From ce51af7101e89352a2c7cfcdc4a6b54a21a8165a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 30 Jun 2025 23:58:49 +0000 Subject: [PATCH] Auto-Update: 2025-06-30T23:55:12.029609+00:00 --- CVE-2012/CVE-2012-64xx/CVE-2012-6435.json | 62 ++++++-- CVE-2012/CVE-2012-64xx/CVE-2012-6436.json | 62 ++++++-- CVE-2012/CVE-2012-64xx/CVE-2012-6437.json | 62 ++++++-- CVE-2012/CVE-2012-64xx/CVE-2012-6438.json | 62 ++++++-- CVE-2012/CVE-2012-64xx/CVE-2012-6439.json | 55 +++++++- CVE-2012/CVE-2012-64xx/CVE-2012-6440.json | 62 ++++++-- CVE-2012/CVE-2012-64xx/CVE-2012-6441.json | 62 ++++++-- CVE-2012/CVE-2012-64xx/CVE-2012-6442.json | 64 +++++++-- CVE-2025/CVE-2025-65xx/CVE-2025-6554.json | 37 +++++ CVE-2025/CVE-2025-69xx/CVE-2025-6930.json | 145 +++++++++++++++++++ CVE-2025/CVE-2025-69xx/CVE-2025-6931.json | 164 ++++++++++++++++++++++ CVE-2025/CVE-2025-69xx/CVE-2025-6932.json | 152 ++++++++++++++++++++ README.md | 56 +++----- _state.csv | 88 ++++++------ 14 files changed, 991 insertions(+), 142 deletions(-) create mode 100644 CVE-2025/CVE-2025-65xx/CVE-2025-6554.json create mode 100644 CVE-2025/CVE-2025-69xx/CVE-2025-6930.json create mode 100644 CVE-2025/CVE-2025-69xx/CVE-2025-6931.json create mode 100644 CVE-2025/CVE-2025-69xx/CVE-2025-6932.json diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6435.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6435.json index a57d5030740..bea55ef4039 100644 --- a/CVE-2012/CVE-2012-64xx/CVE-2012-6435.json +++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6435.json @@ -2,13 +2,13 @@ "id": "CVE-2012-6435", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2013-01-24T21:55:01.430", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-06-30T22:15:27.780", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that specifies a logic-execution stop and fault." + "value": "When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the CPU to stop logic execution and enter a fault state, a DoS can occur. This situation could cause loss of availability and a disruption of communication with other connected devices.\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400" }, { "lang": "es", @@ -17,6 +17,29 @@ ], "metrics": { "cvssMetricV2": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + }, { "source": "nvd@nist.gov", "type": "Primary", @@ -44,8 +67,18 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "ics-cert@hq.dhs.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -168,11 +201,24 @@ ], "references": [ { - "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "US Government Resource" - ] + "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03", + "source": "ics-cert@hq.dhs.gov" }, { "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6436.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6436.json index 5e9f03278d5..96aa2d78ac0 100644 --- a/CVE-2012/CVE-2012-64xx/CVE-2012-6436.json +++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6436.json @@ -2,13 +2,13 @@ "id": "CVE-2012-6436", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2013-01-24T21:55:01.477", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-06-30T22:15:28.573", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Buffer overflow in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows remote attackers to cause a denial of service (CPU crash and communication outage) via a malformed CIP packet." + "value": "The device does not properly validate the data being sent to the buffer. An attacker can send a malformed CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP, which creates a buffer overflow and causes the CPU to crash. Successful exploitation of this vulnerability could cause loss of availability and a disruption in communications with other connected devices.\n\n\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400" }, { "lang": "es", @@ -17,6 +17,29 @@ ], "metrics": { "cvssMetricV2": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + }, { "source": "nvd@nist.gov", "type": "Primary", @@ -44,7 +67,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "ics-cert@hq.dhs.gov", "type": "Primary", "description": [ { @@ -52,6 +75,16 @@ "value": "CWE-119" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ @@ -168,11 +201,24 @@ ], "references": [ { - "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "US Government Resource" - ] + "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03", + "source": "ics-cert@hq.dhs.gov" }, { "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6437.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6437.json index 6c00d58c929..f73bd5fd00c 100644 --- a/CVE-2012/CVE-2012-64xx/CVE-2012-6437.json +++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6437.json @@ -2,13 +2,13 @@ "id": "CVE-2012-6437", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2013-01-24T21:55:01.523", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-06-30T22:15:28.747", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 do not properly perform authentication for Ethernet firmware updates, which allows remote attackers to execute arbitrary code via a Trojan horse update image." + "value": "The device does not properly authenticate users and the potential exists for a remote user to upload a new firmware image to the Ethernet card, whether it is a corrupt or legitimate firmware image. Successful exploitation of this vulnerability could cause loss of availability, integrity, and confidentiality and a disruption in communications with other connected devices.\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400" }, { "lang": "es", @@ -17,6 +17,29 @@ ], "metrics": { "cvssMetricV2": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + }, { "source": "nvd@nist.gov", "type": "Primary", @@ -44,7 +67,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "ics-cert@hq.dhs.gov", "type": "Primary", "description": [ { @@ -52,6 +75,16 @@ "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ @@ -168,11 +201,24 @@ ], "references": [ { - "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "US Government Resource" - ] + "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03", + "source": "ics-cert@hq.dhs.gov" }, { "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6438.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6438.json index 701861704d7..c3ff3a48fe5 100644 --- a/CVE-2012/CVE-2012-64xx/CVE-2012-6438.json +++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6438.json @@ -2,13 +2,13 @@ "id": "CVE-2012-6438", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2013-01-24T21:55:01.603", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-06-30T22:15:28.920", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Buffer overflow in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows remote attackers to cause a denial of service (NIC crash and communication outage) via a malformed CIP packet." + "value": "The device does not properly validate the data being sent to the buffer. An attacker can send a malformed CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP, which creates a buffer overflow and causes the NIC to crash. Successful exploitation of this vulnerability could cause loss of availability and a disruption in communications with other connected devices.\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400" }, { "lang": "es", @@ -17,6 +17,29 @@ ], "metrics": { "cvssMetricV2": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + }, { "source": "nvd@nist.gov", "type": "Primary", @@ -44,7 +67,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "ics-cert@hq.dhs.gov", "type": "Primary", "description": [ { @@ -52,6 +75,16 @@ "value": "CWE-119" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ @@ -168,11 +201,24 @@ ], "references": [ { - "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "US Government Resource" - ] + "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03", + "source": "ics-cert@hq.dhs.gov" }, { "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6439.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6439.json index 68e46e13cc1..d43b4bee7d8 100644 --- a/CVE-2012/CVE-2012-64xx/CVE-2012-6439.json +++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6439.json @@ -2,13 +2,13 @@ "id": "CVE-2012-6439", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2013-01-24T21:55:01.650", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-06-30T22:15:29.083", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that modifies the (1) configuration or (2) network parameters." + "value": "When an affected \nproduct receives a valid CIP message from an unauthorized or unintended \nsource to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port \n44818/UDP that changes the product\u2019s configuration and network \nparameters, a DoS condition can occur. This situation could cause loss \nof availability and a disruption of communication with other connected \ndevices.\u00a0\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400" }, { "lang": "es", @@ -17,6 +17,29 @@ ], "metrics": { "cvssMetricV2": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C", + "baseScore": 8.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 7.8, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + }, { "source": "nvd@nist.gov", "type": "Primary", @@ -44,8 +67,18 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "ics-cert@hq.dhs.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -167,6 +200,10 @@ } ], "references": [ + { + "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102", + "source": "ics-cert@hq.dhs.gov" + }, { "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", "source": "ics-cert@hq.dhs.gov", @@ -174,6 +211,18 @@ "US Government Resource" ] }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156", + "source": "ics-cert@hq.dhs.gov" + }, { "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6440.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6440.json index eb72000b9c7..e77af6de67a 100644 --- a/CVE-2012/CVE-2012-64xx/CVE-2012-6440.json +++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6440.json @@ -2,13 +2,13 @@ "id": "CVE-2012-6440", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2013-01-24T21:55:01.697", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-06-30T22:15:29.253", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The web-server password-authentication functionality in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows man-in-the-middle attackers to conduct replay attacks via HTTP traffic." + "value": "The Web server password authentication mechanism used by the products is vulnerable to a MitM and Replay attack. Successful exploitation of this vulnerability will allow unauthorized access of the product\u2019s Web server to view and alter product configuration and diagnostics information.\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400" }, { "lang": "es", @@ -17,6 +17,29 @@ ], "metrics": { "cvssMetricV2": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, + "accessVector": "NETWORK", + "accessComplexity": "MEDIUM", + "authentication": "NONE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.6, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": true + }, { "source": "nvd@nist.gov", "type": "Primary", @@ -44,7 +67,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "ics-cert@hq.dhs.gov", "type": "Primary", "description": [ { @@ -52,6 +75,16 @@ "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ @@ -168,11 +201,24 @@ ], "references": [ { - "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "US Government Resource" - ] + "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03", + "source": "ics-cert@hq.dhs.gov" }, { "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6441.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6441.json index 2f408b98add..b7d8dbb6002 100644 --- a/CVE-2012/CVE-2012-64xx/CVE-2012-6441.json +++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6441.json @@ -2,13 +2,13 @@ "id": "CVE-2012-6441", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2013-01-24T21:55:01.727", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-06-30T22:15:29.420", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to obtain sensitive information via a crafted CIP packet." + "value": "An information exposure of confidential information results when the device receives a specially crafted CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP. Successful exploitation of this vulnerability could cause loss of confidentiality.\n\n\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400" }, { "lang": "es", @@ -17,6 +17,29 @@ ], "metrics": { "cvssMetricV2": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + }, { "source": "nvd@nist.gov", "type": "Primary", @@ -44,7 +67,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "ics-cert@hq.dhs.gov", "type": "Primary", "description": [ { @@ -52,6 +75,16 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ @@ -168,11 +201,24 @@ ], "references": [ { - "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "US Government Resource" - ] + "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03", + "source": "ics-cert@hq.dhs.gov" }, { "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", diff --git a/CVE-2012/CVE-2012-64xx/CVE-2012-6442.json b/CVE-2012/CVE-2012-64xx/CVE-2012-6442.json index 6415c9953d2..abd7caddf8a 100644 --- a/CVE-2012/CVE-2012-64xx/CVE-2012-6442.json +++ b/CVE-2012/CVE-2012-64xx/CVE-2012-6442.json @@ -2,13 +2,13 @@ "id": "CVE-2012-6442", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2013-01-24T21:55:01.773", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-06-30T22:15:29.587", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that specifies a reset." + "value": "When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the product to reset, a DoS can occur. This situation could cause loss of availability and a disruption of communication with other connected devices.\n\n\n\nRockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400" }, { "lang": "es", @@ -17,6 +17,29 @@ ], "metrics": { "cvssMetricV2": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + }, { "source": "nvd@nist.gov", "type": "Primary", @@ -44,8 +67,18 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "ics-cert@hq.dhs.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -268,13 +301,24 @@ ], "references": [ { - "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "Broken Link", - "Third Party Advisory", - "US Government Resource" - ] + "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03", + "source": "ics-cert@hq.dhs.gov" }, { "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=27862", diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6554.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6554.json new file mode 100644 index 00000000000..3c3dcfc0850 --- /dev/null +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6554.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-6554", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2025-06-30T22:15:29.873", + "lastModified": "2025-06-30T22:15:29.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/427663123", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-69xx/CVE-2025-6930.json b/CVE-2025/CVE-2025-69xx/CVE-2025-6930.json new file mode 100644 index 00000000000..57e8f7cdffd --- /dev/null +++ b/CVE-2025/CVE-2025-69xx/CVE-2025-6930.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6930", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-30T22:15:30.010", + "lastModified": "2025-06-30T22:15:30.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in PHPGurukul Zoo Management System 2.1. Affected is an unknown function of the file /admin/manage-foreigners-ticket.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/f1rstb100d/myCVE/issues/100", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.314442", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.314442", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.605579", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-69xx/CVE-2025-6931.json b/CVE-2025/CVE-2025-69xx/CVE-2025-6931.json new file mode 100644 index 00000000000..23a60115b78 --- /dev/null +++ b/CVE-2025/CVE-2025-69xx/CVE-2025-6931.json @@ -0,0 +1,164 @@ +{ + "id": "CVE-2025-6931", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-30T23:15:21.863", + "lastModified": "2025-06-30T23:15:21.863", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in D-Link DCS-6517 and DCS-7517 up to 2.02.0. Affected by this vulnerability is the function generate_pass_from_mac of the file /bin/httpd of the component Root Password Generation Handler. The manipulation leads to insufficient entropy. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, + "accessVector": "NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 4.9, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-330" + }, + { + "lang": "en", + "value": "CWE-331" + } + ] + } + ], + "references": [ + { + "url": "http://cdn2.v50to.cc/dlink/DCS-6517B1_FW_v2.02.01/report_3.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "http://cdn2.v50to.cc/dlink/DCS-7517_B1_FW_v2.02.01/report_1.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.314443", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.314443", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.605592", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.605593", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.605596", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-69xx/CVE-2025-6932.json b/CVE-2025/CVE-2025-69xx/CVE-2025-6932.json new file mode 100644 index 00000000000..0b26dcfd1f4 --- /dev/null +++ b/CVE-2025/CVE-2025-69xx/CVE-2025-6932.json @@ -0,0 +1,152 @@ +{ + "id": "CVE-2025-6932", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-30T23:15:22.103", + "lastModified": "2025-06-30T23:15:22.103", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in D-Link DCS-7517 up to 2.02.0. This affects the function g_F_n_GenPassForQlync of the file /bin/httpd of the component Qlync Password Generation Handler. The manipulation leads to use of hard-coded password. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, + "accessVector": "NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 4.9, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-255" + }, + { + "lang": "en", + "value": "CWE-259" + } + ] + } + ], + "references": [ + { + "url": "http://cdn2.v50to.cc/dlink/DCS-7517_B1_FW_v2.02.01/report_2.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.314445", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.314445", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.605595", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0a6e7ed6d7c..a78394f463e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-30T22:00:11.053768+00:00 +2025-06-30T23:55:12.029609+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-30T21:15:32.853000+00:00 +2025-06-30T23:15:22.103000+00:00 ``` ### Last Data Feed Release @@ -33,53 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -299918 +299922 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `4` -- [CVE-2025-32462](CVE-2025/CVE-2025-324xx/CVE-2025-32462.json) (`2025-06-30T21:15:30.080`) -- [CVE-2025-32463](CVE-2025/CVE-2025-324xx/CVE-2025-32463.json) (`2025-06-30T21:15:30.257`) -- [CVE-2025-49493](CVE-2025/CVE-2025-494xx/CVE-2025-49493.json) (`2025-06-30T20:15:25.060`) -- [CVE-2025-49520](CVE-2025/CVE-2025-495xx/CVE-2025-49520.json) (`2025-06-30T21:15:30.913`) -- [CVE-2025-49521](CVE-2025/CVE-2025-495xx/CVE-2025-49521.json) (`2025-06-30T21:15:31.063`) -- [CVE-2025-52491](CVE-2025/CVE-2025-524xx/CVE-2025-52491.json) (`2025-06-30T20:15:25.233`) -- [CVE-2025-52901](CVE-2025/CVE-2025-529xx/CVE-2025-52901.json) (`2025-06-30T20:15:25.390`) -- [CVE-2025-52995](CVE-2025/CVE-2025-529xx/CVE-2025-52995.json) (`2025-06-30T20:15:25.540`) -- [CVE-2025-52996](CVE-2025/CVE-2025-529xx/CVE-2025-52996.json) (`2025-06-30T20:15:25.690`) -- [CVE-2025-52997](CVE-2025/CVE-2025-529xx/CVE-2025-52997.json) (`2025-06-30T20:15:25.847`) -- [CVE-2025-53004](CVE-2025/CVE-2025-530xx/CVE-2025-53004.json) (`2025-06-30T21:15:31.563`) -- [CVE-2025-6929](CVE-2025/CVE-2025-69xx/CVE-2025-6929.json) (`2025-06-30T21:15:32.853`) +- [CVE-2025-6554](CVE-2025/CVE-2025-65xx/CVE-2025-6554.json) (`2025-06-30T22:15:29.873`) +- [CVE-2025-6930](CVE-2025/CVE-2025-69xx/CVE-2025-6930.json) (`2025-06-30T22:15:30.010`) +- [CVE-2025-6931](CVE-2025/CVE-2025-69xx/CVE-2025-6931.json) (`2025-06-30T23:15:21.863`) +- [CVE-2025-6932](CVE-2025/CVE-2025-69xx/CVE-2025-6932.json) (`2025-06-30T23:15:22.103`) ### CVEs modified in the last Commit -Recently modified CVEs: `22` +Recently modified CVEs: `8` -- [CVE-2020-35509](CVE-2020/CVE-2020-355xx/CVE-2020-35509.json) (`2025-06-30T21:15:28.677`) -- [CVE-2022-36350](CVE-2022/CVE-2022-363xx/CVE-2022-36350.json) (`2025-06-30T21:15:29.737`) -- [CVE-2023-28902](CVE-2023/CVE-2023-289xx/CVE-2023-28902.json) (`2025-06-30T20:15:22.727`) -- [CVE-2023-28903](CVE-2023/CVE-2023-289xx/CVE-2023-28903.json) (`2025-06-30T20:15:23.040`) -- [CVE-2023-28904](CVE-2023/CVE-2023-289xx/CVE-2023-28904.json) (`2025-06-30T20:15:23.153`) -- [CVE-2023-28905](CVE-2023/CVE-2023-289xx/CVE-2023-28905.json) (`2025-06-30T20:15:23.260`) -- [CVE-2023-28906](CVE-2023/CVE-2023-289xx/CVE-2023-28906.json) (`2025-06-30T20:15:23.370`) -- [CVE-2023-28907](CVE-2023/CVE-2023-289xx/CVE-2023-28907.json) (`2025-06-30T20:15:23.477`) -- [CVE-2023-28908](CVE-2023/CVE-2023-289xx/CVE-2023-28908.json) (`2025-06-30T20:15:23.580`) -- [CVE-2023-28909](CVE-2023/CVE-2023-289xx/CVE-2023-28909.json) (`2025-06-30T20:15:23.697`) -- [CVE-2023-47310](CVE-2023/CVE-2023-473xx/CVE-2023-47310.json) (`2025-06-30T20:15:23.810`) -- [CVE-2024-53621](CVE-2024/CVE-2024-536xx/CVE-2024-53621.json) (`2025-06-30T20:15:24.383`) -- [CVE-2025-45333](CVE-2025/CVE-2025-453xx/CVE-2025-45333.json) (`2025-06-30T21:15:30.427`) -- [CVE-2025-49175](CVE-2025/CVE-2025-491xx/CVE-2025-49175.json) (`2025-06-30T20:15:24.553`) -- [CVE-2025-49176](CVE-2025/CVE-2025-491xx/CVE-2025-49176.json) (`2025-06-30T20:15:24.690`) -- [CVE-2025-49178](CVE-2025/CVE-2025-491xx/CVE-2025-49178.json) (`2025-06-30T21:15:30.693`) -- [CVE-2025-49179](CVE-2025/CVE-2025-491xx/CVE-2025-49179.json) (`2025-06-30T20:15:24.817`) -- [CVE-2025-49180](CVE-2025/CVE-2025-491xx/CVE-2025-49180.json) (`2025-06-30T20:15:24.940`) -- [CVE-2025-6490](CVE-2025/CVE-2025-64xx/CVE-2025-6490.json) (`2025-06-30T20:15:26.000`) -- [CVE-2025-6494](CVE-2025/CVE-2025-64xx/CVE-2025-6494.json) (`2025-06-30T20:15:26.160`) -- [CVE-2025-6667](CVE-2025/CVE-2025-66xx/CVE-2025-6667.json) (`2025-06-30T21:15:32.063`) -- [CVE-2025-6916](CVE-2025/CVE-2025-69xx/CVE-2025-6916.json) (`2025-06-30T21:15:32.730`) +- [CVE-2012-6435](CVE-2012/CVE-2012-64xx/CVE-2012-6435.json) (`2025-06-30T22:15:27.780`) +- [CVE-2012-6436](CVE-2012/CVE-2012-64xx/CVE-2012-6436.json) (`2025-06-30T22:15:28.573`) +- [CVE-2012-6437](CVE-2012/CVE-2012-64xx/CVE-2012-6437.json) (`2025-06-30T22:15:28.747`) +- [CVE-2012-6438](CVE-2012/CVE-2012-64xx/CVE-2012-6438.json) (`2025-06-30T22:15:28.920`) +- [CVE-2012-6439](CVE-2012/CVE-2012-64xx/CVE-2012-6439.json) (`2025-06-30T22:15:29.083`) +- [CVE-2012-6440](CVE-2012/CVE-2012-64xx/CVE-2012-6440.json) (`2025-06-30T22:15:29.253`) +- [CVE-2012-6441](CVE-2012/CVE-2012-64xx/CVE-2012-6441.json) (`2025-06-30T22:15:29.420`) +- [CVE-2012-6442](CVE-2012/CVE-2012-64xx/CVE-2012-6442.json) (`2025-06-30T22:15:29.587`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 81efadbd58a..e961bec9d39 100644 --- a/_state.csv +++ b/_state.csv @@ -57446,14 +57446,14 @@ CVE-2012-6431,0,0,f9bf3773fd3937f340256f5255073a0415d143b047bc23e359f277763c1686 CVE-2012-6432,0,0,37418c5df2e8fa504b5f295c6e6ff6dcb297511e9c9502a0fa5e5029edcda130,2025-04-11T00:51:21.963000 CVE-2012-6433,0,0,cd2af2c553ff35d80e0dbc77965c8f784c415009a9d470348d9d77994136cf86,2025-04-11T00:51:21.963000 CVE-2012-6434,0,0,fbeec6990bd772432e2e71e1a9492bb9886707d22054c3c0ae58c077051d431c,2025-04-11T00:51:21.963000 -CVE-2012-6435,0,0,f07df8b3e30ef8938758d97118d32602119c82945dd73c2a9fc4b969fef2ac07,2025-04-11T00:51:21.963000 -CVE-2012-6436,0,0,de23458697d4fab6b7401bb325013f1c69567c940b53f52df0a0d3e159516403,2025-04-11T00:51:21.963000 -CVE-2012-6437,0,0,98724a8a0e1c04730c6eca538a6df32dc8ee38eec7e7bc2421c9b58ebd14490c,2025-04-11T00:51:21.963000 -CVE-2012-6438,0,0,1de9302263ed885a140c18ec2e22d151d747a61dbb58992c62279e8a2334339a,2025-04-11T00:51:21.963000 -CVE-2012-6439,0,0,e2dd9b5d85947872d4e2dbe13ee2006e7d110c68329f539d36fe50d4b553ac59,2025-04-11T00:51:21.963000 -CVE-2012-6440,0,0,91ff0575260d076092b6eec49176ad60cb489bbd5c4821c898814905e3746b0c,2025-04-11T00:51:21.963000 -CVE-2012-6441,0,0,87baa0b56ba3b468abca7d919996bc66c4d9783f0a778e505d7f24328f48c997,2025-04-11T00:51:21.963000 -CVE-2012-6442,0,0,fca3216eba1ad527f84b17efa19fe6be76dafb83db0f837677a8799cb0a26abf,2025-04-11T00:51:21.963000 +CVE-2012-6435,0,1,aa91df9bbe0cc5c9f10fbf828681df298051715a9691c308764a7ced54f65e6f,2025-06-30T22:15:27.780000 +CVE-2012-6436,0,1,fc2212dcb6612127a4b03db13b98d85155a48ec49e432c327fe341665d4a19ad,2025-06-30T22:15:28.573000 +CVE-2012-6437,0,1,3d27ffbcf9500aa113b6d032b4eab976bcf9eabb5dd9ead5e9bff901ee9a7aea,2025-06-30T22:15:28.747000 +CVE-2012-6438,0,1,4b10aa7c58bb17944152bdb5079bcf28d17ff7c6dc955fc1d73293e82ec04c24,2025-06-30T22:15:28.920000 +CVE-2012-6439,0,1,d4c7b9035a6d41922114c21a6d4e3d581379a68725e2f581af203977af9d33e2,2025-06-30T22:15:29.083000 +CVE-2012-6440,0,1,a825b550e14ccaed8ac58c05306eb1d263f110955ed73b1b6d750e088485b7f8,2025-06-30T22:15:29.253000 +CVE-2012-6441,0,1,61f88e731b65e0dbf53662dd7fb6d5def697749d3636c699d31e296655afb649,2025-06-30T22:15:29.420000 +CVE-2012-6442,0,1,c9e575c087416ae26f4a8dd244b7a61781ef407192737a05885091fbb3d23f5c,2025-06-30T22:15:29.587000 CVE-2012-6447,0,0,d8b7b05a4f49e6c19b510919618f54c83ac04a7915e9bb0d8510ac66706f17ac,2025-04-11T00:51:21.963000 CVE-2012-6448,0,0,2243388c4496e1e61ae0d4e99ca0d79c6880d6e441f02575c815a15d30670ddf,2024-11-21T01:46:08.417000 CVE-2012-6449,0,0,961d86909d9d23620b7377999d59e8dfe0a18ae07d5b9ea9ddb1797b0876df8f,2024-11-21T01:46:08.560000 @@ -158530,7 +158530,7 @@ CVE-2020-35505,0,0,07926c3e565d7dd83903b653432ce60990fe21d4454fc9275b8104ad13486 CVE-2020-35506,0,0,33b93d1cfd445ebb63899c3d2e38e8086b8638bcd650661e9ccbc15894ee4177,2024-11-21T05:27:27.137000 CVE-2020-35507,0,0,57f9e096707a4d8fbf0c5ce71044d1779dd71bddba62f87e19b804a5c62f4e46,2024-11-21T05:27:27.300000 CVE-2020-35508,0,0,0ac772d7bb15681ec0c37ccf1b311d39c30c04fcc3e8f27e410767c462c713e1,2024-11-21T05:27:27.440000 -CVE-2020-35509,0,1,6c3ee24074ec85aaa1f826b924b015e2766d19611a7996dee99b84d38b17d4e9,2025-06-30T21:15:28.677000 +CVE-2020-35509,0,0,6c3ee24074ec85aaa1f826b924b015e2766d19611a7996dee99b84d38b17d4e9,2025-06-30T21:15:28.677000 CVE-2020-3551,0,0,ac308a65f340964772685ec9d81937551d12cd26ed99aa7e40f2694ea6998e0c,2024-11-21T05:31:17.880000 CVE-2020-35510,0,0,16e0bd865e221548e20364aaa480d9778ef185c841da4ad41748a28cbda05854,2024-11-21T05:27:27.853000 CVE-2020-35511,0,0,27d1351cc643251d551683a18539bd127c4c78d6c58a3938ed06f237412fc471,2024-11-21T05:27:27.993000 @@ -203926,7 +203926,7 @@ CVE-2022-36347,0,0,628ac091df1c2a432a0e4f7581a4ccd6a4859ab334a5b54b59cbd0418556f CVE-2022-36348,0,0,1f79824737439901c4f8f9f9f4ce7eed2cfbbd40d643d818699b5cf50eb0deb8,2024-11-21T07:12:50.370000 CVE-2022-36349,0,0,a3fa3cb0b5fc85bc556e37f975bd9649b9efac7d704cd2674b8f7b39773255f2,2024-11-21T07:12:50.490000 CVE-2022-3635,0,0,64f6686e08b18052842a179b00afa8dc41eb032d8e996d0a2cfb328ed2aa1d42,2024-11-21T07:19:55.693000 -CVE-2022-36350,0,1,a87f2137fa4a8c12f26f545b70284d091e96a599fb28ce27af73cd65c27983dc,2025-06-30T21:15:29.737000 +CVE-2022-36350,0,0,a87f2137fa4a8c12f26f545b70284d091e96a599fb28ce27af73cd65c27983dc,2025-06-30T21:15:29.737000 CVE-2022-36351,0,0,6754c6ac921c3e6af1467347dbae2ff4154a44019342fa38a2854ce403bcdc23,2024-11-21T07:12:50.737000 CVE-2022-36352,0,0,a484bafc91f0425c1e845ec36afba468fbcb1ec25874b9be5a68ab2eb479b966,2024-11-21T07:12:50.990000 CVE-2022-36353,0,0,446597a1ad2a9437f2f821b1192ca985159829495b8dac55dd38c7ec7909781c,2025-05-28T19:15:29.720000 @@ -224156,14 +224156,14 @@ CVE-2023-28898,0,0,5063bb8f2aaf43e04f9c3806d252ca940deaa91465538b7a1dc8c97290879 CVE-2023-28899,0,0,ace3616b7ed13c6232f5dbcd338861a0a3eb162cd24c045e8fb898537dda4273,2024-11-21T07:56:14.463000 CVE-2023-28900,0,0,95474310488f87be0cee5d16dabb5ad2dc651b5bd222f5c1e223db09f941ca4c,2024-11-21T07:56:14.617000 CVE-2023-28901,0,0,7b7a3ce35e98d750456768add88af488531e7343d46c7819972ceb6377506317,2024-11-21T07:56:14.760000 -CVE-2023-28902,0,1,3698c5da524da451152a768ad137f780fe6519739ffb59ac217047c14cc22d9f,2025-06-30T20:15:22.727000 -CVE-2023-28903,0,1,a6525a6893f041620d23fa0c4862e1d586dfbd758d374e9290b684181659a825,2025-06-30T20:15:23.040000 -CVE-2023-28904,0,1,48f8e76975f7e65495c0111133028b95935821e864df3784b425f692e0d6ff3d,2025-06-30T20:15:23.153000 -CVE-2023-28905,0,1,2a41b78fed081aa4dd910eae6bff92152776f88fc974b60efcceb8c51bd0dbe4,2025-06-30T20:15:23.260000 -CVE-2023-28906,0,1,845656aec921e8c72c3bd5595314345ce6093c7fb9158a7d069a24e6ba7032a4,2025-06-30T20:15:23.370000 -CVE-2023-28907,0,1,bfb1283518cee7a3f4e84dd875cc816f4df6ab56c56d5d2ac65a8259c2d10ad0,2025-06-30T20:15:23.477000 -CVE-2023-28908,0,1,3ae89c013f86207254bfeb8ad7d472bb4053f4a7475ebf7c94cb08c11a344cd3,2025-06-30T20:15:23.580000 -CVE-2023-28909,0,1,2e46b8aeecfd78ab096387b0b66255d017b14fbf3d86b885daf7858e5f5468cf,2025-06-30T20:15:23.697000 +CVE-2023-28902,0,0,3698c5da524da451152a768ad137f780fe6519739ffb59ac217047c14cc22d9f,2025-06-30T20:15:22.727000 +CVE-2023-28903,0,0,a6525a6893f041620d23fa0c4862e1d586dfbd758d374e9290b684181659a825,2025-06-30T20:15:23.040000 +CVE-2023-28904,0,0,48f8e76975f7e65495c0111133028b95935821e864df3784b425f692e0d6ff3d,2025-06-30T20:15:23.153000 +CVE-2023-28905,0,0,2a41b78fed081aa4dd910eae6bff92152776f88fc974b60efcceb8c51bd0dbe4,2025-06-30T20:15:23.260000 +CVE-2023-28906,0,0,845656aec921e8c72c3bd5595314345ce6093c7fb9158a7d069a24e6ba7032a4,2025-06-30T20:15:23.370000 +CVE-2023-28907,0,0,bfb1283518cee7a3f4e84dd875cc816f4df6ab56c56d5d2ac65a8259c2d10ad0,2025-06-30T20:15:23.477000 +CVE-2023-28908,0,0,3ae89c013f86207254bfeb8ad7d472bb4053f4a7475ebf7c94cb08c11a344cd3,2025-06-30T20:15:23.580000 +CVE-2023-28909,0,0,2e46b8aeecfd78ab096387b0b66255d017b14fbf3d86b885daf7858e5f5468cf,2025-06-30T20:15:23.697000 CVE-2023-2891,0,0,e3feeab0619825c1073733808071dc45223397d726b3177896edea0ff0a9af90,2024-11-21T07:59:30.437000 CVE-2023-28910,0,0,831a9a3917b92f12c9ff1a823e73e23e99bcb8326fb106ce23c3adc8ffc2b4a8,2025-06-30T18:38:23.493000 CVE-2023-28911,0,0,4fbf717739725399adb061643a4809f6a5707ab599050b12df64418ccd90aa37,2025-06-30T18:38:23.493000 @@ -238172,7 +238172,7 @@ CVE-2023-47307,0,0,112c4fcd2316630545c0b8214cf0e27b8ce26f6bb0e9c99277c68ca8f2b87 CVE-2023-47308,0,0,7d5ff54c309fa19adc9e793bda18cb0b740ceb6c9d3315a532ce40f5c4fd1165,2024-11-21T08:30:07.870000 CVE-2023-47309,0,0,24c2011ecb6d7db56739e87951b446acfc2502ed2d4ef1d44fda31d0f3b47ac3,2024-11-21T08:30:08.030000 CVE-2023-4731,0,0,d05232eed0c052dd2a1d5ec6b0be8f9b495ae5a2bd0ca62433c506bf8c986847,2025-01-15T16:31:04.880000 -CVE-2023-47310,0,1,9f4a8303777bbd11cb5a68087188980834a4764dbf22f061cfecf0d1fb902168,2025-06-30T20:15:23.810000 +CVE-2023-47310,0,0,9f4a8303777bbd11cb5a68087188980834a4764dbf22f061cfecf0d1fb902168,2025-06-30T20:15:23.810000 CVE-2023-47311,0,0,b95c9f4ee7ff54f1db61b336a25ed1ed49149c6e779141e5eaa4ce520fe1e575,2024-11-21T08:30:08.283000 CVE-2023-47312,0,0,42944cc44c110aadfec0e3ea54804d471daddba94144037ba9fb032325e0ea39,2024-11-21T08:30:08.460000 CVE-2023-47313,0,0,263f2c0543bd5ec30e1b2e45eebc7a95f0ea67b86f319d05fa2226679d75307f,2024-11-21T08:30:08.597000 @@ -276001,7 +276001,7 @@ CVE-2024-53617,0,0,dd2ee5869a76723244988f189f5e4e219fcd77588c7888e87da2897c111b3 CVE-2024-53619,0,0,7e8e9692dc22af705d23ae8b792483811e548f5452e797f9099331427eac5db0,2024-11-26T20:15:33.880000 CVE-2024-5362,0,0,65cc93fbb06de51acd392fcf91df16bbed3865e6bb98fea60125a3f2dc4dd426,2025-02-10T13:55:46.317000 CVE-2024-53620,0,0,0ec00be95852a0998a14f46021597d58d0eefdd89109b46c5f804a1cf687bc07,2024-11-26T20:15:34.050000 -CVE-2024-53621,0,1,79b3eabb799917f8b87dec2d6a3ef730878c11efbed4755db01cae8b2c352183,2025-06-30T20:15:24.383000 +CVE-2024-53621,0,0,79b3eabb799917f8b87dec2d6a3ef730878c11efbed4755db01cae8b2c352183,2025-06-30T20:15:24.383000 CVE-2024-53623,0,0,531ddce100784ec8b317b297b660a260e518e8b80f64012824aac6bf3d8289e3,2024-12-02T20:15:07.917000 CVE-2024-5363,0,0,1a1d04dd62a3d9ceb936776096c694704c071db758e0c336b93f44ac203c6bde,2025-02-10T14:41:03.540000 CVE-2024-53635,0,0,7a67e9e0d9d71b612bd6cfd95f53056a7f326cdca18b0bdba544dd72fd3cefe4,2025-04-04T15:39:01.230000 @@ -293125,8 +293125,8 @@ CVE-2025-32459,0,0,dae6c2ac44f0e8d47f2cd1bfa34e1b0071873a215a44a6369412520c6ea64 CVE-2025-3246,0,0,d943818b43557c9519758b844725afa009508b574d2bbdf1c927d75056c761a3,2025-04-21T14:23:45.950000 CVE-2025-32460,0,0,16cc364f1c655bf6f21d50384a646311718edc25ee850ac035bf3b1975d34030,2025-04-09T20:02:41.860000 CVE-2025-32461,0,0,8bce56f6863b74eaac27069424b18b802ee4aeb8905aa3153fdbbd924c0604dc,2025-04-09T20:02:41.860000 -CVE-2025-32462,1,1,a309ececf239aee95a89125e1696e62b0fc00af3b051db9b1cd63d6a014410bc,2025-06-30T21:15:30.080000 -CVE-2025-32463,1,1,e2bcba3bbd676b15a73d5a9dbee641cdb1f40c7ff5ce9acdf12cca8c8e66d0d9,2025-06-30T21:15:30.257000 +CVE-2025-32462,0,0,a309ececf239aee95a89125e1696e62b0fc00af3b051db9b1cd63d6a014410bc,2025-06-30T21:15:30.080000 +CVE-2025-32463,0,0,e2bcba3bbd676b15a73d5a9dbee641cdb1f40c7ff5ce9acdf12cca8c8e66d0d9,2025-06-30T21:15:30.257000 CVE-2025-32464,0,0,d585900889b901117e0fe728cc5e64b12123c28db643e71ecaab58b67603729d,2025-04-23T22:15:15.460000 CVE-2025-32465,0,0,18f0254fcddc6f93884de750d3f2429ec4adc6fe5d4e9076904035e514a09681,2025-06-12T16:06:20.180000 CVE-2025-32466,0,0,d6dc52d19056c6857b8d7b1ad7b39f71f723d971a207e33753f74fea4bed0bab,2025-06-12T16:06:20.180000 @@ -295921,7 +295921,7 @@ CVE-2025-45322,0,0,bd98baac9032c4924e89f536321099d3c4e9b0a26b0e91693b82dcae0f7fc CVE-2025-4533,0,0,958714e8219e4b36bf6a5171f1844fbafd960204dc55ae1eaffcf3377f047967,2025-05-12T17:32:32.760000 CVE-2025-45331,0,0,1a763087f3a9266aa4ad598d9cc797aba7ebe6d738e262c7bb0a83be881654a7,2025-06-24T16:15:28.007000 CVE-2025-45332,0,0,3e680282347d513ad76d880bfdd241726c33a42cd9243ea852e7ec50a8a70a04,2025-06-26T18:57:43.670000 -CVE-2025-45333,0,1,45594321e39ae2977f3091895d155d4678d0aee4381745d3aacbb14cd19adaca,2025-06-30T21:15:30.427000 +CVE-2025-45333,0,0,45594321e39ae2977f3091895d155d4678d0aee4381745d3aacbb14cd19adaca,2025-06-30T21:15:30.427000 CVE-2025-4534,0,0,d56048b96631b6a170c2f4a1ae209f80a8905f2c01c2315ddf151590a444fbdb,2025-05-12T17:32:32.760000 CVE-2025-45343,0,0,7615694706f3e006934d6364d7caac354737a6562145f3bc3ab74518e76c62f3,2025-06-03T15:36:32.347000 CVE-2025-4535,0,0,211c420ea7fc40b2c6369c81b50b72179abd6b1518746dfb87b4fb36af845bbb,2025-05-12T17:32:32.760000 @@ -297860,13 +297860,13 @@ CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa CVE-2025-49163,0,0,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000 CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000 CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000 -CVE-2025-49175,0,1,bc48898aa22840d684e986dd4bc99123d118318d12fcdde1f78c0811c7f9da52,2025-06-30T20:15:24.553000 -CVE-2025-49176,0,1,7c8e3298f5c5daf34fd87a5b2093060a65cb032351d81042db8ee9f2aaa6d551,2025-06-30T20:15:24.690000 +CVE-2025-49175,0,0,bc48898aa22840d684e986dd4bc99123d118318d12fcdde1f78c0811c7f9da52,2025-06-30T20:15:24.553000 +CVE-2025-49176,0,0,7c8e3298f5c5daf34fd87a5b2093060a65cb032351d81042db8ee9f2aaa6d551,2025-06-30T20:15:24.690000 CVE-2025-49177,0,0,88fe85ebfb311cc7851d290d91c8e67844d99ab06620a758f4cae9a3c93ed2ef,2025-06-30T10:15:25.913000 -CVE-2025-49178,0,1,2977b66486df3bf07a30aa6a0bfb1cefd659d07df5857968bf6e6aab4abd4148,2025-06-30T21:15:30.693000 -CVE-2025-49179,0,1,690955eeef8fc1b93cd649b8d87bd4128d4338f5aa14dc011f7c01904dc55014,2025-06-30T20:15:24.817000 +CVE-2025-49178,0,0,2977b66486df3bf07a30aa6a0bfb1cefd659d07df5857968bf6e6aab4abd4148,2025-06-30T21:15:30.693000 +CVE-2025-49179,0,0,690955eeef8fc1b93cd649b8d87bd4128d4338f5aa14dc011f7c01904dc55014,2025-06-30T20:15:24.817000 CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000 -CVE-2025-49180,0,1,e9711ad3588c97661db2e1f474cb48105c3aa995cfcc9886fec475a3e87c02d2,2025-06-30T20:15:24.940000 +CVE-2025-49180,0,0,e9711ad3588c97661db2e1f474cb48105c3aa995cfcc9886fec475a3e87c02d2,2025-06-30T20:15:24.940000 CVE-2025-49181,0,0,65f8ea01de63d019d8688de775c40b302b8c0b1e44c040e53e46324e69435218,2025-06-12T16:06:20.180000 CVE-2025-49182,0,0,8adc8833944dbbffb6c925bafc811eee2574582f2d7b7b09537e334080770141,2025-06-13T09:15:20.130000 CVE-2025-49183,0,0,c9c3ab65e477d8e9a4d5c9adaf45822d49f0873835d0971680386eb894e72562,2025-06-12T16:06:20.180000 @@ -298057,15 +298057,15 @@ CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb CVE-2025-4948,0,0,0e7df54c260456a30951ec3ca271c8ecd68713b1dbf742cd867d5b3aa598f5dd,2025-06-17T12:15:27.520000 CVE-2025-49487,0,0,f1f07e31d2426bd898f1c4797310a5283aec7c5c600ab98cdf9e862e3d719d19,2025-06-17T20:50:23.507000 CVE-2025-4949,0,0,0316997b060f0791f7006e3582f42d4352e21f331c0768bafb1b692dffdd3405,2025-06-17T14:10:34.853000 -CVE-2025-49493,1,1,2d0b0740561cb3194fdbcb5d8c713250dba5d8716cc7ec42f02017fd586f54c8,2025-06-30T20:15:25.060000 +CVE-2025-49493,0,0,2d0b0740561cb3194fdbcb5d8c713250dba5d8716cc7ec42f02017fd586f54c8,2025-06-30T20:15:25.060000 CVE-2025-49507,0,0,8df57474dbf672acfe3170fcfeb7ba8c285d0e6636e6db25f644b19e631f2cda,2025-06-12T16:06:39.330000 CVE-2025-49508,0,0,04e385c54571a60ffb676472b30653696331e96ca9c4d7f0b4a42af7ae744aa9,2025-06-17T20:50:23.507000 CVE-2025-49509,0,0,83d7c029291217af9a97963b6a105646b66e999b31aeea3bf105eeb0ecb2ab96,2025-06-12T16:06:39.330000 CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000 CVE-2025-49510,0,0,3bb8122e36ad249db39449b81c1d9bb5005e0826a2addc079025211cebc0dc64,2025-06-12T16:06:39.330000 CVE-2025-49511,0,0,5857ce4f5934ac8d4eab419d1a69fa9027dcf280ff9a1fb08e4e3e1a5703ab2f,2025-06-12T16:06:39.330000 -CVE-2025-49520,1,1,cb8826b22300f5a9d2eae9ca5dafc15b1f5e0f8306ced606515beea3acf195ef,2025-06-30T21:15:30.913000 -CVE-2025-49521,1,1,8d9931f59dc1f8590f74fb0429e8ba8edb007bf2a0a1c9740d850475b0fd0bb7,2025-06-30T21:15:31.063000 +CVE-2025-49520,0,0,cb8826b22300f5a9d2eae9ca5dafc15b1f5e0f8306ced606515beea3acf195ef,2025-06-30T21:15:30.913000 +CVE-2025-49521,0,0,8d9931f59dc1f8590f74fb0429e8ba8edb007bf2a0a1c9740d850475b0fd0bb7,2025-06-30T21:15:31.063000 CVE-2025-4954,0,0,1ec01516c4567931b4ffc24e86d8b1eee9006bb52ce75acce1cd554027fb1f48,2025-06-12T16:06:39.330000 CVE-2025-49549,0,0,d51ae214ec023b9fbf2d300a776160828d2a71b7300d33bc04b291b25e1ecd5e,2025-06-26T18:57:43.670000 CVE-2025-4955,0,0,85a93e6cc9d76b6eb96cac66d66bf9a676c7375a6a733a4a5f80ea99e88eb438,2025-06-18T19:15:22.137000 @@ -298516,7 +298516,7 @@ CVE-2025-52486,0,0,141d3cdd89e3d8b09e19fb7d7dfc50e25ac40afc5c2dd413dd0730327594f CVE-2025-52487,0,0,7cd2bd74a4137e25655cda69485a3b65bad2829b1fa25c7a60a65991a011a8d4,2025-06-23T20:16:21.633000 CVE-2025-52488,0,0,ca6b051d0da46d813959bb70c94307ecd22ce69e425b14627b87b7e8b19e660f,2025-06-23T20:16:21.633000 CVE-2025-5249,0,0,ed726cc2a905d079d3cf80f621868a312481896aae378521d98a1a546311541b,2025-06-24T15:55:43.913000 -CVE-2025-52491,1,1,eb6821ffbfeb732e8f091e919e66b824d1e634cbf7de445f8ba65c50a3dd10e1,2025-06-30T20:15:25.233000 +CVE-2025-52491,0,0,eb6821ffbfeb732e8f091e919e66b824d1e634cbf7de445f8ba65c50a3dd10e1,2025-06-30T20:15:25.233000 CVE-2025-5250,0,0,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000 CVE-2025-5251,0,0,f632fe7c5885617fb201b5b935c30961323c6054755926cad7791588fe5ea46c,2025-06-10T15:12:43.393000 CVE-2025-5252,0,0,befcffbe58a6c748b51a32dbfdb428108ffe2b16ca817a921564fafd634c86b0,2025-06-09T18:51:06.110000 @@ -298642,7 +298642,7 @@ CVE-2025-52896,0,0,537c940479f6d8ed2fd7570b79b681b72d560b8cd3b602b11f06845667f6b CVE-2025-52898,0,0,242d59c80cc4edaa7ca03e9ee9195e87d313d397bee553aa627941585c2037e5,2025-06-30T18:38:23.493000 CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000 CVE-2025-52900,0,0,af44f4dfef316e8ff7cd339f0dd8b1907013e95e6c4b530df54072f87fc13707,2025-06-26T18:57:43.670000 -CVE-2025-52901,1,1,597dd3e0884e75a10ca3c76c1126f6f1d090a216692cce1bc426e825d8307a6f,2025-06-30T20:15:25.390000 +CVE-2025-52901,0,0,597dd3e0884e75a10ca3c76c1126f6f1d090a216692cce1bc426e825d8307a6f,2025-06-30T20:15:25.390000 CVE-2025-52902,0,0,b8d594698346e33c9857483268477e14dc09fa28d15e66d418ce57128530f231,2025-06-26T18:57:43.670000 CVE-2025-52903,0,0,94a4c6feeb3ab5f2f3f94f951914d81f3159a284c72cdc60f80cd2659d917108,2025-06-30T18:39:09.973000 CVE-2025-52904,0,0,bcfb9cec165acf9ecfbf631b206a037247a445035acaabf7192276de61173353,2025-06-30T18:39:09.973000 @@ -298682,13 +298682,13 @@ CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee1 CVE-2025-52991,0,0,af527bf448c3b79a9a912ad56fc25360922d64c6abc7ec2e2fd1e75369f722b0,2025-06-30T18:38:48.477000 CVE-2025-52992,0,0,9c4fa9f8ea6e8dc53af8837e8b039c0aa0aaeec26b6c426f5dffffdfdb7d6aac,2025-06-30T18:38:48.477000 CVE-2025-52993,0,0,dc940a9ee703c8bb3ea37bb3d5d2324d1d910344929ff8677571ae1dab4af4b3,2025-06-30T18:38:48.477000 -CVE-2025-52995,1,1,c67682ed684859bfb820422ba1e3386478c8c63d7bbb825116a1deabfd033067,2025-06-30T20:15:25.540000 -CVE-2025-52996,1,1,1f4f5c110efec99e6e38a7cb0ee56eb21d588a47d04b011e206d8b084ef0651c,2025-06-30T20:15:25.690000 -CVE-2025-52997,1,1,8717eb5a96661b5be48b3e1d3819b0de26e9a9606e208971a9b2aa822c4206f0,2025-06-30T20:15:25.847000 +CVE-2025-52995,0,0,c67682ed684859bfb820422ba1e3386478c8c63d7bbb825116a1deabfd033067,2025-06-30T20:15:25.540000 +CVE-2025-52996,0,0,1f4f5c110efec99e6e38a7cb0ee56eb21d588a47d04b011e206d8b084ef0651c,2025-06-30T20:15:25.690000 +CVE-2025-52997,0,0,8717eb5a96661b5be48b3e1d3819b0de26e9a9606e208971a9b2aa822c4206f0,2025-06-30T20:15:25.847000 CVE-2025-52999,0,0,8e3ffe270e9e0f4f311570c01291b88502def8da5bc3d26946c9776265012b0e,2025-06-26T18:57:43.670000 CVE-2025-53001,0,0,3c076b45fb4f64495030b45a0e1e68f972266e053573d2640ae8c69ca5f6b1fe,2025-06-30T16:15:24.123000 CVE-2025-53002,0,0,88ca888237f37e4e624e68585cc923f4d5409fd291622a596533223ce1e1a8f6,2025-06-26T18:57:43.670000 -CVE-2025-53004,1,1,6bddad98cf56c6d37c8c20a80a83e12a5d5e8bdf04dfb81442be17d507518826,2025-06-30T21:15:31.563000 +CVE-2025-53004,0,0,6bddad98cf56c6d37c8c20a80a83e12a5d5e8bdf04dfb81442be17d507518826,2025-06-30T21:15:31.563000 CVE-2025-53007,0,0,a4076fc87f8a0924938a60c1b4d21b89458fde7ab2bc0e9913efaa46d339ee87,2025-06-26T18:57:43.670000 CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a1594,2025-06-18T05:15:50.287000 CVE-2025-53013,0,0,ee406bf23bf1a0f5f249e7eb22f810b8cfccae8c849cf03bf7e4a61df66a8caa,2025-06-26T18:57:43.670000 @@ -299660,10 +299660,10 @@ CVE-2025-6486,0,0,9279349c7782d4462e26da818de9d0c7bcf2cfb484b863830cae3c45969d17 CVE-2025-6487,0,0,29e0a7237d62fc67ee05c71aab1c7439f3b9715b366fd94f580ddf8afdfdbd57,2025-06-25T19:31:27.433000 CVE-2025-6488,0,0,b55e08aa87e9535ec20e5480e2ce75b16c60b84301f6e502aae767b9871809d6,2025-06-30T18:38:48.477000 CVE-2025-6489,0,0,76ec524cc88748434edd32da385ea8c072cc94c0dd99ce64a004c4e1e23c404b,2025-06-25T19:31:16.637000 -CVE-2025-6490,0,1,285dbe5b584596005459f48ccaa0c22dc2487868242662a884b5fa361ce99404,2025-06-30T20:15:26 +CVE-2025-6490,0,0,285dbe5b584596005459f48ccaa0c22dc2487868242662a884b5fa361ce99404,2025-06-30T20:15:26 CVE-2025-6492,0,0,f4c450e5238d0b6066bddd75aa5d427fff899ce0a5a143de6c2c6c6e80c1f5f1,2025-06-23T20:16:21.633000 CVE-2025-6493,0,0,f54e9deddeec98b5a4250c90a84de909e0f3c6a0b361893486f5209add5470e9,2025-06-23T20:16:21.633000 -CVE-2025-6494,0,1,ef1e696e0afb867512c0cf19a5e23c15294d9a2bb127c1de2e7e652d6b460e83,2025-06-30T20:15:26.160000 +CVE-2025-6494,0,0,ef1e696e0afb867512c0cf19a5e23c15294d9a2bb127c1de2e7e652d6b460e83,2025-06-30T20:15:26.160000 CVE-2025-6496,0,0,41dc145f9a02ba783f2ed330080b0df94da07c3c130615dd33f85880edf7aacb,2025-06-23T20:16:21.633000 CVE-2025-6497,0,0,085a542a1200fd4aa6eb1522dd911d9a98ef8c5a6df00f38adf93948fb0f75bd,2025-06-23T20:16:21.633000 CVE-2025-6498,0,0,11f74f8785056a6e7a545d5e8f3aeedffc98d72b787c795f6ceff6211b41f5d2,2025-06-23T20:16:21.633000 @@ -299705,6 +299705,7 @@ CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad CVE-2025-6550,0,0,fb64cb2731bfe62fcb701e0148808a0bd737d54903b1841bd8460bed4aa8b411,2025-06-30T18:38:48.477000 CVE-2025-6551,0,0,9449985e7a9055bc84479e0b0f2b57fed721bbaf75a59a8d5b22bb237a895a0a,2025-06-26T18:58:14.280000 CVE-2025-6552,0,0,8717beff1ed0b4c67a4a3bc77f60be53e5be3c4b231cbc45b02cbdea4703f774,2025-06-26T18:58:14.280000 +CVE-2025-6554,1,1,b5be19d70f61e3d4c7103aa5d9671d8a3cb1471f37e3c6833b35241547c2c250,2025-06-30T22:15:29.873000 CVE-2025-6555,0,0,778b8348c64662c8e4459061cabbb632e36dc7c09a92710349fb4cd01cbc0fbb,2025-06-26T18:58:14.280000 CVE-2025-6556,0,0,0cdb8a2b9e72a2754bb3a3954835fbf3d9af035032442306dedd19790d98994e,2025-06-26T18:58:14.280000 CVE-2025-6557,0,0,8cc85c420253a381d54904e4cdc2ede3bb9bc6850688f1e7d13a25637f2c7124,2025-06-26T18:58:14.280000 @@ -299770,7 +299771,7 @@ CVE-2025-6661,0,0,0a6fd1ca8bda3f42faed49a1521f09e40d46a36c8e217b4ea47710e8104723 CVE-2025-6662,0,0,5c5166ff9346183b32a70db53aef827fb54827f9b31eed5d0663faf254f2a0be,2025-06-26T18:57:43.670000 CVE-2025-6664,0,0,255c7bbda244ee1c6cb8ea0927bfc65b2c2f80bee216e706a66f1a5aec92db63,2025-06-27T17:57:43.810000 CVE-2025-6665,0,0,819e0fbbba720c6c224657e5e3d234dfe09f50d6f19ea31a4a8557c46f9ecfaf,2025-06-27T17:56:25.200000 -CVE-2025-6667,0,1,f7249d0ce2242cc1fb55502e78a9d1851a88aea1d56705388779a71c32d97776,2025-06-30T21:15:32.063000 +CVE-2025-6667,0,0,f7249d0ce2242cc1fb55502e78a9d1851a88aea1d56705388779a71c32d97776,2025-06-30T21:15:32.063000 CVE-2025-6668,0,0,2c668ab21380ad28d26e4a71eb753799465f7ccb1ef8018c5159319921192efe,2025-06-27T17:49:20.193000 CVE-2025-6669,0,0,910a314b076194cb451db40c00cbeb61d557257d78d120caf65549dfd156af45,2025-06-27T11:15:25.547000 CVE-2025-6674,0,0,2a96b77d18a3ed5a15d1217808f66635d48de16e05f22c39a4ae455ffcadc0f2,2025-06-26T18:57:43.670000 @@ -299913,7 +299914,10 @@ CVE-2025-6912,0,0,cae4e1cf87582d85db9d877c73e8e60b899629dfb26edef320fab8cb80d861 CVE-2025-6913,0,0,b1375ecae91316337130edd76072e633c1171b77c9ea48f86513d6cbcaed7648,2025-06-30T18:38:23.493000 CVE-2025-6914,0,0,31c470e09df7cbf15079af053ef9a5eea3f5ef895e7002fe88b5b6e862908b59,2025-06-30T18:38:23.493000 CVE-2025-6915,0,0,869b44ab2dae4523caa9acbdb01a0277b6fb46e25329958c0ba16905bdb9a650,2025-06-30T18:38:23.493000 -CVE-2025-6916,0,1,524850ebae15b52ae083b8140e4ab97ad9b5dd7a5e34956ff208001c526a5fed,2025-06-30T21:15:32.730000 +CVE-2025-6916,0,0,524850ebae15b52ae083b8140e4ab97ad9b5dd7a5e34956ff208001c526a5fed,2025-06-30T21:15:32.730000 CVE-2025-6917,0,0,129e7ed7538995bd47122ea1abcbbb313d42d5948a17ca0bbad09769943187c8,2025-06-30T18:38:23.493000 CVE-2025-6925,0,0,9b6fc4858861f5dc5e36531cf5cf597ec00fe77481d8d8c4445a1b8259bb2b27,2025-06-30T19:15:25.920000 -CVE-2025-6929,1,1,9ece799ba6281b8e7980c379023d8b829d9e61abb4e41ab8d03daafaba29b64d,2025-06-30T21:15:32.853000 +CVE-2025-6929,0,0,9ece799ba6281b8e7980c379023d8b829d9e61abb4e41ab8d03daafaba29b64d,2025-06-30T21:15:32.853000 +CVE-2025-6930,1,1,bee982db182da79a40468adbb11226ff1e623020a4f5164f27db8f4cc413aaf3,2025-06-30T22:15:30.010000 +CVE-2025-6931,1,1,df9ddfbde912faafa5e4493b429283a88936738657f10a40de2d7749ea0b032c,2025-06-30T23:15:21.863000 +CVE-2025-6932,1,1,6c23dab722d2bfca6e0ab05eb53a46bfd002e1a13ce5c4f6e40d491d0daae338,2025-06-30T23:15:22.103000