488ed4ff7b9b27613e89afd8bd99bd4ca8f9673f7d5
|
||||
CVE-2021-40423,0,0,c0c5615357871b9bb65a5fb3878995c209e626ca688ff336b687b74afea7a66a,2024-11-21T06:24:06.237000
|
||||
CVE-2021-40424,0,0,5244f2b9abc5386279f66d3ef9cf68976de2310af8212373932a373e2599ee02,2024-11-21T06:24:06.380000
|
||||
CVE-2021-40425,0,0,bc47b9d86f99ee00e1f49e380862134121778e11eedca0e38ff41710765e8646,2024-11-21T06:24:06.520000
|
||||
CVE-2021-40426,0,1,a0e871015e1f523aac0ed03b3b2e8a879b9613c8f4ac3b187e04f62b1c559249,2025-06-24T19:34:47.390000
|
||||
CVE-2021-40426,0,0,a0e871015e1f523aac0ed03b3b2e8a879b9613c8f4ac3b187e04f62b1c559249,2025-06-24T19:34:47.390000
|
||||
CVE-2021-4043,0,0,7c411bb641646d2d49d19f232ba646ba4dbc23f30e6f8879dc685b937c62bbd3,2024-11-21T06:36:47.090000
|
||||
CVE-2021-40438,0,0,59aa3bc892d7447f5106a0ff761c58e1e10116439c40f668b2dbda37cfbcaf55,2025-05-16T15:27:13.890000
|
||||
CVE-2021-40439,0,0,535b0c6da5b7f855962a13da448f90293d26c05ee109bb73431674a7ebe9dbf2,2024-11-21T06:24:07.130000
|
||||
@ -198817,8 +198817,8 @@ CVE-2022-30171,0,0,ccd765640e5dda39ae7d1ad214009223ca6f1eaf2e1bb1a754b573673e94f
|
||||
CVE-2022-30172,0,0,28fb04851f9fe4a26d9534eaea9ca784e3c380b0bb6bd862d59514fd996d2f36,2025-01-02T19:16:21.130000
|
||||
CVE-2022-30173,0,0,96c923acc0309d1ccc0a692e6296f3def0018c6e4c4cb8055662326ed0537491,2025-01-02T19:16:21.250000
|
||||
CVE-2022-30174,0,0,db7939baee4b160ca5f12e2340bfada994a7467371f87b34ad853d8a97827d00,2025-01-02T19:16:21.367000
|
||||
CVE-2022-30175,0,1,9857ea94312c7b6929459013790267e32d3bb2dc544a4e21681f6d3abaca6580,2025-06-24T19:15:21.760000
|
||||
CVE-2022-30176,0,1,2d6b087ad2926ce0b0d58667275d81cc4a1b266dcf0e98347266123851ce435c,2025-06-24T19:15:21.980000
|
||||
CVE-2022-30175,0,0,9857ea94312c7b6929459013790267e32d3bb2dc544a4e21681f6d3abaca6580,2025-06-24T19:15:21.760000
|
||||
CVE-2022-30176,0,0,2d6b087ad2926ce0b0d58667275d81cc4a1b266dcf0e98347266123851ce435c,2025-06-24T19:15:21.980000
|
||||
CVE-2022-30177,0,0,534c35369415b0ce21af47a33416afb945c385cc28aaa4ba2f29281327270d48,2025-01-02T19:16:21.490000
|
||||
CVE-2022-30178,0,0,0c1d9bb3a779ace7846976f666ad10e21e102a6ad9c7c7b3e020788afee30b16,2025-01-02T19:16:21.597000
|
||||
CVE-2022-30179,0,0,fd9668375b6bdc3bbfea5f72d745b1473aa042f289e2c883e8a137fd37d57926,2025-01-02T19:16:21.717000
|
||||
@ -198833,9 +198833,9 @@ CVE-2022-3019,0,0,699aa72743ebef964bd50c3b949d73c946ed800706a74517bc948b67f928f9
|
||||
CVE-2022-30190,0,0,08f5866aed3a78222767864a40caedb7a6f80a63e932833896b1289b1baf0ebd,2025-04-04T19:53:19.093000
|
||||
CVE-2022-30192,0,0,d0fa3f703c3532d2882a3ffa92d6ac8f74486d22b3b21d3b4689701d5ae7a39e,2025-01-02T19:16:22.460000
|
||||
CVE-2022-30193,0,0,e1012bdeb2f7d44c596c9dd5b6f2695bb91fc936b857957cfbe4a94cfcf3bd11,2025-01-02T19:16:22.607000
|
||||
CVE-2022-30194,0,1,f7f98342b0ca52d90a763c9cfde6dad08fe1eef2ec114a2a4d7061265cf63e27,2025-06-24T19:15:22.143000
|
||||
CVE-2022-30194,0,0,f7f98342b0ca52d90a763c9cfde6dad08fe1eef2ec114a2a4d7061265cf63e27,2025-06-24T19:15:22.143000
|
||||
CVE-2022-30196,0,0,d630c91b74c1c4b7e0d754215ec8c1c4e2a34e03a540b6072253efbdfc10da93,2024-11-21T07:02:20.707000
|
||||
CVE-2022-30197,0,1,d4fa14799079cfa1633dbc41dd06b2443fba9903d609b24af6bd78ddb8c1ebdd,2025-06-24T19:15:22.340000
|
||||
CVE-2022-30197,0,0,d4fa14799079cfa1633dbc41dd06b2443fba9903d609b24af6bd78ddb8c1ebdd,2025-06-24T19:15:22.340000
|
||||
CVE-2022-30198,0,0,0d32174fb45d51c99aa2fa0959ed02b0ea2f959413ec0d36c41f0d1a17447f76,2025-01-02T22:15:08.783000
|
||||
CVE-2022-30200,0,0,5241ceb1c6145dc1d6d735886dbf29a05232ee9d0864589a654564239835145a,2024-11-21T07:02:21.100000
|
||||
CVE-2022-30202,0,0,e972eeec09af33d8e11218d92bbd7e9b24b58a7300790ae9cd2e59ea2d078df3,2024-11-21T07:02:21.243000
|
||||
@ -237904,9 +237904,9 @@ CVE-2023-47024,0,0,c125fb103042924f5281e92be53a4da5c6431c794e2412cda8329c78f5f25
|
||||
CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000
|
||||
CVE-2023-47029,0,0,12b49b3ede09c8051f0adf031401d06f966f450320e558466627896d3b8f70e3,2025-06-23T20:16:21.633000
|
||||
CVE-2023-4703,0,0,a6d5e78e1192a3e0f4c01547c7f4ce3e0b04c7358d175d4096197c6b6119861c,2025-06-20T17:15:34.147000
|
||||
CVE-2023-47030,0,1,ee90a36dfc63d39b5c6737d0f0403f4137bce21157cbc095a67d4039da28da25,2025-06-24T18:15:23.003000
|
||||
CVE-2023-47031,0,1,8c355c94ea255597d7cb2c2cedcc31b6f0c5e4c2f796647a5bcdfb2cafe77d57,2025-06-24T18:15:23.563000
|
||||
CVE-2023-47032,0,1,ab1b52e064cb5253285a61f10d0988b397ce325e3f6846f306333001f10f5273,2025-06-24T18:15:23.730000
|
||||
CVE-2023-47030,0,0,ee90a36dfc63d39b5c6737d0f0403f4137bce21157cbc095a67d4039da28da25,2025-06-24T18:15:23.003000
|
||||
CVE-2023-47031,0,0,8c355c94ea255597d7cb2c2cedcc31b6f0c5e4c2f796647a5bcdfb2cafe77d57,2025-06-24T18:15:23.563000
|
||||
CVE-2023-47032,0,0,ab1b52e064cb5253285a61f10d0988b397ce325e3f6846f306333001f10f5273,2025-06-24T18:15:23.730000
|
||||
CVE-2023-47033,0,0,617818e306c20ade59924bf4bbac6b004808fa5a2cfbab4ec0f03a5ee1b8b8ca,2025-05-30T15:15:23.810000
|
||||
CVE-2023-47034,0,0,6a1f244f30344c3a3a74d180948a6a04b3859761d9cd9932f89f0d7068dfd697,2024-11-21T08:29:38.427000
|
||||
CVE-2023-47035,0,0,81ca6ef6853b599b11605e195d2498aff6e67a10accc5ef3988bd57869c19cef,2025-05-30T15:15:24.013000
|
||||
@ -238138,8 +238138,8 @@ CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb
|
||||
CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000
|
||||
CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000
|
||||
CVE-2023-47294,0,0,d3ea47b285562c39058a8eacb339c5fa3addec63cf1a3e5b9333a2e4450da9ee,2025-06-23T20:16:21.633000
|
||||
CVE-2023-47295,0,1,b4a5a5866365997d4b67d82b14a920f11d08b865f6fbb000c9018e6db15b352d,2025-06-24T18:15:23.893000
|
||||
CVE-2023-47297,0,1,8949ada58483b5ab75d0893499dc33e938392dca9ba71df8235231fd2dbaa934,2025-06-24T18:15:24.060000
|
||||
CVE-2023-47295,0,0,b4a5a5866365997d4b67d82b14a920f11d08b865f6fbb000c9018e6db15b352d,2025-06-24T18:15:23.893000
|
||||
CVE-2023-47297,0,0,8949ada58483b5ab75d0893499dc33e938392dca9ba71df8235231fd2dbaa934,2025-06-24T18:15:24.060000
|
||||
CVE-2023-47298,0,0,c409530cf61d56b21c99c649ee44169bc5e7d2ee17a3a9ef9a5831f4a402984b,2025-06-24T16:15:23.940000
|
||||
CVE-2023-4730,0,0,f9bd47caac18f229be27cadc18d87104be690bdb4cd5c89d5981d2f7932f458a,2024-08-19T13:00:23.117000
|
||||
CVE-2023-47304,0,0,db46d98bf37576c1ea41928ed0e02027d39d0face4fca78440b8bb53d0e89930,2024-11-21T08:30:07.553000
|
||||
@ -263936,6 +263936,7 @@ CVE-2024-37734,0,0,942d71720aad180ed2fca0dd3a14d392234ecbc7fd118327494f9ee9c137b
|
||||
CVE-2024-3774,0,0,7a7a597b589690c12f919940345595f31743063972f70d8b4f9ea657d33a59e6,2024-11-21T09:30:22.263000
|
||||
CVE-2024-37741,0,0,cdea71c096b6020452f86c61c722c71d411c4901d61352f541581e27bedfb10b,2024-11-21T09:24:16.130000
|
||||
CVE-2024-37742,0,0,7c57418640c4a372993ae3363ea2c4e93948b308f1c699d6cb68e3e245b5578a,2024-11-21T09:24:16.373000
|
||||
CVE-2024-37743,1,1,a4a5d908c1e5f23438af2420972a727c7b7b33e800b7231e1c263a7ff6eb4825,2025-06-24T20:15:23.767000
|
||||
CVE-2024-3775,0,0,527f7d608f8da6f09f241b673d5077f6d9275917117f8ac6d0ce1a26efac2c10,2025-04-08T16:30:51.500000
|
||||
CVE-2024-37758,0,0,6aad1ab20925aeaf835ed115698dffcd6067c2af6f08e49e2fb33789c105b9ec,2024-12-20T20:15:22.937000
|
||||
CVE-2024-37759,0,0,606805366b9f9646e3d660f6895299941a599eeb90c9b36368cb920769a669bf,2025-06-13T15:00:19.157000
|
||||
@ -272205,7 +272206,7 @@ CVE-2024-48758,0,0,c09d45b53d733862ccc897703fc7912f82231522c6286fcce4bbe3e958aaf
|
||||
CVE-2024-4876,0,0,65d8065cbe56070f462c8629050b655fbc478bb065b4ab8ba51acd1e3033dac7,2025-01-24T13:44:58.993000
|
||||
CVE-2024-48760,0,0,c9b65d5513092443fa283195a16f32efdb1113d6591583c1dbffd494c29d665e,2025-06-06T15:40:58.640000
|
||||
CVE-2024-48761,0,0,1f5cd512aaf966e4ccb5e27fcd626f0bc8944acedd5c7d09423e312b2b471403,2025-05-23T15:26:18.807000
|
||||
CVE-2024-48766,0,0,e39ed20bafa07adf6686698f28b3f9379175cabb32d358913bf8f98cf8307264,2025-06-23T14:59:36.530000
|
||||
CVE-2024-48766,0,1,3d319b5c058d9d749f13d98533bf5750784663ff551cf13c1631f53c3b33fad5,2025-06-24T20:04:07.863000
|
||||
CVE-2024-48768,0,0,20dc94e5053f6f0d8d7caf706bf6fcb813042430158ff64dc7ecde51efb03a2d,2024-10-15T21:35:32.950000
|
||||
CVE-2024-48769,0,0,881e0b4b29e63d860dc80c7571762519af749fe3f9ba6f317c2855a4a66d7008,2024-10-15T19:35:39.423000
|
||||
CVE-2024-4877,0,0,8ee4a62119f4539bb72579c9037b385657424188b9828b8e94e3040efd347d3a,2025-04-29T19:45:07.223000
|
||||
@ -275254,7 +275255,7 @@ CVE-2024-52584,0,0,05cc6e3ff103831ab044abd88984264aa401bf8364effed0d59f3a0b0d807
|
||||
CVE-2024-52585,0,0,ec6dca20c0d1e2e11d329482fbb993991114f47c6c84853b2c9b256dbad974c0,2025-01-21T17:56:12.597000
|
||||
CVE-2024-52586,0,0,58f589286929e8882eacc7b729bb00d229d8ba9e3044967da953354df2f3103c,2024-12-09T19:15:13.707000
|
||||
CVE-2024-52587,0,0,093741097879cda7a1d072d6c7d9e1af9c512283049cdc93f827fcd9e8692ae7,2024-11-19T21:57:32.967000
|
||||
CVE-2024-52588,0,1,d93dca01502649fa529a9582eb9268586b55ad48fc3cef8b1968daa32b5aa797,2025-06-24T18:27:42.593000
|
||||
CVE-2024-52588,0,0,d93dca01502649fa529a9582eb9268586b55ad48fc3cef8b1968daa32b5aa797,2025-06-24T18:27:42.593000
|
||||
CVE-2024-52589,0,0,2ede3d8e14bcd4cd62c69ebdead0066730ee6e16ed6485066625c524f6b6f183,2024-12-19T20:15:07.337000
|
||||
CVE-2024-5259,0,0,119eff95bcd79b908feae8170e28a91f717570f021a6c1d47745ac47a3df8603,2024-11-21T09:47:17.697000
|
||||
CVE-2024-52590,0,0,1028a6f90f9b7a4321325d6ca4f957230806c5f96e57aa2c07369ac6099e9733,2024-12-18T20:15:23.527000
|
||||
@ -278059,8 +278060,9 @@ CVE-2024-56903,0,0,b897be5c821ce23ff62ebbc786466003154e6577f97fa83d87efcf2c721a7
|
||||
CVE-2024-56908,0,0,bbe0040508ad69151e90ab47c62a14618486e1b0815c01e094680be9e1e713d0,2025-03-17T19:15:24.050000
|
||||
CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000
|
||||
CVE-2024-56914,0,0,064f87427a8016e13b3b895075549080817f6e33abdd6a0f7fbfa426e2cf3bd7,2025-05-21T16:11:27.750000
|
||||
CVE-2024-56916,1,1,c7d5ad5b7117370120da35f0a0cc152f26bc7f7f2bbdc82dfdb000918ce4c7c1,2025-06-24T18:15:24.240000
|
||||
CVE-2024-56918,0,0,c33d49aa25d6f86a90d66125bb3fa4f8c1f3395bb86bb2857d38cb118def057f,2025-06-24T17:15:29.333000
|
||||
CVE-2024-56916,0,1,8d791153df4968d3eeeb69a9c48a710c5c1054b60793c3fffc13c78de96c4f0f,2025-06-24T20:15:24.643000
|
||||
CVE-2024-56917,1,1,22eee042f4d8b258955468fa7b726ed4840860e6e36c91120f332296bae2e2f7,2025-06-24T20:15:24.790000
|
||||
CVE-2024-56918,0,1,52ee2653b76f15ba0701a308965e0214f9660afd1f602bc274c062083d531183,2025-06-24T20:15:24.953000
|
||||
CVE-2024-5692,0,0,7a0e93b4132c5556301f236baef387bd61eb187dcc76da3b0d3022ff1bfb1690,2025-03-27T20:07:17.167000
|
||||
CVE-2024-56921,0,0,65e4ee21eb8e6911078997661eaf48bf52901c948266f74aa9bcc9e4df1037c6,2025-04-22T14:58:46.420000
|
||||
CVE-2024-56923,0,0,604a6006dae0a3ab9d362a51dab025175b10dba2548343a30a9a7501ead66a17,2025-05-28T20:41:45.083000
|
||||
@ -286680,7 +286682,7 @@ CVE-2025-23089,0,0,8538abc6f83acab58bdcb6440f1e22c462d137c99186166b0dcb3a7a24523
|
||||
CVE-2025-2309,0,0,a6ed30f6db928700252c14d866d4f1b24100fd592c5a071eddc42a141ff853da,2025-05-28T18:13:22.980000
|
||||
CVE-2025-23090,0,0,db1a04b33215738ef9ff89e7dd3243ce6839535b0728d9bb0d1927af1170accb,2025-02-11T00:15:29.570000
|
||||
CVE-2025-23091,0,0,52be052e818e282e438c6b1d873e178494e11252bb26056a7aa314d364167b02,2025-03-13T13:15:57.990000
|
||||
CVE-2025-23092,0,1,0c045677b8dbc244389820c8601bdf99d62a4994ef2b5a6938a477c021d5857a,2025-06-24T18:15:24.360000
|
||||
CVE-2025-23092,0,0,0c045677b8dbc244389820c8601bdf99d62a4994ef2b5a6938a477c021d5857a,2025-06-24T18:15:24.360000
|
||||
CVE-2025-23093,0,0,7320826aecf4e98ab5895586ea1e6e8575244a0f095c3e1b8e12bb0d362e3614,2025-02-12T15:15:18.597000
|
||||
CVE-2025-23094,0,0,7cea7e6e51afc006925b4e48de2308fe64516f9177080ff30f9a60f654ae9082,2025-02-11T22:15:30.597000
|
||||
CVE-2025-23095,0,0,0618822b2ded21e46ba3e1edbcfb4291064bcf636b99986ad46a652a3e8a3349,2025-06-11T19:07:40.863000
|
||||
@ -286845,7 +286847,7 @@ CVE-2025-23252,0,0,e12066f57f061e1c4b5e4699b8ee1a8a5a3daff9b46ccac2c27af7cd070a9
|
||||
CVE-2025-23253,0,0,f9de68ed984cf5e5c99edc68b635f242d07cc929f5185cb27e2c9dcd5ffcaea9,2025-04-23T14:08:13.383000
|
||||
CVE-2025-23254,0,0,8be2e21d58ec3fd7d92ec8e896dd51db7ae8bc6c069a21e838d199f9a2844aa9,2025-05-02T13:53:20.943000
|
||||
CVE-2025-2326,0,0,0ec0c28e6b995dc182a44a080592df606d562ca954869d7753960c79a6ff321c,2025-03-24T15:15:16.830000
|
||||
CVE-2025-23260,1,1,a5d9d0489a70d6468c825ab162de62afb168ba49891e415dfbb7364cd02af78f,2025-06-24T18:15:24.533000
|
||||
CVE-2025-23260,0,0,a5d9d0489a70d6468c825ab162de62afb168ba49891e415dfbb7364cd02af78f,2025-06-24T18:15:24.533000
|
||||
CVE-2025-23264,0,0,f9f55c6ab3f856021f3d59a62b68073d28f2e99a6865786c21bf57a825095213,2025-06-24T16:15:25.990000
|
||||
CVE-2025-23265,0,0,ead97c0f7d6d0ce35eef7c683ba86fe6d811e1fbadeed68b63d73fe74acfd606,2025-06-24T16:15:26.183000
|
||||
CVE-2025-2327,0,0,623acf4a26d9d0a627c39d6e7bd3767484bbbf51b695c128c65dda426894e878,2025-06-17T20:50:23.507000
|
||||
@ -288780,7 +288782,7 @@ CVE-2025-25635,0,0,beaccf1b133ae432bcedfcf1b43f20544c4e5ac5d5d33afd3d44ae08bcd87
|
||||
CVE-2025-2564,0,0,72f0725dc11f6141f688de953b6cd7fe92ceff4353be89860d243a851bc3375f,2025-04-17T20:22:16.240000
|
||||
CVE-2025-2565,0,0,d818b817202e54e9a5012e130505725e396db90172452c9fc8295f5a728db99c,2025-03-20T17:15:39.450000
|
||||
CVE-2025-25650,0,0,70ecf06880b4929e5c513a2918fa826b8f349cb5d8c6a838be654946b1198891,2025-03-19T19:15:45.910000
|
||||
CVE-2025-2566,1,1,3f576bf2a5e2a0c6696cdf65fe8ba15286831cea3bff17d831a264321aa21ca1,2025-06-24T19:15:23.520000
|
||||
CVE-2025-2566,0,0,3f576bf2a5e2a0c6696cdf65fe8ba15286831cea3bff17d831a264321aa21ca1,2025-06-24T19:15:23.520000
|
||||
CVE-2025-25662,0,0,c96e7c4ce4828b127cfecbe8c3b1c592fd63fab7f23366d035bb178815dbdd25,2025-05-07T17:56:07.840000
|
||||
CVE-2025-25663,0,0,5a746eea3634250332bacc9c924ac5e785f1cc29be7fb51e65232a0170bb6bbb,2025-03-17T15:10:12.850000
|
||||
CVE-2025-25664,0,0,1da9718d556db2a8964602e6e91c5c694bfb0281423a38648b821b59368a1401,2025-03-17T15:19:50.133000
|
||||
@ -291169,7 +291171,7 @@ CVE-2025-3027,0,0,f3696c958664e9365e1d42a21589288938608fca603179f411c899cdda3285
|
||||
CVE-2025-30279,0,0,d448c979e445565b7cd2b2a1e7afd76dcee33cb92f1fa7194b593febbd34ae4e,2025-06-09T12:15:47.880000
|
||||
CVE-2025-3028,0,0,b4904bcbef402a86d26a68f36c89c0f13bdfe9f0b82a73bc5473d3a54339d650,2025-04-07T13:31:38.947000
|
||||
CVE-2025-30280,0,0,9e649a9f23b93eda27c1f50fd0b3e90f4f0b81671b304e63c7efcfa3cfc7c59d,2025-06-10T16:15:37.550000
|
||||
CVE-2025-30281,0,1,4b4cdb14d496af6cd5efa9496e2a458ca3e848949633190591630f6d9c6160ed,2025-06-24T18:15:24.700000
|
||||
CVE-2025-30281,0,0,4b4cdb14d496af6cd5efa9496e2a458ca3e848949633190591630f6d9c6160ed,2025-06-24T18:15:24.700000
|
||||
CVE-2025-30282,0,0,b482189716a5f155cff967a6285e9586d359fd995d9f0381362b5ad6a67e05b8,2025-04-23T16:45:08.487000
|
||||
CVE-2025-30284,0,0,162db13ccae5f50e496d74519ee047a9e12c27af2ae44b041119fe67a728a1cc,2025-04-21T18:38:24.560000
|
||||
CVE-2025-30285,0,0,20337b4fe09e596eb652cc330ac7d6b03155a6c7a8739e1b757f89718c1d557c,2025-04-21T18:38:08.320000
|
||||
@ -293016,7 +293018,7 @@ CVE-2025-32439,0,0,bc2ffe14216b9cfe29b31e6fc5be13f4870b9bbc8f43f42b1dd5fa85872b2
|
||||
CVE-2025-3244,0,0,83385a875e2316aa8147e21cd040f4a5fd2ca8ba35219f944564cb0a256174d9,2025-05-14T21:07:17.220000
|
||||
CVE-2025-32440,0,0,004c1f988ec42bc68ac22b8510f67d6a4fd5129ce758999e8bed844a2d628005,2025-05-28T15:01:30.720000
|
||||
CVE-2025-32441,0,0,12603f2d6ebdb3d224734288a6ec55dd99e6ec0404f09faa29d26745252d6321,2025-06-17T19:48:03.580000
|
||||
CVE-2025-32442,0,1,a19bc9b3bfdbb170e2a54c06398417632ac83866aa186bb6cdfcbcdd2418ad18,2025-06-24T18:14:31.943000
|
||||
CVE-2025-32442,0,0,a19bc9b3bfdbb170e2a54c06398417632ac83866aa186bb6cdfcbcdd2418ad18,2025-06-24T18:14:31.943000
|
||||
CVE-2025-32444,0,0,288296e03a307a0b00958513c50a8127cb3324308366d3af8facb6f4548c84d7,2025-05-28T19:12:58.377000
|
||||
CVE-2025-32445,0,0,1b5ba881d2838c8e1a17201ae0d99d597a5e3f65b98d8fa06e156c1abb87955d,2025-04-16T13:25:59.640000
|
||||
CVE-2025-3245,0,0,34513d96925346b7609d27ec32e42dfc8926b8b7247f00b351b24b6c6848fab4,2025-04-23T14:51:07.013000
|
||||
@ -295604,9 +295606,9 @@ CVE-2025-4449,0,0,a4957afce4f7142f6de98a930c08f3af72a27d35a255f875466a14d7968c01
|
||||
CVE-2025-4450,0,0,3a234a45502595c5094cecb641169b3c6bb9c5a2703faedd8d7ac4d76fabf6c2,2025-05-13T18:28:00.750000
|
||||
CVE-2025-4451,0,0,eb5e97d618832a986e1251a65937eaefe5aeac1b9186d7c4d7161ef8e37a07a8,2025-05-13T18:27:53.877000
|
||||
CVE-2025-4452,0,0,a8fae799b613cae7d9f6b10e972c55aeeb7cd837573978501121983f7c8e677a,2025-05-13T18:27:48.207000
|
||||
CVE-2025-44528,0,1,ea0c1c5551ac38728cf8cd8f73269c888541cf6b10a2720199171ccb78f13119,2025-06-24T18:15:24.873000
|
||||
CVE-2025-44528,0,0,ea0c1c5551ac38728cf8cd8f73269c888541cf6b10a2720199171ccb78f13119,2025-06-24T18:15:24.873000
|
||||
CVE-2025-4453,0,0,17e7f2032ab18ade514049189b71ae429256843d9863fdf6f0e71917f98a2587,2025-05-13T18:27:42.267000
|
||||
CVE-2025-44531,0,0,cf9337ae957e30ce1437a8284880ed810d5383665a9fe576a8b549513525bc97,2025-06-24T16:15:27.703000
|
||||
CVE-2025-44531,0,1,1d4bca660c9e3a33023ad4a769fdfad7e0245a0495c8c3fd6da7d6d1884c016c,2025-06-24T20:15:25.100000
|
||||
CVE-2025-4454,0,0,0824340d2335f0221b12fbeabb29b5c209c67a1c502e8896c89c5f037561d2e0,2025-05-13T18:27:36.160000
|
||||
CVE-2025-4455,0,0,05a1a98b2065f53be9218ed1130540464e36b521788d55ad2e6b4dc77e4298ca,2025-05-12T17:32:52.810000
|
||||
CVE-2025-4456,0,0,e7ef7ea8d16290e794f525db2ea37bc8abc1615ee5fb21b539df1843139a93b5,2025-05-12T17:32:52.810000
|
||||
@ -295790,7 +295792,7 @@ CVE-2025-4547,0,0,5a9f97c59a5517a42eb37b2bfaeb218892d8ce2e6447168e1978702b983649
|
||||
CVE-2025-45471,0,0,175cebfb698d65801503c809b3aa892182068d5ca8c7cb75b47dca0205a19e21,2025-05-23T15:55:02.040000
|
||||
CVE-2025-45472,0,0,2637a833bc8f30b44e037d16794888343f063d186f0716a0b1631b9011f38122,2025-05-23T16:15:25.777000
|
||||
CVE-2025-45474,0,0,5a86947a5dcb30409703950db611fb972ad2af49b62606364ea6d0524ca2d928,2025-06-19T00:45:23.457000
|
||||
CVE-2025-45475,0,1,7400d330caefeb635586e4a2df7792360a8bced766ed5816725e62dba811d485,2025-06-24T18:42:50.893000
|
||||
CVE-2025-45475,0,0,7400d330caefeb635586e4a2df7792360a8bced766ed5816725e62dba811d485,2025-06-24T18:42:50.893000
|
||||
CVE-2025-4548,0,0,a8fe2cea464a0b35dbac9350217055ae490f25b77738ddb03311a9902dfffcb3,2025-05-13T18:55:54.360000
|
||||
CVE-2025-45487,0,0,ffb60bfe346afcb15249da2528ccd12c910ff9915205c63e38aaf38509c65e39,2025-05-13T20:19:05.490000
|
||||
CVE-2025-45488,0,0,a4a677b217c9c59760c1fc85e8b2f493a1b1fd5df028087d0ead93cd4bfeadf3,2025-05-13T20:19:15.500000
|
||||
@ -295887,9 +295889,9 @@ CVE-2025-45864,0,0,b32f79c80f948a5502c692222ba63db7db0d85fc0944e6f9a68e63f94b3a1
|
||||
CVE-2025-45865,0,0,367062564ab2fabd14817d58b3e7095878e7c26afaa0eb1dd77e8dfb0a65054e,2025-05-15T18:37:31.917000
|
||||
CVE-2025-45866,0,0,48c16ba2c1a450558a2d650800240d515297efe6c8338a7502e000a11c7cf020,2025-06-17T19:39:56.640000
|
||||
CVE-2025-45867,0,0,a78de81cad59bbc316e2ff4eacf13da0ca81d5efbf89eb838fbfcc576cba1eb1,2025-06-17T19:39:47.240000
|
||||
CVE-2025-45878,0,0,6b615553fc01027582e83444469fbebd12926b528a6fd0f4487cffdba07fc964,2025-06-19T01:16:08.927000
|
||||
CVE-2025-45878,0,1,76479685a387cf61a43f7a306424fbb1613728900c34c34b117627476b791297,2025-06-24T20:15:25.250000
|
||||
CVE-2025-45879,0,0,a523ea1be4f66a907ee86b9ebd07662f0a00641a69e4600b6fb7654b16a506de,2025-06-19T01:17:35.180000
|
||||
CVE-2025-45880,0,0,d6009e96847d0cc665e67c44e11ad18e8a6fe1f096c5d31794e5f5262a109ea4,2025-06-20T11:16:37.750000
|
||||
CVE-2025-45880,0,1,3705fe6fc368f2fbd94d197728c7493a9d3bdf0bf25c0a8940fe6c0fa1b87358,2025-06-24T20:15:25.410000
|
||||
CVE-2025-45885,0,0,79234899966b4c8a321aa6153cf77a765f29e557be9d26ad86dc78b3a7557cf5,2025-05-28T13:40:22.817000
|
||||
CVE-2025-45887,0,0,fb1a15240343f864311f44360980a2f79927e76ee0105844e8c76acb00550c58,2025-06-12T16:39:34.730000
|
||||
CVE-2025-4589,0,0,bb26d22fcf596d77e370296c8ae93489013c99f636d3a8cff9546409ae0197a5,2025-05-16T14:43:26.160000
|
||||
@ -296191,7 +296193,7 @@ CVE-2025-46566,0,0,24d113192be0c68059a74a8b38378d8007a4303882cf168243cb6e7bc5606
|
||||
CVE-2025-46567,0,0,bc82994034cac9d270d67e3ad4b581e4a047083d44f54435e8936072aa047d70,2025-06-17T14:19:39.290000
|
||||
CVE-2025-46568,0,0,74c299788a3c6fb1d3c1e3efa08198b5d781f2674e99fc634be9d4c153a96da1,2025-06-17T14:19:19.067000
|
||||
CVE-2025-46569,0,0,596192ea2f2bcb27dcfadc2be8975c11484ebb4929879c1b0161098a09bd2300,2025-05-02T13:52:51.693000
|
||||
CVE-2025-46570,0,1,3a7d71dfa03ea1ee6cc52c35f9160ccde1edfd0230daf603f78c6e43fb159322,2025-06-24T18:25:31.883000
|
||||
CVE-2025-46570,0,0,3a7d71dfa03ea1ee6cc52c35f9160ccde1edfd0230daf603f78c6e43fb159322,2025-06-24T18:25:31.883000
|
||||
CVE-2025-46571,0,0,ec40c548e59ec2be75a2b0d33168e02e13ceee62e8da0fa2f749740447b55702,2025-06-17T20:18:30.580000
|
||||
CVE-2025-46572,0,0,28dde8d86fa55aa1ea84117c1d0345fbf475350364f56b6ef37599b1d624e547,2025-05-07T17:15:58.323000
|
||||
CVE-2025-46573,0,0,ca3251581cb3d63fce0f3c6374f79f818d84db51c7e8d6a6353bbff633bffad2,2025-05-07T16:15:22.590000
|
||||
@ -296274,7 +296276,7 @@ CVE-2025-46719,0,0,b25887997950d7d3ab39998b5b94bb3c024854b8ada00a78d9ecb1ca2e7fd
|
||||
CVE-2025-4672,0,0,770c887d10dfc09d1e63fabe3c5364c54cf353a1948a47be8491ff905549003b,2025-06-02T17:32:17.397000
|
||||
CVE-2025-46720,0,0,4c7236595d2f87b0b5d063c4e69a2cbdebfbdb7c2550f3a068081936f8a24e34,2025-05-05T20:54:19.760000
|
||||
CVE-2025-46721,0,0,128da113ea8f0dd50abb34a02b6e5908442d1b77af5bac7d0b34ba51b6fb6537,2025-06-23T14:55:07.967000
|
||||
CVE-2025-46722,0,1,058312ac701115def56c84c4304eb04943312378d61c6dc94bcd5a66046d7965,2025-06-24T18:12:30.023000
|
||||
CVE-2025-46722,0,0,058312ac701115def56c84c4304eb04943312378d61c6dc94bcd5a66046d7965,2025-06-24T18:12:30.023000
|
||||
CVE-2025-46723,0,0,23909492a9ee443fd9ae3060d2ebc8db94328dcc9cf17248e4a0a9a7d6a6e953,2025-05-05T20:54:19.760000
|
||||
CVE-2025-46724,0,0,e9c56e50a6ab4789521e42f1b57dca0731674d1f66af8a8445523cd7498bdd5d,2025-06-17T14:11:48.377000
|
||||
CVE-2025-46725,0,0,8e8c8e4075573d4fde69baf7d78b34a0d5c2e139e0809a70649a8b9ab0bae8da,2025-05-21T20:24:58.133000
|
||||
@ -296708,7 +296710,7 @@ CVE-2025-47423,0,0,6836a6f986120cb2e164a5663178ae0fd396b9a71521a1bcfcb70d3454021
|
||||
CVE-2025-47424,0,0,71d29b752922eab2f18ed784453e2b935bfb9c4385e21b85c68c2b1d9613d539,2025-05-12T17:32:32.760000
|
||||
CVE-2025-4743,0,0,f4e1132d4a1d65e64cd42fcffb62ca910ad40af2c0b6ee93feb69f0c1fc24629,2025-05-28T14:27:10.833000
|
||||
CVE-2025-47436,0,0,237fab5236a29a936ddec4296e97c247520a483bdac2818cb262b4ed8ed3b03e,2025-05-16T14:43:56.797000
|
||||
CVE-2025-47438,0,0,e67b62a7da948f4156f9f04b4d7adfa7c627a2f7ae4015919bf6a741e6305baf,2025-05-23T15:54:42.643000
|
||||
CVE-2025-47438,0,1,fe275acc338b569a2d62ee32dc5c16ecb5ee001c618cb63ef5ed13d7f9eff81b,2025-06-24T20:31:59.710000
|
||||
CVE-2025-47439,0,0,9e2590af3e39eaaf4df056815f620875eb955b8d41acc282710b61d3864cc002,2025-05-08T14:39:18.800000
|
||||
CVE-2025-4744,0,0,8ac8fc8161c3a14fee7dbc44d1d0ef695513c904757d01a3e069448c42b24428,2025-05-28T14:28:24.427000
|
||||
CVE-2025-47440,0,0,e06a89f27d23fce3bb6f10f753f41f0ee18bbdfc4aa35328ce00fda4fa13fd7d,2025-05-08T14:39:18.800000
|
||||
@ -297145,7 +297147,7 @@ CVE-2025-48017,0,0,9a34c5624691c4b31b9da6fd15ca0fc4e18270c4bd854af7ea9f4320e0575
|
||||
CVE-2025-48018,0,0,7761e8e3612ee9775c346d4dd8ae962e705b15ee05a70aaa71be1ec26a1b2484,2025-05-21T20:24:58.133000
|
||||
CVE-2025-4802,0,0,9b6a9418451eb684dbaf46149299384f3fd784fd4730d7af0d79543a6096d43d,2025-06-17T14:09:23.137000
|
||||
CVE-2025-48024,0,0,ac746fb497cccde7b671eda6326e72522381250e5b7c54697735594cf6f8aedc,2025-05-16T14:43:26.160000
|
||||
CVE-2025-48026,0,1,f0862038b825000099e62f2b540bf86c41bd4e58bbca3a19af6309b435a4871f,2025-06-24T18:15:25.070000
|
||||
CVE-2025-48026,0,0,f0862038b825000099e62f2b540bf86c41bd4e58bbca3a19af6309b435a4871f,2025-06-24T18:15:25.070000
|
||||
CVE-2025-48027,0,0,1553e3de579c54b8c12347894e7e439de00450ca8ef6f8ae1617a684639bd852,2025-05-16T14:43:26.160000
|
||||
CVE-2025-4803,0,0,73c30a61e3c897c21c431bf31e162f151c5503d3c44c21d44160de67be34a09b,2025-05-21T20:24:58.133000
|
||||
CVE-2025-4804,0,0,f8b39e70bd38762aab6b504fb7be417981a55297f3e6e74902fda434f25564c4,2025-05-19T13:35:20.460000
|
||||
@ -297285,7 +297287,7 @@ CVE-2025-4827,0,0,d47a71d05b44889e1baa543d22084cfefaa52c46e4e9470b39e886fbf66c5c
|
||||
CVE-2025-48270,0,0,133fff98e194972f33f1094510d8ec4d32c15dd7e4436e5da8670dbbe1e924ad,2025-05-21T20:25:33.823000
|
||||
CVE-2025-48271,0,0,0d70c386c119c388d6a35958b80bfcca32a964cf1daaeb05cdf206898628a3db,2025-05-23T15:54:42.643000
|
||||
CVE-2025-48272,0,0,ef1d1975800386c78d6ca4b6bc18290441d554a80fc7cd7a85f2b4b3a85069b3,2025-06-17T14:10:18.237000
|
||||
CVE-2025-48273,0,0,67cd492822cbe488d3e17d3a0b555d0c75e1160c730171b1f2bc8ec2a9e3702d,2025-05-23T15:54:42.643000
|
||||
CVE-2025-48273,0,1,743f8589336bd54dbc90368ddc5d50b78d40da1d0fdb94b5e7cdd1102e3461a3,2025-06-24T20:30:34.620000
|
||||
CVE-2025-48274,0,0,ea6932f3e35526b4983e326c0e31d340d7e9481b7030caff8a4c4fae3870e8da,2025-06-17T20:50:23.507000
|
||||
CVE-2025-48275,0,0,06271179e2a87da02697af4b0abc688b6bd5dc4ddeaf28630e532e9232bd6560,2025-05-23T15:54:42.643000
|
||||
CVE-2025-48276,0,0,0e141f1bba6aa60f05739d7c11f150d7139abee4704e3e4b24e80ad758f6c866,2025-05-21T20:25:33.823000
|
||||
@ -297450,7 +297452,7 @@ CVE-2025-48742,0,0,5f33c781ef30502ef2e246627292bc67d88c79205c0f59dcb70501ff4a68f
|
||||
CVE-2025-48743,0,0,c91acb6150f07a43c974b698b48df19455694c9a8c5f37e0bbd5aa9b807fb2bc,2025-06-09T18:50:50.927000
|
||||
CVE-2025-48744,0,0,a039740c56d4e93180f7ac5a496864b9f89957753f0bd173790011a4f09f8955,2025-06-09T18:50:58.620000
|
||||
CVE-2025-48745,0,0,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000
|
||||
CVE-2025-48746,0,1,c0059252d48b7f3ff2e4968ec9339b0ef7a83be4ec062ed225f4e6bed94a5485,2025-06-24T18:40:18.270000
|
||||
CVE-2025-48746,0,0,c0059252d48b7f3ff2e4968ec9339b0ef7a83be4ec062ed225f4e6bed94a5485,2025-06-24T18:40:18.270000
|
||||
CVE-2025-48747,0,0,77f2b3f312e05dae0fd49a4fbf0de33587f3dcda8e8123589893c43a0bb874a3,2025-06-19T00:01:01.873000
|
||||
CVE-2025-48748,0,0,805c8ddf5f6d5cc89225c3c520f65d04d0cefe8e51baabf5c77788a905f60841,2025-06-23T14:37:52.580000
|
||||
CVE-2025-48749,0,0,1782601449fdbad7e128b503fdc88bf73801639c356e6033cd52a3b78e0cb26f,2025-06-18T23:59:44.600000
|
||||
@ -297582,7 +297584,7 @@ CVE-2025-48962,0,0,4b2d64282106eed58f9e4647aa4bdcfb03945a2468e53d084f7081033bf14
|
||||
CVE-2025-4897,0,0,104730cc5ad0680860a774881c7ad06896ad7afe2bb00c017480a43cf79011cd,2025-05-27T16:30:05.410000
|
||||
CVE-2025-48976,0,0,3699ed4335c5c4e0111d1b3001cdfd7d0fb9ec7d8a6822aad5fb5532328dd5c2,2025-06-17T20:50:23.507000
|
||||
CVE-2025-4898,0,0,088de021e18707e0dc4ec8499500601b39900fc456f0a7d4c0f7a0b50fbac254,2025-05-21T19:37:41.533000
|
||||
CVE-2025-48988,0,1,89f3346fcc4cd557a41994a11d0d1a4d79127913ab475205777ebe370f1ad8d6,2025-06-24T19:49:04.033000
|
||||
CVE-2025-48988,0,0,89f3346fcc4cd557a41994a11d0d1a4d79127913ab475205777ebe370f1ad8d6,2025-06-24T19:49:04.033000
|
||||
CVE-2025-4899,0,0,384aad67823f1c19c564c5975182391c80467536acba8235a635dfd93a5393e3,2025-05-21T19:37:31.280000
|
||||
CVE-2025-48990,0,0,35250e6aeab8f33cddd6a2463ca29c89c0b5491c46e9371235f8d9552555aa3b,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48992,0,0,6b15fffcdbf47d08f32eb69350dfd721fbd263466b12b44b59139ec83ba254ec,2025-06-17T20:50:23.507000
|
||||
@ -297656,7 +297658,7 @@ CVE-2025-49142,0,0,41188906e2e357ed545217831b9fe6ff5a3bf2332267c22eb7e3625fae9f5
|
||||
CVE-2025-49143,0,0,f4eeb95d1c1d44e21a5fc96f8952099f90b0864e5b98bced44a49fab091919bb,2025-06-12T16:06:39.330000
|
||||
CVE-2025-49144,0,0,d6baaf8446ddc27e2900045d55963dde986363ee0e21198d87807207a0a091ed,2025-06-23T20:16:21.633000
|
||||
CVE-2025-49146,0,0,a352cc011ba361436b876cbd0ba26f98777672335f155f665e464243f2d6320b,2025-06-12T16:06:20.180000
|
||||
CVE-2025-49147,1,1,a9684e104a7314ca6d799206a4c275f0f5247256f8b108f80b0d2067225733b1,2025-06-24T18:15:25.247000
|
||||
CVE-2025-49147,0,0,a9684e104a7314ca6d799206a4c275f0f5247256f8b108f80b0d2067225733b1,2025-06-24T18:15:25.247000
|
||||
CVE-2025-49148,0,0,c3b7fb08d13ff41d0698bee1d7c392e956316a8e5553d1877a2eed546fcf4c94,2025-06-12T16:06:20.180000
|
||||
CVE-2025-49149,0,0,798bf70c7539e563311e2175a9634dcea6df9b43d0cf6e2ed916f772705b4b0f,2025-06-18T13:46:52.973000
|
||||
CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000
|
||||
@ -297948,6 +297950,9 @@ CVE-2025-49848,0,0,b95bb6de409da27e91c496fa7bcb82f15f67ace27f6d4466f1b54c3146170
|
||||
CVE-2025-49849,0,0,8297db97c7fc15aa30d3cd9f82603f74eb8025767596630d8a5943b91e5623f1,2025-06-17T20:50:23.507000
|
||||
CVE-2025-4985,0,0,88151f8f37213547b95261cc34f75717fde2a8ef982c36b2d93a8904176e3178,2025-05-30T16:31:03.107000
|
||||
CVE-2025-49850,0,0,12adad2ef0b8f2b8f84392dc49cc67ba3aaa7a82a61194bcc9f25e9e29ca770a,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49851,1,1,cd1671e74734e9433d8d1c1a7dfdb2c05032c5b1c344b8327bef7bad6553931c,2025-06-24T20:15:25.560000
|
||||
CVE-2025-49852,1,1,d57906ef4976a1da27ed3d5ffc91464b0d583b4999c2b0d0db9e8587c3d7fee1,2025-06-24T20:15:25.727000
|
||||
CVE-2025-49853,1,1,f727bc26c0686bd0314d683130359aa6f9f19c5d43e7fa532349231debbe12d4,2025-06-24T20:15:25.873000
|
||||
CVE-2025-49854,0,0,f5d12af17846f0fca9e71d9d31730f998dce4ab78a93a5d3453eac74f8fffd56,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49855,0,0,12a30fead2c10e8a1f16941c2d9bd96761a3083b3c6087644c0beee9652251c1,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49856,0,0,65b96385792b64182569a68dca6312790744d597250b91f428a4357b1b5a6881,2025-06-17T20:50:23.507000
|
||||
@ -298085,7 +298090,7 @@ CVE-2025-5020,0,0,a009d51287904279a69fbc7b7d45e7044fc45e21284eb97bd084f038009245
|
||||
CVE-2025-50200,0,0,b04b8a83061873d5a6a0dfbc2d26e36b23b8e421c71e6c73bb812e0e2b22ba3b,2025-06-23T20:16:59.783000
|
||||
CVE-2025-50201,0,0,e397412bd6740556a32b6ef41171e688861c9a78331735a48e0e16a19730511a,2025-06-23T20:16:59.783000
|
||||
CVE-2025-50202,0,0,c82284387579a4d5287081c79bce5f56bb74234016b730f3d53b62b5739eec46,2025-06-18T13:46:52.973000
|
||||
CVE-2025-50213,0,1,20bb0c394425212b43c09eb07cfa4df290f56fca6a1a1af3d022687454f82e45,2025-06-24T18:15:25.427000
|
||||
CVE-2025-50213,0,0,20bb0c394425212b43c09eb07cfa4df290f56fca6a1a1af3d022687454f82e45,2025-06-24T18:15:25.427000
|
||||
CVE-2025-5024,0,0,ccdd8a7db520a87487d39e567caff85e7e094c68165b88263d5456db37c53d13,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5025,0,0,d8851777e61365e1aa05e5e547ad31f1c257710ee925f9d10fb7d3665c7bb24a,2025-05-30T17:15:30.200000
|
||||
CVE-2025-5026,0,0,d9b074ad09f171f2cc858535f05c167fb3f2b46a82934574183f725586b2f8f2,2025-06-07T23:15:21.897000
|
||||
@ -298095,8 +298100,8 @@ CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0
|
||||
CVE-2025-5032,0,0,4156143fef9ccb288081dade2120fec7f51a54986c4f66b96dc31d6794fced0f,2025-05-28T14:12:07.037000
|
||||
CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a45,2025-06-20T16:15:38.947000
|
||||
CVE-2025-5034,0,0,32c24ba6ccd75156344e37a326a475bfa55837c0e754ff953557111ff3de4bc2,2025-06-23T20:16:21.633000
|
||||
CVE-2025-50348,0,1,5dcc135486f0213433ed5f7b9f4c6109dd3d9fe6d3d0bdb0c3c8b785caf7d50a,2025-06-24T18:15:25.610000
|
||||
CVE-2025-50349,0,1,b49b29406173d64e5335448cb0b74a4731d700428c9c3e2789ccd64489f70a7b,2025-06-24T18:15:25.830000
|
||||
CVE-2025-50348,0,0,5dcc135486f0213433ed5f7b9f4c6109dd3d9fe6d3d0bdb0c3c8b785caf7d50a,2025-06-24T18:15:25.610000
|
||||
CVE-2025-50349,0,0,b49b29406173d64e5335448cb0b74a4731d700428c9c3e2789ccd64489f70a7b,2025-06-24T18:15:25.830000
|
||||
CVE-2025-5036,0,0,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f863e,2025-06-02T18:15:24.783000
|
||||
CVE-2025-5049,0,0,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000
|
||||
CVE-2025-5050,0,0,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000
|
||||
@ -298116,9 +298121,9 @@ CVE-2025-5065,0,0,8fc53b66fe42da4959811ef54b22b91af2bd35c9f4f954731cade0848a818f
|
||||
CVE-2025-5066,0,0,c2e1df9fe6cae5990ac135a3976d91b02429d110b23d2797a3b2dababf03dd2d,2025-05-29T15:50:51.310000
|
||||
CVE-2025-5067,0,0,cf2723dbc4b2f797991ebafc1c2cb069497cee2d74a6a84ebec9dcde1e0dd29e,2025-05-29T15:50:43.240000
|
||||
CVE-2025-5068,0,0,743f6f8e9f7972849bbf135b58a69c40f5a6f921a1bb6da952423dea4534ee5a,2025-06-05T14:11:10.430000
|
||||
CVE-2025-50693,0,1,77d7a264f395ecd37be4362dfcef333ec41f63a55d0d036dd8ad801ed5481b00,2025-06-24T18:15:26.080000
|
||||
CVE-2025-50695,0,1,24255541539d4722d757b5efbae2f94dae559ed0d9e03dfa6a18bfccedc3bbac,2025-06-24T18:15:26.250000
|
||||
CVE-2025-50699,0,1,d03883afb531a0407dd93c6ae3cd8abd1203ef4972537744ebffd7bbc8a9a808,2025-06-24T18:15:26.433000
|
||||
CVE-2025-50693,0,0,77d7a264f395ecd37be4362dfcef333ec41f63a55d0d036dd8ad801ed5481b00,2025-06-24T18:15:26.080000
|
||||
CVE-2025-50695,0,0,24255541539d4722d757b5efbae2f94dae559ed0d9e03dfa6a18bfccedc3bbac,2025-06-24T18:15:26.250000
|
||||
CVE-2025-50699,0,0,d03883afb531a0407dd93c6ae3cd8abd1203ef4972537744ebffd7bbc8a9a808,2025-06-24T18:15:26.433000
|
||||
CVE-2025-5071,0,0,884ba5d773bfa631189c2fa39c9690b3ec846f53f569c43eb315d4166f9f7924,2025-06-23T20:16:59.783000
|
||||
CVE-2025-5073,0,0,a1230535d583b5f466b5fe2615cca31afcba55333f600b324f190ec047a41d18,2025-06-05T20:13:49.707000
|
||||
CVE-2025-5074,0,0,b32e6a163eb96eec8f69e51ca7a85c7da766b8b9d224e7b4f2f300a52a5b9bc3,2025-06-05T20:14:07.020000
|
||||
@ -298131,7 +298136,7 @@ CVE-2025-5080,0,0,5ca4d3a0576d52c7ccf6fb54daeff4d47265f015764c5af1447369359c7bc1
|
||||
CVE-2025-5081,0,0,56e144a5135781dc7a75ef9199aeb5fe24273a7eabc4acb8988f02e0c511fd61,2025-05-28T01:49:27.430000
|
||||
CVE-2025-5082,0,0,654b6f5ca85bdee04f191b4415361841f39b64a4d62ac7e373566ed9502c800a,2025-05-28T15:01:30.720000
|
||||
CVE-2025-5086,0,0,a6cd7e037b880807c2087a0cc62e18cec32dfcc1b05281e63e13ff759a08d643,2025-06-04T14:54:53.980000
|
||||
CVE-2025-5087,1,1,07ad39aeba45900f8d7e9d1a34e5ab24787db24ec1c69e0683b71d0b11ef6f8f,2025-06-24T19:15:23.757000
|
||||
CVE-2025-5087,0,0,07ad39aeba45900f8d7e9d1a34e5ab24787db24ec1c69e0683b71d0b11ef6f8f,2025-06-24T19:15:23.757000
|
||||
CVE-2025-5096,0,0,42fe716f1efce968dc8e29663c380993b2461be601464bb005e7e57e1c939443,2025-05-23T15:54:42.643000
|
||||
CVE-2025-5097,0,0,56796bb8120929c8a6a0858cf0e395b320ecbafdfb6f27c42e47f8367c9df40c,2025-06-07T23:15:22
|
||||
CVE-2025-5098,0,0,e792975c992e79d3f869380d6027059665b6a277fad36b72dc800d8cb0d75190,2025-05-23T16:15:27.730000
|
||||
@ -298170,7 +298175,7 @@ CVE-2025-5136,0,0,6b76178b393ce786e02c90a2baf18e1605a6560667c6c5172f14e227aef611
|
||||
CVE-2025-5137,0,0,a461b4cd382da5c206010b8729faf9840aa41b3d9e8c8cf8ba7880897f06f378,2025-06-10T19:33:16.710000
|
||||
CVE-2025-5138,0,0,93cb713787e8030d0af7953a6d4f76509c75980d651a759b2f51250e8b4fdca6,2025-06-20T05:15:29.257000
|
||||
CVE-2025-51381,0,0,90017ba2f2fd86cff636ae17c3c22e5ea0f00724f257397ca0c300a57129132c,2025-06-18T13:46:52.973000
|
||||
CVE-2025-5139,0,0,478cd92def8402421385452923781dbb1e2d7c36d24453f72439415b1b27838f,2025-06-11T14:15:37.437000
|
||||
CVE-2025-5139,0,1,9584b8867ef5df5f63b980a8e2a9b849712a42f018080e8307dd4e64a561de8e,2025-06-24T20:29:44.870000
|
||||
CVE-2025-5140,0,0,7eb8851e623e7595aeb04f88f3b17c4f06b9055459a202a999065089d465d23f,2025-05-28T14:58:52.920000
|
||||
CVE-2025-5141,0,0,c15f6868f26f87e39a3f43de04f54fd301d39ee102b85bad5264f415113350ff,2025-06-17T20:50:23.507000
|
||||
CVE-2025-5142,0,0,cfb77a196d5255a5a436db83dff520eaaa1d53cc832ec32bce9b0d13a0b8d87b,2025-06-04T18:29:34.470000
|
||||
@ -298279,6 +298284,7 @@ CVE-2025-5246,0,0,58006bd67e3ca573529b2f3e87b16b1c40180151481747e10351ab9236833e
|
||||
CVE-2025-52464,0,0,78f6019e85d48ab55c32d91e272573030421c73ef856e07219b800e33247830e,2025-06-23T20:16:59.783000
|
||||
CVE-2025-52467,0,0,16105c9074c96ad94abfdf299814ac8afdc45b40f5844eda614417a0d3d4ca0b,2025-06-23T20:16:59.783000
|
||||
CVE-2025-5247,0,0,54e3a381cfd9dfdb05827b9f71ff8bbd85014209bf716148a0d5df41e284d42b,2025-05-28T15:01:30.720000
|
||||
CVE-2025-52471,1,1,0c62d382ed0af363c08f042f130801cb12a4f00ca1898ecf3fe6d67ae2476ac6,2025-06-24T20:15:26.033000
|
||||
CVE-2025-52474,0,0,85659b730b44219986935e49453dd6cf44bae5c711fd564545190739032f0da6,2025-06-23T20:16:59.783000
|
||||
CVE-2025-5248,0,0,cb74e13c3a661382a173d2171f53e905ac7962a17d411318369a81c1a4c9d649,2025-06-10T15:12:22.573000
|
||||
CVE-2025-52484,0,0,ec9ef999d2f72c8ffe8c4f7a55a34b60e694dfe44a26c58275639cad0c1b5155,2025-06-23T20:16:21.633000
|
||||
@ -298304,6 +298310,8 @@ CVE-2025-52566,0,0,a71a61d8e0acfb81b85cd8ba79f5e666a1dec736c73eb607b3678639cea84
|
||||
CVE-2025-52568,0,0,c5c4449512757bdbf87c08ff7aa03ea210585f8118654ad489df4eddb6c078e6,2025-06-24T04:15:49.693000
|
||||
CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000
|
||||
CVE-2025-52570,0,0,b69e7827dc71b47cbfc70d06c560ede1e01f1eed518d271e063fa0ddf9df6ff5,2025-06-24T04:15:50.360000
|
||||
CVE-2025-52571,1,1,93605af77865e4b4bbd8aa8df37b6227ed19cbe7c36e4563dfbf22f7ad6141df,2025-06-24T20:15:26.213000
|
||||
CVE-2025-52572,1,1,c9098d5ca2a634c2c4a58c403cfc6222ba614b823936e2401333651171589a19,2025-06-24T21:15:25.463000
|
||||
CVE-2025-52574,0,0,b834c56f84ab539ad46a50792bcb4b20f0358336a46771bcdc0160c6c5c64451,2025-06-24T03:15:34.797000
|
||||
CVE-2025-5258,0,0,fb6007864f0f198afc07f9e5f2cd9992c3bc7deee34ac7dac8830ce62da80bc3,2025-06-24T08:15:24.397000
|
||||
CVE-2025-5259,0,0,762eb0e82b940f038c9de9747260da22e83abc89d044ade4d08f1060ed5d681a,2025-05-30T16:31:03.107000
|
||||
@ -298361,6 +298369,11 @@ CVE-2025-52877,0,0,c1d6e2b07ce02bba590986d3df9c7581e2aa81b981d3f15dad43eb041681d
|
||||
CVE-2025-52878,0,0,e55775b8d24e3fed0ad2e0acdd563793038173ab54bc92391fdb84ab91ed384a,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52879,0,0,36a19ea63eabffb0ae9b5df676b3f85180b31571a550ff8a02ef30a65c0880dd,2025-06-24T15:15:25.180000
|
||||
CVE-2025-5288,0,0,5b20c7a865ed486d932e1f5165bbcfd30ae2f04bc0acfb20d9396799c2c655a3,2025-06-16T12:32:18.840000
|
||||
CVE-2025-52880,1,1,9cb07f316e3d88e0df580ddbed7ea9b43e79f625bd4ca243674ed28fb6c24809,2025-06-24T20:15:26.373000
|
||||
CVE-2025-52882,1,1,1202797e512191e9de7b995f3a96465f7bfc2ed3174a803e0c7dd48572c30229,2025-06-24T20:15:26.543000
|
||||
CVE-2025-52883,1,1,94a59b16d2725ff940e9d9c5d66af8696ae28208bd1cc6d6422de88432398bcc,2025-06-24T21:15:26.030000
|
||||
CVE-2025-52884,1,1,111efc59963d9cf24b8cfd776de05a966fe0af3c7a58d02e676305ff800577c2,2025-06-24T21:15:26.207000
|
||||
CVE-2025-52888,1,1,3d1af33939cf7d42fdad330956d26c92022bdd0439ccab86c4344f860a5a72bc,2025-06-24T20:15:26.700000
|
||||
CVE-2025-5289,0,0,7c7a7fd94b9e27905a1cadcd118b0b2af6a175d504b657fe651e510f41cabc00,2025-06-23T20:16:21.633000
|
||||
CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5291,0,0,30fc605f4380fb7e9cd3dc4c3c29792847dcfc90b0ea5fa3ca9a29d145a853dc,2025-06-17T20:50:23.507000
|
||||
@ -298396,9 +298409,10 @@ CVE-2025-52979,0,0,52505f03c11370107b014986dc0342ab4c8462260c5f831736e7ef7e18fd3
|
||||
CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000
|
||||
CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000
|
||||
CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a1594,2025-06-18T05:15:50.287000
|
||||
CVE-2025-53021,1,1,f00c7a7e87b168adf26db9622068d05e126e48777cea689658514ba01dbc3fdf,2025-06-24T20:15:26.867000
|
||||
CVE-2025-5303,0,0,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000
|
||||
CVE-2025-5307,0,0,7244ff154b85c92ca09019f8de869bb0541c220b74776be3851e4cfba38a0ca8,2025-05-30T16:31:03.107000
|
||||
CVE-2025-53073,1,1,40631a69d715def90dbb075cc363bdeeda8113b89f76a1f7b4efe8f3f1b90b63,2025-06-24T18:15:26.813000
|
||||
CVE-2025-53073,0,0,40631a69d715def90dbb075cc363bdeeda8113b89f76a1f7b4efe8f3f1b90b63,2025-06-24T18:15:26.813000
|
||||
CVE-2025-5309,0,0,4f40b16e57161a0b02ce9c3f4d7e0ba4cf08b0282b7954a09175078f67da41cb,2025-06-17T20:50:23.507000
|
||||
CVE-2025-5318,0,0,43978098e56851e5b415c4c8f175357a6aaaecebbdcfcfe803fcf95f094aa057,2025-06-24T14:15:30.523000
|
||||
CVE-2025-5320,0,0,772070621ad15a70df6397a0142dc45fe5fca6b991b5410b5c6912332a34a15a,2025-06-01T05:15:19.883000
|
||||
@ -298897,7 +298911,7 @@ CVE-2025-6008,0,0,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde082
|
||||
CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000
|
||||
CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6019,0,0,75f7b9a6441bde9d23f3280f372789289893c4b264a698bdbb1ec39f610d4315,2025-06-23T20:16:59.783000
|
||||
CVE-2025-6020,0,1,abdab1613cff203ff4225a4e83eb5a681c34a8b5248c090e738170300c0f3bd4,2025-06-24T19:15:23.937000
|
||||
CVE-2025-6020,0,0,abdab1613cff203ff4225a4e83eb5a681c34a8b5248c090e738170300c0f3bd4,2025-06-24T19:15:23.937000
|
||||
CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000
|
||||
CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6030,0,0,e2d083f85b4980fab673be25fe64ff6c58fe5f2e84e15893b8c80d92f1561a4f,2025-06-16T12:32:18.840000
|
||||
@ -298952,9 +298966,9 @@ CVE-2025-6118,0,0,0685f8bc63456947f39cb813f32e63b00ad26aefe40acb93f91c2a60b564b2
|
||||
CVE-2025-6119,0,0,f2397a97fdcfcfefd56020b114cdceca470e084d11ab5523cb4c6f456586eecc,2025-06-17T19:38:01.073000
|
||||
CVE-2025-6120,0,0,1caeb083f10b59771519c237665434e8bbff629e0f44ae8ecd728310046bbe95,2025-06-17T19:37:41.883000
|
||||
CVE-2025-6121,0,0,ac34c215559700b52c27e4eb85187c0f90e04bada26cf85e1da5d5a006994f69,2025-06-17T19:37:29.160000
|
||||
CVE-2025-6122,0,0,79bab9242c697b56597a153f6c6518ac5d670e665734da46c0282253ae61aec7,2025-06-17T20:50:33.517000
|
||||
CVE-2025-6123,0,0,d43d6d94100d023989c481dec6c898d450ddbc20841ed4ddfcc99856183ef27f,2025-06-17T20:50:33.517000
|
||||
CVE-2025-6124,0,0,5b60d811bf3cb9ef911f8612e6315e9b0b0997b30f24c3bf22952f378649f104,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6122,0,1,9512210d31f0e4aa9c3be187ffaab640323dcef8bc9e333d46732643321b9cbc,2025-06-24T20:14:31.217000
|
||||
CVE-2025-6123,0,1,34dda1a02964822924ca264397b7fe620121ce47eda2e36e01d9deda486e7dee,2025-06-24T20:12:20.880000
|
||||
CVE-2025-6124,0,1,182f443b3dae3d5c1247d45e79bef173f9714760ba9efbc0541c94f55ad4ed9f,2025-06-24T20:03:26.497000
|
||||
CVE-2025-6125,0,0,5970139c3a7232cc38ae30cfaf06d3e6e8652a495caadea4bc949c7056e7b9ac,2025-06-24T15:55:55.897000
|
||||
CVE-2025-6126,0,0,3cecc13780f04c9d6e12cff3225a1c82a52d01b6e334f4c31582b486f92d1a99,2025-06-24T15:56:04.113000
|
||||
CVE-2025-6127,0,0,8dab39e6a86d655538962f0fbccf53772eb4e509addd8914bf2b696eca5c0d0f,2025-06-24T15:52:30.757000
|
||||
@ -298963,7 +298977,7 @@ CVE-2025-6129,0,0,c11fcf3a911a2d8d8c4b37d8252afa26669376fbb7214d4fcbed546932aa45
|
||||
CVE-2025-6130,0,0,cb569be39f5f1da076d06669e0896e22c8cd60dff8ebc57d155295bc5acb6c81,2025-06-20T14:39:23.200000
|
||||
CVE-2025-6131,0,0,2866309ab3a411ed34af4bfc174dd80cc2f38df6ce0809f56ec34a44e1386fa4,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6132,0,0,4820b926dce549d59ace28c44f962f1b682b6ad27fe3050ad7fcb6e14d23357a,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6133,0,1,e8ce544a9effd7cb8b54da22c642c5245af611c0276c41dc8559e4d5a610718a,2025-06-24T19:44:40.803000
|
||||
CVE-2025-6133,0,0,e8ce544a9effd7cb8b54da22c642c5245af611c0276c41dc8559e4d5a610718a,2025-06-24T19:44:40.803000
|
||||
CVE-2025-6134,0,0,e314e671c8bc5848fa55335e6580660a169004bde35b809cd5c9e61560c3067a,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6135,0,0,ee51cf2c4222bfb9ad2c176fca2a379a43397e990b2eb061f92b5c8b5b0a323a,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6136,0,0,e9caa20ba8500c81ebc641ee6a945f6f003a8d2240dcf3f113058eaffabd98de,2025-06-17T20:50:23.507000
|
||||
@ -299123,12 +299137,12 @@ CVE-2025-6400,0,0,050d0d6363f6b2b57212039373a92161d9cd1cb135bfc82abdd36bd0aee1b9
|
||||
CVE-2025-6401,0,0,41bcaa672e80b250462eaf816ea1897a3f15a9912c9f639c6287203c9cfc6c07,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6402,0,0,61f85794e486fb4b78106646380066727801bf33e1255c6a929fd147edb24319,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6403,0,0,bbcb5e232fc7a419f24c71a04ba268c5b6911e1cbd015d94a543231775d1af9c,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6404,0,1,f0c24c4f38cddef26208faf5fffbe2ab0f5998ff0d6d820bde73ac92320b2d1d,2025-06-24T19:33:00.033000
|
||||
CVE-2025-6405,0,1,892fa39ea25d0fceb083bcffe5177ecfbe7cb9096e1732c10483f9dee58de891,2025-06-24T19:16:58.253000
|
||||
CVE-2025-6406,0,1,2db684a16f4e28aaee6c2ddbef92630dbb3eb77bc0c3d22bde49da8224e470bc,2025-06-24T19:09:54.780000
|
||||
CVE-2025-6407,0,1,00f10b229214c0a1e897663a31513da61f75e551ec09dba31fa5834ec889a929,2025-06-24T19:04:59
|
||||
CVE-2025-6408,0,1,24bc650a9e4f70106abdd7486753dd6d722bbe75931df339c3a441d581f110ee,2025-06-24T18:59:35.810000
|
||||
CVE-2025-6409,0,1,6a99fb2614583059088998d144c12c76b7571f4cbfc4084cae8e639cd6f9ffd2,2025-06-24T18:55:59.940000
|
||||
CVE-2025-6404,0,0,f0c24c4f38cddef26208faf5fffbe2ab0f5998ff0d6d820bde73ac92320b2d1d,2025-06-24T19:33:00.033000
|
||||
CVE-2025-6405,0,0,892fa39ea25d0fceb083bcffe5177ecfbe7cb9096e1732c10483f9dee58de891,2025-06-24T19:16:58.253000
|
||||
CVE-2025-6406,0,0,2db684a16f4e28aaee6c2ddbef92630dbb3eb77bc0c3d22bde49da8224e470bc,2025-06-24T19:09:54.780000
|
||||
CVE-2025-6407,0,0,00f10b229214c0a1e897663a31513da61f75e551ec09dba31fa5834ec889a929,2025-06-24T19:04:59
|
||||
CVE-2025-6408,0,0,24bc650a9e4f70106abdd7486753dd6d722bbe75931df339c3a441d581f110ee,2025-06-24T18:59:35.810000
|
||||
CVE-2025-6409,0,0,6a99fb2614583059088998d144c12c76b7571f4cbfc4084cae8e639cd6f9ffd2,2025-06-24T18:55:59.940000
|
||||
CVE-2025-6410,0,0,d5093121a62c3b03264c8b74cf8cee58e08566191457abd305673f3d7b08558c,2025-06-24T14:51:28.207000
|
||||
CVE-2025-6411,0,0,0e09e6bd75e65ae7b58d0e0820c1abe7bd7d437f8f8a3059af1dd0350f51a6eb,2025-06-24T14:51:00.910000
|
||||
CVE-2025-6412,0,0,079483de9c3bd0a5bc9a675e45d922c2a7f9e0ab5ec14494088543bc4cc27948,2025-06-24T14:45:30.210000
|
||||
@ -299137,7 +299151,7 @@ CVE-2025-6414,0,0,4eee093f61e0856e820fcce1dd983d848e970d6e3ba9a8157662d6a173a0c8
|
||||
CVE-2025-6415,0,0,d99b1b62da229a57bb10bf97c0f53cd32822887e7cf2412dbde9d23a1b40c301,2025-06-24T14:42:25.020000
|
||||
CVE-2025-6416,0,0,d915af97a76985615ef155ac953ed99c7fa06d79c350cbb3611f921c94d13007,2025-06-24T14:42:10.153000
|
||||
CVE-2025-6417,0,0,5fc9eb7d4ff925279bc28755909d00f7292cf787d506364151545ca582306f41,2025-06-24T14:41:39.197000
|
||||
CVE-2025-6418,0,1,9b7144e8c91e40fad04c7d19d2eb391f7837a4496b68c3a41978c640605253b7,2025-06-24T18:51:41.453000
|
||||
CVE-2025-6418,0,0,9b7144e8c91e40fad04c7d19d2eb391f7837a4496b68c3a41978c640605253b7,2025-06-24T18:51:41.453000
|
||||
CVE-2025-6419,0,0,3617b941b01f49b9887977e8c6068fd5eeb7fe8de612aa23856dff79b97287cf,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6420,0,0,6cdd074ad9636d47cb353088e65c5fe1d77bedf88b71bf3c2519aff243ef5171,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6421,0,0,5609a4a5b8ba6038f8f981b034f22b275327d1d8839411237326052b483006a3,2025-06-23T20:16:21.633000
|
||||
@ -299154,7 +299168,7 @@ CVE-2025-6432,0,0,dc1b5c4e50cf6f515296b16df4fc1504a747cae8428b86a0ca25c0f18fd9fa
|
||||
CVE-2025-6433,0,0,e9e6886748c1945d8162fd820ccc8b3502d8220fe8515a455d8264322c547839,2025-06-24T13:15:24.327000
|
||||
CVE-2025-6434,0,0,599cc13e47b64b667eda8d1a374814f3f336fa1a7f1de206c253b383dca38651,2025-06-24T13:15:24.447000
|
||||
CVE-2025-6435,0,0,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000
|
||||
CVE-2025-6436,0,1,b853ac3673b78035fe770c3a17866c9ee7f8480961c5c6348e20fee513806904,2025-06-24T19:15:24.063000
|
||||
CVE-2025-6436,0,0,b853ac3673b78035fe770c3a17866c9ee7f8480961c5c6348e20fee513806904,2025-06-24T19:15:24.063000
|
||||
CVE-2025-6446,0,0,3600b7ecc27e2374ecf53656a0787999f8467a509514c75f50c495fcd2cddda1,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6447,0,0,ccb7491a53a65edb2a46fa34f91bfc98d3e4b5a673ea57cbc2e7809ed2b6f681,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6448,0,0,8222bc4acb92d0f776e1d0bca83e07196c49a6462816bce44b6bf839e1dbed85,2025-06-23T20:16:21.633000
|
||||
@ -299227,6 +299241,9 @@ CVE-2025-6545,0,0,4a2e9a49fc7908d94e6672d7a2b53a6f95fca2e09b0d849d624a1d4044dc33
|
||||
CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad19,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6551,0,0,28b300bbd8c144f51c63879310dc12af5cc8cc1da1c90b362d6276ed1d7f06a4,2025-06-24T14:15:31.390000
|
||||
CVE-2025-6552,0,0,803ee4a1ec8be82f7a7266a0e0782f249d6c01547f2c273254ca519cada86f3d,2025-06-24T03:15:35.520000
|
||||
CVE-2025-6555,1,1,114cca9488cafee39d37756e238c0d2f69e19e4f4c0a5da213567ed5b93ae9bb,2025-06-24T21:15:26.380000
|
||||
CVE-2025-6556,1,1,c6e48072ac1f722ffbe77e89fb25bd2086d687ccdda4664c3d68404a643bb5b9,2025-06-24T21:15:26.553000
|
||||
CVE-2025-6557,1,1,9c8d24f715ee56ef9d342378028aa791ae3be74b300c390b225046716ecd370d,2025-06-24T21:15:26.697000
|
||||
CVE-2025-6559,0,0,444ed8a45550b3671771862423149729d25531cb4fc98aee2a01e13a863dcde8,2025-06-24T03:15:35.700000
|
||||
CVE-2025-6560,0,0,49ff1f0a782ce228cea5686f0cb1a3280168d6abbcd267d809259241cd7f946f,2025-06-24T03:15:35.897000
|
||||
CVE-2025-6565,0,0,7c02fe0d71d3ef34b32cfe8d9c10c27142ce892b4368d3b905ba19c7208bc8cf,2025-06-24T13:15:24.790000
|
||||
@ -299235,3 +299252,5 @@ CVE-2025-6567,0,0,5d754149f93ad7069f2d6b06b39e9a8d3070555d19c5f3fd33d0f2fd359ea3
|
||||
CVE-2025-6568,0,0,78c40c1dd546517356b970cf01de10a143e7aca6dbd9dbb56f6a07312247f2e6,2025-06-24T15:15:25.823000
|
||||
CVE-2025-6569,0,0,a9a253cca959ecf71ee669abff58d1659a78fe1070e8dc321456c5ad3c982f46,2025-06-24T15:15:26.017000
|
||||
CVE-2025-6570,0,0,201e9f805b1f4a20f4bf6639f714adc91a251017bc1b72fa4c7da0c06d10c7b0,2025-06-24T16:15:30.253000
|
||||
CVE-2025-6578,1,1,af2637c61ea16d05cecb01cac485eded383d41ec954985f1f245d4df176aee36,2025-06-24T20:15:27.433000
|
||||
CVE-2025-6579,1,1,fcfc4d99bfb161b15743945c897440f1876e453b66f81d9d6e2cf977514af419,2025-06-24T20:15:27.630000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user