mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2025-07-02T22:00:11.330468+00:00
This commit is contained in:
parent
7201773a89
commit
be0e7a9636
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2012-6068",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2013-01-21T21:55:01.103",
|
||||
"lastModified": "2025-04-11T00:51:21.963",
|
||||
"lastModified": "2025-07-02T20:15:28.747",
|
||||
"vulnStatus": "Deferred",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to (1) execute commands via the command-line interface in the TCP listener service or (2) transfer files via requests to the TCP listener service."
|
||||
"value": "The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,8 +66,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -102,13 +134,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
@ -121,11 +146,16 @@
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource"
|
||||
]
|
||||
"url": "https://us.codesys.com/ecosystem/security/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-084-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2012-6069",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2013-01-21T21:55:01.150",
|
||||
"lastModified": "2025-04-11T00:51:21.963",
|
||||
"lastModified": "2025-07-02T21:15:39.193",
|
||||
"vulnStatus": "Deferred",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directory traversal vulnerability in the Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x allows remote attackers to read, overwrite, or create arbitrary files via a .. (dot dot) in a request to the TCP listener service."
|
||||
"value": "The CoDeSys Runtime Toolkit\u2019s file transfer functionality does not \nperform input validation, which allows an attacker to access files and \ndirectories outside the intended scope. This may allow an attacker to \nupload and download any file on the device. This could allow the \nattacker to affect the availability, integrity, and confidentiality of \nthe device."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,8 +66,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-23"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -102,13 +134,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
@ -121,15 +146,16 @@
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/56300",
|
||||
"url": "https://us.codesys.com/ecosystem/security/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource"
|
||||
]
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-084-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2014-0760",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2014-04-25T05:12:07.693",
|
||||
"lastModified": "2025-04-12T10:46:40.837",
|
||||
"lastModified": "2025-07-02T21:15:39.710",
|
||||
"vulnStatus": "Deferred",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion provide an undocumented access method involving the FTP protocol, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors."
|
||||
"value": "The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1\n Modular Controller with CoDeSys and SoftMotion provide an undocumented \naccess method involving the FTP protocol, which could allow a remote attacker to execute arbitrary code or cause a denial of service (application \ncrash) via unspecified vectors."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,29 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||||
"baseScore": 9.3,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "MEDIUM",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.6,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
@ -44,7 +67,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -52,6 +75,16 @@
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -112,11 +145,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource"
|
||||
]
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-084-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-0769",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2014-04-25T05:12:07.753",
|
||||
"lastModified": "2025-04-12T10:46:40.837",
|
||||
"lastModified": "2025-07-02T21:15:39.930",
|
||||
"vulnStatus": "Deferred",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -17,6 +17,29 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||||
"baseScore": 9.3,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "MEDIUM",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.6,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
@ -44,7 +67,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -52,6 +75,16 @@
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -112,11 +145,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource"
|
||||
]
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-084-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-31631",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2025-02-12T22:15:29.007",
|
||||
"lastModified": "2025-02-13T16:15:35.670",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T21:35:56.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,73 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndExcluding": "8.0.27",
|
||||
"matchCriteriaId": "B25DE957-1D86-408D-AD1E-DBFB14115959"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.1.0",
|
||||
"versionEndExcluding": "8.1.15",
|
||||
"matchCriteriaId": "AF93F09C-C6A3-49AF-9202-0EC78065547D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.2.0",
|
||||
"versionEndExcluding": "8.2.2",
|
||||
"matchCriteriaId": "E87D2720-F21F-4FDE-A262-B8BA0B62AD98"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.39.2",
|
||||
"matchCriteriaId": "46D17F35-DB4A-491C-BB28-4BFA36F3618F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.php.net/bug.php?id=81740",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230223-0007/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.php.net/bug.php?id=81740",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-4104",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-09-11T09:15:08.997",
|
||||
"lastModified": "2024-11-21T08:34:24.063",
|
||||
"lastModified": "2025-07-02T21:15:40.210",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An invalid Polkit Authentication check and missing authentication requirements for D-Bus methods allowed any local user to configure arbitrary VPN setups.\n*This bug only affects Mozilla VPN on Linux. Other operating systems are unaffected.* This vulnerability affects Mozilla VPN client for Linux < v2.16.1."
|
||||
"value": "An invalid Polkit Authentication check and missing authentication requirements for D-Bus methods allowed any local user to configure arbitrary VPN setups.\n*This bug only affects Mozilla VPN on Linux. Other operating systems are unaffected.* This vulnerability affects Mozilla VPN 2.16.1 < (Linux)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12255",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-12-12T06:15:23.770",
|
||||
"lastModified": "2024-12-12T15:15:09.967",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:06:31.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,14 +61,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zealousweb:accept_stripe_payments_using_contact_form_7:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6",
|
||||
"matchCriteriaId": "5FB207CC-EA49-4814-A6B7-6B2139F78983"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3205295%40accept-stripe-payments-using-contact-form-7&new=3205295%40accept-stripe-payments-using-contact-form-7&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8a9e1325-1027-41ea-93be-c321aef61dea?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31669",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-02T15:15:11.113",
|
||||
"lastModified": "2024-12-03T16:15:21.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:36:02.780",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.3",
|
||||
"matchCriteriaId": "3A764AB8-1CB6-4DE6-A77B-8CF31D3DD3CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Crispy-fried-chicken/fb9f7000f0517a085483f7f2a60f0f08",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rizinorg/rizin/commit/e42999dda0be7737fafaf5e63c1c5833a72fd9c9",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31670",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-12T18:15:23.977",
|
||||
"lastModified": "2024-12-13T18:15:20.167",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:05:47.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.3",
|
||||
"matchCriteriaId": "3A764AB8-1CB6-4DE6-A77B-8CF31D3DD3CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/rizinorg/rizin/commit/75bac3088b2ec173e22d4be9d525ceacc987cf02",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36621",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T18:15:07.993",
|
||||
"lastModified": "2024-12-04T17:15:13.067",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:43:30.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mobyproject:moby:25.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4B150E78-BD5F-48FA-BE6E-9643C1E67697"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/5d44459edab5fafcdf86b43909b81135",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/moby/moby/blob/v25.0.5/builder/builder-next/adapters/snapshot/layer.go#L24",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/moby/moby/commit/37545cc644344dcb576cba67eb7b6f51a463d31e",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36622",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T18:15:08.140",
|
||||
"lastModified": "2024-12-03T16:15:22.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:41:55.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:raspap:raspap-webgui:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.0.9",
|
||||
"matchCriteriaId": "1B31EF76-BC27-41BE-B3D4-2D4F7DA0429E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/ab997b902ec892e592a0df93f38e6941",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/RaspAP/raspap-webgui/blob/3.0.9/ajax/logging/clearlog.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/raspap/raspap-webgui/commit/c98d2b0c15942b4829d31dec615b9b40cc6faa14#diff-939ee414d82245c3b3dd7d36b57f10706e06e8f0871b24bdcf9de6e0d181c4c9",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36623",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T18:15:08.293",
|
||||
"lastModified": "2025-05-01T14:15:35.340",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:36:45.220",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mobyproject:moby:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "25.0.3",
|
||||
"matchCriteriaId": "DF0603C7-4015-4481-96C0-04FA1AD21DA6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/c192c0159a19bf58a4373b696467dc29",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/moby/moby/blob/v25.0.3/pkg/streamformatter/streamformatter.go#L115",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/moby/moby/commit/5689dabfb357b673abdb4391eef426f297d7d1bb",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/moby/moby/commit/8e3bcf19748838b30e34d612832d1dc9d90363b8",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37377",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-12-12T01:55:19.320",
|
||||
"lastModified": "2024-12-12T15:15:13.500",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:26:04.183",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,107 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "22.7",
|
||||
"matchCriteriaId": "201EB882-0B2A-47DB-B517-1E72A0542B27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F788F6D9-5368-4B8E-BFA0-E8FB3CDADB01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3447428E-DBCD-4553-B51D-AC08ECAFD881"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "22.7",
|
||||
"matchCriteriaId": "FAD0FC91-CA1E-4DC3-A37E-1BF98906D07C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F22B988-2585-4853-9838-AB3746C8B888"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD9BE8C2-43EB-4870-A4B7-267CB17A19F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C8915BB2-C1C0-4189-A847-DDB2EF161D62"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/December-2024-Security-Advisory-Ivanti-Connect-Secure-ICS-and-Ivanti-Policy-Secure-IPS-Multiple-CVEs",
|
||||
"source": "support@hackerone.com"
|
||||
"source": "support@hackerone.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37401",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-12-12T01:55:20.820",
|
||||
"lastModified": "2024-12-12T15:15:13.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:07:12.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,107 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:*:-:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "22.7",
|
||||
"matchCriteriaId": "A0EC2FCD-5402-4269-B86A-18F8DFB8F2C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F788F6D9-5368-4B8E-BFA0-E8FB3CDADB01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3447428E-DBCD-4553-B51D-AC08ECAFD881"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "22.7",
|
||||
"matchCriteriaId": "FAD0FC91-CA1E-4DC3-A37E-1BF98906D07C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F22B988-2585-4853-9838-AB3746C8B888"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD9BE8C2-43EB-4870-A4B7-267CB17A19F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C8915BB2-C1C0-4189-A847-DDB2EF161D62"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/December-2024-Security-Advisory-Ivanti-Connect-Secure-ICS-and-Ivanti-Policy-Secure-IPS-Multiple-CVEs",
|
||||
"source": "support@hackerone.com"
|
||||
"source": "support@hackerone.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45206",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-12-04T02:15:05.427",
|
||||
"lastModified": "2025-03-13T19:15:48.013",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:34:43.323",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:veeam:veeam_service_provider_console:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.0.12777",
|
||||
"versionEndExcluding": "8.1.0.21377",
|
||||
"matchCriteriaId": "50FFBB24-D779-42F4-8874-3905AA3ABF75"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.veeam.com/kb4649",
|
||||
"source": "support@hackerone.com"
|
||||
"source": "support@hackerone.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45207",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-12-04T02:15:05.520",
|
||||
"lastModified": "2024-12-04T16:15:25.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:29:56.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:veeam:veeam_agent_for_windows:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.0.959",
|
||||
"versionEndExcluding": "6.3.0.177",
|
||||
"matchCriteriaId": "71DBFD55-CF57-4184-8BC4-4DFEFAC31880"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.veeam.com/kb4693",
|
||||
"source": "support@hackerone.com"
|
||||
"source": "support@hackerone.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45497",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-12-31T03:15:05.543",
|
||||
"lastModified": "2025-07-02T09:15:23.290",
|
||||
"lastModified": "2025-07-02T20:15:29.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -56,6 +56,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:9269",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:9759",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:9765",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50699",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-10T19:15:30.193",
|
||||
"lastModified": "2024-12-11T16:15:12.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:28:26.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,104 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:tl-wr845n_firmware:190219:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "735CFB5E-C8B3-4BC5-87A7-97F36A432D9C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:tl-wr845n:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A9ADE93-33FC-43D4-BC86-042B4D6D48A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:tl-wr845n_firmware:200909:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D942522-2F2B-4CDB-BDC7-23F9BBDAD844"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:tl-wr845n:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A9ADE93-33FC-43D4-BC86-042B4D6D48A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:tl-wr845n_firmware:201214:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D59784C-71BA-4212-8141-04EE7D675F4B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:tl-wr845n:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A9ADE93-33FC-43D4-BC86-042B4D6D48A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.iiita.ac.in/iot/password-reset-missing-tplink.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.iiita.ac.in/iot/base64-authorization.docx",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8929",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2024-11-22T07:15:03.447",
|
||||
"lastModified": "2025-01-10T13:15:10.460",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:11:20.063",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,14 +55,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.1.0",
|
||||
"versionEndExcluding": "8.1.31",
|
||||
"matchCriteriaId": "CE6E1B68-3EB9-4C67-97A6-226EA02CC2EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.2.0",
|
||||
"versionEndExcluding": "8.2.26",
|
||||
"matchCriteriaId": "C160D91A-CF97-4DD1-A34F-8B8C852B3CEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.3.0",
|
||||
"versionEndExcluding": "8.3.14",
|
||||
"matchCriteriaId": "35B1BA7F-0EAE-4F40-ACA4-EBC5D63F609A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/php/php-src/security/advisories/GHSA-h35g-vwh6-m678",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250110-0008/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8932",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2024-11-22T06:15:20.197",
|
||||
"lastModified": "2025-01-10T13:15:10.617",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:08:35.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,68 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.1.0",
|
||||
"versionEndExcluding": "8.1.31",
|
||||
"matchCriteriaId": "CE6E1B68-3EB9-4C67-97A6-226EA02CC2EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.2.0",
|
||||
"versionEndExcluding": "8.2.26",
|
||||
"matchCriteriaId": "C160D91A-CF97-4DD1-A34F-8B8C852B3CEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.3.0",
|
||||
"versionEndExcluding": "8.3.14",
|
||||
"matchCriteriaId": "35B1BA7F-0EAE-4F40-ACA4-EBC5D63F609A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/php/php-src/security/advisories/GHSA-g665-fm4p-vhff",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250110-0009/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0073",
|
||||
"sourceIdentifier": "arm-security@arm.com",
|
||||
"published": "2025-06-02T11:15:21.067",
|
||||
"lastModified": "2025-06-02T17:32:17.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T21:18:03.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,35 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:r53p0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "286DD633-0184-413A-A39A-58CE2D469712"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:r53p0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C77780C0-FA5F-4859-B983-4ECCF1098BCA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developer.arm.com/documentation/110466/latest/",
|
||||
"source": "arm-security@arm.com"
|
||||
"source": "arm-security@arm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0819",
|
||||
"sourceIdentifier": "arm-security@arm.com",
|
||||
"published": "2025-06-02T11:15:21.707",
|
||||
"lastModified": "2025-06-02T17:32:17.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T21:18:07.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,70 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r44p0",
|
||||
"versionEndExcluding": "r49p4",
|
||||
"matchCriteriaId": "9996F189-E9B8-445E-82EF-962B28E20E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r50p0",
|
||||
"versionEndExcluding": "r54p1",
|
||||
"matchCriteriaId": "34E4A755-7DA1-41CE-AE08-48F73DC7C88F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r44p0",
|
||||
"versionEndExcluding": "r49p4",
|
||||
"matchCriteriaId": "CD001086-9219-45A4-886B-CB5491313F02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:r50p0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CFA42E01-84F9-40CE-A03A-EDB148B1D6DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:r51p0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8EFE8BA5-EE63-486C-A660-5C4D3D4D223E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r44p0",
|
||||
"versionEndExcluding": "r49p4",
|
||||
"matchCriteriaId": "F02BF9D9-AA49-4478-8772-AF907AC21CFA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r50p0",
|
||||
"versionEndExcluding": "r54p1",
|
||||
"matchCriteriaId": "F1518C84-7FFE-4AC8-8335-FC4804E0FBA6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developer.arm.com/documentation/110466/latest/",
|
||||
"source": "arm-security@arm.com"
|
||||
"source": "arm-security@arm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1246",
|
||||
"sourceIdentifier": "arm-security@arm.com",
|
||||
"published": "2025-06-02T11:15:21.823",
|
||||
"lastModified": "2025-06-02T17:32:17.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T21:27:05.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,70 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_userspace_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r41p0",
|
||||
"versionEndExcluding": "r49p4",
|
||||
"matchCriteriaId": "D15CAA8C-B125-4DD5-88DD-BD39D18F1EFF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_userspace_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r50p0",
|
||||
"versionEndExcluding": "r54p1",
|
||||
"matchCriteriaId": "04ADA3A4-C98B-4BDA-8838-F742CAAE7F3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:bifrost_gpu_userspace_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r48p0",
|
||||
"versionEndExcluding": "r49p4",
|
||||
"matchCriteriaId": "30D58642-28C3-4BAA-B90B-0FCDE8768578"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:bifrost_gpu_userspace_driver:r50p0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A63C1ACA-E608-4B65-BBA5-4637C3E4C662"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:bifrost_gpu_userspace_driver:r51p0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8F7B1DC-0CA1-4F5E-B150-7864A88C6592"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:valhall_gpu_userspace_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r28p0",
|
||||
"versionEndExcluding": "r49p4",
|
||||
"matchCriteriaId": "B21C277E-C5D4-40DE-8824-41BBC6EDF035"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:valhall_gpu_userspace_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r50p0",
|
||||
"versionEndExcluding": "r54p1",
|
||||
"matchCriteriaId": "18A9000D-8DAA-4B5E-930A-B3E1225C63D2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developer.arm.com/documentation/110466/latest/",
|
||||
"source": "arm-security@arm.com"
|
||||
"source": "arm-security@arm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1734",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2025-03-30T06:15:14.603",
|
||||
"lastModified": "2025-05-23T14:15:26.087",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:13:31.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,14 +95,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.1.0",
|
||||
"versionEndExcluding": "8.1.32",
|
||||
"matchCriteriaId": "240B9DA6-4FE3-42D1-931A-9F4C62EC0ABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.2.0",
|
||||
"versionEndExcluding": "8.2.28",
|
||||
"matchCriteriaId": "3C01313A-447A-4190-B275-3A6394EEFD96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.3.0",
|
||||
"versionEndExcluding": "8.3.19",
|
||||
"matchCriteriaId": "A525415D-4C9F-4884-9F85-94989608D805"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndExcluding": "8.4.5",
|
||||
"matchCriteriaId": "AC94B1EC-530A-4A25-9BCD-DAC5F52F6813"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/php/php-src/security/advisories/GHSA-pcmh-g36c-qc44",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250523-0009/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1736",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2025-03-30T06:15:14.803",
|
||||
"lastModified": "2025-05-23T14:15:26.203",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:14:40.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,14 +95,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.1.0",
|
||||
"versionEndExcluding": "8.1.32",
|
||||
"matchCriteriaId": "240B9DA6-4FE3-42D1-931A-9F4C62EC0ABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.2.0",
|
||||
"versionEndExcluding": "8.2.28",
|
||||
"matchCriteriaId": "3C01313A-447A-4190-B275-3A6394EEFD96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.3.0",
|
||||
"versionEndExcluding": "8.3.19",
|
||||
"matchCriteriaId": "A525415D-4C9F-4884-9F85-94989608D805"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndExcluding": "8.4.5",
|
||||
"matchCriteriaId": "AC94B1EC-530A-4A25-9BCD-DAC5F52F6813"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/php/php-src/security/advisories/GHSA-hgf5-96fm-v528",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250523-0006/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1861",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2025-03-30T06:15:14.957",
|
||||
"lastModified": "2025-05-23T14:15:26.320",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:17:38.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,14 +95,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.1.0",
|
||||
"versionEndExcluding": "8.1.31",
|
||||
"matchCriteriaId": "CE6E1B68-3EB9-4C67-97A6-226EA02CC2EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.2.0",
|
||||
"versionEndExcluding": "8.2.26",
|
||||
"matchCriteriaId": "C160D91A-CF97-4DD1-A34F-8B8C852B3CEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.3.0",
|
||||
"versionEndExcluding": "8.3.14",
|
||||
"matchCriteriaId": "35B1BA7F-0EAE-4F40-ACA4-EBC5D63F609A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndExcluding": "8.4.5",
|
||||
"matchCriteriaId": "AC94B1EC-530A-4A25-9BCD-DAC5F52F6813"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/php/php-src/security/advisories/GHSA-52jp-hrpf-2jff",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250523-0005/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2025/CVE-2025-340xx/CVE-2025-34074.json
Normal file
90
CVE-2025/CVE-2025-340xx/CVE-2025-34074.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2025-34074",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-07-02T20:15:29.410",
|
||||
"lastModified": "2025-07-02T20:15:29.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authenticated remote code execution vulnerability exists in Lucee\u2019s administrative interface due to insecure design in the scheduled task functionality. An administrator with access to /lucee/admin/web.cfm can configure a scheduled job to retrieve a remote .cfm file from an attacker-controlled server, which is written to the Lucee webroot and executed with the privileges of the Lucee service account. Because Lucee does not enforce integrity checks, path restrictions, or execution controls for scheduled task fetches, this feature can be abused to achieve arbitrary code execution. This issue is distinct from CVE-2024-55354."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-829"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/lucee/Lucee",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/lucee_scheduled_job.rb",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/lucee-admin-interface-rce",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
106
CVE-2025/CVE-2025-340xx/CVE-2025-34075.json
Normal file
106
CVE-2025/CVE-2025-340xx/CVE-2025-34075.json
Normal file
@ -0,0 +1,106 @@
|
||||
{
|
||||
"id": "CVE-2025-34075",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-07-02T20:15:29.553",
|
||||
"lastModified": "2025-07-02T21:15:40.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authenticated virtual machine escape vulnerability exists in HashiCorp Vagrant when using the default synced folder configuration. By design, Vagrant automatically mounts the host system\u2019s project directory into the guest VM under /vagrant (or C:\\vagrant on Windows). This includes the Vagrantfile configuration file, which is a Ruby script evaluated by the host every time a vagrant command is executed in the project directory. If a low-privileged attacker obtains shell access to the guest VM, they can append arbitrary Ruby code to the mounted Vagrantfile. When a user on the host later runs any vagrant command, the injected code is executed on the host with that user\u2019s privileges.\n\n While this shared-folder behavior is well-documented by Vagrant, the security implications of Vagrantfile execution from guest-writable storage are not explicitly addressed. This effectively enables guest-to-host code execution in multi-tenant or adversarial VM scenarios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developer.hashicorp.com/vagrant",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://developer.hashicorp.com/vagrant/docs/synced-folders/basic_usage",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://developer.hashicorp.com/vagrant/docs/vagrantfile",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/local/vagrant_synced_folder_vagrantfile_breakout.rb",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/hashicorp-vagrant-synced-folder-vagrantfile-breakout",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/local/vagrant_synced_folder_vagrantfile_breakout.rb",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
98
CVE-2025/CVE-2025-340xx/CVE-2025-34076.json
Normal file
98
CVE-2025/CVE-2025-340xx/CVE-2025-34076.json
Normal file
@ -0,0 +1,98 @@
|
||||
{
|
||||
"id": "CVE-2025-34076",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-07-02T20:15:29.690",
|
||||
"lastModified": "2025-07-02T20:15:29.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authenticated local file inclusion vulnerability exists in Microweber CMS versions <= 1.2.11 through misuse of the backup management API. Authenticated users can abuse the /api/BackupV2/upload and /api/BackupV2/download endpoints to read arbitrary files from the underlying filesystem. By specifying an absolute file path in the src parameter of the upload request, the server may relocate or delete the target file depending on the web service user\u2019s privileges. The corresponding download endpoint can then be used to retrieve the file contents, effectively enabling local file disclosure. This behavior stems from insufficient validation of user-supplied paths and inadequate restrictions on file access and backup logic."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/microweber/microweber",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/microweber/microweber/commit/572bdc36b5b47923790016f6b961c8df53226855",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/microweber/microweber/commit/98d025467128ecc24195dcb56c533febc3c91af6",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/09218d3f-1f6a-48ae-981c-85e86ad5ed8b",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/gather/microweber_lfi.rb",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/microweber-cms-lfi",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
94
CVE-2025/CVE-2025-340xx/CVE-2025-34078.json
Normal file
94
CVE-2025/CVE-2025-340xx/CVE-2025-34078.json
Normal file
@ -0,0 +1,94 @@
|
||||
{
|
||||
"id": "CVE-2025-34078",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-07-02T20:15:29.827",
|
||||
"lastModified": "2025-07-02T20:15:29.827",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A local privilege escalation vulnerability exists in NSClient++ 0.5.2.35 when both the web interface and ExternalScripts features are enabled. The configuration file (nsclient.ini) stores the administrative password in plaintext and is readable by local users. By extracting this password, an attacker can authenticate to the NSClient++ web interface (typically accessible on port 8443) and abuse the ExternalScripts plugin to inject and execute arbitrary commands as SYSTEM by registering a custom script, saving the configuration, and triggering it via the API.\n\nThis behavior is documented but insecure, as the plaintext credential exposure undermines access isolation between local users and administrative functions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/local/nscp_pe.rb",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/nsclient-localtoremote-system-compromise",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/46802",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/48360",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2025/CVE-2025-340xx/CVE-2025-34079.json
Normal file
90
CVE-2025/CVE-2025-340xx/CVE-2025-34079.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2025-34079",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-07-02T20:15:29.963",
|
||||
"lastModified": "2025-07-02T20:15:29.963",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authenticated remote code execution vulnerability exists in NSClient++ version 0.5.2.35 when the web interface and ExternalScripts module are enabled. A remote attacker with the administrator password can authenticate to the web interface (default port 8443), inject arbitrary commands as external scripts via the /settings/query.json API, save the configuration, and trigger the script via the /query/{name} endpoint. The injected commands are executed with SYSTEM privileges, enabling full remote compromise.\n\nThis capability is an intended feature, but the lack of safeguards or privilege separation makes it risky when exposed to untrusted actors."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/nscp_authenticated_rce.rb",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/nsclient-localtoremote-system-compromise",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/48360",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-340xx/CVE-2025-34090.json
Normal file
86
CVE-2025/CVE-2025-340xx/CVE-2025-34090.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-34090",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-07-02T20:15:30.110",
|
||||
"lastModified": "2025-07-02T20:15:30.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A security bypass vulnerability exists in Google Chrome AppBound cookie encryption mechanism due to insufficient validation of COM server paths during inter-process communication. A local low-privileged attacker can hijack the COM class identifier (CLSID) registration used by Chrome's elevation service and point it to a non-existent or malicious binary. When this hijack occurs, Chrome silently falls back to the legacy cookie encryption mechanism (protected only by user-DPAPI), thereby enabling cookie decryption by any user-context malware without SYSTEM-level access. This flaw bypasses the protections intended by the AppBound encryption design and allows cookie theft from Chromium-based browsers.\n\nConfirmed in Google Chrome with AppBound Encryption enabled. Other Chromium-based browsers may be affected if they implement similar COM-based encryption mechanisms."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-426"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/google-chrome-appbound-cookie-encryption",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cyberark.com/resources/threat-research-blog/c4-bomb-blowing-up-chromes-appbound-cookie-encryption",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-340xx/CVE-2025-34091.json
Normal file
86
CVE-2025/CVE-2025-340xx/CVE-2025-34091.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-34091",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-07-02T20:15:30.260",
|
||||
"lastModified": "2025-07-02T20:15:30.260",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A padding oracle vulnerability exists in Google Chrome\u2019s AppBound cookie encryption mechanism due to observable decryption failure behavior in Windows Event Logs when handling malformed ciphertext in SYSTEM-DPAPI-encrypted blobs. A local attacker can repeatedly send malformed ciphertexts to the Chrome elevation service and distinguish between padding and MAC errors, enabling a padding oracle attack. This allows partial decryption of the SYSTEM-DPAPI layer and eventual recovery of the user-DPAPI encrypted cookie key, which is trivially decrypted by the attacker\u2019s own context. This issue undermines the core purpose of AppBound Encryption by enabling low-privileged cookie theft through cryptographic misuse and verbose error feedback.\n\nConfirmed in Google Chrome with AppBound Encryption enabled. Other Chromium-based browsers may be affected if they implement similar COM-based encryption mechanisms.\n\nThis behavior arises from a combination of Chrome\u2019s AppBound implementation and the way Microsoft Windows DPAPI reports decryption failures via Event Logs. As such, the vulnerability relies on cryptographic behavior and error visibility in all supported versions of Windows."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/google-chrome-appbound-cookie-encryption",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cyberark.com/resources/threat-research-blog/c4-bomb-blowing-up-chromes-appbound-cookie-encryption",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2025/CVE-2025-340xx/CVE-2025-34092.json
Normal file
90
CVE-2025/CVE-2025-340xx/CVE-2025-34092.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2025-34092",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-07-02T20:15:30.413",
|
||||
"lastModified": "2025-07-02T20:15:30.413",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cookie encryption bypass vulnerability exists in Google Chrome\u2019s AppBound mechanism due to weak path validation logic within the elevation service. When Chrome encrypts a cookie key, it records its own executable path as validation metadata. Later, when decrypting, the elevation service compares the requesting process\u2019s path to this stored path. However, due to path canonicalization inconsistencies, an attacker can impersonate Chrome (e.g., by naming their binary chrome.exe and placing it in a similar path) and successfully retrieve the encrypted cookie key. This allows malicious processes to retrieve cookies intended to be restricted to the Chrome process only.\n\nConfirmed in Google Chrome with AppBound Encryption enabled. Other Chromium-based browsers may be affected if they implement similar COM-based encryption mechanisms."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-706"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/google-chrome-appbound-cookie-encryption",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cyberark.com/resources/threat-research-blog/c4-bomb-blowing-up-chromes-appbound-cookie-encryption",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-430xx/CVE-2025-43025.json
Normal file
78
CVE-2025/CVE-2025-430xx/CVE-2025-43025.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-43025",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2025-07-02T20:15:30.550",
|
||||
"lastModified": "2025-07-02T20:15:30.550",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HP Universal Print Driver is potentially vulnerable to denial of service due to buffer overflow in versions of UPD 7.4 or older (e.g., v7.3.x, v7.2.x, v7.1.x, etc.)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "hp-security-alert@hp.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "LOW",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "hp-security-alert@hp.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_12690576-12690598-16/hpsbpi04032",
|
||||
"source": "hp-security-alert@hp.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-45029",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-07-02T14:15:25.470",
|
||||
"lastModified": "2025-07-02T14:15:25.470",
|
||||
"lastModified": "2025-07-02T21:15:41.003",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "WINSTAR WN572HP3 v230525 was discovered to contain a heap overflow via the CONTENT_LENGTH variable at /cgi-bin/upload.cgi."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://winstar.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-46647",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2025-07-02T12:15:28.227",
|
||||
"lastModified": "2025-07-02T12:15:28.227",
|
||||
"lastModified": "2025-07-02T21:15:41.190",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,11 +11,34 @@
|
||||
"value": "A vulnerability of plugin\u00a0openid-connect in Apache APISIX.\n\nThis vulnerability will only have an impact if all of the following conditions are met:\n1. Use the openid-connect plugin with introspection mode\n2. The auth service connected to openid-connect provides services to multiple issuers\n3. Multiple issuers share the same private key and relies only on the issuer being different\n\nIf affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.\n\n\n\n\nThis issue affects Apache APISIX: until 3.12.0.\n\nUsers are recommended to upgrade to version 3.12.0 or higher."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-49175",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-06-17T15:15:45.290",
|
||||
"lastModified": "2025-06-30T20:15:24.553",
|
||||
"lastModified": "2025-07-02T20:15:30.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:10258",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:9303",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-49176",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-06-17T15:15:45.470",
|
||||
"lastModified": "2025-06-30T20:15:24.690",
|
||||
"lastModified": "2025-07-02T20:15:30.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:10258",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:9303",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-49177",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-06-17T15:15:45.650",
|
||||
"lastModified": "2025-06-30T10:15:25.913",
|
||||
"lastModified": "2025-07-02T20:15:30.943",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:10258",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:9304",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-49178",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-06-17T15:15:45.813",
|
||||
"lastModified": "2025-06-30T21:15:30.693",
|
||||
"lastModified": "2025-07-02T20:15:31.057",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:10258",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:9303",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-49179",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-06-17T15:15:46.000",
|
||||
"lastModified": "2025-06-30T20:15:24.817",
|
||||
"lastModified": "2025-07-02T20:15:31.187",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:10258",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:9303",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-49180",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-06-17T15:15:46.183",
|
||||
"lastModified": "2025-06-30T20:15:24.940",
|
||||
"lastModified": "2025-07-02T20:15:31.320",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:10258",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:9303",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-49262",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-06-06T13:15:42.713",
|
||||
"lastModified": "2025-06-06T14:06:58.193",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:02:58.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sinaextra:sina_extension_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.7.0",
|
||||
"matchCriteriaId": "5E8362F9-A91A-4A5E-820E-DBD767B84655"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/sina-extension-for-elementor/vulnerability/wordpress-sina-extension-for-elementor-3-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-49291",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-06-06T13:15:44.933",
|
||||
"lastModified": "2025-06-06T14:06:58.193",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T20:02:18.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:codepeople:calculated_fields_form:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.3.59",
|
||||
"matchCriteriaId": "9C2BAF19-B851-4B02-B0B5-C1DD3F829029"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/calculated-fields-form/vulnerability/wordpress-calculated-fields-form-5-3-58-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-525xx/CVE-2025-52559.json
Normal file
68
CVE-2025/CVE-2025-525xx/CVE-2025-52559.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-52559",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-07-02T20:15:31.443",
|
||||
"lastModified": "2025-07-02T20:15:31.443",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Zulip is an open-source team chat application. From versions 2.0.0-rc1 to before 10.4 in Zulip Server, the /digest/ URL of a server shows a preview of what the email weekly digest would contain. This URL, though not the digest itself, contains a cross-site scripting (XSS) vulnerability in both topic names and channel names. This issue has been fixed in Zulip Server 10.4. A workaround for this issue involves denying access to /digest/."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zulip/zulip/commit/175ec1f365b0db982d6eac9019701cbf6e8bc2f2",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zulip/zulip/commit/1a8429e338ff53bdcc4b42e7e71b6fffdd84fcd1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zulip/zulip/commit/6608c8777254e73a4b540e5e1c4af92e680a55fc",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zulip/zulip/security/advisories/GHSA-vgf2-vw4r-m663",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-52841",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2025-07-02T17:15:53.807",
|
||||
"lastModified": "2025-07-02T17:15:53.807",
|
||||
"lastModified": "2025-07-02T20:15:31.610",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,7 +60,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
{
|
||||
"url": "https://github.com/mohaiminur/laundry",
|
||||
"source": "help@fluidattacks.com"
|
||||
},
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/tort",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-528xx/CVE-2025-52842.json
Normal file
86
CVE-2025/CVE-2025-528xx/CVE-2025-52842.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-52842",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2025-07-02T20:15:31.727",
|
||||
"lastModified": "2025-07-02T20:15:31.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Laundry on Linux, MacOS allows Account Takeover. This issue affects Laundry: 2.3.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/winehouse",
|
||||
"source": "help@fluidattacks.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mohaiminur/laundry",
|
||||
"source": "help@fluidattacks.com"
|
||||
},
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/winehouse",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-53256",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-06-27T14:15:44.917",
|
||||
"lastModified": "2025-06-30T18:38:48.477",
|
||||
"lastModified": "2025-07-02T21:15:41.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in YayCommerce YaySMTP allows SQL Injection. This issue affects YaySMTP: from n/a through 6.8.1."
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in YayCommerce YaySMTP allows SQL Injection.This issue affects YaySMTP: from n/a through 2.6.5."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -42,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-6424",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-06-24T13:15:23.273",
|
||||
"lastModified": "2025-07-02T18:11:28.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-07-02T21:15:41.517",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, and Firefox ESR < 128.12."
|
||||
"value": "A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -110,6 +110,14 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-54/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-55/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-6425",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-06-24T13:15:23.403",
|
||||
"lastModified": "2025-06-26T18:58:14.280",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-02T21:15:41.670",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, and Firefox ESR < 128.12."
|
||||
"value": "An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -67,6 +67,14 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-53/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-54/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-55/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-6942",
|
||||
"sourceIdentifier": "1443cd92-d354-46d2-9290-d812316ca43a",
|
||||
"published": "2025-07-02T16:15:29.883",
|
||||
"lastModified": "2025-07-02T16:15:29.883",
|
||||
"lastModified": "2025-07-02T20:15:31.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The distributed engine of Secret Server versions 11.7.49 and earlier can be exploited during an initial authorization event that would allow an attacker to impersonate another distributed engine."
|
||||
"value": "The distributed engine versions 8.4.39.0 and earlier of Secret Server versions 11.7.49 and earlier can be exploited during an initial authorization event that would allow an attacker to impersonate another distributed engine."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -61,7 +61,7 @@
|
||||
"source": "1443cd92-d354-46d2-9290-d812316ca43a"
|
||||
},
|
||||
{
|
||||
"url": "https://trust.delinea.com",
|
||||
"url": "https://trust.delinea.com/?tcuUid=2b68edca-7930-438d-b960-2d6da07cdde9",
|
||||
"source": "1443cd92-d354-46d2-9290-d812316ca43a"
|
||||
}
|
||||
]
|
||||
|
73
README.md
73
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-07-02T20:00:11.604133+00:00
|
||||
2025-07-02T22:00:11.330468+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-07-02T19:56:33.060000+00:00
|
||||
2025-07-02T21:35:56.150000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,46 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
300092
|
||||
300103
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
- [CVE-2025-45813](CVE-2025/CVE-2025-458xx/CVE-2025-45813.json) (`2025-07-02T18:15:24.170`)
|
||||
- [CVE-2025-49713](CVE-2025/CVE-2025-497xx/CVE-2025-49713.json) (`2025-07-02T18:15:24.303`)
|
||||
- [CVE-2025-34074](CVE-2025/CVE-2025-340xx/CVE-2025-34074.json) (`2025-07-02T20:15:29.410`)
|
||||
- [CVE-2025-34075](CVE-2025/CVE-2025-340xx/CVE-2025-34075.json) (`2025-07-02T20:15:29.553`)
|
||||
- [CVE-2025-34076](CVE-2025/CVE-2025-340xx/CVE-2025-34076.json) (`2025-07-02T20:15:29.690`)
|
||||
- [CVE-2025-34078](CVE-2025/CVE-2025-340xx/CVE-2025-34078.json) (`2025-07-02T20:15:29.827`)
|
||||
- [CVE-2025-34079](CVE-2025/CVE-2025-340xx/CVE-2025-34079.json) (`2025-07-02T20:15:29.963`)
|
||||
- [CVE-2025-34090](CVE-2025/CVE-2025-340xx/CVE-2025-34090.json) (`2025-07-02T20:15:30.110`)
|
||||
- [CVE-2025-34091](CVE-2025/CVE-2025-340xx/CVE-2025-34091.json) (`2025-07-02T20:15:30.260`)
|
||||
- [CVE-2025-34092](CVE-2025/CVE-2025-340xx/CVE-2025-34092.json) (`2025-07-02T20:15:30.413`)
|
||||
- [CVE-2025-43025](CVE-2025/CVE-2025-430xx/CVE-2025-43025.json) (`2025-07-02T20:15:30.550`)
|
||||
- [CVE-2025-52559](CVE-2025/CVE-2025-525xx/CVE-2025-52559.json) (`2025-07-02T20:15:31.443`)
|
||||
- [CVE-2025-52842](CVE-2025/CVE-2025-528xx/CVE-2025-52842.json) (`2025-07-02T20:15:31.727`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `66`
|
||||
Recently modified CVEs: `41`
|
||||
|
||||
- [CVE-2025-5439](CVE-2025/CVE-2025-54xx/CVE-2025-5439.json) (`2025-07-02T18:08:04.770`)
|
||||
- [CVE-2025-5440](CVE-2025/CVE-2025-54xx/CVE-2025-5440.json) (`2025-07-02T18:07:16.100`)
|
||||
- [CVE-2025-5877](CVE-2025/CVE-2025-58xx/CVE-2025-5877.json) (`2025-07-02T19:17:43.003`)
|
||||
- [CVE-2025-6140](CVE-2025/CVE-2025-61xx/CVE-2025-6140.json) (`2025-07-02T18:58:42.230`)
|
||||
- [CVE-2025-6152](CVE-2025/CVE-2025-61xx/CVE-2025-6152.json) (`2025-07-02T19:47:02.363`)
|
||||
- [CVE-2025-6167](CVE-2025/CVE-2025-61xx/CVE-2025-6167.json) (`2025-07-02T19:36:26.940`)
|
||||
- [CVE-2025-6177](CVE-2025/CVE-2025-61xx/CVE-2025-6177.json) (`2025-07-02T18:26:40.590`)
|
||||
- [CVE-2025-6179](CVE-2025/CVE-2025-61xx/CVE-2025-6179.json) (`2025-07-02T18:23:31.617`)
|
||||
- [CVE-2025-6269](CVE-2025/CVE-2025-62xx/CVE-2025-6269.json) (`2025-07-02T19:01:55.227`)
|
||||
- [CVE-2025-6270](CVE-2025/CVE-2025-62xx/CVE-2025-6270.json) (`2025-07-02T19:02:17.373`)
|
||||
- [CVE-2025-6271](CVE-2025/CVE-2025-62xx/CVE-2025-6271.json) (`2025-07-02T19:03:29.737`)
|
||||
- [CVE-2025-6272](CVE-2025/CVE-2025-62xx/CVE-2025-6272.json) (`2025-07-02T19:04:23.387`)
|
||||
- [CVE-2025-6274](CVE-2025/CVE-2025-62xx/CVE-2025-6274.json) (`2025-07-02T18:33:27.390`)
|
||||
- [CVE-2025-6275](CVE-2025/CVE-2025-62xx/CVE-2025-6275.json) (`2025-07-02T18:34:42.377`)
|
||||
- [CVE-2025-6281](CVE-2025/CVE-2025-62xx/CVE-2025-6281.json) (`2025-07-02T18:37:11.983`)
|
||||
- [CVE-2025-6296](CVE-2025/CVE-2025-62xx/CVE-2025-6296.json) (`2025-07-02T18:46:52.983`)
|
||||
- [CVE-2025-6299](CVE-2025/CVE-2025-62xx/CVE-2025-6299.json) (`2025-07-02T18:53:41.497`)
|
||||
- [CVE-2025-6363](CVE-2025/CVE-2025-63xx/CVE-2025-6363.json) (`2025-07-02T18:56:45.850`)
|
||||
- [CVE-2025-6403](CVE-2025/CVE-2025-64xx/CVE-2025-6403.json) (`2025-07-02T18:56:36.940`)
|
||||
- [CVE-2025-6424](CVE-2025/CVE-2025-64xx/CVE-2025-6424.json) (`2025-07-02T18:11:28.190`)
|
||||
- [CVE-2025-6447](CVE-2025/CVE-2025-64xx/CVE-2025-6447.json) (`2025-07-02T18:24:21.523`)
|
||||
- [CVE-2025-6570](CVE-2025/CVE-2025-65xx/CVE-2025-6570.json) (`2025-07-02T18:24:35.030`)
|
||||
- [CVE-2025-6608](CVE-2025/CVE-2025-66xx/CVE-2025-6608.json) (`2025-07-02T18:24:47.807`)
|
||||
- [CVE-2025-6609](CVE-2025/CVE-2025-66xx/CVE-2025-6609.json) (`2025-07-02T18:24:56.760`)
|
||||
- [CVE-2025-6610](CVE-2025/CVE-2025-66xx/CVE-2025-6610.json) (`2025-07-02T18:29:30.530`)
|
||||
- [CVE-2024-45497](CVE-2024/CVE-2024-454xx/CVE-2024-45497.json) (`2025-07-02T20:15:29.150`)
|
||||
- [CVE-2024-50699](CVE-2024/CVE-2024-506xx/CVE-2024-50699.json) (`2025-07-02T20:28:26.957`)
|
||||
- [CVE-2024-8929](CVE-2024/CVE-2024-89xx/CVE-2024-8929.json) (`2025-07-02T20:11:20.063`)
|
||||
- [CVE-2024-8932](CVE-2024/CVE-2024-89xx/CVE-2024-8932.json) (`2025-07-02T20:08:35.010`)
|
||||
- [CVE-2025-0073](CVE-2025/CVE-2025-00xx/CVE-2025-0073.json) (`2025-07-02T21:18:03.963`)
|
||||
- [CVE-2025-0819](CVE-2025/CVE-2025-08xx/CVE-2025-0819.json) (`2025-07-02T21:18:07.187`)
|
||||
- [CVE-2025-1246](CVE-2025/CVE-2025-12xx/CVE-2025-1246.json) (`2025-07-02T21:27:05.870`)
|
||||
- [CVE-2025-1734](CVE-2025/CVE-2025-17xx/CVE-2025-1734.json) (`2025-07-02T20:13:31.447`)
|
||||
- [CVE-2025-1736](CVE-2025/CVE-2025-17xx/CVE-2025-1736.json) (`2025-07-02T20:14:40.817`)
|
||||
- [CVE-2025-1861](CVE-2025/CVE-2025-18xx/CVE-2025-1861.json) (`2025-07-02T20:17:38.193`)
|
||||
- [CVE-2025-45029](CVE-2025/CVE-2025-450xx/CVE-2025-45029.json) (`2025-07-02T21:15:41.003`)
|
||||
- [CVE-2025-46647](CVE-2025/CVE-2025-466xx/CVE-2025-46647.json) (`2025-07-02T21:15:41.190`)
|
||||
- [CVE-2025-49175](CVE-2025/CVE-2025-491xx/CVE-2025-49175.json) (`2025-07-02T20:15:30.693`)
|
||||
- [CVE-2025-49176](CVE-2025/CVE-2025-491xx/CVE-2025-49176.json) (`2025-07-02T20:15:30.820`)
|
||||
- [CVE-2025-49177](CVE-2025/CVE-2025-491xx/CVE-2025-49177.json) (`2025-07-02T20:15:30.943`)
|
||||
- [CVE-2025-49178](CVE-2025/CVE-2025-491xx/CVE-2025-49178.json) (`2025-07-02T20:15:31.057`)
|
||||
- [CVE-2025-49179](CVE-2025/CVE-2025-491xx/CVE-2025-49179.json) (`2025-07-02T20:15:31.187`)
|
||||
- [CVE-2025-49180](CVE-2025/CVE-2025-491xx/CVE-2025-49180.json) (`2025-07-02T20:15:31.320`)
|
||||
- [CVE-2025-49262](CVE-2025/CVE-2025-492xx/CVE-2025-49262.json) (`2025-07-02T20:02:58.340`)
|
||||
- [CVE-2025-49291](CVE-2025/CVE-2025-492xx/CVE-2025-49291.json) (`2025-07-02T20:02:18.077`)
|
||||
- [CVE-2025-52841](CVE-2025/CVE-2025-528xx/CVE-2025-52841.json) (`2025-07-02T20:15:31.610`)
|
||||
- [CVE-2025-53256](CVE-2025/CVE-2025-532xx/CVE-2025-53256.json) (`2025-07-02T21:15:41.410`)
|
||||
- [CVE-2025-6424](CVE-2025/CVE-2025-64xx/CVE-2025-6424.json) (`2025-07-02T21:15:41.517`)
|
||||
- [CVE-2025-6425](CVE-2025/CVE-2025-64xx/CVE-2025-6425.json) (`2025-07-02T21:15:41.670`)
|
||||
- [CVE-2025-6942](CVE-2025/CVE-2025-69xx/CVE-2025-6942.json) (`2025-07-02T20:15:31.957`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
227
_state.csv
227
_state.csv
@ -57134,8 +57134,8 @@ CVE-2012-6064,0,0,00dfc63961f9d2f48fea7498cff02d1f2421fa76b24927ab3f00edb3f45a3b
|
||||
CVE-2012-6065,0,0,7c2175c41600228ebd0c1f5b78e5c0ea9a55775d6bf6bb3f67bebb3b1c94f4a9,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6066,0,0,21c6bf3723b1806f5fa7f588834d08d256c294ff8360b08ba820de86088f3316,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6067,0,0,1418583d7df1633572e12da1ee582751278150b44c4a2c7d1d088f5f0d94ec2b,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6068,0,0,a5cb1b673e047f69b55b7b51976951249a00e124c7724e4dd31494d0d0784fb0,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6069,0,0,6d24ba6e3fb7bc9bee282f7a49a92d5a05b0f4911ee947210137766ed133b8c3,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6068,0,1,e3d950c15015fd759ac3c665fa4a24263029bb895dd53a768209168f2e2802e2,2025-07-02T20:15:28.747000
|
||||
CVE-2012-6069,0,1,f4aeb16a54681aee4e0fd13511c2e4eeb84f1e3105227dc2ae70233a3c659fc5,2025-07-02T21:15:39.193000
|
||||
CVE-2012-6070,0,0,c96e07fbbe5a5885f8017955a7e41db880979ceabef9aec74dad3d1857e61d69,2024-11-21T01:45:45.387000
|
||||
CVE-2012-6071,0,0,855c72b937ed3b2c1ed93820ec0e120ade527b2f5c5c801871b7628cd19cd706,2024-11-21T01:45:45.507000
|
||||
CVE-2012-6072,0,0,bc4fd1bc9efc8624039dc318c232f5eaf1b0d89aaa6d596e9d7714cfc1fe5618,2025-04-11T00:51:21.963000
|
||||
@ -65224,7 +65224,7 @@ CVE-2014-0756,0,0,8182da2ba5b0fb60b9f4347418bda13902887de796c946dc114475c6445c8d
|
||||
CVE-2014-0757,0,0,168e8c1aac9c85efc339ce8e20d9b2db230dcd503ac6f43b9658d95f3e87035d,2025-04-11T00:51:21.963000
|
||||
CVE-2014-0758,0,0,6983a30267631c41724920d6872de0c24a328fe20e52aa00a5ca79f089f61c79,2025-04-11T00:51:21.963000
|
||||
CVE-2014-0759,0,0,159ee845c6a7733811e28579f911af8f19e8475e4c4e96da6413887043b6c475,2025-04-12T10:46:40.837000
|
||||
CVE-2014-0760,0,0,0b94b43198c3d40d178d76235092400c77f8b8beff9985994bb20924a97f71e3,2025-04-12T10:46:40.837000
|
||||
CVE-2014-0760,0,1,d884b9415b798cefb1f4bcb96e37d8c65c636c184daea2a86963635237b6fa09,2025-07-02T21:15:39.710000
|
||||
CVE-2014-0761,0,0,a9e210fc97e939bc353b0dc2fce1a893b009252961de1cdbf3747d0cfe5e3500,2025-04-12T10:46:40.837000
|
||||
CVE-2014-0762,0,0,a2d00d194f91a41898fcae546f2fb77365861a07f1b8676393c4c79ee569bb6c,2025-04-12T10:46:40.837000
|
||||
CVE-2014-0763,0,0,37a6adf709a00b7917a393f00ba4a7ae3f209fa33e846e9c01022a09df1914ba,2025-04-12T10:46:40.837000
|
||||
@ -65233,7 +65233,7 @@ CVE-2014-0765,0,0,ca72b19876799da1bed2b116eb45b0a992313f01100fd2591641de4a18e559
|
||||
CVE-2014-0766,0,0,20754167ca05b764529ca502d2b64a040b0363de9c7720f7c03c1eb22f9770de,2025-04-12T10:46:40.837000
|
||||
CVE-2014-0767,0,0,d21414b854b58f39dc8bf51e8ce7de807749919ef74902a41e8797e9dcbf5865,2025-04-12T10:46:40.837000
|
||||
CVE-2014-0768,0,0,dfe2ace2ad52d510597aa7c107e03ef096f049ecb19c18cb31e149930d1a358e,2025-04-12T10:46:40.837000
|
||||
CVE-2014-0769,0,0,a0c28850a814cfc7e27659c306e4e2dbdee38f5d30eadcb4f4aeb4540db4202c,2025-04-12T10:46:40.837000
|
||||
CVE-2014-0769,0,1,aeded6b900757f2d693acc367cde76d833ffd622709c0fc2e1c1c2f7d947ec4e,2025-07-02T21:15:39.930000
|
||||
CVE-2014-0770,0,0,aaf77d8c8e98222f1c84311265729dd56041715b40027c74f6860f225cb89cf2,2025-04-12T10:46:40.837000
|
||||
CVE-2014-0771,0,0,f411bbd3908d308c314c4cdbfd92d6f52559d677ad50c11c5b1cb40d86204271,2025-04-12T10:46:40.837000
|
||||
CVE-2014-0772,0,0,c4c12f2d9bc93b391986779f439c03f0c25fbb2b6a464efad2b6ee985866e16e,2025-04-12T10:46:40.837000
|
||||
@ -200088,7 +200088,7 @@ CVE-2022-31627,0,0,7988c7987107767faa26c91c4891892d0041cc614c7a6d1a3a06deb7caf95
|
||||
CVE-2022-31628,0,0,ddf8d9d176ca572281725bcb1b547da70694f62f03744783ee8e12be7f37ea23,2024-11-21T07:04:53.293000
|
||||
CVE-2022-31629,0,0,5ef862df04f8d255ed02bf719beeb80649437a92cf9e67e9f3f71844fbe16d82,2024-11-21T07:04:53.460000
|
||||
CVE-2022-31630,0,0,048f94737739e9ec1f539180d01531111b8a9b6e3fb03b23f54e62135c59134e,2024-11-21T07:04:53.693000
|
||||
CVE-2022-31631,0,0,a9c408cc6e6afdf7686591ae2032302c0465931613c958a8b300d4947a3f980e,2025-02-13T16:15:35.670000
|
||||
CVE-2022-31631,0,1,3c470cf378cff90f59cdfeb387547b572cd9177260458e7329ad7b096e176859,2025-07-02T21:35:56.150000
|
||||
CVE-2022-31635,0,0,f33cce5b1e193c9081577f172af1b88917acd23104921caa053576c10bfcf687,2025-01-03T15:15:06.873000
|
||||
CVE-2022-31636,0,0,dc5d48671ff8c8359b8ab236feb93a3c4723a165b95081331578932b6b185c1e,2025-01-03T15:15:08.580000
|
||||
CVE-2022-31637,0,0,30c8596251895654f5e10b1d0756a872401cb82752723a34976c21eb08a2360a,2025-01-03T20:15:24.413000
|
||||
@ -233596,7 +233596,7 @@ CVE-2023-41036,0,0,02272cf2fa97f95dd91a385e67294f11eac8744c630b8c26dd9ff9462edd6
|
||||
CVE-2023-41037,0,0,f1c3742f17296c158e6b7072d1d1a9102ccf74a2caecd6be7e25a339f6b9a0fa,2024-11-21T08:20:25.840000
|
||||
CVE-2023-41038,0,0,dd600939ee54220a321d470a3ad1b3ecd0da7d549612b368f00cee9449536ce0,2024-11-21T08:20:25.967000
|
||||
CVE-2023-41039,0,0,e49689ed186320a038c36307f466e022818c9bec98aa462c1be5a9ea4c4c172f,2024-11-21T08:20:26.090000
|
||||
CVE-2023-4104,0,0,ebd3c98f7b974266e0cd3ce9392fb522e9bc704ab30fa16ddd5dbd35fb9dafd1,2024-11-21T08:34:24.063000
|
||||
CVE-2023-4104,0,1,6c2f8ecaac38f35d21b5169a003420cc4ae4f83405abfca8ec0ccf15315fa891,2025-07-02T21:15:40.210000
|
||||
CVE-2023-41040,0,0,426e541e09c3630b3c9f58683762e9a042bddd14dd5886a0f8de5abee437a61e,2024-11-21T08:20:26.217000
|
||||
CVE-2023-41041,0,0,555d17e2ca52e4dbb2d3be131541fecc6a92d5f967837e4bf934250e0c4e47d7,2024-11-21T08:20:26.350000
|
||||
CVE-2023-41042,0,0,f6501d9067f705e2792db78f5e5c3c0939468f1a27b5dfcebced4337049e26ed,2024-11-21T08:20:26.477000
|
||||
@ -236440,7 +236440,7 @@ CVE-2023-4508,0,0,ddcfeff3689ff681a56c8969c508364a5228b41d5fccf16d84adfe9f47e473
|
||||
CVE-2023-45083,0,0,3743538578c2e9a7b3cf417e490ee04603f9bf5a4fa95a25f5e9054707035c43,2024-11-21T08:26:21.397000
|
||||
CVE-2023-45084,0,0,e140cc27d5c28d76849fecef9ad885e226819fcb74c7da18eb83c35c56bcac1e,2024-11-21T08:26:21.520000
|
||||
CVE-2023-45085,0,0,cb82bc80bf471263d5f40a4a24295728702a1b98bd6772e81c80d200fe1526ba,2024-11-21T08:26:21.640000
|
||||
CVE-2023-4509,0,1,f94021b4408adf16e1714a3c19253e2324a03d285b2fe014decd850bd9a1e299,2025-07-02T18:09:48.900000
|
||||
CVE-2023-4509,0,0,f94021b4408adf16e1714a3c19253e2324a03d285b2fe014decd850bd9a1e299,2025-07-02T18:09:48.900000
|
||||
CVE-2023-45101,0,0,91b701945f1241c8f2e5a1f78802e24fe9b33b09efc15431dd320b8a1ed31cf5,2025-02-05T14:57:27.703000
|
||||
CVE-2023-45102,0,0,8dfb431d08e4bb6547ac932a1cd7a69df7e786aae8df335276cb697f9eac6d6e,2024-11-21T08:26:21.757000
|
||||
CVE-2023-45103,0,0,e13888dfbd39792b0beee4852b93eda208a746c1f407d0bd3d6d9dab70a7a0ca,2024-11-21T08:26:21.887000
|
||||
@ -237927,7 +237927,7 @@ CVE-2023-47020,0,0,77958b1e974ce3a0af29c7a34f0132e69536d415fc0c65e83c01b308bc43d
|
||||
CVE-2023-47022,0,0,73d82f89852a7fe6d598baa6e948b789fe12b29f69f371d14a570d87cb620bb5,2025-06-17T17:15:31.567000
|
||||
CVE-2023-47024,0,0,c125fb103042924f5281e92be53a4da5c6431c794e2412cda8329c78f5f25120,2025-06-17T17:15:31.783000
|
||||
CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000
|
||||
CVE-2023-47029,0,1,f354e0d314861ff3810be1e131692dc0d76cfe93a1ccf5f7f94664c270d7e2dd,2025-07-02T19:06:22.507000
|
||||
CVE-2023-47029,0,0,f354e0d314861ff3810be1e131692dc0d76cfe93a1ccf5f7f94664c270d7e2dd,2025-07-02T19:06:22.507000
|
||||
CVE-2023-4703,0,0,a6d5e78e1192a3e0f4c01547c7f4ce3e0b04c7358d175d4096197c6b6119861c,2025-06-20T17:15:34.147000
|
||||
CVE-2023-47030,0,0,93ccd1f7d36567d2d295f9d2eefa083e76664b4db1969b2faf0e950bfafbca21,2025-06-25T12:50:37.217000
|
||||
CVE-2023-47031,0,0,a451f00aa91dc8a8504ff9338181d2c777cbbe9a238b568badcf58bf8e44beb3,2025-06-25T13:13:50.157000
|
||||
@ -238162,7 +238162,7 @@ CVE-2023-4728,0,0,c339ab5d87c7af4ab30b66d47f7562aee044b141169095045add07af35952c
|
||||
CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb836,2024-11-21T08:30:07.197000
|
||||
CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000
|
||||
CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000
|
||||
CVE-2023-47294,0,1,0891f318a99f2d09fb329c085f755075f92b0879fa6d0ce3dd707982d03e4c13,2025-07-02T19:10:16.237000
|
||||
CVE-2023-47294,0,0,0891f318a99f2d09fb329c085f755075f92b0879fa6d0ce3dd707982d03e4c13,2025-07-02T19:10:16.237000
|
||||
CVE-2023-47295,0,0,28a72d717c8a4fa3591c8aa3a96aa82e9fec7a018320bb6b31941ca440092c65,2025-06-25T13:30:08.523000
|
||||
CVE-2023-47297,0,0,c14fd87e4e15a5f8e3c0ca94948127ff1c65a697a69ee20c14900dd6601ff3f3,2025-06-26T12:46:49.080000
|
||||
CVE-2023-47298,0,0,4c4acd197c7d9d302a966e30e51e5a36b182be0dd23706e335a822f619b88bec,2025-06-26T12:44:00.433000
|
||||
@ -245677,9 +245677,9 @@ CVE-2024-10269,0,0,bb2a3cab40a3b831fa7114c2862087ff1fd138065989f0b23db24140c8ebf
|
||||
CVE-2024-1027,0,0,88d0ec1849f0d05d69fb41d518f3d3eea7fd3db3a17e6bfa013ac44746536bf0,2024-11-21T08:49:37.867000
|
||||
CVE-2024-10270,0,0,421f39f32cf5ae0b6f47e1854986b3fe16c531173581711002b42dee462ad7ef,2024-11-25T08:15:03.747000
|
||||
CVE-2024-10272,0,0,4f442f29307f7fe4036be7fda7d7f31f538cb47aef157e3f603bc675d724abf7,2025-06-20T15:48:55.677000
|
||||
CVE-2024-10273,0,1,b99eeb03b73538ed47e3d7a607111e4ebb0eec777d67674d1ab59477b6c1d8f3,2025-07-02T19:35:11.680000
|
||||
CVE-2024-10274,0,1,723f3e107ffa9063adac9c362f7a596f6db681264113e88ff1c1d74bca71b600,2025-07-02T19:36:18.843000
|
||||
CVE-2024-10275,0,1,f47d73a816c53cca67d2a586eeaee114b8100acbcb515f8fe9f63d3db92edde0,2025-07-02T19:44:10.070000
|
||||
CVE-2024-10273,0,0,b99eeb03b73538ed47e3d7a607111e4ebb0eec777d67674d1ab59477b6c1d8f3,2025-07-02T19:35:11.680000
|
||||
CVE-2024-10274,0,0,723f3e107ffa9063adac9c362f7a596f6db681264113e88ff1c1d74bca71b600,2025-07-02T19:36:18.843000
|
||||
CVE-2024-10275,0,0,f47d73a816c53cca67d2a586eeaee114b8100acbcb515f8fe9f63d3db92edde0,2025-07-02T19:44:10.070000
|
||||
CVE-2024-10276,0,0,bbe5dca2c1dc09165161e39681c1afec6bdfb1c1343f5cc1f9d6b5eea19bb37b,2025-05-01T14:37:50.833000
|
||||
CVE-2024-10277,0,0,e1fa37b2ed695484142d55c4ddb4c40c516da25ba5b81ab0ec41d2668f9b3fc4,2024-11-04T22:13:13.207000
|
||||
CVE-2024-10278,0,0,ee389174d0d07be53228b369506eb2a5bd5fc093c877e739b81978bb42c04e5b,2024-11-04T22:11:53.397000
|
||||
@ -245735,7 +245735,7 @@ CVE-2024-10326,0,0,6eeeb54338e02e3b25be40bbf84444e0702dfe78c7e1bd0a270bb17e3e840
|
||||
CVE-2024-10327,0,0,617a4d395486d23ce50d5a586c94c2ff3daf8827139e812231380168dcff8e94,2024-10-25T12:56:07.750000
|
||||
CVE-2024-10329,0,0,94fb4c89783f4f56c3fde9a354774d639a28f26feb5034ca8d1df1766578ff46,2024-11-08T15:59:16.407000
|
||||
CVE-2024-1033,0,0,0ebd094b5e36eb84c86356f7abcaa085e713213c3f39a08a73759a5dc273336c,2024-11-21T08:49:38.737000
|
||||
CVE-2024-10330,0,1,5a6b498805190a6d27c6b3dd99e053fe1340d1097bc72765d56b15447b8daf2b,2025-07-02T19:47:15.657000
|
||||
CVE-2024-10330,0,0,5a6b498805190a6d27c6b3dd99e053fe1340d1097bc72765d56b15447b8daf2b,2025-07-02T19:47:15.657000
|
||||
CVE-2024-10331,0,0,545d86073c1b16b1e54e3aa12a73c5203a2e01c429347a56d6807bae364370b1,2024-11-01T12:41:51.470000
|
||||
CVE-2024-10332,0,0,178b3b2d5779ad727e66a4d765c9c3bfa9f0c7bf18d561efe5247ecb16c1e02f,2024-10-25T12:56:07.750000
|
||||
CVE-2024-10334,0,0,6fa8d04cf36ddff4c2f72241ffeda286c7e688d7b4196e8e08471b4591fd3ede,2025-02-10T15:15:12.010000
|
||||
@ -246190,7 +246190,7 @@ CVE-2024-10759,0,0,bbdf7a44e2df17995fc3ce93c00f06fe8f2cedf5b3758258953dc660e3e73
|
||||
CVE-2024-1076,0,0,d6b7d15ad0127ffcaf72f056aa57d487e659f735a80893cb5d0c07667a853d1c,2025-06-17T18:53:43.263000
|
||||
CVE-2024-10760,0,0,0b9b500e1019eafd6e558ce9cb0f21344fc2e3c4d0abc286f58598dd4ef95aa8,2024-11-05T19:45:47.893000
|
||||
CVE-2024-10761,0,0,1cb3fab5d6d1f4f7f5fdcb5b145372ea58104799dd3c3bce34e56dcf696afb62,2025-01-22T08:15:07.060000
|
||||
CVE-2024-10762,0,1,e4ac77bd8763f10c0a337866ae7866ed197292b6f3be539a092c6f94d41ee71e,2025-07-02T19:47:49.677000
|
||||
CVE-2024-10762,0,0,e4ac77bd8763f10c0a337866ae7866ed197292b6f3be539a092c6f94d41ee71e,2025-07-02T19:47:49.677000
|
||||
CVE-2024-10763,0,0,c84b0255641931d082631abd1cc7fda92c4e46c5a769f1ed64c15028d182d08e,2025-02-24T16:41:26.690000
|
||||
CVE-2024-10764,0,0,363554fdaa09a90549e37c839266df04a89856b50c0157bbb3a4b35036effdc0,2024-11-06T14:44:53.410000
|
||||
CVE-2024-10765,0,0,e30cd9d11a555bed376192e628278e56ac69b3a29cb754ff08918d36a8eb53cb,2024-11-06T14:45:35.600000
|
||||
@ -246572,7 +246572,7 @@ CVE-2024-11133,0,0,303e9becf34f489bb74b3f178e52cbdead1fcd42fc3bc65ffd28fc2c4e859
|
||||
CVE-2024-11134,0,0,089169c177e677a380789df17eed101521b8b80a85cc2eaa375e39ac59d1ba6b,2025-03-04T16:32:22.030000
|
||||
CVE-2024-11135,0,0,d8de5922b60e4931d635f75acddf5021e57eddeba122af8b647ceaee2fe873b0,2025-03-05T19:44:42.607000
|
||||
CVE-2024-11136,0,0,14c34b52e51da32486499993d034c5625233241e56703eeb628fb429016a0b8a,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11137,0,1,d803a2c8858f9aae62999e4f57dd7cba3f86b49b95491d5c9ceb7a9a00881009,2025-07-02T19:48:23.140000
|
||||
CVE-2024-11137,0,0,d803a2c8858f9aae62999e4f57dd7cba3f86b49b95491d5c9ceb7a9a00881009,2025-07-02T19:48:23.140000
|
||||
CVE-2024-11138,0,0,2f34cc7cd067d0c6304b6c652f672298f3f38bc0e02398b29badaf312aaed525,2024-12-10T21:11:45.043000
|
||||
CVE-2024-11139,0,0,2d6fd6ceae8e9f801cb28510138174f054ac674fa052625032eec6de670d70fb,2025-01-17T09:15:06.370000
|
||||
CVE-2024-1114,0,0,26f8d922f7817a26291214f4551b12b577ca7b3e88078b0c0c71e617799dfdd6,2024-11-21T08:49:49.727000
|
||||
@ -246742,7 +246742,7 @@ CVE-2024-11298,0,0,cd8027ff7c1e39b70cf43f7d5a6cec3a72565a042c79fb93ed3ff58ccba5d
|
||||
CVE-2024-11299,0,0,5b4394fe2aa80862409246ed4c3feac26c1712c3bcb574f58a66e2a4a1c6972d,2025-04-30T14:52:15.387000
|
||||
CVE-2024-1130,0,0,679ee2f34d13ebb9df2fe1e2f1252066bb0e47c7a2921656bbd7730c6eaa121e,2025-01-15T17:29:06.433000
|
||||
CVE-2024-11300,0,0,17e6044959868c1f0bfbb5c535147bb16853bb47032cabda2a83334d5515df63,2025-04-01T20:35:24.003000
|
||||
CVE-2024-11301,0,1,6225e7ece5150f1b1553eaf7df199f06f4f4064fb3a19ee088059485638e06b9,2025-07-02T19:48:49.337000
|
||||
CVE-2024-11301,0,0,6225e7ece5150f1b1553eaf7df199f06f4f4064fb3a19ee088059485638e06b9,2025-07-02T19:48:49.337000
|
||||
CVE-2024-11302,0,0,a9e7c5f35aa45cf3a68fe4e8a0b7ad7e381f05d31f40f556663ee486cb82ae77,2025-03-20T10:15:25.003000
|
||||
CVE-2024-11303,0,0,de43b70f5f22d5d570b4c2c539e9b20cc817dc3ef76e189e06955f2c2af2eb2a,2024-11-21T22:15:07.213000
|
||||
CVE-2024-11304,0,0,0ff719fe517b127c477c9f0080aa8ce846c0a32261aa4bc0cacd8fd67151b1ef,2024-11-21T22:15:07.470000
|
||||
@ -247738,7 +247738,7 @@ CVE-2024-12251,0,0,f8224b4c39bb6ff66af3b002f83eca082baa817480b19609180c28190f340
|
||||
CVE-2024-12252,0,0,f0cb19f49810803840f5ee985f8df8513974df82162830a7e3c14eaee14d9385,2025-01-07T05:15:16.660000
|
||||
CVE-2024-12253,0,0,ddc85ae180bc30a65db67a43f7fe8d6c4299882333782166c00f6946fb3a98d4,2024-12-07T10:15:06.030000
|
||||
CVE-2024-12254,0,0,976d5bdc66f5280972e0a945f02b4d24fbb18a073445a80e18a1cdb637f945ee,2025-04-04T23:15:39.980000
|
||||
CVE-2024-12255,0,0,3e6ee7ef8ecf957b3c9750bb4e9452362942858fad7f6d35e3c4d339eaa5898b,2024-12-12T15:15:09.967000
|
||||
CVE-2024-12255,0,1,f9e7fa18a777f074cf9f4ebb79aee4fd7bcb7bf62d73f2eb1283b313a6b11fa0,2025-07-02T20:06:31.637000
|
||||
CVE-2024-12256,0,0,c941079a381520ece27502570cadaf7ad5874ae769a71d660938dc9b1a958440,2025-01-07T05:15:16.857000
|
||||
CVE-2024-12257,0,0,51052901a7cca4cc3e08f8db1db23715b8800d7e5a86753505efbff635c332e0,2024-12-07T02:15:19.187000
|
||||
CVE-2024-12258,0,0,3eb19625a1330fc72081e9c0b05d899d6c52aedf5334c3f98a645064595ca085,2024-12-12T04:15:07.160000
|
||||
@ -248159,7 +248159,7 @@ CVE-2024-12658,0,0,660d38c39623ff82f2493210faedf64d2df3c4a27194d20971b3a3cbb4cd7
|
||||
CVE-2024-12659,0,0,116b271a8259e00752a6db2ed55fb8c06bbe6ab2e35e4f94d9c78a27c4e7a0a7,2024-12-19T14:49:24.747000
|
||||
CVE-2024-1266,0,0,2a4a1a9a97982898c100d9d9cb94e7da9ed50410ea3a8e686081520943168bc9,2024-11-21T08:50:11.767000
|
||||
CVE-2024-12660,0,0,1be5de9c4da1baae53520340558ecfdc75e086a26bf9d397bc573d215373259d,2024-12-19T14:49:52.357000
|
||||
CVE-2024-12661,0,1,57bc0c3e56680b2b26dbfdde9021c17660305f6013db1d413f20d673ca1f87d8,2025-07-02T19:09:06.467000
|
||||
CVE-2024-12661,0,0,57bc0c3e56680b2b26dbfdde9021c17660305f6013db1d413f20d673ca1f87d8,2025-07-02T19:09:06.467000
|
||||
CVE-2024-12662,0,0,7b96f34669085c4823ad63e363326704524182ece7e82bc08beba6f210f6c9ab,2024-12-19T14:45:43.547000
|
||||
CVE-2024-12663,0,0,38c203f9613e213521137748477df599864fe9f022d1a6f0ef81d9fb28c81fd6,2024-12-16T20:15:08.963000
|
||||
CVE-2024-12664,0,0,1756d032c2c12fb2b7ecf9f35feee6496c6bcaf3c242debe315a55e136b7d073,2024-12-19T14:55:00.460000
|
||||
@ -248386,7 +248386,7 @@ CVE-2024-1289,0,0,f8c8a55f2a440d9e8129941363295ecfe343266b0f62bd6ed92e6812c89039
|
||||
CVE-2024-12890,0,0,e2f73fdaf8c4ef5e556a453d5bfaa3f903b2ab4fd1e2980fe92a08675a75c831,2025-04-03T16:34:16.893000
|
||||
CVE-2024-12891,0,0,b740369ab4eecee7f2ba03eeffe8e52609e68ff3d8a7086ca071eb45f72087ba,2025-04-03T16:34:08.690000
|
||||
CVE-2024-12892,0,0,29c077f75a1118a1ed7617444ec6d09dcc3f84bdeae9786eea54babcfaef1c6e,2025-04-03T16:33:44.877000
|
||||
CVE-2024-12893,0,1,c746937e54bfa12137a052a993d1b33568ea8fb9bb6bbfaffbab1300d47938aa,2025-07-02T19:09:29.480000
|
||||
CVE-2024-12893,0,0,c746937e54bfa12137a052a993d1b33568ea8fb9bb6bbfaffbab1300d47938aa,2025-07-02T19:09:29.480000
|
||||
CVE-2024-12894,0,0,1e10666d8acc6c61b752f325ab245ea683d5c0b34b3d8a2e36aed876a59d8d59,2025-01-10T21:12:49.420000
|
||||
CVE-2024-12895,0,0,508317eaa9f408889cb5852800e668256aecfd2ec6475ea355129fcd0828dab4,2025-01-10T21:14:24.240000
|
||||
CVE-2024-12896,0,0,ca6278e76b896e6f263468efff1622abbcaddec6824cd88839d8b751927785f2,2024-12-24T16:15:24.153000
|
||||
@ -248703,9 +248703,9 @@ CVE-2024-1320,0,0,aaaef1a9478a9ac2768f9b592c02529e1f1a3518e3f017f4f309a188cefbc9
|
||||
CVE-2024-13200,0,0,d822abfe6e5e94a697ac2e9a1763a17382b3dffc110b1c5388c29c0804177820,2025-01-09T03:15:23.820000
|
||||
CVE-2024-13201,0,0,5d359878f9b931ff0ca27dbd2120d63d4ca3a12566a5da18deebf81e1b6c50cd,2025-01-09T03:15:24.020000
|
||||
CVE-2024-13202,0,0,f279d957bc8c15549a1fec1f8d734e200c7292a1f3e6ec699b88a8730e6ea9a0,2025-01-09T17:15:12.110000
|
||||
CVE-2024-13203,0,1,9705c29b8f871ad171b9611037f417cc06952b9e0e2c9a17f04e7637c3cf9fc8,2025-07-02T19:10:33.930000
|
||||
CVE-2024-13204,0,1,8e44c9562524eef9dd90633de35532c3f176504884fae9d025814c79778b5e0e,2025-07-02T19:10:51.463000
|
||||
CVE-2024-13205,0,1,dcea910338790025bd48cd39fb8d1254813858a4906d15f53839b63656fc82e1,2025-07-02T19:10:59.873000
|
||||
CVE-2024-13203,0,0,9705c29b8f871ad171b9611037f417cc06952b9e0e2c9a17f04e7637c3cf9fc8,2025-07-02T19:10:33.930000
|
||||
CVE-2024-13204,0,0,8e44c9562524eef9dd90633de35532c3f176504884fae9d025814c79778b5e0e,2025-07-02T19:10:51.463000
|
||||
CVE-2024-13205,0,0,dcea910338790025bd48cd39fb8d1254813858a4906d15f53839b63656fc82e1,2025-07-02T19:10:59.873000
|
||||
CVE-2024-13206,0,0,38f706ce6b6c370d84f9fdfa1a0fa83d7b17374dd65798f61119206bb3782636,2025-01-09T04:15:10.990000
|
||||
CVE-2024-13207,0,0,3dd3df33280782bf57f7214c6ae8f2fe091c3ded8c8b55211d10abd97ff87f20,2025-04-29T20:11:23.573000
|
||||
CVE-2024-13208,0,0,fbcc7fb88734920ac7622aaa96691cf6208c93c520208996bfc4dbe74f31382d,2025-05-14T20:35:16.690000
|
||||
@ -259223,9 +259223,9 @@ CVE-2024-31652,0,0,cd620e76c3a3b5773fd0b42a3a685acd481dec307908c8df3a6879a1a3b7b
|
||||
CVE-2024-3166,0,0,7c4799e6f2d4de4c6793757b3de0601ca1d1298c8c6272ffb0dc9b3a0678bb7b,2024-11-21T09:29:03.133000
|
||||
CVE-2024-31666,0,0,9feb924667e4d55fe73065a5c4296ea21e1ac0f03e29d40ad28b081993f9d303,2025-03-28T16:00:36.103000
|
||||
CVE-2024-31668,0,0,92d852b5513f85b46c5c8aacca49dc78103d1045b501ee09fe75860fd2d477f4,2024-12-18T16:15:12.693000
|
||||
CVE-2024-31669,0,0,e67157c072d6472b13e8463ea23f9b22948945715ffb2a3485fbc46118d6e7b5,2024-12-03T16:15:21.540000
|
||||
CVE-2024-31669,0,1,7c7c298661c05091696213a278cebfe5e8ab98503171568287612d5df4b82ef1,2025-07-02T20:36:02.780000
|
||||
CVE-2024-3167,0,0,b0bdf42e92bad376276c8af48f28639bc7025690df7bfcbc255509f46b757355,2024-11-21T09:29:03.290000
|
||||
CVE-2024-31670,0,0,485c6b39a9c06c65b704780df5587d61e2c68aff13a9abfb705a544147e51149,2024-12-13T18:15:20.167000
|
||||
CVE-2024-31670,0,1,1b78a8a9417b6d13f96bde82954389cfce36a53143f6ff2e04417fee86967b90,2025-07-02T20:05:47.947000
|
||||
CVE-2024-31673,0,0,daaabfb840b3730af21ab36c24cc562730d3a8e824427e5f8ad6fa6a3f345120,2025-06-17T15:05:11.003000
|
||||
CVE-2024-31678,0,0,4d44fd7de319bb3c3e3ca325e023129ab6329704291ba3ed2bd041396946b733,2025-04-08T15:20:02.083000
|
||||
CVE-2024-3168,0,0,877aaf095d6020a88ac424b786e5481114bcabd626ac29a10ba6589de92c2016,2025-03-13T14:15:29.337000
|
||||
@ -263087,9 +263087,9 @@ CVE-2024-36618,0,0,62c87a1bff03a64e4f28a666c51b4b62b72812b9ffc80282cc17dc0940ecc
|
||||
CVE-2024-36619,0,0,25c66a36cc573eb50e022a289bcdcf146eeaea7df50ea0a14f20d5577424d417,2025-06-03T16:06:04.510000
|
||||
CVE-2024-3662,0,0,8d6ed9bf9906e37e9ee1a22ecd8054bc46ce6b65afee8d23661f06eab90c13fc,2024-11-21T09:30:07.787000
|
||||
CVE-2024-36620,0,0,e7fadb7af6f5a78b8c55d69ecbdd641820ab4cc821b26169ef5eb1f1ac8b3c39,2024-12-04T17:15:12.890000
|
||||
CVE-2024-36621,0,0,aaf0328dbf2afd58578f5ffa16091dd967860c37f203448fdc0268c980dab4ef,2024-12-04T17:15:13.067000
|
||||
CVE-2024-36622,0,0,07de4151f2340ac6d06674e425feabdd5df0677a18b73b685b4c7de1fe1f2642,2024-12-03T16:15:22.343000
|
||||
CVE-2024-36623,0,0,2efd80dd8d9bbbdca40b71283df2be6fa3e1bbaf45e89ff3c5b0919eb6fef43d,2025-05-01T14:15:35.340000
|
||||
CVE-2024-36621,0,1,f9d2908d14ad8cbb33679837d43a275001af76a8287a86296ace9e6d4aae74d7,2025-07-02T20:43:30.047000
|
||||
CVE-2024-36622,0,1,ee8ef64e9d1ab4e12eadc6267b66dea36560b42ddf16b4d3e246de2397ca176b,2025-07-02T20:41:55.433000
|
||||
CVE-2024-36623,0,1,3c51c7d22761c4b54b8bc7bbdd9ff83d36237169e2d8b8d161c831f7f374a346,2025-07-02T20:36:45.220000
|
||||
CVE-2024-36624,0,0,fdc7f23fbe63d2cdb59da638c84f39b48f5c43770d98e1865c028f25cc604428,2024-11-29T19:15:07.923000
|
||||
CVE-2024-36625,0,0,4a041487d3f029331c4bac0b4c0a56e68cc15b0c6d2de96e45c99b08fcea151f,2024-11-29T18:15:08.607000
|
||||
CVE-2024-36626,0,0,ddfefccb9c7c111af71afd167e3a259095102573d138ddc44028818aa56910d5,2024-11-29T18:15:08.840000
|
||||
@ -263696,7 +263696,7 @@ CVE-2024-37373,0,0,2847e99c027e210636b1d596d67704fa58348616cd3faf9bd4b3793a4d930
|
||||
CVE-2024-37374,0,0,a3f6a856277d969b5278070e608360817edf02cab5ccf8d8f18d5284d45c7fd7,2025-02-15T01:15:10.570000
|
||||
CVE-2024-37375,0,0,8217c80f0bd457ad7fb99331336c4763aefd1b5314374f4e51de6172c1073d6d,2025-02-15T01:15:10.650000
|
||||
CVE-2024-37376,0,0,daf6c4d98c4582c652276d94c5995189b0a6fd61725f60a72793dd5b59839fb9,2025-05-01T18:01:46.330000
|
||||
CVE-2024-37377,0,0,caef14ff514966e0f1ee38c7ff4edbc7bd09ca12f789eaaa3ae9e03a1f92295a,2024-12-12T15:15:13.500000
|
||||
CVE-2024-37377,0,1,a16ab8135cd25161e11b9211eb78f67c2eee50fb73a0b380f70e60012132a023,2025-07-02T20:26:04.183000
|
||||
CVE-2024-3738,0,0,6b7c5ee43d749786d04736c3425539aee3d10b90489eb5acbf775617e1e2b292,2024-11-21T09:30:16.940000
|
||||
CVE-2024-37380,0,0,77cf3dfb25923a81bead84472c82f0af78f2d433b4d7604e764b919f8522c470,2024-11-21T09:23:44.180000
|
||||
CVE-2024-37381,0,0,9f8a1e24016e672c46f9ac1942c6c3e469697399412e29900bea76bbfcf0caef,2024-11-21T09:23:44.310000
|
||||
@ -263720,7 +263720,7 @@ CVE-2024-37398,0,0,0f42760c0326cdea8f98f78b855bbf63b71770b97a72517371b459e84e271
|
||||
CVE-2024-37399,0,0,91513a99b1995bb678a44db233b24968cd7625f00c77086c4c8d80914d8fefca,2024-08-15T17:31:49.067000
|
||||
CVE-2024-3740,0,0,f1db815ebd196c841f9a03e4af1f223458e4ef3810b51b1b12ab408848abbe0e,2024-11-21T09:30:17.230000
|
||||
CVE-2024-37400,0,0,1e14e88d44c848ea44c9bbe92279b9c2f34340798a2cb3eb210a97ba1aa452e9,2025-06-27T18:46:03.483000
|
||||
CVE-2024-37401,0,0,5a3af3f5613cf18b6fb0d152156b5ab3157faa43dbf40e0bf8bbef7d6755b5e1,2024-12-12T15:15:13.877000
|
||||
CVE-2024-37401,0,1,5d6699101ec368a4740a824e0928a231ad40e96d0b2a93b33a6f4100e5f3fff9,2025-07-02T20:07:12.820000
|
||||
CVE-2024-37403,0,0,5e662ed809b0b10e6b99aa8c2f4ac8b35c922847c3b6d64b5b20add4d0709792,2025-03-25T17:15:57.523000
|
||||
CVE-2024-37404,0,0,cb110a34d87f4812dc406a460298c89dd3f74daf508e6083996d73ed421121f5,2024-10-21T17:10:22.857000
|
||||
CVE-2024-37405,0,0,3fb82c05472465d4a94ae43ca82eb762e9089f45f86f1b3cd3cb77a2d12c0c24,2024-11-21T09:23:47.573000
|
||||
@ -269762,8 +269762,8 @@ CVE-2024-45201,0,0,1008d923104020063a79ec3ff9863805234d3d78944913eab118b0fc97b0b
|
||||
CVE-2024-45203,0,0,88d501dfc424f0e16923ae703e15eee937ae6b3d90cede56c1d4b11c192d7644,2025-03-13T20:15:22.630000
|
||||
CVE-2024-45204,0,0,c17d724ab71326993fc885d0d9808c0b2eaae94c47b7923f22dde16d2eff63f9,2025-04-24T16:59:33.837000
|
||||
CVE-2024-45205,0,0,a10f061421a2a3424e1b6c374ce4a524c46fcb2bdda2afd1dfd63ddbb6391abd,2024-12-04T17:15:14.330000
|
||||
CVE-2024-45206,0,0,d9e968acf0dd8b42fc18894be4d96b31b86b907e5133e5110d37345500c02d41,2025-03-13T19:15:48.013000
|
||||
CVE-2024-45207,0,0,c6ee04eede270568245ffcec461ab781dd5d887b6f188268b86eaa3a09be9e39,2024-12-04T16:15:25.580000
|
||||
CVE-2024-45206,0,1,59696493804a40bc8906cc19858af6db25f4cab9c3124ecf5e6625ca82a947e4,2025-07-02T20:34:43.323000
|
||||
CVE-2024-45207,0,1,f931bce30ac6ec0212eae4286db6adba9745eb0609af5ad3101b7112da783af9,2025-07-02T20:29:56.867000
|
||||
CVE-2024-45208,0,0,db1fbdffa5214c693071c57618b5195bfb9a8bab8d8ca4cc65fac4eeef686294,2025-06-23T20:16:59.783000
|
||||
CVE-2024-4521,0,0,4a1a789411022da9e12743f86f636c858525a8f77c0a3180e65a51191dfff476,2025-02-19T18:01:20.563000
|
||||
CVE-2024-45216,0,0,a409e39e2e64d050771f416dcd29e4ec99d053af119629d20c842c9e04bc2f80,2025-07-01T20:28:13.847000
|
||||
@ -270025,7 +270025,7 @@ CVE-2024-45493,0,0,63ded12e1cce66753793ae82bef6c61efd91f10fe98a5bd1c054c3ddfbe0b
|
||||
CVE-2024-45494,0,0,e62b8176d74731dfdb1c9ebc3d4575fcabd14aac12deeb9776633eac1b50aecb,2024-12-17T19:15:06.497000
|
||||
CVE-2024-45495,0,0,052cbd46ff58a2733b006c164c39180c42ff3c9c0f05edf173b6ee70b661cd18,2024-12-04T17:15:14.537000
|
||||
CVE-2024-45496,0,0,f647c5447ed213c353caf91ddf707bc78331ddddcd98c233146cc0a0d9ee301a,2025-01-09T09:15:07.600000
|
||||
CVE-2024-45497,0,0,53a7f15546741074e12fdf12aa0db1b6ceecb91ed174d672eb3ba1967d3337c3,2025-07-02T09:15:23.290000
|
||||
CVE-2024-45497,0,1,27067e5a7e8ca6f8560a908cfbd7cb8ad5ac323dd2ef2c71ed66f5404b6f4758,2025-07-02T20:15:29.150000
|
||||
CVE-2024-45498,0,0,1b37b8abea607b55d06bdeca0f52a798741defd10e0d0992aaa1892048a4a705,2025-06-03T21:12:43.280000
|
||||
CVE-2024-4550,0,0,d020c2baa57a4c8c78c6437cdbbe1c555a0bddf99dab5627801ef1d8b20c6e80,2024-09-14T11:47:14.677000
|
||||
CVE-2024-45504,0,0,117e3b0ea98f4e26734959281e27af071785e94eccc716f5288207bae003b1cf,2024-11-04T21:35:09.173000
|
||||
@ -274004,7 +274004,7 @@ CVE-2024-50695,0,0,a8e5ee5cc10be805e3c4e996405c61809a60d1d6ddd9bae02633187192d0d
|
||||
CVE-2024-50696,0,0,49d7ba99b4ac37eed2a024d1d30c4a422fa564603999c94e5aa233896ef00f04,2025-04-07T18:48:52.107000
|
||||
CVE-2024-50697,0,0,51d665dbeca89a90870b833eb56e0b112fdedf1185882e0efb70f0cd1cbfd406,2025-05-29T16:02:02.670000
|
||||
CVE-2024-50698,0,0,7e1e58e2fa9dad0c12ad8622265abb94ccbd43282e31206a6e7638cbcbb39c14,2025-05-29T16:01:55.367000
|
||||
CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e02651cc,2024-12-11T16:15:12.720000
|
||||
CVE-2024-50699,0,1,90b0d7dbae9a9ca912ecbbf7a7a08214d658cc8df69b04058b315d57da5437b2,2025-07-02T20:28:26.957000
|
||||
CVE-2024-50701,0,0,a80b1dc6acfa0163b2b418f9af2de103abd46652e86be76b69c935d1bde098bf,2024-12-30T16:15:11.387000
|
||||
CVE-2024-50702,0,0,364da4b19de28c5c7b507be40fbdae2c11e3df8d6828b6df401d4df157b3f54d,2024-12-30T16:15:11.550000
|
||||
CVE-2024-50703,0,0,e1914095d1b7a0ffe223f333a29d6d8f0777fb87821c72e0f90605f07525e975,2024-12-30T16:15:11.713000
|
||||
@ -280462,7 +280462,7 @@ CVE-2024-7472,0,0,de0c1c1a6d606e95989fe7fe23b929a31aec4fa2eabaf43817b16d02244205
|
||||
CVE-2024-7473,0,0,b8dc981d2d85278013abb8b222f018481282dc1a8b74ff93c8c1b319e96a9851,2024-11-03T17:15:15.493000
|
||||
CVE-2024-7474,0,0,4bb7bfd29d1bc5751b49854603ab81b86841ddf06908a96e8a11dc8238ed09e9,2025-01-09T18:15:29.380000
|
||||
CVE-2024-7475,0,0,7bbd1b2dc6caeee9f6f7cf58e1447eb5146831b0c5f989701c0b6c3d0833ecff,2024-11-04T13:55:37.233000
|
||||
CVE-2024-7476,0,1,11ed9f196a60a925bd68ba4f51a007360d4e4c3b5f7bbf94aab2604fe522073f,2025-07-02T19:49:07.510000
|
||||
CVE-2024-7476,0,0,11ed9f196a60a925bd68ba4f51a007360d4e4c3b5f7bbf94aab2604fe522073f,2025-07-02T19:49:07.510000
|
||||
CVE-2024-7477,0,0,6c6434fc676e81002c750c9627714098eaf963ca81b6eff0a8aeb3b62c2e1988,2024-09-11T15:03:06.637000
|
||||
CVE-2024-7479,0,0,2ea71efff98f3f4975f4e7b351509dce6668cdd1c5b196a9e030ff840526ff07,2024-09-26T13:32:02.803000
|
||||
CVE-2024-7480,0,0,889913e08b28911ab727e916e197e7a32d9902edd6649d9f23fe700790b2a411,2024-09-11T15:03:37.293000
|
||||
@ -281683,9 +281683,9 @@ CVE-2024-8759,0,0,8f91dc531a873b29dfdf6fbd42af16f8d3159a182f0ca9db9db9f35e40cdf8
|
||||
CVE-2024-8760,0,0,f43fa3e1b72e595062f394352cfb1e3caedac57a707088dc78ba85c7fa736094,2024-10-15T12:57:46.880000
|
||||
CVE-2024-8761,0,0,950b3a9df3cc991d5c0bedc660970e758785bfc0f8e6d816aeaf43e66fff13f1,2024-09-27T18:41:43.043000
|
||||
CVE-2024-8762,0,0,3b421bee27666c9e7bcdd06dc59315fa24346e5ae512b3889caf5a60eb7e32fc,2024-09-14T15:54:10.687000
|
||||
CVE-2024-8763,0,1,9841a18e4cc930f4925ff99f7d7ae8367c238719036df31068ff81343f9ff5b6,2025-07-02T19:50:00.760000
|
||||
CVE-2024-8764,0,1,95b4c496f3a932b56f69def6b05425d870ded9788671f9813e48047637114ce7,2025-07-02T19:50:32.273000
|
||||
CVE-2024-8765,0,1,e2d80212eeb336f89e52548d9b96ab4b32fb82b57dfd293f0262e945a0e39542,2025-07-02T19:51:11.997000
|
||||
CVE-2024-8763,0,0,9841a18e4cc930f4925ff99f7d7ae8367c238719036df31068ff81343f9ff5b6,2025-07-02T19:50:00.760000
|
||||
CVE-2024-8764,0,0,95b4c496f3a932b56f69def6b05425d870ded9788671f9813e48047637114ce7,2025-07-02T19:50:32.273000
|
||||
CVE-2024-8765,0,0,e2d80212eeb336f89e52548d9b96ab4b32fb82b57dfd293f0262e945a0e39542,2025-07-02T19:51:11.997000
|
||||
CVE-2024-8766,0,0,6a1d0fd4381a2aefa3c3ebd3af5a6a5535392c6f90911151b52ef1d8a2df5478,2025-01-02T16:15:08.817000
|
||||
CVE-2024-8767,0,0,33d117715b6ccb12375aec292e3823ec127bf8cb9f35e261208b79e9c4041c2f,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8768,0,0,68f3eb07488e96273391cb6bb54e3745accce33e0ac973772852eacb968b15fb,2024-09-20T12:30:51.220000
|
||||
@ -281844,8 +281844,8 @@ CVE-2024-8924,0,0,fa653b47436154676c3f1b541069065d978b00290a8ee89e15492973ea1ea9
|
||||
CVE-2024-8925,0,0,f8e6224c919b32dad944cbb3d7da3b4d7b30369cbcd1a2c103a12e6bb26c7138,2025-03-17T18:15:20.433000
|
||||
CVE-2024-8926,0,0,fb965ebd8a92fe27f14e71c494d4747397dd6fd47d2404bcc941456ac9c9eaeb,2025-04-24T22:15:14.663000
|
||||
CVE-2024-8927,0,0,aafe8ef71dfcc052ecaa8fa4a1e0007cf5cf5ad740e9765835524ef8a42eab43,2025-03-18T17:15:44.707000
|
||||
CVE-2024-8929,0,0,ff6a045732aac1c81eaaf843b68c1293fe05ebd7ecf4460b6fec091ede522e48,2025-01-10T13:15:10.460000
|
||||
CVE-2024-8932,0,0,c5fffc9638f172950dd3b0bc71a124092612a89bfe67c2c048ea6a2b2b43d457,2025-01-10T13:15:10.617000
|
||||
CVE-2024-8929,0,1,b9d81acd55c07a73552846699b7a13b15a1e733925c70fe38246b0610deb010d,2025-07-02T20:11:20.063000
|
||||
CVE-2024-8932,0,1,404e753499a4a20ac9ba63130e63473ee83f2dbac0e437e544448ff8f6952c8d,2025-07-02T20:08:35.010000
|
||||
CVE-2024-8933,0,0,e152f6df34730481cad628f83b188861c2c7c15e75dea66549d9b61f891274d1,2024-11-13T17:01:16.850000
|
||||
CVE-2024-8934,0,0,ef1f8f6984d6b9c4cfe47d2ed66bbef40367f32f9c9af452fc22ae5c4812c362,2024-11-01T12:57:03.417000
|
||||
CVE-2024-8935,0,0,3134dacd24f5b1cf37b3337cc4cd7783ada25f9c365ac8d35d10490670825111,2024-11-13T17:01:16.850000
|
||||
@ -282874,7 +282874,7 @@ CVE-2025-0069,0,0,d7ac8ba36cfcab8a8836c1588e52e8bbaed2d415e393c11bf82b7bb82617b0
|
||||
CVE-2025-0070,0,0,dbf9edc467887c587ee503735d983d3eb618b4cd55fb133fb8e2178f124d6f6b,2025-01-14T01:15:17.427000
|
||||
CVE-2025-0071,0,0,a9f17b8587d9681508885fa05b5cb6e1fb480f5738675f612162a9b567f90271,2025-03-11T01:15:33.917000
|
||||
CVE-2025-0072,0,0,7c68681d522f867cd278cffcb4470ef78b9648796a6206167a2247ec164299a1,2025-05-12T16:15:21.587000
|
||||
CVE-2025-0073,0,0,f6a29770af6bbc103680f6db7dbfc3d85fdf01358f971fa2c75114246009b84d,2025-06-02T17:32:17.397000
|
||||
CVE-2025-0073,0,1,dada6658789f56fb64564197f1ffc1b8028bfb6db99ba6cd6d93031c5a423beb,2025-07-02T21:18:03.963000
|
||||
CVE-2025-0101,0,0,391653291dbc9e356bdd9f7cf48cb4ee16c22960b84cfac559c323183419fbd8,2025-04-16T13:25:37.340000
|
||||
CVE-2025-0103,0,0,06fd8d922bac50d8ab7e8102b5457a5978f502265c9b1059554ccaf6e0c9679c,2025-01-11T03:15:22.020000
|
||||
CVE-2025-0104,0,0,dc4c81878786bc602ee20c50b1dae485c1da904352cbab72ccb96b2a9dcd9e75,2025-01-11T03:15:22.183000
|
||||
@ -283454,7 +283454,7 @@ CVE-2025-0814,0,0,275433a2e2c23056d581480e8763e8e9197d76ff67d734aa21e397b5cac2bf
|
||||
CVE-2025-0815,0,0,f73b50d64016c2e64fd2df2d6c90edb74018594168bb3b9f019d2de177423288,2025-02-13T07:15:11.160000
|
||||
CVE-2025-0816,0,0,d49cff9b1300ba83e836640c26fee4d28d3c84d54249c4f7af3bef6763c2c81e,2025-02-13T07:15:11.353000
|
||||
CVE-2025-0817,0,0,11343ed20662b8da62be45ff4c13d864ae4d9a05be3d231b0a3e4a5cb280e5dc,2025-02-21T12:15:11.963000
|
||||
CVE-2025-0819,0,0,bdaf17bf70e25617b1e90a1272039a5410ce1c65c874d7bdd41c6cb02c05003e,2025-06-02T17:32:17.397000
|
||||
CVE-2025-0819,0,1,528b6ca4483b4651cbe9a0a186ca398be698967851a1a8e2364971c90f5291f6,2025-07-02T21:18:07.187000
|
||||
CVE-2025-0820,0,0,6d45f28eb00b0039ad804e065c885bf40234d2bcc3aa26a58867a7f5eaafc285,2025-03-01T05:15:15.953000
|
||||
CVE-2025-0821,0,0,276d38f36e1718392d91943f87a21d4117bd30970ca15dadffff44ef97d51e0f,2025-02-25T03:42:52.263000
|
||||
CVE-2025-0822,0,0,4c844a6713ce2631895193eac241699c6c3839eb1c8dbea359488af5de55887f,2025-02-24T12:36:46.670000
|
||||
@ -283657,7 +283657,7 @@ CVE-2025-1070,0,0,63c9f6366f7886d6af04d22c614f55b0f42e20f4e6634878d1102f0014dfbf
|
||||
CVE-2025-1071,0,0,ec670b61a4cae3c6bd1b5d7c58db808e7643f8c91b0bf1aa44c5e336a078699f,2025-02-14T14:15:32.560000
|
||||
CVE-2025-1072,0,0,bb0514ae35802411e3da1596896cb302b1b469b7b79e6814634b3c15db99cbed,2025-02-07T04:15:07.737000
|
||||
CVE-2025-1073,0,0,60172e8f6f7042a3e0dae5bdecfd8cea2f2f414971078e028146b285831b8bc3,2025-04-11T15:39:52.920000
|
||||
CVE-2025-1074,0,1,fa27fa0c9cb977dbec9e01b7e0e09573d564049dce536c4e96cb4da4f04b16cb,2025-07-02T19:11:15.693000
|
||||
CVE-2025-1074,0,0,fa27fa0c9cb977dbec9e01b7e0e09573d564049dce536c4e96cb4da4f04b16cb,2025-07-02T19:11:15.693000
|
||||
CVE-2025-1075,0,0,797c9475355694050b39edcabe9ae24db6febfe58de9ae04f1e1ad1e92e5bacb,2025-02-19T10:15:09.043000
|
||||
CVE-2025-1076,0,0,0fb5ade089952c20fae90954aaa2f08206a3bcb696af25bbf4ec969a8662af5f,2025-02-06T14:15:30.287000
|
||||
CVE-2025-1077,0,0,88be144d908f74868edd4d84609ed66b73f57b9c8388994c4810420e7c62d244,2025-02-07T09:15:08.380000
|
||||
@ -283802,7 +283802,7 @@ CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa
|
||||
CVE-2025-1243,0,0,b36908327b1b41fa664c4a39c71934592fd1d75bcc40ba67f7d64ed64955da7e,2025-02-12T01:15:09.073000
|
||||
CVE-2025-1244,0,0,ca7dde03c53f2f538c0b12fb599e84ae66a426ff6488b7e67f4989aba1f7a6f7,2025-03-13T14:15:34.977000
|
||||
CVE-2025-1245,0,0,02f6531ee412acf536871fa74be895340813b85f3805e0a3e6f8a053107da143,2025-05-16T14:42:18.700000
|
||||
CVE-2025-1246,0,0,266a95be5134ef4b55d24992997b7f1229c8a727bdfdfdf4f14f294d872f0d25,2025-06-02T17:32:17.397000
|
||||
CVE-2025-1246,0,1,ba71751fa27047f7c79c3e8dc96ae22f8996ca289dfa9df416ee4c290be2b815,2025-07-02T21:27:05.870000
|
||||
CVE-2025-1247,0,0,413d4bcd6e00b55487b15f2b541fa31d8a6169438afa6345f0107f85b8ddc727,2025-03-03T14:15:34.120000
|
||||
CVE-2025-1249,0,0,6a7f3a2500b58cdcea7c9e46385c15368818268591d8a8d12de3eb4b42bd3d72,2025-02-26T15:15:24.470000
|
||||
CVE-2025-1252,0,0,eef150a4ad81125836b2e5c10bdfbfd08634b9526bf9de1f39407e70823ba714,2025-06-05T14:31:07.047000
|
||||
@ -284200,8 +284200,8 @@ CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e21
|
||||
CVE-2025-1730,0,0,1995ccb1e144a2c7a6984fe76cde065e7b6f85edc7bf90ff89583ed751f146df,2025-03-01T07:15:11.380000
|
||||
CVE-2025-1731,0,0,6cda5a39952dbb72fa0562ae6653e830de6b4814d02aafc6e5dc87eccf1d921b,2025-06-12T07:15:23.537000
|
||||
CVE-2025-1732,0,0,4f17f76249b0949cdce334206f9e87f9bb21a194c5034bf6b38b1f20a234be49,2025-06-12T07:15:24.120000
|
||||
CVE-2025-1734,0,0,dd726e0e9f8572ae11922e7390e5eb39ee22b5717e7e4d56ed056f32ac64ca1e,2025-05-23T14:15:26.087000
|
||||
CVE-2025-1736,0,0,a8a0b6e522595e6c6789f877a806c710ab0238e7a997a6d116d5acfa113937b6,2025-05-23T14:15:26.203000
|
||||
CVE-2025-1734,0,1,9ca53d91c8f07fb7aeb2fb76e0c547c53292f2008c24ec1e6e7dc553df762068,2025-07-02T20:13:31.447000
|
||||
CVE-2025-1736,0,1,2cb7db9ff654a6577a0a5fca10cf4357e9656f3556a748e86223fabf40f575cf,2025-07-02T20:14:40.817000
|
||||
CVE-2025-1738,0,0,88cd928ab6b3e7b21edc6d43e0b3a3d2962b8b23417ddd8c84224e61394ebbde,2025-02-27T13:15:11.720000
|
||||
CVE-2025-1739,0,0,3fd0271bebf5dab4e4b7dc5bc9151c4b432e19911079ec61b281141a587b7651,2025-02-27T13:15:11.883000
|
||||
CVE-2025-1741,0,0,e3cefbac58ae300d7a16e849817a4e07ca1da020b4a797f97ccd724d6b4aefd2,2025-02-27T16:15:38.930000
|
||||
@ -284305,7 +284305,7 @@ CVE-2025-1857,0,0,103488c59c7a3d799f85f8b3efbe569a5fa266b7447ed4b764264983fb4cd7
|
||||
CVE-2025-1858,0,0,d219d72b5d3e367e984fc9a00844c02aab063afaf214c90b6e3c689da36b22a1,2025-03-03T09:15:38.857000
|
||||
CVE-2025-1859,0,0,715968264e27416be4e429a636c651518503d08e64cf5ab3dbe6a5fa99ff6b6b,2025-03-07T14:13:19.170000
|
||||
CVE-2025-1860,0,0,986db9034dd4736f004df6791bb74c7adef99a61d4693b6737c6f7fc4ffbb052,2025-05-12T16:15:22.170000
|
||||
CVE-2025-1861,0,0,364f3b6bd4e38a4ff44cc455b88480ffaa5b0a11bae05538d89afdc1a809f552,2025-05-23T14:15:26.320000
|
||||
CVE-2025-1861,0,1,d588036ac40432e2fee376ea3e3321747bb47a31f0304293b6e450d4a10b85ab,2025-07-02T20:17:38.193000
|
||||
CVE-2025-1863,0,0,58913d0cdbc19b044a0ae40116888b87bc7f9f8b2879c510a7e2907cf0a66748,2025-04-21T14:23:45.950000
|
||||
CVE-2025-1864,0,0,1521ea631a62fdc5c10914bd32f7e46bc38cfd57795522efc4e14681c16c00ac,2025-07-01T14:55:32.677000
|
||||
CVE-2025-1865,0,0,179ef00ae451af792a624f7eacd4e1dcfb5d9e6f54597854dbd2ec89833d4411,2025-04-07T14:18:15.560000
|
||||
@ -289537,7 +289537,7 @@ CVE-2025-26876,0,0,684f7a7019e1ec0a8365c1fd8b8ec9cf15327b5b9ed01836c80ba8ecb2aa9
|
||||
CVE-2025-26877,0,0,b6bbd106fc09effb170ea41e4eff1e72fc5e0e40d7a5e670464380cec25fedef,2025-02-25T15:15:24.380000
|
||||
CVE-2025-26878,0,0,b83c78001aed3b72257afa473beed64325520c746080d9d4c55fc0721207cb83,2025-02-25T15:15:24.560000
|
||||
CVE-2025-26879,0,0,ff13b8336e93c3c4112258e1261f28d97f76ce67ffc3e5951e1c9eced4ea0dc7,2025-03-03T14:15:56.213000
|
||||
CVE-2025-2688,0,1,df9fbd881c0903a7e1840c86191135c0e3ef5a103499e72c1374800ca40be24a,2025-07-02T18:03:25.497000
|
||||
CVE-2025-2688,0,0,df9fbd881c0903a7e1840c86191135c0e3ef5a103499e72c1374800ca40be24a,2025-07-02T18:03:25.497000
|
||||
CVE-2025-26880,0,0,da84e2330a560f7b1855215c494200741db29c3a24f93ba76a255f39bbbbece3,2025-04-16T13:25:37.340000
|
||||
CVE-2025-26881,0,0,921429dd5a0c5a1101d4da691445afee44c665c84de754602fbf841d0217b94b,2025-02-25T15:15:24.690000
|
||||
CVE-2025-26882,0,0,7062fd0c75af34ccf6b6ec2ff75c922493b57ba8fdc01187594aa2fa72d319c7,2025-02-25T15:15:24.837000
|
||||
@ -289744,7 +289744,7 @@ CVE-2025-27136,0,0,c01448066d938a954aacb43927a32ddc1070de1cae5a8be4183115a3e5216
|
||||
CVE-2025-27137,0,0,5824d60f023fc733adf708b73443cf5ddf0a1c321fa7b10d5058188a954ef313,2025-02-24T21:15:11.213000
|
||||
CVE-2025-27138,0,0,51df3b05aad41c98a88fe0b061ed7e110b02a2b2eed44112c3eb8d323dce6520,2025-03-21T15:22:28.790000
|
||||
CVE-2025-27139,0,0,b35d01c363d768feea22a1a4baf4d96af8539b18da2c1e17aac951b9b3709d79,2025-02-28T13:55:46.533000
|
||||
CVE-2025-2714,0,1,df9ea0f742d96e2adc4020cdb7c6f94de38301f10e5d53c30c9f52fbf987a9dd,2025-07-02T19:11:51.457000
|
||||
CVE-2025-2714,0,0,df9ea0f742d96e2adc4020cdb7c6f94de38301f10e5d53c30c9f52fbf987a9dd,2025-07-02T19:11:51.457000
|
||||
CVE-2025-27140,0,0,fc1e0ec308089fd541d5158018c00bc169df7e00ec8cc3330ecb17a15d6f21a7,2025-02-28T16:35:12.980000
|
||||
CVE-2025-27141,0,0,a447ac927713f36258c6b25c5f083c429dfe0fb04b42a5d1767a162b87028124,2025-02-28T16:24:18.650000
|
||||
CVE-2025-27142,0,0,1bb5f40990adb8c35f5889afc7c3575d307334e192075d779b188f2171513971,2025-02-28T13:50:54.373000
|
||||
@ -290884,7 +290884,7 @@ CVE-2025-29529,0,0,131ba8e09816d09cacfdacbc1b605e02d00f30b0838eb43d19239f9695636
|
||||
CVE-2025-2953,0,0,67c63f73a2bad438c65b917bf9a538e529ded5fd2828dfe2a2982ca0c2662c95,2025-04-22T12:15:16.043000
|
||||
CVE-2025-2954,0,0,0672b048d9a1bc1b6cab4c4533c01031021ece5eaf46619f3aa405740d82e196,2025-04-15T17:57:44.213000
|
||||
CVE-2025-29547,0,0,aa60854d017a9798e6777b390c1094114e4d0521b16eb135eea88d0b1da0a19c,2025-06-23T18:23:41.120000
|
||||
CVE-2025-2955,0,1,ae0098f14cc539866dfc24b906cab2145f36ba1504dd8a9ee610f2bdc6a2a1d5,2025-07-02T18:04:07.640000
|
||||
CVE-2025-2955,0,0,ae0098f14cc539866dfc24b906cab2145f36ba1504dd8a9ee610f2bdc6a2a1d5,2025-07-02T18:04:07.640000
|
||||
CVE-2025-2956,0,0,12b742621d86c28d988776b85da597ef776ef6fe74e703c6823d14feeb258af7,2025-04-01T20:26:30.593000
|
||||
CVE-2025-29568,0,0,3b23dcb888abcc37f1444d0fc863cef625a6ebdc671441b643f7de7ab4accc97,2025-05-14T13:09:12.467000
|
||||
CVE-2025-2957,0,0,d90251765154920d1060d5e6f1781980ec9f028972bb25184edb9ab3b3acf04f,2025-04-01T20:26:30.593000
|
||||
@ -293479,8 +293479,8 @@ CVE-2025-32794,0,0,15f940929f35bdb8def3a5939321437a8ded7053db5533722d2bdb036ad0a
|
||||
CVE-2025-32795,0,0,3226787ef9fde307f13d92b52c13368891b70059c6d43e363196d275603a2be2,2025-06-19T00:25:59.333000
|
||||
CVE-2025-32796,0,0,20ed07849a09b1f538632557f0ede2b9976cfa2cb03f0965ae7b2114a9dbac36,2025-04-30T16:12:32.757000
|
||||
CVE-2025-32797,0,0,39a1453b6f2631a027a7807128ca6c2891d742d8758fbedb098024372cb946b4,2025-06-17T20:50:23.507000
|
||||
CVE-2025-32798,0,1,9407151681d732db4f4b5e97951401f98ff95fb1516d1e5d4816cfb40cac18a7,2025-07-02T18:21:45.133000
|
||||
CVE-2025-32799,0,1,e869b9d8fcc430e1c2795fb35d5e0aa3be352f16e50b12310082045cbc70e2a7,2025-07-02T18:12:39.140000
|
||||
CVE-2025-32798,0,0,9407151681d732db4f4b5e97951401f98ff95fb1516d1e5d4816cfb40cac18a7,2025-07-02T18:21:45.133000
|
||||
CVE-2025-32799,0,0,e869b9d8fcc430e1c2795fb35d5e0aa3be352f16e50b12310082045cbc70e2a7,2025-07-02T18:12:39.140000
|
||||
CVE-2025-3280,0,0,bbfa48dab65dd8e30d4af992e1eee1a23f41dd90ea1a7ea7a1775416dce3500e,2025-04-29T13:52:47.470000
|
||||
CVE-2025-32800,0,0,e753f34f7c42d4666d6bce3002ee2779f11bd28dcf07a2833aa1c4b318c92022,2025-06-17T20:50:23.507000
|
||||
CVE-2025-32801,0,0,6146013012d0cc266cf2a68a1cfcd1c7bf0ca9e930c722235f6d34464ee53a2b,2025-05-29T14:29:50.247000
|
||||
@ -293859,10 +293859,18 @@ CVE-2025-34070,0,0,47207d5ee1b0a71e1e9c5d5e77d6671366cac2a9ddc16a23d5790cb18a739
|
||||
CVE-2025-34071,0,0,d5f2123198e3e31dbb6015474f33f67a7d06e2e32e6e418e40981220ace5d68f,2025-07-02T14:15:24.667000
|
||||
CVE-2025-34072,0,0,4af0fa0afa5efa1a0910d60d94c8609fe067147223eb06c75d936925a073cf51,2025-07-02T14:15:24.817000
|
||||
CVE-2025-34073,0,0,a16ab3d23c59acfb344a3dcbf7457a63d81df4c42fe785cea9964f2d0f1fb835,2025-07-02T14:15:24.967000
|
||||
CVE-2025-34074,1,1,c9bed057c2dd103eff6868716b6ebe9755e961ad12da88dcec416d293e283f1a,2025-07-02T20:15:29.410000
|
||||
CVE-2025-34075,1,1,46b05ba8ed0540eaca2bc6fc2b2d2eaead785a961f81ccfee6b179894a1eecb5,2025-07-02T21:15:40.790000
|
||||
CVE-2025-34076,1,1,dc9c9153a1078aa89465a7fa76b93d0c09d8c4c18c0fb4bfb18ac17ba5899305,2025-07-02T20:15:29.690000
|
||||
CVE-2025-34078,1,1,28894bcdcf6854686c9bcd752f96f78735e5cb33d5d9478f95ee5ca42e4bfcda,2025-07-02T20:15:29.827000
|
||||
CVE-2025-34079,1,1,cce584a780196713a8c6ee827a7e6f3ea01852d4c7563952b676a805ccd7d608,2025-07-02T20:15:29.963000
|
||||
CVE-2025-3408,0,0,a88be7d5c921572f767d8ba3e6ebc652be3930b6ee80cf6e4b3b3197df125283,2025-04-08T18:13:53.347000
|
||||
CVE-2025-34080,0,0,0645af92852c4c75a352979a10036d36cc531562915f2b81600076c5490ceabd,2025-07-01T18:15:24.487000
|
||||
CVE-2025-34081,0,0,d696ccc2eacf212028f355783a4b82494f5e56e1a84e1ce50916672890cde099,2025-07-01T18:15:24.627000
|
||||
CVE-2025-3409,0,0,f59095d51838a53941b8bd9796d34dc98a766466b963796da5b26614478f737a,2025-04-08T18:13:53.347000
|
||||
CVE-2025-34090,1,1,97f5958fd22032ced3b8ddd1529f8f5a720845df4a1e135990e3fd2f8a2534e7,2025-07-02T20:15:30.110000
|
||||
CVE-2025-34091,1,1,22299bd382ea2b6c89cd8b7fd45538cdd112e7adb16e52e95b2ffaaaf061b193,2025-07-02T20:15:30.260000
|
||||
CVE-2025-34092,1,1,17459f64090cb762564ec217468df56e4314f2f81160243614827459795aa891,2025-07-02T20:15:30.413000
|
||||
CVE-2025-3410,0,0,c70ad1f10853e4bee6dfe4932ecd12d3acdcade7cac158141968cc85be8d2fc1,2025-04-08T18:13:53.347000
|
||||
CVE-2025-3411,0,0,8cff3e75ab7d8c8c3df6b9fa01111f95a8fb7002f322628e53333c48f3625fa7,2025-04-08T18:13:53.347000
|
||||
CVE-2025-3412,0,0,25a3c2ab8fa0aef3dfffc2c9723b43f279f3600f9f3d1f7632095f66cdc52ea3,2025-04-08T18:13:53.347000
|
||||
@ -294184,8 +294192,8 @@ CVE-2025-37091,0,0,5c59e2385d6842be695126488e55eb86dc7f72c0f9c94efe260f5f7e3aa86
|
||||
CVE-2025-37092,0,0,d2e906c9093c897b5382406a4ca5cd4666b5641e70b3de6ce3bdd44d14dded8c,2025-07-02T01:14:24.027000
|
||||
CVE-2025-37093,0,0,eeeeed73a80d1152deaf3bfadaf1854957afd5bed01935ed49d0b9f9068124a4,2025-07-02T01:12:24.617000
|
||||
CVE-2025-37094,0,0,6d20c74e0741eefc76e4a020d08745b8fe40dc1428103809a851ddf2e74dc111,2025-07-02T01:10:16.433000
|
||||
CVE-2025-37095,0,1,9f5a4b4c5e73a32bc6c2404219bef3755544819c6d7bb87d449ba9b756875fa1,2025-07-02T18:07:31.213000
|
||||
CVE-2025-37096,0,1,22707a31098e9cdb448fcf8a56edafe251897b155cebe6289af122e54309fcbf,2025-07-02T18:01:41.810000
|
||||
CVE-2025-37095,0,0,9f5a4b4c5e73a32bc6c2404219bef3755544819c6d7bb87d449ba9b756875fa1,2025-07-02T18:07:31.213000
|
||||
CVE-2025-37096,0,0,22707a31098e9cdb448fcf8a56edafe251897b155cebe6289af122e54309fcbf,2025-07-02T18:01:41.810000
|
||||
CVE-2025-37097,0,0,292a1d43ae472647d44dd5b39b4ad8edbe31c0eba297cdbc6fe988f335fe723a,2025-07-01T15:15:25.470000
|
||||
CVE-2025-37098,0,0,95cb86c5eef296a62dd04b26f15930cd5f734eaaf609b8e9dff49dc3a5d65e14,2025-07-01T15:15:25.643000
|
||||
CVE-2025-37099,0,0,88fa93292d2fe5248dd41ae272ed75f499c34942181d8a755c03c589be1349a8,2025-07-01T18:15:24.763000
|
||||
@ -295530,6 +295538,7 @@ CVE-2025-43013,0,0,cea29fefbb7874147d20ca0439a948894c9ed92ca59da3ffe37724562ec07
|
||||
CVE-2025-43014,0,0,8c8e187893b05115834c1fe60888f6689d95da1f55e6603f1b98a0a40089dd30,2025-04-23T16:11:35.837000
|
||||
CVE-2025-43015,0,0,e1099e2d690e6500afcce9f63f8d90a3ffca94e6d4b413f55df99246e9d63336,2025-04-25T16:30:24.887000
|
||||
CVE-2025-43016,0,0,f2c72cd86df0dc4f466aff47f20427f717da38e7cfd3bc2cf6bf3e8b276a88fe,2025-04-29T13:52:28.490000
|
||||
CVE-2025-43025,1,1,b07e86ae70e69fe18bf8b04cda66d709e4c93e7e792df4542ad7f61979a79609,2025-07-02T20:15:30.550000
|
||||
CVE-2025-43026,0,0,6b388ee0410ccd9f871364237fa3dd74ba38ecd5d6baae293c1bba0c62bbe8ed,2025-06-06T14:07:28.330000
|
||||
CVE-2025-4303,0,0,ca67198b40d61e86a7061774e966351f8111400fea02ca918ed591bfeb4cb946,2025-05-08T19:03:26.480000
|
||||
CVE-2025-4304,0,0,6f1b91465a276129a41d4871b4c0d6efc81ef52ea3bf5203539481683a02fc06,2025-05-13T19:21:33.627000
|
||||
@ -295949,7 +295958,7 @@ CVE-2025-45019,0,0,0a36b603f2eee8504693a95bb056a9c5dae180c245f5aedb0d853035198fd
|
||||
CVE-2025-4502,0,0,b6fc5856f80283661b9f5c0d6810233d4d120b34ab21f730a7ef052c4b6101bb,2025-05-16T14:04:15.523000
|
||||
CVE-2025-45020,0,0,429832f3a891b985adb256db95fa4e3605a43b22020d294b189541e25f18c802,2025-05-09T13:45:23.603000
|
||||
CVE-2025-45021,0,0,23c622248a57818d5ade75ad7b5f8e628d9aa7d69a6dd26ddccdebefb2f9e8a5,2025-05-09T13:43:27.980000
|
||||
CVE-2025-45029,0,0,b7d25a95caf25ec9fb132078b8b45cab948328f0f9ac9c894e776e0f051a1993,2025-07-02T14:15:25.470000
|
||||
CVE-2025-45029,0,1,d7d170dff6079a8ee0141fff8940c9df92246aa0d19bc872721b41cc9ccd8026,2025-07-02T21:15:41.003000
|
||||
CVE-2025-4503,0,0,85f8ea7af4d81365d4c769cefc49de185f192dc2edd583f57e3e7fc284a882a1,2025-05-16T13:58:11.200000
|
||||
CVE-2025-4504,0,0,f39a2a3f679765bc9c2c6ee848dc7fb913ca841c89fbba4626c8dd3bc0803ed4,2025-05-16T13:46:04.210000
|
||||
CVE-2025-45042,0,0,e22830cb7bf04c3c2d82e6baefcc0ab2bba0906b03ab3d09def3ca7404c47455,2025-05-07T16:39:20.990000
|
||||
@ -296007,7 +296016,7 @@ CVE-2025-4539,0,0,4cea8fc534f9fe405b8ad908d4e6f097f4382bef617bc18109b8d5e8c637ff
|
||||
CVE-2025-4540,0,0,8cc0219b9599542c1458321b60f6526b4a06d781c2bf124752cf69c701bf9208,2025-05-23T18:15:36.813000
|
||||
CVE-2025-4541,0,0,f69af7cb834435790fd2bc7c7fdd35148c39775cd73b6e79ac588217ba1217a2,2025-06-12T12:55:42.967000
|
||||
CVE-2025-4542,0,0,b2811e2a4a5d7456e65880ba2e5fe541779cd453c5ff8f673586e2db73c7c0e2,2025-05-12T17:32:32.760000
|
||||
CVE-2025-45424,0,1,d869a9d779495922573d9ef38a24a63ffd2a962a8dfed5fcc1e6147428166476,2025-07-02T18:15:23.987000
|
||||
CVE-2025-45424,0,0,d869a9d779495922573d9ef38a24a63ffd2a962a8dfed5fcc1e6147428166476,2025-07-02T18:15:23.987000
|
||||
CVE-2025-45427,0,0,2acb289b4531d79e0a4fdda0743ea875280a2030836ee1f38a4e78112f2ff823,2025-04-30T13:51:20.023000
|
||||
CVE-2025-45428,0,0,a55753fec0ea61e23d5357aef97cfebf259250af906a54fae9de1214ab7deb77,2025-04-30T16:12:11.190000
|
||||
CVE-2025-45429,0,0,32099a126e41e157c073e4b282e42326bf59a85e3c0de57c5dd11afb3e22532d,2025-04-30T15:48:51.963000
|
||||
@ -296063,7 +296072,7 @@ CVE-2025-4562,0,0,d2657f9e359abe15e16bbecb49ae9ba4428138285e1222df0d7e8c7358260e
|
||||
CVE-2025-4563,0,0,c69851f0735281b2a51d3c75d19e39d88123d1ecc1e2b9bcaa275dabdc915d52,2025-06-23T20:16:21.633000
|
||||
CVE-2025-4564,0,0,8d3f9720d908e446b737db8b900434db81b180dd53397ac7362129a7e91e5314,2025-05-16T14:43:26.160000
|
||||
CVE-2025-4565,0,0,4256f50161ec95000de287e54ecfa2b8b56d3a683613b559af85e1b918e03fef,2025-06-17T20:50:23.507000
|
||||
CVE-2025-45661,0,1,1c1ef68e950b72d58944291d0421cef6e6e2261c3d51f19b8a645061629a6e45,2025-07-02T19:15:57.543000
|
||||
CVE-2025-45661,0,0,1c1ef68e950b72d58944291d0421cef6e6e2261c3d51f19b8a645061629a6e45,2025-07-02T19:15:57.543000
|
||||
CVE-2025-4567,0,0,121a90467be941d9ad01a97d3e24fb32b96a7e829013a214205341e8c0284209,2025-06-05T14:09:17.020000
|
||||
CVE-2025-4568,0,0,a7dc4015dc0dc8a1d051ca0a0c8659f2aa00a001767db9893b5b3f88ebbd1af5,2025-06-05T20:12:23.777000
|
||||
CVE-2025-4571,0,0,cfaf6e0f0966147161fbd50ba7ab7242473c58c0fee9a367c407b586b3a394d5,2025-06-23T20:16:59.783000
|
||||
@ -296092,8 +296101,8 @@ CVE-2025-45797,0,0,9ceb633e87e0ccdd08b067f487627f7a3614f4d7f4f938b0faf7b483b05c0
|
||||
CVE-2025-45798,0,0,1e256e91813f740bb0ddebf5c159b4041ec84583a75a9898cffd38b365095dd3,2025-05-19T15:08:18.653000
|
||||
CVE-2025-4580,0,0,2c434f3aced55b1225815c7de47b3cc229863447aaf3ca455a84427f71dfeaeb,2025-06-04T20:04:21.700000
|
||||
CVE-2025-45800,0,0,2adeb4a59c132c5d4a56fe8afda223e1c5b86658a949bac17c9d9bc540ba8292,2025-06-04T17:26:02.743000
|
||||
CVE-2025-45813,1,1,3ec09f5d44c8d8e4d8fa47d228892dba7ee1b3131eb02705ebe52f01a130e38f,2025-07-02T19:15:23.583000
|
||||
CVE-2025-45814,0,1,12a99868b5c59661b6aacf919e64b0a019734fba54186d68fbc61f712abdf28f,2025-07-02T19:15:23.797000
|
||||
CVE-2025-45813,0,0,3ec09f5d44c8d8e4d8fa47d228892dba7ee1b3131eb02705ebe52f01a130e38f,2025-07-02T19:15:23.583000
|
||||
CVE-2025-45814,0,0,12a99868b5c59661b6aacf919e64b0a019734fba54186d68fbc61f712abdf28f,2025-07-02T19:15:23.797000
|
||||
CVE-2025-45818,0,0,9a72de08da5294536bea0753f94263b2b855db9b94abd12b9c3b0d1fd37d9e3b,2025-06-17T19:42:01.770000
|
||||
CVE-2025-45819,0,0,c665b8750201a2fc239ff6acb7a2f60c43e76c91b36aa53da175cb91cdf72bb5,2025-06-17T19:41:54.183000
|
||||
CVE-2025-45820,0,0,95a4e4eb3429b44b329ce72184a4d2ba508647a05ea4c8a36c99350258cec814,2025-06-17T19:41:43.420000
|
||||
@ -296484,7 +296493,7 @@ CVE-2025-46634,0,0,adbdc53bb91ce45c108dfae363ac172a5467f9ef6b9ad8bfd5e234ff22520
|
||||
CVE-2025-46635,0,0,c81a16a7aac883be5eb8baced44885a6963efe19158222244e53c4c42c8380a1,2025-05-27T14:18:12.740000
|
||||
CVE-2025-4664,0,0,d4044bce681082456ae2ed2a3baaa6f65e61937d9e24855cf4b96203efa26903,2025-06-06T01:00:02.617000
|
||||
CVE-2025-46646,0,0,af70cd637f7e4a86250852ca6ab0f9700c2c92e88ef676964700053f516200e9,2025-06-23T18:36:04.753000
|
||||
CVE-2025-46647,0,0,d82464c6c61e702011e9e44c980b1298b7f5a3a5e2d3a313cda5347792a3790d,2025-07-02T12:15:28.227000
|
||||
CVE-2025-46647,0,1,382094ff66f393a7b551a88c71cfe9ccf8952d527fa253dd4e103d77a8c23272,2025-07-02T21:15:41.190000
|
||||
CVE-2025-46652,0,0,9d812ecaad689bd29eeb08cd6e51fc2313308ed71660c22dce020d578677f79a,2025-04-29T13:52:10.697000
|
||||
CVE-2025-46653,0,0,3b6009fc3a51ec55453aaec5d1f7a19d2114d1ff8e2f811535a6f418b5dab168,2025-04-29T16:15:37.150000
|
||||
CVE-2025-46654,0,0,0aa14c4ea6fe1b19c5c6aa8b1b364a4f4f00114d15c5d807117da3c6c36c9dc8,2025-06-16T21:00:11.573000
|
||||
@ -297455,7 +297464,7 @@ CVE-2025-48122,0,0,5d90346782f906a83ce1f7d5406c733daa96859222d3462e9a9aaa87bf4bb
|
||||
CVE-2025-48123,0,0,927dd0eda078889f31c80e97c49d639c615c1cd4fa7a86919723f469b8aa5c94,2025-06-12T16:06:47.857000
|
||||
CVE-2025-48124,0,0,344bcd7cc563cf76038c7c18a4851f7ab64343be1a5e3b5eb9102a205871c94a,2025-06-12T16:06:47.857000
|
||||
CVE-2025-48125,0,0,8eee42a4c025e254ddba8ffca9e8c3fac55262865ad675299523c2fb1d918797,2025-06-12T16:06:47.857000
|
||||
CVE-2025-48126,0,1,ecdca4ce3b1162231bdcbd2bb065c08db119dd38ae154f8ad8b6883248ca0b22,2025-07-02T19:56:33.060000
|
||||
CVE-2025-48126,0,0,ecdca4ce3b1162231bdcbd2bb065c08db119dd38ae154f8ad8b6883248ca0b22,2025-07-02T19:56:33.060000
|
||||
CVE-2025-48127,0,0,11ee29dc31cd85b0b718162f384541d319a9748ffc96b9bab70d5b0619027f27,2025-05-19T13:35:20.460000
|
||||
CVE-2025-48128,0,0,94de179bd7e9fd5a02611e704c16ad33a9258dcb246bf38f48064c8c6fc5c170,2025-05-19T13:35:20.460000
|
||||
CVE-2025-48129,0,0,24214096cd06eb0308e1dd9643f414175e6d2be1c23c282925107f3249cc2ade,2025-06-12T16:06:47.857000
|
||||
@ -297531,7 +297540,7 @@ CVE-2025-48258,0,0,05558dc9a056a4c45220e853dbcfba9265f36b69d0b6ff2d0c20a24925735
|
||||
CVE-2025-48259,0,0,1f3946fa4bd270c9c3c52b83f5d392e74c67e5ceedfed5fc79e2daf54a324c93,2025-05-21T20:25:33.823000
|
||||
CVE-2025-4826,0,0,5eb26ca2bf69b529dbc693897efb8fc6040465a4c812b7540761802d8b952625,2025-05-23T15:49:48.400000
|
||||
CVE-2025-48260,0,0,a3f874679cdeac9df55dbfd1c86be6a056999148c9f31eda32540292f95592b6,2025-05-21T20:25:33.823000
|
||||
CVE-2025-48261,0,1,94047db5a1c5d5536dc6e9c476a110f9750dabd62d4c44853ee5d54376b538c6,2025-07-02T19:54:00.397000
|
||||
CVE-2025-48261,0,0,94047db5a1c5d5536dc6e9c476a110f9750dabd62d4c44853ee5d54376b538c6,2025-07-02T19:54:00.397000
|
||||
CVE-2025-48262,0,0,e5106d3e36e1c55dca7b98309c44fab864699d88d7fb693a4b04c9c4036ab717,2025-05-21T20:25:33.823000
|
||||
CVE-2025-48263,0,0,4b385dcf2f602e3ac6e9aa1fa8960317b4cd6beb44864083fa26204c658914e2,2025-05-21T20:25:33.823000
|
||||
CVE-2025-48264,0,0,304bd89e1a992b208c192e2c5d98dc5704c1686813ea9b5846a7bf1a3d8fcdb6,2025-05-21T20:25:33.823000
|
||||
@ -297761,7 +297770,7 @@ CVE-2025-48848,0,0,38731265ae915b14c5e915b02c11b0e53a54815641117da26fffd1c6f20ec
|
||||
CVE-2025-4885,0,0,8b1f3d2344963a11ed048c1b11c72d90a832e37d4502c4d02b2f6dc0aedfb978,2025-05-28T11:49:42.250000
|
||||
CVE-2025-4886,0,0,ee7f76edd86c24830d90a51f41a4fa49fae21d920e8b2e20261474187c5dd2a8,2025-06-04T16:10:37.057000
|
||||
CVE-2025-48865,0,0,94f89730bd8ed106556973261399e33383a3753b92f1a19b2cc4e5a5c200670c,2025-06-04T19:54:41.613000
|
||||
CVE-2025-48866,0,1,5c2aa70d83b7537c313b22e7f244f72f8c04af4feccd44edfc4020d24dffe29c,2025-07-02T18:11:34.663000
|
||||
CVE-2025-48866,0,0,5c2aa70d83b7537c313b22e7f244f72f8c04af4feccd44edfc4020d24dffe29c,2025-07-02T18:11:34.663000
|
||||
CVE-2025-4887,0,0,b3da4e0d52d5d712d7aa083818ad0dfb6e4d4e8d4d6275a1920198b65f71ddac,2025-06-04T16:10:54.340000
|
||||
CVE-2025-48870,0,0,f0dd4c510b4e0f1b9cd4488ee6e0602ab690635caab16c9782c16ad205fa1ad1,2025-05-30T20:15:43.107000
|
||||
CVE-2025-48871,0,0,e51827db50c06633d673c9028d7cda097fa8237d9938def1c48be2ebb4d18762,2025-05-30T20:15:43.197000
|
||||
@ -297845,7 +297854,7 @@ CVE-2025-48960,0,0,6388a249faff67cc5a4d2fa4bca8d3989a10ec11030dddacff72a168ec292
|
||||
CVE-2025-48961,0,0,44e1cee69124b46bd6b795101bc0b7c9c4699ce00a138653c66e2e8aeff53be4,2025-06-04T14:54:33.783000
|
||||
CVE-2025-48962,0,0,4b2d64282106eed58f9e4647aa4bdcfb03945a2468e53d084f7081033bf14af0,2025-06-04T14:54:33.783000
|
||||
CVE-2025-4897,0,0,104730cc5ad0680860a774881c7ad06896ad7afe2bb00c017480a43cf79011cd,2025-05-27T16:30:05.410000
|
||||
CVE-2025-48976,0,1,e56bb4765d78cbe565c80bb91cfe5a5c34b532c6610162061b09dd3dc9884f9c,2025-07-02T18:29:35.560000
|
||||
CVE-2025-48976,0,0,e56bb4765d78cbe565c80bb91cfe5a5c34b532c6610162061b09dd3dc9884f9c,2025-07-02T18:29:35.560000
|
||||
CVE-2025-4898,0,0,088de021e18707e0dc4ec8499500601b39900fc456f0a7d4c0f7a0b50fbac254,2025-05-21T19:37:41.533000
|
||||
CVE-2025-48988,0,0,89f3346fcc4cd557a41994a11d0d1a4d79127913ab475205777ebe370f1ad8d6,2025-06-24T19:49:04.033000
|
||||
CVE-2025-4899,0,0,384aad67823f1c19c564c5975182391c80467536acba8235a635dfd93a5393e3,2025-05-21T19:37:31.280000
|
||||
@ -297902,8 +297911,8 @@ CVE-2025-4911,0,0,8165f0d1dc1e78afded21e50626575112805e2ff63d8f266295fb56c02f369
|
||||
CVE-2025-49112,0,0,53acc03eb5f34e287cf80e6f2606bfb4760fb16ea2fe509fc70b20f7de56218f,2025-06-02T17:32:17.397000
|
||||
CVE-2025-49113,0,0,56a8fd04a9ef82f1d5c677d3aef05bbaae629657949015a38e21cc671f31eeb2,2025-06-12T17:15:29.310000
|
||||
CVE-2025-4912,0,0,952cc1697455c59886c397e61a80308747f6eedd0f377c0531d621b366fc5d7d,2025-05-21T17:41:21.063000
|
||||
CVE-2025-49124,0,1,7aaed7db3c7c3425730e28a3746bf707c007c3574467d4e0189597a3f538e67a,2025-07-02T18:28:47.897000
|
||||
CVE-2025-49125,0,1,9850d5e560b7706bc221711b24d8b458428db1e191d16003b58dd27aa88f673f,2025-07-02T18:28:13.577000
|
||||
CVE-2025-49124,0,0,7aaed7db3c7c3425730e28a3746bf707c007c3574467d4e0189597a3f538e67a,2025-07-02T18:28:47.897000
|
||||
CVE-2025-49125,0,0,9850d5e560b7706bc221711b24d8b458428db1e191d16003b58dd27aa88f673f,2025-07-02T18:28:13.577000
|
||||
CVE-2025-49126,0,0,f2746aec11bbc747d0228cb8139b07ac427a821bbfb80f0a313e06bf384fe2ff,2025-06-23T20:16:21.633000
|
||||
CVE-2025-49127,0,0,3f4889eef877e3cbd48aa702e8cb35c833e3234501017b5b4ce4fc613f23b00a,2025-06-09T16:15:44.833000
|
||||
CVE-2025-49128,0,0,be74e1e3636b4e3c68c2e5f707126adefa5b42c030884a0a961eb0fa96655c19,2025-06-09T16:15:44.947000
|
||||
@ -297943,13 +297952,13 @@ CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa
|
||||
CVE-2025-49163,0,0,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000
|
||||
CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000
|
||||
CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000
|
||||
CVE-2025-49175,0,0,bc48898aa22840d684e986dd4bc99123d118318d12fcdde1f78c0811c7f9da52,2025-06-30T20:15:24.553000
|
||||
CVE-2025-49176,0,0,7c8e3298f5c5daf34fd87a5b2093060a65cb032351d81042db8ee9f2aaa6d551,2025-06-30T20:15:24.690000
|
||||
CVE-2025-49177,0,0,88fe85ebfb311cc7851d290d91c8e67844d99ab06620a758f4cae9a3c93ed2ef,2025-06-30T10:15:25.913000
|
||||
CVE-2025-49178,0,0,2977b66486df3bf07a30aa6a0bfb1cefd659d07df5857968bf6e6aab4abd4148,2025-06-30T21:15:30.693000
|
||||
CVE-2025-49179,0,0,690955eeef8fc1b93cd649b8d87bd4128d4338f5aa14dc011f7c01904dc55014,2025-06-30T20:15:24.817000
|
||||
CVE-2025-49175,0,1,05c4c0c17d157a274e33624cd51023c28750ce70bbac8c685e97e41cde6a8598,2025-07-02T20:15:30.693000
|
||||
CVE-2025-49176,0,1,58f0bc9899911c80c8035c853483a104069a082e71868005a69b053ba046fdae,2025-07-02T20:15:30.820000
|
||||
CVE-2025-49177,0,1,2776354ba86cd7216ed2eee07d464dd343e2260aa14001f109fcd75b0e6568d1,2025-07-02T20:15:30.943000
|
||||
CVE-2025-49178,0,1,205db7ae9d348939de33e6cdf7edc77ae1dce68a6cdac3af14a3294c8dfe7349,2025-07-02T20:15:31.057000
|
||||
CVE-2025-49179,0,1,fa802d5830c7b07b71c2a6064db3460130d6b592fa0e646d30819ff56cc53a0b,2025-07-02T20:15:31.187000
|
||||
CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000
|
||||
CVE-2025-49180,0,0,e9711ad3588c97661db2e1f474cb48105c3aa995cfcc9886fec475a3e87c02d2,2025-06-30T20:15:24.940000
|
||||
CVE-2025-49180,0,1,d656594d323a36014cef5dacb2709fbdc583abfca1e258a8d0fd1163a8698a62,2025-07-02T20:15:31.320000
|
||||
CVE-2025-49181,0,0,65f8ea01de63d019d8688de775c40b302b8c0b1e44c040e53e46324e69435218,2025-06-12T16:06:20.180000
|
||||
CVE-2025-49182,0,0,8adc8833944dbbffb6c925bafc811eee2574582f2d7b7b09537e334080770141,2025-06-13T09:15:20.130000
|
||||
CVE-2025-49183,0,0,c9c3ab65e477d8e9a4d5c9adaf45822d49f0873835d0971680386eb894e72562,2025-06-12T16:06:20.180000
|
||||
@ -298023,7 +298032,7 @@ CVE-2025-49259,0,0,db4e2e6ad352e612216ee40424170ff047ce4767289f88fe44b36338c3261
|
||||
CVE-2025-4926,0,0,321f7efe7ac33228adea3a7bf6c22d3279632b362ddc9dd47d64aee357b84d4f,2025-05-21T12:46:59.150000
|
||||
CVE-2025-49260,0,0,20df55cb1d6ae6d831c559c85aa2fffadf12ac6a127a9822419ce67dc6550363,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49261,0,0,1c637cdb70f65c420754aa2396c2000cec4df743068bf0b57eab505c84c0b69a,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49262,0,0,c8ecb38e2a6bbb509b5464e93a8e807cf4fe47f70ed1e288b103f2145fd0fbb6,2025-06-06T14:06:58.193000
|
||||
CVE-2025-49262,0,1,06475fea8bb8e08acfd3209a58a6aae72c911267f58fd5a9f0003b35cc972834,2025-07-02T20:02:58.340000
|
||||
CVE-2025-49263,0,0,38aa1f55e3d42e2ae1c5f0e906030fae07b5739b8521b0ba5395b28e605e2da3,2025-06-06T14:06:58.193000
|
||||
CVE-2025-49265,0,0,93f04cd3c02c56137db8c1a60ed5bdbd759fe4413ddae7beafb034d9122bdb3e,2025-06-12T16:06:47.857000
|
||||
CVE-2025-49266,0,0,2ec88e02ae1dd89b21bfb67afc114b109690cc3e3c98198e7fe6084e9cdd1222,2025-06-17T20:50:23.507000
|
||||
@ -298051,7 +298060,7 @@ CVE-2025-49288,0,0,fd55b6e659457965b044763d373bc487f4f85d0422ecf0bdb451203ab3005
|
||||
CVE-2025-49289,0,0,6db9920d9566ce3cab2322c92454f3a08523c9da68abd3449538cf2f7bf511af,2025-06-06T14:06:58.193000
|
||||
CVE-2025-4929,0,0,a8e593e93f40512d4e00d2cf8b1f6bcbb5d53e9a2cd29f3fc687456ae4295712,2025-06-11T14:54:00.567000
|
||||
CVE-2025-49290,0,0,cf4e11029979fd4c0003797d9d335aaa3fc468b369e4ac17f80d2929b723f4be,2025-06-30T18:38:48.477000
|
||||
CVE-2025-49291,0,0,9daa3b20fed7cc8f0088dbb844645608b4c71dd2f7cfa859b6d976a11504f1d4,2025-06-06T14:06:58.193000
|
||||
CVE-2025-49291,0,1,153742cefd7a33afe363ac01c19e5547522b77d678ed71f932188ac106c837be,2025-07-02T20:02:18.077000
|
||||
CVE-2025-49292,0,0,1b2cdbc10ccaf92dc3f2c2fa167a6bb6220406e291e936a3a5a6ab308c52f19a,2025-06-06T14:06:58.193000
|
||||
CVE-2025-49293,0,0,306999d754a56fe33b1688646f3766e55e4d4cf04e569fd466480109a4867d8c,2025-06-06T14:06:58.193000
|
||||
CVE-2025-49294,0,0,4a7f3ec895253ffd59c41f8c6fbee8a9fb92663981d502e562f03c0a1f3b2feb,2025-06-06T14:06:58.193000
|
||||
@ -298161,7 +298170,7 @@ CVE-2025-49520,0,0,c00c5db1e0d7cdfcf03ce2a151d4a6f1c9dd6234f02cc9e35bc9dc762ccb8
|
||||
CVE-2025-49521,0,0,f5759572ad27815817cd4949078de9ea61bd0b160316fbc144b68c5d87cc6701,2025-07-01T02:15:22.310000
|
||||
CVE-2025-4954,0,0,1842fa5885eb88cf4e938c25f5c28a2b06178d338bd8f50c89b12e7a73a12077,2025-07-02T16:11:11.290000
|
||||
CVE-2025-49549,0,0,d51ae214ec023b9fbf2d300a776160828d2a71b7300d33bc04b291b25e1ecd5e,2025-06-26T18:57:43.670000
|
||||
CVE-2025-4955,0,1,dfeeeedd1c9e503552c289dc5a5f282eaa3f31fc9b39c1438869fa46290cc865,2025-07-02T19:25:30.180000
|
||||
CVE-2025-4955,0,0,dfeeeedd1c9e503552c289dc5a5f282eaa3f31fc9b39c1438869fa46290cc865,2025-07-02T19:25:30.180000
|
||||
CVE-2025-49550,0,0,81d29c0d656ad2b61bb825237b123272a33fd2799782f8797b7b40fb5e1f45eb,2025-06-26T18:57:43.670000
|
||||
CVE-2025-49574,0,0,fb5e38666a9d5db5e2fea3eff17a1cec1849b841049d294374c0873eea7d745e,2025-06-23T20:16:21.633000
|
||||
CVE-2025-49575,0,0,5239212f6088f8e9f5d72981748315013281ee63030d12ad53f604f56fb5ce0a,2025-06-16T12:32:18.840000
|
||||
@ -298201,7 +298210,7 @@ CVE-2025-4969,0,0,4f90cc424a2a0f4e9ed8afa3693879db2394c134460b9fa8753024f2852d39
|
||||
CVE-2025-49709,0,0,6e5da86ede95ac762ffd2aaae8e4447b199f72a6fba5fa138a2263e19d8c9c57,2025-06-16T16:41:05.487000
|
||||
CVE-2025-4971,0,0,ec01b010a198b670732c969d73dfa53bbd76f2e075f866245cc573c614982079,2025-05-21T20:25:16.407000
|
||||
CVE-2025-49710,0,0,fdef6b70e5300806b4a42e9567df3fa6452819f84b853bd1194cd77188110e32,2025-06-16T16:40:48.453000
|
||||
CVE-2025-49713,1,1,cf099eb8e0034d45f9d7ba5d6cfc1c4f3f92e67b5aee5bac95e8839d1a7d9a9a,2025-07-02T18:15:24.303000
|
||||
CVE-2025-49713,0,0,cf099eb8e0034d45f9d7ba5d6cfc1c4f3f92e67b5aee5bac95e8839d1a7d9a9a,2025-07-02T18:15:24.303000
|
||||
CVE-2025-49715,0,0,d350a971b67f9d6562ee1abd43003afbcfd7b9d445831ceec772b587e6084416,2025-06-23T20:16:40.143000
|
||||
CVE-2025-4973,0,0,a09baa9620620eb012f5ddd6b5ca6dd7efd75fb0c8b55678f3f3e6206d444643,2025-06-12T16:06:20.180000
|
||||
CVE-2025-49741,0,0,1b29e4a4fce34a8586e58f3bcb010a13d592cf566421071690fdc217420c1cd8,2025-07-02T14:15:25.737000
|
||||
@ -298404,7 +298413,7 @@ CVE-2025-5030,0,0,6d4b94a2a3e4b3835c2395db7b8595a9109a231f789fd318934411db49833e
|
||||
CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0aa,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5032,0,0,4156143fef9ccb288081dade2120fec7f51a54986c4f66b96dc31d6794fced0f,2025-05-28T14:12:07.037000
|
||||
CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a45,2025-06-20T16:15:38.947000
|
||||
CVE-2025-5034,0,1,f0ac7332abf996a6e6e6a22f6f30e0617c7501cb6293576154766b569ef16c9e,2025-07-02T19:00:24.197000
|
||||
CVE-2025-5034,0,0,f0ac7332abf996a6e6e6a22f6f30e0617c7501cb6293576154766b569ef16c9e,2025-07-02T19:00:24.197000
|
||||
CVE-2025-50348,0,0,5081ba7593ae8342ef6e03ff05001a5e9251f0737e546d04330fd65ae4fb2e2a,2025-06-25T13:08:13.867000
|
||||
CVE-2025-50349,0,0,15e0e70949273fa56afdfb5bd13043f639cdede12bd48e56cc46a914f6d4ad3a,2025-06-25T13:01:11.240000
|
||||
CVE-2025-5035,0,0,1deb7e75a6c3e09c6c339251bdadee3dfedda027cf22bf3c096a61d9e90df423,2025-07-01T17:43:20.530000
|
||||
@ -298558,7 +298567,7 @@ CVE-2025-5207,0,0,e402cb7000c0d3ec5faf704526317d521bb7be7fab48c7474536b7fb38ce69
|
||||
CVE-2025-5208,0,0,9e9535cfb50c25096d995fee715ad33ab744750f67296c60cac7b3a386d28ef1,2025-06-05T14:14:06.397000
|
||||
CVE-2025-5209,0,0,1de988bb6fc9688228254af9049355449ffefba36f51df5a462735aed22ede34,2025-06-26T16:01:40.640000
|
||||
CVE-2025-5210,0,0,7f798974cbc440c4e4dd8009e513c3eb9007b33b9ead67a41eab0bd81192fbbf,2025-06-05T14:13:54.527000
|
||||
CVE-2025-52101,0,1,7e2c22898ccb8924744ecf98bd8477845feb337808e53054f63b88710899e0c7,2025-07-02T18:15:24.513000
|
||||
CVE-2025-52101,0,0,7e2c22898ccb8924744ecf98bd8477845feb337808e53054f63b88710899e0c7,2025-07-02T18:15:24.513000
|
||||
CVE-2025-5211,0,0,8f4ed9a6be734738ba7e8af34dfd90276884a544fade7898e9f11540d4e9c7c6,2025-06-05T14:13:12.777000
|
||||
CVE-2025-5212,0,0,09bde77c0a73fbc6c1f35bedb61d3c4c409f9d9416e30903b1d4777f1733a256,2025-06-05T14:12:55.247000
|
||||
CVE-2025-5213,0,0,8262fd7ad3860a05f2599b6c82e670c892a52b241834cc36a8cbcfe508de4e0a,2025-06-05T14:12:38.577000
|
||||
@ -298633,6 +298642,7 @@ CVE-2025-52555,0,0,6a75b391ee3c8272fca348930578b6893d5d810e2019dea636affd2993361
|
||||
CVE-2025-52556,0,0,01d14cdcd651409b8ec6f2a117321e576266f60affdb5d61d3b6cf66da0be9ba,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52557,0,0,d6ac46828bdd4bd5689e0ed9e6db622a0cd2c5e50b4932c5603e932a5d57d26a,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52558,0,0,feddd9b17bf18205609fd5d4ab75e553c171fbe3defa5726e634521dfcb6dbbe,2025-06-26T18:58:14.280000
|
||||
CVE-2025-52559,1,1,a3f55a55125ee4d97083028ffb56541e54f129f69d9872b72d7582a3a8363808,2025-07-02T20:15:31.443000
|
||||
CVE-2025-5256,0,0,8e276989283383806f3abf5c20dbe67142f0dc8ca07046605c539922633ebc4a,2025-05-29T14:29:50.247000
|
||||
CVE-2025-52560,0,0,e5a785d0108feab8a82fba59c5f9cae135ba29f0ebde34364e03ae7ca5151c5a,2025-06-26T18:58:14.280000
|
||||
CVE-2025-52561,0,0,aabef282808932d733941a0236add55fa34255b30e526cf4822de55340d2d48f,2025-06-26T18:58:14.280000
|
||||
@ -298722,7 +298732,8 @@ CVE-2025-52827,0,0,04da4f456c5a4f30ec7c35209b7acc7cd69257169d05a3aac291d93074f0d
|
||||
CVE-2025-52829,0,0,eb4d964acfddba9bd78da4c0fddfa106090ce982a7436b16afafa186380d210d,2025-06-30T18:38:48.477000
|
||||
CVE-2025-5283,0,0,a8169db79b4666d05c59f16c729749cd032f3753a6abd4a1bda7e79d017ef3ab,2025-05-31T23:15:20.553000
|
||||
CVE-2025-52834,0,0,4ca40346c1caeb484e6b4cab253e3c17da1f917f108bf85aa6fe3c08b7cc103c,2025-06-30T18:38:48.477000
|
||||
CVE-2025-52841,0,0,5a42bcc8c21230be36d8ea2efa4d9e98607dc20ce1b9d31997d3a6a58a268bee,2025-07-02T17:15:53.807000
|
||||
CVE-2025-52841,0,1,3d7da849a8e31127ec689a0a5860b78312f807447c1f9221344c0a6c20dd5d34,2025-07-02T20:15:31.610000
|
||||
CVE-2025-52842,1,1,2b03370c1b6578bbc27d600c72444b127d07a7bdf8339b142f09fa8e34be311f,2025-07-02T20:15:31.727000
|
||||
CVE-2025-5285,0,0,44bcec87abafcefe0886e878731e41dce32b0fc09d4f84e223174bcbfeb5ce09,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5286,0,0,05e7ca3386f0ef15ac2b01314d8e06913e02de8c1752e75b99b02bac23121404,2025-05-29T14:29:50.247000
|
||||
CVE-2025-5287,0,0,b8300f230839e0ad3335fdc92731d9b07abc7f3405256834dd55febc4f9b0133,2025-05-28T15:01:30.720000
|
||||
@ -298754,7 +298765,7 @@ CVE-2025-52901,0,0,597dd3e0884e75a10ca3c76c1126f6f1d090a216692cce1bc426e825d8307
|
||||
CVE-2025-52902,0,0,b8d594698346e33c9857483268477e14dc09fa28d15e66d418ce57128530f231,2025-06-26T18:57:43.670000
|
||||
CVE-2025-52903,0,0,94a4c6feeb3ab5f2f3f94f951914d81f3159a284c72cdc60f80cd2659d917108,2025-06-30T18:39:09.973000
|
||||
CVE-2025-52904,0,0,bcfb9cec165acf9ecfbf631b206a037247a445035acaabf7192276de61173353,2025-06-30T18:39:09.973000
|
||||
CVE-2025-5291,0,1,ee4ed627d63194987274d8b55aa61e23a8b543ff69ad0554b0f4621e985f3424,2025-07-02T19:33:43.910000
|
||||
CVE-2025-5291,0,0,ee4ed627d63194987274d8b55aa61e23a8b543ff69ad0554b0f4621e985f3424,2025-07-02T19:33:43.910000
|
||||
CVE-2025-52916,0,0,438f7afeba591d6d5b3e576c75dcb415d3bd31981574da43af97e05ceabf2876,2025-06-30T16:15:23.727000
|
||||
CVE-2025-52917,0,0,7ab3bf82ed52daa48453df20fd6fb2069e3c2235c3d59c92d3f64c725f7f20d8,2025-06-30T16:15:23.870000
|
||||
CVE-2025-52918,0,0,6c4c967ecd4d1d5b8ca4b1dd9bdc53d47425d36549eb42b0c5b72cef192ebe55,2025-06-30T16:15:23.990000
|
||||
@ -298864,7 +298875,7 @@ CVE-2025-5325,0,0,c13176172452a62b2dce96df66b8263f391e2e94fbea914673cf01de62808a
|
||||
CVE-2025-53253,0,0,214e24e64f3a68a364c0361453a4da1d0055b4e89b2079e94acddb30e59f02c0,2025-06-30T18:38:48.477000
|
||||
CVE-2025-53254,0,0,8d56ffe402bb76b24185845decdc59779e8802d356487d5334398779a07bb1d1,2025-06-30T18:38:48.477000
|
||||
CVE-2025-53255,0,0,ec730ac042e0abf9b2a31b64f28be2cdcae6a879850b6d271183060760548fc2,2025-06-30T18:38:48.477000
|
||||
CVE-2025-53256,0,0,399929b9fdbd9d3e98feee405e4fc6cba57be7abb7239bb64e68315c9e0a64bf,2025-06-30T18:38:48.477000
|
||||
CVE-2025-53256,0,1,bb84d9ae19d9cae363a736c94205d30da11efb3c31c9b4723bb955c7beec5e2b,2025-07-02T21:15:41.410000
|
||||
CVE-2025-53257,0,0,a9a11065de348b88d4b75cff097eee7a5ba0f26c0158d0437a76d9c025fa2cc5,2025-06-30T18:38:48.477000
|
||||
CVE-2025-53258,0,0,3d6cf121ab247ccedc31021cef85a1fb400e0208a4dc46b8d259781a69aea504,2025-06-30T18:38:48.477000
|
||||
CVE-2025-53259,0,0,1a676ff829527268718afb1a97ac7922e0cf1bdad3ac66285a3c31c12b74b980,2025-06-30T18:38:48.477000
|
||||
@ -299034,9 +299045,9 @@ CVE-2025-5434,0,0,9c74c53f1cf63c29a6c4f421d3e66dd8e0230e030b10a94ec340a164b1af82
|
||||
CVE-2025-5435,0,0,a07b000fdd10d693271c33e5855ef762ee79c33e1434ecbd5fe85a5e86df8fc5,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5436,0,0,79ce2e03946bf46829683ce641eb6e62632f0261fbc1007a9d8df993bd98e559,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5437,0,0,811a7dd33c5ee8133b31f658086585361c8a0965b92e0717d81b56b78c843fdd,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5438,0,1,9312f400ed497dd6a9c823f72cf10956f6f2a6670a1b3fc79f6968b12c1a2555,2025-07-02T18:08:56.187000
|
||||
CVE-2025-5439,0,1,5393809746e167bdac62d8e2386c4e04df7737502cd4e1d8c350287b2fcd8f5a,2025-07-02T18:08:04.770000
|
||||
CVE-2025-5440,0,1,af2be9dcb24d92c343a6f8f918709518afa77f6a52ec237e760c0fddd3d435a5,2025-07-02T18:07:16.100000
|
||||
CVE-2025-5438,0,0,9312f400ed497dd6a9c823f72cf10956f6f2a6670a1b3fc79f6968b12c1a2555,2025-07-02T18:08:56.187000
|
||||
CVE-2025-5439,0,0,5393809746e167bdac62d8e2386c4e04df7737502cd4e1d8c350287b2fcd8f5a,2025-07-02T18:08:04.770000
|
||||
CVE-2025-5440,0,0,af2be9dcb24d92c343a6f8f918709518afa77f6a52ec237e760c0fddd3d435a5,2025-07-02T18:07:16.100000
|
||||
CVE-2025-5441,0,0,ac74c7cc0f531f603ebba9c2bca9d48918e26d19fe5966f70f4992ef7f9dc14a,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5442,0,0,aff4e7dbcf6e16c07e1755fc79189c8c906002caae35c81216b58555f7942402,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5443,0,0,c979fc559b9753e7b8f3cea4a3591b3d21b403fd87a023a9ecde01c1efbe3d0f,2025-06-10T15:14:40.057000
|
||||
@ -299389,7 +299400,7 @@ CVE-2025-5873,0,0,94e40892e1834c35ffd2c63a40f58e3bdf2ff473f557d19637cf12f248462e
|
||||
CVE-2025-5874,0,0,726c9df65c566725a510f5c58b0c057c9bdfc295fa5f1ff3d2641c2157e02012,2025-06-09T12:15:47.880000
|
||||
CVE-2025-5875,0,0,c25b34ccfcd613e0dc066c8ac82a22ec084260cbb2bc3930454841ae31515b22,2025-06-23T14:21:01.890000
|
||||
CVE-2025-5876,0,0,32a8af4e9cd8f7d2c246abe46c081e26ff3051e42e928a128210a8c01026ea88,2025-06-09T13:15:25.777000
|
||||
CVE-2025-5877,0,1,d0fc9d475beccd3a1a467515982c1f66a610522bd0dbdcaf601a57c1a88517bd,2025-07-02T19:17:43.003000
|
||||
CVE-2025-5877,0,0,d0fc9d475beccd3a1a467515982c1f66a610522bd0dbdcaf601a57c1a88517bd,2025-07-02T19:17:43.003000
|
||||
CVE-2025-5878,0,0,7460e28b521adf15f1e0947b351c873b699a9b031f986dc0aaec957b1b03014c,2025-06-30T18:38:23.493000
|
||||
CVE-2025-5879,0,0,756604528009a19f95fc6aaf90273ff5d2ceec0a3e555d776ee81b7d6b78c298,2025-06-12T16:06:47.857000
|
||||
CVE-2025-5880,0,0,30053a977ddbe5e71c046af93902c42d00bc2985c0890b6525775f4d57544340,2025-06-12T16:06:47.857000
|
||||
@ -299561,7 +299572,7 @@ CVE-2025-6136,0,0,5f7e8be2da42633353469049b7512fa5d07106f6da9174f3722e62acbd430a
|
||||
CVE-2025-6137,0,0,ddc67afa546c83e767dcbbc7b7e064e9742a4bea6b7f9760a6f55350f1985699,2025-06-26T16:33:18.123000
|
||||
CVE-2025-6138,0,0,69c19eff97e06c34f5b8cfdfba9cb33f9498a49d64177b5418e8373bd3e2dbbf,2025-06-20T14:34:32.397000
|
||||
CVE-2025-6139,0,0,1e573675182fd2c70c93e9d60e690c79091588fc0dffcb1bdf91b56cec3b2b4c,2025-06-26T16:27:37.157000
|
||||
CVE-2025-6140,0,1,b68f1270ebcdebc6a09ed170a65e7944b3aca32e5ee78468b2c7d0a773e49e2a,2025-07-02T18:58:42.230000
|
||||
CVE-2025-6140,0,0,b68f1270ebcdebc6a09ed170a65e7944b3aca32e5ee78468b2c7d0a773e49e2a,2025-07-02T18:58:42.230000
|
||||
CVE-2025-6141,0,0,da13bc3db5b6441ec02280dd31d41a049dec0de80cbb8316bf3d83796a9c0f04,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6142,0,0,e80f42b3df69bc7d34694aade5534d0147faa50d387373f1d151bcbe4aa458f3,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6143,0,0,27cb56360567787dbec604a031c63766d0d7cb50b276f94212b3c1d5cb88a2f9,2025-06-23T19:29:54.330000
|
||||
@ -299573,7 +299584,7 @@ CVE-2025-6148,0,0,1d80dfd65e83b1c0094d1738353bddfce30f1ccddcddac7fd512e97214056b
|
||||
CVE-2025-6149,0,0,bfa9b70c74b833d4b13edc2b8c0deb75557d095959799446cbc897b529f45341,2025-06-23T19:28:26.243000
|
||||
CVE-2025-6150,0,0,1c1c8c9840248db413992659480d6a0621f81bf1fb34376aa4877ba8e62a64a5,2025-06-23T19:28:18.330000
|
||||
CVE-2025-6151,0,0,66f985d955d28732cb3e20742ce5c2b75d056fdf6e0c0fd5329b3e2551fd465e,2025-06-19T01:20:04.247000
|
||||
CVE-2025-6152,0,1,32d4186f036cfff413fb083fa82eb785e9512523c1a40900c862dc16e87a29b7,2025-07-02T19:47:02.363000
|
||||
CVE-2025-6152,0,0,32d4186f036cfff413fb083fa82eb785e9512523c1a40900c862dc16e87a29b7,2025-07-02T19:47:02.363000
|
||||
CVE-2025-6153,0,0,9cb391bc0c728a51d1642ebf8a165fb9af8fa2212048ca86e4445e0b055258b3,2025-06-24T15:53:37.673000
|
||||
CVE-2025-6154,0,0,95060072831785f3ed57ae597e6cc6e6409b897d7a65ff870ebacbcf6fb1f450,2025-06-24T15:53:35.847000
|
||||
CVE-2025-6155,0,0,3e8fc69cbf51a07d93c7df9f9e6e4b66e36cc96b90ecd10cbf6a0ab1b9592e90,2025-06-24T15:53:33.717000
|
||||
@ -299588,13 +299599,13 @@ CVE-2025-6163,0,0,6e13a9e163cb9e3184563f5c7b63b8596f5e63cf06bd837983ba5aafb4c041
|
||||
CVE-2025-6164,0,0,c17ffe7ec702387ad5d177a5e91c7296a9ef4f80a11f6ea499b523afd7af1e02,2025-06-23T19:01:39.440000
|
||||
CVE-2025-6165,0,0,d37487f3351fd79c79a2b837a802b50cbfd6b0061561d5f5248627aadf9d8941,2025-06-23T18:54:37.140000
|
||||
CVE-2025-6166,0,0,5466d469b66b84ed623983bf0f3157156a6c338ed721d2f72b93fc8c6a2c9f49,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6167,0,1,1a7f72e942e8f63b6fc7e9227e5e064378d6c419b03d398adf0c1014d4174418,2025-07-02T19:36:26.940000
|
||||
CVE-2025-6167,0,0,1a7f72e942e8f63b6fc7e9227e5e064378d6c419b03d398adf0c1014d4174418,2025-07-02T19:36:26.940000
|
||||
CVE-2025-6169,0,0,24b56c63dd5c2b9799043dae6dc3b75a3e06e9ee630be707f681a9bb09cd5b58,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6170,0,0,b78aff7a1c8e8db8ce7aabd9ccc1b29ff578e0357c573a194099cb12287faea6,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6172,0,0,df5b11377ae2bcb860baea092fdadde3351cf8aeca30edf92e0d7977024948be,2025-06-16T17:15:31.503000
|
||||
CVE-2025-6173,0,0,c070b1517acd95c5e869ebc2e1f1712fafd19138bea48c0324a49cddfc5a27e5,2025-06-26T15:57:47.900000
|
||||
CVE-2025-6177,0,1,edd6b1d41a5c4b8e0408f6aa59fea86a8c8b780a92c52491789320f71941d7a1,2025-07-02T18:26:40.590000
|
||||
CVE-2025-6179,0,1,42334162f4ea7781bf58c27d11fa5142617025c2a62fd9b39e81ec90028c3d21,2025-07-02T18:23:31.617000
|
||||
CVE-2025-6177,0,0,edd6b1d41a5c4b8e0408f6aa59fea86a8c8b780a92c52491789320f71941d7a1,2025-07-02T18:26:40.590000
|
||||
CVE-2025-6179,0,0,42334162f4ea7781bf58c27d11fa5142617025c2a62fd9b39e81ec90028c3d21,2025-07-02T18:23:31.617000
|
||||
CVE-2025-6191,0,0,f0f3b688b48f4f8183a91df95fa38ffe0dfc74cf3682559765b5451f2fa22fc1,2025-06-23T20:16:59.783000
|
||||
CVE-2025-6192,0,0,8db66416da4cd3b86c62307f3f4665206cb350578778274a773d4c246ef21cd0,2025-06-23T20:16:59.783000
|
||||
CVE-2025-6193,0,0,8f7cbe3660433ebbbde46b01965a942eccd778d0ad783408ec78638602642ace,2025-06-23T20:16:40.143000
|
||||
@ -299616,19 +299627,19 @@ CVE-2025-6264,0,0,f32dcf95c634dc2f1ab86702d3943727ebae8018b2fa6b536fe8be4f7c8173
|
||||
CVE-2025-6266,0,0,83020883d3aae1b262b30700af6ace7e5c0118a4b262e735a3268c83525b299f,2025-06-23T20:16:59.783000
|
||||
CVE-2025-6267,0,0,f67fce7007c3c00cf880637b4dba7c946432602560144eb3304995260da703c2,2025-06-23T20:16:59.783000
|
||||
CVE-2025-6268,0,0,5f6af6ae27404ab496f8142bc1bb6b12379a204a2c7b25a2283e1abd50ac4f70,2025-06-23T20:16:59.783000
|
||||
CVE-2025-6269,0,1,024eb914f10771a08084c9baf8010d041e3441c638e70a7c2c9e615bdaa7a700,2025-07-02T19:01:55.227000
|
||||
CVE-2025-6270,0,1,2f2b33b3f299d0c0737f68aaef955f3f89328f2d6c3aeb68c37b17e94cb9fa3d,2025-07-02T19:02:17.373000
|
||||
CVE-2025-6271,0,1,a979bd02238c97052b0931fd18d71d0fb43cf9d242e65ca25985753b912552ae,2025-07-02T19:03:29.737000
|
||||
CVE-2025-6272,0,1,69aacf1933584e6c697bffc9f4ef45990c895ad88679eb28f0e65dbaf6d7a0d5,2025-07-02T19:04:23.387000
|
||||
CVE-2025-6269,0,0,024eb914f10771a08084c9baf8010d041e3441c638e70a7c2c9e615bdaa7a700,2025-07-02T19:01:55.227000
|
||||
CVE-2025-6270,0,0,2f2b33b3f299d0c0737f68aaef955f3f89328f2d6c3aeb68c37b17e94cb9fa3d,2025-07-02T19:02:17.373000
|
||||
CVE-2025-6271,0,0,a979bd02238c97052b0931fd18d71d0fb43cf9d242e65ca25985753b912552ae,2025-07-02T19:03:29.737000
|
||||
CVE-2025-6272,0,0,69aacf1933584e6c697bffc9f4ef45990c895ad88679eb28f0e65dbaf6d7a0d5,2025-07-02T19:04:23.387000
|
||||
CVE-2025-6273,0,0,7fbd43be0636c447274ca5dd224661b382933a1bb0936c93b976e34f99babf3b,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6274,0,1,d1c56c73fd2ed1a2abccafe1b4d838b5dae80f1e1020fdb3cb0cfa7fc119ea61,2025-07-02T18:33:27.390000
|
||||
CVE-2025-6275,0,1,6847ddb53c428ab782b5bb5144510fc9c30ff8873135f2b57a95ea2880350651,2025-07-02T18:34:42.377000
|
||||
CVE-2025-6274,0,0,d1c56c73fd2ed1a2abccafe1b4d838b5dae80f1e1020fdb3cb0cfa7fc119ea61,2025-07-02T18:33:27.390000
|
||||
CVE-2025-6275,0,0,6847ddb53c428ab782b5bb5144510fc9c30ff8873135f2b57a95ea2880350651,2025-07-02T18:34:42.377000
|
||||
CVE-2025-6276,0,0,ccb81ed6c0bd85a63d78fd4d2a38a1b018d0dc69b6dbbfdd1314d8ec4b6bfe0b,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6277,0,0,f3138c5bf160fb9cc92ef2790899f67376501f52199dbecebe88985f0053453c,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6278,0,0,56924f4824f1de8e40fbe3d811ae61d82b96bc317af063e543633f656d17d6e6,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6279,0,0,527629d7d97f098383822910b706a7a13367898e9f1dfe64476c44f692b096ba,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6280,0,0,c054ffe4a30a56c9b692c4925f4f9370a417b5510cae29fc18d2b9dcd65b5f7a,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6281,0,1,25aa7b9dfe081c112d8d58e4ce5efb1b8be42368bc102fb60103d61db49b7134,2025-07-02T18:37:11.983000
|
||||
CVE-2025-6281,0,0,25aa7b9dfe081c112d8d58e4ce5efb1b8be42368bc102fb60103d61db49b7134,2025-07-02T18:37:11.983000
|
||||
CVE-2025-6282,0,0,0c2da46a89cbbe9026c79b3c6cf10427703bbd3c6e9eb8bd217b26455bfc69f6,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6283,0,0,4cfad25df5b2dfa9412a94aeb6561731ac12af51fae0d0ff6c2572f4fb134921,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6284,0,0,01c0a9b6c36fe98d11c601a672d683a0e8fb89235f309774f6bbaa34d1b90b9b,2025-06-26T21:36:59.597000
|
||||
@ -299642,9 +299653,9 @@ CVE-2025-6292,0,0,950777517b48d376f4e9cfbb6475ca5763192a729885525f030e7df89973a7
|
||||
CVE-2025-6293,0,0,30342ac281aebc0a30969c59d523a1a3a2cc7a536dbaaadfbb8317c27c072af8,2025-06-26T17:22:14.003000
|
||||
CVE-2025-6294,0,0,2f20bcf126712080bcfde5ea574f9107db7d0aaac3eeac826f2b5961068819f0,2025-06-26T17:21:26.107000
|
||||
CVE-2025-6295,0,0,c68657e703a32d8a27635af3bd0cbcf47590717c8db4b4d0b6e9b6fdea795c7c,2025-06-26T17:19:48.817000
|
||||
CVE-2025-6296,0,1,1b01f8de9ec8aa98699a786d2352531b8134f89a6f041b3b274dde19ecadbda6,2025-07-02T18:46:52.983000
|
||||
CVE-2025-6296,0,0,1b01f8de9ec8aa98699a786d2352531b8134f89a6f041b3b274dde19ecadbda6,2025-07-02T18:46:52.983000
|
||||
CVE-2025-6297,0,0,546fd58bd43ac02228726c05947618b3d9627925bf9812bc9d83c75541bcfc9b,2025-07-01T18:15:26.143000
|
||||
CVE-2025-6299,0,1,c652a5d9354c93c03ffa4782b81a8816f51e8849ed73f570b231410e0d04b7c1,2025-07-02T18:53:41.497000
|
||||
CVE-2025-6299,0,0,c652a5d9354c93c03ffa4782b81a8816f51e8849ed73f570b231410e0d04b7c1,2025-07-02T18:53:41.497000
|
||||
CVE-2025-6300,0,0,e2ec6cf8b98712d407f84e21f599347de059cbe66e2eb84a9fc4eb6c7fb27268,2025-06-26T17:14:20.587000
|
||||
CVE-2025-6301,0,0,1a6a37865c9ad16879d590be6f25642d0cfa9abb4a67fa3b3dc503342ed3c79d,2025-06-26T17:09:26.040000
|
||||
CVE-2025-6302,0,0,7f10f5dee54455b560940cbe13c783bb122850b8235db9ba002e5789736c0a78,2025-07-02T17:40:51.843000
|
||||
@ -299701,7 +299712,7 @@ CVE-2025-6359,0,0,4c6b3a89015ba9383cd0f30179b8f5c4de98d22d2446e398ba201465b8f648
|
||||
CVE-2025-6360,0,0,cd47aa26c5ecbd48de29b33b9fb52e4ccfc785bed014ddf3d7b77089b3be3045,2025-06-26T15:35:49.490000
|
||||
CVE-2025-6361,0,0,69dfed4b6ee28f48f4584674801cbba5191a06ac465e39fa526b231064a630aa,2025-06-26T15:33:24.173000
|
||||
CVE-2025-6362,0,0,ed837364dd32376dc1cfdf8d173bec48f29c4e974fad65f0c43a106ea3f3894b,2025-06-26T15:30:56.573000
|
||||
CVE-2025-6363,0,1,a2092da75c1239a931ef4653704a6e5fd116fd3da1a6a5dbab6e327924c9b517,2025-07-02T18:56:45.850000
|
||||
CVE-2025-6363,0,0,a2092da75c1239a931ef4653704a6e5fd116fd3da1a6a5dbab6e327924c9b517,2025-07-02T18:56:45.850000
|
||||
CVE-2025-6364,0,0,be4a9d9271654f5f2f84bfeb78f337d623dc5f4d4aa408522a8f5cef88e4cf46,2025-06-26T15:28:57.953000
|
||||
CVE-2025-6365,0,0,6295553fcc137edc7fd1d78ad23ef5d3ffd4b910db1e6b10ac05939d4d2aa7b7,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6367,0,0,bb431b3b23d08c0eaf6da1f3ebee6c3fd3be15fbba72c9deb2782b2a49fd2678,2025-06-25T20:07:04.093000
|
||||
@ -299724,7 +299735,7 @@ CVE-2025-6399,0,0,1cc4662a693a649a9f407a6e359aaca52fe988ef413a3d7e4dcc120f8e622d
|
||||
CVE-2025-6400,0,0,b7834b01ffc76dd6d3a754915f4603e275b0aa9a7826af0f6615e59accec721d,2025-06-25T20:13:52.420000
|
||||
CVE-2025-6401,0,0,5cf4034351d983ee04de416dd673b8a67d86755e6334b356b4bd42e3cd39ff44,2025-06-25T20:14:01.440000
|
||||
CVE-2025-6402,0,0,9fcf059d93a615de79cdd3b74519970d6c73c80b6f86a7557b01dae4c88ad665,2025-06-25T20:14:57.620000
|
||||
CVE-2025-6403,0,1,007861183f6687f9c9a79ed265c27e5792ce1d4050de9b4571cc349ce6d48442,2025-07-02T18:56:36.940000
|
||||
CVE-2025-6403,0,0,007861183f6687f9c9a79ed265c27e5792ce1d4050de9b4571cc349ce6d48442,2025-07-02T18:56:36.940000
|
||||
CVE-2025-6404,0,0,f0c24c4f38cddef26208faf5fffbe2ab0f5998ff0d6d820bde73ac92320b2d1d,2025-06-24T19:33:00.033000
|
||||
CVE-2025-6405,0,0,892fa39ea25d0fceb083bcffe5177ecfbe7cb9096e1732c10483f9dee58de891,2025-06-24T19:16:58.253000
|
||||
CVE-2025-6406,0,0,2db684a16f4e28aaee6c2ddbef92630dbb3eb77bc0c3d22bde49da8224e470bc,2025-06-24T19:09:54.780000
|
||||
@ -299744,8 +299755,8 @@ CVE-2025-6419,0,0,3035370a10769e2b2e73a65b80dc5ee8dff995026db0f171ea652406a466dc
|
||||
CVE-2025-6420,0,0,9da6d53d9af64779bc447f9508c903bdaaf225194f0f56a912ef73481b378df7,2025-06-25T20:16:33.910000
|
||||
CVE-2025-6421,0,0,3169c91105fc051d7d3498fdef6562a4792481aab354e9c38ba63bbee575aace,2025-06-25T19:50:23.227000
|
||||
CVE-2025-6422,0,0,b5bb87a55ad52736bcc24be8713e2086821b4454f2e12e2c901389f24f632355,2025-06-25T19:49:55.057000
|
||||
CVE-2025-6424,0,1,0630cc84b8bc4e7e33d067590e034f02a6924c5d57890588fa2ad8820ff20d76,2025-07-02T18:11:28.190000
|
||||
CVE-2025-6425,0,0,4e6f88db6b79c26241a241a9d550f07188ec00afadd00edebbade3f226007ade,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6424,0,1,1e63adf2085979e6f873069e1f25dbb0b0c105bf60d8b2c9c09f02e2fce4efb4,2025-07-02T21:15:41.517000
|
||||
CVE-2025-6425,0,1,fa7cbed5e15a458f8c061c0de26eef9274c73cee36ee7c904693ded1ee8ed5d3,2025-07-02T21:15:41.670000
|
||||
CVE-2025-6426,0,0,130a7b245654ec700b52dd46d82662a731b3edeb808204b596d0afabe7d54c19,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6427,0,0,4fd1993d0ac7db16c968bc0eb6d4c8ebb892c92134eaab56fa8b779c043e4819,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6428,0,0,7e20fafdd0f36de7df3c59cde9ab6c32f568c3b0ee5af525470ee15553873cb8,2025-06-26T18:58:14.280000
|
||||
@ -299763,7 +299774,7 @@ CVE-2025-6443,0,0,234c9867f25d85d44fc506bbf75440155c7227dc8656924121bdfd34971fe1
|
||||
CVE-2025-6444,0,0,37705057457fe7179db85da84838ca3b56fe8ff63e8fcdb240ff0b993581938c,2025-06-26T18:57:43.670000
|
||||
CVE-2025-6445,0,0,f99b123e574fa4e59daea983acb9603622fc84af3252757bbdb2c3411966afec,2025-06-26T18:57:43.670000
|
||||
CVE-2025-6446,0,0,3600b7ecc27e2374ecf53656a0787999f8467a509514c75f50c495fcd2cddda1,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6447,0,1,cc4ebe57b30e1c29fcaaa701b4af675091d7dd851765dc9a4e58ac638527c45c,2025-07-02T18:24:21.523000
|
||||
CVE-2025-6447,0,0,cc4ebe57b30e1c29fcaaa701b4af675091d7dd851765dc9a4e58ac638527c45c,2025-07-02T18:24:21.523000
|
||||
CVE-2025-6448,0,0,5a0a3ee3d9f4340542c17b153af4b14314a4d2b8a9a47066bf08ed33363fd48a,2025-06-27T16:58:56.890000
|
||||
CVE-2025-6449,0,0,7b1cdc99f16ea600bb8750d2b6d082ed5fc5e753ed757d63ed225090755d0c8d,2025-06-27T16:59:11.193000
|
||||
CVE-2025-6450,0,0,08d07073e69e5d11efa66a56b9a50f9dbeb64a9dc7ddde1cd9563a1194634076,2025-06-27T16:59:51.930000
|
||||
@ -299860,7 +299871,7 @@ CVE-2025-6566,0,0,affe36b1d137bfbb12f982c13c1f5a07ceb2d195d5a802635829756c7ce109
|
||||
CVE-2025-6567,0,0,14a2a071a0db80b9d7b89b6f2738bddcf0dd4b44cc731a017fe21ac626971c3b,2025-06-27T16:48:39.390000
|
||||
CVE-2025-6568,0,0,a4540d7c2520ddc46cfd36d840f1c3e8a02d8624a298126e252d8f82930ddab7,2025-06-27T16:43:42.703000
|
||||
CVE-2025-6569,0,0,b43ce3c7fe66b936da7e514a37487a1a6951013e9fe5039c6b5b6ecfa14d08be,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6570,0,1,ef06c766ed700945b0765e92be8f2736de22bf32e8c65e68952ef9e654cea751,2025-07-02T18:24:35.030000
|
||||
CVE-2025-6570,0,0,ef06c766ed700945b0765e92be8f2736de22bf32e8c65e68952ef9e654cea751,2025-07-02T18:24:35.030000
|
||||
CVE-2025-6578,0,0,a99a9e383f515c0ced0d32ac616ed9a1ed673d64f2ed9cf85426f8c304e13984,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6579,0,0,3d6a7c5d0aad3e5c34ccac81738e70023b07954822764311505b50e140781b0c,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6580,0,0,14c9a21bff52d8562deb8a5ff102203adfe298df563381633ada51bbda9d23fc,2025-07-02T17:13:55.277000
|
||||
@ -299873,9 +299884,9 @@ CVE-2025-6604,0,0,96d4dfdd3e003ea63aa1e4bba18d79cbe7cea5abcd4dc3ee0391b4f83c2246
|
||||
CVE-2025-6605,0,0,3b1e9a90fef26eeec1cb23b63bf01d509568da803a212f4c59d24734ac4ce5b3,2025-07-02T16:34:13.343000
|
||||
CVE-2025-6606,0,0,95377cc9129cebdaa5f3a34697e72c1a75fc693f2083fa64b9fdb2a4aacce7cf,2025-07-02T16:23:44.753000
|
||||
CVE-2025-6607,0,0,5d2ed51fefc4ee7d5927f68a2b22555ed1cd7c54d232405f09ca25f5bc7c299d,2025-07-02T16:20:14.400000
|
||||
CVE-2025-6608,0,1,cb3f6b0bfbbd057d2a402b3531cf43c4915b6d50c6cd74b52259c17d2e8110d4,2025-07-02T18:24:47.807000
|
||||
CVE-2025-6609,0,1,8674c3684ac1cabbd631923e3d3e8db7a4e769694a18039c08e4cd4eb094bc34,2025-07-02T18:24:56.760000
|
||||
CVE-2025-6610,0,1,e0a0ac50a3ac5be67a10a2b3071a05d9af3fdc035a32bce33ddacfc6d4e7b2b8,2025-07-02T18:29:30.530000
|
||||
CVE-2025-6608,0,0,cb3f6b0bfbbd057d2a402b3531cf43c4915b6d50c6cd74b52259c17d2e8110d4,2025-07-02T18:24:47.807000
|
||||
CVE-2025-6609,0,0,8674c3684ac1cabbd631923e3d3e8db7a4e769694a18039c08e4cd4eb094bc34,2025-07-02T18:24:56.760000
|
||||
CVE-2025-6610,0,0,e0a0ac50a3ac5be67a10a2b3071a05d9af3fdc035a32bce33ddacfc6d4e7b2b8,2025-07-02T18:29:30.530000
|
||||
CVE-2025-6611,0,0,7995f1edc0c30b62b1f03248a1d743ad11e83dfc62a7cad6296156bfe59bddfa,2025-06-27T18:35:43.527000
|
||||
CVE-2025-6612,0,0,07b59bf2a678137703650a46707e7aec19f5fdbc648bdd54e33c6dd2e18a3de4,2025-06-27T18:22:07.427000
|
||||
CVE-2025-6613,0,0,c2bb8cd99265a5034c5ee33c32e611c24a3a55d21cdfdfeada424dd85f68d2a1,2025-07-02T16:43:35.053000
|
||||
@ -300076,7 +300087,7 @@ CVE-2025-6937,0,0,b10d8c1265117b053b6599e6b544c7c61d2c978d507bac9b95b840b3f696bf
|
||||
CVE-2025-6938,0,0,4fd9227ca597d68f11aeeaf0509beaf1b4bac7f33c7e6cf52ec4920ff118ddaa,2025-07-01T14:15:42.597000
|
||||
CVE-2025-6939,0,0,22776f4e1566605da22c764584fd19e7bf5c94050807d3717fc162d620a969e9,2025-07-01T14:15:42.923000
|
||||
CVE-2025-6940,0,0,692dc02623b91f77fa8a61f1ce9db90633920d7bc4914267ab9387b6f19f68ff,2025-07-01T14:15:43.063000
|
||||
CVE-2025-6942,0,0,dae50f0c834a45857e9193e44500f4fb13c41056df3c36a0f1feeabe6f40778b,2025-07-02T16:15:29.883000
|
||||
CVE-2025-6942,0,1,83a5e5e1ce50f3aa56fb8b5a20dcb89667587d5e1650ef446dc9762e08db271e,2025-07-02T20:15:31.957000
|
||||
CVE-2025-6943,0,0,47ec0034a5e60779e756f274ba911165a53ed9b90dca2c4c369b8c069340ea4a,2025-07-02T16:15:30.060000
|
||||
CVE-2025-6951,0,0,bc0426adb285583bec2a19fe1efc81ab85a4e6e2c93ef1f9996dfc34d21d6e46,2025-07-01T12:15:24.123000
|
||||
CVE-2025-6952,0,0,ef1bec1b6180d9fb26ad38c0771f751baec562e5a678d8e9b2113976cfeed9a0,2025-07-01T12:15:24.343000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user