Auto-Update: 2025-06-30T23:55:12.029609+00:00

This commit is contained in:
cad-safe-bot 2025-06-30 23:58:49 +00:00
parent fa4be88cad
commit ce51af7101
14 changed files with 991 additions and 142 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2012-6435",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2013-01-24T21:55:01.430",
"lastModified": "2025-04-11T00:51:21.963",
"lastModified": "2025-06-30T22:15:27.780",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that specifies a logic-execution stop and fault."
"value": "When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the CPU to stop logic execution and enter a fault state, a DoS can occur. This situation could cause loss of availability and a disruption of communication with other connected devices.\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
},
{
"lang": "es",
@ -17,6 +17,29 @@
],
"metrics": {
"cvssMetricV2": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"baseScore": 7.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
},
{
"source": "nvd@nist.gov",
"type": "Primary",
@ -44,8 +67,18 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -168,11 +201,24 @@
],
"references": [
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
]
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",

View File

@ -2,13 +2,13 @@
"id": "CVE-2012-6436",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2013-01-24T21:55:01.477",
"lastModified": "2025-04-11T00:51:21.963",
"lastModified": "2025-06-30T22:15:28.573",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows remote attackers to cause a denial of service (CPU crash and communication outage) via a malformed CIP packet."
"value": "The device does not properly validate the data being sent to the buffer. An attacker can send a malformed CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP, which creates a buffer overflow and causes the CPU to crash. Successful exploitation of this vulnerability could cause loss of availability and a disruption in communications with other connected devices.\n\n\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
},
{
"lang": "es",
@ -17,6 +17,29 @@
],
"metrics": {
"cvssMetricV2": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"baseScore": 7.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
},
{
"source": "nvd@nist.gov",
"type": "Primary",
@ -44,7 +67,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
@ -52,6 +75,16 @@
"value": "CWE-119"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
@ -168,11 +201,24 @@
],
"references": [
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
]
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",

View File

@ -2,13 +2,13 @@
"id": "CVE-2012-6437",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2013-01-24T21:55:01.523",
"lastModified": "2025-04-11T00:51:21.963",
"lastModified": "2025-06-30T22:15:28.747",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 do not properly perform authentication for Ethernet firmware updates, which allows remote attackers to execute arbitrary code via a Trojan horse update image."
"value": "The device does not properly authenticate users and the potential exists for a remote user to upload a new firmware image to the Ethernet card, whether it is a corrupt or legitimate firmware image. Successful exploitation of this vulnerability could cause loss of availability, integrity, and confidentiality and a disruption in communications with other connected devices.\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
},
{
"lang": "es",
@ -17,6 +17,29 @@
],
"metrics": {
"cvssMetricV2": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
},
{
"source": "nvd@nist.gov",
"type": "Primary",
@ -44,7 +67,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
@ -52,6 +75,16 @@
"value": "CWE-287"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
@ -168,11 +201,24 @@
],
"references": [
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
]
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",

View File

@ -2,13 +2,13 @@
"id": "CVE-2012-6438",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2013-01-24T21:55:01.603",
"lastModified": "2025-04-11T00:51:21.963",
"lastModified": "2025-06-30T22:15:28.920",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows remote attackers to cause a denial of service (NIC crash and communication outage) via a malformed CIP packet."
"value": "The device does not properly validate the data being sent to the buffer. An attacker can send a malformed CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP, which creates a buffer overflow and causes the NIC to crash. Successful exploitation of this vulnerability could cause loss of availability and a disruption in communications with other connected devices.\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
},
{
"lang": "es",
@ -17,6 +17,29 @@
],
"metrics": {
"cvssMetricV2": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"baseScore": 7.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
},
{
"source": "nvd@nist.gov",
"type": "Primary",
@ -44,7 +67,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
@ -52,6 +75,16 @@
"value": "CWE-119"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
@ -168,11 +201,24 @@
],
"references": [
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
]
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",

View File

@ -2,13 +2,13 @@
"id": "CVE-2012-6439",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2013-01-24T21:55:01.650",
"lastModified": "2025-04-11T00:51:21.963",
"lastModified": "2025-06-30T22:15:29.083",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that modifies the (1) configuration or (2) network parameters."
"value": "When an affected \nproduct receives a valid CIP message from an unauthorized or unintended \nsource to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port \n44818/UDP that changes the product\u2019s configuration and network \nparameters, a DoS condition can occur. This situation could cause loss \nof availability and a disruption of communication with other connected \ndevices.\u00a0\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
},
{
"lang": "es",
@ -17,6 +17,29 @@
],
"metrics": {
"cvssMetricV2": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
"baseScore": 8.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 7.8,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
},
{
"source": "nvd@nist.gov",
"type": "Primary",
@ -44,8 +67,18 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -167,6 +200,10 @@
}
],
"references": [
{
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
"source": "ics-cert@hq.dhs.gov",
@ -174,6 +211,18 @@
"US Government Resource"
]
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",

View File

@ -2,13 +2,13 @@
"id": "CVE-2012-6440",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2013-01-24T21:55:01.697",
"lastModified": "2025-04-11T00:51:21.963",
"lastModified": "2025-06-30T22:15:29.253",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The web-server password-authentication functionality in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows man-in-the-middle attackers to conduct replay attacks via HTTP traffic."
"value": "The Web server password authentication mechanism used by the products is vulnerable to a MitM and Replay attack. Successful exploitation of this vulnerability will allow unauthorized access of the product\u2019s Web server to view and alter product configuration and diagnostics information.\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
},
{
"lang": "es",
@ -17,6 +17,29 @@
],
"metrics": {
"cvssMetricV2": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
},
{
"source": "nvd@nist.gov",
"type": "Primary",
@ -44,7 +67,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
@ -52,6 +75,16 @@
"value": "CWE-287"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
@ -168,11 +201,24 @@
],
"references": [
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
]
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",

View File

@ -2,13 +2,13 @@
"id": "CVE-2012-6441",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2013-01-24T21:55:01.727",
"lastModified": "2025-04-11T00:51:21.963",
"lastModified": "2025-06-30T22:15:29.420",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to obtain sensitive information via a crafted CIP packet."
"value": "An information exposure of confidential information results when the device receives a specially crafted CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP. Successful exploitation of this vulnerability could cause loss of confidentiality.\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
},
{
"lang": "es",
@ -17,6 +17,29 @@
],
"metrics": {
"cvssMetricV2": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
},
{
"source": "nvd@nist.gov",
"type": "Primary",
@ -44,7 +67,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
@ -52,6 +75,16 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
@ -168,11 +201,24 @@
],
"references": [
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
]
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",

View File

@ -2,13 +2,13 @@
"id": "CVE-2012-6442",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2013-01-24T21:55:01.773",
"lastModified": "2025-04-11T00:51:21.963",
"lastModified": "2025-06-30T22:15:29.587",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that specifies a reset."
"value": "When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the product to reset, a DoS can occur. This situation could cause loss of availability and a disruption of communication with other connected devices.\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
},
{
"lang": "es",
@ -17,6 +17,29 @@
],
"metrics": {
"cvssMetricV2": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"baseScore": 7.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
},
{
"source": "nvd@nist.gov",
"type": "Primary",
@ -44,8 +67,18 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -268,13 +301,24 @@
],
"references": [
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Broken Link",
"Third Party Advisory",
"US Government Resource"
]
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=27862",

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-6554",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-06-30T22:15:29.873",
"lastModified": "2025-06-30T22:15:29.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/427663123",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6930",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-30T22:15:30.010",
"lastModified": "2025-06-30T22:15:30.010",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in PHPGurukul Zoo Management System 2.1. Affected is an unknown function of the file /admin/manage-foreigners-ticket.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/100",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.314442",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.314442",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.605579",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,164 @@
{
"id": "CVE-2025-6931",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-30T23:15:21.863",
"lastModified": "2025-06-30T23:15:21.863",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in D-Link DCS-6517 and DCS-7517 up to 2.02.0. Affected by this vulnerability is the function generate_pass_from_mac of the file /bin/httpd of the component Root Password Generation Handler. The manipulation leads to insufficient entropy. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"baseScore": 2.6,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-330"
},
{
"lang": "en",
"value": "CWE-331"
}
]
}
],
"references": [
{
"url": "http://cdn2.v50to.cc/dlink/DCS-6517B1_FW_v2.02.01/report_3.pdf",
"source": "cna@vuldb.com"
},
{
"url": "http://cdn2.v50to.cc/dlink/DCS-7517_B1_FW_v2.02.01/report_1.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.314443",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.314443",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.605592",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.605593",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.605596",
"source": "cna@vuldb.com"
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,152 @@
{
"id": "CVE-2025-6932",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-30T23:15:22.103",
"lastModified": "2025-06-30T23:15:22.103",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in D-Link DCS-7517 up to 2.02.0. This affects the function g_F_n_GenPassForQlync of the file /bin/httpd of the component Qlync Password Generation Handler. The manipulation leads to use of hard-coded password. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"baseScore": 2.6,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-255"
},
{
"lang": "en",
"value": "CWE-259"
}
]
}
],
"references": [
{
"url": "http://cdn2.v50to.cc/dlink/DCS-7517_B1_FW_v2.02.01/report_2.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.314445",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.314445",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.605595",
"source": "cna@vuldb.com"
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-30T22:00:11.053768+00:00
2025-06-30T23:55:12.029609+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-30T21:15:32.853000+00:00
2025-06-30T23:15:22.103000+00:00
```
### Last Data Feed Release
@ -33,53 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
299918
299922
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `4`
- [CVE-2025-32462](CVE-2025/CVE-2025-324xx/CVE-2025-32462.json) (`2025-06-30T21:15:30.080`)
- [CVE-2025-32463](CVE-2025/CVE-2025-324xx/CVE-2025-32463.json) (`2025-06-30T21:15:30.257`)
- [CVE-2025-49493](CVE-2025/CVE-2025-494xx/CVE-2025-49493.json) (`2025-06-30T20:15:25.060`)
- [CVE-2025-49520](CVE-2025/CVE-2025-495xx/CVE-2025-49520.json) (`2025-06-30T21:15:30.913`)
- [CVE-2025-49521](CVE-2025/CVE-2025-495xx/CVE-2025-49521.json) (`2025-06-30T21:15:31.063`)
- [CVE-2025-52491](CVE-2025/CVE-2025-524xx/CVE-2025-52491.json) (`2025-06-30T20:15:25.233`)
- [CVE-2025-52901](CVE-2025/CVE-2025-529xx/CVE-2025-52901.json) (`2025-06-30T20:15:25.390`)
- [CVE-2025-52995](CVE-2025/CVE-2025-529xx/CVE-2025-52995.json) (`2025-06-30T20:15:25.540`)
- [CVE-2025-52996](CVE-2025/CVE-2025-529xx/CVE-2025-52996.json) (`2025-06-30T20:15:25.690`)
- [CVE-2025-52997](CVE-2025/CVE-2025-529xx/CVE-2025-52997.json) (`2025-06-30T20:15:25.847`)
- [CVE-2025-53004](CVE-2025/CVE-2025-530xx/CVE-2025-53004.json) (`2025-06-30T21:15:31.563`)
- [CVE-2025-6929](CVE-2025/CVE-2025-69xx/CVE-2025-6929.json) (`2025-06-30T21:15:32.853`)
- [CVE-2025-6554](CVE-2025/CVE-2025-65xx/CVE-2025-6554.json) (`2025-06-30T22:15:29.873`)
- [CVE-2025-6930](CVE-2025/CVE-2025-69xx/CVE-2025-6930.json) (`2025-06-30T22:15:30.010`)
- [CVE-2025-6931](CVE-2025/CVE-2025-69xx/CVE-2025-6931.json) (`2025-06-30T23:15:21.863`)
- [CVE-2025-6932](CVE-2025/CVE-2025-69xx/CVE-2025-6932.json) (`2025-06-30T23:15:22.103`)
### CVEs modified in the last Commit
Recently modified CVEs: `22`
Recently modified CVEs: `8`
- [CVE-2020-35509](CVE-2020/CVE-2020-355xx/CVE-2020-35509.json) (`2025-06-30T21:15:28.677`)
- [CVE-2022-36350](CVE-2022/CVE-2022-363xx/CVE-2022-36350.json) (`2025-06-30T21:15:29.737`)
- [CVE-2023-28902](CVE-2023/CVE-2023-289xx/CVE-2023-28902.json) (`2025-06-30T20:15:22.727`)
- [CVE-2023-28903](CVE-2023/CVE-2023-289xx/CVE-2023-28903.json) (`2025-06-30T20:15:23.040`)
- [CVE-2023-28904](CVE-2023/CVE-2023-289xx/CVE-2023-28904.json) (`2025-06-30T20:15:23.153`)
- [CVE-2023-28905](CVE-2023/CVE-2023-289xx/CVE-2023-28905.json) (`2025-06-30T20:15:23.260`)
- [CVE-2023-28906](CVE-2023/CVE-2023-289xx/CVE-2023-28906.json) (`2025-06-30T20:15:23.370`)
- [CVE-2023-28907](CVE-2023/CVE-2023-289xx/CVE-2023-28907.json) (`2025-06-30T20:15:23.477`)
- [CVE-2023-28908](CVE-2023/CVE-2023-289xx/CVE-2023-28908.json) (`2025-06-30T20:15:23.580`)
- [CVE-2023-28909](CVE-2023/CVE-2023-289xx/CVE-2023-28909.json) (`2025-06-30T20:15:23.697`)
- [CVE-2023-47310](CVE-2023/CVE-2023-473xx/CVE-2023-47310.json) (`2025-06-30T20:15:23.810`)
- [CVE-2024-53621](CVE-2024/CVE-2024-536xx/CVE-2024-53621.json) (`2025-06-30T20:15:24.383`)
- [CVE-2025-45333](CVE-2025/CVE-2025-453xx/CVE-2025-45333.json) (`2025-06-30T21:15:30.427`)
- [CVE-2025-49175](CVE-2025/CVE-2025-491xx/CVE-2025-49175.json) (`2025-06-30T20:15:24.553`)
- [CVE-2025-49176](CVE-2025/CVE-2025-491xx/CVE-2025-49176.json) (`2025-06-30T20:15:24.690`)
- [CVE-2025-49178](CVE-2025/CVE-2025-491xx/CVE-2025-49178.json) (`2025-06-30T21:15:30.693`)
- [CVE-2025-49179](CVE-2025/CVE-2025-491xx/CVE-2025-49179.json) (`2025-06-30T20:15:24.817`)
- [CVE-2025-49180](CVE-2025/CVE-2025-491xx/CVE-2025-49180.json) (`2025-06-30T20:15:24.940`)
- [CVE-2025-6490](CVE-2025/CVE-2025-64xx/CVE-2025-6490.json) (`2025-06-30T20:15:26.000`)
- [CVE-2025-6494](CVE-2025/CVE-2025-64xx/CVE-2025-6494.json) (`2025-06-30T20:15:26.160`)
- [CVE-2025-6667](CVE-2025/CVE-2025-66xx/CVE-2025-6667.json) (`2025-06-30T21:15:32.063`)
- [CVE-2025-6916](CVE-2025/CVE-2025-69xx/CVE-2025-6916.json) (`2025-06-30T21:15:32.730`)
- [CVE-2012-6435](CVE-2012/CVE-2012-64xx/CVE-2012-6435.json) (`2025-06-30T22:15:27.780`)
- [CVE-2012-6436](CVE-2012/CVE-2012-64xx/CVE-2012-6436.json) (`2025-06-30T22:15:28.573`)
- [CVE-2012-6437](CVE-2012/CVE-2012-64xx/CVE-2012-6437.json) (`2025-06-30T22:15:28.747`)
- [CVE-2012-6438](CVE-2012/CVE-2012-64xx/CVE-2012-6438.json) (`2025-06-30T22:15:28.920`)
- [CVE-2012-6439](CVE-2012/CVE-2012-64xx/CVE-2012-6439.json) (`2025-06-30T22:15:29.083`)
- [CVE-2012-6440](CVE-2012/CVE-2012-64xx/CVE-2012-6440.json) (`2025-06-30T22:15:29.253`)
- [CVE-2012-6441](CVE-2012/CVE-2012-64xx/CVE-2012-6441.json) (`2025-06-30T22:15:29.420`)
- [CVE-2012-6442](CVE-2012/CVE-2012-64xx/CVE-2012-6442.json) (`2025-06-30T22:15:29.587`)
## Download and Usage

View File

@ -57446,14 +57446,14 @@ CVE-2012-6431,0,0,f9bf3773fd3937f340256f5255073a0415d143b047bc23e359f277763c1686
CVE-2012-6432,0,0,37418c5df2e8fa504b5f295c6e6ff6dcb297511e9c9502a0fa5e5029edcda130,2025-04-11T00:51:21.963000
CVE-2012-6433,0,0,cd2af2c553ff35d80e0dbc77965c8f784c415009a9d470348d9d77994136cf86,2025-04-11T00:51:21.963000
CVE-2012-6434,0,0,fbeec6990bd772432e2e71e1a9492bb9886707d22054c3c0ae58c077051d431c,2025-04-11T00:51:21.963000
CVE-2012-6435,0,0,f07df8b3e30ef8938758d97118d32602119c82945dd73c2a9fc4b969fef2ac07,2025-04-11T00:51:21.963000
CVE-2012-6436,0,0,de23458697d4fab6b7401bb325013f1c69567c940b53f52df0a0d3e159516403,2025-04-11T00:51:21.963000
CVE-2012-6437,0,0,98724a8a0e1c04730c6eca538a6df32dc8ee38eec7e7bc2421c9b58ebd14490c,2025-04-11T00:51:21.963000
CVE-2012-6438,0,0,1de9302263ed885a140c18ec2e22d151d747a61dbb58992c62279e8a2334339a,2025-04-11T00:51:21.963000
CVE-2012-6439,0,0,e2dd9b5d85947872d4e2dbe13ee2006e7d110c68329f539d36fe50d4b553ac59,2025-04-11T00:51:21.963000
CVE-2012-6440,0,0,91ff0575260d076092b6eec49176ad60cb489bbd5c4821c898814905e3746b0c,2025-04-11T00:51:21.963000
CVE-2012-6441,0,0,87baa0b56ba3b468abca7d919996bc66c4d9783f0a778e505d7f24328f48c997,2025-04-11T00:51:21.963000
CVE-2012-6442,0,0,fca3216eba1ad527f84b17efa19fe6be76dafb83db0f837677a8799cb0a26abf,2025-04-11T00:51:21.963000
CVE-2012-6435,0,1,aa91df9bbe0cc5c9f10fbf828681df298051715a9691c308764a7ced54f65e6f,2025-06-30T22:15:27.780000
CVE-2012-6436,0,1,fc2212dcb6612127a4b03db13b98d85155a48ec49e432c327fe341665d4a19ad,2025-06-30T22:15:28.573000
CVE-2012-6437,0,1,3d27ffbcf9500aa113b6d032b4eab976bcf9eabb5dd9ead5e9bff901ee9a7aea,2025-06-30T22:15:28.747000
CVE-2012-6438,0,1,4b10aa7c58bb17944152bdb5079bcf28d17ff7c6dc955fc1d73293e82ec04c24,2025-06-30T22:15:28.920000
CVE-2012-6439,0,1,d4c7b9035a6d41922114c21a6d4e3d581379a68725e2f581af203977af9d33e2,2025-06-30T22:15:29.083000
CVE-2012-6440,0,1,a825b550e14ccaed8ac58c05306eb1d263f110955ed73b1b6d750e088485b7f8,2025-06-30T22:15:29.253000
CVE-2012-6441,0,1,61f88e731b65e0dbf53662dd7fb6d5def697749d3636c699d31e296655afb649,2025-06-30T22:15:29.420000
CVE-2012-6442,0,1,c9e575c087416ae26f4a8dd244b7a61781ef407192737a05885091fbb3d23f5c,2025-06-30T22:15:29.587000
CVE-2012-6447,0,0,d8b7b05a4f49e6c19b510919618f54c83ac04a7915e9bb0d8510ac66706f17ac,2025-04-11T00:51:21.963000
CVE-2012-6448,0,0,2243388c4496e1e61ae0d4e99ca0d79c6880d6e441f02575c815a15d30670ddf,2024-11-21T01:46:08.417000
CVE-2012-6449,0,0,961d86909d9d23620b7377999d59e8dfe0a18ae07d5b9ea9ddb1797b0876df8f,2024-11-21T01:46:08.560000
@ -158530,7 +158530,7 @@ CVE-2020-35505,0,0,07926c3e565d7dd83903b653432ce60990fe21d4454fc9275b8104ad13486
CVE-2020-35506,0,0,33b93d1cfd445ebb63899c3d2e38e8086b8638bcd650661e9ccbc15894ee4177,2024-11-21T05:27:27.137000
CVE-2020-35507,0,0,57f9e096707a4d8fbf0c5ce71044d1779dd71bddba62f87e19b804a5c62f4e46,2024-11-21T05:27:27.300000
CVE-2020-35508,0,0,0ac772d7bb15681ec0c37ccf1b311d39c30c04fcc3e8f27e410767c462c713e1,2024-11-21T05:27:27.440000
CVE-2020-35509,0,1,6c3ee24074ec85aaa1f826b924b015e2766d19611a7996dee99b84d38b17d4e9,2025-06-30T21:15:28.677000
CVE-2020-35509,0,0,6c3ee24074ec85aaa1f826b924b015e2766d19611a7996dee99b84d38b17d4e9,2025-06-30T21:15:28.677000
CVE-2020-3551,0,0,ac308a65f340964772685ec9d81937551d12cd26ed99aa7e40f2694ea6998e0c,2024-11-21T05:31:17.880000
CVE-2020-35510,0,0,16e0bd865e221548e20364aaa480d9778ef185c841da4ad41748a28cbda05854,2024-11-21T05:27:27.853000
CVE-2020-35511,0,0,27d1351cc643251d551683a18539bd127c4c78d6c58a3938ed06f237412fc471,2024-11-21T05:27:27.993000
@ -203926,7 +203926,7 @@ CVE-2022-36347,0,0,628ac091df1c2a432a0e4f7581a4ccd6a4859ab334a5b54b59cbd0418556f
CVE-2022-36348,0,0,1f79824737439901c4f8f9f9f4ce7eed2cfbbd40d643d818699b5cf50eb0deb8,2024-11-21T07:12:50.370000
CVE-2022-36349,0,0,a3fa3cb0b5fc85bc556e37f975bd9649b9efac7d704cd2674b8f7b39773255f2,2024-11-21T07:12:50.490000
CVE-2022-3635,0,0,64f6686e08b18052842a179b00afa8dc41eb032d8e996d0a2cfb328ed2aa1d42,2024-11-21T07:19:55.693000
CVE-2022-36350,0,1,a87f2137fa4a8c12f26f545b70284d091e96a599fb28ce27af73cd65c27983dc,2025-06-30T21:15:29.737000
CVE-2022-36350,0,0,a87f2137fa4a8c12f26f545b70284d091e96a599fb28ce27af73cd65c27983dc,2025-06-30T21:15:29.737000
CVE-2022-36351,0,0,6754c6ac921c3e6af1467347dbae2ff4154a44019342fa38a2854ce403bcdc23,2024-11-21T07:12:50.737000
CVE-2022-36352,0,0,a484bafc91f0425c1e845ec36afba468fbcb1ec25874b9be5a68ab2eb479b966,2024-11-21T07:12:50.990000
CVE-2022-36353,0,0,446597a1ad2a9437f2f821b1192ca985159829495b8dac55dd38c7ec7909781c,2025-05-28T19:15:29.720000
@ -224156,14 +224156,14 @@ CVE-2023-28898,0,0,5063bb8f2aaf43e04f9c3806d252ca940deaa91465538b7a1dc8c97290879
CVE-2023-28899,0,0,ace3616b7ed13c6232f5dbcd338861a0a3eb162cd24c045e8fb898537dda4273,2024-11-21T07:56:14.463000
CVE-2023-28900,0,0,95474310488f87be0cee5d16dabb5ad2dc651b5bd222f5c1e223db09f941ca4c,2024-11-21T07:56:14.617000
CVE-2023-28901,0,0,7b7a3ce35e98d750456768add88af488531e7343d46c7819972ceb6377506317,2024-11-21T07:56:14.760000
CVE-2023-28902,0,1,3698c5da524da451152a768ad137f780fe6519739ffb59ac217047c14cc22d9f,2025-06-30T20:15:22.727000
CVE-2023-28903,0,1,a6525a6893f041620d23fa0c4862e1d586dfbd758d374e9290b684181659a825,2025-06-30T20:15:23.040000
CVE-2023-28904,0,1,48f8e76975f7e65495c0111133028b95935821e864df3784b425f692e0d6ff3d,2025-06-30T20:15:23.153000
CVE-2023-28905,0,1,2a41b78fed081aa4dd910eae6bff92152776f88fc974b60efcceb8c51bd0dbe4,2025-06-30T20:15:23.260000
CVE-2023-28906,0,1,845656aec921e8c72c3bd5595314345ce6093c7fb9158a7d069a24e6ba7032a4,2025-06-30T20:15:23.370000
CVE-2023-28907,0,1,bfb1283518cee7a3f4e84dd875cc816f4df6ab56c56d5d2ac65a8259c2d10ad0,2025-06-30T20:15:23.477000
CVE-2023-28908,0,1,3ae89c013f86207254bfeb8ad7d472bb4053f4a7475ebf7c94cb08c11a344cd3,2025-06-30T20:15:23.580000
CVE-2023-28909,0,1,2e46b8aeecfd78ab096387b0b66255d017b14fbf3d86b885daf7858e5f5468cf,2025-06-30T20:15:23.697000
CVE-2023-28902,0,0,3698c5da524da451152a768ad137f780fe6519739ffb59ac217047c14cc22d9f,2025-06-30T20:15:22.727000
CVE-2023-28903,0,0,a6525a6893f041620d23fa0c4862e1d586dfbd758d374e9290b684181659a825,2025-06-30T20:15:23.040000
CVE-2023-28904,0,0,48f8e76975f7e65495c0111133028b95935821e864df3784b425f692e0d6ff3d,2025-06-30T20:15:23.153000
CVE-2023-28905,0,0,2a41b78fed081aa4dd910eae6bff92152776f88fc974b60efcceb8c51bd0dbe4,2025-06-30T20:15:23.260000
CVE-2023-28906,0,0,845656aec921e8c72c3bd5595314345ce6093c7fb9158a7d069a24e6ba7032a4,2025-06-30T20:15:23.370000
CVE-2023-28907,0,0,bfb1283518cee7a3f4e84dd875cc816f4df6ab56c56d5d2ac65a8259c2d10ad0,2025-06-30T20:15:23.477000
CVE-2023-28908,0,0,3ae89c013f86207254bfeb8ad7d472bb4053f4a7475ebf7c94cb08c11a344cd3,2025-06-30T20:15:23.580000
CVE-2023-28909,0,0,2e46b8aeecfd78ab096387b0b66255d017b14fbf3d86b885daf7858e5f5468cf,2025-06-30T20:15:23.697000
CVE-2023-2891,0,0,e3feeab0619825c1073733808071dc45223397d726b3177896edea0ff0a9af90,2024-11-21T07:59:30.437000
CVE-2023-28910,0,0,831a9a3917b92f12c9ff1a823e73e23e99bcb8326fb106ce23c3adc8ffc2b4a8,2025-06-30T18:38:23.493000
CVE-2023-28911,0,0,4fbf717739725399adb061643a4809f6a5707ab599050b12df64418ccd90aa37,2025-06-30T18:38:23.493000
@ -238172,7 +238172,7 @@ CVE-2023-47307,0,0,112c4fcd2316630545c0b8214cf0e27b8ce26f6bb0e9c99277c68ca8f2b87
CVE-2023-47308,0,0,7d5ff54c309fa19adc9e793bda18cb0b740ceb6c9d3315a532ce40f5c4fd1165,2024-11-21T08:30:07.870000
CVE-2023-47309,0,0,24c2011ecb6d7db56739e87951b446acfc2502ed2d4ef1d44fda31d0f3b47ac3,2024-11-21T08:30:08.030000
CVE-2023-4731,0,0,d05232eed0c052dd2a1d5ec6b0be8f9b495ae5a2bd0ca62433c506bf8c986847,2025-01-15T16:31:04.880000
CVE-2023-47310,0,1,9f4a8303777bbd11cb5a68087188980834a4764dbf22f061cfecf0d1fb902168,2025-06-30T20:15:23.810000
CVE-2023-47310,0,0,9f4a8303777bbd11cb5a68087188980834a4764dbf22f061cfecf0d1fb902168,2025-06-30T20:15:23.810000
CVE-2023-47311,0,0,b95c9f4ee7ff54f1db61b336a25ed1ed49149c6e779141e5eaa4ce520fe1e575,2024-11-21T08:30:08.283000
CVE-2023-47312,0,0,42944cc44c110aadfec0e3ea54804d471daddba94144037ba9fb032325e0ea39,2024-11-21T08:30:08.460000
CVE-2023-47313,0,0,263f2c0543bd5ec30e1b2e45eebc7a95f0ea67b86f319d05fa2226679d75307f,2024-11-21T08:30:08.597000
@ -276001,7 +276001,7 @@ CVE-2024-53617,0,0,dd2ee5869a76723244988f189f5e4e219fcd77588c7888e87da2897c111b3
CVE-2024-53619,0,0,7e8e9692dc22af705d23ae8b792483811e548f5452e797f9099331427eac5db0,2024-11-26T20:15:33.880000
CVE-2024-5362,0,0,65cc93fbb06de51acd392fcf91df16bbed3865e6bb98fea60125a3f2dc4dd426,2025-02-10T13:55:46.317000
CVE-2024-53620,0,0,0ec00be95852a0998a14f46021597d58d0eefdd89109b46c5f804a1cf687bc07,2024-11-26T20:15:34.050000
CVE-2024-53621,0,1,79b3eabb799917f8b87dec2d6a3ef730878c11efbed4755db01cae8b2c352183,2025-06-30T20:15:24.383000
CVE-2024-53621,0,0,79b3eabb799917f8b87dec2d6a3ef730878c11efbed4755db01cae8b2c352183,2025-06-30T20:15:24.383000
CVE-2024-53623,0,0,531ddce100784ec8b317b297b660a260e518e8b80f64012824aac6bf3d8289e3,2024-12-02T20:15:07.917000
CVE-2024-5363,0,0,1a1d04dd62a3d9ceb936776096c694704c071db758e0c336b93f44ac203c6bde,2025-02-10T14:41:03.540000
CVE-2024-53635,0,0,7a67e9e0d9d71b612bd6cfd95f53056a7f326cdca18b0bdba544dd72fd3cefe4,2025-04-04T15:39:01.230000
@ -293125,8 +293125,8 @@ CVE-2025-32459,0,0,dae6c2ac44f0e8d47f2cd1bfa34e1b0071873a215a44a6369412520c6ea64
CVE-2025-3246,0,0,d943818b43557c9519758b844725afa009508b574d2bbdf1c927d75056c761a3,2025-04-21T14:23:45.950000
CVE-2025-32460,0,0,16cc364f1c655bf6f21d50384a646311718edc25ee850ac035bf3b1975d34030,2025-04-09T20:02:41.860000
CVE-2025-32461,0,0,8bce56f6863b74eaac27069424b18b802ee4aeb8905aa3153fdbbd924c0604dc,2025-04-09T20:02:41.860000
CVE-2025-32462,1,1,a309ececf239aee95a89125e1696e62b0fc00af3b051db9b1cd63d6a014410bc,2025-06-30T21:15:30.080000
CVE-2025-32463,1,1,e2bcba3bbd676b15a73d5a9dbee641cdb1f40c7ff5ce9acdf12cca8c8e66d0d9,2025-06-30T21:15:30.257000
CVE-2025-32462,0,0,a309ececf239aee95a89125e1696e62b0fc00af3b051db9b1cd63d6a014410bc,2025-06-30T21:15:30.080000
CVE-2025-32463,0,0,e2bcba3bbd676b15a73d5a9dbee641cdb1f40c7ff5ce9acdf12cca8c8e66d0d9,2025-06-30T21:15:30.257000
CVE-2025-32464,0,0,d585900889b901117e0fe728cc5e64b12123c28db643e71ecaab58b67603729d,2025-04-23T22:15:15.460000
CVE-2025-32465,0,0,18f0254fcddc6f93884de750d3f2429ec4adc6fe5d4e9076904035e514a09681,2025-06-12T16:06:20.180000
CVE-2025-32466,0,0,d6dc52d19056c6857b8d7b1ad7b39f71f723d971a207e33753f74fea4bed0bab,2025-06-12T16:06:20.180000
@ -295921,7 +295921,7 @@ CVE-2025-45322,0,0,bd98baac9032c4924e89f536321099d3c4e9b0a26b0e91693b82dcae0f7fc
CVE-2025-4533,0,0,958714e8219e4b36bf6a5171f1844fbafd960204dc55ae1eaffcf3377f047967,2025-05-12T17:32:32.760000
CVE-2025-45331,0,0,1a763087f3a9266aa4ad598d9cc797aba7ebe6d738e262c7bb0a83be881654a7,2025-06-24T16:15:28.007000
CVE-2025-45332,0,0,3e680282347d513ad76d880bfdd241726c33a42cd9243ea852e7ec50a8a70a04,2025-06-26T18:57:43.670000
CVE-2025-45333,0,1,45594321e39ae2977f3091895d155d4678d0aee4381745d3aacbb14cd19adaca,2025-06-30T21:15:30.427000
CVE-2025-45333,0,0,45594321e39ae2977f3091895d155d4678d0aee4381745d3aacbb14cd19adaca,2025-06-30T21:15:30.427000
CVE-2025-4534,0,0,d56048b96631b6a170c2f4a1ae209f80a8905f2c01c2315ddf151590a444fbdb,2025-05-12T17:32:32.760000
CVE-2025-45343,0,0,7615694706f3e006934d6364d7caac354737a6562145f3bc3ab74518e76c62f3,2025-06-03T15:36:32.347000
CVE-2025-4535,0,0,211c420ea7fc40b2c6369c81b50b72179abd6b1518746dfb87b4fb36af845bbb,2025-05-12T17:32:32.760000
@ -297860,13 +297860,13 @@ CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa
CVE-2025-49163,0,0,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000
CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000
CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000
CVE-2025-49175,0,1,bc48898aa22840d684e986dd4bc99123d118318d12fcdde1f78c0811c7f9da52,2025-06-30T20:15:24.553000
CVE-2025-49176,0,1,7c8e3298f5c5daf34fd87a5b2093060a65cb032351d81042db8ee9f2aaa6d551,2025-06-30T20:15:24.690000
CVE-2025-49175,0,0,bc48898aa22840d684e986dd4bc99123d118318d12fcdde1f78c0811c7f9da52,2025-06-30T20:15:24.553000
CVE-2025-49176,0,0,7c8e3298f5c5daf34fd87a5b2093060a65cb032351d81042db8ee9f2aaa6d551,2025-06-30T20:15:24.690000
CVE-2025-49177,0,0,88fe85ebfb311cc7851d290d91c8e67844d99ab06620a758f4cae9a3c93ed2ef,2025-06-30T10:15:25.913000
CVE-2025-49178,0,1,2977b66486df3bf07a30aa6a0bfb1cefd659d07df5857968bf6e6aab4abd4148,2025-06-30T21:15:30.693000
CVE-2025-49179,0,1,690955eeef8fc1b93cd649b8d87bd4128d4338f5aa14dc011f7c01904dc55014,2025-06-30T20:15:24.817000
CVE-2025-49178,0,0,2977b66486df3bf07a30aa6a0bfb1cefd659d07df5857968bf6e6aab4abd4148,2025-06-30T21:15:30.693000
CVE-2025-49179,0,0,690955eeef8fc1b93cd649b8d87bd4128d4338f5aa14dc011f7c01904dc55014,2025-06-30T20:15:24.817000
CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000
CVE-2025-49180,0,1,e9711ad3588c97661db2e1f474cb48105c3aa995cfcc9886fec475a3e87c02d2,2025-06-30T20:15:24.940000
CVE-2025-49180,0,0,e9711ad3588c97661db2e1f474cb48105c3aa995cfcc9886fec475a3e87c02d2,2025-06-30T20:15:24.940000
CVE-2025-49181,0,0,65f8ea01de63d019d8688de775c40b302b8c0b1e44c040e53e46324e69435218,2025-06-12T16:06:20.180000
CVE-2025-49182,0,0,8adc8833944dbbffb6c925bafc811eee2574582f2d7b7b09537e334080770141,2025-06-13T09:15:20.130000
CVE-2025-49183,0,0,c9c3ab65e477d8e9a4d5c9adaf45822d49f0873835d0971680386eb894e72562,2025-06-12T16:06:20.180000
@ -298057,15 +298057,15 @@ CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb
CVE-2025-4948,0,0,0e7df54c260456a30951ec3ca271c8ecd68713b1dbf742cd867d5b3aa598f5dd,2025-06-17T12:15:27.520000
CVE-2025-49487,0,0,f1f07e31d2426bd898f1c4797310a5283aec7c5c600ab98cdf9e862e3d719d19,2025-06-17T20:50:23.507000
CVE-2025-4949,0,0,0316997b060f0791f7006e3582f42d4352e21f331c0768bafb1b692dffdd3405,2025-06-17T14:10:34.853000
CVE-2025-49493,1,1,2d0b0740561cb3194fdbcb5d8c713250dba5d8716cc7ec42f02017fd586f54c8,2025-06-30T20:15:25.060000
CVE-2025-49493,0,0,2d0b0740561cb3194fdbcb5d8c713250dba5d8716cc7ec42f02017fd586f54c8,2025-06-30T20:15:25.060000
CVE-2025-49507,0,0,8df57474dbf672acfe3170fcfeb7ba8c285d0e6636e6db25f644b19e631f2cda,2025-06-12T16:06:39.330000
CVE-2025-49508,0,0,04e385c54571a60ffb676472b30653696331e96ca9c4d7f0b4a42af7ae744aa9,2025-06-17T20:50:23.507000
CVE-2025-49509,0,0,83d7c029291217af9a97963b6a105646b66e999b31aeea3bf105eeb0ecb2ab96,2025-06-12T16:06:39.330000
CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000
CVE-2025-49510,0,0,3bb8122e36ad249db39449b81c1d9bb5005e0826a2addc079025211cebc0dc64,2025-06-12T16:06:39.330000
CVE-2025-49511,0,0,5857ce4f5934ac8d4eab419d1a69fa9027dcf280ff9a1fb08e4e3e1a5703ab2f,2025-06-12T16:06:39.330000
CVE-2025-49520,1,1,cb8826b22300f5a9d2eae9ca5dafc15b1f5e0f8306ced606515beea3acf195ef,2025-06-30T21:15:30.913000
CVE-2025-49521,1,1,8d9931f59dc1f8590f74fb0429e8ba8edb007bf2a0a1c9740d850475b0fd0bb7,2025-06-30T21:15:31.063000
CVE-2025-49520,0,0,cb8826b22300f5a9d2eae9ca5dafc15b1f5e0f8306ced606515beea3acf195ef,2025-06-30T21:15:30.913000
CVE-2025-49521,0,0,8d9931f59dc1f8590f74fb0429e8ba8edb007bf2a0a1c9740d850475b0fd0bb7,2025-06-30T21:15:31.063000
CVE-2025-4954,0,0,1ec01516c4567931b4ffc24e86d8b1eee9006bb52ce75acce1cd554027fb1f48,2025-06-12T16:06:39.330000
CVE-2025-49549,0,0,d51ae214ec023b9fbf2d300a776160828d2a71b7300d33bc04b291b25e1ecd5e,2025-06-26T18:57:43.670000
CVE-2025-4955,0,0,85a93e6cc9d76b6eb96cac66d66bf9a676c7375a6a733a4a5f80ea99e88eb438,2025-06-18T19:15:22.137000
@ -298516,7 +298516,7 @@ CVE-2025-52486,0,0,141d3cdd89e3d8b09e19fb7d7dfc50e25ac40afc5c2dd413dd0730327594f
CVE-2025-52487,0,0,7cd2bd74a4137e25655cda69485a3b65bad2829b1fa25c7a60a65991a011a8d4,2025-06-23T20:16:21.633000
CVE-2025-52488,0,0,ca6b051d0da46d813959bb70c94307ecd22ce69e425b14627b87b7e8b19e660f,2025-06-23T20:16:21.633000
CVE-2025-5249,0,0,ed726cc2a905d079d3cf80f621868a312481896aae378521d98a1a546311541b,2025-06-24T15:55:43.913000
CVE-2025-52491,1,1,eb6821ffbfeb732e8f091e919e66b824d1e634cbf7de445f8ba65c50a3dd10e1,2025-06-30T20:15:25.233000
CVE-2025-52491,0,0,eb6821ffbfeb732e8f091e919e66b824d1e634cbf7de445f8ba65c50a3dd10e1,2025-06-30T20:15:25.233000
CVE-2025-5250,0,0,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000
CVE-2025-5251,0,0,f632fe7c5885617fb201b5b935c30961323c6054755926cad7791588fe5ea46c,2025-06-10T15:12:43.393000
CVE-2025-5252,0,0,befcffbe58a6c748b51a32dbfdb428108ffe2b16ca817a921564fafd634c86b0,2025-06-09T18:51:06.110000
@ -298642,7 +298642,7 @@ CVE-2025-52896,0,0,537c940479f6d8ed2fd7570b79b681b72d560b8cd3b602b11f06845667f6b
CVE-2025-52898,0,0,242d59c80cc4edaa7ca03e9ee9195e87d313d397bee553aa627941585c2037e5,2025-06-30T18:38:23.493000
CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000
CVE-2025-52900,0,0,af44f4dfef316e8ff7cd339f0dd8b1907013e95e6c4b530df54072f87fc13707,2025-06-26T18:57:43.670000
CVE-2025-52901,1,1,597dd3e0884e75a10ca3c76c1126f6f1d090a216692cce1bc426e825d8307a6f,2025-06-30T20:15:25.390000
CVE-2025-52901,0,0,597dd3e0884e75a10ca3c76c1126f6f1d090a216692cce1bc426e825d8307a6f,2025-06-30T20:15:25.390000
CVE-2025-52902,0,0,b8d594698346e33c9857483268477e14dc09fa28d15e66d418ce57128530f231,2025-06-26T18:57:43.670000
CVE-2025-52903,0,0,94a4c6feeb3ab5f2f3f94f951914d81f3159a284c72cdc60f80cd2659d917108,2025-06-30T18:39:09.973000
CVE-2025-52904,0,0,bcfb9cec165acf9ecfbf631b206a037247a445035acaabf7192276de61173353,2025-06-30T18:39:09.973000
@ -298682,13 +298682,13 @@ CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee1
CVE-2025-52991,0,0,af527bf448c3b79a9a912ad56fc25360922d64c6abc7ec2e2fd1e75369f722b0,2025-06-30T18:38:48.477000
CVE-2025-52992,0,0,9c4fa9f8ea6e8dc53af8837e8b039c0aa0aaeec26b6c426f5dffffdfdb7d6aac,2025-06-30T18:38:48.477000
CVE-2025-52993,0,0,dc940a9ee703c8bb3ea37bb3d5d2324d1d910344929ff8677571ae1dab4af4b3,2025-06-30T18:38:48.477000
CVE-2025-52995,1,1,c67682ed684859bfb820422ba1e3386478c8c63d7bbb825116a1deabfd033067,2025-06-30T20:15:25.540000
CVE-2025-52996,1,1,1f4f5c110efec99e6e38a7cb0ee56eb21d588a47d04b011e206d8b084ef0651c,2025-06-30T20:15:25.690000
CVE-2025-52997,1,1,8717eb5a96661b5be48b3e1d3819b0de26e9a9606e208971a9b2aa822c4206f0,2025-06-30T20:15:25.847000
CVE-2025-52995,0,0,c67682ed684859bfb820422ba1e3386478c8c63d7bbb825116a1deabfd033067,2025-06-30T20:15:25.540000
CVE-2025-52996,0,0,1f4f5c110efec99e6e38a7cb0ee56eb21d588a47d04b011e206d8b084ef0651c,2025-06-30T20:15:25.690000
CVE-2025-52997,0,0,8717eb5a96661b5be48b3e1d3819b0de26e9a9606e208971a9b2aa822c4206f0,2025-06-30T20:15:25.847000
CVE-2025-52999,0,0,8e3ffe270e9e0f4f311570c01291b88502def8da5bc3d26946c9776265012b0e,2025-06-26T18:57:43.670000
CVE-2025-53001,0,0,3c076b45fb4f64495030b45a0e1e68f972266e053573d2640ae8c69ca5f6b1fe,2025-06-30T16:15:24.123000
CVE-2025-53002,0,0,88ca888237f37e4e624e68585cc923f4d5409fd291622a596533223ce1e1a8f6,2025-06-26T18:57:43.670000
CVE-2025-53004,1,1,6bddad98cf56c6d37c8c20a80a83e12a5d5e8bdf04dfb81442be17d507518826,2025-06-30T21:15:31.563000
CVE-2025-53004,0,0,6bddad98cf56c6d37c8c20a80a83e12a5d5e8bdf04dfb81442be17d507518826,2025-06-30T21:15:31.563000
CVE-2025-53007,0,0,a4076fc87f8a0924938a60c1b4d21b89458fde7ab2bc0e9913efaa46d339ee87,2025-06-26T18:57:43.670000
CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a1594,2025-06-18T05:15:50.287000
CVE-2025-53013,0,0,ee406bf23bf1a0f5f249e7eb22f810b8cfccae8c849cf03bf7e4a61df66a8caa,2025-06-26T18:57:43.670000
@ -299660,10 +299660,10 @@ CVE-2025-6486,0,0,9279349c7782d4462e26da818de9d0c7bcf2cfb484b863830cae3c45969d17
CVE-2025-6487,0,0,29e0a7237d62fc67ee05c71aab1c7439f3b9715b366fd94f580ddf8afdfdbd57,2025-06-25T19:31:27.433000
CVE-2025-6488,0,0,b55e08aa87e9535ec20e5480e2ce75b16c60b84301f6e502aae767b9871809d6,2025-06-30T18:38:48.477000
CVE-2025-6489,0,0,76ec524cc88748434edd32da385ea8c072cc94c0dd99ce64a004c4e1e23c404b,2025-06-25T19:31:16.637000
CVE-2025-6490,0,1,285dbe5b584596005459f48ccaa0c22dc2487868242662a884b5fa361ce99404,2025-06-30T20:15:26
CVE-2025-6490,0,0,285dbe5b584596005459f48ccaa0c22dc2487868242662a884b5fa361ce99404,2025-06-30T20:15:26
CVE-2025-6492,0,0,f4c450e5238d0b6066bddd75aa5d427fff899ce0a5a143de6c2c6c6e80c1f5f1,2025-06-23T20:16:21.633000
CVE-2025-6493,0,0,f54e9deddeec98b5a4250c90a84de909e0f3c6a0b361893486f5209add5470e9,2025-06-23T20:16:21.633000
CVE-2025-6494,0,1,ef1e696e0afb867512c0cf19a5e23c15294d9a2bb127c1de2e7e652d6b460e83,2025-06-30T20:15:26.160000
CVE-2025-6494,0,0,ef1e696e0afb867512c0cf19a5e23c15294d9a2bb127c1de2e7e652d6b460e83,2025-06-30T20:15:26.160000
CVE-2025-6496,0,0,41dc145f9a02ba783f2ed330080b0df94da07c3c130615dd33f85880edf7aacb,2025-06-23T20:16:21.633000
CVE-2025-6497,0,0,085a542a1200fd4aa6eb1522dd911d9a98ef8c5a6df00f38adf93948fb0f75bd,2025-06-23T20:16:21.633000
CVE-2025-6498,0,0,11f74f8785056a6e7a545d5e8f3aeedffc98d72b787c795f6ceff6211b41f5d2,2025-06-23T20:16:21.633000
@ -299705,6 +299705,7 @@ CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad
CVE-2025-6550,0,0,fb64cb2731bfe62fcb701e0148808a0bd737d54903b1841bd8460bed4aa8b411,2025-06-30T18:38:48.477000
CVE-2025-6551,0,0,9449985e7a9055bc84479e0b0f2b57fed721bbaf75a59a8d5b22bb237a895a0a,2025-06-26T18:58:14.280000
CVE-2025-6552,0,0,8717beff1ed0b4c67a4a3bc77f60be53e5be3c4b231cbc45b02cbdea4703f774,2025-06-26T18:58:14.280000
CVE-2025-6554,1,1,b5be19d70f61e3d4c7103aa5d9671d8a3cb1471f37e3c6833b35241547c2c250,2025-06-30T22:15:29.873000
CVE-2025-6555,0,0,778b8348c64662c8e4459061cabbb632e36dc7c09a92710349fb4cd01cbc0fbb,2025-06-26T18:58:14.280000
CVE-2025-6556,0,0,0cdb8a2b9e72a2754bb3a3954835fbf3d9af035032442306dedd19790d98994e,2025-06-26T18:58:14.280000
CVE-2025-6557,0,0,8cc85c420253a381d54904e4cdc2ede3bb9bc6850688f1e7d13a25637f2c7124,2025-06-26T18:58:14.280000
@ -299770,7 +299771,7 @@ CVE-2025-6661,0,0,0a6fd1ca8bda3f42faed49a1521f09e40d46a36c8e217b4ea47710e8104723
CVE-2025-6662,0,0,5c5166ff9346183b32a70db53aef827fb54827f9b31eed5d0663faf254f2a0be,2025-06-26T18:57:43.670000
CVE-2025-6664,0,0,255c7bbda244ee1c6cb8ea0927bfc65b2c2f80bee216e706a66f1a5aec92db63,2025-06-27T17:57:43.810000
CVE-2025-6665,0,0,819e0fbbba720c6c224657e5e3d234dfe09f50d6f19ea31a4a8557c46f9ecfaf,2025-06-27T17:56:25.200000
CVE-2025-6667,0,1,f7249d0ce2242cc1fb55502e78a9d1851a88aea1d56705388779a71c32d97776,2025-06-30T21:15:32.063000
CVE-2025-6667,0,0,f7249d0ce2242cc1fb55502e78a9d1851a88aea1d56705388779a71c32d97776,2025-06-30T21:15:32.063000
CVE-2025-6668,0,0,2c668ab21380ad28d26e4a71eb753799465f7ccb1ef8018c5159319921192efe,2025-06-27T17:49:20.193000
CVE-2025-6669,0,0,910a314b076194cb451db40c00cbeb61d557257d78d120caf65549dfd156af45,2025-06-27T11:15:25.547000
CVE-2025-6674,0,0,2a96b77d18a3ed5a15d1217808f66635d48de16e05f22c39a4ae455ffcadc0f2,2025-06-26T18:57:43.670000
@ -299913,7 +299914,10 @@ CVE-2025-6912,0,0,cae4e1cf87582d85db9d877c73e8e60b899629dfb26edef320fab8cb80d861
CVE-2025-6913,0,0,b1375ecae91316337130edd76072e633c1171b77c9ea48f86513d6cbcaed7648,2025-06-30T18:38:23.493000
CVE-2025-6914,0,0,31c470e09df7cbf15079af053ef9a5eea3f5ef895e7002fe88b5b6e862908b59,2025-06-30T18:38:23.493000
CVE-2025-6915,0,0,869b44ab2dae4523caa9acbdb01a0277b6fb46e25329958c0ba16905bdb9a650,2025-06-30T18:38:23.493000
CVE-2025-6916,0,1,524850ebae15b52ae083b8140e4ab97ad9b5dd7a5e34956ff208001c526a5fed,2025-06-30T21:15:32.730000
CVE-2025-6916,0,0,524850ebae15b52ae083b8140e4ab97ad9b5dd7a5e34956ff208001c526a5fed,2025-06-30T21:15:32.730000
CVE-2025-6917,0,0,129e7ed7538995bd47122ea1abcbbb313d42d5948a17ca0bbad09769943187c8,2025-06-30T18:38:23.493000
CVE-2025-6925,0,0,9b6fc4858861f5dc5e36531cf5cf597ec00fe77481d8d8c4445a1b8259bb2b27,2025-06-30T19:15:25.920000
CVE-2025-6929,1,1,9ece799ba6281b8e7980c379023d8b829d9e61abb4e41ab8d03daafaba29b64d,2025-06-30T21:15:32.853000
CVE-2025-6929,0,0,9ece799ba6281b8e7980c379023d8b829d9e61abb4e41ab8d03daafaba29b64d,2025-06-30T21:15:32.853000
CVE-2025-6930,1,1,bee982db182da79a40468adbb11226ff1e623020a4f5164f27db8f4cc413aaf3,2025-06-30T22:15:30.010000
CVE-2025-6931,1,1,df9ddfbde912faafa5e4493b429283a88936738657f10a40de2d7749ea0b032c,2025-06-30T23:15:21.863000
CVE-2025-6932,1,1,6c23dab722d2bfca6e0ab05eb53a46bfd002e1a13ce5c4f6e40d491d0daae338,2025-06-30T23:15:22.103000

Can't render this file because it is too large.