mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2025-06-30T23:55:12.029609+00:00
This commit is contained in:
parent
fa4be88cad
commit
ce51af7101
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2012-6435",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2013-01-24T21:55:01.430",
|
||||
"lastModified": "2025-04-11T00:51:21.963",
|
||||
"lastModified": "2025-06-30T22:15:27.780",
|
||||
"vulnStatus": "Deferred",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that specifies a logic-execution stop and fault."
|
||||
"value": "When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the CPU to stop logic execution and enter a fault state, a DoS can occur. This situation could cause loss of availability and a disruption of communication with other connected devices.\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,29 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||||
"baseScore": 7.8,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
@ -44,8 +67,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -168,11 +201,24 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource"
|
||||
]
|
||||
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2012-6436",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2013-01-24T21:55:01.477",
|
||||
"lastModified": "2025-04-11T00:51:21.963",
|
||||
"lastModified": "2025-06-30T22:15:28.573",
|
||||
"vulnStatus": "Deferred",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows remote attackers to cause a denial of service (CPU crash and communication outage) via a malformed CIP packet."
|
||||
"value": "The device does not properly validate the data being sent to the buffer. An attacker can send a malformed CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP, which creates a buffer overflow and causes the CPU to crash. Successful exploitation of this vulnerability could cause loss of availability and a disruption in communications with other connected devices.\n\n\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,29 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||||
"baseScore": 7.8,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
@ -44,7 +67,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -52,6 +75,16 @@
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -168,11 +201,24 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource"
|
||||
]
|
||||
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2012-6437",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2013-01-24T21:55:01.523",
|
||||
"lastModified": "2025-04-11T00:51:21.963",
|
||||
"lastModified": "2025-06-30T22:15:28.747",
|
||||
"vulnStatus": "Deferred",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 do not properly perform authentication for Ethernet firmware updates, which allows remote attackers to execute arbitrary code via a Trojan horse update image."
|
||||
"value": "The device does not properly authenticate users and the potential exists for a remote user to upload a new firmware image to the Ethernet card, whether it is a corrupt or legitimate firmware image. Successful exploitation of this vulnerability could cause loss of availability, integrity, and confidentiality and a disruption in communications with other connected devices.\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,29 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||||
"baseScore": 10.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
@ -44,7 +67,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -52,6 +75,16 @@
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -168,11 +201,24 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource"
|
||||
]
|
||||
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2012-6438",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2013-01-24T21:55:01.603",
|
||||
"lastModified": "2025-04-11T00:51:21.963",
|
||||
"lastModified": "2025-06-30T22:15:28.920",
|
||||
"vulnStatus": "Deferred",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows remote attackers to cause a denial of service (NIC crash and communication outage) via a malformed CIP packet."
|
||||
"value": "The device does not properly validate the data being sent to the buffer. An attacker can send a malformed CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP, which creates a buffer overflow and causes the NIC to crash. Successful exploitation of this vulnerability could cause loss of availability and a disruption in communications with other connected devices.\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,29 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||||
"baseScore": 7.8,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
@ -44,7 +67,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -52,6 +75,16 @@
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -168,11 +201,24 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource"
|
||||
]
|
||||
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2012-6439",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2013-01-24T21:55:01.650",
|
||||
"lastModified": "2025-04-11T00:51:21.963",
|
||||
"lastModified": "2025-06-30T22:15:29.083",
|
||||
"vulnStatus": "Deferred",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that modifies the (1) configuration or (2) network parameters."
|
||||
"value": "When an affected \nproduct receives a valid CIP message from an unauthorized or unintended \nsource to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port \n44818/UDP that changes the product\u2019s configuration and network \nparameters, a DoS condition can occur. This situation could cause loss \nof availability and a disruption of communication with other connected \ndevices.\u00a0\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,29 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
|
||||
"baseScore": 8.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 7.8,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
@ -44,8 +67,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -167,6 +200,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
@ -174,6 +211,18 @@
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2012-6440",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2013-01-24T21:55:01.697",
|
||||
"lastModified": "2025-04-11T00:51:21.963",
|
||||
"lastModified": "2025-06-30T22:15:29.253",
|
||||
"vulnStatus": "Deferred",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The web-server password-authentication functionality in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows man-in-the-middle attackers to conduct replay attacks via HTTP traffic."
|
||||
"value": "The Web server password authentication mechanism used by the products is vulnerable to a MitM and Replay attack. Successful exploitation of this vulnerability will allow unauthorized access of the product\u2019s Web server to view and alter product configuration and diagnostics information.\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,29 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||||
"baseScore": 9.3,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "MEDIUM",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.6,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": true
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
@ -44,7 +67,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -52,6 +75,16 @@
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -168,11 +201,24 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource"
|
||||
]
|
||||
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2012-6441",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2013-01-24T21:55:01.727",
|
||||
"lastModified": "2025-04-11T00:51:21.963",
|
||||
"lastModified": "2025-06-30T22:15:29.420",
|
||||
"vulnStatus": "Deferred",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to obtain sensitive information via a crafted CIP packet."
|
||||
"value": "An information exposure of confidential information results when the device receives a specially crafted CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP. Successful exploitation of this vulnerability could cause loss of confidentiality.\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,29 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||||
"baseScore": 5.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
@ -44,7 +67,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -52,6 +75,16 @@
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -168,11 +201,24 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource"
|
||||
]
|
||||
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2012-6442",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2013-01-24T21:55:01.773",
|
||||
"lastModified": "2025-04-11T00:51:21.963",
|
||||
"lastModified": "2025-06-30T22:15:29.587",
|
||||
"vulnStatus": "Deferred",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that specifies a reset."
|
||||
"value": "When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the product to reset, a DoS can occur. This situation could cause loss of availability and a disruption of communication with other connected devices.\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,29 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||||
"baseScore": 7.8,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
@ -44,8 +67,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -268,13 +301,24 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=27862",
|
||||
|
37
CVE-2025/CVE-2025-65xx/CVE-2025-6554.json
Normal file
37
CVE-2025/CVE-2025-65xx/CVE-2025-6554.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2025-6554",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-06-30T22:15:29.873",
|
||||
"lastModified": "2025-06-30T22:15:29.873",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/427663123",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-69xx/CVE-2025-6930.json
Normal file
145
CVE-2025/CVE-2025-69xx/CVE-2025-6930.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-6930",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-30T22:15:30.010",
|
||||
"lastModified": "2025-06-30T22:15:30.010",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in PHPGurukul Zoo Management System 2.1. Affected is an unknown function of the file /admin/manage-foreigners-ticket.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/100",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.314442",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.314442",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.605579",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
164
CVE-2025/CVE-2025-69xx/CVE-2025-6931.json
Normal file
164
CVE-2025/CVE-2025-69xx/CVE-2025-6931.json
Normal file
@ -0,0 +1,164 @@
|
||||
{
|
||||
"id": "CVE-2025-6931",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-30T23:15:21.863",
|
||||
"lastModified": "2025-06-30T23:15:21.863",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in D-Link DCS-6517 and DCS-7517 up to 2.02.0. Affected by this vulnerability is the function generate_pass_from_mac of the file /bin/httpd of the component Root Password Generation Handler. The manipulation leads to insufficient entropy. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
|
||||
"baseScore": 2.6,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "HIGH",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 4.9,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-330"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-331"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://cdn2.v50to.cc/dlink/DCS-6517B1_FW_v2.02.01/report_3.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "http://cdn2.v50to.cc/dlink/DCS-7517_B1_FW_v2.02.01/report_1.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.314443",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.314443",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.605592",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.605593",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.605596",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
152
CVE-2025/CVE-2025-69xx/CVE-2025-6932.json
Normal file
152
CVE-2025/CVE-2025-69xx/CVE-2025-6932.json
Normal file
@ -0,0 +1,152 @@
|
||||
{
|
||||
"id": "CVE-2025-6932",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-30T23:15:22.103",
|
||||
"lastModified": "2025-06-30T23:15:22.103",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in D-Link DCS-7517 up to 2.02.0. This affects the function g_F_n_GenPassForQlync of the file /bin/httpd of the component Qlync Password Generation Handler. The manipulation leads to use of hard-coded password. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
|
||||
"baseScore": 2.6,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "HIGH",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 4.9,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-255"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-259"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://cdn2.v50to.cc/dlink/DCS-7517_B1_FW_v2.02.01/report_2.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.314445",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.314445",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.605595",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
56
README.md
56
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-30T22:00:11.053768+00:00
|
||||
2025-06-30T23:55:12.029609+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-30T21:15:32.853000+00:00
|
||||
2025-06-30T23:15:22.103000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,53 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
299918
|
||||
299922
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2025-32462](CVE-2025/CVE-2025-324xx/CVE-2025-32462.json) (`2025-06-30T21:15:30.080`)
|
||||
- [CVE-2025-32463](CVE-2025/CVE-2025-324xx/CVE-2025-32463.json) (`2025-06-30T21:15:30.257`)
|
||||
- [CVE-2025-49493](CVE-2025/CVE-2025-494xx/CVE-2025-49493.json) (`2025-06-30T20:15:25.060`)
|
||||
- [CVE-2025-49520](CVE-2025/CVE-2025-495xx/CVE-2025-49520.json) (`2025-06-30T21:15:30.913`)
|
||||
- [CVE-2025-49521](CVE-2025/CVE-2025-495xx/CVE-2025-49521.json) (`2025-06-30T21:15:31.063`)
|
||||
- [CVE-2025-52491](CVE-2025/CVE-2025-524xx/CVE-2025-52491.json) (`2025-06-30T20:15:25.233`)
|
||||
- [CVE-2025-52901](CVE-2025/CVE-2025-529xx/CVE-2025-52901.json) (`2025-06-30T20:15:25.390`)
|
||||
- [CVE-2025-52995](CVE-2025/CVE-2025-529xx/CVE-2025-52995.json) (`2025-06-30T20:15:25.540`)
|
||||
- [CVE-2025-52996](CVE-2025/CVE-2025-529xx/CVE-2025-52996.json) (`2025-06-30T20:15:25.690`)
|
||||
- [CVE-2025-52997](CVE-2025/CVE-2025-529xx/CVE-2025-52997.json) (`2025-06-30T20:15:25.847`)
|
||||
- [CVE-2025-53004](CVE-2025/CVE-2025-530xx/CVE-2025-53004.json) (`2025-06-30T21:15:31.563`)
|
||||
- [CVE-2025-6929](CVE-2025/CVE-2025-69xx/CVE-2025-6929.json) (`2025-06-30T21:15:32.853`)
|
||||
- [CVE-2025-6554](CVE-2025/CVE-2025-65xx/CVE-2025-6554.json) (`2025-06-30T22:15:29.873`)
|
||||
- [CVE-2025-6930](CVE-2025/CVE-2025-69xx/CVE-2025-6930.json) (`2025-06-30T22:15:30.010`)
|
||||
- [CVE-2025-6931](CVE-2025/CVE-2025-69xx/CVE-2025-6931.json) (`2025-06-30T23:15:21.863`)
|
||||
- [CVE-2025-6932](CVE-2025/CVE-2025-69xx/CVE-2025-6932.json) (`2025-06-30T23:15:22.103`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `22`
|
||||
Recently modified CVEs: `8`
|
||||
|
||||
- [CVE-2020-35509](CVE-2020/CVE-2020-355xx/CVE-2020-35509.json) (`2025-06-30T21:15:28.677`)
|
||||
- [CVE-2022-36350](CVE-2022/CVE-2022-363xx/CVE-2022-36350.json) (`2025-06-30T21:15:29.737`)
|
||||
- [CVE-2023-28902](CVE-2023/CVE-2023-289xx/CVE-2023-28902.json) (`2025-06-30T20:15:22.727`)
|
||||
- [CVE-2023-28903](CVE-2023/CVE-2023-289xx/CVE-2023-28903.json) (`2025-06-30T20:15:23.040`)
|
||||
- [CVE-2023-28904](CVE-2023/CVE-2023-289xx/CVE-2023-28904.json) (`2025-06-30T20:15:23.153`)
|
||||
- [CVE-2023-28905](CVE-2023/CVE-2023-289xx/CVE-2023-28905.json) (`2025-06-30T20:15:23.260`)
|
||||
- [CVE-2023-28906](CVE-2023/CVE-2023-289xx/CVE-2023-28906.json) (`2025-06-30T20:15:23.370`)
|
||||
- [CVE-2023-28907](CVE-2023/CVE-2023-289xx/CVE-2023-28907.json) (`2025-06-30T20:15:23.477`)
|
||||
- [CVE-2023-28908](CVE-2023/CVE-2023-289xx/CVE-2023-28908.json) (`2025-06-30T20:15:23.580`)
|
||||
- [CVE-2023-28909](CVE-2023/CVE-2023-289xx/CVE-2023-28909.json) (`2025-06-30T20:15:23.697`)
|
||||
- [CVE-2023-47310](CVE-2023/CVE-2023-473xx/CVE-2023-47310.json) (`2025-06-30T20:15:23.810`)
|
||||
- [CVE-2024-53621](CVE-2024/CVE-2024-536xx/CVE-2024-53621.json) (`2025-06-30T20:15:24.383`)
|
||||
- [CVE-2025-45333](CVE-2025/CVE-2025-453xx/CVE-2025-45333.json) (`2025-06-30T21:15:30.427`)
|
||||
- [CVE-2025-49175](CVE-2025/CVE-2025-491xx/CVE-2025-49175.json) (`2025-06-30T20:15:24.553`)
|
||||
- [CVE-2025-49176](CVE-2025/CVE-2025-491xx/CVE-2025-49176.json) (`2025-06-30T20:15:24.690`)
|
||||
- [CVE-2025-49178](CVE-2025/CVE-2025-491xx/CVE-2025-49178.json) (`2025-06-30T21:15:30.693`)
|
||||
- [CVE-2025-49179](CVE-2025/CVE-2025-491xx/CVE-2025-49179.json) (`2025-06-30T20:15:24.817`)
|
||||
- [CVE-2025-49180](CVE-2025/CVE-2025-491xx/CVE-2025-49180.json) (`2025-06-30T20:15:24.940`)
|
||||
- [CVE-2025-6490](CVE-2025/CVE-2025-64xx/CVE-2025-6490.json) (`2025-06-30T20:15:26.000`)
|
||||
- [CVE-2025-6494](CVE-2025/CVE-2025-64xx/CVE-2025-6494.json) (`2025-06-30T20:15:26.160`)
|
||||
- [CVE-2025-6667](CVE-2025/CVE-2025-66xx/CVE-2025-6667.json) (`2025-06-30T21:15:32.063`)
|
||||
- [CVE-2025-6916](CVE-2025/CVE-2025-69xx/CVE-2025-6916.json) (`2025-06-30T21:15:32.730`)
|
||||
- [CVE-2012-6435](CVE-2012/CVE-2012-64xx/CVE-2012-6435.json) (`2025-06-30T22:15:27.780`)
|
||||
- [CVE-2012-6436](CVE-2012/CVE-2012-64xx/CVE-2012-6436.json) (`2025-06-30T22:15:28.573`)
|
||||
- [CVE-2012-6437](CVE-2012/CVE-2012-64xx/CVE-2012-6437.json) (`2025-06-30T22:15:28.747`)
|
||||
- [CVE-2012-6438](CVE-2012/CVE-2012-64xx/CVE-2012-6438.json) (`2025-06-30T22:15:28.920`)
|
||||
- [CVE-2012-6439](CVE-2012/CVE-2012-64xx/CVE-2012-6439.json) (`2025-06-30T22:15:29.083`)
|
||||
- [CVE-2012-6440](CVE-2012/CVE-2012-64xx/CVE-2012-6440.json) (`2025-06-30T22:15:29.253`)
|
||||
- [CVE-2012-6441](CVE-2012/CVE-2012-64xx/CVE-2012-6441.json) (`2025-06-30T22:15:29.420`)
|
||||
- [CVE-2012-6442](CVE-2012/CVE-2012-64xx/CVE-2012-6442.json) (`2025-06-30T22:15:29.587`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
88
_state.csv
88
_state.csv
@ -57446,14 +57446,14 @@ CVE-2012-6431,0,0,f9bf3773fd3937f340256f5255073a0415d143b047bc23e359f277763c1686
|
||||
CVE-2012-6432,0,0,37418c5df2e8fa504b5f295c6e6ff6dcb297511e9c9502a0fa5e5029edcda130,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6433,0,0,cd2af2c553ff35d80e0dbc77965c8f784c415009a9d470348d9d77994136cf86,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6434,0,0,fbeec6990bd772432e2e71e1a9492bb9886707d22054c3c0ae58c077051d431c,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6435,0,0,f07df8b3e30ef8938758d97118d32602119c82945dd73c2a9fc4b969fef2ac07,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6436,0,0,de23458697d4fab6b7401bb325013f1c69567c940b53f52df0a0d3e159516403,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6437,0,0,98724a8a0e1c04730c6eca538a6df32dc8ee38eec7e7bc2421c9b58ebd14490c,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6438,0,0,1de9302263ed885a140c18ec2e22d151d747a61dbb58992c62279e8a2334339a,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6439,0,0,e2dd9b5d85947872d4e2dbe13ee2006e7d110c68329f539d36fe50d4b553ac59,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6440,0,0,91ff0575260d076092b6eec49176ad60cb489bbd5c4821c898814905e3746b0c,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6441,0,0,87baa0b56ba3b468abca7d919996bc66c4d9783f0a778e505d7f24328f48c997,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6442,0,0,fca3216eba1ad527f84b17efa19fe6be76dafb83db0f837677a8799cb0a26abf,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6435,0,1,aa91df9bbe0cc5c9f10fbf828681df298051715a9691c308764a7ced54f65e6f,2025-06-30T22:15:27.780000
|
||||
CVE-2012-6436,0,1,fc2212dcb6612127a4b03db13b98d85155a48ec49e432c327fe341665d4a19ad,2025-06-30T22:15:28.573000
|
||||
CVE-2012-6437,0,1,3d27ffbcf9500aa113b6d032b4eab976bcf9eabb5dd9ead5e9bff901ee9a7aea,2025-06-30T22:15:28.747000
|
||||
CVE-2012-6438,0,1,4b10aa7c58bb17944152bdb5079bcf28d17ff7c6dc955fc1d73293e82ec04c24,2025-06-30T22:15:28.920000
|
||||
CVE-2012-6439,0,1,d4c7b9035a6d41922114c21a6d4e3d581379a68725e2f581af203977af9d33e2,2025-06-30T22:15:29.083000
|
||||
CVE-2012-6440,0,1,a825b550e14ccaed8ac58c05306eb1d263f110955ed73b1b6d750e088485b7f8,2025-06-30T22:15:29.253000
|
||||
CVE-2012-6441,0,1,61f88e731b65e0dbf53662dd7fb6d5def697749d3636c699d31e296655afb649,2025-06-30T22:15:29.420000
|
||||
CVE-2012-6442,0,1,c9e575c087416ae26f4a8dd244b7a61781ef407192737a05885091fbb3d23f5c,2025-06-30T22:15:29.587000
|
||||
CVE-2012-6447,0,0,d8b7b05a4f49e6c19b510919618f54c83ac04a7915e9bb0d8510ac66706f17ac,2025-04-11T00:51:21.963000
|
||||
CVE-2012-6448,0,0,2243388c4496e1e61ae0d4e99ca0d79c6880d6e441f02575c815a15d30670ddf,2024-11-21T01:46:08.417000
|
||||
CVE-2012-6449,0,0,961d86909d9d23620b7377999d59e8dfe0a18ae07d5b9ea9ddb1797b0876df8f,2024-11-21T01:46:08.560000
|
||||
@ -158530,7 +158530,7 @@ CVE-2020-35505,0,0,07926c3e565d7dd83903b653432ce60990fe21d4454fc9275b8104ad13486
|
||||
CVE-2020-35506,0,0,33b93d1cfd445ebb63899c3d2e38e8086b8638bcd650661e9ccbc15894ee4177,2024-11-21T05:27:27.137000
|
||||
CVE-2020-35507,0,0,57f9e096707a4d8fbf0c5ce71044d1779dd71bddba62f87e19b804a5c62f4e46,2024-11-21T05:27:27.300000
|
||||
CVE-2020-35508,0,0,0ac772d7bb15681ec0c37ccf1b311d39c30c04fcc3e8f27e410767c462c713e1,2024-11-21T05:27:27.440000
|
||||
CVE-2020-35509,0,1,6c3ee24074ec85aaa1f826b924b015e2766d19611a7996dee99b84d38b17d4e9,2025-06-30T21:15:28.677000
|
||||
CVE-2020-35509,0,0,6c3ee24074ec85aaa1f826b924b015e2766d19611a7996dee99b84d38b17d4e9,2025-06-30T21:15:28.677000
|
||||
CVE-2020-3551,0,0,ac308a65f340964772685ec9d81937551d12cd26ed99aa7e40f2694ea6998e0c,2024-11-21T05:31:17.880000
|
||||
CVE-2020-35510,0,0,16e0bd865e221548e20364aaa480d9778ef185c841da4ad41748a28cbda05854,2024-11-21T05:27:27.853000
|
||||
CVE-2020-35511,0,0,27d1351cc643251d551683a18539bd127c4c78d6c58a3938ed06f237412fc471,2024-11-21T05:27:27.993000
|
||||
@ -203926,7 +203926,7 @@ CVE-2022-36347,0,0,628ac091df1c2a432a0e4f7581a4ccd6a4859ab334a5b54b59cbd0418556f
|
||||
CVE-2022-36348,0,0,1f79824737439901c4f8f9f9f4ce7eed2cfbbd40d643d818699b5cf50eb0deb8,2024-11-21T07:12:50.370000
|
||||
CVE-2022-36349,0,0,a3fa3cb0b5fc85bc556e37f975bd9649b9efac7d704cd2674b8f7b39773255f2,2024-11-21T07:12:50.490000
|
||||
CVE-2022-3635,0,0,64f6686e08b18052842a179b00afa8dc41eb032d8e996d0a2cfb328ed2aa1d42,2024-11-21T07:19:55.693000
|
||||
CVE-2022-36350,0,1,a87f2137fa4a8c12f26f545b70284d091e96a599fb28ce27af73cd65c27983dc,2025-06-30T21:15:29.737000
|
||||
CVE-2022-36350,0,0,a87f2137fa4a8c12f26f545b70284d091e96a599fb28ce27af73cd65c27983dc,2025-06-30T21:15:29.737000
|
||||
CVE-2022-36351,0,0,6754c6ac921c3e6af1467347dbae2ff4154a44019342fa38a2854ce403bcdc23,2024-11-21T07:12:50.737000
|
||||
CVE-2022-36352,0,0,a484bafc91f0425c1e845ec36afba468fbcb1ec25874b9be5a68ab2eb479b966,2024-11-21T07:12:50.990000
|
||||
CVE-2022-36353,0,0,446597a1ad2a9437f2f821b1192ca985159829495b8dac55dd38c7ec7909781c,2025-05-28T19:15:29.720000
|
||||
@ -224156,14 +224156,14 @@ CVE-2023-28898,0,0,5063bb8f2aaf43e04f9c3806d252ca940deaa91465538b7a1dc8c97290879
|
||||
CVE-2023-28899,0,0,ace3616b7ed13c6232f5dbcd338861a0a3eb162cd24c045e8fb898537dda4273,2024-11-21T07:56:14.463000
|
||||
CVE-2023-28900,0,0,95474310488f87be0cee5d16dabb5ad2dc651b5bd222f5c1e223db09f941ca4c,2024-11-21T07:56:14.617000
|
||||
CVE-2023-28901,0,0,7b7a3ce35e98d750456768add88af488531e7343d46c7819972ceb6377506317,2024-11-21T07:56:14.760000
|
||||
CVE-2023-28902,0,1,3698c5da524da451152a768ad137f780fe6519739ffb59ac217047c14cc22d9f,2025-06-30T20:15:22.727000
|
||||
CVE-2023-28903,0,1,a6525a6893f041620d23fa0c4862e1d586dfbd758d374e9290b684181659a825,2025-06-30T20:15:23.040000
|
||||
CVE-2023-28904,0,1,48f8e76975f7e65495c0111133028b95935821e864df3784b425f692e0d6ff3d,2025-06-30T20:15:23.153000
|
||||
CVE-2023-28905,0,1,2a41b78fed081aa4dd910eae6bff92152776f88fc974b60efcceb8c51bd0dbe4,2025-06-30T20:15:23.260000
|
||||
CVE-2023-28906,0,1,845656aec921e8c72c3bd5595314345ce6093c7fb9158a7d069a24e6ba7032a4,2025-06-30T20:15:23.370000
|
||||
CVE-2023-28907,0,1,bfb1283518cee7a3f4e84dd875cc816f4df6ab56c56d5d2ac65a8259c2d10ad0,2025-06-30T20:15:23.477000
|
||||
CVE-2023-28908,0,1,3ae89c013f86207254bfeb8ad7d472bb4053f4a7475ebf7c94cb08c11a344cd3,2025-06-30T20:15:23.580000
|
||||
CVE-2023-28909,0,1,2e46b8aeecfd78ab096387b0b66255d017b14fbf3d86b885daf7858e5f5468cf,2025-06-30T20:15:23.697000
|
||||
CVE-2023-28902,0,0,3698c5da524da451152a768ad137f780fe6519739ffb59ac217047c14cc22d9f,2025-06-30T20:15:22.727000
|
||||
CVE-2023-28903,0,0,a6525a6893f041620d23fa0c4862e1d586dfbd758d374e9290b684181659a825,2025-06-30T20:15:23.040000
|
||||
CVE-2023-28904,0,0,48f8e76975f7e65495c0111133028b95935821e864df3784b425f692e0d6ff3d,2025-06-30T20:15:23.153000
|
||||
CVE-2023-28905,0,0,2a41b78fed081aa4dd910eae6bff92152776f88fc974b60efcceb8c51bd0dbe4,2025-06-30T20:15:23.260000
|
||||
CVE-2023-28906,0,0,845656aec921e8c72c3bd5595314345ce6093c7fb9158a7d069a24e6ba7032a4,2025-06-30T20:15:23.370000
|
||||
CVE-2023-28907,0,0,bfb1283518cee7a3f4e84dd875cc816f4df6ab56c56d5d2ac65a8259c2d10ad0,2025-06-30T20:15:23.477000
|
||||
CVE-2023-28908,0,0,3ae89c013f86207254bfeb8ad7d472bb4053f4a7475ebf7c94cb08c11a344cd3,2025-06-30T20:15:23.580000
|
||||
CVE-2023-28909,0,0,2e46b8aeecfd78ab096387b0b66255d017b14fbf3d86b885daf7858e5f5468cf,2025-06-30T20:15:23.697000
|
||||
CVE-2023-2891,0,0,e3feeab0619825c1073733808071dc45223397d726b3177896edea0ff0a9af90,2024-11-21T07:59:30.437000
|
||||
CVE-2023-28910,0,0,831a9a3917b92f12c9ff1a823e73e23e99bcb8326fb106ce23c3adc8ffc2b4a8,2025-06-30T18:38:23.493000
|
||||
CVE-2023-28911,0,0,4fbf717739725399adb061643a4809f6a5707ab599050b12df64418ccd90aa37,2025-06-30T18:38:23.493000
|
||||
@ -238172,7 +238172,7 @@ CVE-2023-47307,0,0,112c4fcd2316630545c0b8214cf0e27b8ce26f6bb0e9c99277c68ca8f2b87
|
||||
CVE-2023-47308,0,0,7d5ff54c309fa19adc9e793bda18cb0b740ceb6c9d3315a532ce40f5c4fd1165,2024-11-21T08:30:07.870000
|
||||
CVE-2023-47309,0,0,24c2011ecb6d7db56739e87951b446acfc2502ed2d4ef1d44fda31d0f3b47ac3,2024-11-21T08:30:08.030000
|
||||
CVE-2023-4731,0,0,d05232eed0c052dd2a1d5ec6b0be8f9b495ae5a2bd0ca62433c506bf8c986847,2025-01-15T16:31:04.880000
|
||||
CVE-2023-47310,0,1,9f4a8303777bbd11cb5a68087188980834a4764dbf22f061cfecf0d1fb902168,2025-06-30T20:15:23.810000
|
||||
CVE-2023-47310,0,0,9f4a8303777bbd11cb5a68087188980834a4764dbf22f061cfecf0d1fb902168,2025-06-30T20:15:23.810000
|
||||
CVE-2023-47311,0,0,b95c9f4ee7ff54f1db61b336a25ed1ed49149c6e779141e5eaa4ce520fe1e575,2024-11-21T08:30:08.283000
|
||||
CVE-2023-47312,0,0,42944cc44c110aadfec0e3ea54804d471daddba94144037ba9fb032325e0ea39,2024-11-21T08:30:08.460000
|
||||
CVE-2023-47313,0,0,263f2c0543bd5ec30e1b2e45eebc7a95f0ea67b86f319d05fa2226679d75307f,2024-11-21T08:30:08.597000
|
||||
@ -276001,7 +276001,7 @@ CVE-2024-53617,0,0,dd2ee5869a76723244988f189f5e4e219fcd77588c7888e87da2897c111b3
|
||||
CVE-2024-53619,0,0,7e8e9692dc22af705d23ae8b792483811e548f5452e797f9099331427eac5db0,2024-11-26T20:15:33.880000
|
||||
CVE-2024-5362,0,0,65cc93fbb06de51acd392fcf91df16bbed3865e6bb98fea60125a3f2dc4dd426,2025-02-10T13:55:46.317000
|
||||
CVE-2024-53620,0,0,0ec00be95852a0998a14f46021597d58d0eefdd89109b46c5f804a1cf687bc07,2024-11-26T20:15:34.050000
|
||||
CVE-2024-53621,0,1,79b3eabb799917f8b87dec2d6a3ef730878c11efbed4755db01cae8b2c352183,2025-06-30T20:15:24.383000
|
||||
CVE-2024-53621,0,0,79b3eabb799917f8b87dec2d6a3ef730878c11efbed4755db01cae8b2c352183,2025-06-30T20:15:24.383000
|
||||
CVE-2024-53623,0,0,531ddce100784ec8b317b297b660a260e518e8b80f64012824aac6bf3d8289e3,2024-12-02T20:15:07.917000
|
||||
CVE-2024-5363,0,0,1a1d04dd62a3d9ceb936776096c694704c071db758e0c336b93f44ac203c6bde,2025-02-10T14:41:03.540000
|
||||
CVE-2024-53635,0,0,7a67e9e0d9d71b612bd6cfd95f53056a7f326cdca18b0bdba544dd72fd3cefe4,2025-04-04T15:39:01.230000
|
||||
@ -293125,8 +293125,8 @@ CVE-2025-32459,0,0,dae6c2ac44f0e8d47f2cd1bfa34e1b0071873a215a44a6369412520c6ea64
|
||||
CVE-2025-3246,0,0,d943818b43557c9519758b844725afa009508b574d2bbdf1c927d75056c761a3,2025-04-21T14:23:45.950000
|
||||
CVE-2025-32460,0,0,16cc364f1c655bf6f21d50384a646311718edc25ee850ac035bf3b1975d34030,2025-04-09T20:02:41.860000
|
||||
CVE-2025-32461,0,0,8bce56f6863b74eaac27069424b18b802ee4aeb8905aa3153fdbbd924c0604dc,2025-04-09T20:02:41.860000
|
||||
CVE-2025-32462,1,1,a309ececf239aee95a89125e1696e62b0fc00af3b051db9b1cd63d6a014410bc,2025-06-30T21:15:30.080000
|
||||
CVE-2025-32463,1,1,e2bcba3bbd676b15a73d5a9dbee641cdb1f40c7ff5ce9acdf12cca8c8e66d0d9,2025-06-30T21:15:30.257000
|
||||
CVE-2025-32462,0,0,a309ececf239aee95a89125e1696e62b0fc00af3b051db9b1cd63d6a014410bc,2025-06-30T21:15:30.080000
|
||||
CVE-2025-32463,0,0,e2bcba3bbd676b15a73d5a9dbee641cdb1f40c7ff5ce9acdf12cca8c8e66d0d9,2025-06-30T21:15:30.257000
|
||||
CVE-2025-32464,0,0,d585900889b901117e0fe728cc5e64b12123c28db643e71ecaab58b67603729d,2025-04-23T22:15:15.460000
|
||||
CVE-2025-32465,0,0,18f0254fcddc6f93884de750d3f2429ec4adc6fe5d4e9076904035e514a09681,2025-06-12T16:06:20.180000
|
||||
CVE-2025-32466,0,0,d6dc52d19056c6857b8d7b1ad7b39f71f723d971a207e33753f74fea4bed0bab,2025-06-12T16:06:20.180000
|
||||
@ -295921,7 +295921,7 @@ CVE-2025-45322,0,0,bd98baac9032c4924e89f536321099d3c4e9b0a26b0e91693b82dcae0f7fc
|
||||
CVE-2025-4533,0,0,958714e8219e4b36bf6a5171f1844fbafd960204dc55ae1eaffcf3377f047967,2025-05-12T17:32:32.760000
|
||||
CVE-2025-45331,0,0,1a763087f3a9266aa4ad598d9cc797aba7ebe6d738e262c7bb0a83be881654a7,2025-06-24T16:15:28.007000
|
||||
CVE-2025-45332,0,0,3e680282347d513ad76d880bfdd241726c33a42cd9243ea852e7ec50a8a70a04,2025-06-26T18:57:43.670000
|
||||
CVE-2025-45333,0,1,45594321e39ae2977f3091895d155d4678d0aee4381745d3aacbb14cd19adaca,2025-06-30T21:15:30.427000
|
||||
CVE-2025-45333,0,0,45594321e39ae2977f3091895d155d4678d0aee4381745d3aacbb14cd19adaca,2025-06-30T21:15:30.427000
|
||||
CVE-2025-4534,0,0,d56048b96631b6a170c2f4a1ae209f80a8905f2c01c2315ddf151590a444fbdb,2025-05-12T17:32:32.760000
|
||||
CVE-2025-45343,0,0,7615694706f3e006934d6364d7caac354737a6562145f3bc3ab74518e76c62f3,2025-06-03T15:36:32.347000
|
||||
CVE-2025-4535,0,0,211c420ea7fc40b2c6369c81b50b72179abd6b1518746dfb87b4fb36af845bbb,2025-05-12T17:32:32.760000
|
||||
@ -297860,13 +297860,13 @@ CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa
|
||||
CVE-2025-49163,0,0,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000
|
||||
CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000
|
||||
CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000
|
||||
CVE-2025-49175,0,1,bc48898aa22840d684e986dd4bc99123d118318d12fcdde1f78c0811c7f9da52,2025-06-30T20:15:24.553000
|
||||
CVE-2025-49176,0,1,7c8e3298f5c5daf34fd87a5b2093060a65cb032351d81042db8ee9f2aaa6d551,2025-06-30T20:15:24.690000
|
||||
CVE-2025-49175,0,0,bc48898aa22840d684e986dd4bc99123d118318d12fcdde1f78c0811c7f9da52,2025-06-30T20:15:24.553000
|
||||
CVE-2025-49176,0,0,7c8e3298f5c5daf34fd87a5b2093060a65cb032351d81042db8ee9f2aaa6d551,2025-06-30T20:15:24.690000
|
||||
CVE-2025-49177,0,0,88fe85ebfb311cc7851d290d91c8e67844d99ab06620a758f4cae9a3c93ed2ef,2025-06-30T10:15:25.913000
|
||||
CVE-2025-49178,0,1,2977b66486df3bf07a30aa6a0bfb1cefd659d07df5857968bf6e6aab4abd4148,2025-06-30T21:15:30.693000
|
||||
CVE-2025-49179,0,1,690955eeef8fc1b93cd649b8d87bd4128d4338f5aa14dc011f7c01904dc55014,2025-06-30T20:15:24.817000
|
||||
CVE-2025-49178,0,0,2977b66486df3bf07a30aa6a0bfb1cefd659d07df5857968bf6e6aab4abd4148,2025-06-30T21:15:30.693000
|
||||
CVE-2025-49179,0,0,690955eeef8fc1b93cd649b8d87bd4128d4338f5aa14dc011f7c01904dc55014,2025-06-30T20:15:24.817000
|
||||
CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000
|
||||
CVE-2025-49180,0,1,e9711ad3588c97661db2e1f474cb48105c3aa995cfcc9886fec475a3e87c02d2,2025-06-30T20:15:24.940000
|
||||
CVE-2025-49180,0,0,e9711ad3588c97661db2e1f474cb48105c3aa995cfcc9886fec475a3e87c02d2,2025-06-30T20:15:24.940000
|
||||
CVE-2025-49181,0,0,65f8ea01de63d019d8688de775c40b302b8c0b1e44c040e53e46324e69435218,2025-06-12T16:06:20.180000
|
||||
CVE-2025-49182,0,0,8adc8833944dbbffb6c925bafc811eee2574582f2d7b7b09537e334080770141,2025-06-13T09:15:20.130000
|
||||
CVE-2025-49183,0,0,c9c3ab65e477d8e9a4d5c9adaf45822d49f0873835d0971680386eb894e72562,2025-06-12T16:06:20.180000
|
||||
@ -298057,15 +298057,15 @@ CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb
|
||||
CVE-2025-4948,0,0,0e7df54c260456a30951ec3ca271c8ecd68713b1dbf742cd867d5b3aa598f5dd,2025-06-17T12:15:27.520000
|
||||
CVE-2025-49487,0,0,f1f07e31d2426bd898f1c4797310a5283aec7c5c600ab98cdf9e862e3d719d19,2025-06-17T20:50:23.507000
|
||||
CVE-2025-4949,0,0,0316997b060f0791f7006e3582f42d4352e21f331c0768bafb1b692dffdd3405,2025-06-17T14:10:34.853000
|
||||
CVE-2025-49493,1,1,2d0b0740561cb3194fdbcb5d8c713250dba5d8716cc7ec42f02017fd586f54c8,2025-06-30T20:15:25.060000
|
||||
CVE-2025-49493,0,0,2d0b0740561cb3194fdbcb5d8c713250dba5d8716cc7ec42f02017fd586f54c8,2025-06-30T20:15:25.060000
|
||||
CVE-2025-49507,0,0,8df57474dbf672acfe3170fcfeb7ba8c285d0e6636e6db25f644b19e631f2cda,2025-06-12T16:06:39.330000
|
||||
CVE-2025-49508,0,0,04e385c54571a60ffb676472b30653696331e96ca9c4d7f0b4a42af7ae744aa9,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49509,0,0,83d7c029291217af9a97963b6a105646b66e999b31aeea3bf105eeb0ecb2ab96,2025-06-12T16:06:39.330000
|
||||
CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000
|
||||
CVE-2025-49510,0,0,3bb8122e36ad249db39449b81c1d9bb5005e0826a2addc079025211cebc0dc64,2025-06-12T16:06:39.330000
|
||||
CVE-2025-49511,0,0,5857ce4f5934ac8d4eab419d1a69fa9027dcf280ff9a1fb08e4e3e1a5703ab2f,2025-06-12T16:06:39.330000
|
||||
CVE-2025-49520,1,1,cb8826b22300f5a9d2eae9ca5dafc15b1f5e0f8306ced606515beea3acf195ef,2025-06-30T21:15:30.913000
|
||||
CVE-2025-49521,1,1,8d9931f59dc1f8590f74fb0429e8ba8edb007bf2a0a1c9740d850475b0fd0bb7,2025-06-30T21:15:31.063000
|
||||
CVE-2025-49520,0,0,cb8826b22300f5a9d2eae9ca5dafc15b1f5e0f8306ced606515beea3acf195ef,2025-06-30T21:15:30.913000
|
||||
CVE-2025-49521,0,0,8d9931f59dc1f8590f74fb0429e8ba8edb007bf2a0a1c9740d850475b0fd0bb7,2025-06-30T21:15:31.063000
|
||||
CVE-2025-4954,0,0,1ec01516c4567931b4ffc24e86d8b1eee9006bb52ce75acce1cd554027fb1f48,2025-06-12T16:06:39.330000
|
||||
CVE-2025-49549,0,0,d51ae214ec023b9fbf2d300a776160828d2a71b7300d33bc04b291b25e1ecd5e,2025-06-26T18:57:43.670000
|
||||
CVE-2025-4955,0,0,85a93e6cc9d76b6eb96cac66d66bf9a676c7375a6a733a4a5f80ea99e88eb438,2025-06-18T19:15:22.137000
|
||||
@ -298516,7 +298516,7 @@ CVE-2025-52486,0,0,141d3cdd89e3d8b09e19fb7d7dfc50e25ac40afc5c2dd413dd0730327594f
|
||||
CVE-2025-52487,0,0,7cd2bd74a4137e25655cda69485a3b65bad2829b1fa25c7a60a65991a011a8d4,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52488,0,0,ca6b051d0da46d813959bb70c94307ecd22ce69e425b14627b87b7e8b19e660f,2025-06-23T20:16:21.633000
|
||||
CVE-2025-5249,0,0,ed726cc2a905d079d3cf80f621868a312481896aae378521d98a1a546311541b,2025-06-24T15:55:43.913000
|
||||
CVE-2025-52491,1,1,eb6821ffbfeb732e8f091e919e66b824d1e634cbf7de445f8ba65c50a3dd10e1,2025-06-30T20:15:25.233000
|
||||
CVE-2025-52491,0,0,eb6821ffbfeb732e8f091e919e66b824d1e634cbf7de445f8ba65c50a3dd10e1,2025-06-30T20:15:25.233000
|
||||
CVE-2025-5250,0,0,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000
|
||||
CVE-2025-5251,0,0,f632fe7c5885617fb201b5b935c30961323c6054755926cad7791588fe5ea46c,2025-06-10T15:12:43.393000
|
||||
CVE-2025-5252,0,0,befcffbe58a6c748b51a32dbfdb428108ffe2b16ca817a921564fafd634c86b0,2025-06-09T18:51:06.110000
|
||||
@ -298642,7 +298642,7 @@ CVE-2025-52896,0,0,537c940479f6d8ed2fd7570b79b681b72d560b8cd3b602b11f06845667f6b
|
||||
CVE-2025-52898,0,0,242d59c80cc4edaa7ca03e9ee9195e87d313d397bee553aa627941585c2037e5,2025-06-30T18:38:23.493000
|
||||
CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000
|
||||
CVE-2025-52900,0,0,af44f4dfef316e8ff7cd339f0dd8b1907013e95e6c4b530df54072f87fc13707,2025-06-26T18:57:43.670000
|
||||
CVE-2025-52901,1,1,597dd3e0884e75a10ca3c76c1126f6f1d090a216692cce1bc426e825d8307a6f,2025-06-30T20:15:25.390000
|
||||
CVE-2025-52901,0,0,597dd3e0884e75a10ca3c76c1126f6f1d090a216692cce1bc426e825d8307a6f,2025-06-30T20:15:25.390000
|
||||
CVE-2025-52902,0,0,b8d594698346e33c9857483268477e14dc09fa28d15e66d418ce57128530f231,2025-06-26T18:57:43.670000
|
||||
CVE-2025-52903,0,0,94a4c6feeb3ab5f2f3f94f951914d81f3159a284c72cdc60f80cd2659d917108,2025-06-30T18:39:09.973000
|
||||
CVE-2025-52904,0,0,bcfb9cec165acf9ecfbf631b206a037247a445035acaabf7192276de61173353,2025-06-30T18:39:09.973000
|
||||
@ -298682,13 +298682,13 @@ CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee1
|
||||
CVE-2025-52991,0,0,af527bf448c3b79a9a912ad56fc25360922d64c6abc7ec2e2fd1e75369f722b0,2025-06-30T18:38:48.477000
|
||||
CVE-2025-52992,0,0,9c4fa9f8ea6e8dc53af8837e8b039c0aa0aaeec26b6c426f5dffffdfdb7d6aac,2025-06-30T18:38:48.477000
|
||||
CVE-2025-52993,0,0,dc940a9ee703c8bb3ea37bb3d5d2324d1d910344929ff8677571ae1dab4af4b3,2025-06-30T18:38:48.477000
|
||||
CVE-2025-52995,1,1,c67682ed684859bfb820422ba1e3386478c8c63d7bbb825116a1deabfd033067,2025-06-30T20:15:25.540000
|
||||
CVE-2025-52996,1,1,1f4f5c110efec99e6e38a7cb0ee56eb21d588a47d04b011e206d8b084ef0651c,2025-06-30T20:15:25.690000
|
||||
CVE-2025-52997,1,1,8717eb5a96661b5be48b3e1d3819b0de26e9a9606e208971a9b2aa822c4206f0,2025-06-30T20:15:25.847000
|
||||
CVE-2025-52995,0,0,c67682ed684859bfb820422ba1e3386478c8c63d7bbb825116a1deabfd033067,2025-06-30T20:15:25.540000
|
||||
CVE-2025-52996,0,0,1f4f5c110efec99e6e38a7cb0ee56eb21d588a47d04b011e206d8b084ef0651c,2025-06-30T20:15:25.690000
|
||||
CVE-2025-52997,0,0,8717eb5a96661b5be48b3e1d3819b0de26e9a9606e208971a9b2aa822c4206f0,2025-06-30T20:15:25.847000
|
||||
CVE-2025-52999,0,0,8e3ffe270e9e0f4f311570c01291b88502def8da5bc3d26946c9776265012b0e,2025-06-26T18:57:43.670000
|
||||
CVE-2025-53001,0,0,3c076b45fb4f64495030b45a0e1e68f972266e053573d2640ae8c69ca5f6b1fe,2025-06-30T16:15:24.123000
|
||||
CVE-2025-53002,0,0,88ca888237f37e4e624e68585cc923f4d5409fd291622a596533223ce1e1a8f6,2025-06-26T18:57:43.670000
|
||||
CVE-2025-53004,1,1,6bddad98cf56c6d37c8c20a80a83e12a5d5e8bdf04dfb81442be17d507518826,2025-06-30T21:15:31.563000
|
||||
CVE-2025-53004,0,0,6bddad98cf56c6d37c8c20a80a83e12a5d5e8bdf04dfb81442be17d507518826,2025-06-30T21:15:31.563000
|
||||
CVE-2025-53007,0,0,a4076fc87f8a0924938a60c1b4d21b89458fde7ab2bc0e9913efaa46d339ee87,2025-06-26T18:57:43.670000
|
||||
CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a1594,2025-06-18T05:15:50.287000
|
||||
CVE-2025-53013,0,0,ee406bf23bf1a0f5f249e7eb22f810b8cfccae8c849cf03bf7e4a61df66a8caa,2025-06-26T18:57:43.670000
|
||||
@ -299660,10 +299660,10 @@ CVE-2025-6486,0,0,9279349c7782d4462e26da818de9d0c7bcf2cfb484b863830cae3c45969d17
|
||||
CVE-2025-6487,0,0,29e0a7237d62fc67ee05c71aab1c7439f3b9715b366fd94f580ddf8afdfdbd57,2025-06-25T19:31:27.433000
|
||||
CVE-2025-6488,0,0,b55e08aa87e9535ec20e5480e2ce75b16c60b84301f6e502aae767b9871809d6,2025-06-30T18:38:48.477000
|
||||
CVE-2025-6489,0,0,76ec524cc88748434edd32da385ea8c072cc94c0dd99ce64a004c4e1e23c404b,2025-06-25T19:31:16.637000
|
||||
CVE-2025-6490,0,1,285dbe5b584596005459f48ccaa0c22dc2487868242662a884b5fa361ce99404,2025-06-30T20:15:26
|
||||
CVE-2025-6490,0,0,285dbe5b584596005459f48ccaa0c22dc2487868242662a884b5fa361ce99404,2025-06-30T20:15:26
|
||||
CVE-2025-6492,0,0,f4c450e5238d0b6066bddd75aa5d427fff899ce0a5a143de6c2c6c6e80c1f5f1,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6493,0,0,f54e9deddeec98b5a4250c90a84de909e0f3c6a0b361893486f5209add5470e9,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6494,0,1,ef1e696e0afb867512c0cf19a5e23c15294d9a2bb127c1de2e7e652d6b460e83,2025-06-30T20:15:26.160000
|
||||
CVE-2025-6494,0,0,ef1e696e0afb867512c0cf19a5e23c15294d9a2bb127c1de2e7e652d6b460e83,2025-06-30T20:15:26.160000
|
||||
CVE-2025-6496,0,0,41dc145f9a02ba783f2ed330080b0df94da07c3c130615dd33f85880edf7aacb,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6497,0,0,085a542a1200fd4aa6eb1522dd911d9a98ef8c5a6df00f38adf93948fb0f75bd,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6498,0,0,11f74f8785056a6e7a545d5e8f3aeedffc98d72b787c795f6ceff6211b41f5d2,2025-06-23T20:16:21.633000
|
||||
@ -299705,6 +299705,7 @@ CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad
|
||||
CVE-2025-6550,0,0,fb64cb2731bfe62fcb701e0148808a0bd737d54903b1841bd8460bed4aa8b411,2025-06-30T18:38:48.477000
|
||||
CVE-2025-6551,0,0,9449985e7a9055bc84479e0b0f2b57fed721bbaf75a59a8d5b22bb237a895a0a,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6552,0,0,8717beff1ed0b4c67a4a3bc77f60be53e5be3c4b231cbc45b02cbdea4703f774,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6554,1,1,b5be19d70f61e3d4c7103aa5d9671d8a3cb1471f37e3c6833b35241547c2c250,2025-06-30T22:15:29.873000
|
||||
CVE-2025-6555,0,0,778b8348c64662c8e4459061cabbb632e36dc7c09a92710349fb4cd01cbc0fbb,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6556,0,0,0cdb8a2b9e72a2754bb3a3954835fbf3d9af035032442306dedd19790d98994e,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6557,0,0,8cc85c420253a381d54904e4cdc2ede3bb9bc6850688f1e7d13a25637f2c7124,2025-06-26T18:58:14.280000
|
||||
@ -299770,7 +299771,7 @@ CVE-2025-6661,0,0,0a6fd1ca8bda3f42faed49a1521f09e40d46a36c8e217b4ea47710e8104723
|
||||
CVE-2025-6662,0,0,5c5166ff9346183b32a70db53aef827fb54827f9b31eed5d0663faf254f2a0be,2025-06-26T18:57:43.670000
|
||||
CVE-2025-6664,0,0,255c7bbda244ee1c6cb8ea0927bfc65b2c2f80bee216e706a66f1a5aec92db63,2025-06-27T17:57:43.810000
|
||||
CVE-2025-6665,0,0,819e0fbbba720c6c224657e5e3d234dfe09f50d6f19ea31a4a8557c46f9ecfaf,2025-06-27T17:56:25.200000
|
||||
CVE-2025-6667,0,1,f7249d0ce2242cc1fb55502e78a9d1851a88aea1d56705388779a71c32d97776,2025-06-30T21:15:32.063000
|
||||
CVE-2025-6667,0,0,f7249d0ce2242cc1fb55502e78a9d1851a88aea1d56705388779a71c32d97776,2025-06-30T21:15:32.063000
|
||||
CVE-2025-6668,0,0,2c668ab21380ad28d26e4a71eb753799465f7ccb1ef8018c5159319921192efe,2025-06-27T17:49:20.193000
|
||||
CVE-2025-6669,0,0,910a314b076194cb451db40c00cbeb61d557257d78d120caf65549dfd156af45,2025-06-27T11:15:25.547000
|
||||
CVE-2025-6674,0,0,2a96b77d18a3ed5a15d1217808f66635d48de16e05f22c39a4ae455ffcadc0f2,2025-06-26T18:57:43.670000
|
||||
@ -299913,7 +299914,10 @@ CVE-2025-6912,0,0,cae4e1cf87582d85db9d877c73e8e60b899629dfb26edef320fab8cb80d861
|
||||
CVE-2025-6913,0,0,b1375ecae91316337130edd76072e633c1171b77c9ea48f86513d6cbcaed7648,2025-06-30T18:38:23.493000
|
||||
CVE-2025-6914,0,0,31c470e09df7cbf15079af053ef9a5eea3f5ef895e7002fe88b5b6e862908b59,2025-06-30T18:38:23.493000
|
||||
CVE-2025-6915,0,0,869b44ab2dae4523caa9acbdb01a0277b6fb46e25329958c0ba16905bdb9a650,2025-06-30T18:38:23.493000
|
||||
CVE-2025-6916,0,1,524850ebae15b52ae083b8140e4ab97ad9b5dd7a5e34956ff208001c526a5fed,2025-06-30T21:15:32.730000
|
||||
CVE-2025-6916,0,0,524850ebae15b52ae083b8140e4ab97ad9b5dd7a5e34956ff208001c526a5fed,2025-06-30T21:15:32.730000
|
||||
CVE-2025-6917,0,0,129e7ed7538995bd47122ea1abcbbb313d42d5948a17ca0bbad09769943187c8,2025-06-30T18:38:23.493000
|
||||
CVE-2025-6925,0,0,9b6fc4858861f5dc5e36531cf5cf597ec00fe77481d8d8c4445a1b8259bb2b27,2025-06-30T19:15:25.920000
|
||||
CVE-2025-6929,1,1,9ece799ba6281b8e7980c379023d8b829d9e61abb4e41ab8d03daafaba29b64d,2025-06-30T21:15:32.853000
|
||||
CVE-2025-6929,0,0,9ece799ba6281b8e7980c379023d8b829d9e61abb4e41ab8d03daafaba29b64d,2025-06-30T21:15:32.853000
|
||||
CVE-2025-6930,1,1,bee982db182da79a40468adbb11226ff1e623020a4f5164f27db8f4cc413aaf3,2025-06-30T22:15:30.010000
|
||||
CVE-2025-6931,1,1,df9ddfbde912faafa5e4493b429283a88936738657f10a40de2d7749ea0b032c,2025-06-30T23:15:21.863000
|
||||
CVE-2025-6932,1,1,6c23dab722d2bfca6e0ab05eb53a46bfd002e1a13ce5c4f6e40d491d0daae338,2025-06-30T23:15:22.103000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user