Auto-Update: 2025-07-02T22:00:11.330468+00:00

This commit is contained in:
cad-safe-bot 2025-07-02 22:03:47 +00:00
parent 7201773a89
commit be0e7a9636
54 changed files with 2618 additions and 298 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2012-6068",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2013-01-21T21:55:01.103",
"lastModified": "2025-04-11T00:51:21.963",
"lastModified": "2025-07-02T20:15:28.747",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to (1) execute commands via the command-line interface in the TCP listener service or (2) transfer files via requests to the TCP listener service."
"value": "The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service."
},
{
"lang": "es",
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,8 +66,18 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -102,13 +134,6 @@
}
],
"references": [
{
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html",
"source": "ics-cert@hq.dhs.gov",
@ -121,11 +146,16 @@
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
]
"url": "https://us.codesys.com/ecosystem/security/",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-084-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",

View File

@ -2,13 +2,13 @@
"id": "CVE-2012-6069",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2013-01-21T21:55:01.150",
"lastModified": "2025-04-11T00:51:21.963",
"lastModified": "2025-07-02T21:15:39.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x allows remote attackers to read, overwrite, or create arbitrary files via a .. (dot dot) in a request to the TCP listener service."
"value": "The CoDeSys Runtime Toolkit\u2019s file transfer functionality does not \nperform input validation, which allows an attacker to access files and \ndirectories outside the intended scope. This may allow an attacker to \nupload and download any file on the device. This could allow the \nattacker to affect the availability, integrity, and confidentiality of \nthe device."
},
{
"lang": "es",
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,8 +66,18 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-23"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -102,13 +134,6 @@
}
],
"references": [
{
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html",
"source": "ics-cert@hq.dhs.gov",
@ -121,15 +146,16 @@
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://www.securityfocus.com/bid/56300",
"url": "https://us.codesys.com/ecosystem/security/",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
]
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-084-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",

View File

@ -2,13 +2,13 @@
"id": "CVE-2014-0760",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2014-04-25T05:12:07.693",
"lastModified": "2025-04-12T10:46:40.837",
"lastModified": "2025-07-02T21:15:39.710",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion provide an undocumented access method involving the FTP protocol, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors."
"value": "The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1\n Modular Controller with CoDeSys and SoftMotion provide an undocumented \naccess method involving the FTP protocol, which could allow a remote attacker to execute arbitrary code or cause a denial of service (application \ncrash) via unspecified vectors."
},
{
"lang": "es",
@ -17,6 +17,29 @@
],
"metrics": {
"cvssMetricV2": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
},
{
"source": "nvd@nist.gov",
"type": "Primary",
@ -44,7 +67,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
@ -52,6 +75,16 @@
"value": "CWE-287"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
@ -112,11 +145,8 @@
],
"references": [
{
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
]
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-084-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-0769",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2014-04-25T05:12:07.753",
"lastModified": "2025-04-12T10:46:40.837",
"lastModified": "2025-07-02T21:15:39.930",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
@ -17,6 +17,29 @@
],
"metrics": {
"cvssMetricV2": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
},
{
"source": "nvd@nist.gov",
"type": "Primary",
@ -44,7 +67,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
@ -52,6 +75,16 @@
"value": "CWE-287"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
@ -112,11 +145,8 @@
],
"references": [
{
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
]
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-084-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31631",
"sourceIdentifier": "security@php.net",
"published": "2025-02-12T22:15:29.007",
"lastModified": "2025-02-13T16:15:35.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T21:35:56.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,73 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.0.27",
"matchCriteriaId": "B25DE957-1D86-408D-AD1E-DBFB14115959"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndExcluding": "8.1.15",
"matchCriteriaId": "AF93F09C-C6A3-49AF-9202-0EC78065547D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.2.0",
"versionEndExcluding": "8.2.2",
"matchCriteriaId": "E87D2720-F21F-4FDE-A262-B8BA0B62AD98"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.39.2",
"matchCriteriaId": "46D17F35-DB4A-491C-BB28-4BFA36F3618F"
}
]
}
]
}
],
"references": [
{
"url": "https://bugs.php.net/bug.php?id=81740",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230223-0007/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugs.php.net/bug.php?id=81740",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-4104",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-09-11T09:15:08.997",
"lastModified": "2024-11-21T08:34:24.063",
"lastModified": "2025-07-02T21:15:40.210",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An invalid Polkit Authentication check and missing authentication requirements for D-Bus methods allowed any local user to configure arbitrary VPN setups.\n*This bug only affects Mozilla VPN on Linux. Other operating systems are unaffected.* This vulnerability affects Mozilla VPN client for Linux < v2.16.1."
"value": "An invalid Polkit Authentication check and missing authentication requirements for D-Bus methods allowed any local user to configure arbitrary VPN setups.\n*This bug only affects Mozilla VPN on Linux. Other operating systems are unaffected.* This vulnerability affects Mozilla VPN 2.16.1 < (Linux)."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12255",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-12T06:15:23.770",
"lastModified": "2024-12-12T15:15:09.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:06:31.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,14 +61,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zealousweb:accept_stripe_payments_using_contact_form_7:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6",
"matchCriteriaId": "5FB207CC-EA49-4814-A6B7-6B2139F78983"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3205295%40accept-stripe-payments-using-contact-form-7&new=3205295%40accept-stripe-payments-using-contact-form-7&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8a9e1325-1027-41ea-93be-c321aef61dea?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31669",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T15:15:11.113",
"lastModified": "2024-12-03T16:15:21.540",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:36:02.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.3",
"matchCriteriaId": "3A764AB8-1CB6-4DE6-A77B-8CF31D3DD3CB"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Crispy-fried-chicken/fb9f7000f0517a085483f7f2a60f0f08",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/rizinorg/rizin/commit/e42999dda0be7737fafaf5e63c1c5833a72fd9c9",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31670",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-12T18:15:23.977",
"lastModified": "2024-12-13T18:15:20.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:05:47.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.3",
"matchCriteriaId": "3A764AB8-1CB6-4DE6-A77B-8CF31D3DD3CB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/rizinorg/rizin/commit/75bac3088b2ec173e22d4be9d525ceacc987cf02",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36621",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T18:15:07.993",
"lastModified": "2024-12-04T17:15:13.067",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:43:30.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mobyproject:moby:25.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4B150E78-BD5F-48FA-BE6E-9643C1E67697"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/1047524396/5d44459edab5fafcdf86b43909b81135",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/moby/moby/blob/v25.0.5/builder/builder-next/adapters/snapshot/layer.go#L24",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/moby/moby/commit/37545cc644344dcb576cba67eb7b6f51a463d31e",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36622",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T18:15:08.140",
"lastModified": "2024-12-03T16:15:22.343",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:41:55.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:raspap:raspap-webgui:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.0.9",
"matchCriteriaId": "1B31EF76-BC27-41BE-B3D4-2D4F7DA0429E"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/1047524396/ab997b902ec892e592a0df93f38e6941",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/RaspAP/raspap-webgui/blob/3.0.9/ajax/logging/clearlog.php",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/raspap/raspap-webgui/commit/c98d2b0c15942b4829d31dec615b9b40cc6faa14#diff-939ee414d82245c3b3dd7d36b57f10706e06e8f0871b24bdcf9de6e0d181c4c9",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36623",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T18:15:08.293",
"lastModified": "2025-05-01T14:15:35.340",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:36:45.220",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mobyproject:moby:*:*:*:*:*:*:*:*",
"versionEndIncluding": "25.0.3",
"matchCriteriaId": "DF0603C7-4015-4481-96C0-04FA1AD21DA6"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/1047524396/c192c0159a19bf58a4373b696467dc29",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/moby/moby/blob/v25.0.3/pkg/streamformatter/streamformatter.go#L115",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/moby/moby/commit/5689dabfb357b673abdb4391eef426f297d7d1bb",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/moby/moby/commit/8e3bcf19748838b30e34d612832d1dc9d90363b8",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37377",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-12T01:55:19.320",
"lastModified": "2024-12-12T15:15:13.500",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:26:04.183",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,107 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.7",
"matchCriteriaId": "201EB882-0B2A-47DB-B517-1E72A0542B27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*",
"matchCriteriaId": "F788F6D9-5368-4B8E-BFA0-E8FB3CDADB01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*",
"matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*",
"matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*",
"matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*",
"matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*",
"matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*",
"matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*",
"matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*",
"matchCriteriaId": "3447428E-DBCD-4553-B51D-AC08ECAFD881"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.7",
"matchCriteriaId": "FAD0FC91-CA1E-4DC3-A37E-1BF98906D07C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*",
"matchCriteriaId": "1F22B988-2585-4853-9838-AB3746C8B888"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "FD9BE8C2-43EB-4870-A4B7-267CB17A19F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "C8915BB2-C1C0-4189-A847-DDB2EF161D62"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/December-2024-Security-Advisory-Ivanti-Connect-Secure-ICS-and-Ivanti-Policy-Secure-IPS-Multiple-CVEs",
"source": "support@hackerone.com"
"source": "support@hackerone.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37401",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-12T01:55:20.820",
"lastModified": "2024-12-12T15:15:13.877",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:07:12.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,107 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:*:-:*:*:*:*:*:*",
"versionEndExcluding": "22.7",
"matchCriteriaId": "A0EC2FCD-5402-4269-B86A-18F8DFB8F2C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*",
"matchCriteriaId": "F788F6D9-5368-4B8E-BFA0-E8FB3CDADB01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*",
"matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*",
"matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*",
"matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*",
"matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*",
"matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*",
"matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*",
"matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*",
"matchCriteriaId": "3447428E-DBCD-4553-B51D-AC08ECAFD881"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.7",
"matchCriteriaId": "FAD0FC91-CA1E-4DC3-A37E-1BF98906D07C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*",
"matchCriteriaId": "1F22B988-2585-4853-9838-AB3746C8B888"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "FD9BE8C2-43EB-4870-A4B7-267CB17A19F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "C8915BB2-C1C0-4189-A847-DDB2EF161D62"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/December-2024-Security-Advisory-Ivanti-Connect-Secure-ICS-and-Ivanti-Policy-Secure-IPS-Multiple-CVEs",
"source": "support@hackerone.com"
"source": "support@hackerone.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45206",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:05.427",
"lastModified": "2025-03-13T19:15:48.013",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:34:43.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:veeam:veeam_service_provider_console:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0.12777",
"versionEndExcluding": "8.1.0.21377",
"matchCriteriaId": "50FFBB24-D779-42F4-8874-3905AA3ABF75"
}
]
}
]
}
],
"references": [
{
"url": "https://www.veeam.com/kb4649",
"source": "support@hackerone.com"
"source": "support@hackerone.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45207",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:05.520",
"lastModified": "2024-12-04T16:15:25.580",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:29:56.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:veeam:veeam_agent_for_windows:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0.959",
"versionEndExcluding": "6.3.0.177",
"matchCriteriaId": "71DBFD55-CF57-4184-8BC4-4DFEFAC31880"
}
]
}
]
}
],
"references": [
{
"url": "https://www.veeam.com/kb4693",
"source": "support@hackerone.com"
"source": "support@hackerone.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45497",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-12-31T03:15:05.543",
"lastModified": "2025-07-02T09:15:23.290",
"lastModified": "2025-07-02T20:15:29.150",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -56,6 +56,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:9269",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9759",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9765",
"source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50699",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-10T19:15:30.193",
"lastModified": "2024-12-11T16:15:12.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:28:26.957",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,104 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:tl-wr845n_firmware:190219:*:*:*:*:*:*:*",
"matchCriteriaId": "735CFB5E-C8B3-4BC5-87A7-97F36A432D9C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:tl-wr845n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A9ADE93-33FC-43D4-BC86-042B4D6D48A5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:tl-wr845n_firmware:200909:*:*:*:*:*:*:*",
"matchCriteriaId": "0D942522-2F2B-4CDB-BDC7-23F9BBDAD844"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:tl-wr845n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A9ADE93-33FC-43D4-BC86-042B4D6D48A5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:tl-wr845n_firmware:201214:*:*:*:*:*:*:*",
"matchCriteriaId": "1D59784C-71BA-4212-8141-04EE7D675F4B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:tl-wr845n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A9ADE93-33FC-43D4-BC86-042B4D6D48A5"
}
]
}
]
}
],
"references": [
{
"url": "https://security.iiita.ac.in/iot/password-reset-missing-tplink.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://security.iiita.ac.in/iot/base64-authorization.docx",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8929",
"sourceIdentifier": "security@php.net",
"published": "2024-11-22T07:15:03.447",
"lastModified": "2025-01-10T13:15:10.460",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:11:20.063",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -55,14 +55,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndExcluding": "8.1.31",
"matchCriteriaId": "CE6E1B68-3EB9-4C67-97A6-226EA02CC2EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.2.0",
"versionEndExcluding": "8.2.26",
"matchCriteriaId": "C160D91A-CF97-4DD1-A34F-8B8C852B3CEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3.0",
"versionEndExcluding": "8.3.14",
"matchCriteriaId": "35B1BA7F-0EAE-4F40-ACA4-EBC5D63F609A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/php/php-src/security/advisories/GHSA-h35g-vwh6-m678",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20250110-0008/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8932",
"sourceIdentifier": "security@php.net",
"published": "2024-11-22T06:15:20.197",
"lastModified": "2025-01-10T13:15:10.617",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:08:35.010",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,68 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndExcluding": "8.1.31",
"matchCriteriaId": "CE6E1B68-3EB9-4C67-97A6-226EA02CC2EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.2.0",
"versionEndExcluding": "8.2.26",
"matchCriteriaId": "C160D91A-CF97-4DD1-A34F-8B8C852B3CEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3.0",
"versionEndExcluding": "8.3.14",
"matchCriteriaId": "35B1BA7F-0EAE-4F40-ACA4-EBC5D63F609A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
"matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/php/php-src/security/advisories/GHSA-g665-fm4p-vhff",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20250110-0009/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0073",
"sourceIdentifier": "arm-security@arm.com",
"published": "2025-06-02T11:15:21.067",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T21:18:03.963",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:r53p0:*:*:*:*:*:*:*",
"matchCriteriaId": "286DD633-0184-413A-A39A-58CE2D469712"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:r53p0:*:*:*:*:*:*:*",
"matchCriteriaId": "C77780C0-FA5F-4859-B983-4ECCF1098BCA"
}
]
}
]
}
],
"references": [
{
"url": "https://developer.arm.com/documentation/110466/latest/",
"source": "arm-security@arm.com"
"source": "arm-security@arm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0819",
"sourceIdentifier": "arm-security@arm.com",
"published": "2025-06-02T11:15:21.707",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T21:18:07.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,70 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r44p0",
"versionEndExcluding": "r49p4",
"matchCriteriaId": "9996F189-E9B8-445E-82EF-962B28E20E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r50p0",
"versionEndExcluding": "r54p1",
"matchCriteriaId": "34E4A755-7DA1-41CE-AE08-48F73DC7C88F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r44p0",
"versionEndExcluding": "r49p4",
"matchCriteriaId": "CD001086-9219-45A4-886B-CB5491313F02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:r50p0:*:*:*:*:*:*:*",
"matchCriteriaId": "CFA42E01-84F9-40CE-A03A-EDB148B1D6DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:r51p0:*:*:*:*:*:*:*",
"matchCriteriaId": "8EFE8BA5-EE63-486C-A660-5C4D3D4D223E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r44p0",
"versionEndExcluding": "r49p4",
"matchCriteriaId": "F02BF9D9-AA49-4478-8772-AF907AC21CFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r50p0",
"versionEndExcluding": "r54p1",
"matchCriteriaId": "F1518C84-7FFE-4AC8-8335-FC4804E0FBA6"
}
]
}
]
}
],
"references": [
{
"url": "https://developer.arm.com/documentation/110466/latest/",
"source": "arm-security@arm.com"
"source": "arm-security@arm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1246",
"sourceIdentifier": "arm-security@arm.com",
"published": "2025-06-02T11:15:21.823",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T21:27:05.870",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,70 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_userspace_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r41p0",
"versionEndExcluding": "r49p4",
"matchCriteriaId": "D15CAA8C-B125-4DD5-88DD-BD39D18F1EFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_userspace_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r50p0",
"versionEndExcluding": "r54p1",
"matchCriteriaId": "04ADA3A4-C98B-4BDA-8838-F742CAAE7F3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:bifrost_gpu_userspace_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r48p0",
"versionEndExcluding": "r49p4",
"matchCriteriaId": "30D58642-28C3-4BAA-B90B-0FCDE8768578"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:bifrost_gpu_userspace_driver:r50p0:*:*:*:*:*:*:*",
"matchCriteriaId": "A63C1ACA-E608-4B65-BBA5-4637C3E4C662"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:bifrost_gpu_userspace_driver:r51p0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8F7B1DC-0CA1-4F5E-B150-7864A88C6592"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:valhall_gpu_userspace_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r28p0",
"versionEndExcluding": "r49p4",
"matchCriteriaId": "B21C277E-C5D4-40DE-8824-41BBC6EDF035"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:valhall_gpu_userspace_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r50p0",
"versionEndExcluding": "r54p1",
"matchCriteriaId": "18A9000D-8DAA-4B5E-930A-B3E1225C63D2"
}
]
}
]
}
],
"references": [
{
"url": "https://developer.arm.com/documentation/110466/latest/",
"source": "arm-security@arm.com"
"source": "arm-security@arm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1734",
"sourceIdentifier": "security@php.net",
"published": "2025-03-30T06:15:14.603",
"lastModified": "2025-05-23T14:15:26.087",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:13:31.447",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
@ -73,14 +95,75 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndExcluding": "8.1.32",
"matchCriteriaId": "240B9DA6-4FE3-42D1-931A-9F4C62EC0ABA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.2.0",
"versionEndExcluding": "8.2.28",
"matchCriteriaId": "3C01313A-447A-4190-B275-3A6394EEFD96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3.0",
"versionEndExcluding": "8.3.19",
"matchCriteriaId": "A525415D-4C9F-4884-9F85-94989608D805"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndExcluding": "8.4.5",
"matchCriteriaId": "AC94B1EC-530A-4A25-9BCD-DAC5F52F6813"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
"matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/php/php-src/security/advisories/GHSA-pcmh-g36c-qc44",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20250523-0009/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1736",
"sourceIdentifier": "security@php.net",
"published": "2025-03-30T06:15:14.803",
"lastModified": "2025-05-23T14:15:26.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:14:40.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
@ -73,14 +95,75 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndExcluding": "8.1.32",
"matchCriteriaId": "240B9DA6-4FE3-42D1-931A-9F4C62EC0ABA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.2.0",
"versionEndExcluding": "8.2.28",
"matchCriteriaId": "3C01313A-447A-4190-B275-3A6394EEFD96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3.0",
"versionEndExcluding": "8.3.19",
"matchCriteriaId": "A525415D-4C9F-4884-9F85-94989608D805"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndExcluding": "8.4.5",
"matchCriteriaId": "AC94B1EC-530A-4A25-9BCD-DAC5F52F6813"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
"matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/php/php-src/security/advisories/GHSA-hgf5-96fm-v528",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20250523-0006/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1861",
"sourceIdentifier": "security@php.net",
"published": "2025-03-30T06:15:14.957",
"lastModified": "2025-05-23T14:15:26.320",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:17:38.193",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
@ -73,14 +95,75 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndExcluding": "8.1.31",
"matchCriteriaId": "CE6E1B68-3EB9-4C67-97A6-226EA02CC2EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.2.0",
"versionEndExcluding": "8.2.26",
"matchCriteriaId": "C160D91A-CF97-4DD1-A34F-8B8C852B3CEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3.0",
"versionEndExcluding": "8.3.14",
"matchCriteriaId": "35B1BA7F-0EAE-4F40-ACA4-EBC5D63F609A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndExcluding": "8.4.5",
"matchCriteriaId": "AC94B1EC-530A-4A25-9BCD-DAC5F52F6813"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
"matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/php/php-src/security/advisories/GHSA-52jp-hrpf-2jff",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20250523-0005/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-34074",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-02T20:15:29.410",
"lastModified": "2025-07-02T20:15:29.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated remote code execution vulnerability exists in Lucee\u2019s administrative interface due to insecure design in the scheduled task functionality. An administrator with access to /lucee/admin/web.cfm can configure a scheduled job to retrieve a remote .cfm file from an attacker-controlled server, which is written to the Lucee webroot and executed with the privileges of the Lucee service account. Because Lucee does not enforce integrity checks, path restrictions, or execution controls for scheduled task fetches, this feature can be abused to achieve arbitrary code execution. This issue is distinct from CVE-2024-55354."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
},
{
"lang": "en",
"value": "CWE-829"
}
]
}
],
"references": [
{
"url": "https://github.com/lucee/Lucee",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/lucee_scheduled_job.rb",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/lucee-admin-interface-rce",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,106 @@
{
"id": "CVE-2025-34075",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-02T20:15:29.553",
"lastModified": "2025-07-02T21:15:40.790",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated virtual machine escape vulnerability exists in HashiCorp Vagrant when using the default synced folder configuration. By design, Vagrant automatically mounts the host system\u2019s project directory into the guest VM under /vagrant (or C:\\vagrant on Windows). This includes the Vagrantfile configuration file, which is a Ruby script evaluated by the host every time a vagrant command is executed in the project directory. If a low-privileged attacker obtains shell access to the guest VM, they can append arbitrary Ruby code to the mounted Vagrantfile. When a user on the host later runs any vagrant command, the injected code is executed on the host with that user\u2019s privileges.\n\n While this shared-folder behavior is well-documented by Vagrant, the security implications of Vagrantfile execution from guest-writable storage are not explicitly addressed. This effectively enables guest-to-host code execution in multi-tenant or adversarial VM scenarios."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
},
{
"lang": "en",
"value": "CWE-276"
},
{
"lang": "en",
"value": "CWE-668"
}
]
}
],
"references": [
{
"url": "https://developer.hashicorp.com/vagrant",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://developer.hashicorp.com/vagrant/docs/synced-folders/basic_usage",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://developer.hashicorp.com/vagrant/docs/vagrantfile",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/local/vagrant_synced_folder_vagrantfile_breakout.rb",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/hashicorp-vagrant-synced-folder-vagrantfile-breakout",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/local/vagrant_synced_folder_vagrantfile_breakout.rb",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,98 @@
{
"id": "CVE-2025-34076",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-02T20:15:29.690",
"lastModified": "2025-07-02T20:15:29.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated local file inclusion vulnerability exists in Microweber CMS versions <= 1.2.11 through misuse of the backup management API. Authenticated users can abuse the /api/BackupV2/upload and /api/BackupV2/download endpoints to read arbitrary files from the underlying filesystem. By specifying an absolute file path in the src parameter of the upload request, the server may relocate or delete the target file depending on the web service user\u2019s privileges. The corresponding download endpoint can then be used to retrieve the file contents, effectively enabling local file disclosure. This behavior stems from insufficient validation of user-supplied paths and inadequate restrictions on file access and backup logic."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/microweber/microweber",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://github.com/microweber/microweber/commit/572bdc36b5b47923790016f6b961c8df53226855",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://github.com/microweber/microweber/commit/98d025467128ecc24195dcb56c533febc3c91af6",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://huntr.com/bounties/09218d3f-1f6a-48ae-981c-85e86ad5ed8b",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/gather/microweber_lfi.rb",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/microweber-cms-lfi",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,94 @@
{
"id": "CVE-2025-34078",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-02T20:15:29.827",
"lastModified": "2025-07-02T20:15:29.827",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A local privilege escalation vulnerability exists in NSClient++ 0.5.2.35 when both the web interface and ExternalScripts features are enabled. The configuration file (nsclient.ini) stores the administrative password in plaintext and is readable by local users. By extracting this password, an attacker can authenticate to the NSClient++ web interface (typically accessible on port 8443) and abuse the ExternalScripts plugin to inject and execute arbitrary commands as SYSTEM by registering a custom script, saving the configuration, and triggering it via the API.\n\nThis behavior is documented but insecure, as the plaintext credential exposure undermines access isolation between local users and administrative functions."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
},
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"references": [
{
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/local/nscp_pe.rb",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/nsclient-localtoremote-system-compromise",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/46802",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/48360",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-34079",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-02T20:15:29.963",
"lastModified": "2025-07-02T20:15:29.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated remote code execution vulnerability exists in NSClient++ version 0.5.2.35 when the web interface and ExternalScripts module are enabled. A remote attacker with the administrator password can authenticate to the web interface (default port 8443), inject arbitrary commands as external scripts via the /settings/query.json API, save the configuration, and trigger the script via the /query/{name} endpoint. The injected commands are executed with SYSTEM privileges, enabling full remote compromise.\n\nThis capability is an intended feature, but the lack of safeguards or privilege separation makes it risky when exposed to untrusted actors."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
},
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/nscp_authenticated_rce.rb",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/nsclient-localtoremote-system-compromise",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/48360",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-34090",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-02T20:15:30.110",
"lastModified": "2025-07-02T20:15:30.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A security bypass vulnerability exists in Google Chrome AppBound cookie encryption mechanism due to insufficient validation of COM server paths during inter-process communication. A local low-privileged attacker can hijack the COM class identifier (CLSID) registration used by Chrome's elevation service and point it to a non-existent or malicious binary. When this hijack occurs, Chrome silently falls back to the legacy cookie encryption mechanism (protected only by user-DPAPI), thereby enabling cookie decryption by any user-context malware without SYSTEM-level access. This flaw bypasses the protections intended by the AppBound encryption design and allows cookie theft from Chromium-based browsers.\n\nConfirmed in Google Chrome with AppBound Encryption enabled. Other Chromium-based browsers may be affected if they implement similar COM-based encryption mechanisms."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
},
{
"lang": "en",
"value": "CWE-426"
}
]
}
],
"references": [
{
"url": "https://vulncheck.com/advisories/google-chrome-appbound-cookie-encryption",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.cyberark.com/resources/threat-research-blog/c4-bomb-blowing-up-chromes-appbound-cookie-encryption",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-34091",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-02T20:15:30.260",
"lastModified": "2025-07-02T20:15:30.260",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A padding oracle vulnerability exists in Google Chrome\u2019s AppBound cookie encryption mechanism due to observable decryption failure behavior in Windows Event Logs when handling malformed ciphertext in SYSTEM-DPAPI-encrypted blobs. A local attacker can repeatedly send malformed ciphertexts to the Chrome elevation service and distinguish between padding and MAC errors, enabling a padding oracle attack. This allows partial decryption of the SYSTEM-DPAPI layer and eventual recovery of the user-DPAPI encrypted cookie key, which is trivially decrypted by the attacker\u2019s own context. This issue undermines the core purpose of AppBound Encryption by enabling low-privileged cookie theft through cryptographic misuse and verbose error feedback.\n\nConfirmed in Google Chrome with AppBound Encryption enabled. Other Chromium-based browsers may be affected if they implement similar COM-based encryption mechanisms.\n\nThis behavior arises from a combination of Chrome\u2019s AppBound implementation and the way Microsoft Windows DPAPI reports decryption failures via Event Logs. As such, the vulnerability relies on cryptographic behavior and error visibility in all supported versions of Windows."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
},
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"references": [
{
"url": "https://vulncheck.com/advisories/google-chrome-appbound-cookie-encryption",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.cyberark.com/resources/threat-research-blog/c4-bomb-blowing-up-chromes-appbound-cookie-encryption",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-34092",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-02T20:15:30.413",
"lastModified": "2025-07-02T20:15:30.413",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cookie encryption bypass vulnerability exists in Google Chrome\u2019s AppBound mechanism due to weak path validation logic within the elevation service. When Chrome encrypts a cookie key, it records its own executable path as validation metadata. Later, when decrypting, the elevation service compares the requesting process\u2019s path to this stored path. However, due to path canonicalization inconsistencies, an attacker can impersonate Chrome (e.g., by naming their binary chrome.exe and placing it in a similar path) and successfully retrieve the encrypted cookie key. This allows malicious processes to retrieve cookies intended to be restricted to the Chrome process only.\n\nConfirmed in Google Chrome with AppBound Encryption enabled. Other Chromium-based browsers may be affected if they implement similar COM-based encryption mechanisms."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
},
{
"lang": "en",
"value": "CWE-290"
},
{
"lang": "en",
"value": "CWE-706"
}
]
}
],
"references": [
{
"url": "https://vulncheck.com/advisories/google-chrome-appbound-cookie-encryption",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.cyberark.com/resources/threat-research-blog/c4-bomb-blowing-up-chromes-appbound-cookie-encryption",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-43025",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2025-07-02T20:15:30.550",
"lastModified": "2025-07-02T20:15:30.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HP Universal Print Driver is potentially vulnerable to denial of service due to buffer overflow in versions of UPD 7.4 or older (e.g., v7.3.x, v7.2.x, v7.1.x, etc.)."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "hp-security-alert@hp.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "hp-security-alert@hp.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12690576-12690598-16/hpsbpi04032",
"source": "hp-security-alert@hp.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-45029",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-02T14:15:25.470",
"lastModified": "2025-07-02T14:15:25.470",
"lastModified": "2025-07-02T21:15:41.003",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "WINSTAR WN572HP3 v230525 was discovered to contain a heap overflow via the CONTENT_LENGTH variable at /cgi-bin/upload.cgi."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "http://winstar.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-46647",
"sourceIdentifier": "security@apache.org",
"published": "2025-07-02T12:15:28.227",
"lastModified": "2025-07-02T12:15:28.227",
"lastModified": "2025-07-02T21:15:41.190",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,11 +11,34 @@
"value": "A vulnerability of plugin\u00a0openid-connect in Apache APISIX.\n\nThis vulnerability will only have an impact if all of the following conditions are met:\n1. Use the openid-connect plugin with introspection mode\n2. The auth service connected to openid-connect provides services to multiple issuers\n3. Multiple issuers share the same private key and relies only on the issuer being different\n\nIf affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.\n\n\n\n\nThis issue affects Apache APISIX: until 3.12.0.\n\nUsers are recommended to upgrade to version 3.12.0 or higher."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-49175",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-17T15:15:45.290",
"lastModified": "2025-06-30T20:15:24.553",
"lastModified": "2025-07-02T20:15:30.693",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:10258",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9303",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-49176",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-17T15:15:45.470",
"lastModified": "2025-06-30T20:15:24.690",
"lastModified": "2025-07-02T20:15:30.820",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:10258",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9303",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-49177",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-17T15:15:45.650",
"lastModified": "2025-06-30T10:15:25.913",
"lastModified": "2025-07-02T20:15:30.943",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:10258",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9304",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-49178",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-17T15:15:45.813",
"lastModified": "2025-06-30T21:15:30.693",
"lastModified": "2025-07-02T20:15:31.057",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:10258",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9303",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-49179",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-17T15:15:46.000",
"lastModified": "2025-06-30T20:15:24.817",
"lastModified": "2025-07-02T20:15:31.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:10258",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9303",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-49180",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-17T15:15:46.183",
"lastModified": "2025-06-30T20:15:24.940",
"lastModified": "2025-07-02T20:15:31.320",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:10258",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9303",
"source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-49262",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-06T13:15:42.713",
"lastModified": "2025-06-06T14:06:58.193",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:02:58.340",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sinaextra:sina_extension_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.7.0",
"matchCriteriaId": "5E8362F9-A91A-4A5E-820E-DBD767B84655"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/sina-extension-for-elementor/vulnerability/wordpress-sina-extension-for-elementor-3-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-49291",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-06T13:15:44.933",
"lastModified": "2025-06-06T14:06:58.193",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T20:02:18.077",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codepeople:calculated_fields_form:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.3.59",
"matchCriteriaId": "9C2BAF19-B851-4B02-B0B5-C1DD3F829029"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/calculated-fields-form/vulnerability/wordpress-calculated-fields-form-5-3-58-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-52559",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-02T20:15:31.443",
"lastModified": "2025-07-02T20:15:31.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zulip is an open-source team chat application. From versions 2.0.0-rc1 to before 10.4 in Zulip Server, the /digest/ URL of a server shows a preview of what the email weekly digest would contain. This URL, though not the digest itself, contains a cross-site scripting (XSS) vulnerability in both topic names and channel names. This issue has been fixed in Zulip Server 10.4. A workaround for this issue involves denying access to /digest/."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/zulip/zulip/commit/175ec1f365b0db982d6eac9019701cbf6e8bc2f2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zulip/zulip/commit/1a8429e338ff53bdcc4b42e7e71b6fffdd84fcd1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zulip/zulip/commit/6608c8777254e73a4b540e5e1c4af92e680a55fc",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zulip/zulip/security/advisories/GHSA-vgf2-vw4r-m663",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-52841",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2025-07-02T17:15:53.807",
"lastModified": "2025-07-02T17:15:53.807",
"lastModified": "2025-07-02T20:15:31.610",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -77,6 +77,10 @@
{
"url": "https://github.com/mohaiminur/laundry",
"source": "help@fluidattacks.com"
},
{
"url": "https://fluidattacks.com/advisories/tort",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-52842",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2025-07-02T20:15:31.727",
"lastModified": "2025-07-02T20:15:31.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Laundry on Linux, MacOS allows Account Takeover. This issue affects Laundry: 2.3.0."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "help@fluidattacks.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/winehouse",
"source": "help@fluidattacks.com"
},
{
"url": "https://github.com/mohaiminur/laundry",
"source": "help@fluidattacks.com"
},
{
"url": "https://fluidattacks.com/advisories/winehouse",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-53256",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-27T14:15:44.917",
"lastModified": "2025-06-30T18:38:48.477",
"lastModified": "2025-07-02T21:15:41.410",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in YayCommerce YaySMTP allows SQL Injection. This issue affects YaySMTP: from n/a through 6.8.1."
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in YayCommerce YaySMTP allows SQL Injection.This issue affects YaySMTP: from n/a through 2.6.5."
},
{
"lang": "es",
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-6424",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-06-24T13:15:23.273",
"lastModified": "2025-07-02T18:11:28.190",
"vulnStatus": "Analyzed",
"lastModified": "2025-07-02T21:15:41.517",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, and Firefox ESR < 128.12."
"value": "A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12."
},
{
"lang": "es",
@ -110,6 +110,14 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-54/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-55/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-6425",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-06-24T13:15:23.403",
"lastModified": "2025-06-26T18:58:14.280",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-02T21:15:41.670",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, and Firefox ESR < 128.12."
"value": "An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12."
},
{
"lang": "es",
@ -67,6 +67,14 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-53/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-54/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-55/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-6942",
"sourceIdentifier": "1443cd92-d354-46d2-9290-d812316ca43a",
"published": "2025-07-02T16:15:29.883",
"lastModified": "2025-07-02T16:15:29.883",
"lastModified": "2025-07-02T20:15:31.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The distributed engine of Secret Server versions 11.7.49 and earlier can be exploited during an initial authorization event that would allow an attacker to impersonate another distributed engine."
"value": "The distributed engine versions 8.4.39.0 and earlier of Secret Server versions 11.7.49 and earlier can be exploited during an initial authorization event that would allow an attacker to impersonate another distributed engine."
}
],
"metrics": {
@ -61,7 +61,7 @@
"source": "1443cd92-d354-46d2-9290-d812316ca43a"
},
{
"url": "https://trust.delinea.com",
"url": "https://trust.delinea.com/?tcuUid=2b68edca-7930-438d-b960-2d6da07cdde9",
"source": "1443cd92-d354-46d2-9290-d812316ca43a"
}
]

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-07-02T20:00:11.604133+00:00
2025-07-02T22:00:11.330468+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-07-02T19:56:33.060000+00:00
2025-07-02T21:35:56.150000+00:00
```
### Last Data Feed Release
@ -33,46 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
300092
300103
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `11`
- [CVE-2025-45813](CVE-2025/CVE-2025-458xx/CVE-2025-45813.json) (`2025-07-02T18:15:24.170`)
- [CVE-2025-49713](CVE-2025/CVE-2025-497xx/CVE-2025-49713.json) (`2025-07-02T18:15:24.303`)
- [CVE-2025-34074](CVE-2025/CVE-2025-340xx/CVE-2025-34074.json) (`2025-07-02T20:15:29.410`)
- [CVE-2025-34075](CVE-2025/CVE-2025-340xx/CVE-2025-34075.json) (`2025-07-02T20:15:29.553`)
- [CVE-2025-34076](CVE-2025/CVE-2025-340xx/CVE-2025-34076.json) (`2025-07-02T20:15:29.690`)
- [CVE-2025-34078](CVE-2025/CVE-2025-340xx/CVE-2025-34078.json) (`2025-07-02T20:15:29.827`)
- [CVE-2025-34079](CVE-2025/CVE-2025-340xx/CVE-2025-34079.json) (`2025-07-02T20:15:29.963`)
- [CVE-2025-34090](CVE-2025/CVE-2025-340xx/CVE-2025-34090.json) (`2025-07-02T20:15:30.110`)
- [CVE-2025-34091](CVE-2025/CVE-2025-340xx/CVE-2025-34091.json) (`2025-07-02T20:15:30.260`)
- [CVE-2025-34092](CVE-2025/CVE-2025-340xx/CVE-2025-34092.json) (`2025-07-02T20:15:30.413`)
- [CVE-2025-43025](CVE-2025/CVE-2025-430xx/CVE-2025-43025.json) (`2025-07-02T20:15:30.550`)
- [CVE-2025-52559](CVE-2025/CVE-2025-525xx/CVE-2025-52559.json) (`2025-07-02T20:15:31.443`)
- [CVE-2025-52842](CVE-2025/CVE-2025-528xx/CVE-2025-52842.json) (`2025-07-02T20:15:31.727`)
### CVEs modified in the last Commit
Recently modified CVEs: `66`
Recently modified CVEs: `41`
- [CVE-2025-5439](CVE-2025/CVE-2025-54xx/CVE-2025-5439.json) (`2025-07-02T18:08:04.770`)
- [CVE-2025-5440](CVE-2025/CVE-2025-54xx/CVE-2025-5440.json) (`2025-07-02T18:07:16.100`)
- [CVE-2025-5877](CVE-2025/CVE-2025-58xx/CVE-2025-5877.json) (`2025-07-02T19:17:43.003`)
- [CVE-2025-6140](CVE-2025/CVE-2025-61xx/CVE-2025-6140.json) (`2025-07-02T18:58:42.230`)
- [CVE-2025-6152](CVE-2025/CVE-2025-61xx/CVE-2025-6152.json) (`2025-07-02T19:47:02.363`)
- [CVE-2025-6167](CVE-2025/CVE-2025-61xx/CVE-2025-6167.json) (`2025-07-02T19:36:26.940`)
- [CVE-2025-6177](CVE-2025/CVE-2025-61xx/CVE-2025-6177.json) (`2025-07-02T18:26:40.590`)
- [CVE-2025-6179](CVE-2025/CVE-2025-61xx/CVE-2025-6179.json) (`2025-07-02T18:23:31.617`)
- [CVE-2025-6269](CVE-2025/CVE-2025-62xx/CVE-2025-6269.json) (`2025-07-02T19:01:55.227`)
- [CVE-2025-6270](CVE-2025/CVE-2025-62xx/CVE-2025-6270.json) (`2025-07-02T19:02:17.373`)
- [CVE-2025-6271](CVE-2025/CVE-2025-62xx/CVE-2025-6271.json) (`2025-07-02T19:03:29.737`)
- [CVE-2025-6272](CVE-2025/CVE-2025-62xx/CVE-2025-6272.json) (`2025-07-02T19:04:23.387`)
- [CVE-2025-6274](CVE-2025/CVE-2025-62xx/CVE-2025-6274.json) (`2025-07-02T18:33:27.390`)
- [CVE-2025-6275](CVE-2025/CVE-2025-62xx/CVE-2025-6275.json) (`2025-07-02T18:34:42.377`)
- [CVE-2025-6281](CVE-2025/CVE-2025-62xx/CVE-2025-6281.json) (`2025-07-02T18:37:11.983`)
- [CVE-2025-6296](CVE-2025/CVE-2025-62xx/CVE-2025-6296.json) (`2025-07-02T18:46:52.983`)
- [CVE-2025-6299](CVE-2025/CVE-2025-62xx/CVE-2025-6299.json) (`2025-07-02T18:53:41.497`)
- [CVE-2025-6363](CVE-2025/CVE-2025-63xx/CVE-2025-6363.json) (`2025-07-02T18:56:45.850`)
- [CVE-2025-6403](CVE-2025/CVE-2025-64xx/CVE-2025-6403.json) (`2025-07-02T18:56:36.940`)
- [CVE-2025-6424](CVE-2025/CVE-2025-64xx/CVE-2025-6424.json) (`2025-07-02T18:11:28.190`)
- [CVE-2025-6447](CVE-2025/CVE-2025-64xx/CVE-2025-6447.json) (`2025-07-02T18:24:21.523`)
- [CVE-2025-6570](CVE-2025/CVE-2025-65xx/CVE-2025-6570.json) (`2025-07-02T18:24:35.030`)
- [CVE-2025-6608](CVE-2025/CVE-2025-66xx/CVE-2025-6608.json) (`2025-07-02T18:24:47.807`)
- [CVE-2025-6609](CVE-2025/CVE-2025-66xx/CVE-2025-6609.json) (`2025-07-02T18:24:56.760`)
- [CVE-2025-6610](CVE-2025/CVE-2025-66xx/CVE-2025-6610.json) (`2025-07-02T18:29:30.530`)
- [CVE-2024-45497](CVE-2024/CVE-2024-454xx/CVE-2024-45497.json) (`2025-07-02T20:15:29.150`)
- [CVE-2024-50699](CVE-2024/CVE-2024-506xx/CVE-2024-50699.json) (`2025-07-02T20:28:26.957`)
- [CVE-2024-8929](CVE-2024/CVE-2024-89xx/CVE-2024-8929.json) (`2025-07-02T20:11:20.063`)
- [CVE-2024-8932](CVE-2024/CVE-2024-89xx/CVE-2024-8932.json) (`2025-07-02T20:08:35.010`)
- [CVE-2025-0073](CVE-2025/CVE-2025-00xx/CVE-2025-0073.json) (`2025-07-02T21:18:03.963`)
- [CVE-2025-0819](CVE-2025/CVE-2025-08xx/CVE-2025-0819.json) (`2025-07-02T21:18:07.187`)
- [CVE-2025-1246](CVE-2025/CVE-2025-12xx/CVE-2025-1246.json) (`2025-07-02T21:27:05.870`)
- [CVE-2025-1734](CVE-2025/CVE-2025-17xx/CVE-2025-1734.json) (`2025-07-02T20:13:31.447`)
- [CVE-2025-1736](CVE-2025/CVE-2025-17xx/CVE-2025-1736.json) (`2025-07-02T20:14:40.817`)
- [CVE-2025-1861](CVE-2025/CVE-2025-18xx/CVE-2025-1861.json) (`2025-07-02T20:17:38.193`)
- [CVE-2025-45029](CVE-2025/CVE-2025-450xx/CVE-2025-45029.json) (`2025-07-02T21:15:41.003`)
- [CVE-2025-46647](CVE-2025/CVE-2025-466xx/CVE-2025-46647.json) (`2025-07-02T21:15:41.190`)
- [CVE-2025-49175](CVE-2025/CVE-2025-491xx/CVE-2025-49175.json) (`2025-07-02T20:15:30.693`)
- [CVE-2025-49176](CVE-2025/CVE-2025-491xx/CVE-2025-49176.json) (`2025-07-02T20:15:30.820`)
- [CVE-2025-49177](CVE-2025/CVE-2025-491xx/CVE-2025-49177.json) (`2025-07-02T20:15:30.943`)
- [CVE-2025-49178](CVE-2025/CVE-2025-491xx/CVE-2025-49178.json) (`2025-07-02T20:15:31.057`)
- [CVE-2025-49179](CVE-2025/CVE-2025-491xx/CVE-2025-49179.json) (`2025-07-02T20:15:31.187`)
- [CVE-2025-49180](CVE-2025/CVE-2025-491xx/CVE-2025-49180.json) (`2025-07-02T20:15:31.320`)
- [CVE-2025-49262](CVE-2025/CVE-2025-492xx/CVE-2025-49262.json) (`2025-07-02T20:02:58.340`)
- [CVE-2025-49291](CVE-2025/CVE-2025-492xx/CVE-2025-49291.json) (`2025-07-02T20:02:18.077`)
- [CVE-2025-52841](CVE-2025/CVE-2025-528xx/CVE-2025-52841.json) (`2025-07-02T20:15:31.610`)
- [CVE-2025-53256](CVE-2025/CVE-2025-532xx/CVE-2025-53256.json) (`2025-07-02T21:15:41.410`)
- [CVE-2025-6424](CVE-2025/CVE-2025-64xx/CVE-2025-6424.json) (`2025-07-02T21:15:41.517`)
- [CVE-2025-6425](CVE-2025/CVE-2025-64xx/CVE-2025-6425.json) (`2025-07-02T21:15:41.670`)
- [CVE-2025-6942](CVE-2025/CVE-2025-69xx/CVE-2025-6942.json) (`2025-07-02T20:15:31.957`)
## Download and Usage

View File

@ -57134,8 +57134,8 @@ CVE-2012-6064,0,0,00dfc63961f9d2f48fea7498cff02d1f2421fa76b24927ab3f00edb3f45a3b
CVE-2012-6065,0,0,7c2175c41600228ebd0c1f5b78e5c0ea9a55775d6bf6bb3f67bebb3b1c94f4a9,2025-04-11T00:51:21.963000
CVE-2012-6066,0,0,21c6bf3723b1806f5fa7f588834d08d256c294ff8360b08ba820de86088f3316,2025-04-11T00:51:21.963000
CVE-2012-6067,0,0,1418583d7df1633572e12da1ee582751278150b44c4a2c7d1d088f5f0d94ec2b,2025-04-11T00:51:21.963000
CVE-2012-6068,0,0,a5cb1b673e047f69b55b7b51976951249a00e124c7724e4dd31494d0d0784fb0,2025-04-11T00:51:21.963000
CVE-2012-6069,0,0,6d24ba6e3fb7bc9bee282f7a49a92d5a05b0f4911ee947210137766ed133b8c3,2025-04-11T00:51:21.963000
CVE-2012-6068,0,1,e3d950c15015fd759ac3c665fa4a24263029bb895dd53a768209168f2e2802e2,2025-07-02T20:15:28.747000
CVE-2012-6069,0,1,f4aeb16a54681aee4e0fd13511c2e4eeb84f1e3105227dc2ae70233a3c659fc5,2025-07-02T21:15:39.193000
CVE-2012-6070,0,0,c96e07fbbe5a5885f8017955a7e41db880979ceabef9aec74dad3d1857e61d69,2024-11-21T01:45:45.387000
CVE-2012-6071,0,0,855c72b937ed3b2c1ed93820ec0e120ade527b2f5c5c801871b7628cd19cd706,2024-11-21T01:45:45.507000
CVE-2012-6072,0,0,bc4fd1bc9efc8624039dc318c232f5eaf1b0d89aaa6d596e9d7714cfc1fe5618,2025-04-11T00:51:21.963000
@ -65224,7 +65224,7 @@ CVE-2014-0756,0,0,8182da2ba5b0fb60b9f4347418bda13902887de796c946dc114475c6445c8d
CVE-2014-0757,0,0,168e8c1aac9c85efc339ce8e20d9b2db230dcd503ac6f43b9658d95f3e87035d,2025-04-11T00:51:21.963000
CVE-2014-0758,0,0,6983a30267631c41724920d6872de0c24a328fe20e52aa00a5ca79f089f61c79,2025-04-11T00:51:21.963000
CVE-2014-0759,0,0,159ee845c6a7733811e28579f911af8f19e8475e4c4e96da6413887043b6c475,2025-04-12T10:46:40.837000
CVE-2014-0760,0,0,0b94b43198c3d40d178d76235092400c77f8b8beff9985994bb20924a97f71e3,2025-04-12T10:46:40.837000
CVE-2014-0760,0,1,d884b9415b798cefb1f4bcb96e37d8c65c636c184daea2a86963635237b6fa09,2025-07-02T21:15:39.710000
CVE-2014-0761,0,0,a9e210fc97e939bc353b0dc2fce1a893b009252961de1cdbf3747d0cfe5e3500,2025-04-12T10:46:40.837000
CVE-2014-0762,0,0,a2d00d194f91a41898fcae546f2fb77365861a07f1b8676393c4c79ee569bb6c,2025-04-12T10:46:40.837000
CVE-2014-0763,0,0,37a6adf709a00b7917a393f00ba4a7ae3f209fa33e846e9c01022a09df1914ba,2025-04-12T10:46:40.837000
@ -65233,7 +65233,7 @@ CVE-2014-0765,0,0,ca72b19876799da1bed2b116eb45b0a992313f01100fd2591641de4a18e559
CVE-2014-0766,0,0,20754167ca05b764529ca502d2b64a040b0363de9c7720f7c03c1eb22f9770de,2025-04-12T10:46:40.837000
CVE-2014-0767,0,0,d21414b854b58f39dc8bf51e8ce7de807749919ef74902a41e8797e9dcbf5865,2025-04-12T10:46:40.837000
CVE-2014-0768,0,0,dfe2ace2ad52d510597aa7c107e03ef096f049ecb19c18cb31e149930d1a358e,2025-04-12T10:46:40.837000
CVE-2014-0769,0,0,a0c28850a814cfc7e27659c306e4e2dbdee38f5d30eadcb4f4aeb4540db4202c,2025-04-12T10:46:40.837000
CVE-2014-0769,0,1,aeded6b900757f2d693acc367cde76d833ffd622709c0fc2e1c1c2f7d947ec4e,2025-07-02T21:15:39.930000
CVE-2014-0770,0,0,aaf77d8c8e98222f1c84311265729dd56041715b40027c74f6860f225cb89cf2,2025-04-12T10:46:40.837000
CVE-2014-0771,0,0,f411bbd3908d308c314c4cdbfd92d6f52559d677ad50c11c5b1cb40d86204271,2025-04-12T10:46:40.837000
CVE-2014-0772,0,0,c4c12f2d9bc93b391986779f439c03f0c25fbb2b6a464efad2b6ee985866e16e,2025-04-12T10:46:40.837000
@ -200088,7 +200088,7 @@ CVE-2022-31627,0,0,7988c7987107767faa26c91c4891892d0041cc614c7a6d1a3a06deb7caf95
CVE-2022-31628,0,0,ddf8d9d176ca572281725bcb1b547da70694f62f03744783ee8e12be7f37ea23,2024-11-21T07:04:53.293000
CVE-2022-31629,0,0,5ef862df04f8d255ed02bf719beeb80649437a92cf9e67e9f3f71844fbe16d82,2024-11-21T07:04:53.460000
CVE-2022-31630,0,0,048f94737739e9ec1f539180d01531111b8a9b6e3fb03b23f54e62135c59134e,2024-11-21T07:04:53.693000
CVE-2022-31631,0,0,a9c408cc6e6afdf7686591ae2032302c0465931613c958a8b300d4947a3f980e,2025-02-13T16:15:35.670000
CVE-2022-31631,0,1,3c470cf378cff90f59cdfeb387547b572cd9177260458e7329ad7b096e176859,2025-07-02T21:35:56.150000
CVE-2022-31635,0,0,f33cce5b1e193c9081577f172af1b88917acd23104921caa053576c10bfcf687,2025-01-03T15:15:06.873000
CVE-2022-31636,0,0,dc5d48671ff8c8359b8ab236feb93a3c4723a165b95081331578932b6b185c1e,2025-01-03T15:15:08.580000
CVE-2022-31637,0,0,30c8596251895654f5e10b1d0756a872401cb82752723a34976c21eb08a2360a,2025-01-03T20:15:24.413000
@ -233596,7 +233596,7 @@ CVE-2023-41036,0,0,02272cf2fa97f95dd91a385e67294f11eac8744c630b8c26dd9ff9462edd6
CVE-2023-41037,0,0,f1c3742f17296c158e6b7072d1d1a9102ccf74a2caecd6be7e25a339f6b9a0fa,2024-11-21T08:20:25.840000
CVE-2023-41038,0,0,dd600939ee54220a321d470a3ad1b3ecd0da7d549612b368f00cee9449536ce0,2024-11-21T08:20:25.967000
CVE-2023-41039,0,0,e49689ed186320a038c36307f466e022818c9bec98aa462c1be5a9ea4c4c172f,2024-11-21T08:20:26.090000
CVE-2023-4104,0,0,ebd3c98f7b974266e0cd3ce9392fb522e9bc704ab30fa16ddd5dbd35fb9dafd1,2024-11-21T08:34:24.063000
CVE-2023-4104,0,1,6c2f8ecaac38f35d21b5169a003420cc4ae4f83405abfca8ec0ccf15315fa891,2025-07-02T21:15:40.210000
CVE-2023-41040,0,0,426e541e09c3630b3c9f58683762e9a042bddd14dd5886a0f8de5abee437a61e,2024-11-21T08:20:26.217000
CVE-2023-41041,0,0,555d17e2ca52e4dbb2d3be131541fecc6a92d5f967837e4bf934250e0c4e47d7,2024-11-21T08:20:26.350000
CVE-2023-41042,0,0,f6501d9067f705e2792db78f5e5c3c0939468f1a27b5dfcebced4337049e26ed,2024-11-21T08:20:26.477000
@ -236440,7 +236440,7 @@ CVE-2023-4508,0,0,ddcfeff3689ff681a56c8969c508364a5228b41d5fccf16d84adfe9f47e473
CVE-2023-45083,0,0,3743538578c2e9a7b3cf417e490ee04603f9bf5a4fa95a25f5e9054707035c43,2024-11-21T08:26:21.397000
CVE-2023-45084,0,0,e140cc27d5c28d76849fecef9ad885e226819fcb74c7da18eb83c35c56bcac1e,2024-11-21T08:26:21.520000
CVE-2023-45085,0,0,cb82bc80bf471263d5f40a4a24295728702a1b98bd6772e81c80d200fe1526ba,2024-11-21T08:26:21.640000
CVE-2023-4509,0,1,f94021b4408adf16e1714a3c19253e2324a03d285b2fe014decd850bd9a1e299,2025-07-02T18:09:48.900000
CVE-2023-4509,0,0,f94021b4408adf16e1714a3c19253e2324a03d285b2fe014decd850bd9a1e299,2025-07-02T18:09:48.900000
CVE-2023-45101,0,0,91b701945f1241c8f2e5a1f78802e24fe9b33b09efc15431dd320b8a1ed31cf5,2025-02-05T14:57:27.703000
CVE-2023-45102,0,0,8dfb431d08e4bb6547ac932a1cd7a69df7e786aae8df335276cb697f9eac6d6e,2024-11-21T08:26:21.757000
CVE-2023-45103,0,0,e13888dfbd39792b0beee4852b93eda208a746c1f407d0bd3d6d9dab70a7a0ca,2024-11-21T08:26:21.887000
@ -237927,7 +237927,7 @@ CVE-2023-47020,0,0,77958b1e974ce3a0af29c7a34f0132e69536d415fc0c65e83c01b308bc43d
CVE-2023-47022,0,0,73d82f89852a7fe6d598baa6e948b789fe12b29f69f371d14a570d87cb620bb5,2025-06-17T17:15:31.567000
CVE-2023-47024,0,0,c125fb103042924f5281e92be53a4da5c6431c794e2412cda8329c78f5f25120,2025-06-17T17:15:31.783000
CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000
CVE-2023-47029,0,1,f354e0d314861ff3810be1e131692dc0d76cfe93a1ccf5f7f94664c270d7e2dd,2025-07-02T19:06:22.507000
CVE-2023-47029,0,0,f354e0d314861ff3810be1e131692dc0d76cfe93a1ccf5f7f94664c270d7e2dd,2025-07-02T19:06:22.507000
CVE-2023-4703,0,0,a6d5e78e1192a3e0f4c01547c7f4ce3e0b04c7358d175d4096197c6b6119861c,2025-06-20T17:15:34.147000
CVE-2023-47030,0,0,93ccd1f7d36567d2d295f9d2eefa083e76664b4db1969b2faf0e950bfafbca21,2025-06-25T12:50:37.217000
CVE-2023-47031,0,0,a451f00aa91dc8a8504ff9338181d2c777cbbe9a238b568badcf58bf8e44beb3,2025-06-25T13:13:50.157000
@ -238162,7 +238162,7 @@ CVE-2023-4728,0,0,c339ab5d87c7af4ab30b66d47f7562aee044b141169095045add07af35952c
CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb836,2024-11-21T08:30:07.197000
CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000
CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000
CVE-2023-47294,0,1,0891f318a99f2d09fb329c085f755075f92b0879fa6d0ce3dd707982d03e4c13,2025-07-02T19:10:16.237000
CVE-2023-47294,0,0,0891f318a99f2d09fb329c085f755075f92b0879fa6d0ce3dd707982d03e4c13,2025-07-02T19:10:16.237000
CVE-2023-47295,0,0,28a72d717c8a4fa3591c8aa3a96aa82e9fec7a018320bb6b31941ca440092c65,2025-06-25T13:30:08.523000
CVE-2023-47297,0,0,c14fd87e4e15a5f8e3c0ca94948127ff1c65a697a69ee20c14900dd6601ff3f3,2025-06-26T12:46:49.080000
CVE-2023-47298,0,0,4c4acd197c7d9d302a966e30e51e5a36b182be0dd23706e335a822f619b88bec,2025-06-26T12:44:00.433000
@ -245677,9 +245677,9 @@ CVE-2024-10269,0,0,bb2a3cab40a3b831fa7114c2862087ff1fd138065989f0b23db24140c8ebf
CVE-2024-1027,0,0,88d0ec1849f0d05d69fb41d518f3d3eea7fd3db3a17e6bfa013ac44746536bf0,2024-11-21T08:49:37.867000
CVE-2024-10270,0,0,421f39f32cf5ae0b6f47e1854986b3fe16c531173581711002b42dee462ad7ef,2024-11-25T08:15:03.747000
CVE-2024-10272,0,0,4f442f29307f7fe4036be7fda7d7f31f538cb47aef157e3f603bc675d724abf7,2025-06-20T15:48:55.677000
CVE-2024-10273,0,1,b99eeb03b73538ed47e3d7a607111e4ebb0eec777d67674d1ab59477b6c1d8f3,2025-07-02T19:35:11.680000
CVE-2024-10274,0,1,723f3e107ffa9063adac9c362f7a596f6db681264113e88ff1c1d74bca71b600,2025-07-02T19:36:18.843000
CVE-2024-10275,0,1,f47d73a816c53cca67d2a586eeaee114b8100acbcb515f8fe9f63d3db92edde0,2025-07-02T19:44:10.070000
CVE-2024-10273,0,0,b99eeb03b73538ed47e3d7a607111e4ebb0eec777d67674d1ab59477b6c1d8f3,2025-07-02T19:35:11.680000
CVE-2024-10274,0,0,723f3e107ffa9063adac9c362f7a596f6db681264113e88ff1c1d74bca71b600,2025-07-02T19:36:18.843000
CVE-2024-10275,0,0,f47d73a816c53cca67d2a586eeaee114b8100acbcb515f8fe9f63d3db92edde0,2025-07-02T19:44:10.070000
CVE-2024-10276,0,0,bbe5dca2c1dc09165161e39681c1afec6bdfb1c1343f5cc1f9d6b5eea19bb37b,2025-05-01T14:37:50.833000
CVE-2024-10277,0,0,e1fa37b2ed695484142d55c4ddb4c40c516da25ba5b81ab0ec41d2668f9b3fc4,2024-11-04T22:13:13.207000
CVE-2024-10278,0,0,ee389174d0d07be53228b369506eb2a5bd5fc093c877e739b81978bb42c04e5b,2024-11-04T22:11:53.397000
@ -245735,7 +245735,7 @@ CVE-2024-10326,0,0,6eeeb54338e02e3b25be40bbf84444e0702dfe78c7e1bd0a270bb17e3e840
CVE-2024-10327,0,0,617a4d395486d23ce50d5a586c94c2ff3daf8827139e812231380168dcff8e94,2024-10-25T12:56:07.750000
CVE-2024-10329,0,0,94fb4c89783f4f56c3fde9a354774d639a28f26feb5034ca8d1df1766578ff46,2024-11-08T15:59:16.407000
CVE-2024-1033,0,0,0ebd094b5e36eb84c86356f7abcaa085e713213c3f39a08a73759a5dc273336c,2024-11-21T08:49:38.737000
CVE-2024-10330,0,1,5a6b498805190a6d27c6b3dd99e053fe1340d1097bc72765d56b15447b8daf2b,2025-07-02T19:47:15.657000
CVE-2024-10330,0,0,5a6b498805190a6d27c6b3dd99e053fe1340d1097bc72765d56b15447b8daf2b,2025-07-02T19:47:15.657000
CVE-2024-10331,0,0,545d86073c1b16b1e54e3aa12a73c5203a2e01c429347a56d6807bae364370b1,2024-11-01T12:41:51.470000
CVE-2024-10332,0,0,178b3b2d5779ad727e66a4d765c9c3bfa9f0c7bf18d561efe5247ecb16c1e02f,2024-10-25T12:56:07.750000
CVE-2024-10334,0,0,6fa8d04cf36ddff4c2f72241ffeda286c7e688d7b4196e8e08471b4591fd3ede,2025-02-10T15:15:12.010000
@ -246190,7 +246190,7 @@ CVE-2024-10759,0,0,bbdf7a44e2df17995fc3ce93c00f06fe8f2cedf5b3758258953dc660e3e73
CVE-2024-1076,0,0,d6b7d15ad0127ffcaf72f056aa57d487e659f735a80893cb5d0c07667a853d1c,2025-06-17T18:53:43.263000
CVE-2024-10760,0,0,0b9b500e1019eafd6e558ce9cb0f21344fc2e3c4d0abc286f58598dd4ef95aa8,2024-11-05T19:45:47.893000
CVE-2024-10761,0,0,1cb3fab5d6d1f4f7f5fdcb5b145372ea58104799dd3c3bce34e56dcf696afb62,2025-01-22T08:15:07.060000
CVE-2024-10762,0,1,e4ac77bd8763f10c0a337866ae7866ed197292b6f3be539a092c6f94d41ee71e,2025-07-02T19:47:49.677000
CVE-2024-10762,0,0,e4ac77bd8763f10c0a337866ae7866ed197292b6f3be539a092c6f94d41ee71e,2025-07-02T19:47:49.677000
CVE-2024-10763,0,0,c84b0255641931d082631abd1cc7fda92c4e46c5a769f1ed64c15028d182d08e,2025-02-24T16:41:26.690000
CVE-2024-10764,0,0,363554fdaa09a90549e37c839266df04a89856b50c0157bbb3a4b35036effdc0,2024-11-06T14:44:53.410000
CVE-2024-10765,0,0,e30cd9d11a555bed376192e628278e56ac69b3a29cb754ff08918d36a8eb53cb,2024-11-06T14:45:35.600000
@ -246572,7 +246572,7 @@ CVE-2024-11133,0,0,303e9becf34f489bb74b3f178e52cbdead1fcd42fc3bc65ffd28fc2c4e859
CVE-2024-11134,0,0,089169c177e677a380789df17eed101521b8b80a85cc2eaa375e39ac59d1ba6b,2025-03-04T16:32:22.030000
CVE-2024-11135,0,0,d8de5922b60e4931d635f75acddf5021e57eddeba122af8b647ceaee2fe873b0,2025-03-05T19:44:42.607000
CVE-2024-11136,0,0,14c34b52e51da32486499993d034c5625233241e56703eeb628fb429016a0b8a,2024-11-15T13:58:08.913000
CVE-2024-11137,0,1,d803a2c8858f9aae62999e4f57dd7cba3f86b49b95491d5c9ceb7a9a00881009,2025-07-02T19:48:23.140000
CVE-2024-11137,0,0,d803a2c8858f9aae62999e4f57dd7cba3f86b49b95491d5c9ceb7a9a00881009,2025-07-02T19:48:23.140000
CVE-2024-11138,0,0,2f34cc7cd067d0c6304b6c652f672298f3f38bc0e02398b29badaf312aaed525,2024-12-10T21:11:45.043000
CVE-2024-11139,0,0,2d6fd6ceae8e9f801cb28510138174f054ac674fa052625032eec6de670d70fb,2025-01-17T09:15:06.370000
CVE-2024-1114,0,0,26f8d922f7817a26291214f4551b12b577ca7b3e88078b0c0c71e617799dfdd6,2024-11-21T08:49:49.727000
@ -246742,7 +246742,7 @@ CVE-2024-11298,0,0,cd8027ff7c1e39b70cf43f7d5a6cec3a72565a042c79fb93ed3ff58ccba5d
CVE-2024-11299,0,0,5b4394fe2aa80862409246ed4c3feac26c1712c3bcb574f58a66e2a4a1c6972d,2025-04-30T14:52:15.387000
CVE-2024-1130,0,0,679ee2f34d13ebb9df2fe1e2f1252066bb0e47c7a2921656bbd7730c6eaa121e,2025-01-15T17:29:06.433000
CVE-2024-11300,0,0,17e6044959868c1f0bfbb5c535147bb16853bb47032cabda2a83334d5515df63,2025-04-01T20:35:24.003000
CVE-2024-11301,0,1,6225e7ece5150f1b1553eaf7df199f06f4f4064fb3a19ee088059485638e06b9,2025-07-02T19:48:49.337000
CVE-2024-11301,0,0,6225e7ece5150f1b1553eaf7df199f06f4f4064fb3a19ee088059485638e06b9,2025-07-02T19:48:49.337000
CVE-2024-11302,0,0,a9e7c5f35aa45cf3a68fe4e8a0b7ad7e381f05d31f40f556663ee486cb82ae77,2025-03-20T10:15:25.003000
CVE-2024-11303,0,0,de43b70f5f22d5d570b4c2c539e9b20cc817dc3ef76e189e06955f2c2af2eb2a,2024-11-21T22:15:07.213000
CVE-2024-11304,0,0,0ff719fe517b127c477c9f0080aa8ce846c0a32261aa4bc0cacd8fd67151b1ef,2024-11-21T22:15:07.470000
@ -247738,7 +247738,7 @@ CVE-2024-12251,0,0,f8224b4c39bb6ff66af3b002f83eca082baa817480b19609180c28190f340
CVE-2024-12252,0,0,f0cb19f49810803840f5ee985f8df8513974df82162830a7e3c14eaee14d9385,2025-01-07T05:15:16.660000
CVE-2024-12253,0,0,ddc85ae180bc30a65db67a43f7fe8d6c4299882333782166c00f6946fb3a98d4,2024-12-07T10:15:06.030000
CVE-2024-12254,0,0,976d5bdc66f5280972e0a945f02b4d24fbb18a073445a80e18a1cdb637f945ee,2025-04-04T23:15:39.980000
CVE-2024-12255,0,0,3e6ee7ef8ecf957b3c9750bb4e9452362942858fad7f6d35e3c4d339eaa5898b,2024-12-12T15:15:09.967000
CVE-2024-12255,0,1,f9e7fa18a777f074cf9f4ebb79aee4fd7bcb7bf62d73f2eb1283b313a6b11fa0,2025-07-02T20:06:31.637000
CVE-2024-12256,0,0,c941079a381520ece27502570cadaf7ad5874ae769a71d660938dc9b1a958440,2025-01-07T05:15:16.857000
CVE-2024-12257,0,0,51052901a7cca4cc3e08f8db1db23715b8800d7e5a86753505efbff635c332e0,2024-12-07T02:15:19.187000
CVE-2024-12258,0,0,3eb19625a1330fc72081e9c0b05d899d6c52aedf5334c3f98a645064595ca085,2024-12-12T04:15:07.160000
@ -248159,7 +248159,7 @@ CVE-2024-12658,0,0,660d38c39623ff82f2493210faedf64d2df3c4a27194d20971b3a3cbb4cd7
CVE-2024-12659,0,0,116b271a8259e00752a6db2ed55fb8c06bbe6ab2e35e4f94d9c78a27c4e7a0a7,2024-12-19T14:49:24.747000
CVE-2024-1266,0,0,2a4a1a9a97982898c100d9d9cb94e7da9ed50410ea3a8e686081520943168bc9,2024-11-21T08:50:11.767000
CVE-2024-12660,0,0,1be5de9c4da1baae53520340558ecfdc75e086a26bf9d397bc573d215373259d,2024-12-19T14:49:52.357000
CVE-2024-12661,0,1,57bc0c3e56680b2b26dbfdde9021c17660305f6013db1d413f20d673ca1f87d8,2025-07-02T19:09:06.467000
CVE-2024-12661,0,0,57bc0c3e56680b2b26dbfdde9021c17660305f6013db1d413f20d673ca1f87d8,2025-07-02T19:09:06.467000
CVE-2024-12662,0,0,7b96f34669085c4823ad63e363326704524182ece7e82bc08beba6f210f6c9ab,2024-12-19T14:45:43.547000
CVE-2024-12663,0,0,38c203f9613e213521137748477df599864fe9f022d1a6f0ef81d9fb28c81fd6,2024-12-16T20:15:08.963000
CVE-2024-12664,0,0,1756d032c2c12fb2b7ecf9f35feee6496c6bcaf3c242debe315a55e136b7d073,2024-12-19T14:55:00.460000
@ -248386,7 +248386,7 @@ CVE-2024-1289,0,0,f8c8a55f2a440d9e8129941363295ecfe343266b0f62bd6ed92e6812c89039
CVE-2024-12890,0,0,e2f73fdaf8c4ef5e556a453d5bfaa3f903b2ab4fd1e2980fe92a08675a75c831,2025-04-03T16:34:16.893000
CVE-2024-12891,0,0,b740369ab4eecee7f2ba03eeffe8e52609e68ff3d8a7086ca071eb45f72087ba,2025-04-03T16:34:08.690000
CVE-2024-12892,0,0,29c077f75a1118a1ed7617444ec6d09dcc3f84bdeae9786eea54babcfaef1c6e,2025-04-03T16:33:44.877000
CVE-2024-12893,0,1,c746937e54bfa12137a052a993d1b33568ea8fb9bb6bbfaffbab1300d47938aa,2025-07-02T19:09:29.480000
CVE-2024-12893,0,0,c746937e54bfa12137a052a993d1b33568ea8fb9bb6bbfaffbab1300d47938aa,2025-07-02T19:09:29.480000
CVE-2024-12894,0,0,1e10666d8acc6c61b752f325ab245ea683d5c0b34b3d8a2e36aed876a59d8d59,2025-01-10T21:12:49.420000
CVE-2024-12895,0,0,508317eaa9f408889cb5852800e668256aecfd2ec6475ea355129fcd0828dab4,2025-01-10T21:14:24.240000
CVE-2024-12896,0,0,ca6278e76b896e6f263468efff1622abbcaddec6824cd88839d8b751927785f2,2024-12-24T16:15:24.153000
@ -248703,9 +248703,9 @@ CVE-2024-1320,0,0,aaaef1a9478a9ac2768f9b592c02529e1f1a3518e3f017f4f309a188cefbc9
CVE-2024-13200,0,0,d822abfe6e5e94a697ac2e9a1763a17382b3dffc110b1c5388c29c0804177820,2025-01-09T03:15:23.820000
CVE-2024-13201,0,0,5d359878f9b931ff0ca27dbd2120d63d4ca3a12566a5da18deebf81e1b6c50cd,2025-01-09T03:15:24.020000
CVE-2024-13202,0,0,f279d957bc8c15549a1fec1f8d734e200c7292a1f3e6ec699b88a8730e6ea9a0,2025-01-09T17:15:12.110000
CVE-2024-13203,0,1,9705c29b8f871ad171b9611037f417cc06952b9e0e2c9a17f04e7637c3cf9fc8,2025-07-02T19:10:33.930000
CVE-2024-13204,0,1,8e44c9562524eef9dd90633de35532c3f176504884fae9d025814c79778b5e0e,2025-07-02T19:10:51.463000
CVE-2024-13205,0,1,dcea910338790025bd48cd39fb8d1254813858a4906d15f53839b63656fc82e1,2025-07-02T19:10:59.873000
CVE-2024-13203,0,0,9705c29b8f871ad171b9611037f417cc06952b9e0e2c9a17f04e7637c3cf9fc8,2025-07-02T19:10:33.930000
CVE-2024-13204,0,0,8e44c9562524eef9dd90633de35532c3f176504884fae9d025814c79778b5e0e,2025-07-02T19:10:51.463000
CVE-2024-13205,0,0,dcea910338790025bd48cd39fb8d1254813858a4906d15f53839b63656fc82e1,2025-07-02T19:10:59.873000
CVE-2024-13206,0,0,38f706ce6b6c370d84f9fdfa1a0fa83d7b17374dd65798f61119206bb3782636,2025-01-09T04:15:10.990000
CVE-2024-13207,0,0,3dd3df33280782bf57f7214c6ae8f2fe091c3ded8c8b55211d10abd97ff87f20,2025-04-29T20:11:23.573000
CVE-2024-13208,0,0,fbcc7fb88734920ac7622aaa96691cf6208c93c520208996bfc4dbe74f31382d,2025-05-14T20:35:16.690000
@ -259223,9 +259223,9 @@ CVE-2024-31652,0,0,cd620e76c3a3b5773fd0b42a3a685acd481dec307908c8df3a6879a1a3b7b
CVE-2024-3166,0,0,7c4799e6f2d4de4c6793757b3de0601ca1d1298c8c6272ffb0dc9b3a0678bb7b,2024-11-21T09:29:03.133000
CVE-2024-31666,0,0,9feb924667e4d55fe73065a5c4296ea21e1ac0f03e29d40ad28b081993f9d303,2025-03-28T16:00:36.103000
CVE-2024-31668,0,0,92d852b5513f85b46c5c8aacca49dc78103d1045b501ee09fe75860fd2d477f4,2024-12-18T16:15:12.693000
CVE-2024-31669,0,0,e67157c072d6472b13e8463ea23f9b22948945715ffb2a3485fbc46118d6e7b5,2024-12-03T16:15:21.540000
CVE-2024-31669,0,1,7c7c298661c05091696213a278cebfe5e8ab98503171568287612d5df4b82ef1,2025-07-02T20:36:02.780000
CVE-2024-3167,0,0,b0bdf42e92bad376276c8af48f28639bc7025690df7bfcbc255509f46b757355,2024-11-21T09:29:03.290000
CVE-2024-31670,0,0,485c6b39a9c06c65b704780df5587d61e2c68aff13a9abfb705a544147e51149,2024-12-13T18:15:20.167000
CVE-2024-31670,0,1,1b78a8a9417b6d13f96bde82954389cfce36a53143f6ff2e04417fee86967b90,2025-07-02T20:05:47.947000
CVE-2024-31673,0,0,daaabfb840b3730af21ab36c24cc562730d3a8e824427e5f8ad6fa6a3f345120,2025-06-17T15:05:11.003000
CVE-2024-31678,0,0,4d44fd7de319bb3c3e3ca325e023129ab6329704291ba3ed2bd041396946b733,2025-04-08T15:20:02.083000
CVE-2024-3168,0,0,877aaf095d6020a88ac424b786e5481114bcabd626ac29a10ba6589de92c2016,2025-03-13T14:15:29.337000
@ -263087,9 +263087,9 @@ CVE-2024-36618,0,0,62c87a1bff03a64e4f28a666c51b4b62b72812b9ffc80282cc17dc0940ecc
CVE-2024-36619,0,0,25c66a36cc573eb50e022a289bcdcf146eeaea7df50ea0a14f20d5577424d417,2025-06-03T16:06:04.510000
CVE-2024-3662,0,0,8d6ed9bf9906e37e9ee1a22ecd8054bc46ce6b65afee8d23661f06eab90c13fc,2024-11-21T09:30:07.787000
CVE-2024-36620,0,0,e7fadb7af6f5a78b8c55d69ecbdd641820ab4cc821b26169ef5eb1f1ac8b3c39,2024-12-04T17:15:12.890000
CVE-2024-36621,0,0,aaf0328dbf2afd58578f5ffa16091dd967860c37f203448fdc0268c980dab4ef,2024-12-04T17:15:13.067000
CVE-2024-36622,0,0,07de4151f2340ac6d06674e425feabdd5df0677a18b73b685b4c7de1fe1f2642,2024-12-03T16:15:22.343000
CVE-2024-36623,0,0,2efd80dd8d9bbbdca40b71283df2be6fa3e1bbaf45e89ff3c5b0919eb6fef43d,2025-05-01T14:15:35.340000
CVE-2024-36621,0,1,f9d2908d14ad8cbb33679837d43a275001af76a8287a86296ace9e6d4aae74d7,2025-07-02T20:43:30.047000
CVE-2024-36622,0,1,ee8ef64e9d1ab4e12eadc6267b66dea36560b42ddf16b4d3e246de2397ca176b,2025-07-02T20:41:55.433000
CVE-2024-36623,0,1,3c51c7d22761c4b54b8bc7bbdd9ff83d36237169e2d8b8d161c831f7f374a346,2025-07-02T20:36:45.220000
CVE-2024-36624,0,0,fdc7f23fbe63d2cdb59da638c84f39b48f5c43770d98e1865c028f25cc604428,2024-11-29T19:15:07.923000
CVE-2024-36625,0,0,4a041487d3f029331c4bac0b4c0a56e68cc15b0c6d2de96e45c99b08fcea151f,2024-11-29T18:15:08.607000
CVE-2024-36626,0,0,ddfefccb9c7c111af71afd167e3a259095102573d138ddc44028818aa56910d5,2024-11-29T18:15:08.840000
@ -263696,7 +263696,7 @@ CVE-2024-37373,0,0,2847e99c027e210636b1d596d67704fa58348616cd3faf9bd4b3793a4d930
CVE-2024-37374,0,0,a3f6a856277d969b5278070e608360817edf02cab5ccf8d8f18d5284d45c7fd7,2025-02-15T01:15:10.570000
CVE-2024-37375,0,0,8217c80f0bd457ad7fb99331336c4763aefd1b5314374f4e51de6172c1073d6d,2025-02-15T01:15:10.650000
CVE-2024-37376,0,0,daf6c4d98c4582c652276d94c5995189b0a6fd61725f60a72793dd5b59839fb9,2025-05-01T18:01:46.330000
CVE-2024-37377,0,0,caef14ff514966e0f1ee38c7ff4edbc7bd09ca12f789eaaa3ae9e03a1f92295a,2024-12-12T15:15:13.500000
CVE-2024-37377,0,1,a16ab8135cd25161e11b9211eb78f67c2eee50fb73a0b380f70e60012132a023,2025-07-02T20:26:04.183000
CVE-2024-3738,0,0,6b7c5ee43d749786d04736c3425539aee3d10b90489eb5acbf775617e1e2b292,2024-11-21T09:30:16.940000
CVE-2024-37380,0,0,77cf3dfb25923a81bead84472c82f0af78f2d433b4d7604e764b919f8522c470,2024-11-21T09:23:44.180000
CVE-2024-37381,0,0,9f8a1e24016e672c46f9ac1942c6c3e469697399412e29900bea76bbfcf0caef,2024-11-21T09:23:44.310000
@ -263720,7 +263720,7 @@ CVE-2024-37398,0,0,0f42760c0326cdea8f98f78b855bbf63b71770b97a72517371b459e84e271
CVE-2024-37399,0,0,91513a99b1995bb678a44db233b24968cd7625f00c77086c4c8d80914d8fefca,2024-08-15T17:31:49.067000
CVE-2024-3740,0,0,f1db815ebd196c841f9a03e4af1f223458e4ef3810b51b1b12ab408848abbe0e,2024-11-21T09:30:17.230000
CVE-2024-37400,0,0,1e14e88d44c848ea44c9bbe92279b9c2f34340798a2cb3eb210a97ba1aa452e9,2025-06-27T18:46:03.483000
CVE-2024-37401,0,0,5a3af3f5613cf18b6fb0d152156b5ab3157faa43dbf40e0bf8bbef7d6755b5e1,2024-12-12T15:15:13.877000
CVE-2024-37401,0,1,5d6699101ec368a4740a824e0928a231ad40e96d0b2a93b33a6f4100e5f3fff9,2025-07-02T20:07:12.820000
CVE-2024-37403,0,0,5e662ed809b0b10e6b99aa8c2f4ac8b35c922847c3b6d64b5b20add4d0709792,2025-03-25T17:15:57.523000
CVE-2024-37404,0,0,cb110a34d87f4812dc406a460298c89dd3f74daf508e6083996d73ed421121f5,2024-10-21T17:10:22.857000
CVE-2024-37405,0,0,3fb82c05472465d4a94ae43ca82eb762e9089f45f86f1b3cd3cb77a2d12c0c24,2024-11-21T09:23:47.573000
@ -269762,8 +269762,8 @@ CVE-2024-45201,0,0,1008d923104020063a79ec3ff9863805234d3d78944913eab118b0fc97b0b
CVE-2024-45203,0,0,88d501dfc424f0e16923ae703e15eee937ae6b3d90cede56c1d4b11c192d7644,2025-03-13T20:15:22.630000
CVE-2024-45204,0,0,c17d724ab71326993fc885d0d9808c0b2eaae94c47b7923f22dde16d2eff63f9,2025-04-24T16:59:33.837000
CVE-2024-45205,0,0,a10f061421a2a3424e1b6c374ce4a524c46fcb2bdda2afd1dfd63ddbb6391abd,2024-12-04T17:15:14.330000
CVE-2024-45206,0,0,d9e968acf0dd8b42fc18894be4d96b31b86b907e5133e5110d37345500c02d41,2025-03-13T19:15:48.013000
CVE-2024-45207,0,0,c6ee04eede270568245ffcec461ab781dd5d887b6f188268b86eaa3a09be9e39,2024-12-04T16:15:25.580000
CVE-2024-45206,0,1,59696493804a40bc8906cc19858af6db25f4cab9c3124ecf5e6625ca82a947e4,2025-07-02T20:34:43.323000
CVE-2024-45207,0,1,f931bce30ac6ec0212eae4286db6adba9745eb0609af5ad3101b7112da783af9,2025-07-02T20:29:56.867000
CVE-2024-45208,0,0,db1fbdffa5214c693071c57618b5195bfb9a8bab8d8ca4cc65fac4eeef686294,2025-06-23T20:16:59.783000
CVE-2024-4521,0,0,4a1a789411022da9e12743f86f636c858525a8f77c0a3180e65a51191dfff476,2025-02-19T18:01:20.563000
CVE-2024-45216,0,0,a409e39e2e64d050771f416dcd29e4ec99d053af119629d20c842c9e04bc2f80,2025-07-01T20:28:13.847000
@ -270025,7 +270025,7 @@ CVE-2024-45493,0,0,63ded12e1cce66753793ae82bef6c61efd91f10fe98a5bd1c054c3ddfbe0b
CVE-2024-45494,0,0,e62b8176d74731dfdb1c9ebc3d4575fcabd14aac12deeb9776633eac1b50aecb,2024-12-17T19:15:06.497000
CVE-2024-45495,0,0,052cbd46ff58a2733b006c164c39180c42ff3c9c0f05edf173b6ee70b661cd18,2024-12-04T17:15:14.537000
CVE-2024-45496,0,0,f647c5447ed213c353caf91ddf707bc78331ddddcd98c233146cc0a0d9ee301a,2025-01-09T09:15:07.600000
CVE-2024-45497,0,0,53a7f15546741074e12fdf12aa0db1b6ceecb91ed174d672eb3ba1967d3337c3,2025-07-02T09:15:23.290000
CVE-2024-45497,0,1,27067e5a7e8ca6f8560a908cfbd7cb8ad5ac323dd2ef2c71ed66f5404b6f4758,2025-07-02T20:15:29.150000
CVE-2024-45498,0,0,1b37b8abea607b55d06bdeca0f52a798741defd10e0d0992aaa1892048a4a705,2025-06-03T21:12:43.280000
CVE-2024-4550,0,0,d020c2baa57a4c8c78c6437cdbbe1c555a0bddf99dab5627801ef1d8b20c6e80,2024-09-14T11:47:14.677000
CVE-2024-45504,0,0,117e3b0ea98f4e26734959281e27af071785e94eccc716f5288207bae003b1cf,2024-11-04T21:35:09.173000
@ -274004,7 +274004,7 @@ CVE-2024-50695,0,0,a8e5ee5cc10be805e3c4e996405c61809a60d1d6ddd9bae02633187192d0d
CVE-2024-50696,0,0,49d7ba99b4ac37eed2a024d1d30c4a422fa564603999c94e5aa233896ef00f04,2025-04-07T18:48:52.107000
CVE-2024-50697,0,0,51d665dbeca89a90870b833eb56e0b112fdedf1185882e0efb70f0cd1cbfd406,2025-05-29T16:02:02.670000
CVE-2024-50698,0,0,7e1e58e2fa9dad0c12ad8622265abb94ccbd43282e31206a6e7638cbcbb39c14,2025-05-29T16:01:55.367000
CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e02651cc,2024-12-11T16:15:12.720000
CVE-2024-50699,0,1,90b0d7dbae9a9ca912ecbbf7a7a08214d658cc8df69b04058b315d57da5437b2,2025-07-02T20:28:26.957000
CVE-2024-50701,0,0,a80b1dc6acfa0163b2b418f9af2de103abd46652e86be76b69c935d1bde098bf,2024-12-30T16:15:11.387000
CVE-2024-50702,0,0,364da4b19de28c5c7b507be40fbdae2c11e3df8d6828b6df401d4df157b3f54d,2024-12-30T16:15:11.550000
CVE-2024-50703,0,0,e1914095d1b7a0ffe223f333a29d6d8f0777fb87821c72e0f90605f07525e975,2024-12-30T16:15:11.713000
@ -280462,7 +280462,7 @@ CVE-2024-7472,0,0,de0c1c1a6d606e95989fe7fe23b929a31aec4fa2eabaf43817b16d02244205
CVE-2024-7473,0,0,b8dc981d2d85278013abb8b222f018481282dc1a8b74ff93c8c1b319e96a9851,2024-11-03T17:15:15.493000
CVE-2024-7474,0,0,4bb7bfd29d1bc5751b49854603ab81b86841ddf06908a96e8a11dc8238ed09e9,2025-01-09T18:15:29.380000
CVE-2024-7475,0,0,7bbd1b2dc6caeee9f6f7cf58e1447eb5146831b0c5f989701c0b6c3d0833ecff,2024-11-04T13:55:37.233000
CVE-2024-7476,0,1,11ed9f196a60a925bd68ba4f51a007360d4e4c3b5f7bbf94aab2604fe522073f,2025-07-02T19:49:07.510000
CVE-2024-7476,0,0,11ed9f196a60a925bd68ba4f51a007360d4e4c3b5f7bbf94aab2604fe522073f,2025-07-02T19:49:07.510000
CVE-2024-7477,0,0,6c6434fc676e81002c750c9627714098eaf963ca81b6eff0a8aeb3b62c2e1988,2024-09-11T15:03:06.637000
CVE-2024-7479,0,0,2ea71efff98f3f4975f4e7b351509dce6668cdd1c5b196a9e030ff840526ff07,2024-09-26T13:32:02.803000
CVE-2024-7480,0,0,889913e08b28911ab727e916e197e7a32d9902edd6649d9f23fe700790b2a411,2024-09-11T15:03:37.293000
@ -281683,9 +281683,9 @@ CVE-2024-8759,0,0,8f91dc531a873b29dfdf6fbd42af16f8d3159a182f0ca9db9db9f35e40cdf8
CVE-2024-8760,0,0,f43fa3e1b72e595062f394352cfb1e3caedac57a707088dc78ba85c7fa736094,2024-10-15T12:57:46.880000
CVE-2024-8761,0,0,950b3a9df3cc991d5c0bedc660970e758785bfc0f8e6d816aeaf43e66fff13f1,2024-09-27T18:41:43.043000
CVE-2024-8762,0,0,3b421bee27666c9e7bcdd06dc59315fa24346e5ae512b3889caf5a60eb7e32fc,2024-09-14T15:54:10.687000
CVE-2024-8763,0,1,9841a18e4cc930f4925ff99f7d7ae8367c238719036df31068ff81343f9ff5b6,2025-07-02T19:50:00.760000
CVE-2024-8764,0,1,95b4c496f3a932b56f69def6b05425d870ded9788671f9813e48047637114ce7,2025-07-02T19:50:32.273000
CVE-2024-8765,0,1,e2d80212eeb336f89e52548d9b96ab4b32fb82b57dfd293f0262e945a0e39542,2025-07-02T19:51:11.997000
CVE-2024-8763,0,0,9841a18e4cc930f4925ff99f7d7ae8367c238719036df31068ff81343f9ff5b6,2025-07-02T19:50:00.760000
CVE-2024-8764,0,0,95b4c496f3a932b56f69def6b05425d870ded9788671f9813e48047637114ce7,2025-07-02T19:50:32.273000
CVE-2024-8765,0,0,e2d80212eeb336f89e52548d9b96ab4b32fb82b57dfd293f0262e945a0e39542,2025-07-02T19:51:11.997000
CVE-2024-8766,0,0,6a1d0fd4381a2aefa3c3ebd3af5a6a5535392c6f90911151b52ef1d8a2df5478,2025-01-02T16:15:08.817000
CVE-2024-8767,0,0,33d117715b6ccb12375aec292e3823ec127bf8cb9f35e261208b79e9c4041c2f,2024-09-20T12:31:20.110000
CVE-2024-8768,0,0,68f3eb07488e96273391cb6bb54e3745accce33e0ac973772852eacb968b15fb,2024-09-20T12:30:51.220000
@ -281844,8 +281844,8 @@ CVE-2024-8924,0,0,fa653b47436154676c3f1b541069065d978b00290a8ee89e15492973ea1ea9
CVE-2024-8925,0,0,f8e6224c919b32dad944cbb3d7da3b4d7b30369cbcd1a2c103a12e6bb26c7138,2025-03-17T18:15:20.433000
CVE-2024-8926,0,0,fb965ebd8a92fe27f14e71c494d4747397dd6fd47d2404bcc941456ac9c9eaeb,2025-04-24T22:15:14.663000
CVE-2024-8927,0,0,aafe8ef71dfcc052ecaa8fa4a1e0007cf5cf5ad740e9765835524ef8a42eab43,2025-03-18T17:15:44.707000
CVE-2024-8929,0,0,ff6a045732aac1c81eaaf843b68c1293fe05ebd7ecf4460b6fec091ede522e48,2025-01-10T13:15:10.460000
CVE-2024-8932,0,0,c5fffc9638f172950dd3b0bc71a124092612a89bfe67c2c048ea6a2b2b43d457,2025-01-10T13:15:10.617000
CVE-2024-8929,0,1,b9d81acd55c07a73552846699b7a13b15a1e733925c70fe38246b0610deb010d,2025-07-02T20:11:20.063000
CVE-2024-8932,0,1,404e753499a4a20ac9ba63130e63473ee83f2dbac0e437e544448ff8f6952c8d,2025-07-02T20:08:35.010000
CVE-2024-8933,0,0,e152f6df34730481cad628f83b188861c2c7c15e75dea66549d9b61f891274d1,2024-11-13T17:01:16.850000
CVE-2024-8934,0,0,ef1f8f6984d6b9c4cfe47d2ed66bbef40367f32f9c9af452fc22ae5c4812c362,2024-11-01T12:57:03.417000
CVE-2024-8935,0,0,3134dacd24f5b1cf37b3337cc4cd7783ada25f9c365ac8d35d10490670825111,2024-11-13T17:01:16.850000
@ -282874,7 +282874,7 @@ CVE-2025-0069,0,0,d7ac8ba36cfcab8a8836c1588e52e8bbaed2d415e393c11bf82b7bb82617b0
CVE-2025-0070,0,0,dbf9edc467887c587ee503735d983d3eb618b4cd55fb133fb8e2178f124d6f6b,2025-01-14T01:15:17.427000
CVE-2025-0071,0,0,a9f17b8587d9681508885fa05b5cb6e1fb480f5738675f612162a9b567f90271,2025-03-11T01:15:33.917000
CVE-2025-0072,0,0,7c68681d522f867cd278cffcb4470ef78b9648796a6206167a2247ec164299a1,2025-05-12T16:15:21.587000
CVE-2025-0073,0,0,f6a29770af6bbc103680f6db7dbfc3d85fdf01358f971fa2c75114246009b84d,2025-06-02T17:32:17.397000
CVE-2025-0073,0,1,dada6658789f56fb64564197f1ffc1b8028bfb6db99ba6cd6d93031c5a423beb,2025-07-02T21:18:03.963000
CVE-2025-0101,0,0,391653291dbc9e356bdd9f7cf48cb4ee16c22960b84cfac559c323183419fbd8,2025-04-16T13:25:37.340000
CVE-2025-0103,0,0,06fd8d922bac50d8ab7e8102b5457a5978f502265c9b1059554ccaf6e0c9679c,2025-01-11T03:15:22.020000
CVE-2025-0104,0,0,dc4c81878786bc602ee20c50b1dae485c1da904352cbab72ccb96b2a9dcd9e75,2025-01-11T03:15:22.183000
@ -283454,7 +283454,7 @@ CVE-2025-0814,0,0,275433a2e2c23056d581480e8763e8e9197d76ff67d734aa21e397b5cac2bf
CVE-2025-0815,0,0,f73b50d64016c2e64fd2df2d6c90edb74018594168bb3b9f019d2de177423288,2025-02-13T07:15:11.160000
CVE-2025-0816,0,0,d49cff9b1300ba83e836640c26fee4d28d3c84d54249c4f7af3bef6763c2c81e,2025-02-13T07:15:11.353000
CVE-2025-0817,0,0,11343ed20662b8da62be45ff4c13d864ae4d9a05be3d231b0a3e4a5cb280e5dc,2025-02-21T12:15:11.963000
CVE-2025-0819,0,0,bdaf17bf70e25617b1e90a1272039a5410ce1c65c874d7bdd41c6cb02c05003e,2025-06-02T17:32:17.397000
CVE-2025-0819,0,1,528b6ca4483b4651cbe9a0a186ca398be698967851a1a8e2364971c90f5291f6,2025-07-02T21:18:07.187000
CVE-2025-0820,0,0,6d45f28eb00b0039ad804e065c885bf40234d2bcc3aa26a58867a7f5eaafc285,2025-03-01T05:15:15.953000
CVE-2025-0821,0,0,276d38f36e1718392d91943f87a21d4117bd30970ca15dadffff44ef97d51e0f,2025-02-25T03:42:52.263000
CVE-2025-0822,0,0,4c844a6713ce2631895193eac241699c6c3839eb1c8dbea359488af5de55887f,2025-02-24T12:36:46.670000
@ -283657,7 +283657,7 @@ CVE-2025-1070,0,0,63c9f6366f7886d6af04d22c614f55b0f42e20f4e6634878d1102f0014dfbf
CVE-2025-1071,0,0,ec670b61a4cae3c6bd1b5d7c58db808e7643f8c91b0bf1aa44c5e336a078699f,2025-02-14T14:15:32.560000
CVE-2025-1072,0,0,bb0514ae35802411e3da1596896cb302b1b469b7b79e6814634b3c15db99cbed,2025-02-07T04:15:07.737000
CVE-2025-1073,0,0,60172e8f6f7042a3e0dae5bdecfd8cea2f2f414971078e028146b285831b8bc3,2025-04-11T15:39:52.920000
CVE-2025-1074,0,1,fa27fa0c9cb977dbec9e01b7e0e09573d564049dce536c4e96cb4da4f04b16cb,2025-07-02T19:11:15.693000
CVE-2025-1074,0,0,fa27fa0c9cb977dbec9e01b7e0e09573d564049dce536c4e96cb4da4f04b16cb,2025-07-02T19:11:15.693000
CVE-2025-1075,0,0,797c9475355694050b39edcabe9ae24db6febfe58de9ae04f1e1ad1e92e5bacb,2025-02-19T10:15:09.043000
CVE-2025-1076,0,0,0fb5ade089952c20fae90954aaa2f08206a3bcb696af25bbf4ec969a8662af5f,2025-02-06T14:15:30.287000
CVE-2025-1077,0,0,88be144d908f74868edd4d84609ed66b73f57b9c8388994c4810420e7c62d244,2025-02-07T09:15:08.380000
@ -283802,7 +283802,7 @@ CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa
CVE-2025-1243,0,0,b36908327b1b41fa664c4a39c71934592fd1d75bcc40ba67f7d64ed64955da7e,2025-02-12T01:15:09.073000
CVE-2025-1244,0,0,ca7dde03c53f2f538c0b12fb599e84ae66a426ff6488b7e67f4989aba1f7a6f7,2025-03-13T14:15:34.977000
CVE-2025-1245,0,0,02f6531ee412acf536871fa74be895340813b85f3805e0a3e6f8a053107da143,2025-05-16T14:42:18.700000
CVE-2025-1246,0,0,266a95be5134ef4b55d24992997b7f1229c8a727bdfdfdf4f14f294d872f0d25,2025-06-02T17:32:17.397000
CVE-2025-1246,0,1,ba71751fa27047f7c79c3e8dc96ae22f8996ca289dfa9df416ee4c290be2b815,2025-07-02T21:27:05.870000
CVE-2025-1247,0,0,413d4bcd6e00b55487b15f2b541fa31d8a6169438afa6345f0107f85b8ddc727,2025-03-03T14:15:34.120000
CVE-2025-1249,0,0,6a7f3a2500b58cdcea7c9e46385c15368818268591d8a8d12de3eb4b42bd3d72,2025-02-26T15:15:24.470000
CVE-2025-1252,0,0,eef150a4ad81125836b2e5c10bdfbfd08634b9526bf9de1f39407e70823ba714,2025-06-05T14:31:07.047000
@ -284200,8 +284200,8 @@ CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e21
CVE-2025-1730,0,0,1995ccb1e144a2c7a6984fe76cde065e7b6f85edc7bf90ff89583ed751f146df,2025-03-01T07:15:11.380000
CVE-2025-1731,0,0,6cda5a39952dbb72fa0562ae6653e830de6b4814d02aafc6e5dc87eccf1d921b,2025-06-12T07:15:23.537000
CVE-2025-1732,0,0,4f17f76249b0949cdce334206f9e87f9bb21a194c5034bf6b38b1f20a234be49,2025-06-12T07:15:24.120000
CVE-2025-1734,0,0,dd726e0e9f8572ae11922e7390e5eb39ee22b5717e7e4d56ed056f32ac64ca1e,2025-05-23T14:15:26.087000
CVE-2025-1736,0,0,a8a0b6e522595e6c6789f877a806c710ab0238e7a997a6d116d5acfa113937b6,2025-05-23T14:15:26.203000
CVE-2025-1734,0,1,9ca53d91c8f07fb7aeb2fb76e0c547c53292f2008c24ec1e6e7dc553df762068,2025-07-02T20:13:31.447000
CVE-2025-1736,0,1,2cb7db9ff654a6577a0a5fca10cf4357e9656f3556a748e86223fabf40f575cf,2025-07-02T20:14:40.817000
CVE-2025-1738,0,0,88cd928ab6b3e7b21edc6d43e0b3a3d2962b8b23417ddd8c84224e61394ebbde,2025-02-27T13:15:11.720000
CVE-2025-1739,0,0,3fd0271bebf5dab4e4b7dc5bc9151c4b432e19911079ec61b281141a587b7651,2025-02-27T13:15:11.883000
CVE-2025-1741,0,0,e3cefbac58ae300d7a16e849817a4e07ca1da020b4a797f97ccd724d6b4aefd2,2025-02-27T16:15:38.930000
@ -284305,7 +284305,7 @@ CVE-2025-1857,0,0,103488c59c7a3d799f85f8b3efbe569a5fa266b7447ed4b764264983fb4cd7
CVE-2025-1858,0,0,d219d72b5d3e367e984fc9a00844c02aab063afaf214c90b6e3c689da36b22a1,2025-03-03T09:15:38.857000
CVE-2025-1859,0,0,715968264e27416be4e429a636c651518503d08e64cf5ab3dbe6a5fa99ff6b6b,2025-03-07T14:13:19.170000
CVE-2025-1860,0,0,986db9034dd4736f004df6791bb74c7adef99a61d4693b6737c6f7fc4ffbb052,2025-05-12T16:15:22.170000
CVE-2025-1861,0,0,364f3b6bd4e38a4ff44cc455b88480ffaa5b0a11bae05538d89afdc1a809f552,2025-05-23T14:15:26.320000
CVE-2025-1861,0,1,d588036ac40432e2fee376ea3e3321747bb47a31f0304293b6e450d4a10b85ab,2025-07-02T20:17:38.193000
CVE-2025-1863,0,0,58913d0cdbc19b044a0ae40116888b87bc7f9f8b2879c510a7e2907cf0a66748,2025-04-21T14:23:45.950000
CVE-2025-1864,0,0,1521ea631a62fdc5c10914bd32f7e46bc38cfd57795522efc4e14681c16c00ac,2025-07-01T14:55:32.677000
CVE-2025-1865,0,0,179ef00ae451af792a624f7eacd4e1dcfb5d9e6f54597854dbd2ec89833d4411,2025-04-07T14:18:15.560000
@ -289537,7 +289537,7 @@ CVE-2025-26876,0,0,684f7a7019e1ec0a8365c1fd8b8ec9cf15327b5b9ed01836c80ba8ecb2aa9
CVE-2025-26877,0,0,b6bbd106fc09effb170ea41e4eff1e72fc5e0e40d7a5e670464380cec25fedef,2025-02-25T15:15:24.380000
CVE-2025-26878,0,0,b83c78001aed3b72257afa473beed64325520c746080d9d4c55fc0721207cb83,2025-02-25T15:15:24.560000
CVE-2025-26879,0,0,ff13b8336e93c3c4112258e1261f28d97f76ce67ffc3e5951e1c9eced4ea0dc7,2025-03-03T14:15:56.213000
CVE-2025-2688,0,1,df9fbd881c0903a7e1840c86191135c0e3ef5a103499e72c1374800ca40be24a,2025-07-02T18:03:25.497000
CVE-2025-2688,0,0,df9fbd881c0903a7e1840c86191135c0e3ef5a103499e72c1374800ca40be24a,2025-07-02T18:03:25.497000
CVE-2025-26880,0,0,da84e2330a560f7b1855215c494200741db29c3a24f93ba76a255f39bbbbece3,2025-04-16T13:25:37.340000
CVE-2025-26881,0,0,921429dd5a0c5a1101d4da691445afee44c665c84de754602fbf841d0217b94b,2025-02-25T15:15:24.690000
CVE-2025-26882,0,0,7062fd0c75af34ccf6b6ec2ff75c922493b57ba8fdc01187594aa2fa72d319c7,2025-02-25T15:15:24.837000
@ -289744,7 +289744,7 @@ CVE-2025-27136,0,0,c01448066d938a954aacb43927a32ddc1070de1cae5a8be4183115a3e5216
CVE-2025-27137,0,0,5824d60f023fc733adf708b73443cf5ddf0a1c321fa7b10d5058188a954ef313,2025-02-24T21:15:11.213000
CVE-2025-27138,0,0,51df3b05aad41c98a88fe0b061ed7e110b02a2b2eed44112c3eb8d323dce6520,2025-03-21T15:22:28.790000
CVE-2025-27139,0,0,b35d01c363d768feea22a1a4baf4d96af8539b18da2c1e17aac951b9b3709d79,2025-02-28T13:55:46.533000
CVE-2025-2714,0,1,df9ea0f742d96e2adc4020cdb7c6f94de38301f10e5d53c30c9f52fbf987a9dd,2025-07-02T19:11:51.457000
CVE-2025-2714,0,0,df9ea0f742d96e2adc4020cdb7c6f94de38301f10e5d53c30c9f52fbf987a9dd,2025-07-02T19:11:51.457000
CVE-2025-27140,0,0,fc1e0ec308089fd541d5158018c00bc169df7e00ec8cc3330ecb17a15d6f21a7,2025-02-28T16:35:12.980000
CVE-2025-27141,0,0,a447ac927713f36258c6b25c5f083c429dfe0fb04b42a5d1767a162b87028124,2025-02-28T16:24:18.650000
CVE-2025-27142,0,0,1bb5f40990adb8c35f5889afc7c3575d307334e192075d779b188f2171513971,2025-02-28T13:50:54.373000
@ -290884,7 +290884,7 @@ CVE-2025-29529,0,0,131ba8e09816d09cacfdacbc1b605e02d00f30b0838eb43d19239f9695636
CVE-2025-2953,0,0,67c63f73a2bad438c65b917bf9a538e529ded5fd2828dfe2a2982ca0c2662c95,2025-04-22T12:15:16.043000
CVE-2025-2954,0,0,0672b048d9a1bc1b6cab4c4533c01031021ece5eaf46619f3aa405740d82e196,2025-04-15T17:57:44.213000
CVE-2025-29547,0,0,aa60854d017a9798e6777b390c1094114e4d0521b16eb135eea88d0b1da0a19c,2025-06-23T18:23:41.120000
CVE-2025-2955,0,1,ae0098f14cc539866dfc24b906cab2145f36ba1504dd8a9ee610f2bdc6a2a1d5,2025-07-02T18:04:07.640000
CVE-2025-2955,0,0,ae0098f14cc539866dfc24b906cab2145f36ba1504dd8a9ee610f2bdc6a2a1d5,2025-07-02T18:04:07.640000
CVE-2025-2956,0,0,12b742621d86c28d988776b85da597ef776ef6fe74e703c6823d14feeb258af7,2025-04-01T20:26:30.593000
CVE-2025-29568,0,0,3b23dcb888abcc37f1444d0fc863cef625a6ebdc671441b643f7de7ab4accc97,2025-05-14T13:09:12.467000
CVE-2025-2957,0,0,d90251765154920d1060d5e6f1781980ec9f028972bb25184edb9ab3b3acf04f,2025-04-01T20:26:30.593000
@ -293479,8 +293479,8 @@ CVE-2025-32794,0,0,15f940929f35bdb8def3a5939321437a8ded7053db5533722d2bdb036ad0a
CVE-2025-32795,0,0,3226787ef9fde307f13d92b52c13368891b70059c6d43e363196d275603a2be2,2025-06-19T00:25:59.333000
CVE-2025-32796,0,0,20ed07849a09b1f538632557f0ede2b9976cfa2cb03f0965ae7b2114a9dbac36,2025-04-30T16:12:32.757000
CVE-2025-32797,0,0,39a1453b6f2631a027a7807128ca6c2891d742d8758fbedb098024372cb946b4,2025-06-17T20:50:23.507000
CVE-2025-32798,0,1,9407151681d732db4f4b5e97951401f98ff95fb1516d1e5d4816cfb40cac18a7,2025-07-02T18:21:45.133000
CVE-2025-32799,0,1,e869b9d8fcc430e1c2795fb35d5e0aa3be352f16e50b12310082045cbc70e2a7,2025-07-02T18:12:39.140000
CVE-2025-32798,0,0,9407151681d732db4f4b5e97951401f98ff95fb1516d1e5d4816cfb40cac18a7,2025-07-02T18:21:45.133000
CVE-2025-32799,0,0,e869b9d8fcc430e1c2795fb35d5e0aa3be352f16e50b12310082045cbc70e2a7,2025-07-02T18:12:39.140000
CVE-2025-3280,0,0,bbfa48dab65dd8e30d4af992e1eee1a23f41dd90ea1a7ea7a1775416dce3500e,2025-04-29T13:52:47.470000
CVE-2025-32800,0,0,e753f34f7c42d4666d6bce3002ee2779f11bd28dcf07a2833aa1c4b318c92022,2025-06-17T20:50:23.507000
CVE-2025-32801,0,0,6146013012d0cc266cf2a68a1cfcd1c7bf0ca9e930c722235f6d34464ee53a2b,2025-05-29T14:29:50.247000
@ -293859,10 +293859,18 @@ CVE-2025-34070,0,0,47207d5ee1b0a71e1e9c5d5e77d6671366cac2a9ddc16a23d5790cb18a739
CVE-2025-34071,0,0,d5f2123198e3e31dbb6015474f33f67a7d06e2e32e6e418e40981220ace5d68f,2025-07-02T14:15:24.667000
CVE-2025-34072,0,0,4af0fa0afa5efa1a0910d60d94c8609fe067147223eb06c75d936925a073cf51,2025-07-02T14:15:24.817000
CVE-2025-34073,0,0,a16ab3d23c59acfb344a3dcbf7457a63d81df4c42fe785cea9964f2d0f1fb835,2025-07-02T14:15:24.967000
CVE-2025-34074,1,1,c9bed057c2dd103eff6868716b6ebe9755e961ad12da88dcec416d293e283f1a,2025-07-02T20:15:29.410000
CVE-2025-34075,1,1,46b05ba8ed0540eaca2bc6fc2b2d2eaead785a961f81ccfee6b179894a1eecb5,2025-07-02T21:15:40.790000
CVE-2025-34076,1,1,dc9c9153a1078aa89465a7fa76b93d0c09d8c4c18c0fb4bfb18ac17ba5899305,2025-07-02T20:15:29.690000
CVE-2025-34078,1,1,28894bcdcf6854686c9bcd752f96f78735e5cb33d5d9478f95ee5ca42e4bfcda,2025-07-02T20:15:29.827000
CVE-2025-34079,1,1,cce584a780196713a8c6ee827a7e6f3ea01852d4c7563952b676a805ccd7d608,2025-07-02T20:15:29.963000
CVE-2025-3408,0,0,a88be7d5c921572f767d8ba3e6ebc652be3930b6ee80cf6e4b3b3197df125283,2025-04-08T18:13:53.347000
CVE-2025-34080,0,0,0645af92852c4c75a352979a10036d36cc531562915f2b81600076c5490ceabd,2025-07-01T18:15:24.487000
CVE-2025-34081,0,0,d696ccc2eacf212028f355783a4b82494f5e56e1a84e1ce50916672890cde099,2025-07-01T18:15:24.627000
CVE-2025-3409,0,0,f59095d51838a53941b8bd9796d34dc98a766466b963796da5b26614478f737a,2025-04-08T18:13:53.347000
CVE-2025-34090,1,1,97f5958fd22032ced3b8ddd1529f8f5a720845df4a1e135990e3fd2f8a2534e7,2025-07-02T20:15:30.110000
CVE-2025-34091,1,1,22299bd382ea2b6c89cd8b7fd45538cdd112e7adb16e52e95b2ffaaaf061b193,2025-07-02T20:15:30.260000
CVE-2025-34092,1,1,17459f64090cb762564ec217468df56e4314f2f81160243614827459795aa891,2025-07-02T20:15:30.413000
CVE-2025-3410,0,0,c70ad1f10853e4bee6dfe4932ecd12d3acdcade7cac158141968cc85be8d2fc1,2025-04-08T18:13:53.347000
CVE-2025-3411,0,0,8cff3e75ab7d8c8c3df6b9fa01111f95a8fb7002f322628e53333c48f3625fa7,2025-04-08T18:13:53.347000
CVE-2025-3412,0,0,25a3c2ab8fa0aef3dfffc2c9723b43f279f3600f9f3d1f7632095f66cdc52ea3,2025-04-08T18:13:53.347000
@ -294184,8 +294192,8 @@ CVE-2025-37091,0,0,5c59e2385d6842be695126488e55eb86dc7f72c0f9c94efe260f5f7e3aa86
CVE-2025-37092,0,0,d2e906c9093c897b5382406a4ca5cd4666b5641e70b3de6ce3bdd44d14dded8c,2025-07-02T01:14:24.027000
CVE-2025-37093,0,0,eeeeed73a80d1152deaf3bfadaf1854957afd5bed01935ed49d0b9f9068124a4,2025-07-02T01:12:24.617000
CVE-2025-37094,0,0,6d20c74e0741eefc76e4a020d08745b8fe40dc1428103809a851ddf2e74dc111,2025-07-02T01:10:16.433000
CVE-2025-37095,0,1,9f5a4b4c5e73a32bc6c2404219bef3755544819c6d7bb87d449ba9b756875fa1,2025-07-02T18:07:31.213000
CVE-2025-37096,0,1,22707a31098e9cdb448fcf8a56edafe251897b155cebe6289af122e54309fcbf,2025-07-02T18:01:41.810000
CVE-2025-37095,0,0,9f5a4b4c5e73a32bc6c2404219bef3755544819c6d7bb87d449ba9b756875fa1,2025-07-02T18:07:31.213000
CVE-2025-37096,0,0,22707a31098e9cdb448fcf8a56edafe251897b155cebe6289af122e54309fcbf,2025-07-02T18:01:41.810000
CVE-2025-37097,0,0,292a1d43ae472647d44dd5b39b4ad8edbe31c0eba297cdbc6fe988f335fe723a,2025-07-01T15:15:25.470000
CVE-2025-37098,0,0,95cb86c5eef296a62dd04b26f15930cd5f734eaaf609b8e9dff49dc3a5d65e14,2025-07-01T15:15:25.643000
CVE-2025-37099,0,0,88fa93292d2fe5248dd41ae272ed75f499c34942181d8a755c03c589be1349a8,2025-07-01T18:15:24.763000
@ -295530,6 +295538,7 @@ CVE-2025-43013,0,0,cea29fefbb7874147d20ca0439a948894c9ed92ca59da3ffe37724562ec07
CVE-2025-43014,0,0,8c8e187893b05115834c1fe60888f6689d95da1f55e6603f1b98a0a40089dd30,2025-04-23T16:11:35.837000
CVE-2025-43015,0,0,e1099e2d690e6500afcce9f63f8d90a3ffca94e6d4b413f55df99246e9d63336,2025-04-25T16:30:24.887000
CVE-2025-43016,0,0,f2c72cd86df0dc4f466aff47f20427f717da38e7cfd3bc2cf6bf3e8b276a88fe,2025-04-29T13:52:28.490000
CVE-2025-43025,1,1,b07e86ae70e69fe18bf8b04cda66d709e4c93e7e792df4542ad7f61979a79609,2025-07-02T20:15:30.550000
CVE-2025-43026,0,0,6b388ee0410ccd9f871364237fa3dd74ba38ecd5d6baae293c1bba0c62bbe8ed,2025-06-06T14:07:28.330000
CVE-2025-4303,0,0,ca67198b40d61e86a7061774e966351f8111400fea02ca918ed591bfeb4cb946,2025-05-08T19:03:26.480000
CVE-2025-4304,0,0,6f1b91465a276129a41d4871b4c0d6efc81ef52ea3bf5203539481683a02fc06,2025-05-13T19:21:33.627000
@ -295949,7 +295958,7 @@ CVE-2025-45019,0,0,0a36b603f2eee8504693a95bb056a9c5dae180c245f5aedb0d853035198fd
CVE-2025-4502,0,0,b6fc5856f80283661b9f5c0d6810233d4d120b34ab21f730a7ef052c4b6101bb,2025-05-16T14:04:15.523000
CVE-2025-45020,0,0,429832f3a891b985adb256db95fa4e3605a43b22020d294b189541e25f18c802,2025-05-09T13:45:23.603000
CVE-2025-45021,0,0,23c622248a57818d5ade75ad7b5f8e628d9aa7d69a6dd26ddccdebefb2f9e8a5,2025-05-09T13:43:27.980000
CVE-2025-45029,0,0,b7d25a95caf25ec9fb132078b8b45cab948328f0f9ac9c894e776e0f051a1993,2025-07-02T14:15:25.470000
CVE-2025-45029,0,1,d7d170dff6079a8ee0141fff8940c9df92246aa0d19bc872721b41cc9ccd8026,2025-07-02T21:15:41.003000
CVE-2025-4503,0,0,85f8ea7af4d81365d4c769cefc49de185f192dc2edd583f57e3e7fc284a882a1,2025-05-16T13:58:11.200000
CVE-2025-4504,0,0,f39a2a3f679765bc9c2c6ee848dc7fb913ca841c89fbba4626c8dd3bc0803ed4,2025-05-16T13:46:04.210000
CVE-2025-45042,0,0,e22830cb7bf04c3c2d82e6baefcc0ab2bba0906b03ab3d09def3ca7404c47455,2025-05-07T16:39:20.990000
@ -296007,7 +296016,7 @@ CVE-2025-4539,0,0,4cea8fc534f9fe405b8ad908d4e6f097f4382bef617bc18109b8d5e8c637ff
CVE-2025-4540,0,0,8cc0219b9599542c1458321b60f6526b4a06d781c2bf124752cf69c701bf9208,2025-05-23T18:15:36.813000
CVE-2025-4541,0,0,f69af7cb834435790fd2bc7c7fdd35148c39775cd73b6e79ac588217ba1217a2,2025-06-12T12:55:42.967000
CVE-2025-4542,0,0,b2811e2a4a5d7456e65880ba2e5fe541779cd453c5ff8f673586e2db73c7c0e2,2025-05-12T17:32:32.760000
CVE-2025-45424,0,1,d869a9d779495922573d9ef38a24a63ffd2a962a8dfed5fcc1e6147428166476,2025-07-02T18:15:23.987000
CVE-2025-45424,0,0,d869a9d779495922573d9ef38a24a63ffd2a962a8dfed5fcc1e6147428166476,2025-07-02T18:15:23.987000
CVE-2025-45427,0,0,2acb289b4531d79e0a4fdda0743ea875280a2030836ee1f38a4e78112f2ff823,2025-04-30T13:51:20.023000
CVE-2025-45428,0,0,a55753fec0ea61e23d5357aef97cfebf259250af906a54fae9de1214ab7deb77,2025-04-30T16:12:11.190000
CVE-2025-45429,0,0,32099a126e41e157c073e4b282e42326bf59a85e3c0de57c5dd11afb3e22532d,2025-04-30T15:48:51.963000
@ -296063,7 +296072,7 @@ CVE-2025-4562,0,0,d2657f9e359abe15e16bbecb49ae9ba4428138285e1222df0d7e8c7358260e
CVE-2025-4563,0,0,c69851f0735281b2a51d3c75d19e39d88123d1ecc1e2b9bcaa275dabdc915d52,2025-06-23T20:16:21.633000
CVE-2025-4564,0,0,8d3f9720d908e446b737db8b900434db81b180dd53397ac7362129a7e91e5314,2025-05-16T14:43:26.160000
CVE-2025-4565,0,0,4256f50161ec95000de287e54ecfa2b8b56d3a683613b559af85e1b918e03fef,2025-06-17T20:50:23.507000
CVE-2025-45661,0,1,1c1ef68e950b72d58944291d0421cef6e6e2261c3d51f19b8a645061629a6e45,2025-07-02T19:15:57.543000
CVE-2025-45661,0,0,1c1ef68e950b72d58944291d0421cef6e6e2261c3d51f19b8a645061629a6e45,2025-07-02T19:15:57.543000
CVE-2025-4567,0,0,121a90467be941d9ad01a97d3e24fb32b96a7e829013a214205341e8c0284209,2025-06-05T14:09:17.020000
CVE-2025-4568,0,0,a7dc4015dc0dc8a1d051ca0a0c8659f2aa00a001767db9893b5b3f88ebbd1af5,2025-06-05T20:12:23.777000
CVE-2025-4571,0,0,cfaf6e0f0966147161fbd50ba7ab7242473c58c0fee9a367c407b586b3a394d5,2025-06-23T20:16:59.783000
@ -296092,8 +296101,8 @@ CVE-2025-45797,0,0,9ceb633e87e0ccdd08b067f487627f7a3614f4d7f4f938b0faf7b483b05c0
CVE-2025-45798,0,0,1e256e91813f740bb0ddebf5c159b4041ec84583a75a9898cffd38b365095dd3,2025-05-19T15:08:18.653000
CVE-2025-4580,0,0,2c434f3aced55b1225815c7de47b3cc229863447aaf3ca455a84427f71dfeaeb,2025-06-04T20:04:21.700000
CVE-2025-45800,0,0,2adeb4a59c132c5d4a56fe8afda223e1c5b86658a949bac17c9d9bc540ba8292,2025-06-04T17:26:02.743000
CVE-2025-45813,1,1,3ec09f5d44c8d8e4d8fa47d228892dba7ee1b3131eb02705ebe52f01a130e38f,2025-07-02T19:15:23.583000
CVE-2025-45814,0,1,12a99868b5c59661b6aacf919e64b0a019734fba54186d68fbc61f712abdf28f,2025-07-02T19:15:23.797000
CVE-2025-45813,0,0,3ec09f5d44c8d8e4d8fa47d228892dba7ee1b3131eb02705ebe52f01a130e38f,2025-07-02T19:15:23.583000
CVE-2025-45814,0,0,12a99868b5c59661b6aacf919e64b0a019734fba54186d68fbc61f712abdf28f,2025-07-02T19:15:23.797000
CVE-2025-45818,0,0,9a72de08da5294536bea0753f94263b2b855db9b94abd12b9c3b0d1fd37d9e3b,2025-06-17T19:42:01.770000
CVE-2025-45819,0,0,c665b8750201a2fc239ff6acb7a2f60c43e76c91b36aa53da175cb91cdf72bb5,2025-06-17T19:41:54.183000
CVE-2025-45820,0,0,95a4e4eb3429b44b329ce72184a4d2ba508647a05ea4c8a36c99350258cec814,2025-06-17T19:41:43.420000
@ -296484,7 +296493,7 @@ CVE-2025-46634,0,0,adbdc53bb91ce45c108dfae363ac172a5467f9ef6b9ad8bfd5e234ff22520
CVE-2025-46635,0,0,c81a16a7aac883be5eb8baced44885a6963efe19158222244e53c4c42c8380a1,2025-05-27T14:18:12.740000
CVE-2025-4664,0,0,d4044bce681082456ae2ed2a3baaa6f65e61937d9e24855cf4b96203efa26903,2025-06-06T01:00:02.617000
CVE-2025-46646,0,0,af70cd637f7e4a86250852ca6ab0f9700c2c92e88ef676964700053f516200e9,2025-06-23T18:36:04.753000
CVE-2025-46647,0,0,d82464c6c61e702011e9e44c980b1298b7f5a3a5e2d3a313cda5347792a3790d,2025-07-02T12:15:28.227000
CVE-2025-46647,0,1,382094ff66f393a7b551a88c71cfe9ccf8952d527fa253dd4e103d77a8c23272,2025-07-02T21:15:41.190000
CVE-2025-46652,0,0,9d812ecaad689bd29eeb08cd6e51fc2313308ed71660c22dce020d578677f79a,2025-04-29T13:52:10.697000
CVE-2025-46653,0,0,3b6009fc3a51ec55453aaec5d1f7a19d2114d1ff8e2f811535a6f418b5dab168,2025-04-29T16:15:37.150000
CVE-2025-46654,0,0,0aa14c4ea6fe1b19c5c6aa8b1b364a4f4f00114d15c5d807117da3c6c36c9dc8,2025-06-16T21:00:11.573000
@ -297455,7 +297464,7 @@ CVE-2025-48122,0,0,5d90346782f906a83ce1f7d5406c733daa96859222d3462e9a9aaa87bf4bb
CVE-2025-48123,0,0,927dd0eda078889f31c80e97c49d639c615c1cd4fa7a86919723f469b8aa5c94,2025-06-12T16:06:47.857000
CVE-2025-48124,0,0,344bcd7cc563cf76038c7c18a4851f7ab64343be1a5e3b5eb9102a205871c94a,2025-06-12T16:06:47.857000
CVE-2025-48125,0,0,8eee42a4c025e254ddba8ffca9e8c3fac55262865ad675299523c2fb1d918797,2025-06-12T16:06:47.857000
CVE-2025-48126,0,1,ecdca4ce3b1162231bdcbd2bb065c08db119dd38ae154f8ad8b6883248ca0b22,2025-07-02T19:56:33.060000
CVE-2025-48126,0,0,ecdca4ce3b1162231bdcbd2bb065c08db119dd38ae154f8ad8b6883248ca0b22,2025-07-02T19:56:33.060000
CVE-2025-48127,0,0,11ee29dc31cd85b0b718162f384541d319a9748ffc96b9bab70d5b0619027f27,2025-05-19T13:35:20.460000
CVE-2025-48128,0,0,94de179bd7e9fd5a02611e704c16ad33a9258dcb246bf38f48064c8c6fc5c170,2025-05-19T13:35:20.460000
CVE-2025-48129,0,0,24214096cd06eb0308e1dd9643f414175e6d2be1c23c282925107f3249cc2ade,2025-06-12T16:06:47.857000
@ -297531,7 +297540,7 @@ CVE-2025-48258,0,0,05558dc9a056a4c45220e853dbcfba9265f36b69d0b6ff2d0c20a24925735
CVE-2025-48259,0,0,1f3946fa4bd270c9c3c52b83f5d392e74c67e5ceedfed5fc79e2daf54a324c93,2025-05-21T20:25:33.823000
CVE-2025-4826,0,0,5eb26ca2bf69b529dbc693897efb8fc6040465a4c812b7540761802d8b952625,2025-05-23T15:49:48.400000
CVE-2025-48260,0,0,a3f874679cdeac9df55dbfd1c86be6a056999148c9f31eda32540292f95592b6,2025-05-21T20:25:33.823000
CVE-2025-48261,0,1,94047db5a1c5d5536dc6e9c476a110f9750dabd62d4c44853ee5d54376b538c6,2025-07-02T19:54:00.397000
CVE-2025-48261,0,0,94047db5a1c5d5536dc6e9c476a110f9750dabd62d4c44853ee5d54376b538c6,2025-07-02T19:54:00.397000
CVE-2025-48262,0,0,e5106d3e36e1c55dca7b98309c44fab864699d88d7fb693a4b04c9c4036ab717,2025-05-21T20:25:33.823000
CVE-2025-48263,0,0,4b385dcf2f602e3ac6e9aa1fa8960317b4cd6beb44864083fa26204c658914e2,2025-05-21T20:25:33.823000
CVE-2025-48264,0,0,304bd89e1a992b208c192e2c5d98dc5704c1686813ea9b5846a7bf1a3d8fcdb6,2025-05-21T20:25:33.823000
@ -297761,7 +297770,7 @@ CVE-2025-48848,0,0,38731265ae915b14c5e915b02c11b0e53a54815641117da26fffd1c6f20ec
CVE-2025-4885,0,0,8b1f3d2344963a11ed048c1b11c72d90a832e37d4502c4d02b2f6dc0aedfb978,2025-05-28T11:49:42.250000
CVE-2025-4886,0,0,ee7f76edd86c24830d90a51f41a4fa49fae21d920e8b2e20261474187c5dd2a8,2025-06-04T16:10:37.057000
CVE-2025-48865,0,0,94f89730bd8ed106556973261399e33383a3753b92f1a19b2cc4e5a5c200670c,2025-06-04T19:54:41.613000
CVE-2025-48866,0,1,5c2aa70d83b7537c313b22e7f244f72f8c04af4feccd44edfc4020d24dffe29c,2025-07-02T18:11:34.663000
CVE-2025-48866,0,0,5c2aa70d83b7537c313b22e7f244f72f8c04af4feccd44edfc4020d24dffe29c,2025-07-02T18:11:34.663000
CVE-2025-4887,0,0,b3da4e0d52d5d712d7aa083818ad0dfb6e4d4e8d4d6275a1920198b65f71ddac,2025-06-04T16:10:54.340000
CVE-2025-48870,0,0,f0dd4c510b4e0f1b9cd4488ee6e0602ab690635caab16c9782c16ad205fa1ad1,2025-05-30T20:15:43.107000
CVE-2025-48871,0,0,e51827db50c06633d673c9028d7cda097fa8237d9938def1c48be2ebb4d18762,2025-05-30T20:15:43.197000
@ -297845,7 +297854,7 @@ CVE-2025-48960,0,0,6388a249faff67cc5a4d2fa4bca8d3989a10ec11030dddacff72a168ec292
CVE-2025-48961,0,0,44e1cee69124b46bd6b795101bc0b7c9c4699ce00a138653c66e2e8aeff53be4,2025-06-04T14:54:33.783000
CVE-2025-48962,0,0,4b2d64282106eed58f9e4647aa4bdcfb03945a2468e53d084f7081033bf14af0,2025-06-04T14:54:33.783000
CVE-2025-4897,0,0,104730cc5ad0680860a774881c7ad06896ad7afe2bb00c017480a43cf79011cd,2025-05-27T16:30:05.410000
CVE-2025-48976,0,1,e56bb4765d78cbe565c80bb91cfe5a5c34b532c6610162061b09dd3dc9884f9c,2025-07-02T18:29:35.560000
CVE-2025-48976,0,0,e56bb4765d78cbe565c80bb91cfe5a5c34b532c6610162061b09dd3dc9884f9c,2025-07-02T18:29:35.560000
CVE-2025-4898,0,0,088de021e18707e0dc4ec8499500601b39900fc456f0a7d4c0f7a0b50fbac254,2025-05-21T19:37:41.533000
CVE-2025-48988,0,0,89f3346fcc4cd557a41994a11d0d1a4d79127913ab475205777ebe370f1ad8d6,2025-06-24T19:49:04.033000
CVE-2025-4899,0,0,384aad67823f1c19c564c5975182391c80467536acba8235a635dfd93a5393e3,2025-05-21T19:37:31.280000
@ -297902,8 +297911,8 @@ CVE-2025-4911,0,0,8165f0d1dc1e78afded21e50626575112805e2ff63d8f266295fb56c02f369
CVE-2025-49112,0,0,53acc03eb5f34e287cf80e6f2606bfb4760fb16ea2fe509fc70b20f7de56218f,2025-06-02T17:32:17.397000
CVE-2025-49113,0,0,56a8fd04a9ef82f1d5c677d3aef05bbaae629657949015a38e21cc671f31eeb2,2025-06-12T17:15:29.310000
CVE-2025-4912,0,0,952cc1697455c59886c397e61a80308747f6eedd0f377c0531d621b366fc5d7d,2025-05-21T17:41:21.063000
CVE-2025-49124,0,1,7aaed7db3c7c3425730e28a3746bf707c007c3574467d4e0189597a3f538e67a,2025-07-02T18:28:47.897000
CVE-2025-49125,0,1,9850d5e560b7706bc221711b24d8b458428db1e191d16003b58dd27aa88f673f,2025-07-02T18:28:13.577000
CVE-2025-49124,0,0,7aaed7db3c7c3425730e28a3746bf707c007c3574467d4e0189597a3f538e67a,2025-07-02T18:28:47.897000
CVE-2025-49125,0,0,9850d5e560b7706bc221711b24d8b458428db1e191d16003b58dd27aa88f673f,2025-07-02T18:28:13.577000
CVE-2025-49126,0,0,f2746aec11bbc747d0228cb8139b07ac427a821bbfb80f0a313e06bf384fe2ff,2025-06-23T20:16:21.633000
CVE-2025-49127,0,0,3f4889eef877e3cbd48aa702e8cb35c833e3234501017b5b4ce4fc613f23b00a,2025-06-09T16:15:44.833000
CVE-2025-49128,0,0,be74e1e3636b4e3c68c2e5f707126adefa5b42c030884a0a961eb0fa96655c19,2025-06-09T16:15:44.947000
@ -297943,13 +297952,13 @@ CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa
CVE-2025-49163,0,0,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000
CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000
CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000
CVE-2025-49175,0,0,bc48898aa22840d684e986dd4bc99123d118318d12fcdde1f78c0811c7f9da52,2025-06-30T20:15:24.553000
CVE-2025-49176,0,0,7c8e3298f5c5daf34fd87a5b2093060a65cb032351d81042db8ee9f2aaa6d551,2025-06-30T20:15:24.690000
CVE-2025-49177,0,0,88fe85ebfb311cc7851d290d91c8e67844d99ab06620a758f4cae9a3c93ed2ef,2025-06-30T10:15:25.913000
CVE-2025-49178,0,0,2977b66486df3bf07a30aa6a0bfb1cefd659d07df5857968bf6e6aab4abd4148,2025-06-30T21:15:30.693000
CVE-2025-49179,0,0,690955eeef8fc1b93cd649b8d87bd4128d4338f5aa14dc011f7c01904dc55014,2025-06-30T20:15:24.817000
CVE-2025-49175,0,1,05c4c0c17d157a274e33624cd51023c28750ce70bbac8c685e97e41cde6a8598,2025-07-02T20:15:30.693000
CVE-2025-49176,0,1,58f0bc9899911c80c8035c853483a104069a082e71868005a69b053ba046fdae,2025-07-02T20:15:30.820000
CVE-2025-49177,0,1,2776354ba86cd7216ed2eee07d464dd343e2260aa14001f109fcd75b0e6568d1,2025-07-02T20:15:30.943000
CVE-2025-49178,0,1,205db7ae9d348939de33e6cdf7edc77ae1dce68a6cdac3af14a3294c8dfe7349,2025-07-02T20:15:31.057000
CVE-2025-49179,0,1,fa802d5830c7b07b71c2a6064db3460130d6b592fa0e646d30819ff56cc53a0b,2025-07-02T20:15:31.187000
CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000
CVE-2025-49180,0,0,e9711ad3588c97661db2e1f474cb48105c3aa995cfcc9886fec475a3e87c02d2,2025-06-30T20:15:24.940000
CVE-2025-49180,0,1,d656594d323a36014cef5dacb2709fbdc583abfca1e258a8d0fd1163a8698a62,2025-07-02T20:15:31.320000
CVE-2025-49181,0,0,65f8ea01de63d019d8688de775c40b302b8c0b1e44c040e53e46324e69435218,2025-06-12T16:06:20.180000
CVE-2025-49182,0,0,8adc8833944dbbffb6c925bafc811eee2574582f2d7b7b09537e334080770141,2025-06-13T09:15:20.130000
CVE-2025-49183,0,0,c9c3ab65e477d8e9a4d5c9adaf45822d49f0873835d0971680386eb894e72562,2025-06-12T16:06:20.180000
@ -298023,7 +298032,7 @@ CVE-2025-49259,0,0,db4e2e6ad352e612216ee40424170ff047ce4767289f88fe44b36338c3261
CVE-2025-4926,0,0,321f7efe7ac33228adea3a7bf6c22d3279632b362ddc9dd47d64aee357b84d4f,2025-05-21T12:46:59.150000
CVE-2025-49260,0,0,20df55cb1d6ae6d831c559c85aa2fffadf12ac6a127a9822419ce67dc6550363,2025-06-17T20:50:23.507000
CVE-2025-49261,0,0,1c637cdb70f65c420754aa2396c2000cec4df743068bf0b57eab505c84c0b69a,2025-06-17T20:50:23.507000
CVE-2025-49262,0,0,c8ecb38e2a6bbb509b5464e93a8e807cf4fe47f70ed1e288b103f2145fd0fbb6,2025-06-06T14:06:58.193000
CVE-2025-49262,0,1,06475fea8bb8e08acfd3209a58a6aae72c911267f58fd5a9f0003b35cc972834,2025-07-02T20:02:58.340000
CVE-2025-49263,0,0,38aa1f55e3d42e2ae1c5f0e906030fae07b5739b8521b0ba5395b28e605e2da3,2025-06-06T14:06:58.193000
CVE-2025-49265,0,0,93f04cd3c02c56137db8c1a60ed5bdbd759fe4413ddae7beafb034d9122bdb3e,2025-06-12T16:06:47.857000
CVE-2025-49266,0,0,2ec88e02ae1dd89b21bfb67afc114b109690cc3e3c98198e7fe6084e9cdd1222,2025-06-17T20:50:23.507000
@ -298051,7 +298060,7 @@ CVE-2025-49288,0,0,fd55b6e659457965b044763d373bc487f4f85d0422ecf0bdb451203ab3005
CVE-2025-49289,0,0,6db9920d9566ce3cab2322c92454f3a08523c9da68abd3449538cf2f7bf511af,2025-06-06T14:06:58.193000
CVE-2025-4929,0,0,a8e593e93f40512d4e00d2cf8b1f6bcbb5d53e9a2cd29f3fc687456ae4295712,2025-06-11T14:54:00.567000
CVE-2025-49290,0,0,cf4e11029979fd4c0003797d9d335aaa3fc468b369e4ac17f80d2929b723f4be,2025-06-30T18:38:48.477000
CVE-2025-49291,0,0,9daa3b20fed7cc8f0088dbb844645608b4c71dd2f7cfa859b6d976a11504f1d4,2025-06-06T14:06:58.193000
CVE-2025-49291,0,1,153742cefd7a33afe363ac01c19e5547522b77d678ed71f932188ac106c837be,2025-07-02T20:02:18.077000
CVE-2025-49292,0,0,1b2cdbc10ccaf92dc3f2c2fa167a6bb6220406e291e936a3a5a6ab308c52f19a,2025-06-06T14:06:58.193000
CVE-2025-49293,0,0,306999d754a56fe33b1688646f3766e55e4d4cf04e569fd466480109a4867d8c,2025-06-06T14:06:58.193000
CVE-2025-49294,0,0,4a7f3ec895253ffd59c41f8c6fbee8a9fb92663981d502e562f03c0a1f3b2feb,2025-06-06T14:06:58.193000
@ -298161,7 +298170,7 @@ CVE-2025-49520,0,0,c00c5db1e0d7cdfcf03ce2a151d4a6f1c9dd6234f02cc9e35bc9dc762ccb8
CVE-2025-49521,0,0,f5759572ad27815817cd4949078de9ea61bd0b160316fbc144b68c5d87cc6701,2025-07-01T02:15:22.310000
CVE-2025-4954,0,0,1842fa5885eb88cf4e938c25f5c28a2b06178d338bd8f50c89b12e7a73a12077,2025-07-02T16:11:11.290000
CVE-2025-49549,0,0,d51ae214ec023b9fbf2d300a776160828d2a71b7300d33bc04b291b25e1ecd5e,2025-06-26T18:57:43.670000
CVE-2025-4955,0,1,dfeeeedd1c9e503552c289dc5a5f282eaa3f31fc9b39c1438869fa46290cc865,2025-07-02T19:25:30.180000
CVE-2025-4955,0,0,dfeeeedd1c9e503552c289dc5a5f282eaa3f31fc9b39c1438869fa46290cc865,2025-07-02T19:25:30.180000
CVE-2025-49550,0,0,81d29c0d656ad2b61bb825237b123272a33fd2799782f8797b7b40fb5e1f45eb,2025-06-26T18:57:43.670000
CVE-2025-49574,0,0,fb5e38666a9d5db5e2fea3eff17a1cec1849b841049d294374c0873eea7d745e,2025-06-23T20:16:21.633000
CVE-2025-49575,0,0,5239212f6088f8e9f5d72981748315013281ee63030d12ad53f604f56fb5ce0a,2025-06-16T12:32:18.840000
@ -298201,7 +298210,7 @@ CVE-2025-4969,0,0,4f90cc424a2a0f4e9ed8afa3693879db2394c134460b9fa8753024f2852d39
CVE-2025-49709,0,0,6e5da86ede95ac762ffd2aaae8e4447b199f72a6fba5fa138a2263e19d8c9c57,2025-06-16T16:41:05.487000
CVE-2025-4971,0,0,ec01b010a198b670732c969d73dfa53bbd76f2e075f866245cc573c614982079,2025-05-21T20:25:16.407000
CVE-2025-49710,0,0,fdef6b70e5300806b4a42e9567df3fa6452819f84b853bd1194cd77188110e32,2025-06-16T16:40:48.453000
CVE-2025-49713,1,1,cf099eb8e0034d45f9d7ba5d6cfc1c4f3f92e67b5aee5bac95e8839d1a7d9a9a,2025-07-02T18:15:24.303000
CVE-2025-49713,0,0,cf099eb8e0034d45f9d7ba5d6cfc1c4f3f92e67b5aee5bac95e8839d1a7d9a9a,2025-07-02T18:15:24.303000
CVE-2025-49715,0,0,d350a971b67f9d6562ee1abd43003afbcfd7b9d445831ceec772b587e6084416,2025-06-23T20:16:40.143000
CVE-2025-4973,0,0,a09baa9620620eb012f5ddd6b5ca6dd7efd75fb0c8b55678f3f3e6206d444643,2025-06-12T16:06:20.180000
CVE-2025-49741,0,0,1b29e4a4fce34a8586e58f3bcb010a13d592cf566421071690fdc217420c1cd8,2025-07-02T14:15:25.737000
@ -298404,7 +298413,7 @@ CVE-2025-5030,0,0,6d4b94a2a3e4b3835c2395db7b8595a9109a231f789fd318934411db49833e
CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0aa,2025-05-21T20:24:58.133000
CVE-2025-5032,0,0,4156143fef9ccb288081dade2120fec7f51a54986c4f66b96dc31d6794fced0f,2025-05-28T14:12:07.037000
CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a45,2025-06-20T16:15:38.947000
CVE-2025-5034,0,1,f0ac7332abf996a6e6e6a22f6f30e0617c7501cb6293576154766b569ef16c9e,2025-07-02T19:00:24.197000
CVE-2025-5034,0,0,f0ac7332abf996a6e6e6a22f6f30e0617c7501cb6293576154766b569ef16c9e,2025-07-02T19:00:24.197000
CVE-2025-50348,0,0,5081ba7593ae8342ef6e03ff05001a5e9251f0737e546d04330fd65ae4fb2e2a,2025-06-25T13:08:13.867000
CVE-2025-50349,0,0,15e0e70949273fa56afdfb5bd13043f639cdede12bd48e56cc46a914f6d4ad3a,2025-06-25T13:01:11.240000
CVE-2025-5035,0,0,1deb7e75a6c3e09c6c339251bdadee3dfedda027cf22bf3c096a61d9e90df423,2025-07-01T17:43:20.530000
@ -298558,7 +298567,7 @@ CVE-2025-5207,0,0,e402cb7000c0d3ec5faf704526317d521bb7be7fab48c7474536b7fb38ce69
CVE-2025-5208,0,0,9e9535cfb50c25096d995fee715ad33ab744750f67296c60cac7b3a386d28ef1,2025-06-05T14:14:06.397000
CVE-2025-5209,0,0,1de988bb6fc9688228254af9049355449ffefba36f51df5a462735aed22ede34,2025-06-26T16:01:40.640000
CVE-2025-5210,0,0,7f798974cbc440c4e4dd8009e513c3eb9007b33b9ead67a41eab0bd81192fbbf,2025-06-05T14:13:54.527000
CVE-2025-52101,0,1,7e2c22898ccb8924744ecf98bd8477845feb337808e53054f63b88710899e0c7,2025-07-02T18:15:24.513000
CVE-2025-52101,0,0,7e2c22898ccb8924744ecf98bd8477845feb337808e53054f63b88710899e0c7,2025-07-02T18:15:24.513000
CVE-2025-5211,0,0,8f4ed9a6be734738ba7e8af34dfd90276884a544fade7898e9f11540d4e9c7c6,2025-06-05T14:13:12.777000
CVE-2025-5212,0,0,09bde77c0a73fbc6c1f35bedb61d3c4c409f9d9416e30903b1d4777f1733a256,2025-06-05T14:12:55.247000
CVE-2025-5213,0,0,8262fd7ad3860a05f2599b6c82e670c892a52b241834cc36a8cbcfe508de4e0a,2025-06-05T14:12:38.577000
@ -298633,6 +298642,7 @@ CVE-2025-52555,0,0,6a75b391ee3c8272fca348930578b6893d5d810e2019dea636affd2993361
CVE-2025-52556,0,0,01d14cdcd651409b8ec6f2a117321e576266f60affdb5d61d3b6cf66da0be9ba,2025-06-23T20:16:21.633000
CVE-2025-52557,0,0,d6ac46828bdd4bd5689e0ed9e6db622a0cd2c5e50b4932c5603e932a5d57d26a,2025-06-23T20:16:21.633000
CVE-2025-52558,0,0,feddd9b17bf18205609fd5d4ab75e553c171fbe3defa5726e634521dfcb6dbbe,2025-06-26T18:58:14.280000
CVE-2025-52559,1,1,a3f55a55125ee4d97083028ffb56541e54f129f69d9872b72d7582a3a8363808,2025-07-02T20:15:31.443000
CVE-2025-5256,0,0,8e276989283383806f3abf5c20dbe67142f0dc8ca07046605c539922633ebc4a,2025-05-29T14:29:50.247000
CVE-2025-52560,0,0,e5a785d0108feab8a82fba59c5f9cae135ba29f0ebde34364e03ae7ca5151c5a,2025-06-26T18:58:14.280000
CVE-2025-52561,0,0,aabef282808932d733941a0236add55fa34255b30e526cf4822de55340d2d48f,2025-06-26T18:58:14.280000
@ -298722,7 +298732,8 @@ CVE-2025-52827,0,0,04da4f456c5a4f30ec7c35209b7acc7cd69257169d05a3aac291d93074f0d
CVE-2025-52829,0,0,eb4d964acfddba9bd78da4c0fddfa106090ce982a7436b16afafa186380d210d,2025-06-30T18:38:48.477000
CVE-2025-5283,0,0,a8169db79b4666d05c59f16c729749cd032f3753a6abd4a1bda7e79d017ef3ab,2025-05-31T23:15:20.553000
CVE-2025-52834,0,0,4ca40346c1caeb484e6b4cab253e3c17da1f917f108bf85aa6fe3c08b7cc103c,2025-06-30T18:38:48.477000
CVE-2025-52841,0,0,5a42bcc8c21230be36d8ea2efa4d9e98607dc20ce1b9d31997d3a6a58a268bee,2025-07-02T17:15:53.807000
CVE-2025-52841,0,1,3d7da849a8e31127ec689a0a5860b78312f807447c1f9221344c0a6c20dd5d34,2025-07-02T20:15:31.610000
CVE-2025-52842,1,1,2b03370c1b6578bbc27d600c72444b127d07a7bdf8339b142f09fa8e34be311f,2025-07-02T20:15:31.727000
CVE-2025-5285,0,0,44bcec87abafcefe0886e878731e41dce32b0fc09d4f84e223174bcbfeb5ce09,2025-06-02T17:32:17.397000
CVE-2025-5286,0,0,05e7ca3386f0ef15ac2b01314d8e06913e02de8c1752e75b99b02bac23121404,2025-05-29T14:29:50.247000
CVE-2025-5287,0,0,b8300f230839e0ad3335fdc92731d9b07abc7f3405256834dd55febc4f9b0133,2025-05-28T15:01:30.720000
@ -298754,7 +298765,7 @@ CVE-2025-52901,0,0,597dd3e0884e75a10ca3c76c1126f6f1d090a216692cce1bc426e825d8307
CVE-2025-52902,0,0,b8d594698346e33c9857483268477e14dc09fa28d15e66d418ce57128530f231,2025-06-26T18:57:43.670000
CVE-2025-52903,0,0,94a4c6feeb3ab5f2f3f94f951914d81f3159a284c72cdc60f80cd2659d917108,2025-06-30T18:39:09.973000
CVE-2025-52904,0,0,bcfb9cec165acf9ecfbf631b206a037247a445035acaabf7192276de61173353,2025-06-30T18:39:09.973000
CVE-2025-5291,0,1,ee4ed627d63194987274d8b55aa61e23a8b543ff69ad0554b0f4621e985f3424,2025-07-02T19:33:43.910000
CVE-2025-5291,0,0,ee4ed627d63194987274d8b55aa61e23a8b543ff69ad0554b0f4621e985f3424,2025-07-02T19:33:43.910000
CVE-2025-52916,0,0,438f7afeba591d6d5b3e576c75dcb415d3bd31981574da43af97e05ceabf2876,2025-06-30T16:15:23.727000
CVE-2025-52917,0,0,7ab3bf82ed52daa48453df20fd6fb2069e3c2235c3d59c92d3f64c725f7f20d8,2025-06-30T16:15:23.870000
CVE-2025-52918,0,0,6c4c967ecd4d1d5b8ca4b1dd9bdc53d47425d36549eb42b0c5b72cef192ebe55,2025-06-30T16:15:23.990000
@ -298864,7 +298875,7 @@ CVE-2025-5325,0,0,c13176172452a62b2dce96df66b8263f391e2e94fbea914673cf01de62808a
CVE-2025-53253,0,0,214e24e64f3a68a364c0361453a4da1d0055b4e89b2079e94acddb30e59f02c0,2025-06-30T18:38:48.477000
CVE-2025-53254,0,0,8d56ffe402bb76b24185845decdc59779e8802d356487d5334398779a07bb1d1,2025-06-30T18:38:48.477000
CVE-2025-53255,0,0,ec730ac042e0abf9b2a31b64f28be2cdcae6a879850b6d271183060760548fc2,2025-06-30T18:38:48.477000
CVE-2025-53256,0,0,399929b9fdbd9d3e98feee405e4fc6cba57be7abb7239bb64e68315c9e0a64bf,2025-06-30T18:38:48.477000
CVE-2025-53256,0,1,bb84d9ae19d9cae363a736c94205d30da11efb3c31c9b4723bb955c7beec5e2b,2025-07-02T21:15:41.410000
CVE-2025-53257,0,0,a9a11065de348b88d4b75cff097eee7a5ba0f26c0158d0437a76d9c025fa2cc5,2025-06-30T18:38:48.477000
CVE-2025-53258,0,0,3d6cf121ab247ccedc31021cef85a1fb400e0208a4dc46b8d259781a69aea504,2025-06-30T18:38:48.477000
CVE-2025-53259,0,0,1a676ff829527268718afb1a97ac7922e0cf1bdad3ac66285a3c31c12b74b980,2025-06-30T18:38:48.477000
@ -299034,9 +299045,9 @@ CVE-2025-5434,0,0,9c74c53f1cf63c29a6c4f421d3e66dd8e0230e030b10a94ec340a164b1af82
CVE-2025-5435,0,0,a07b000fdd10d693271c33e5855ef762ee79c33e1434ecbd5fe85a5e86df8fc5,2025-06-02T17:32:17.397000
CVE-2025-5436,0,0,79ce2e03946bf46829683ce641eb6e62632f0261fbc1007a9d8df993bd98e559,2025-06-02T17:32:17.397000
CVE-2025-5437,0,0,811a7dd33c5ee8133b31f658086585361c8a0965b92e0717d81b56b78c843fdd,2025-06-02T17:32:17.397000
CVE-2025-5438,0,1,9312f400ed497dd6a9c823f72cf10956f6f2a6670a1b3fc79f6968b12c1a2555,2025-07-02T18:08:56.187000
CVE-2025-5439,0,1,5393809746e167bdac62d8e2386c4e04df7737502cd4e1d8c350287b2fcd8f5a,2025-07-02T18:08:04.770000
CVE-2025-5440,0,1,af2be9dcb24d92c343a6f8f918709518afa77f6a52ec237e760c0fddd3d435a5,2025-07-02T18:07:16.100000
CVE-2025-5438,0,0,9312f400ed497dd6a9c823f72cf10956f6f2a6670a1b3fc79f6968b12c1a2555,2025-07-02T18:08:56.187000
CVE-2025-5439,0,0,5393809746e167bdac62d8e2386c4e04df7737502cd4e1d8c350287b2fcd8f5a,2025-07-02T18:08:04.770000
CVE-2025-5440,0,0,af2be9dcb24d92c343a6f8f918709518afa77f6a52ec237e760c0fddd3d435a5,2025-07-02T18:07:16.100000
CVE-2025-5441,0,0,ac74c7cc0f531f603ebba9c2bca9d48918e26d19fe5966f70f4992ef7f9dc14a,2025-06-02T17:32:17.397000
CVE-2025-5442,0,0,aff4e7dbcf6e16c07e1755fc79189c8c906002caae35c81216b58555f7942402,2025-06-02T17:32:17.397000
CVE-2025-5443,0,0,c979fc559b9753e7b8f3cea4a3591b3d21b403fd87a023a9ecde01c1efbe3d0f,2025-06-10T15:14:40.057000
@ -299389,7 +299400,7 @@ CVE-2025-5873,0,0,94e40892e1834c35ffd2c63a40f58e3bdf2ff473f557d19637cf12f248462e
CVE-2025-5874,0,0,726c9df65c566725a510f5c58b0c057c9bdfc295fa5f1ff3d2641c2157e02012,2025-06-09T12:15:47.880000
CVE-2025-5875,0,0,c25b34ccfcd613e0dc066c8ac82a22ec084260cbb2bc3930454841ae31515b22,2025-06-23T14:21:01.890000
CVE-2025-5876,0,0,32a8af4e9cd8f7d2c246abe46c081e26ff3051e42e928a128210a8c01026ea88,2025-06-09T13:15:25.777000
CVE-2025-5877,0,1,d0fc9d475beccd3a1a467515982c1f66a610522bd0dbdcaf601a57c1a88517bd,2025-07-02T19:17:43.003000
CVE-2025-5877,0,0,d0fc9d475beccd3a1a467515982c1f66a610522bd0dbdcaf601a57c1a88517bd,2025-07-02T19:17:43.003000
CVE-2025-5878,0,0,7460e28b521adf15f1e0947b351c873b699a9b031f986dc0aaec957b1b03014c,2025-06-30T18:38:23.493000
CVE-2025-5879,0,0,756604528009a19f95fc6aaf90273ff5d2ceec0a3e555d776ee81b7d6b78c298,2025-06-12T16:06:47.857000
CVE-2025-5880,0,0,30053a977ddbe5e71c046af93902c42d00bc2985c0890b6525775f4d57544340,2025-06-12T16:06:47.857000
@ -299561,7 +299572,7 @@ CVE-2025-6136,0,0,5f7e8be2da42633353469049b7512fa5d07106f6da9174f3722e62acbd430a
CVE-2025-6137,0,0,ddc67afa546c83e767dcbbc7b7e064e9742a4bea6b7f9760a6f55350f1985699,2025-06-26T16:33:18.123000
CVE-2025-6138,0,0,69c19eff97e06c34f5b8cfdfba9cb33f9498a49d64177b5418e8373bd3e2dbbf,2025-06-20T14:34:32.397000
CVE-2025-6139,0,0,1e573675182fd2c70c93e9d60e690c79091588fc0dffcb1bdf91b56cec3b2b4c,2025-06-26T16:27:37.157000
CVE-2025-6140,0,1,b68f1270ebcdebc6a09ed170a65e7944b3aca32e5ee78468b2c7d0a773e49e2a,2025-07-02T18:58:42.230000
CVE-2025-6140,0,0,b68f1270ebcdebc6a09ed170a65e7944b3aca32e5ee78468b2c7d0a773e49e2a,2025-07-02T18:58:42.230000
CVE-2025-6141,0,0,da13bc3db5b6441ec02280dd31d41a049dec0de80cbb8316bf3d83796a9c0f04,2025-06-17T20:50:23.507000
CVE-2025-6142,0,0,e80f42b3df69bc7d34694aade5534d0147faa50d387373f1d151bcbe4aa458f3,2025-06-17T20:50:23.507000
CVE-2025-6143,0,0,27cb56360567787dbec604a031c63766d0d7cb50b276f94212b3c1d5cb88a2f9,2025-06-23T19:29:54.330000
@ -299573,7 +299584,7 @@ CVE-2025-6148,0,0,1d80dfd65e83b1c0094d1738353bddfce30f1ccddcddac7fd512e97214056b
CVE-2025-6149,0,0,bfa9b70c74b833d4b13edc2b8c0deb75557d095959799446cbc897b529f45341,2025-06-23T19:28:26.243000
CVE-2025-6150,0,0,1c1c8c9840248db413992659480d6a0621f81bf1fb34376aa4877ba8e62a64a5,2025-06-23T19:28:18.330000
CVE-2025-6151,0,0,66f985d955d28732cb3e20742ce5c2b75d056fdf6e0c0fd5329b3e2551fd465e,2025-06-19T01:20:04.247000
CVE-2025-6152,0,1,32d4186f036cfff413fb083fa82eb785e9512523c1a40900c862dc16e87a29b7,2025-07-02T19:47:02.363000
CVE-2025-6152,0,0,32d4186f036cfff413fb083fa82eb785e9512523c1a40900c862dc16e87a29b7,2025-07-02T19:47:02.363000
CVE-2025-6153,0,0,9cb391bc0c728a51d1642ebf8a165fb9af8fa2212048ca86e4445e0b055258b3,2025-06-24T15:53:37.673000
CVE-2025-6154,0,0,95060072831785f3ed57ae597e6cc6e6409b897d7a65ff870ebacbcf6fb1f450,2025-06-24T15:53:35.847000
CVE-2025-6155,0,0,3e8fc69cbf51a07d93c7df9f9e6e4b66e36cc96b90ecd10cbf6a0ab1b9592e90,2025-06-24T15:53:33.717000
@ -299588,13 +299599,13 @@ CVE-2025-6163,0,0,6e13a9e163cb9e3184563f5c7b63b8596f5e63cf06bd837983ba5aafb4c041
CVE-2025-6164,0,0,c17ffe7ec702387ad5d177a5e91c7296a9ef4f80a11f6ea499b523afd7af1e02,2025-06-23T19:01:39.440000
CVE-2025-6165,0,0,d37487f3351fd79c79a2b837a802b50cbfd6b0061561d5f5248627aadf9d8941,2025-06-23T18:54:37.140000
CVE-2025-6166,0,0,5466d469b66b84ed623983bf0f3157156a6c338ed721d2f72b93fc8c6a2c9f49,2025-06-17T20:50:23.507000
CVE-2025-6167,0,1,1a7f72e942e8f63b6fc7e9227e5e064378d6c419b03d398adf0c1014d4174418,2025-07-02T19:36:26.940000
CVE-2025-6167,0,0,1a7f72e942e8f63b6fc7e9227e5e064378d6c419b03d398adf0c1014d4174418,2025-07-02T19:36:26.940000
CVE-2025-6169,0,0,24b56c63dd5c2b9799043dae6dc3b75a3e06e9ee630be707f681a9bb09cd5b58,2025-06-16T12:32:18.840000
CVE-2025-6170,0,0,b78aff7a1c8e8db8ce7aabd9ccc1b29ff578e0357c573a194099cb12287faea6,2025-06-17T20:50:23.507000
CVE-2025-6172,0,0,df5b11377ae2bcb860baea092fdadde3351cf8aeca30edf92e0d7977024948be,2025-06-16T17:15:31.503000
CVE-2025-6173,0,0,c070b1517acd95c5e869ebc2e1f1712fafd19138bea48c0324a49cddfc5a27e5,2025-06-26T15:57:47.900000
CVE-2025-6177,0,1,edd6b1d41a5c4b8e0408f6aa59fea86a8c8b780a92c52491789320f71941d7a1,2025-07-02T18:26:40.590000
CVE-2025-6179,0,1,42334162f4ea7781bf58c27d11fa5142617025c2a62fd9b39e81ec90028c3d21,2025-07-02T18:23:31.617000
CVE-2025-6177,0,0,edd6b1d41a5c4b8e0408f6aa59fea86a8c8b780a92c52491789320f71941d7a1,2025-07-02T18:26:40.590000
CVE-2025-6179,0,0,42334162f4ea7781bf58c27d11fa5142617025c2a62fd9b39e81ec90028c3d21,2025-07-02T18:23:31.617000
CVE-2025-6191,0,0,f0f3b688b48f4f8183a91df95fa38ffe0dfc74cf3682559765b5451f2fa22fc1,2025-06-23T20:16:59.783000
CVE-2025-6192,0,0,8db66416da4cd3b86c62307f3f4665206cb350578778274a773d4c246ef21cd0,2025-06-23T20:16:59.783000
CVE-2025-6193,0,0,8f7cbe3660433ebbbde46b01965a942eccd778d0ad783408ec78638602642ace,2025-06-23T20:16:40.143000
@ -299616,19 +299627,19 @@ CVE-2025-6264,0,0,f32dcf95c634dc2f1ab86702d3943727ebae8018b2fa6b536fe8be4f7c8173
CVE-2025-6266,0,0,83020883d3aae1b262b30700af6ace7e5c0118a4b262e735a3268c83525b299f,2025-06-23T20:16:59.783000
CVE-2025-6267,0,0,f67fce7007c3c00cf880637b4dba7c946432602560144eb3304995260da703c2,2025-06-23T20:16:59.783000
CVE-2025-6268,0,0,5f6af6ae27404ab496f8142bc1bb6b12379a204a2c7b25a2283e1abd50ac4f70,2025-06-23T20:16:59.783000
CVE-2025-6269,0,1,024eb914f10771a08084c9baf8010d041e3441c638e70a7c2c9e615bdaa7a700,2025-07-02T19:01:55.227000
CVE-2025-6270,0,1,2f2b33b3f299d0c0737f68aaef955f3f89328f2d6c3aeb68c37b17e94cb9fa3d,2025-07-02T19:02:17.373000
CVE-2025-6271,0,1,a979bd02238c97052b0931fd18d71d0fb43cf9d242e65ca25985753b912552ae,2025-07-02T19:03:29.737000
CVE-2025-6272,0,1,69aacf1933584e6c697bffc9f4ef45990c895ad88679eb28f0e65dbaf6d7a0d5,2025-07-02T19:04:23.387000
CVE-2025-6269,0,0,024eb914f10771a08084c9baf8010d041e3441c638e70a7c2c9e615bdaa7a700,2025-07-02T19:01:55.227000
CVE-2025-6270,0,0,2f2b33b3f299d0c0737f68aaef955f3f89328f2d6c3aeb68c37b17e94cb9fa3d,2025-07-02T19:02:17.373000
CVE-2025-6271,0,0,a979bd02238c97052b0931fd18d71d0fb43cf9d242e65ca25985753b912552ae,2025-07-02T19:03:29.737000
CVE-2025-6272,0,0,69aacf1933584e6c697bffc9f4ef45990c895ad88679eb28f0e65dbaf6d7a0d5,2025-07-02T19:04:23.387000
CVE-2025-6273,0,0,7fbd43be0636c447274ca5dd224661b382933a1bb0936c93b976e34f99babf3b,2025-06-23T20:16:40.143000
CVE-2025-6274,0,1,d1c56c73fd2ed1a2abccafe1b4d838b5dae80f1e1020fdb3cb0cfa7fc119ea61,2025-07-02T18:33:27.390000
CVE-2025-6275,0,1,6847ddb53c428ab782b5bb5144510fc9c30ff8873135f2b57a95ea2880350651,2025-07-02T18:34:42.377000
CVE-2025-6274,0,0,d1c56c73fd2ed1a2abccafe1b4d838b5dae80f1e1020fdb3cb0cfa7fc119ea61,2025-07-02T18:33:27.390000
CVE-2025-6275,0,0,6847ddb53c428ab782b5bb5144510fc9c30ff8873135f2b57a95ea2880350651,2025-07-02T18:34:42.377000
CVE-2025-6276,0,0,ccb81ed6c0bd85a63d78fd4d2a38a1b018d0dc69b6dbbfdd1314d8ec4b6bfe0b,2025-06-23T20:16:40.143000
CVE-2025-6277,0,0,f3138c5bf160fb9cc92ef2790899f67376501f52199dbecebe88985f0053453c,2025-06-23T20:16:40.143000
CVE-2025-6278,0,0,56924f4824f1de8e40fbe3d811ae61d82b96bc317af063e543633f656d17d6e6,2025-06-23T20:16:40.143000
CVE-2025-6279,0,0,527629d7d97f098383822910b706a7a13367898e9f1dfe64476c44f692b096ba,2025-06-23T20:16:40.143000
CVE-2025-6280,0,0,c054ffe4a30a56c9b692c4925f4f9370a417b5510cae29fc18d2b9dcd65b5f7a,2025-06-23T20:16:40.143000
CVE-2025-6281,0,1,25aa7b9dfe081c112d8d58e4ce5efb1b8be42368bc102fb60103d61db49b7134,2025-07-02T18:37:11.983000
CVE-2025-6281,0,0,25aa7b9dfe081c112d8d58e4ce5efb1b8be42368bc102fb60103d61db49b7134,2025-07-02T18:37:11.983000
CVE-2025-6282,0,0,0c2da46a89cbbe9026c79b3c6cf10427703bbd3c6e9eb8bd217b26455bfc69f6,2025-06-23T20:16:40.143000
CVE-2025-6283,0,0,4cfad25df5b2dfa9412a94aeb6561731ac12af51fae0d0ff6c2572f4fb134921,2025-06-23T20:16:40.143000
CVE-2025-6284,0,0,01c0a9b6c36fe98d11c601a672d683a0e8fb89235f309774f6bbaa34d1b90b9b,2025-06-26T21:36:59.597000
@ -299642,9 +299653,9 @@ CVE-2025-6292,0,0,950777517b48d376f4e9cfbb6475ca5763192a729885525f030e7df89973a7
CVE-2025-6293,0,0,30342ac281aebc0a30969c59d523a1a3a2cc7a536dbaaadfbb8317c27c072af8,2025-06-26T17:22:14.003000
CVE-2025-6294,0,0,2f20bcf126712080bcfde5ea574f9107db7d0aaac3eeac826f2b5961068819f0,2025-06-26T17:21:26.107000
CVE-2025-6295,0,0,c68657e703a32d8a27635af3bd0cbcf47590717c8db4b4d0b6e9b6fdea795c7c,2025-06-26T17:19:48.817000
CVE-2025-6296,0,1,1b01f8de9ec8aa98699a786d2352531b8134f89a6f041b3b274dde19ecadbda6,2025-07-02T18:46:52.983000
CVE-2025-6296,0,0,1b01f8de9ec8aa98699a786d2352531b8134f89a6f041b3b274dde19ecadbda6,2025-07-02T18:46:52.983000
CVE-2025-6297,0,0,546fd58bd43ac02228726c05947618b3d9627925bf9812bc9d83c75541bcfc9b,2025-07-01T18:15:26.143000
CVE-2025-6299,0,1,c652a5d9354c93c03ffa4782b81a8816f51e8849ed73f570b231410e0d04b7c1,2025-07-02T18:53:41.497000
CVE-2025-6299,0,0,c652a5d9354c93c03ffa4782b81a8816f51e8849ed73f570b231410e0d04b7c1,2025-07-02T18:53:41.497000
CVE-2025-6300,0,0,e2ec6cf8b98712d407f84e21f599347de059cbe66e2eb84a9fc4eb6c7fb27268,2025-06-26T17:14:20.587000
CVE-2025-6301,0,0,1a6a37865c9ad16879d590be6f25642d0cfa9abb4a67fa3b3dc503342ed3c79d,2025-06-26T17:09:26.040000
CVE-2025-6302,0,0,7f10f5dee54455b560940cbe13c783bb122850b8235db9ba002e5789736c0a78,2025-07-02T17:40:51.843000
@ -299701,7 +299712,7 @@ CVE-2025-6359,0,0,4c6b3a89015ba9383cd0f30179b8f5c4de98d22d2446e398ba201465b8f648
CVE-2025-6360,0,0,cd47aa26c5ecbd48de29b33b9fb52e4ccfc785bed014ddf3d7b77089b3be3045,2025-06-26T15:35:49.490000
CVE-2025-6361,0,0,69dfed4b6ee28f48f4584674801cbba5191a06ac465e39fa526b231064a630aa,2025-06-26T15:33:24.173000
CVE-2025-6362,0,0,ed837364dd32376dc1cfdf8d173bec48f29c4e974fad65f0c43a106ea3f3894b,2025-06-26T15:30:56.573000
CVE-2025-6363,0,1,a2092da75c1239a931ef4653704a6e5fd116fd3da1a6a5dbab6e327924c9b517,2025-07-02T18:56:45.850000
CVE-2025-6363,0,0,a2092da75c1239a931ef4653704a6e5fd116fd3da1a6a5dbab6e327924c9b517,2025-07-02T18:56:45.850000
CVE-2025-6364,0,0,be4a9d9271654f5f2f84bfeb78f337d623dc5f4d4aa408522a8f5cef88e4cf46,2025-06-26T15:28:57.953000
CVE-2025-6365,0,0,6295553fcc137edc7fd1d78ad23ef5d3ffd4b910db1e6b10ac05939d4d2aa7b7,2025-06-23T20:16:21.633000
CVE-2025-6367,0,0,bb431b3b23d08c0eaf6da1f3ebee6c3fd3be15fbba72c9deb2782b2a49fd2678,2025-06-25T20:07:04.093000
@ -299724,7 +299735,7 @@ CVE-2025-6399,0,0,1cc4662a693a649a9f407a6e359aaca52fe988ef413a3d7e4dcc120f8e622d
CVE-2025-6400,0,0,b7834b01ffc76dd6d3a754915f4603e275b0aa9a7826af0f6615e59accec721d,2025-06-25T20:13:52.420000
CVE-2025-6401,0,0,5cf4034351d983ee04de416dd673b8a67d86755e6334b356b4bd42e3cd39ff44,2025-06-25T20:14:01.440000
CVE-2025-6402,0,0,9fcf059d93a615de79cdd3b74519970d6c73c80b6f86a7557b01dae4c88ad665,2025-06-25T20:14:57.620000
CVE-2025-6403,0,1,007861183f6687f9c9a79ed265c27e5792ce1d4050de9b4571cc349ce6d48442,2025-07-02T18:56:36.940000
CVE-2025-6403,0,0,007861183f6687f9c9a79ed265c27e5792ce1d4050de9b4571cc349ce6d48442,2025-07-02T18:56:36.940000
CVE-2025-6404,0,0,f0c24c4f38cddef26208faf5fffbe2ab0f5998ff0d6d820bde73ac92320b2d1d,2025-06-24T19:33:00.033000
CVE-2025-6405,0,0,892fa39ea25d0fceb083bcffe5177ecfbe7cb9096e1732c10483f9dee58de891,2025-06-24T19:16:58.253000
CVE-2025-6406,0,0,2db684a16f4e28aaee6c2ddbef92630dbb3eb77bc0c3d22bde49da8224e470bc,2025-06-24T19:09:54.780000
@ -299744,8 +299755,8 @@ CVE-2025-6419,0,0,3035370a10769e2b2e73a65b80dc5ee8dff995026db0f171ea652406a466dc
CVE-2025-6420,0,0,9da6d53d9af64779bc447f9508c903bdaaf225194f0f56a912ef73481b378df7,2025-06-25T20:16:33.910000
CVE-2025-6421,0,0,3169c91105fc051d7d3498fdef6562a4792481aab354e9c38ba63bbee575aace,2025-06-25T19:50:23.227000
CVE-2025-6422,0,0,b5bb87a55ad52736bcc24be8713e2086821b4454f2e12e2c901389f24f632355,2025-06-25T19:49:55.057000
CVE-2025-6424,0,1,0630cc84b8bc4e7e33d067590e034f02a6924c5d57890588fa2ad8820ff20d76,2025-07-02T18:11:28.190000
CVE-2025-6425,0,0,4e6f88db6b79c26241a241a9d550f07188ec00afadd00edebbade3f226007ade,2025-06-26T18:58:14.280000
CVE-2025-6424,0,1,1e63adf2085979e6f873069e1f25dbb0b0c105bf60d8b2c9c09f02e2fce4efb4,2025-07-02T21:15:41.517000
CVE-2025-6425,0,1,fa7cbed5e15a458f8c061c0de26eef9274c73cee36ee7c904693ded1ee8ed5d3,2025-07-02T21:15:41.670000
CVE-2025-6426,0,0,130a7b245654ec700b52dd46d82662a731b3edeb808204b596d0afabe7d54c19,2025-06-26T18:58:14.280000
CVE-2025-6427,0,0,4fd1993d0ac7db16c968bc0eb6d4c8ebb892c92134eaab56fa8b779c043e4819,2025-06-26T18:58:14.280000
CVE-2025-6428,0,0,7e20fafdd0f36de7df3c59cde9ab6c32f568c3b0ee5af525470ee15553873cb8,2025-06-26T18:58:14.280000
@ -299763,7 +299774,7 @@ CVE-2025-6443,0,0,234c9867f25d85d44fc506bbf75440155c7227dc8656924121bdfd34971fe1
CVE-2025-6444,0,0,37705057457fe7179db85da84838ca3b56fe8ff63e8fcdb240ff0b993581938c,2025-06-26T18:57:43.670000
CVE-2025-6445,0,0,f99b123e574fa4e59daea983acb9603622fc84af3252757bbdb2c3411966afec,2025-06-26T18:57:43.670000
CVE-2025-6446,0,0,3600b7ecc27e2374ecf53656a0787999f8467a509514c75f50c495fcd2cddda1,2025-06-23T20:16:21.633000
CVE-2025-6447,0,1,cc4ebe57b30e1c29fcaaa701b4af675091d7dd851765dc9a4e58ac638527c45c,2025-07-02T18:24:21.523000
CVE-2025-6447,0,0,cc4ebe57b30e1c29fcaaa701b4af675091d7dd851765dc9a4e58ac638527c45c,2025-07-02T18:24:21.523000
CVE-2025-6448,0,0,5a0a3ee3d9f4340542c17b153af4b14314a4d2b8a9a47066bf08ed33363fd48a,2025-06-27T16:58:56.890000
CVE-2025-6449,0,0,7b1cdc99f16ea600bb8750d2b6d082ed5fc5e753ed757d63ed225090755d0c8d,2025-06-27T16:59:11.193000
CVE-2025-6450,0,0,08d07073e69e5d11efa66a56b9a50f9dbeb64a9dc7ddde1cd9563a1194634076,2025-06-27T16:59:51.930000
@ -299860,7 +299871,7 @@ CVE-2025-6566,0,0,affe36b1d137bfbb12f982c13c1f5a07ceb2d195d5a802635829756c7ce109
CVE-2025-6567,0,0,14a2a071a0db80b9d7b89b6f2738bddcf0dd4b44cc731a017fe21ac626971c3b,2025-06-27T16:48:39.390000
CVE-2025-6568,0,0,a4540d7c2520ddc46cfd36d840f1c3e8a02d8624a298126e252d8f82930ddab7,2025-06-27T16:43:42.703000
CVE-2025-6569,0,0,b43ce3c7fe66b936da7e514a37487a1a6951013e9fe5039c6b5b6ecfa14d08be,2025-06-26T18:58:14.280000
CVE-2025-6570,0,1,ef06c766ed700945b0765e92be8f2736de22bf32e8c65e68952ef9e654cea751,2025-07-02T18:24:35.030000
CVE-2025-6570,0,0,ef06c766ed700945b0765e92be8f2736de22bf32e8c65e68952ef9e654cea751,2025-07-02T18:24:35.030000
CVE-2025-6578,0,0,a99a9e383f515c0ced0d32ac616ed9a1ed673d64f2ed9cf85426f8c304e13984,2025-06-26T18:58:14.280000
CVE-2025-6579,0,0,3d6a7c5d0aad3e5c34ccac81738e70023b07954822764311505b50e140781b0c,2025-06-26T18:58:14.280000
CVE-2025-6580,0,0,14c9a21bff52d8562deb8a5ff102203adfe298df563381633ada51bbda9d23fc,2025-07-02T17:13:55.277000
@ -299873,9 +299884,9 @@ CVE-2025-6604,0,0,96d4dfdd3e003ea63aa1e4bba18d79cbe7cea5abcd4dc3ee0391b4f83c2246
CVE-2025-6605,0,0,3b1e9a90fef26eeec1cb23b63bf01d509568da803a212f4c59d24734ac4ce5b3,2025-07-02T16:34:13.343000
CVE-2025-6606,0,0,95377cc9129cebdaa5f3a34697e72c1a75fc693f2083fa64b9fdb2a4aacce7cf,2025-07-02T16:23:44.753000
CVE-2025-6607,0,0,5d2ed51fefc4ee7d5927f68a2b22555ed1cd7c54d232405f09ca25f5bc7c299d,2025-07-02T16:20:14.400000
CVE-2025-6608,0,1,cb3f6b0bfbbd057d2a402b3531cf43c4915b6d50c6cd74b52259c17d2e8110d4,2025-07-02T18:24:47.807000
CVE-2025-6609,0,1,8674c3684ac1cabbd631923e3d3e8db7a4e769694a18039c08e4cd4eb094bc34,2025-07-02T18:24:56.760000
CVE-2025-6610,0,1,e0a0ac50a3ac5be67a10a2b3071a05d9af3fdc035a32bce33ddacfc6d4e7b2b8,2025-07-02T18:29:30.530000
CVE-2025-6608,0,0,cb3f6b0bfbbd057d2a402b3531cf43c4915b6d50c6cd74b52259c17d2e8110d4,2025-07-02T18:24:47.807000
CVE-2025-6609,0,0,8674c3684ac1cabbd631923e3d3e8db7a4e769694a18039c08e4cd4eb094bc34,2025-07-02T18:24:56.760000
CVE-2025-6610,0,0,e0a0ac50a3ac5be67a10a2b3071a05d9af3fdc035a32bce33ddacfc6d4e7b2b8,2025-07-02T18:29:30.530000
CVE-2025-6611,0,0,7995f1edc0c30b62b1f03248a1d743ad11e83dfc62a7cad6296156bfe59bddfa,2025-06-27T18:35:43.527000
CVE-2025-6612,0,0,07b59bf2a678137703650a46707e7aec19f5fdbc648bdd54e33c6dd2e18a3de4,2025-06-27T18:22:07.427000
CVE-2025-6613,0,0,c2bb8cd99265a5034c5ee33c32e611c24a3a55d21cdfdfeada424dd85f68d2a1,2025-07-02T16:43:35.053000
@ -300076,7 +300087,7 @@ CVE-2025-6937,0,0,b10d8c1265117b053b6599e6b544c7c61d2c978d507bac9b95b840b3f696bf
CVE-2025-6938,0,0,4fd9227ca597d68f11aeeaf0509beaf1b4bac7f33c7e6cf52ec4920ff118ddaa,2025-07-01T14:15:42.597000
CVE-2025-6939,0,0,22776f4e1566605da22c764584fd19e7bf5c94050807d3717fc162d620a969e9,2025-07-01T14:15:42.923000
CVE-2025-6940,0,0,692dc02623b91f77fa8a61f1ce9db90633920d7bc4914267ab9387b6f19f68ff,2025-07-01T14:15:43.063000
CVE-2025-6942,0,0,dae50f0c834a45857e9193e44500f4fb13c41056df3c36a0f1feeabe6f40778b,2025-07-02T16:15:29.883000
CVE-2025-6942,0,1,83a5e5e1ce50f3aa56fb8b5a20dcb89667587d5e1650ef446dc9762e08db271e,2025-07-02T20:15:31.957000
CVE-2025-6943,0,0,47ec0034a5e60779e756f274ba911165a53ed9b90dca2c4c369b8c069340ea4a,2025-07-02T16:15:30.060000
CVE-2025-6951,0,0,bc0426adb285583bec2a19fe1efc81ab85a4e6e2c93ef1f9996dfc34d21d6e46,2025-07-01T12:15:24.123000
CVE-2025-6952,0,0,ef1bec1b6180d9fb26ad38c0771f751baec562e5a678d8e9b2113976cfeed9a0,2025-07-01T12:15:24.343000

Can't render this file because it is too large.