Auto-Update: 2025-07-08T14:00:18.174739+00:00

This commit is contained in:
cad-safe-bot 2025-07-08 14:03:55 +00:00
parent f9303675b9
commit c71e9db465
55 changed files with 8956 additions and 175 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33939",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-05-19T16:15:25.820",
"lastModified": "2025-05-21T20:25:33.823",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-07-08T13:34:00.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/learning-management-system/vulnerability/wordpress-lms-by-masteriyo-plugin-1-7-3-broken-authentication-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themegrill:masteriyo:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "1.7.4",
"matchCriteriaId": "DC7285CE-AA23-4379-AE31-DC469A977C99"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/learning-management-system/vulnerability/wordpress-lms-by-masteriyo-plugin-1-7-3-broken-authentication-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-53009",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:28.460",
"lastModified": "2025-07-08T13:15:28.460",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while operating the mailbox in Automotive."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21422",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:29.193",
"lastModified": "2025-07-08T13:15:29.193",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cryptographic issue while processing crypto API calls, missing checks may lead to corrupted key usage or IV reuses."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-310"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21426",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:29.380",
"lastModified": "2025-07-08T13:15:29.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing camera TPG write request."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21427",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:29.533",
"lastModified": "2025-07-08T13:15:29.533",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information disclosure while decoding this RTP packet Payload when UE receives the RTP packet from the network."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21432",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:29.703",
"lastModified": "2025-07-08T13:15:29.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while retrieving the CBOR data from TA."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21433",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:29.890",
"lastModified": "2025-07-08T13:15:29.890",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS when importing a PKCS#8-encoded RSA private key with a zero-sized modulus."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21444",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:30.073",
"lastModified": "2025-07-08T13:15:30.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while copying the result to the transmission queue in EMAC."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21445",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:30.227",
"lastModified": "2025-07-08T13:15:30.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while copying the result to the transmission queue which is shared between the virtual machine and the host."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21446",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:30.387",
"lastModified": "2025-07-08T13:15:30.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS may occur when processing vendor-specific information elements while parsing a WLAN frame for BTM requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21449",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:30.567",
"lastModified": "2025-07-08T13:15:30.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS may occur while processing malformed length field in SSID IEs."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21450",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:30.740",
"lastModified": "2025-07-08T13:15:30.740",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cryptographic issue occurs due to use of insecure connection method while downloading."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21454",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:30.907",
"lastModified": "2025-07-08T13:15:30.907",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while processing received beacon frame."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21466",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:31.080",
"lastModified": "2025-07-08T13:15:31.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing a private escape command in an event trigger."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27042",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:31.240",
"lastModified": "2025-07-08T13:15:31.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing video packets received from video firmware."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-131"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27043",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:31.430",
"lastModified": "2025-07-08T13:15:31.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing manipulated payload in video firmware."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27044",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:31.603",
"lastModified": "2025-07-08T13:15:31.603",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while executing timestamp video decode command with large input values."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27046",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:31.760",
"lastModified": "2025-07-08T13:15:31.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing multiple simultaneous escape calls."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27047",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:31.913",
"lastModified": "2025-07-08T13:15:31.913",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing the TESTPATTERNCONFIG escape path."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27050",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:32.070",
"lastModified": "2025-07-08T13:15:32.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing event close when client process terminates abruptly."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27051",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:32.233",
"lastModified": "2025-07-08T13:15:32.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing command message in WLAN Host."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27052",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:32.397",
"lastModified": "2025-07-08T13:15:32.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing data packets in diag received from Unix clients."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27055",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:32.570",
"lastModified": "2025-07-08T13:15:32.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption during the image encoding process."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27056",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:32.730",
"lastModified": "2025-07-08T13:15:32.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption during sub-system restart while processing clean-up to free up resources."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27057",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:32.910",
"lastModified": "2025-07-08T13:15:32.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while handling beacon frames with invalid IE header length."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27058",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:33.153",
"lastModified": "2025-07-08T13:15:33.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing packet data with exceedingly large packet."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27061",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:33.447",
"lastModified": "2025-07-08T13:15:33.447",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption whhile handling the subsystem failure memory during the parsing of video packets received from the video firmware."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-32896",
"sourceIdentifier": "security@apache.org",
"published": "2025-06-19T11:15:24.190",
"lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-07-08T13:05:21.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,49 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/apache/seatunnel/pull/9010",
"source": "security@apache.org"
},
"nodes": [
{
"url": "https://lists.apache.org/thread/qvh3zyt1jr25rgvw955rb8qjrnbxfro9",
"source": "security@apache.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/04/12/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:seatunnel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3.1",
"versionEndExcluding": "2.3.11",
"matchCriteriaId": "B8B6B47C-99DA-4AB2-B296-569463F6C0D2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/apache/seatunnel/pull/9010",
"source": "security@apache.org",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://lists.apache.org/thread/qvh3zyt1jr25rgvw955rb8qjrnbxfro9",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/04/12/1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-35003",
"sourceIdentifier": "security@apache.org",
"published": "2025-05-26T10:15:19.750",
"lastModified": "2025-05-28T15:01:30.720",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-07-08T13:17:42.373",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -55,18 +55,48 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/apache/nuttx/pull/16179",
"source": "security@apache.org"
},
"nodes": [
{
"url": "https://lists.apache.org/thread/k4xzz3jhkx48zxw9vwmqrmm4hmg78vsj",
"source": "security@apache.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/05/26/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:nuttx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.25",
"versionEndExcluding": "12.9.0",
"matchCriteriaId": "054E1F6D-1377-4794-923C-1C52AD39C83F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/apache/nuttx/pull/16179",
"source": "security@apache.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
},
{
"url": "https://lists.apache.org/thread/k4xzz3jhkx48zxw9vwmqrmm4hmg78vsj",
"source": "security@apache.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/05/26/1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40711",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:21.347",
"lastModified": "2025-07-08T12:15:21.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the id_concesion parameter in /<Client>FacturaE/VerFacturaPDF."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-quiterweb-autoweb-quiter",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40712",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:22.080",
"lastModified": "2025-07-08T12:15:22.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the id_concesion parameter in /<Client>FacturaE/DescargarFactura."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-quiterweb-autoweb-quiter",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40713",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:22.230",
"lastModified": "2025-07-08T12:15:22.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the campo parameter in/<Client>FacturaE/BusquedasFacturasSesion."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-quiterweb-autoweb-quiter",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40714",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:22.367",
"lastModified": "2025-07-08T12:15:22.367",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the campo id_factura in\u00a0/<Client>FacturaE/listado_facturas_ficha.jsp."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-quiterweb-autoweb-quiter",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40715",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:22.513",
"lastModified": "2025-07-08T12:15:22.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the campo mensaje in\u00a0/QISClient/api/v1/sucesospaginas."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-quiterweb-autoweb-quiter",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40716",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:22.660",
"lastModified": "2025-07-08T12:15:22.660",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the suceso.contenido\u00a0mensaje in\u00a0/QMSCliente/Sucesos.action."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-quiterweb-autoweb-quiter",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40717",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:22.803",
"lastModified": "2025-07-08T12:15:22.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the pagina.filter.categoria\u00a0mensaje in\u00a0/QuiterGatewayWeb/api/v1/sucesospagina."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-quiterweb-autoweb-quiter",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40718",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:22.947",
"lastModified": "2025-07-08T12:15:22.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper error handling vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to send malformed payloads to generate error messages containing sensitive information."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-quiterweb-autoweb-quiter",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40719",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:23.090",
"lastModified": "2025-07-08T12:15:23.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Reflected Cross-site Scripting (XSS) vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending a malicious URL trhough the id_concesion parameter in /<Client>FacturaE/VerFacturaPDF."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-quiterweb-autoweb-quiter",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40720",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:23.243",
"lastModified": "2025-07-08T12:15:23.243",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Reflected Cross-site Scripting (XSS) vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending a malicious URL trhough the campo parameter in /<Client>FacturaE/VerFacturaPDF."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-quiterweb-autoweb-quiter",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40721",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:23.397",
"lastModified": "2025-07-08T12:15:23.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Reflected Cross-site Scripting (XSS) vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending a malicious URL trhough the id_factura parameter in /<Client>FacturaE/listado_facturas_ficha.jsp."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-quiterweb-autoweb-quiter",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-47568",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-05-23T13:15:39.973",
"lastModified": "2025-05-23T15:54:42.643",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-07-08T13:24:03.987",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/dzs-zoomsounds/vulnerability/wordpress-zoomsounds-plugin-6-91-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digitalzoomstudio:zoomsounds:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "6.91",
"matchCriteriaId": "86208A5D-8246-4AAE-B510-03C5D56BC158"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/dzs-zoomsounds/vulnerability/wordpress-zoomsounds-plugin-6-91-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-48274",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:44.700",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-07-08T13:12:31.383",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-job-portal/vulnerability/wordpress-wp-job-portal-2-3-2-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpjobportal:wp_job_portal:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3.3",
"matchCriteriaId": "EEF4383E-9AFB-4394-A6AC-4012ECB81089"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-job-portal/vulnerability/wordpress-wp-job-portal-2-3-2-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,108 @@
{
"id": "CVE-2025-50130",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-07-08T13:15:33.710",
"lastModified": "2025-07-08T13:15:33.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A heap-based buffer overflow vulnerability exists in VS6Sim.exe contained in V-SFT and TELLUS provided by FUJI ELECTRIC CO., LTD.\r\nOpening V9 files or X1 files specially crafted by an attacker on the affected product may lead to arbitrary code execution."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU94011267/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://monitouch.fujielectric.com/site/download-e/03tellus_inf/Search.php",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6459",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-02T04:15:59.413",
"lastModified": "2025-07-03T15:13:53.147",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-08T13:55:50.920",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://codecanyon.net/item/ads-pro-plugin-multipurpose-wordpress-advertising-manager/10275010",
"source": "security@wordfence.com"
},
"nodes": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22fa8290-ebab-4fa4-bcba-0053c3b79f76?source=cve",
"source": "security@wordfence.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:scripteo:ads_pro:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.89",
"matchCriteriaId": "1F5A3BA9-1E6E-4BE0-B4BA-F69EC84C4BF5"
}
]
}
]
}
],
"references": [
{
"url": "https://codecanyon.net/item/ads-pro-plugin-multipurpose-wordpress-advertising-manager/10275010",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22fa8290-ebab-4fa4-bcba-0053c3b79f76?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6686",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-02T04:16:00.243",
"lastModified": "2025-07-03T15:13:53.147",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-08T13:51:15.403",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://wordpress.org/plugins/magic-buttons-for-elementor/#developers",
"source": "security@wordfence.com"
},
"nodes": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4379f2c5-3533-45f7-a4ef-0b3320eb5d04?source=cve",
"source": "security@wordfence.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pwrplugins:magic_buttons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "6934F619-5E41-41B6-94BE-F9FD1AEC7321"
}
]
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/magic-buttons-for-elementor/#developers",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4379f2c5-3533-45f7-a4ef-0b3320eb5d04?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6687",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-02T04:16:01.167",
"lastModified": "2025-07-03T15:13:53.147",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-07-08T13:46:45.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,18 +71,45 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://plugins.svn.wordpress.org/magic-buttons-for-elementor/trunk/magic_buttons_shortcodes.php",
"source": "security@wordfence.com"
},
"nodes": [
{
"url": "https://wordpress.org/plugins/magic-buttons-for-elementor/#developers",
"source": "security@wordfence.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/25eb1c89-0121-4ea5-a29a-43ec98c468ee?source=cve",
"source": "security@wordfence.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:pwrplugins:magic_buttons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "6934F619-5E41-41B6-94BE-F9FD1AEC7321"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.svn.wordpress.org/magic-buttons-for-elementor/trunk/magic_buttons_shortcodes.php",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://wordpress.org/plugins/magic-buttons-for-elementor/#developers",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/25eb1c89-0121-4ea5-a29a-43ec98c468ee?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-7176",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T12:15:23.560",
"lastModified": "2025-07-08T12:15:23.560",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Hospital Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file view-medhistory.php. The manipulation of the argument viewid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/y2xsec324/cve/issues/9",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315115",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315115",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.606776",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-7177",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T12:15:23.773",
"lastModified": "2025-07-08T12:15:23.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Car Washing Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/editcar-washpoint.php. The manipulation of the argument wpid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"baseScore": 5.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/y2xsec324/cve/issues/10",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315116",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315116",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.606785",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-7178",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T13:15:33.940",
"lastModified": "2025-07-08T13:15:33.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in code-projects Food Distributor Site 1.0. This affects an unknown part of the file /admin/login.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/kn1g78/cve/blob/main/food.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315117",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315117",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.606824",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-7179",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T13:15:34.487",
"lastModified": "2025-07-08T13:15:34.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in code-projects Library System 1.0. This vulnerability affects unknown code of the file /add-teacher.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/kobeforever26/cve/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315118",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315118",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.606912",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-07-08T12:00:19.259441+00:00
2025-07-08T14:00:18.174739+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-07-08T11:35:12.807000+00:00
2025-07-08T13:57:47.713000+00:00
```
### Last Data Feed Release
@ -33,69 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
300841
300883
```
### CVEs added in the last Commit
Recently added CVEs: `38`
Recently added CVEs: `42`
- [CVE-2025-21005](CVE-2025/CVE-2025-210xx/CVE-2025-21005.json) (`2025-07-08T11:15:26.043`)
- [CVE-2025-21006](CVE-2025/CVE-2025-210xx/CVE-2025-21006.json) (`2025-07-08T11:15:26.177`)
- [CVE-2025-21007](CVE-2025/CVE-2025-210xx/CVE-2025-21007.json) (`2025-07-08T11:15:26.300`)
- [CVE-2025-21008](CVE-2025/CVE-2025-210xx/CVE-2025-21008.json) (`2025-07-08T11:15:26.433`)
- [CVE-2025-21009](CVE-2025/CVE-2025-210xx/CVE-2025-21009.json) (`2025-07-08T11:15:26.557`)
- [CVE-2025-23364](CVE-2025/CVE-2025-233xx/CVE-2025-23364.json) (`2025-07-08T11:15:26.683`)
- [CVE-2025-23365](CVE-2025/CVE-2025-233xx/CVE-2025-23365.json) (`2025-07-08T11:15:26.860`)
- [CVE-2025-27127](CVE-2025/CVE-2025-271xx/CVE-2025-27127.json) (`2025-07-08T11:15:27.070`)
- [CVE-2025-40593](CVE-2025/CVE-2025-405xx/CVE-2025-40593.json) (`2025-07-08T11:15:29.473`)
- [CVE-2025-40735](CVE-2025/CVE-2025-407xx/CVE-2025-40735.json) (`2025-07-08T11:15:29.657`)
- [CVE-2025-40736](CVE-2025/CVE-2025-407xx/CVE-2025-40736.json) (`2025-07-08T11:15:29.837`)
- [CVE-2025-40737](CVE-2025/CVE-2025-407xx/CVE-2025-40737.json) (`2025-07-08T11:15:30.007`)
- [CVE-2025-40738](CVE-2025/CVE-2025-407xx/CVE-2025-40738.json) (`2025-07-08T11:15:30.190`)
- [CVE-2025-40739](CVE-2025/CVE-2025-407xx/CVE-2025-40739.json) (`2025-07-08T11:15:30.380`)
- [CVE-2025-40740](CVE-2025/CVE-2025-407xx/CVE-2025-40740.json) (`2025-07-08T11:15:30.560`)
- [CVE-2025-40741](CVE-2025/CVE-2025-407xx/CVE-2025-40741.json) (`2025-07-08T11:15:30.747`)
- [CVE-2025-40742](CVE-2025/CVE-2025-407xx/CVE-2025-40742.json) (`2025-07-08T11:15:30.923`)
- [CVE-2025-41222](CVE-2025/CVE-2025-412xx/CVE-2025-41222.json) (`2025-07-08T11:15:31.117`)
- [CVE-2025-41223](CVE-2025/CVE-2025-412xx/CVE-2025-41223.json) (`2025-07-08T11:15:31.327`)
- [CVE-2025-41224](CVE-2025/CVE-2025-412xx/CVE-2025-41224.json) (`2025-07-08T11:15:31.527`)
- [CVE-2025-6744](CVE-2025/CVE-2025-67xx/CVE-2025-6744.json) (`2025-07-08T10:15:22.947`)
- [CVE-2025-7172](CVE-2025/CVE-2025-71xx/CVE-2025-7172.json) (`2025-07-08T10:15:23.140`)
- [CVE-2025-7173](CVE-2025/CVE-2025-71xx/CVE-2025-7173.json) (`2025-07-08T10:15:23.370`)
- [CVE-2025-7174](CVE-2025/CVE-2025-71xx/CVE-2025-7174.json) (`2025-07-08T11:15:31.717`)
- [CVE-2025-7175](CVE-2025/CVE-2025-71xx/CVE-2025-7175.json) (`2025-07-08T11:15:31.920`)
- [CVE-2025-27047](CVE-2025/CVE-2025-270xx/CVE-2025-27047.json) (`2025-07-08T13:15:31.913`)
- [CVE-2025-27050](CVE-2025/CVE-2025-270xx/CVE-2025-27050.json) (`2025-07-08T13:15:32.070`)
- [CVE-2025-27051](CVE-2025/CVE-2025-270xx/CVE-2025-27051.json) (`2025-07-08T13:15:32.233`)
- [CVE-2025-27052](CVE-2025/CVE-2025-270xx/CVE-2025-27052.json) (`2025-07-08T13:15:32.397`)
- [CVE-2025-27055](CVE-2025/CVE-2025-270xx/CVE-2025-27055.json) (`2025-07-08T13:15:32.570`)
- [CVE-2025-27056](CVE-2025/CVE-2025-270xx/CVE-2025-27056.json) (`2025-07-08T13:15:32.730`)
- [CVE-2025-27057](CVE-2025/CVE-2025-270xx/CVE-2025-27057.json) (`2025-07-08T13:15:32.910`)
- [CVE-2025-27058](CVE-2025/CVE-2025-270xx/CVE-2025-27058.json) (`2025-07-08T13:15:33.153`)
- [CVE-2025-27061](CVE-2025/CVE-2025-270xx/CVE-2025-27061.json) (`2025-07-08T13:15:33.447`)
- [CVE-2025-40711](CVE-2025/CVE-2025-407xx/CVE-2025-40711.json) (`2025-07-08T12:15:21.347`)
- [CVE-2025-40712](CVE-2025/CVE-2025-407xx/CVE-2025-40712.json) (`2025-07-08T12:15:22.080`)
- [CVE-2025-40713](CVE-2025/CVE-2025-407xx/CVE-2025-40713.json) (`2025-07-08T12:15:22.230`)
- [CVE-2025-40714](CVE-2025/CVE-2025-407xx/CVE-2025-40714.json) (`2025-07-08T12:15:22.367`)
- [CVE-2025-40715](CVE-2025/CVE-2025-407xx/CVE-2025-40715.json) (`2025-07-08T12:15:22.513`)
- [CVE-2025-40716](CVE-2025/CVE-2025-407xx/CVE-2025-40716.json) (`2025-07-08T12:15:22.660`)
- [CVE-2025-40717](CVE-2025/CVE-2025-407xx/CVE-2025-40717.json) (`2025-07-08T12:15:22.803`)
- [CVE-2025-40718](CVE-2025/CVE-2025-407xx/CVE-2025-40718.json) (`2025-07-08T12:15:22.947`)
- [CVE-2025-40719](CVE-2025/CVE-2025-407xx/CVE-2025-40719.json) (`2025-07-08T12:15:23.090`)
- [CVE-2025-40720](CVE-2025/CVE-2025-407xx/CVE-2025-40720.json) (`2025-07-08T12:15:23.243`)
- [CVE-2025-40721](CVE-2025/CVE-2025-407xx/CVE-2025-40721.json) (`2025-07-08T12:15:23.397`)
- [CVE-2025-50130](CVE-2025/CVE-2025-501xx/CVE-2025-50130.json) (`2025-07-08T13:15:33.710`)
- [CVE-2025-7176](CVE-2025/CVE-2025-71xx/CVE-2025-7176.json) (`2025-07-08T12:15:23.560`)
- [CVE-2025-7177](CVE-2025/CVE-2025-71xx/CVE-2025-7177.json) (`2025-07-08T12:15:23.773`)
- [CVE-2025-7178](CVE-2025/CVE-2025-71xx/CVE-2025-7178.json) (`2025-07-08T13:15:33.940`)
- [CVE-2025-7179](CVE-2025/CVE-2025-71xx/CVE-2025-7179.json) (`2025-07-08T13:15:34.487`)
### CVEs modified in the last Commit
Recently modified CVEs: `25`
Recently modified CVEs: `11`
- [CVE-2019-19300](CVE-2019/CVE-2019-193xx/CVE-2019-19300.json) (`2025-07-08T11:15:22.140`)
- [CVE-2021-22145](CVE-2021/CVE-2021-221xx/CVE-2021-22145.json) (`2025-07-08T11:15:23.120`)
- [CVE-2024-54092](CVE-2024/CVE-2024-540xx/CVE-2024-54092.json) (`2025-07-08T11:15:24.580`)
- [CVE-2025-30174](CVE-2025/CVE-2025-301xx/CVE-2025-30174.json) (`2025-07-08T11:15:27.257`)
- [CVE-2025-30175](CVE-2025/CVE-2025-301xx/CVE-2025-30175.json) (`2025-07-08T11:15:27.393`)
- [CVE-2025-30176](CVE-2025/CVE-2025-301xx/CVE-2025-30176.json) (`2025-07-08T11:15:27.520`)
- [CVE-2025-40572](CVE-2025/CVE-2025-405xx/CVE-2025-40572.json) (`2025-07-08T11:15:27.650`)
- [CVE-2025-40573](CVE-2025/CVE-2025-405xx/CVE-2025-40573.json) (`2025-07-08T11:15:27.797`)
- [CVE-2025-40574](CVE-2025/CVE-2025-405xx/CVE-2025-40574.json) (`2025-07-08T11:15:27.940`)
- [CVE-2025-40575](CVE-2025/CVE-2025-405xx/CVE-2025-40575.json) (`2025-07-08T11:15:28.083`)
- [CVE-2025-40576](CVE-2025/CVE-2025-405xx/CVE-2025-40576.json) (`2025-07-08T11:15:28.267`)
- [CVE-2025-40577](CVE-2025/CVE-2025-405xx/CVE-2025-40577.json) (`2025-07-08T11:15:28.417`)
- [CVE-2025-40579](CVE-2025/CVE-2025-405xx/CVE-2025-40579.json) (`2025-07-08T11:15:28.553`)
- [CVE-2025-40580](CVE-2025/CVE-2025-405xx/CVE-2025-40580.json) (`2025-07-08T11:15:28.717`)
- [CVE-2025-40592](CVE-2025/CVE-2025-405xx/CVE-2025-40592.json) (`2025-07-08T11:15:29.330`)
- [CVE-2025-42967](CVE-2025/CVE-2025-429xx/CVE-2025-42967.json) (`2025-07-08T10:15:22.040`)
- [CVE-2025-5275](CVE-2025/CVE-2025-52xx/CVE-2025-5275.json) (`2025-07-08T11:32:22.210`)
- [CVE-2025-5338](CVE-2025/CVE-2025-53xx/CVE-2025-5338.json) (`2025-07-08T11:34:52.400`)
- [CVE-2025-5842](CVE-2025/CVE-2025-58xx/CVE-2025-5842.json) (`2025-07-08T11:35:12.807`)
- [CVE-2025-5929](CVE-2025/CVE-2025-59xx/CVE-2025-5929.json) (`2025-07-08T11:32:50.840`)
- [CVE-2025-6212](CVE-2025/CVE-2025-62xx/CVE-2025-6212.json) (`2025-07-08T11:35:01.817`)
- [CVE-2025-6290](CVE-2025/CVE-2025-62xx/CVE-2025-6290.json) (`2025-07-08T11:32:32.773`)
- [CVE-2025-6383](CVE-2025/CVE-2025-63xx/CVE-2025-6383.json) (`2025-07-08T11:31:13.823`)
- [CVE-2025-6537](CVE-2025/CVE-2025-65xx/CVE-2025-6537.json) (`2025-07-08T11:34:13.310`)
- [CVE-2025-6546](CVE-2025/CVE-2025-65xx/CVE-2025-6546.json) (`2025-07-08T11:34:27.020`)
- [CVE-2024-33939](CVE-2024/CVE-2024-339xx/CVE-2024-33939.json) (`2025-07-08T13:34:00.427`)
- [CVE-2025-20197](CVE-2025/CVE-2025-201xx/CVE-2025-20197.json) (`2025-07-08T13:57:47.713`)
- [CVE-2025-20198](CVE-2025/CVE-2025-201xx/CVE-2025-20198.json) (`2025-07-08T13:56:57.540`)
- [CVE-2025-20199](CVE-2025/CVE-2025-201xx/CVE-2025-20199.json) (`2025-07-08T13:48:55.337`)
- [CVE-2025-32896](CVE-2025/CVE-2025-328xx/CVE-2025-32896.json) (`2025-07-08T13:05:21.833`)
- [CVE-2025-35003](CVE-2025/CVE-2025-350xx/CVE-2025-35003.json) (`2025-07-08T13:17:42.373`)
- [CVE-2025-47568](CVE-2025/CVE-2025-475xx/CVE-2025-47568.json) (`2025-07-08T13:24:03.987`)
- [CVE-2025-48274](CVE-2025/CVE-2025-482xx/CVE-2025-48274.json) (`2025-07-08T13:12:31.383`)
- [CVE-2025-6459](CVE-2025/CVE-2025-64xx/CVE-2025-6459.json) (`2025-07-08T13:55:50.920`)
- [CVE-2025-6686](CVE-2025/CVE-2025-66xx/CVE-2025-6686.json) (`2025-07-08T13:51:15.403`)
- [CVE-2025-6687](CVE-2025/CVE-2025-66xx/CVE-2025-6687.json) (`2025-07-08T13:46:45.833`)
## Download and Usage

View File

@ -136572,7 +136572,7 @@ CVE-2019-19297,0,0,47ac26a22676d548b4ee448eadae7e8cafbacbca70c7f4f2e645e9eeddabf
CVE-2019-19298,0,0,a9c04ecd2cf97f1b1fe3d703e20c5a4af9b269b861120b09365a33264fd2f0a8,2024-11-21T04:34:31.407000
CVE-2019-19299,0,0,03c1fc8ff7f137b2bf17fd6b64b9503b67c5be6439d6858d5e05e7a692e6c997,2024-11-21T04:34:31.543000
CVE-2019-1930,0,0,91d07001df99cb281a09ff5bb7b8c13bc4ad3a2dd14c0a871ce71c446ef21457,2024-11-26T16:09:02.407000
CVE-2019-19300,0,1,b61066dc1778b8ea6b87871a12216dec666dadc2171a6ddc11a3d677ae24e44b,2025-07-08T11:15:22.140000
CVE-2019-19300,0,0,b61066dc1778b8ea6b87871a12216dec666dadc2171a6ddc11a3d677ae24e44b,2025-07-08T11:15:22.140000
CVE-2019-19301,0,0,d9c319366c48f9b5514cdffb6166ccacebf48d55a4c1972c50093faf167261be,2024-11-21T04:34:31.900000
CVE-2019-19306,0,0,acda1633508bfc6a9da66d4fd04417cc64b1455ecf1cfbaefaac0ce8b8d62518,2024-11-21T04:34:32.117000
CVE-2019-19307,0,0,43e55d8e7e02dfad2951d487568a759f3b9e93b3cc679f9192a5f8ae891c2e1a,2024-11-21T04:34:32.273000
@ -168722,7 +168722,7 @@ CVE-2021-22141,0,0,ea6660cabcdf71676a5395cd83446fac4adf491e804ec22ec83a72cdb949b
CVE-2021-22142,0,0,d7a3445a627a6eb5df7fe1cefecd4020e9d473a93de608568f57b3c9650f7d3d,2024-11-21T05:49:35.293000
CVE-2021-22143,0,0,58500de7280243b58e912d3e21e7e20eba05593ca80bca91b023cd8c32a2a0f7,2024-11-21T05:49:35.437000
CVE-2021-22144,0,0,e66f081ce4c3321f44d046b70596b8eb483e8f2465f1c337c9478cf0c751668f,2024-11-21T05:49:35.577000
CVE-2021-22145,0,1,21a028ad378b359524b20e4689da4d6c6a9b87751fe68f3f5b61b66a29b1da41,2025-07-08T11:15:23.120000
CVE-2021-22145,0,0,21a028ad378b359524b20e4689da4d6c6a9b87751fe68f3f5b61b66a29b1da41,2025-07-08T11:15:23.120000
CVE-2021-22146,0,0,4640073c1d142ce294f3a6d232deaca06e8e31a3f9583baa67f2bb157da24dfa,2024-11-21T05:49:35.827000
CVE-2021-22147,0,0,5c90adb0e950610c69746d52a8b2b0430b1b8184a59467ad5fadd5f9b2c17a99,2024-11-21T05:49:35.947000
CVE-2021-22148,0,0,7e6e3029e5e4bc1328b3386b89a5288c6bf978565cb8b9661acad592a3fa35d4,2024-11-21T05:49:36.067000
@ -241741,7 +241741,7 @@ CVE-2023-52232,0,0,25816897725e03b2601314f3c9389a2be7d7e262fad693583de240b223ce3
CVE-2023-52233,0,0,877bd66a154fad8c345ab7555640a1d78deadfb819ba5856bea098cb5a886a2f,2025-06-04T15:05:06.540000
CVE-2023-52234,0,0,6984b41c87b7f2d15b820bc3d8db1038b20cc6bb55fdedabf1511bd51365f7a8,2025-03-10T15:52:35.053000
CVE-2023-52235,0,0,4f1e2f38c8f4b55ae6d956cbec2c5763374a4cbfb41d1307d39af61dd9437d7b,2025-03-13T20:15:16.470000
CVE-2023-52236,1,1,0e57b3089b13a39d4da9955b8213db71e16e528a891828e0afbc729b48690e1e,2025-07-08T11:15:23.750000
CVE-2023-52236,0,0,0e57b3089b13a39d4da9955b8213db71e16e528a891828e0afbc729b48690e1e,2025-07-08T11:15:23.750000
CVE-2023-52237,0,0,ec00cd5043a647583ae661e798908ac8aae8b8c80323fd5ded69d2879fe6e25e,2024-11-21T08:39:27.630000
CVE-2023-52238,0,0,8b91affaee9fe41fbb00a1a88e4e12c3ca7d1995b7642fbf22e7576aa0f87b25,2024-11-21T08:39:27.907000
CVE-2023-52239,0,0,c28a063b7fa56cbc60e5bf7e799f7020ddac741446ed7e5a20eb359aae46640a,2025-06-17T16:15:28.247000
@ -259334,8 +259334,8 @@ CVE-2024-3185,0,0,1c67103dbf88a510a8278b98b5d99e3057e7b8f69cfef404fe34f189a7ca07
CVE-2024-31850,0,0,3cf28f7334b4de0542e5428e9e2adb543da6f22147b194d3fb612012e6aa1a98,2024-11-21T09:14:01.337000
CVE-2024-31851,0,0,e45f336d82b2d3d9adbf3a8bac0b970c5266b3cdbe6939aeace9733f93a83fdc,2024-11-21T09:14:01.463000
CVE-2024-31852,0,0,ba9051f6bc6d3b5aba3b4d7f2092d68c6a17eb29edddb549caa75380b0b647ce,2024-12-04T21:15:23.467000
CVE-2024-31853,1,1,cab61e3b35618d5f631c7bed03e2310289877bbfca4ff8110baadcdd5c7d0736,2025-07-08T11:15:23.997000
CVE-2024-31854,1,1,52b2b00eb942b78651056a3a4cf01c91493b53456298d8d1b9031cbe0319ba90,2025-07-08T11:15:24.180000
CVE-2024-31853,0,0,cab61e3b35618d5f631c7bed03e2310289877bbfca4ff8110baadcdd5c7d0736,2025-07-08T11:15:23.997000
CVE-2024-31854,0,0,52b2b00eb942b78651056a3a4cf01c91493b53456298d8d1b9031cbe0319ba90,2025-07-08T11:15:24.180000
CVE-2024-31856,0,0,b0ae28b2cf04a3d57b1162c504882bace010687db30d97cb579a93bed060de40,2024-11-21T09:14:01.757000
CVE-2024-31857,0,0,20dfb12af53dc65b264ed20f498f15824869d4ee981fc0225fa3ba43b44587e3,2025-04-04T13:03:08.680000
CVE-2024-31858,0,0,fb7ea5972ca29ef5dbb01c13ffa0f30c065ee6f5e39915061b97fa7a1c736b37,2025-02-12T22:15:33.340000
@ -260936,7 +260936,7 @@ CVE-2024-33935,0,0,4e9fcfd5c03335e24e5331d9d0bf73e7f2bdf4c459bb6eb6f4eb480e76f14
CVE-2024-33936,0,0,45e042c611a0630301bf70e4cde1747e0f9874460fe3624c2a7ae9efdfa67a6a,2024-11-21T09:17:46.090000
CVE-2024-33937,0,0,e8fd6f2d795efd401ea593d544042a51902a92e811ddae6d455aceaed01249e4,2024-11-21T09:17:46.207000
CVE-2024-33938,0,0,19fe72340083f579ae857088add70a97369c30213072b7b9aede4eeb720cdc87,2024-11-21T09:17:46.313000
CVE-2024-33939,0,0,54b08e9449b076f612fd4e6c514fc727b80c38566a59bc6c99f8cbc85b461249,2025-05-21T20:25:33.823000
CVE-2024-33939,0,1,6f90b7f75cd6d7a3db31dbf7dca871e41f742ceac054f776344bc700e950f475,2025-07-08T13:34:00.427000
CVE-2024-33940,0,0,85f7956223df208f5f8513ae86d430b54b674d910283b80b719f7d48c55ea556,2024-11-21T09:17:46.427000
CVE-2024-33941,0,0,ac763d1eb77a8d813e85373ef3ca1694fb01c21579fafea3334ce9140ff31c85,2024-11-21T09:17:46.540000
CVE-2024-33942,0,0,954e8767fb2e885cb5b7574f4c2cb9d92c320a121654171c00d189d68c36bd69,2024-11-21T09:17:46.650000
@ -275618,6 +275618,7 @@ CVE-2024-53005,0,0,3dc6e47151847664b25c50b95732d760b83155ba3d3a6b0bd92fd6b07af51
CVE-2024-53006,0,0,9319c5ef0bd10ec00679ded4a4ad11e13d0be340e712e774cbfbbe0a5382401c,2024-12-13T18:46:25.473000
CVE-2024-53007,0,0,7ba22a6b4032cf25f35c1ef00a1f90b930f980bf5515302c33e7724c5430a878,2025-01-31T08:15:08.157000
CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce6966412829a,2024-11-28T03:15:16.363000
CVE-2024-53009,1,1,32ac28a6f09951592000ecb2dabbf78ae570c913102d942f6be393bfe2c9e76f,2025-07-08T13:15:28.460000
CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000
CVE-2024-53010,0,0,e92ea489ea86ddb06142add3a7b47a2b4c77fd3f05e7b1a7bf67e9e564744128,2025-06-04T14:54:33.783000
CVE-2024-53011,0,0,9f543daf6d1032b8c529ba0691f6774574470a7477d429016cd467649e59ce57,2025-06-18T23:27:51.907000
@ -276429,7 +276430,7 @@ CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42a
CVE-2024-5409,0,0,e57e1ade9406d6824e9de4b5fb59a028c0cc0d3b407f2e5791339282678e1347,2025-06-05T15:31:08.950000
CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000
CVE-2024-54091,0,0,6669dfba9e4b52b11ac13f159a10cf6dd259350d4a591cc31c8accd2299f4839,2025-04-08T09:15:22.763000
CVE-2024-54092,0,1,f3528427f364e078623d36f73d6874bf4a2ece3c7101a63cc4b72ee9f4c2058b,2025-07-08T11:15:24.580000
CVE-2024-54092,0,0,f3528427f364e078623d36f73d6874bf4a2ece3c7101a63cc4b72ee9f4c2058b,2025-07-08T11:15:24.580000
CVE-2024-54093,0,0,8ff323e645aebc7aeef25ba10ab98f1f6ad0ea9c0f1d7ee8b34034da91ced70a,2025-03-04T19:11:00.280000
CVE-2024-54094,0,0,4b5414d6bb86aa6d5d0ad7d402a8fed5c92b81411a35a19b8983e665f6e00eaa,2025-03-04T18:48:25.970000
CVE-2024-54095,0,0,21c8eedb1a0957c805c27199698b550557aa3e86d67c7e9aa5fc64a1b6a6ca6d,2025-03-04T18:45:18.927000
@ -284654,9 +284655,9 @@ CVE-2025-20193,0,0,cd66769e8bf0fabeeff2643d589e1290c7990cd132754f98566c7411d8149
CVE-2025-20194,0,0,85c552aa71f37455d09f9b42abdc6e78e246d772040e104d59ddb2d924d538a8,2025-05-08T14:39:09.683000
CVE-2025-20195,0,0,16bbb27128c9aac91fd67105dd16c89d2655426e88389667ea69ec053d84754e,2025-05-08T14:39:09.683000
CVE-2025-20196,0,0,0d76602d5269194c3b36ba998fb8467fe88671b0106420b6be3fc656b0d849fe,2025-05-08T14:39:09.683000
CVE-2025-20197,0,0,e92f5ca24de15e6dc2982fd4a54d33cbae74ab18561fc0fe0a7eb9a968835806,2025-05-08T14:39:09.683000
CVE-2025-20198,0,0,cfb2dad838688690a20ebdd66b5608187fa9224c2320c4fff002fe9f207c6d11,2025-05-08T14:39:09.683000
CVE-2025-20199,0,0,101bf93c3ec77b5d78fdfc0cdba75b21830eed4ac023e7e5749cdb407897668a,2025-05-08T14:39:09.683000
CVE-2025-20197,0,1,4ec83a8dfdd5873d833d8d72f8ed8925794427c956cb1f32481b16e8b1c60fc2,2025-07-08T13:57:47.713000
CVE-2025-20198,0,1,0f3e46ea1228e771f39d9b4a2709f322da280b336df40d6e23e2b9487e1bb2c7,2025-07-08T13:56:57.540000
CVE-2025-20199,0,1,f3df46efa679b891adde0924c665fde4891fd5a14b0775e729978cf8bf84e73b,2025-07-08T13:48:55.337000
CVE-2025-2020,0,0,9d4ec350b539786bd35b02e115c635ada2d38c5941cafaca03f828bfd2898d09,2025-07-07T18:06:35.070000
CVE-2025-20200,0,0,5f150b6a708dc68bfc2b09ae693931c6d8798d1daccf894098b5d0a2b293c29a,2025-05-08T14:39:09.683000
CVE-2025-20201,0,0,ee006f3e77ee311098edfd254400f52a9eeeb91c4e2cb362d5bcc3015d8fbb24,2025-05-08T14:39:09.683000
@ -284976,8 +284977,8 @@ CVE-2025-20979,0,0,231f64c3e176775ba854746f023aa81bf6b40a4874e615d2c4610802ac3d0
CVE-2025-2098,0,0,339294206fd4d5be14c5ec0cfdf9d0429803ca53d006fc61729cc0a81c0f19c1,2025-03-27T16:45:27.850000
CVE-2025-20980,0,0,7fdd5a1f3346b410ae9e2acd7c3f47424f0d1437083753fdf0525f723ce42b13,2025-05-07T14:13:20.483000
CVE-2025-20981,0,0,3cd666e2f6ca8dbe42267b7ba7f17b10b23a6b03f2fc8612f5f137dbde34d2f6,2025-06-04T14:54:33.783000
CVE-2025-20982,1,1,24ee05660d228aaf1d0eb67163a948364b3e1f7c8f0f9b38fd16fc4994a1b86a,2025-07-08T11:15:24.733000
CVE-2025-20983,1,1,623a1a4238fe5601043b1a52fd41f2f9acb47eff33405ba1b440ebd6c26fa81a,2025-07-08T11:15:24.873000
CVE-2025-20982,0,0,24ee05660d228aaf1d0eb67163a948364b3e1f7c8f0f9b38fd16fc4994a1b86a,2025-07-08T11:15:24.733000
CVE-2025-20983,0,0,623a1a4238fe5601043b1a52fd41f2f9acb47eff33405ba1b440ebd6c26fa81a,2025-07-08T11:15:24.873000
CVE-2025-20984,0,0,e7280baeb13683cb27514b85160ab9b678f39f8df2cf27f792346506ca0946ee,2025-06-04T14:54:33.783000
CVE-2025-20985,0,0,f1546ae707d82e33a5482d68554ce8489a02400f5065ef7262899124d0fa85b0,2025-06-04T14:54:33.783000
CVE-2025-20986,0,0,a8c17dd67caf405f6f23f17b2129a7137468e63456e903401ccdccb0b601a184,2025-06-04T14:54:33.783000
@ -284991,19 +284992,19 @@ CVE-2025-20993,0,0,2f2e05380962f23c2442bc279bb02edf00e9574fe76d3c8cb0266c25828d2
CVE-2025-20994,0,0,9433fa250a990918bc6b86efd5f43f4cb8ee99e0799546de1201054f6acdb498,2025-06-04T14:54:33.783000
CVE-2025-20995,0,0,b0e261ba12a516e344c63e2844a9aedbf277b62990580f34723653f536b23d63,2025-06-04T14:54:33.783000
CVE-2025-20996,0,0,2997e4a5961993fb94aabc2509dc00cf8844c2ce85f291a3f0f1326b812fee1f,2025-06-04T14:54:33.783000
CVE-2025-20997,1,1,4c58aace1c446c8632e77dbb9866cad0aeee455f0ae788aa8bb8d412b249f1a6,2025-07-08T11:15:25
CVE-2025-20998,1,1,1e4f98e146197e2ce7f270513e58cfe699f7a11c95f18a350b3931c14fa0b0af,2025-07-08T11:15:25.137000
CVE-2025-20999,1,1,4d7183e3ea83e9542f846ba4b4bb9550f2b80f03de8a1a39dae2f407a22fd825,2025-07-08T11:15:25.267000
CVE-2025-21000,1,1,ba6d11147334c007f877e2bb66d8bf8adbc7af88d9b28fa8037b130cfa211139,2025-07-08T11:15:25.397000
CVE-2025-21001,1,1,b3ea220c767871b63f0e2d22e358eaa6f57116429352db7b7d319504ebe7ce12,2025-07-08T11:15:25.523000
CVE-2025-21002,1,1,a3e61dd61d3981c05d6fec980cfe82a27bfd228618868a5fa3b3adf2ee453e43,2025-07-08T11:15:25.660000
CVE-2025-21003,1,1,d652f08513c64a2eef22f3c9c58611479c8daab84658f0cf36b443f4d41c4372,2025-07-08T11:15:25.793000
CVE-2025-21004,1,1,78019a154159f714a54e4540cdf79f59b8c81c132422f794818e2a42a19c4464,2025-07-08T11:15:25.923000
CVE-2025-21005,1,1,aa028eebf906c9021d059e469fd57414afcfdd1bb8538d4b31fe0f048585f6b9,2025-07-08T11:15:26.043000
CVE-2025-21006,1,1,d7ab8fe801048595e6c27f5dde7019b8d70b47c965bc4e7a920530bdfa78b384,2025-07-08T11:15:26.177000
CVE-2025-21007,1,1,2a4e898d2fcc5c2c49adec42459dc07ef2cfb16ec731fa7b0987782f1940079e,2025-07-08T11:15:26.300000
CVE-2025-21008,1,1,4c0745cf078c6b15af97932f27b1f3d2f692bbe0cb82189c8b82c4abfbbdd4ba,2025-07-08T11:15:26.433000
CVE-2025-21009,1,1,6310e97b028c7f2cacdaa8371ce08bdf75e2f5df1d7cdfb16493261849e67ba8,2025-07-08T11:15:26.557000
CVE-2025-20997,0,0,4c58aace1c446c8632e77dbb9866cad0aeee455f0ae788aa8bb8d412b249f1a6,2025-07-08T11:15:25
CVE-2025-20998,0,0,1e4f98e146197e2ce7f270513e58cfe699f7a11c95f18a350b3931c14fa0b0af,2025-07-08T11:15:25.137000
CVE-2025-20999,0,0,4d7183e3ea83e9542f846ba4b4bb9550f2b80f03de8a1a39dae2f407a22fd825,2025-07-08T11:15:25.267000
CVE-2025-21000,0,0,ba6d11147334c007f877e2bb66d8bf8adbc7af88d9b28fa8037b130cfa211139,2025-07-08T11:15:25.397000
CVE-2025-21001,0,0,b3ea220c767871b63f0e2d22e358eaa6f57116429352db7b7d319504ebe7ce12,2025-07-08T11:15:25.523000
CVE-2025-21002,0,0,a3e61dd61d3981c05d6fec980cfe82a27bfd228618868a5fa3b3adf2ee453e43,2025-07-08T11:15:25.660000
CVE-2025-21003,0,0,d652f08513c64a2eef22f3c9c58611479c8daab84658f0cf36b443f4d41c4372,2025-07-08T11:15:25.793000
CVE-2025-21004,0,0,78019a154159f714a54e4540cdf79f59b8c81c132422f794818e2a42a19c4464,2025-07-08T11:15:25.923000
CVE-2025-21005,0,0,aa028eebf906c9021d059e469fd57414afcfdd1bb8538d4b31fe0f048585f6b9,2025-07-08T11:15:26.043000
CVE-2025-21006,0,0,d7ab8fe801048595e6c27f5dde7019b8d70b47c965bc4e7a920530bdfa78b384,2025-07-08T11:15:26.177000
CVE-2025-21007,0,0,2a4e898d2fcc5c2c49adec42459dc07ef2cfb16ec731fa7b0987782f1940079e,2025-07-08T11:15:26.300000
CVE-2025-21008,0,0,4c0745cf078c6b15af97932f27b1f3d2f692bbe0cb82189c8b82c4abfbbdd4ba,2025-07-08T11:15:26.433000
CVE-2025-21009,0,0,6310e97b028c7f2cacdaa8371ce08bdf75e2f5df1d7cdfb16493261849e67ba8,2025-07-08T11:15:26.557000
CVE-2025-2101,0,0,e2f134d8ec38a4ef69a8a1b6464b6041847978860b9b377155f00fb727decdb9,2025-04-29T13:52:10.697000
CVE-2025-2102,0,0,1b84a94b9bc783c0eba8b42961ff5295a1d593e71ba7b75effdb8c35c2b35fb6,2025-05-21T20:24:58.133000
CVE-2025-2103,0,0,8165c0b352513de64cda0403ba5ccccfa989e53bace8ba5cf69fd4b2ec66dc6b,2025-03-21T15:06:58.433000
@ -285338,13 +285339,18 @@ CVE-2025-21418,0,0,286c461de95fba525ffd95fe19188a97b0613df56bf1afe14ca9be4aa494d
CVE-2025-21419,0,0,acdb4d37a32faa1cb0f65f0fbb7358475e2deb811438263e59eb8f6bcbeca8e1,2025-02-14T17:32:53.087000
CVE-2025-21420,0,0,32a7e46f27d290c0e9a5b92e079c0424752a30e3cfa9e5d424062d7af6a66d41,2025-02-14T17:36:09.683000
CVE-2025-21421,0,0,f15bf249b08721bdbad98ddd0135517b6ad56087f845d4d9619503a691f86d18,2025-04-07T14:17:50.220000
CVE-2025-21422,1,1,a5b6290f9622a5e2f090ee29ba8a4ac9b13f93dfce2f450bfb82bad86ce5e438,2025-07-08T13:15:29.193000
CVE-2025-21423,0,0,0e328d405ecfbb8fe86632fa5a763291326842f944399e5e60b0b14a8178f014,2025-04-07T14:17:50.220000
CVE-2025-21424,0,0,3a83225b8d2edd7b934464a21b7f49bd35353b067d8247c64049e806cfc35f96,2025-03-07T14:12:17.933000
CVE-2025-21425,0,0,2973138d7d9b6e35e7d945a94baa50b4f2fca4c64a4564e5551f5d2248e34508,2025-04-07T14:17:50.220000
CVE-2025-21426,1,1,c271ec0ec4e3caa988d42b569314c463596e8b5ec16d6e40b8f32eb8ab129434,2025-07-08T13:15:29.380000
CVE-2025-21427,1,1,bfa0f8be04541fee83b0ffe5be6d4f16aaf662ff51b0c1905923fe8045c54dc3,2025-07-08T13:15:29.533000
CVE-2025-21428,0,0,69b7442476ea6fd4758477152b60b52350e6c0f429301f169d66bd9991f80aef,2025-04-07T14:17:50.220000
CVE-2025-21429,0,0,870d21a2653678c9bcc5dba6b9c6c70a3d313f6766692e0010768363d71bb739,2025-04-07T14:17:50.220000
CVE-2025-21430,0,0,b58800afdeb82d2fa1166c7a812e6cb300a5e0ba757e90c33913521b0810a404,2025-04-07T14:17:50.220000
CVE-2025-21431,0,0,0747d8dea6587a9b7f15f86751be6678f61e3a1c0761e2401a2264a2bfc8a59a,2025-04-07T14:17:50.220000
CVE-2025-21432,1,1,781edce87182cfad3f9a8dc52ac9b86f71bbeb95b27a49caec2c7483a25ba52b,2025-07-08T13:15:29.703000
CVE-2025-21433,1,1,209434476d246bd6939fa34753f749a71c5422fe5d78d8730bdad12ecc83f621,2025-07-08T13:15:29.890000
CVE-2025-21434,0,0,e97b8c7db7b59840aab9791601fe67bf15763c97aa47c7325190ba36366f1b64,2025-04-07T14:17:50.220000
CVE-2025-21435,0,0,5ee5afa3d171e3c1b3b86828f8cca5087faa3199de081dd271b08927f77c403f,2025-04-07T14:17:50.220000
CVE-2025-21436,0,0,521a5912af5bbce349dcd7dfc43a4fbaa2b25357df3d302375c63b4105e5794b,2025-04-07T14:17:50.220000
@ -285355,14 +285361,21 @@ CVE-2025-21440,0,0,beead78335a07e923a7e0e2f3c4cea3393d64f4794a92e98798fb031a740c
CVE-2025-21441,0,0,6767c9feebb7b2b01446d669a9d5908e7e079326445739929c36a44179f4e96a,2025-04-07T14:17:50.220000
CVE-2025-21442,0,0,e3b357683ad4065cccd1ed602ad51647e904baebd6f01fc1649f64566424937a,2025-04-07T14:17:50.220000
CVE-2025-21443,0,0,62996cb6f060941b6ecddbc544a73b97b0f46a7a491c3db31b968a3a02fa92ab,2025-04-07T14:17:50.220000
CVE-2025-21444,1,1,2d304894e509773b0d48f2a06f92ba2429f295c6977a718874fa7e424d7a6031,2025-07-08T13:15:30.073000
CVE-2025-21445,1,1,041188d04d4c604169489b4e6040433684b7f9856cd83899c1ead8cdba976050,2025-07-08T13:15:30.227000
CVE-2025-21446,1,1,308edbbbe6e259bb59fccf6570981bea47f490ed97351971976ec989ca9f2021,2025-07-08T13:15:30.387000
CVE-2025-21447,0,0,426315f42c42f42a5481406e4be3e161d98a87e5838d319262f923ee65bfacbf,2025-04-07T14:17:50.220000
CVE-2025-21448,0,0,7ebc4e443c7ecb4c31b427e79060d2d52e541e1fd347aab91892496c29efee53,2025-04-07T14:17:50.220000
CVE-2025-21449,1,1,0823272789e9767d141593954f3872a0424201d303416616a0c7ae9bafed09ce,2025-07-08T13:15:30.567000
CVE-2025-21450,1,1,74f64183a49a2de023dc2e9713d044fd30f1126ad0e7d1e23863ad491f9596ba,2025-07-08T13:15:30.740000
CVE-2025-21453,0,0,a6792c38b141416584424c30fdb9e75757be44c603a39ac6c3466999938a3409,2025-05-09T19:10:06.443000
CVE-2025-21454,1,1,5ffe92c2519657b2a43cbd22b1af43a4902f5a2cfe29af8ce074971bcb647092,2025-07-08T13:15:30.907000
CVE-2025-21459,0,0,5c386ebea9ff578717babb7aa51aad849d73bca7cd137939105262b1d5b65dd6,2025-05-09T19:09:53.410000
CVE-2025-2146,0,0,f9f0ee70a1a39eb0556adf9eb68f745a3064e4c76eb406a896b9039c6428fac4,2025-06-03T15:49:50.793000
CVE-2025-21460,0,0,389cc7be8fa099528db069375678ba8c4a64d44cb4ba042b2379ea417e3aa0f3,2025-05-09T19:09:33.447000
CVE-2025-21462,0,0,472fd520000393ead0a178585c5420674292d66900bca0ccacb3268944c15d7e,2025-05-09T19:09:19.660000
CVE-2025-21463,0,0,593907bcf873c565a7c581e265b97d32aba720c27ffcf57b3226463b4c2d25ca,2025-06-04T14:54:33.783000
CVE-2025-21466,1,1,161c3b15ebd9fb5f69e2bffad973794bc9dff2c7d96cfd663c12dcaa8f63305c,2025-07-08T13:15:31.080000
CVE-2025-21467,0,0,ee6894e4cbe2827de5e9551f2468fe4483ae3970632b17da0270579a63a0e452,2025-05-09T19:09:11.167000
CVE-2025-21468,0,0,657db3e9e3b08d3a920f7b517225c72105a802e2c6d292c94318fca052f3a5a0,2025-05-09T19:09:01.703000
CVE-2025-21469,0,0,44a98d2c7da1387889249fd5539f1241bba1748830f946c1d60c946e176d6446,2025-05-09T19:08:51.337000
@ -287042,8 +287055,8 @@ CVE-2025-2336,0,0,e04e263f577ee94994be76c7f45e2a366ef0c6a3a1e415c7a4e9e5f507e178
CVE-2025-23360,0,0,44ec4858c221e4e9b3ef85a446da660e97979bf1d4ef5b7d7efaafadb38d1c40,2025-03-11T20:15:16.633000
CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e724120097242c3,2025-01-29T02:15:27.910000
CVE-2025-23363,0,0,35c6147ff63b42be8a96d41b6675b8a23b828204268fd2d9be277916193444c2,2025-06-10T16:15:35.990000
CVE-2025-23364,1,1,0802d20064c77c6c2665c3aa4972bf47f72305d94be4dc6f3ac141fc9d24394e,2025-07-08T11:15:26.683000
CVE-2025-23365,1,1,174e01e36091bcb966b234ddfa050d8646b724961f456d1784b2152213f87e96,2025-07-08T11:15:26.860000
CVE-2025-23364,0,0,0802d20064c77c6c2665c3aa4972bf47f72305d94be4dc6f3ac141fc9d24394e,2025-07-08T11:15:26.683000
CVE-2025-23365,0,0,174e01e36091bcb966b234ddfa050d8646b724961f456d1784b2152213f87e96,2025-07-08T11:15:26.860000
CVE-2025-23366,0,0,19d3d492f06020aadbd27d64e622d5ed1c347260739b5074a05d263b32a748da,2025-01-14T18:16:06.290000
CVE-2025-23367,0,0,dc098e4899b3f306817e6d6c34a4bd055f0e4dc6c153870c1142849722c7141a,2025-05-06T20:15:25.910000
CVE-2025-23368,0,0,420fb00642e39b5577b4518ecebd554328cd6cece3e6b7323ad06772dda6199f,2025-05-31T19:15:20.510000
@ -289825,8 +289838,21 @@ CVE-2025-2703,0,0,d5ea40e178148932f49d90ec4c309716760c7d3b1ed975c047629950db3be6
CVE-2025-27031,0,0,9fa4d5238e55dfabc5a9becc0748532469d6008767dbc00fd4050a94f50be84d,2025-06-04T14:54:33.783000
CVE-2025-27038,0,0,fe0578cb45b48dbd7571220d905a674d9df1e67d36609a2b08ca2656fb74b6b8,2025-06-04T17:23:58.387000
CVE-2025-2704,0,0,2cd2fdcb7bf078b49adccb5ec3568934eab2cf5655946edca476f7cde559986a,2025-05-24T01:38:01.433000
CVE-2025-27042,1,1,10421b6864c3c3281a51ad95067c91bd6a253945d7e3a777ec49a686aaeb077d,2025-07-08T13:15:31.240000
CVE-2025-27043,1,1,236bfaeb2182bec1661987839629836d62ac202e6c48543f6c3a4e55c5313c05,2025-07-08T13:15:31.430000
CVE-2025-27044,1,1,6fd54216d90407fd55120b5a80cb6a8d1bec2f8779fabe79d9ca227bcbe2945a,2025-07-08T13:15:31.603000
CVE-2025-27046,1,1,661e0a5448046d945e0282e829fb516f66227ee36cc4090123785e732cbe3bc7,2025-07-08T13:15:31.760000
CVE-2025-27047,1,1,f85c296e4f61d374592917af2cddad0998fc9bbefe63d26014953ca5f7971133,2025-07-08T13:15:31.913000
CVE-2025-2705,0,0,d7cf085971e80ff2f3017b9a76ca7e7c021414ba6b4da520921b330deccd7930,2025-03-27T16:45:46.410000
CVE-2025-27050,1,1,31723284a322a57d4025a2a8b617707887c0e4c7e6443ce93e4fbc23b7312aa3,2025-07-08T13:15:32.070000
CVE-2025-27051,1,1,0b99479588315b965d6f57ce723bbf4454e193f44595dfee7c78b62ffa352235,2025-07-08T13:15:32.233000
CVE-2025-27052,1,1,93afa7ed89c72fc1753659f7c5c1436ee066f7a62633e0771277cb34288d0dc2,2025-07-08T13:15:32.397000
CVE-2025-27055,1,1,7986171a005c47eeb4b7b86c0bea7f141785a4df341c6b7298d47b233d9e81ba,2025-07-08T13:15:32.570000
CVE-2025-27056,1,1,9aa8654c6001c67f7cd167eb4895e41f34ae91ad00fea4fd3158698b8119e31e,2025-07-08T13:15:32.730000
CVE-2025-27057,1,1,47ee6f16402dd266f02a41fe9467d777af03b81e4c1127590f55511a5063e5ae,2025-07-08T13:15:32.910000
CVE-2025-27058,1,1,9a80f785e29cd6627784970e852f8c53a0da5d247df71898ba841ac6c3e5333c,2025-07-08T13:15:33.153000
CVE-2025-2706,0,0,b7301874e71862c2693f8002ec404483a315cca246767eff2f97ca78b31281f9,2025-03-27T16:45:46.410000
CVE-2025-27061,1,1,e9c0f18437d4dc3cae209b31b6cc01441dbec2ae377ac4864057ecaa9651fc3c,2025-07-08T13:15:33.447000
CVE-2025-2707,0,0,69090f335640f6d7fd104233cf0819e1bcd7db7e6b1707e48e0f43beec6b95ee,2025-03-27T16:45:46.410000
CVE-2025-27078,0,0,d965af916f92d2db1a98213768345ac86ccaa481e270cc65e36339f5a02ca0fe,2025-04-08T18:13:53.347000
CVE-2025-27079,0,0,2e6807eb9db0ff0cab73307a945a3f280ecd9d2483ae144485c2a82083b449a4,2025-04-08T18:13:53.347000
@ -289868,7 +289894,7 @@ CVE-2025-27111,0,0,a8db734f919007cb50cb1902fbb4102eb8dcaaff069aa0ece6c61372ee7c3
CVE-2025-27112,0,0,8750eafe79b9906895ef1a1c17b5f7972ae9a0f6916d156cfca0a444751c0bd2,2025-02-27T20:24:21.910000
CVE-2025-27113,0,0,3f927ac99bedded3f15625d404f90be5185a2dbbeb1f3658f62dd072e77cf603,2025-03-07T01:15:12.823000
CVE-2025-2712,0,0,5b607158b37961f61c6154e4f3efff3b2ccb5f8d5bf2f3995341498b4ba2aa89,2025-03-27T16:45:46.410000
CVE-2025-27127,1,1,b8c1ecdc3e069d27c718406fd5e0e227eb463370435b497d2627d0c08f2d24f1,2025-07-08T11:15:27.070000
CVE-2025-27127,0,0,b8c1ecdc3e069d27c718406fd5e0e227eb463370435b497d2627d0c08f2d24f1,2025-07-08T11:15:27.070000
CVE-2025-2713,0,0,96d615228bbe2400210a94715d82e0cb4affc98dd4349c31070f30252b2cc770,2025-03-28T18:11:40.180000
CVE-2025-27130,0,0,a424518fe58cf3693b2d27c1fa1013a0db02f6fc2b32ae8122f4d597cfd847e5,2025-04-01T20:26:11.547000
CVE-2025-27131,0,0,071d8576367ac4bcd57ae780dc39fb5ba7d654b804cb1f5932df1fbd3dc6ce84,2025-06-09T19:06:16.757000
@ -291405,9 +291431,9 @@ CVE-2025-30170,0,0,125f86bf22e4a10f87718521e72597a9068155c72dc7683753e3e197da176
CVE-2025-30171,0,0,6e1ddac05f87d85ff5a2d0de8306324c0b93023b9c775c6ba74b31de582c35da,2025-05-23T15:55:02.040000
CVE-2025-30172,0,0,0b708de60b7a65334f925cc61136479f9873434736e5851abdef89168cd43ee4,2025-05-23T15:55:02.040000
CVE-2025-30173,0,0,0cd4b73524781f21a2123919a94aab807dcdc411dc4063867eafd2d2623336a0,2025-05-23T15:55:02.040000
CVE-2025-30174,0,1,7c5496a856057ad177d2ba741a99b289936587f4527f834dc14c20b7439813f5,2025-07-08T11:15:27.257000
CVE-2025-30175,0,1,fd323807fbd1d41d94cfb9ee8ffc1d8ebdfcaec0f71545d2712920df2c8f54aa,2025-07-08T11:15:27.393000
CVE-2025-30176,0,1,3e35006bf840d0fb8fedbada0acc4159d0cae0adac155699e4427dea0b9127ab,2025-07-08T11:15:27.520000
CVE-2025-30174,0,0,7c5496a856057ad177d2ba741a99b289936587f4527f834dc14c20b7439813f5,2025-07-08T11:15:27.257000
CVE-2025-30175,0,0,fd323807fbd1d41d94cfb9ee8ffc1d8ebdfcaec0f71545d2712920df2c8f54aa,2025-07-08T11:15:27.393000
CVE-2025-30176,0,0,3e35006bf840d0fb8fedbada0acc4159d0cae0adac155699e4427dea0b9127ab,2025-07-08T11:15:27.520000
CVE-2025-30177,0,0,dd6bcf9daefbb6e1a68c3d702c2bf7abf53ae7032efaf201b8e1a6842e388876,2025-04-15T13:00:12.587000
CVE-2025-30179,0,0,e6188b5cfe41efd4be24afd0a9be97fe3cad7c2aaaf7dc5206b7ef410f616059,2025-03-27T14:45:47.520000
CVE-2025-3018,0,0,699e90ef59bc974dffc7069ff5404d401834f1962c8486f8c32f7bd651f7ed16,2025-04-07T14:35:25.290000
@ -293768,7 +293794,7 @@ CVE-2025-32888,0,0,fbffdd6c21e4495febc7fa32b26718be8845cd643086d6b118c4c01b6c1be
CVE-2025-32889,0,0,1758151af4b145b593cac5bce0174518afb9f62175456015713f13270f9e4479,2025-06-20T16:35:09.850000
CVE-2025-3289,0,0,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000
CVE-2025-32890,0,0,f2c41c451f0f9806b1ea692a8d179705ea340cd405232ede792930108ac7f581,2025-06-20T16:28:33.357000
CVE-2025-32896,0,0,027f5f68187076d0228ae6c48c29088937e8a4e1feb260681b633f584183f9f5,2025-06-23T20:16:59.783000
CVE-2025-32896,0,1,87730d1e109c37783e2d275153cb9b2689aced8423374d3a79b510b3130c20db,2025-07-08T13:05:21.833000
CVE-2025-32897,0,0,56e9abca9382762203e4f90815f5107a92b31e6548472b65a2e1be34efab2491,2025-06-30T18:38:23.493000
CVE-2025-32906,0,0,ed269622d928bd2aa475c3656dbb221e908c6bab45b25018cc828ee7bd119edc,2025-06-17T12:15:24.950000
CVE-2025-32907,0,0,213f7e42abba53cbe091599b6e08ac02e165cca9f4b70fa3a4b5acdea9942c00,2025-05-29T07:15:24.333000
@ -294151,7 +294177,7 @@ CVE-2025-3493,0,0,710768fa82b2fdfed7afb4421abc006aa127722a5b581650774cfc22d97391
CVE-2025-3494,0,0,895818aaf59db2b99c5d4035d526d1a6e1e75a9b529efd9be2a175701512ee7b,2025-06-17T04:15:54.940000
CVE-2025-3495,0,0,fe640c81a3ed6a86c53f35442fa10e181d645418d808dffc6fff69a3880ca71e,2025-04-16T13:25:37.340000
CVE-2025-3496,0,0,eeeb25234db4b5411b18647e6b883fd7c97d2c7df03da24267ee3dd146e4a70c,2025-05-12T17:32:32.760000
CVE-2025-35003,0,0,074767cfc2b48dc944fbb85ca3b884427c44bb4eec8e0eb1fbb249dd056d42ac,2025-05-28T15:01:30.720000
CVE-2025-35003,0,1,791bac33fee91676bd214d44d2c117dfde55aed631bff56312eb764357d3eafe,2025-07-08T13:17:42.373000
CVE-2025-35004,0,0,7ca9bc0598b8fe2bf7b93ef55b16ec6acc895ca6e01d5d8b8d232f2796cef251,2025-06-09T12:15:47.880000
CVE-2025-35005,0,0,aa88b08f6e519f0629b8d956d40895c8805159a8863a31c203e2d6c4d560bff3,2025-06-09T12:15:47.880000
CVE-2025-35006,0,0,79e487b8227eb32a869b572941f318f55cde2af3caa1f18011e3b20867ca23ab,2025-06-09T12:15:47.880000
@ -295481,24 +295507,24 @@ CVE-2025-40568,0,0,bea488b27f57eabc5a1a8b12bfda8cbb9a32ab6c6d2516c21c261159ab2f5
CVE-2025-40569,0,0,a5f1f61caa2593cac66ffa31f4fd2a4e3c91c65148982d43f10a76f85c018b80,2025-06-12T16:06:39.330000
CVE-2025-4057,0,0,9c6590fa9bf494a0600a26ad246e54596c8c82001b91ef44ca85f7febf25408b,2025-05-28T15:01:30.720000
CVE-2025-40571,0,0,92334778ad54371de5319151f377af047fd17886086318e1331ade489105548b,2025-06-12T08:15:22.297000
CVE-2025-40572,0,1,bfa8c01b7de24510ff2c35c2b7f4862f50ef5d06ed5ecdb501045af20715b7d9,2025-07-08T11:15:27.650000
CVE-2025-40573,0,1,7b109a825b0e62490e3192991ce0d7d9f7f56ef29018391917f7f4dc6e0b8d3a,2025-07-08T11:15:27.797000
CVE-2025-40574,0,1,5191d8b8a68599c81d74a5184d6cfbc9465e7e987ec04ef77d0926a0036252ef,2025-07-08T11:15:27.940000
CVE-2025-40575,0,1,cdbf000b7b17ad44f613adbf3c3fbcf3a794fd314bcaab4dacf270551a48bbc5,2025-07-08T11:15:28.083000
CVE-2025-40576,0,1,35546c6aaa264b67dd17c978bdd71f49b798bbc25c05731f852414215bdbc9a8,2025-07-08T11:15:28.267000
CVE-2025-40577,0,1,3469cc45a9c1066a2487e7c4315b717ef8e0d94ec3c2505215947ab00e8d3f40,2025-07-08T11:15:28.417000
CVE-2025-40572,0,0,bfa8c01b7de24510ff2c35c2b7f4862f50ef5d06ed5ecdb501045af20715b7d9,2025-07-08T11:15:27.650000
CVE-2025-40573,0,0,7b109a825b0e62490e3192991ce0d7d9f7f56ef29018391917f7f4dc6e0b8d3a,2025-07-08T11:15:27.797000
CVE-2025-40574,0,0,5191d8b8a68599c81d74a5184d6cfbc9465e7e987ec04ef77d0926a0036252ef,2025-07-08T11:15:27.940000
CVE-2025-40575,0,0,cdbf000b7b17ad44f613adbf3c3fbcf3a794fd314bcaab4dacf270551a48bbc5,2025-07-08T11:15:28.083000
CVE-2025-40576,0,0,35546c6aaa264b67dd17c978bdd71f49b798bbc25c05731f852414215bdbc9a8,2025-07-08T11:15:28.267000
CVE-2025-40577,0,0,3469cc45a9c1066a2487e7c4315b717ef8e0d94ec3c2505215947ab00e8d3f40,2025-07-08T11:15:28.417000
CVE-2025-40578,0,0,68c793efdd93cb2820925059cf1726fd680faa3f5959386ba791cd71b196579a,2025-06-04T16:33:29.650000
CVE-2025-40579,0,1,63e093c07f1a758f8fa561d4d403872e787cf3af6595908707339539b5c38ca9,2025-07-08T11:15:28.553000
CVE-2025-40579,0,0,63e093c07f1a758f8fa561d4d403872e787cf3af6595908707339539b5c38ca9,2025-07-08T11:15:28.553000
CVE-2025-4058,0,0,aa3f7c986fcd6ae85ff29d3948d47ceeba066e55e131a86edc9d2db243c68119,2025-05-15T20:44:45.693000
CVE-2025-40580,0,1,02d409d52032298c5eb4287691c4e7ebcbc7735986c7cd3c8cd509bf3fa4e622,2025-07-08T11:15:28.717000
CVE-2025-40580,0,0,02d409d52032298c5eb4287691c4e7ebcbc7735986c7cd3c8cd509bf3fa4e622,2025-07-08T11:15:28.717000
CVE-2025-40581,0,0,06bc68cbcde637c7b9d09e2f3e2a4ba4663b0e49ef9f77fe37fea58c7a655ae2,2025-06-04T16:33:41.450000
CVE-2025-40582,0,0,7bfc694f37bee448665aa6012b244216ab1ddad4829d57c68f42e07d6cf45971,2025-05-30T17:07:00.713000
CVE-2025-40583,0,0,4b49bcba4fd5129cf3344c13b358ddecba3246768b81ffa138ced46c610d3959,2025-05-30T17:06:58.513000
CVE-2025-40585,0,0,cc49595cf918d38ac5ca973b9f62b22af94b8b980f73beef0c7038a55a139cbb,2025-06-12T16:06:39.330000
CVE-2025-4059,0,0,aaceabed3f9504437b5acc8d70c6023c40c2f0a56aba5d8e6d1c9f7eecdc635a,2025-05-15T20:45:28.467000
CVE-2025-40591,0,0,287b7cab1fd76e8adb3aa980b49a631f0bc9062780824cad9dd2f0ff13f69e79,2025-06-12T16:06:39.330000
CVE-2025-40592,0,1,d167b00de1483c951fe43cc552b62b49543eff58159af12bb6823a6122401016,2025-07-08T11:15:29.330000
CVE-2025-40593,1,1,e51b040a7af17b3f5051f28ce8918891c3b06a5db9c4628dfadec9cee61bafac,2025-07-08T11:15:29.473000
CVE-2025-40592,0,0,d167b00de1483c951fe43cc552b62b49543eff58159af12bb6823a6122401016,2025-07-08T11:15:29.330000
CVE-2025-40593,0,0,e51b040a7af17b3f5051f28ce8918891c3b06a5db9c4628dfadec9cee61bafac,2025-07-08T11:15:29.473000
CVE-2025-40595,0,0,e8883618ba87c7020b44e8c6f164b0155ef7e7a3cf9c54a337a593438f28d611,2025-05-16T14:43:56.797000
CVE-2025-4060,0,0,170985bf8f2f8cc428b363944749e5a7390ec03c3ff9ebf1391dace27bffb441,2025-05-09T19:34:16.987000
CVE-2025-4061,0,0,38d10b753ff5d559244af6fd3081a54533e11210e5e1217338182a3bb0bb72be,2025-05-09T19:34:08.123000
@ -295560,7 +295586,18 @@ CVE-2025-4069,0,0,72c3e148c8cf8c4d5070733c3b3e33573ee47e1d4dc46e158ed5117d25968f
CVE-2025-4070,0,0,95239c8a358b05c88e31535f0df25ceb69331749309a950b338783db56336302,2025-05-09T13:50:22.543000
CVE-2025-4071,0,0,68547b4133937980d039f29a0abcfa60e8d56aeeed72b73dfe6880158fc5f6a5,2025-05-09T13:51:10.523000
CVE-2025-40710,0,0,42ad010adfdc6c00aa1fadf7d62248a714015e44a741236875ef2f26ab43f4c0,2025-06-30T18:38:23.493000
CVE-2025-40711,1,1,4e784c266fcdce3ba998ecb1c4f9a703a291e4daf2c5172cb653a6e3830a804a,2025-07-08T12:15:21.347000
CVE-2025-40712,1,1,6d46810daf75a28f4d134e07db40a360e237f3390441df7d888132a52f34cd23,2025-07-08T12:15:22.080000
CVE-2025-40713,1,1,a1c56b4a57257debb1a85f2e0095db64f29f9eb7c8acc0ceff012223217a1bda,2025-07-08T12:15:22.230000
CVE-2025-40714,1,1,5061163222fc780d448a14e3125daa0ba6cc58aa10d552b14a76b33fc4943c51,2025-07-08T12:15:22.367000
CVE-2025-40715,1,1,fc8b4667f192b86a60e2d19e708c06701e7b90cad323d1734a8f2db900284ec6,2025-07-08T12:15:22.513000
CVE-2025-40716,1,1,fcb56a508ab3c22dc332fee9a2cb0da226dab4b0c6e4f044508fbd8737e6d86f,2025-07-08T12:15:22.660000
CVE-2025-40717,1,1,d8bcfb6dc23de144b89df6b3452e147b4c497638ec537f7cc31e09db46d1c529,2025-07-08T12:15:22.803000
CVE-2025-40718,1,1,9e275456ba5b86dd5be704d4b1893216e81724da8238e05a52779e7d286602b7,2025-07-08T12:15:22.947000
CVE-2025-40719,1,1,4adc68f72a8333e8dc8b7b84c6e748e13b8267aee28710d098134b0405729389,2025-07-08T12:15:23.090000
CVE-2025-4072,0,0,d0cf8b7d2285b873c553b1cc40373ece79b00a96b5dd7782b5277899efb2c1fa,2025-05-09T13:51:19.130000
CVE-2025-40720,1,1,0971a7ffbac2c3d6bca062b1519075074f23efc0eb6b963e66e564764427d282,2025-07-08T12:15:23.243000
CVE-2025-40721,1,1,98431672c376c499c4d08092a49b21368ac7d9094a25fcbe2ad6c0b0857f64cc,2025-07-08T12:15:23.397000
CVE-2025-40722,0,0,17ae0215841c8df3ad9ac86bb8c62178f60c57c488f5f1f3135b4c4a97dd3f84,2025-07-03T15:13:53.147000
CVE-2025-40723,0,0,cc3ab78e91720ad7ee5fde7952f5be8c0f6c096808873b067f78944aa088ee0d,2025-07-03T15:13:53.147000
CVE-2025-40726,0,0,06973151ee6645a9d84113341fb6a06b6153e8d65c35cf71d204b0fa7561f372,2025-06-16T12:32:18.840000
@ -295572,15 +295609,15 @@ CVE-2025-40731,0,0,d60c62e1efb95e2b565ba5cdd1823438090fcfa4d190527ad179b2ff07ef2
CVE-2025-40732,0,0,b700ef468ef5143eab1a98a8a5ac6a7d7624ae511e2f8f3e0dea04d0ebabeee8,2025-07-07T19:38:33.170000
CVE-2025-40733,0,0,264813c2043b96d454598a2961a40f1f771ab5e11dbf8f475c01110001a3b9d3,2025-07-07T18:18:08.400000
CVE-2025-40734,0,0,dd1cf6ad7ae73b91f6e1567d2c837c143f88fe605c960391f2b618e852f997b8,2025-07-07T18:17:48.017000
CVE-2025-40735,1,1,4ab576df561a2045516e507c1b5476121885a79d996c207b8f8cf980a16c1ac0,2025-07-08T11:15:29.657000
CVE-2025-40736,1,1,1e411489e1a21a4a6bfe03c4aa43cdefa23a76d415b8257bf7b1194d1883175f,2025-07-08T11:15:29.837000
CVE-2025-40737,1,1,ab7a48c790db43fea70864b81d60407b90cb4595b7259c8f4b3db5c25a8c230c,2025-07-08T11:15:30.007000
CVE-2025-40738,1,1,027bbc273e0ffbe7b990afbf224a9a2edca5025a549dbffc00b0aaa91a71863b,2025-07-08T11:15:30.190000
CVE-2025-40739,1,1,86e715337b2fffa5a0946f5560d31b5f46754524478a37541f320675cb6c0dce,2025-07-08T11:15:30.380000
CVE-2025-40735,0,0,4ab576df561a2045516e507c1b5476121885a79d996c207b8f8cf980a16c1ac0,2025-07-08T11:15:29.657000
CVE-2025-40736,0,0,1e411489e1a21a4a6bfe03c4aa43cdefa23a76d415b8257bf7b1194d1883175f,2025-07-08T11:15:29.837000
CVE-2025-40737,0,0,ab7a48c790db43fea70864b81d60407b90cb4595b7259c8f4b3db5c25a8c230c,2025-07-08T11:15:30.007000
CVE-2025-40738,0,0,027bbc273e0ffbe7b990afbf224a9a2edca5025a549dbffc00b0aaa91a71863b,2025-07-08T11:15:30.190000
CVE-2025-40739,0,0,86e715337b2fffa5a0946f5560d31b5f46754524478a37541f320675cb6c0dce,2025-07-08T11:15:30.380000
CVE-2025-4074,0,0,67c949a36ba05d695588494a1af59c90dcd6f218e799b578e62cc10508e92154,2025-05-09T13:49:25.337000
CVE-2025-40740,1,1,ebe91ae840e094d087a6b5a8cf8f95a6f1b616ab1ca898d06ab0997153a17f4c,2025-07-08T11:15:30.560000
CVE-2025-40741,1,1,971ad7caa457466209b0f23784636cc2c28eedd3f60ab31981cc70afb6c0a7f1,2025-07-08T11:15:30.747000
CVE-2025-40742,1,1,57cf3ff9363cffedbd3fdca7c5121d75efcb0692ba65b22acd0b165e1ffc2034,2025-07-08T11:15:30.923000
CVE-2025-40740,0,0,ebe91ae840e094d087a6b5a8cf8f95a6f1b616ab1ca898d06ab0997153a17f4c,2025-07-08T11:15:30.560000
CVE-2025-40741,0,0,971ad7caa457466209b0f23784636cc2c28eedd3f60ab31981cc70afb6c0a7f1,2025-07-08T11:15:30.747000
CVE-2025-40742,0,0,57cf3ff9363cffedbd3fdca7c5121d75efcb0692ba65b22acd0b165e1ffc2034,2025-07-08T11:15:30.923000
CVE-2025-4075,0,0,980439803ac2a564a1211ca7907d1f8cd24fb9992986c85d77b9d15e9738b3a9,2025-05-02T13:53:40.163000
CVE-2025-4076,0,0,15e359152ac3968e95f76736d18611ed85f132cae7da09b8e96a2ab1cfc7b92d,2025-05-02T13:53:40.163000
CVE-2025-4077,0,0,8079a7498d68430e78a72c093e01ac09f17f033b46e97453ab1f898650cf61ff,2025-05-14T20:12:06.770000
@ -295639,9 +295676,9 @@ CVE-2025-4119,0,0,e22a40d4a6bba430436ed5cd521d95b9290408de98448e267ea5b0ff1d02e2
CVE-2025-4120,0,0,91a7986356ace02b1faadbef66f401c0debf895af76ae678f57790666062b352,2025-05-13T20:28:48.900000
CVE-2025-4121,0,0,7e5016f57db0166b2ed895f4d1dbfeb1645406dfaf0cae2948f2a256c69377c3,2025-05-13T20:28:09.793000
CVE-2025-4122,0,0,b6ca4452ee292421b2c21021a76be5367aa41cfbabca448a9baeb52d919cf372,2025-05-12T19:43:56.157000
CVE-2025-41222,1,1,738466ae450d43dcf79524b7c682479f01350dd58e3b6cc054165b80b6ad3891,2025-07-08T11:15:31.117000
CVE-2025-41223,1,1,4c9cef3608318e54ef56fb7a699b3187c36056c726ec913392d7588703cf45b6,2025-07-08T11:15:31.327000
CVE-2025-41224,1,1,1a8abb704cab998fd7157646b7cd9b5d6ed39478873dea8d8f6c3ea8d79cfaa3,2025-07-08T11:15:31.527000
CVE-2025-41222,0,0,738466ae450d43dcf79524b7c682479f01350dd58e3b6cc054165b80b6ad3891,2025-07-08T11:15:31.117000
CVE-2025-41223,0,0,4c9cef3608318e54ef56fb7a699b3187c36056c726ec913392d7588703cf45b6,2025-07-08T11:15:31.327000
CVE-2025-41224,0,0,1a8abb704cab998fd7157646b7cd9b5d6ed39478873dea8d8f6c3ea8d79cfaa3,2025-07-08T11:15:31.527000
CVE-2025-41225,0,0,ffc98f9dcad9846a3a108fe3a7132a69bd7a2a6d0a3c8f34ab76d93d3bf08419,2025-05-21T20:25:16.407000
CVE-2025-41226,0,0,ca4cc48cca0502f2bc408b79a88ab6d132173955f1ef39e82ca47faffba98e58,2025-05-21T20:25:16.407000
CVE-2025-41227,0,0,4080075a62ea151bef0a098041eb959f6a8703afeba9690ae542cedf1c853291,2025-05-21T20:25:16.407000
@ -295886,7 +295923,7 @@ CVE-2025-42963,0,0,3eceb758431bd7a9b776e6e359f16ac8c0bd21ef6b4f957b0e4b861a43f9a
CVE-2025-42964,0,0,35eca8fe2e5b0b8592914d5f9aceac811262537d112dd16fac42dd7a2874f291,2025-07-08T01:15:23.240000
CVE-2025-42965,0,0,5468ec2b856abda7976d3a7237854316e3a567ad8f1e21914fd754cca072a790,2025-07-08T01:15:23.440000
CVE-2025-42966,0,0,f5060d8be8c97a112f6bc890e97f1361483623af18e26949db8b983231720bd9,2025-07-08T01:15:23.630000
CVE-2025-42967,0,1,66fcf4f745ead69569e143881a197a2eadc36681f688e13394b8d383891f97aa,2025-07-08T10:15:22.040000
CVE-2025-42967,0,0,66fcf4f745ead69569e143881a197a2eadc36681f688e13394b8d383891f97aa,2025-07-08T10:15:22.040000
CVE-2025-42968,0,0,8d0a352810ded26f1ea99be4361c89b7f442d5266f1052174dabce56e8dd9e2f,2025-07-08T01:15:23.950000
CVE-2025-42969,0,0,9338f259fb3824acc0cf0f061beeaca8fff6d92da434d45e0c6b7290c985ddcf,2025-07-08T01:15:24.120000
CVE-2025-4297,0,0,2125bd423cd8ee8185dc917035443ae13b98a933b8dab9e4e9a974e1b93ea733,2025-05-16T17:44:43.850000
@ -297516,7 +297553,7 @@ CVE-2025-47563,0,0,72acd05048e66bf43174d423048963fa4336cfd5d05a950e28ccf6a586953
CVE-2025-47564,0,0,758c7c233976a079425cfa725a742dd6e7231873de27eacf12a1e47dc13257f8,2025-05-19T13:35:50.497000
CVE-2025-47565,0,0,8b16b5c755075c3dcc98667be5e0b1272b5f8108f52b520047a7220b1bb94e13,2025-07-04T12:15:28.720000
CVE-2025-47567,0,0,8bd59bb6ff8c472a7ea16c76eaaa9fb8be8e5bf93dec95aa6197eaff663abf08,2025-05-19T13:35:50.497000
CVE-2025-47568,0,0,d3f841fc99d11c83887a2f72c574f47b61ccdd12a36d2405b72c9c92aef9c1e2,2025-05-23T15:54:42.643000
CVE-2025-47568,0,1,f480586aac65d539368cfac805d522668510a1666c047470abdbd253c43ea3fd,2025-07-08T13:24:03.987000
CVE-2025-4757,0,0,aff32a5dd8531f1cf16b47f2eaa3e2f3dcb4fa067452c943f1a1e24c22fb61c9,2025-05-27T19:49:21.437000
CVE-2025-47572,0,0,6f913d8e34dd55d1ebb37eed850b56ed28aa4f31ae150f4b63a44d87f1189a3f,2025-06-17T20:50:23.507000
CVE-2025-47573,0,0,94de9eca25614784e0ed73717addfeb7d4b173cef0905973532f8131a75d0a48,2025-06-17T20:50:23.507000
@ -297977,7 +298014,7 @@ CVE-2025-48270,0,0,1b94f6c708bfbabdd4239f2d260f63d06e0e0633a19b555830b0d1d7c3018
CVE-2025-48271,0,0,0d70c386c119c388d6a35958b80bfcca32a964cf1daaeb05cdf206898628a3db,2025-05-23T15:54:42.643000
CVE-2025-48272,0,0,ef1d1975800386c78d6ca4b6bc18290441d554a80fc7cd7a85f2b4b3a85069b3,2025-06-17T14:10:18.237000
CVE-2025-48273,0,0,743f8589336bd54dbc90368ddc5d50b78d40da1d0fdb94b5e7cdd1102e3461a3,2025-06-24T20:30:34.620000
CVE-2025-48274,0,0,edd092fce0a34244af7a641848a71d1d061235cb6caab22cee71d83162c81ea4,2025-06-17T20:50:23.507000
CVE-2025-48274,0,1,220671d0fd5c62a534ce7ef77e211f6588e69fae82685554cac5009ab6d417d1,2025-07-08T13:12:31.383000
CVE-2025-48275,0,0,06271179e2a87da02697af4b0abc688b6bd5dc4ddeaf28630e532e9232bd6560,2025-05-23T15:54:42.643000
CVE-2025-48276,0,0,0e141f1bba6aa60f05739d7c11f150d7139abee4704e3e4b24e80ad758f6c866,2025-05-21T20:25:33.823000
CVE-2025-48277,0,0,22dca5b7c56418f77c0bce203490c523fc4aff3e411af80d1d258902607a715a,2025-05-21T20:25:33.823000
@ -298833,6 +298870,7 @@ CVE-2025-5010,0,0,378e343c5bbddee87b45f94f2f1fd76512f5e1ec33b0f0fab421b27f0b0e4c
CVE-2025-5011,0,0,41cba4a19108fa201d7350dc043c416f678b4c3290e3c20187f1da42ed6ecb70,2025-06-17T14:11:05.917000
CVE-2025-5012,0,0,108c4a85dd9ec28dbd0d5302959945049615400f448641a47fbee9222bc53fe4,2025-06-12T16:06:20.180000
CVE-2025-5013,0,0,39609cc7be62bab5e0dcdb82a67ea2f685567abbda8b6a9de4ad396fb54bfac3,2025-06-17T14:10:53.597000
CVE-2025-50130,1,1,775593ba2746661904f0e3d71a2068e6bf8699317a11a6fa00b202e332a9e9ae,2025-07-08T13:15:33.710000
CVE-2025-5014,0,0,9c8607db6d9e14448cfdf407e465c7bfde043729f553b3e6d26ffe1d0d8748b5,2025-07-03T15:13:53.147000
CVE-2025-50142,0,0,96e95955d25317e057785db9a58810528a1898027eb53c5d652f8d851e70c8f5,2025-06-14T03:15:21.693000
CVE-2025-50143,0,0,efc3fe49e91ba655ae48efde63259826b6655f9ef2d53032c81a7a1aa6c27271,2025-06-14T03:15:21.793000
@ -299150,7 +299188,7 @@ CVE-2025-52727,0,0,476ed505113a23aff77c5c6570fb8f496f28335fc67949f18ed6f5220203d
CVE-2025-52729,0,0,0b274f7b391a2b3ca207455316eb5f5a18760bd16bb1ce17fa066170bf9eb025,2025-06-30T18:38:48.477000
CVE-2025-5273,0,0,7a172885547dbfa68292354132d6eab77847bfdd0e0f37bfe0a33c637c28685a,2025-05-29T14:29:50.247000
CVE-2025-52733,0,0,7b459b7ccea847e17c1de3d7bfd534831df085ed8c830c3122c8262c5439f0d8,2025-06-23T20:16:40.143000
CVE-2025-5275,0,1,5b77f3d7d547bfc5aca0dea72dfa50f5ec03b6706fb1b7fce785a83ffe687ef4,2025-07-08T11:32:22.210000
CVE-2025-5275,0,0,5b77f3d7d547bfc5aca0dea72dfa50f5ec03b6706fb1b7fce785a83ffe687ef4,2025-07-08T11:32:22.210000
CVE-2025-5276,0,0,39d67915dab7ad2300f3ccd3a288fcee1075e32b914c45ad140eb6b7725be52b,2025-05-29T14:29:50.247000
CVE-2025-5277,0,0,ba5aa3a145e9e2e34ac18c63e7fe60e94ac49ba4d7121cc0bc36eebe3309abbf,2025-05-28T15:01:30.720000
CVE-2025-52772,0,0,deb02b2d983c296f8b89a2559d4d4f189f1c6c676131c9feadcc246a08a5cc14,2025-06-23T20:16:40.143000
@ -299459,7 +299497,7 @@ CVE-2025-53374,0,0,048614a745ae7e98f5321a32b66858d6e6101230ba932d75c053cf17ba954
CVE-2025-53375,0,0,848890d1efe87764cc544f04fa066b455261f9ea61f69788716dddfa6fa591e5,2025-07-07T16:15:25.317000
CVE-2025-53376,0,0,fc3afaaa04120e6e44ddb4595db6ad187159526aa9e92e3e7d46c6c8dd40e083,2025-07-07T16:15:25.467000
CVE-2025-53377,0,0,e496263adfef21784d6329ded37f2d78cc2ff795a2b0a4930ed58aa9270fa435,2025-07-07T17:15:29.097000
CVE-2025-5338,0,1,30f15d6c7d64c82a0621f7e47f07f7b28b663e259f04318e25340aa82d6ae3c0,2025-07-08T11:34:52.400000
CVE-2025-5338,0,0,30f15d6c7d64c82a0621f7e47f07f7b28b663e259f04318e25340aa82d6ae3c0,2025-07-08T11:34:52.400000
CVE-2025-53380,0,0,778a4ed3b4b51402648379b0a66e0653fc3388939d52b44cfb536c593d391f6d,2025-06-28T03:15:24.373000
CVE-2025-53381,0,0,5bca2379c91be4fadf0c25a7392b9c1b3f109e154b7525c42492575516c349ca,2025-06-28T03:15:25.393000
CVE-2025-53382,0,0,4695e14174a7cc685cd3ded81df4de7cc22e0d73407b891865d54a432fde8f3b,2025-06-28T03:15:25.470000
@ -299931,7 +299969,7 @@ CVE-2025-5838,0,0,35626c7c8e1d04fa7bdba348c0108b2c123b4d5d313bbcf8d5dd0d6177716b
CVE-2025-5839,0,0,af2c1c6da3fb5a22931f1ffebd67420dd5150792d38533d6eb8686e18f591276,2025-06-09T19:07:34.470000
CVE-2025-5840,0,0,a1906b279632ca933a71469d14d9b22734a373c8dc4ebaee1a55c4351d13760a,2025-06-10T15:45:31.043000
CVE-2025-5841,0,0,f400ea2f8b46ebb92066563e7d4eaccd25056b8981da67e57e016f89e1a31dc6,2025-06-16T12:32:18.840000
CVE-2025-5842,0,1,c31a3006bfcd97a6189e80541b0f5399ea0b610a2ef79d86f7f717f890b35b51,2025-07-08T11:35:12.807000
CVE-2025-5842,0,0,c31a3006bfcd97a6189e80541b0f5399ea0b610a2ef79d86f7f717f890b35b51,2025-07-08T11:35:12.807000
CVE-2025-5846,0,0,b9dae5d78b058906eef82693476ed197d8158ba3f9251bdb3cbb82dffcfb1b46,2025-06-26T18:57:43.670000
CVE-2025-5847,0,0,72a670a977f930c072e82981d9be0647255328c3124df63dafd15061a72168a9,2025-06-09T19:04:55.580000
CVE-2025-5848,0,0,97a77699d44911bbc0f7dbb24d5b37ad7d0974431c5e2858413f0642987e5a7c,2025-06-09T19:04:50.113000
@ -300010,7 +300048,7 @@ CVE-2025-5925,0,0,74cb0f740f96269546a558716b8983e19baddafe2aff8e369ed86d426f6297
CVE-2025-5926,0,0,d101bf01d3fcfe0cdb9553376422f17ca8d863b6b3e856d7675080f3ca9408fd,2025-06-16T12:32:18.840000
CVE-2025-5927,0,0,0c73989162ec688b3e537c5db5863dbd2ec2103b11b32c3e43eb90084da6cbc2,2025-06-26T18:57:43.670000
CVE-2025-5928,0,0,bf8e560b30d16961d3816817e86769462398f4dfd1c11ce3fc0a5a6f046bebeb,2025-06-16T12:32:18.840000
CVE-2025-5929,0,1,22ddf18d1b5be0427bfffe06c7c342a3ee4be212fd6ecf814d57608fd0af56fb,2025-07-08T11:32:50.840000
CVE-2025-5929,0,0,22ddf18d1b5be0427bfffe06c7c342a3ee4be212fd6ecf814d57608fd0af56fb,2025-07-08T11:32:50.840000
CVE-2025-5930,0,0,f247db24f36bcbf2f7d81e18a82d068f64b444dc019b1b0b868d92f5ff3fa36b,2025-06-16T12:32:18.840000
CVE-2025-5932,0,0,2139f6b06237b79e72d4532bc8219346e6dc94ec5de4cc7ea77426914ccc3bb1,2025-07-07T16:03:18.250000
CVE-2025-5933,0,0,4ab1a4e0a3eb3d84beabd54254ef79ff81b64f59138d24e8a3ed5570a379ad13,2025-07-04T03:15:21.407000
@ -300196,7 +300234,7 @@ CVE-2025-6201,0,0,09953b11a7588a9edc2f3925b0cbb84add185ea803d7765dc4a2a786cd413a
CVE-2025-6206,0,0,c66ee500876bc4abb021bb9d77aeda45e0e42d83e894cdd37485d8f28334b052,2025-06-26T18:58:14.280000
CVE-2025-6209,0,0,4d194405f99de3505fed4fbc7baf9d82092f31b0c10e81656b4ad21d616433ac,2025-07-07T14:15:25.287000
CVE-2025-6210,0,0,14d31ee2b00a58e0d63a7ab89552e4950b1424b800527d9bb45e7fdd7c86ee97,2025-07-07T10:15:29.040000
CVE-2025-6212,0,1,9eb0c977d92e30e2e67efcaac7f25f50243836e669a2d22cb477be6116fc0bde,2025-07-08T11:35:01.817000
CVE-2025-6212,0,0,9eb0c977d92e30e2e67efcaac7f25f50243836e669a2d22cb477be6116fc0bde,2025-07-08T11:35:01.817000
CVE-2025-6216,0,0,fa2fdcc5033cf3a1df6342a01f2acd273f87b99c1664b4ca0db573d99035212e,2025-06-23T20:16:21.633000
CVE-2025-6217,0,0,0d2c65c94d7cc4fabd9027df56e983345e1f33543f29c53f0c45cf319713d14d,2025-06-23T20:16:21.633000
CVE-2025-6218,0,0,0e265a89cc2a3bd08feb5d5cbdea0ea20f815a5e3a21352ce4021a3ae0596bec,2025-06-25T19:03:33.817000
@ -300232,7 +300270,7 @@ CVE-2025-6285,0,0,0f5e702030ae71dd658a22b122b4aed0ed12d1aae61fb46ec51e0841a0ec90
CVE-2025-6286,0,0,b7219a51a324575d8724ff4298827d1d2120856c9a6df23d680f1ea8dbfc94c7,2025-06-26T21:33:36.923000
CVE-2025-6287,0,0,c97270e78c42232e6181a1fc6418c4993fc08485bae7bc11e103b2bd3b0836b8,2025-06-26T21:30:45.290000
CVE-2025-6288,0,0,fa5bb2cf674608fadad9e3141e14760d75f6db2208fe52ae1ce80a76abaa33b6,2025-06-26T21:19:24.540000
CVE-2025-6290,0,1,c2ed75c99fd22b3a767fa6ba8364d4a3c4bca918872facb4981c311910b82f9b,2025-07-08T11:32:32.773000
CVE-2025-6290,0,0,c2ed75c99fd22b3a767fa6ba8364d4a3c4bca918872facb4981c311910b82f9b,2025-07-08T11:32:32.773000
CVE-2025-6291,0,0,dc1a968051b9db85759355228419cc46165b7a6778eb4ff9ec8664745bc75db4,2025-06-26T17:00:25.153000
CVE-2025-6292,0,0,950777517b48d376f4e9cfbb6475ca5763192a729885525f030e7df89973a74b,2025-06-26T17:25:51.993000
CVE-2025-6293,0,0,30342ac281aebc0a30969c59d523a1a3a2cc7a536dbaaadfbb8317c27c072af8,2025-06-26T17:22:14.003000
@ -300312,7 +300350,7 @@ CVE-2025-6375,0,0,c5c7694dc72a40d77b42ca7bdac2085f0219ee2826ef00eb4a9804c963c510
CVE-2025-6378,0,0,c9f832cbc4a58e4712b3be36fa473dbfb776e558d71ae65da6d05b8879aaf667,2025-07-07T17:15:44.053000
CVE-2025-6379,0,0,a573d0789f74e2940a233e26e5770bd43ee83276728b28e7918a6f6c0e9e28bc,2025-07-07T15:24:31.510000
CVE-2025-6381,0,0,bcb772a2599dc7010241cc7bbab88371a6f4c6ca137948aff05aab6ef1ed3e85,2025-07-07T15:24:28.070000
CVE-2025-6383,0,1,d4983baed15d1793d27d210c93a94db5a7e163abe77193a900e62847d2cde376,2025-07-08T11:31:13.823000
CVE-2025-6383,0,0,d4983baed15d1793d27d210c93a94db5a7e163abe77193a900e62847d2cde376,2025-07-08T11:31:13.823000
CVE-2025-6384,0,0,97aa0c1b3518730f2ff1ac0c6e40e6df53f12abb019ae8c41f191d17b86f6691,2025-06-23T20:16:40.143000
CVE-2025-6386,0,0,b2a078e22a659d4d88f448dea0064464b20c22ed2491c180557e36b6a04d2807,2025-07-07T10:15:29.187000
CVE-2025-6393,0,0,32247b5db96e134f65a8c77173062a4edd972dbb6c0ac396c8f0bf9ce435cde7,2025-06-23T20:16:21.633000
@ -300371,7 +300409,7 @@ CVE-2025-6455,0,0,c3bdac595580f2d51688455030c4e776910361c0f01b217f8c0fd502d1ac42
CVE-2025-6456,0,0,31edf54365c40ca692dc828ecd2cae22754fd4157ef8b7b05f96d0280c2dbfba,2025-06-27T17:02:28.953000
CVE-2025-6457,0,0,ec2a9dd42c1bcf669254ec6afca5da44ae8e8abdf8ae4d1d4071cff11bb8a640,2025-06-27T17:02:36.347000
CVE-2025-6458,0,0,083518c79650bb4c88fc42ff0fa6cfc761ce82844b15365e5e4b749048d96c50,2025-06-25T20:00:54.297000
CVE-2025-6459,0,0,ec80e632d35617718ab1b3c79c3fc295670d5c220c8a7e3649627f52ecd9be25,2025-07-03T15:13:53.147000
CVE-2025-6459,0,1,b36a0faeb7f0fe117204679b1cb776e2c6545b75baddc60f4c84c3c6b62d044e,2025-07-08T13:55:50.920000
CVE-2025-6462,0,0,872e829ccb8cbbae6d126350e3997d71b9edc0ddf26c0961eeec2215d87d75c9,2025-06-30T18:38:23.493000
CVE-2025-6463,0,0,e81d8f021da6b8c9b716bbee8f9b01e2e5056280dd82770aedf546ee5971feb2,2025-07-07T14:28:51.123000
CVE-2025-6464,0,0,57a826213e944e28737944d653608fc09e5099c7124b5b98ecdfb0c135832466,2025-07-07T14:22:31.690000
@ -300434,12 +300472,12 @@ CVE-2025-6533,0,0,492d887b9495cf568d73a9f91a4235f8d4b3302adbb98cd523caec1f71017f
CVE-2025-6534,0,0,27dbfbc1ad88a7b2b9a2381731f87a7e228a23f139d2c856c6c4ef9c8c4f00da,2025-06-26T18:58:14.280000
CVE-2025-6535,0,0,3ec3c99c4450294264961f65a26d690a1af52c1d1f2140ee1766ea03af869a81,2025-06-26T18:58:14.280000
CVE-2025-6536,0,0,bd4abefc70387d924c3e572721c1a2fa7652203fc239516c5a7622b44e3bfb00,2025-06-26T18:58:14.280000
CVE-2025-6537,0,1,6cc047e68af8cc140a533baef81117cae1d7e838b2f26be233dae033dab14eca,2025-07-08T11:34:13.310000
CVE-2025-6537,0,0,6cc047e68af8cc140a533baef81117cae1d7e838b2f26be233dae033dab14eca,2025-07-08T11:34:13.310000
CVE-2025-6538,0,0,e09f0a97dfdb50a09d0300934010eb6d0f1d88eba5fa750c8cc98ba07c13c662,2025-07-07T18:33:37.610000
CVE-2025-6540,0,0,082438792186c440bf4ff42d97a1cb1ef2ee9a0b9d0da94f6ceb561b424c8589,2025-07-07T15:02:44.263000
CVE-2025-6543,0,0,614be473b1a9f0b696f8665a5ce20ebb99b6c34c213be6f11e91a24c2a2ce20d,2025-07-01T18:19:45.547000
CVE-2025-6545,0,0,232265ccc6fe056c6abf53601342de9afd636906f2fd3b22c8fe97e99accaff8,2025-06-23T20:16:21.633000
CVE-2025-6546,0,1,e2ccb0f36404155cf63065e6218ff7146480ba7d5ad20b9847888ed82aa12363,2025-07-08T11:34:27.020000
CVE-2025-6546,0,0,e2ccb0f36404155cf63065e6218ff7146480ba7d5ad20b9847888ed82aa12363,2025-07-08T11:34:27.020000
CVE-2025-6547,0,0,9faf016e4cd0d979f6fd378ab40d2ecc76b2956dd06a9026d16b0df65d7d2aad,2025-06-23T20:16:21.633000
CVE-2025-6550,0,0,c0a691cea8a5ed699b0d12b82357599196c16b195f2af32ef4c55625a42b68d0,2025-07-07T15:38:38.413000
CVE-2025-6551,0,0,eb31b65edf1928c67c505e9607a92d57f68bd5fa54806dd6c722d8ad4c081a2e,2025-06-26T18:58:14.280000
@ -300524,8 +300562,8 @@ CVE-2025-6675,0,0,0de2d91f209e42eb7f75c0139bbe9427479426b001a898438230fd824e6c2d
CVE-2025-6676,0,0,ac782ce50af3871765bdc6db85e42945925f65bc3a9a783e280262721507bcea,2025-06-26T18:57:43.670000
CVE-2025-6677,0,0,aeb3766ff9cd14b4f367c80b857f22b7d76862205cd1a20b54c9ea917437dbdb,2025-06-26T18:57:43.670000
CVE-2025-6678,0,0,015887ea893979c5601a9a5730f4adfb06aac901dd851eeda9fa3abff9762944,2025-06-26T18:57:43.670000
CVE-2025-6686,0,0,2b635e8aef7559f900fe86e696314f2ab0731706ef780da171d24f6e0ea08551,2025-07-03T15:13:53.147000
CVE-2025-6687,0,0,55c1c425791d4f8b717ba8f9c869de990dd6184feaa31c6ca5ae8d53b8407097,2025-07-03T15:13:53.147000
CVE-2025-6686,0,1,f7f48a047afe7ba6917b5b6f9718bcd1b2ceea4d6b927d051b780677faecb991,2025-07-08T13:51:15.403000
CVE-2025-6687,0,1,539b6bc666b3d8f7165f76a15394f1f82fca270b81ce85abf8ade35978b3fe59,2025-07-08T13:46:45.833000
CVE-2025-6688,0,0,5925361c4f277402b4d05594242f77bf2b7c8299cc751a0e160b50223b3f53a3,2025-07-02T17:49:42.750000
CVE-2025-6689,0,0,b71adc87473f2d5c0139a2109d4529a4db6e3f5403593540849455008b939a18,2025-06-30T18:38:48.477000
CVE-2025-6693,0,0,9be9763bb7fc997d64f91e352fcfdf0f938356018981543692fcb1e55b2868cf,2025-06-26T18:57:43.670000
@ -300560,7 +300598,7 @@ CVE-2025-6738,0,0,3259930ec98b59546eeaeace9fb84641bae60a8fe1ea462b5fb5b4147d4fd6
CVE-2025-6739,0,0,bd154751d866345fec59da65321a383a12e1d3bc94957e355ab825597d37c48a,2025-07-04T03:15:22.740000
CVE-2025-6740,0,0,4df025ce77d1adfe2573d12dc431280049a6a66b06d7c4a694ba8dc72df73175,2025-07-04T12:15:35.570000
CVE-2025-6743,0,0,1a2f8644f53e75d6c8b80fff15734043e2ec6a57d7ca239c2f4e32f989444480,2025-07-08T07:15:26.410000
CVE-2025-6744,1,1,b5f9cafc355fb33653432dc11abcd11bb57a79884e7e009d43a5e54dab2f595a,2025-07-08T10:15:22.947000
CVE-2025-6744,0,0,b5f9cafc355fb33653432dc11abcd11bb57a79884e7e009d43a5e54dab2f595a,2025-07-08T10:15:22.947000
CVE-2025-6746,0,0,2cee8b5f62f2740e58418e06d7d18549cb6c59f308feeb8d07ef0e27b444984f,2025-07-08T07:15:26.587000
CVE-2025-6748,0,0,7f8f18ce472108822cda61d00f4ec9b1169d30c9d958ea970ce7bf174900b6ff,2025-06-30T18:38:48.477000
CVE-2025-6749,0,0,d1c491f56475f9982f91a0af7dbfe7ca7d1db32da1110cdac506d65ba7fc1676,2025-06-30T18:38:48.477000
@ -300833,10 +300871,14 @@ CVE-2025-7168,0,0,fb880b5317c6035c05e262a96bd2de7e7adf297b4e6d918e4be4ba830aa911
CVE-2025-7169,0,0,184c902a0d97c4e02337c915d2da886f21abd036d6a49c2e82f628964ea5f387,2025-07-08T08:15:22.270000
CVE-2025-7170,0,0,d631825d5bab89ac42aa3b35d7a966fe06c83c27748d1e2260e5125e1237edd6,2025-07-08T09:15:22.540000
CVE-2025-7171,0,0,06a2f67a05d60ed4fd07ed9c6047f56a41f41014333d700280eee3959c419329,2025-07-08T09:15:23.017000
CVE-2025-7172,1,1,f41fecf7b2118461549a8a9d9d0a0be0da977c67a024b1cbd4b88f73a77b994a,2025-07-08T10:15:23.140000
CVE-2025-7173,1,1,6e0c73472c557bd1341bd35c16c4bea5f3973b49196db66ae55cebbd70d1caf8,2025-07-08T10:15:23.370000
CVE-2025-7174,1,1,6bc9e552f0f271a604fda837ba2f94bb6d920ef116b8a8d8ae4186082e519696,2025-07-08T11:15:31.717000
CVE-2025-7175,1,1,0efdf066dc3fd1e3eadc405c80607fa3a80dd3f56ce3f6d0f662297b052c8b8c,2025-07-08T11:15:31.920000
CVE-2025-7172,0,0,f41fecf7b2118461549a8a9d9d0a0be0da977c67a024b1cbd4b88f73a77b994a,2025-07-08T10:15:23.140000
CVE-2025-7173,0,0,6e0c73472c557bd1341bd35c16c4bea5f3973b49196db66ae55cebbd70d1caf8,2025-07-08T10:15:23.370000
CVE-2025-7174,0,0,6bc9e552f0f271a604fda837ba2f94bb6d920ef116b8a8d8ae4186082e519696,2025-07-08T11:15:31.717000
CVE-2025-7175,0,0,0efdf066dc3fd1e3eadc405c80607fa3a80dd3f56ce3f6d0f662297b052c8b8c,2025-07-08T11:15:31.920000
CVE-2025-7176,1,1,028a49e296cc1cca3ce5a3793def030c4d3852f9887bdc2e382ca1dfadda22cf,2025-07-08T12:15:23.560000
CVE-2025-7177,1,1,2795cde7504183e29a06098f73c38dd18411b4bb5c1f5ccf03a48faaac6cbd8f,2025-07-08T12:15:23.773000
CVE-2025-7178,1,1,99767d32ffc8786918433b712ca18f378937261e7ded47629c2a8958da607b5e,2025-07-08T13:15:33.940000
CVE-2025-7179,1,1,7704d4cc3a1b1c308eed2487d0a325882bce7f647059b92a4758e8fff3521c37,2025-07-08T13:15:34.487000
CVE-2025-7259,0,0,92aedb6a5e38fb030175a289364c754cf67f487a6a25e9d17c23717610f38507,2025-07-07T16:15:30.440000
CVE-2025-7327,0,0,f8b1188e4f7cc5573c9ecf71a12200117edf4fd74dc9f9fae96673aaeccbf801,2025-07-08T06:15:24.730000
CVE-2025-7346,0,0,cb21a649388e1e53857cfea094e0a78c37a218b32465f4276a51b680f561d62b,2025-07-08T08:15:22.460000

Can't render this file because it is too large.