Auto-Update: 2025-06-17T06:00:19.321433+00:00

This commit is contained in:
cad-safe-bot 2025-06-17 06:03:58 +00:00
parent b4bca37dd6
commit d339989637
10 changed files with 965 additions and 52 deletions

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-3493",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-06-17T04:15:51.700",
"lastModified": "2025-06-17T04:15:51.700",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE ID has been rejected by its CNA as it was not a security issue."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-3494",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-06-17T04:15:54.940",
"lastModified": "2025-06-17T04:15:54.940",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE ID has been rejected by its CNA as it was not a security issue."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,156 @@
{
"id": "CVE-2025-6158",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T04:15:55.407",
"lastModified": "2025-06-17T04:15:55.407",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in D-Link DIR-665 1.00. This affects the function sub_AC78 of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir665-dlink",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir665-dlink#poc",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312633",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312633",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.593161",
"source": "cna@vuldb.com"
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6159",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T04:15:56.140",
"lastModified": "2025-06-17T04:15:56.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in code-projects Hostel Management System 1.0. This vulnerability affects unknown code of the file /allocate_room.php. The manipulation of the argument search_box leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Aalok-zz/cve/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312634",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312634",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.593177",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6160",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T05:15:21.567",
"lastModified": "2025-06-17T05:15:21.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in SourceCodester Client Database Management System 1.0. This issue affects some unknown processing of the file /user_customer_create_order.php. The manipulation of the argument user_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/yitianweiming/cve/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312635",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312635",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.593216",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6161",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T05:15:21.833",
"lastModified": "2025-06-17T05:15:21.833",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Simple Food Ordering System 1.0. Affected is an unknown function of the file /editproduct.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/kakalalaww/CVE/issues/17",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312636",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312636",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.593237",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2025-6162",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T05:15:22.053",
"lastModified": "2025-06-17T05:15:22.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formMultiAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/Lena-lyy/cve/blob/main/688/8.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Lena-lyy/cve/blob/main/688/8.md#poc",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312637",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312637",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.593600",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2025-6163",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T05:15:22.267",
"lastModified": "2025-06-17T05:15:22.267",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK A3002RU 3.0.0-B20230809.1615 and classified as critical. Affected by this issue is some unknown functionality of the file /boafrm/formMultiAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/Lena-lyy/cve/blob/main/688/9.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Lena-lyy/cve/blob/main/688/9.md#poc",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312638",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312638",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.593601",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-17T04:00:19.941889+00:00
2025-06-17T06:00:19.321433+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-17T03:15:26.553000+00:00
2025-06-17T05:15:22.267000+00:00
```
### Last Data Feed Release
@ -33,37 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
298094
298102
```
### CVEs added in the last Commit
Recently added CVEs: `24`
Recently added CVEs: `8`
- [CVE-2024-21856](CVE-2024/CVE-2024-218xx/CVE-2024-21856.json) (`2025-06-17T03:15:23.700`)
- [CVE-2024-43422](CVE-2024/CVE-2024-434xx/CVE-2024-43422.json) (`2025-06-17T03:15:24.283`)
- [CVE-2024-45065](CVE-2024/CVE-2024-450xx/CVE-2024-45065.json) (`2025-06-17T03:15:24.353`)
- [CVE-2024-45069](CVE-2024/CVE-2024-450xx/CVE-2024-45069.json) (`2025-06-17T03:15:24.430`)
- [CVE-2024-45380](CVE-2024/CVE-2024-453xx/CVE-2024-45380.json) (`2025-06-17T03:15:24.500`)
- [CVE-2025-3774](CVE-2025/CVE-2025-37xx/CVE-2025-3774.json) (`2025-06-17T02:15:18.850`)
- [CVE-2025-4775](CVE-2025/CVE-2025-47xx/CVE-2025-4775.json) (`2025-06-17T02:15:19.867`)
- [CVE-2025-49823](CVE-2025/CVE-2025-498xx/CVE-2025-49823.json) (`2025-06-17T03:15:24.580`)
- [CVE-2025-52437](CVE-2025/CVE-2025-524xx/CVE-2025-52437.json) (`2025-06-17T03:15:25.127`)
- [CVE-2025-52438](CVE-2025/CVE-2025-524xx/CVE-2025-52438.json) (`2025-06-17T03:15:25.203`)
- [CVE-2025-52439](CVE-2025/CVE-2025-524xx/CVE-2025-52439.json) (`2025-06-17T03:15:25.280`)
- [CVE-2025-52440](CVE-2025/CVE-2025-524xx/CVE-2025-52440.json) (`2025-06-17T03:15:25.347`)
- [CVE-2025-52441](CVE-2025/CVE-2025-524xx/CVE-2025-52441.json) (`2025-06-17T03:15:25.410`)
- [CVE-2025-52442](CVE-2025/CVE-2025-524xx/CVE-2025-52442.json) (`2025-06-17T03:15:25.477`)
- [CVE-2025-52443](CVE-2025/CVE-2025-524xx/CVE-2025-52443.json) (`2025-06-17T03:15:25.547`)
- [CVE-2025-52444](CVE-2025/CVE-2025-524xx/CVE-2025-52444.json) (`2025-06-17T03:15:25.607`)
- [CVE-2025-52445](CVE-2025/CVE-2025-524xx/CVE-2025-52445.json) (`2025-06-17T03:15:25.673`)
- [CVE-2025-5673](CVE-2025/CVE-2025-56xx/CVE-2025-5673.json) (`2025-06-17T02:15:20.043`)
- [CVE-2025-6152](CVE-2025/CVE-2025-61xx/CVE-2025-6152.json) (`2025-06-17T02:15:20.213`)
- [CVE-2025-6153](CVE-2025/CVE-2025-61xx/CVE-2025-6153.json) (`2025-06-17T03:15:25.743`)
- [CVE-2025-6154](CVE-2025/CVE-2025-61xx/CVE-2025-6154.json) (`2025-06-17T03:15:25.947`)
- [CVE-2025-6155](CVE-2025/CVE-2025-61xx/CVE-2025-6155.json) (`2025-06-17T03:15:26.147`)
- [CVE-2025-6156](CVE-2025/CVE-2025-61xx/CVE-2025-6156.json) (`2025-06-17T03:15:26.340`)
- [CVE-2025-6157](CVE-2025/CVE-2025-61xx/CVE-2025-6157.json) (`2025-06-17T03:15:26.553`)
- [CVE-2025-3493](CVE-2025/CVE-2025-34xx/CVE-2025-3493.json) (`2025-06-17T04:15:51.700`)
- [CVE-2025-3494](CVE-2025/CVE-2025-34xx/CVE-2025-3494.json) (`2025-06-17T04:15:54.940`)
- [CVE-2025-6158](CVE-2025/CVE-2025-61xx/CVE-2025-6158.json) (`2025-06-17T04:15:55.407`)
- [CVE-2025-6159](CVE-2025/CVE-2025-61xx/CVE-2025-6159.json) (`2025-06-17T04:15:56.140`)
- [CVE-2025-6160](CVE-2025/CVE-2025-61xx/CVE-2025-6160.json) (`2025-06-17T05:15:21.567`)
- [CVE-2025-6161](CVE-2025/CVE-2025-61xx/CVE-2025-6161.json) (`2025-06-17T05:15:21.833`)
- [CVE-2025-6162](CVE-2025/CVE-2025-61xx/CVE-2025-6162.json) (`2025-06-17T05:15:22.053`)
- [CVE-2025-6163](CVE-2025/CVE-2025-61xx/CVE-2025-6163.json) (`2025-06-17T05:15:22.267`)
### CVEs modified in the last Commit

View File

@ -251420,7 +251420,7 @@ CVE-2024-21851,0,0,357d45614df90945550287893cfbeb32cbb4c927c6c52e5c9529544fa122f
CVE-2024-21852,0,0,74a89e8ad5e242dcaa69632c98166ec72cd5d0a1eabe8107cc899068b6ea0ada,2024-11-21T08:55:07.547000
CVE-2024-21853,0,0,8b2e94801d23bbdb5bf019b58ed4c3bebe4d5924e89f85aebf11850200583047,2024-11-15T14:00:09.720000
CVE-2024-21855,0,0,b5c9a274a6224ddacae3da8acd4d32ac5bd000acaa7f8868ebcff0034ce6f2f5,2024-12-20T17:05:24.753000
CVE-2024-21856,1,1,f92836ce2aace6dd7a2777f2d8bed47898c2dfc2a60a577b2b4bf1a4b27907fb,2025-06-17T03:15:23.700000
CVE-2024-21856,0,0,f92836ce2aace6dd7a2777f2d8bed47898c2dfc2a60a577b2b4bf1a4b27907fb,2025-06-17T03:15:23.700000
CVE-2024-21857,0,0,21f27586f3c19c0937ea9613c54ed803a63417bde7007defebc27244529299bf,2024-08-14T17:49:14.177000
CVE-2024-21859,0,0,863a316bec4875d2da4a53bc287fa489d63bdce1d3c559da025d91fcb906e825,2025-02-12T22:15:31.227000
CVE-2024-2186,0,0,e7b9bc33689c26748efbb2d9800c342e319e02f8dc6c3d554b2a80d535cba19e,2025-01-07T20:42:22.523000
@ -268034,7 +268034,7 @@ CVE-2024-43417,0,0,a64db853aab641666e5ccd36b5774318b1b87e33ceca621611b145b74c8ae
CVE-2024-43418,0,0,4070430691b02a9c3a3480d7781582dd0e8dd4d964b3db2f1a26ad5f03bae23d,2024-11-20T15:20:43.297000
CVE-2024-4342,0,0,282558c76df5bcb3009222bdb45a6cd86ea77fbc4b5b09640c455d3443a4a75b,2025-01-08T16:34:29.273000
CVE-2024-43420,0,0,66ac3a672997a4d83d291e551d88c0087b68307ccb2cf6209583b2ce1bac977c,2025-05-16T14:43:56.797000
CVE-2024-43422,1,1,0e44dea2b1d01015aa170e70ebab93bf337e6eac9a8f93e7afc439790ed3b6a7,2025-06-17T03:15:24.283000
CVE-2024-43422,0,0,0e44dea2b1d01015aa170e70ebab93bf337e6eac9a8f93e7afc439790ed3b6a7,2025-06-17T03:15:24.283000
CVE-2024-43423,0,0,40f724200624e0a82e27d594cb589d7e20a36a5d8a3309d35fb8ec9a9cf94ddd,2024-10-01T15:41:32.537000
CVE-2024-43424,0,0,cc0f47c54bc4c371470b3c35d0c5f93b67809f67fdaa7990da8d6cb4b234c505,2024-11-05T19:39:33.873000
CVE-2024-43425,0,0,5f296986d035650bb2f65d62720e365883ad00ea6ef201fcf9554505c579fea9,2025-05-01T16:01:21.307000
@ -269264,11 +269264,11 @@ CVE-2024-45060,0,0,fdf3192e213f43713fe94dd4f660c140c402b48e19c6be5f44cc86908a9d0
CVE-2024-45061,0,0,05b1c7309f8ac21a996408c3f436219993810ef39c6cdbea2d2923f33822314f,2025-01-15T17:15:15.113000
CVE-2024-45063,0,0,1409a1792fb044d0180db60765e18242d949607976f55c38d4cb7d3b87690fec,2024-09-06T17:35:18.370000
CVE-2024-45064,0,0,f9743d959694386bb54450caed4c891cbc8d8760238efdc92821b602741223ec,2025-04-02T22:15:17.837000
CVE-2024-45065,1,1,8cfe7facab3cb521245e7885392073ac9463212db0914446ddd8e735d0269172,2025-06-17T03:15:24.353000
CVE-2024-45065,0,0,8cfe7facab3cb521245e7885392073ac9463212db0914446ddd8e735d0269172,2025-06-17T03:15:24.353000
CVE-2024-45066,0,0,d33701ba745edbfb429176564dad3e868c8fa86bb8965e021d0d157e59195ffa,2024-10-01T16:18:10.680000
CVE-2024-45067,0,0,194c9038ea8eb2ec1c0bbe8ef867bac3e1ecda9d66a0f2f9b59054cd6f54a4f5,2025-05-16T14:43:26.160000
CVE-2024-45068,0,0,c8edc7e1dd2efd4150730702fd7fc207bb2cdcb6fa3089f6d2a2ca2cb86ca5f7,2024-12-03T03:15:04.953000
CVE-2024-45069,1,1,e17613383712b4e08930338073f6275a311ae9ba0ef3380c2e4d29a03e5f71eb,2025-06-17T03:15:24.430000
CVE-2024-45069,0,0,e17613383712b4e08930338073f6275a311ae9ba0ef3380c2e4d29a03e5f71eb,2025-06-17T03:15:24.430000
CVE-2024-4507,0,0,0cce0099e9b56e6c38adf32141097ae968c74e9462bd520a29ad2d370b497aec,2024-11-21T09:42:58.820000
CVE-2024-45070,0,0,43e0077f9a86df49dc06e0bc270dca12765a65a9b97b06417a38e8b9e983cbe0,2025-01-07T08:15:25.457000
CVE-2024-45071,0,0,0ebd9328ae264441016b56fd159e414fac64c80926728a2280c837cee121e42d,2024-10-21T13:41:29.383000
@ -269549,7 +269549,7 @@ CVE-2024-45372,0,0,1b07d3d9e033943fb55ce65f8c2cbc8346f497a17e61dad4e25d3ecee91e0
CVE-2024-45373,0,0,149e9090bfdbf6459cd418cf73d5e0c44a72786503d9e985f6942e8fa02cbb7f,2024-10-01T16:13:23.823000
CVE-2024-45374,0,0,86e048949631fe88804ec0296c8a5c923e85472b04bc6d0226dd7e22819500ea,2024-10-17T17:15:11.997000
CVE-2024-4538,0,0,5bd1ad90e973f76dc331cc98dd5010eac6153f7bd5c3f59bc15316bd99e49f05,2024-11-21T09:43:03.833000
CVE-2024-45380,1,1,ef9db6c1147acfd7ca36a1f66c7676d914f987eadf2e885461fe156b9e651e30,2025-06-17T03:15:24.500000
CVE-2024-45380,0,0,ef9db6c1147acfd7ca36a1f66c7676d914f987eadf2e885461fe156b9e651e30,2025-06-17T03:15:24.500000
CVE-2024-45382,0,0,cd17bb10b42a7a52154b8f180f6a96138cbe671bc16e0955e6b9f0951bb6f705,2024-10-16T17:43:43.917000
CVE-2024-45383,0,0,18b2a12c0247f6bd404573e4f3025c14dad6c1dfae1f9cf4c31db12712f62634,2024-11-21T09:37:42.043000
CVE-2024-45384,0,0,62ecc8324fb2b658b80d54620631778adf96f05f1a6232d392a718f0d1c7ab0d,2025-03-14T20:15:13.667000
@ -293340,6 +293340,8 @@ CVE-2025-3487,0,0,199b8611c8e5457bd92c751e347923a2fd3e3ae8117e5e7759eec299c03e59
CVE-2025-3488,0,0,c7eefb60f78d0958cd2e23946d634228ed1d24a7964a368a35db998af9592006,2025-05-06T13:42:26.630000
CVE-2025-3489,0,0,22e5f1777a5f532464016f9071d8308171f171177cfe8600f06a4b3ff312d639,2025-04-29T20:21:05.627000
CVE-2025-3491,0,0,764070d57369c52ed17db36acb0e46c080442745adab2da0d65d4052df55b4e1,2025-04-29T13:52:10.697000
CVE-2025-3493,1,1,710768fa82b2fdfed7afb4421abc006aa127722a5b581650774cfc22d97391a6,2025-06-17T04:15:51.700000
CVE-2025-3494,1,1,895818aaf59db2b99c5d4035d526d1a6e1e75a9b529efd9be2a175701512ee7b,2025-06-17T04:15:54.940000
CVE-2025-3495,0,0,fe640c81a3ed6a86c53f35442fa10e181d645418d808dffc6fff69a3880ca71e,2025-04-16T13:25:37.340000
CVE-2025-3496,0,0,eeeb25234db4b5411b18647e6b883fd7c97d2c7df03da24267ee3dd146e4a70c,2025-05-12T17:32:32.760000
CVE-2025-35003,0,0,21587c625dab7683038a5bdc307498878657bea1128b3a4ea6c83622b9ed0b8f,2025-05-28T15:01:30.720000
@ -293616,7 +293618,7 @@ CVE-2025-3769,0,0,3f7372036ea22709a172464e7fa400f2a2b90380b5ac20ab94f3bbb2664582
CVE-2025-37730,0,0,67e6e3825da3f11311501c243f4ff0e5cfb6a91fd935a3fdef62ae25a64429d2,2025-05-07T14:13:20.483000
CVE-2025-37738,0,0,ba1e253afea970e2d6cbcac0df377f410e996b34b809210266fb935a59d8f3ae,2025-05-02T13:53:20.943000
CVE-2025-37739,0,0,d93f652e6f780625188bc3e58a094ab90f62616b233dc5bfe99eda3073ee8767,2025-05-02T13:53:20.943000
CVE-2025-3774,1,1,e0d93d0a9d8e96fe75cfba1b7b14bcffe3da93696a42634506614469955a3d95,2025-06-17T02:15:18.850000
CVE-2025-3774,0,0,e0d93d0a9d8e96fe75cfba1b7b14bcffe3da93696a42634506614469955a3d95,2025-06-17T02:15:18.850000
CVE-2025-37740,0,0,0b79f300b6870320502d371a2fade8bcb56f910752c0b3ebc63700cb9605090c,2025-05-02T13:53:20.943000
CVE-2025-37741,0,0,543b4aa9f08295025f40ee04137497aa3664ec24c9c350910788c4e006c40f24,2025-05-02T13:53:20.943000
CVE-2025-37742,0,0,3b209bd43c4dd06057871b04ab033870e3319a2f7faa61d2056bf75e91a46342,2025-05-02T13:53:20.943000
@ -296416,7 +296418,7 @@ CVE-2025-47737,0,0,60cb12bc89ce6f2a8fe9e7af3463c6e9c2bcca5ef96322a90d7cccb126b38
CVE-2025-4774,0,0,030f0c165972a90f2efc4aaa5ddbfe19e3d1b1c3af0f3137283b01a5858b493d,2025-06-12T16:06:39.330000
CVE-2025-47748,0,0,b90bacb2c6f839ee321be88774b4833cef222cda69ff8602ec8ddb9f1d835f3e,2025-05-30T17:15:29.117000
CVE-2025-47749,0,0,77136f5a200eae36103a9c78079b2abf4fa9dbee2a99746a355de3498002722c,2025-05-19T17:30:06.440000
CVE-2025-4775,1,1,22271c00d71698bfbc470c322d45c4bfada88f1ef7493af60dd913d7f245faee,2025-06-17T02:15:19.867000
CVE-2025-4775,0,0,22271c00d71698bfbc470c322d45c4bfada88f1ef7493af60dd913d7f245faee,2025-06-17T02:15:19.867000
CVE-2025-47750,0,0,1a4ff5a2f7fb0cd15d257d686f97e3b073753ad3ba8037a1d7327a6c86b11820,2025-05-19T17:31:27.667000
CVE-2025-47751,0,0,3cca051328c22c5a0fcfef5487e533d7a18847e63518d22a60f69dbcef6265de,2025-05-19T17:31:59.670000
CVE-2025-47752,0,0,c2f623c1bc3fac27711347447a519c92b9c45aac3e749ecc117d915d1101e54e,2025-05-19T17:32:22.287000
@ -297264,7 +297266,7 @@ CVE-2025-49819,0,0,7aa65990a8586863dec28602b60bc509a93e8d9398355850f5f946a77668a
CVE-2025-49820,0,0,d7fb37bdf3c3fdfcda4dd8d8b01573c4b600a96f8a0f40a4d07204fb70c71c9e,2025-06-12T03:15:26.253000
CVE-2025-49821,0,0,bb9317c9c4768a7b0a634d8319ed4d699208a76952e4829f60bbc2af06ca64a6,2025-06-12T03:15:26.313000
CVE-2025-49822,0,0,de49443b576bc1f584b5a6900459b73ba17d0494708f2396f6ea98c8b4c73b58,2025-06-12T03:15:26.380000
CVE-2025-49823,1,1,b95732f009a3f7e54813cac9b912d073b350c6d912829a668cd726c1d72dd06a,2025-06-17T03:15:24.580000
CVE-2025-49823,0,0,b95732f009a3f7e54813cac9b912d073b350c6d912829a668cd726c1d72dd06a,2025-06-17T03:15:24.580000
CVE-2025-4983,0,0,8b53f9fcac717498609c6596ba194e3872474340efe5891a55ff7cfbe70e31d1,2025-05-30T16:31:03.107000
CVE-2025-4984,0,0,8011ca13e469a81f6afb4511e42cccafc7f5c3edf7ae8617debc1cb5fd406589,2025-05-30T16:31:03.107000
CVE-2025-4985,0,0,88151f8f37213547b95261cc34f75717fde2a8ef982c36b2d93a8904176e3178,2025-05-30T16:31:03.107000
@ -297466,16 +297468,16 @@ CVE-2025-5236,0,0,21b3f9a42248749cfd7dac46ffac19b1b1d972c6879013b8f47a703a60b1c0
CVE-2025-5238,0,0,2ea3b090ffb1e48b08d0ca2fe3294d59ed4285a1a902a2dd2038828fbe982e10,2025-06-16T12:32:18.840000
CVE-2025-5239,0,0,6516f1b341ac369c2f899c8884ddf4fbc36f529a71c6c5c2406c9cd11f9a2a1d,2025-06-06T14:06:58.193000
CVE-2025-5242,0,0,3430448059313f76ae0f8dcef9fc481fd3cfce1823da3d8abe54d77d5e6c274d,2025-06-07T23:15:22.130000
CVE-2025-52437,1,1,cd870f88e7d7baee6d4952151c5c20a2e5c3b45cf71189a3c9d24863935baba3,2025-06-17T03:15:25.127000
CVE-2025-52438,1,1,dc07b107d18487152e104454077e856698a4959d7e076efd593fcccf0d4c6ee3,2025-06-17T03:15:25.203000
CVE-2025-52439,1,1,ff7fe572dc4c48e590532c16c4a5f189431e96cb2d7181e8dc60c5045d2f8066,2025-06-17T03:15:25.280000
CVE-2025-52437,0,0,cd870f88e7d7baee6d4952151c5c20a2e5c3b45cf71189a3c9d24863935baba3,2025-06-17T03:15:25.127000
CVE-2025-52438,0,0,dc07b107d18487152e104454077e856698a4959d7e076efd593fcccf0d4c6ee3,2025-06-17T03:15:25.203000
CVE-2025-52439,0,0,ff7fe572dc4c48e590532c16c4a5f189431e96cb2d7181e8dc60c5045d2f8066,2025-06-17T03:15:25.280000
CVE-2025-5244,0,0,f16a7ad73436a8b188ea427e076cb6d66c3866f0d06770cfebf2ea7a2f86cb34,2025-05-28T15:01:30.720000
CVE-2025-52440,1,1,0125181294851e04da28d4c2e2e45b4a441dc4efa2acd5cf110977183ff1fc22,2025-06-17T03:15:25.347000
CVE-2025-52441,1,1,96ff915f9fd080b4cc2d269d3c880f93b8cfcdf2ef1eae5b4b2274a4225a7bc5,2025-06-17T03:15:25.410000
CVE-2025-52442,1,1,e99cbd8a64ad34f61117b49d3eae586fa43d603168c412d12298cebc3dada0f0,2025-06-17T03:15:25.477000
CVE-2025-52443,1,1,e9adc9a61c7cce647b8d83ef85e461bc9e1ccefb348981c328550da596c2d14c,2025-06-17T03:15:25.547000
CVE-2025-52444,1,1,93054904ad530554737df8cd7258142853cfe2090c496970f4b20356b186993c,2025-06-17T03:15:25.607000
CVE-2025-52445,1,1,32bf5fa45c16b67da856f5d24d990c19398078dd71ca0f2526b5098284f3b5db,2025-06-17T03:15:25.673000
CVE-2025-52440,0,0,0125181294851e04da28d4c2e2e45b4a441dc4efa2acd5cf110977183ff1fc22,2025-06-17T03:15:25.347000
CVE-2025-52441,0,0,96ff915f9fd080b4cc2d269d3c880f93b8cfcdf2ef1eae5b4b2274a4225a7bc5,2025-06-17T03:15:25.410000
CVE-2025-52442,0,0,e99cbd8a64ad34f61117b49d3eae586fa43d603168c412d12298cebc3dada0f0,2025-06-17T03:15:25.477000
CVE-2025-52443,0,0,e9adc9a61c7cce647b8d83ef85e461bc9e1ccefb348981c328550da596c2d14c,2025-06-17T03:15:25.547000
CVE-2025-52444,0,0,93054904ad530554737df8cd7258142853cfe2090c496970f4b20356b186993c,2025-06-17T03:15:25.607000
CVE-2025-52445,0,0,32bf5fa45c16b67da856f5d24d990c19398078dd71ca0f2526b5098284f3b5db,2025-06-17T03:15:25.673000
CVE-2025-5245,0,0,76dfb770c29fdb4cddbdbfbfa1fee59cf2a7272fa687dfaa6e702792fcfc63df,2025-05-28T15:01:30.720000
CVE-2025-5246,0,0,58006bd67e3ca573529b2f3e87b16b1c40180151481747e10351ab9236833e82,2025-05-28T20:38:00.033000
CVE-2025-5247,0,0,54e3a381cfd9dfdb05827b9f71ff8bbd85014209bf716148a0d5df41e284d42b,2025-05-28T15:01:30.720000
@ -297782,7 +297784,7 @@ CVE-2025-5669,0,0,e41cf90831d0a6cf4929e129e10c87880a3b230cc5343d610b4f26d94c5ca2
CVE-2025-5670,0,0,aa088ba5a44773ff1366ed76955e38f916db102440b97c97a352678ba98d3d07,2025-06-06T19:40:14.910000
CVE-2025-5671,0,0,eb8fc745fee34a3711d29fe25f4c5db1a3010a89ad41b22fe8685e426fcf1532,2025-06-05T20:12:23.777000
CVE-2025-5672,0,0,b5f35a60b31667154d144333dd8af0cb05b469f7cf6c2dd3ee23c9b3b86a5c05,2025-06-05T20:12:23.777000
CVE-2025-5673,1,1,8429ed3f88bec5636844b85dde5e49954e79216550be21cb50707b340002c935,2025-06-17T02:15:20.043000
CVE-2025-5673,0,0,8429ed3f88bec5636844b85dde5e49954e79216550be21cb50707b340002c935,2025-06-17T02:15:20.043000
CVE-2025-5674,0,0,00321347327a5af2fc5c4b712466e46106633bbb0b8355ca269c6d7d191000b2,2025-06-10T19:32:07.543000
CVE-2025-5675,0,0,d79dd03500c999a297bce3fa643e7aff128a4fb8f3e3aa9fbc2dfabaffc455fd,2025-06-10T19:31:56.573000
CVE-2025-5676,0,0,1ca2c49bb4d510b5740938a869bb2d11a6220d1957dff2d9f9653e2673322f3a,2025-06-10T19:31:48.510000
@ -298082,12 +298084,18 @@ CVE-2025-6148,0,0,ed46144a74af3d43d1d2a9db5399b5a46907773866eafc7f018973eaa9a205
CVE-2025-6149,0,0,b8c74a34caddc5aedccc5c27b3a8895bf480989637bc3bee8d371141d3bd485f,2025-06-17T01:15:22.943000
CVE-2025-6150,0,0,66cd6648bb2126787c38bf421cb766554afbe49a507a351a79d6e99c28076ceb,2025-06-17T01:15:23.130000
CVE-2025-6151,0,0,627c7a04c1ac8d52f9d55728752e65257775271fa3c167c2c5e792750dee59cd,2025-06-17T01:15:23.313000
CVE-2025-6152,1,1,aa3ddef2fafbae4ee80d66c1a53f2da1dc0d65b7d57f398d4498b20c80fedc42,2025-06-17T02:15:20.213000
CVE-2025-6153,1,1,9b18af700a1f541aac9efe3b9f546df8adee80cd5ddad623a543dd6443a60240,2025-06-17T03:15:25.743000
CVE-2025-6154,1,1,62ffd39fc3a940cd0efdfe8e44c0667e93ba73cb6c6d3e0c17d7cb698c7867da,2025-06-17T03:15:25.947000
CVE-2025-6155,1,1,dac96adcb5d333d8f59da04e36da8a65c1e8e36c50dad572a02e404405e5cef7,2025-06-17T03:15:26.147000
CVE-2025-6156,1,1,bb5aec9a2a92c168d5b89a6e1faab8a0f0630c52ea0ba035d397ceaa4a6f1cb4,2025-06-17T03:15:26.340000
CVE-2025-6157,1,1,067a6b0195d0f495e5d4dcf8c2c8af1cdf5fa9db4869b66a6aa654600028c462,2025-06-17T03:15:26.553000
CVE-2025-6152,0,0,aa3ddef2fafbae4ee80d66c1a53f2da1dc0d65b7d57f398d4498b20c80fedc42,2025-06-17T02:15:20.213000
CVE-2025-6153,0,0,9b18af700a1f541aac9efe3b9f546df8adee80cd5ddad623a543dd6443a60240,2025-06-17T03:15:25.743000
CVE-2025-6154,0,0,62ffd39fc3a940cd0efdfe8e44c0667e93ba73cb6c6d3e0c17d7cb698c7867da,2025-06-17T03:15:25.947000
CVE-2025-6155,0,0,dac96adcb5d333d8f59da04e36da8a65c1e8e36c50dad572a02e404405e5cef7,2025-06-17T03:15:26.147000
CVE-2025-6156,0,0,bb5aec9a2a92c168d5b89a6e1faab8a0f0630c52ea0ba035d397ceaa4a6f1cb4,2025-06-17T03:15:26.340000
CVE-2025-6157,0,0,067a6b0195d0f495e5d4dcf8c2c8af1cdf5fa9db4869b66a6aa654600028c462,2025-06-17T03:15:26.553000
CVE-2025-6158,1,1,e70a9d00d1c5d5f2f54842ad1d13343c991e94a307fa6041d605b53054ee66c0,2025-06-17T04:15:55.407000
CVE-2025-6159,1,1,9124bf643ab14a535722cec372e19d57629eb2ad7fc34ca34557850ce43c5ff5,2025-06-17T04:15:56.140000
CVE-2025-6160,1,1,b5a005f0cb3af7af3cbd83f95c58b0de1833f0c1a8794260093b19e9d4e1542f,2025-06-17T05:15:21.567000
CVE-2025-6161,1,1,04ef0d4ea23661165f29c62c6f3f4f4ce80da3c1c05907386de341f49b851245,2025-06-17T05:15:21.833000
CVE-2025-6162,1,1,af3afed5c97f174bc1ec87fa874c16055bff42df943207923f306c6d9965be16,2025-06-17T05:15:22.053000
CVE-2025-6163,1,1,7bc2b2f48c2420316b423e722c94da079d7d1613e6a363e835137d32165dbd9d,2025-06-17T05:15:22.267000
CVE-2025-6169,0,0,24b56c63dd5c2b9799043dae6dc3b75a3e06e9ee630be707f681a9bb09cd5b58,2025-06-16T12:32:18.840000
CVE-2025-6170,0,0,b6c9e594edbf46197f9f9a30d565b603f055d40c252eab039c7ec60bb43a9554,2025-06-16T16:15:20.430000
CVE-2025-6172,0,0,df5b11377ae2bcb860baea092fdadde3351cf8aeca30edf92e0d7977024948be,2025-06-16T17:15:31.503000

Can't render this file because it is too large.