mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-03T04:00:21.393124+00:00
This commit is contained in:
parent
f4a9dc30c8
commit
d9e6234949
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4387",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-08-16T19:15:10.087",
|
||||
"lastModified": "2024-12-15T21:15:15.583",
|
||||
"lastModified": "2025-06-03T03:15:25.913",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -180,6 +180,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2022:7683",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2022:8267",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-48645",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T09:15:37.420",
|
||||
"lastModified": "2025-05-30T16:15:35.430",
|
||||
"lastModified": "2025-06-03T03:15:24.817",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-48842",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-01T16:15:07.550",
|
||||
"lastModified": "2024-11-21T08:32:32.853",
|
||||
"lastModified": "2025-06-03T03:15:25.490",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-48863",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-04T13:15:07.753",
|
||||
"lastModified": "2024-11-21T08:32:34.003",
|
||||
"lastModified": "2025-06-03T03:15:25.703",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-23099",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-02T19:15:26.213",
|
||||
"lastModified": "2025-06-02T19:15:26.213",
|
||||
"lastModified": "2025-06-03T03:15:26.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The lack of a length check leads to out-of-bounds writes."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-23105",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-02T19:15:26.913",
|
||||
"lastModified": "2025-06-02T19:15:26.913",
|
||||
"lastModified": "2025-06-03T03:15:26.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. A Use-After-Free in the mobile processor leads to privilege escalation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
|
68
CVE-2025/CVE-2025-29xx/CVE-2025-2939.json
Normal file
68
CVE-2025/CVE-2025-29xx/CVE-2025-2939.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-2939",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-06-03T03:15:27.137",
|
||||
"lastModified": "2025-06-03T03:15:27.137",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Ninja Tables \u2013 Easy Data Table Builder plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.0.18 via deserialization of untrusted input from the args[callback] parameter . This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute arbitrary functions, though it does not allow user supplied parameters only single functions can be called so the impact is limited."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ninja-tables/tags/5.0.18/vendor/wpfluent/framework/src/WPFluent/Http/Client.php#L399",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ninja-tables/tags/5.0.19/vendor/wpfluent/framework/src/WPFluent/Http/Client.php#L399",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ninja-tables/trunk/vendor/wpfluent/framework/src/WPFluent/Http/Client.php#L399",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e38553d-5dba-4c84-95f7-43420245c770?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-3576",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-04-15T06:15:44.047",
|
||||
"lastModified": "2025-05-30T17:15:28.940",
|
||||
"lastModified": "2025-06-03T03:15:27.320",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:8411",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3576",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-40909",
|
||||
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
|
||||
"published": "2025-05-30T13:15:22.350",
|
||||
"lastModified": "2025-06-02T20:15:22.463",
|
||||
"lastModified": "2025-06-03T02:15:19.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -103,6 +103,10 @@
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/06/02/6",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/06/02/7",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-40xx/CVE-2025-4047.json
Normal file
64
CVE-2025/CVE-2025-40xx/CVE-2025-4047.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-4047",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-06-03T03:15:27.910",
|
||||
"lastModified": "2025-06-03T03:15:27.910",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Broken Link Checker plugin for WordPress is vulnerable to unauthorized data access due to a missing capability check on the ajax_full_status and ajax_dashboard_status functions in all versions up to, and including, 2.4.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view the plugin's status."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/broken-link-checker/tags/2.4.2/legacy/core/core.php#L3272",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3294992/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/33ac910c-9531-45ea-84cf-1d379233f7d3?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-42xx/CVE-2025-4224.json
Normal file
60
CVE-2025/CVE-2025-42xx/CVE-2025-4224.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-4224",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-06-03T03:15:28.093",
|
||||
"lastModified": "2025-06-03T03:15:28.093",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wpForo + wpForo Advanced Attachments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via media upload names in all versions up to, and including, 3.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Custom-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gvectors.com/product/wpforo-advanced-attachments/#tab-changelog",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e634dafc-8eb0-406f-93b1-ee1d2b44171d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-5068",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-06-03T00:15:20.907",
|
||||
"lastModified": "2025-06-03T00:15:20.907",
|
||||
"lastModified": "2025-06-03T03:15:28.280",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "Use after free in Blink in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
@ -22,6 +45,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-5419",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-06-03T00:15:21.043",
|
||||
"lastModified": "2025-06-03T00:15:21.043",
|
||||
"lastModified": "2025-06-03T03:15:28.460",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Out of bounds read and write in V8 in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html",
|
||||
|
33
README.md
33
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-03T02:00:19.487226+00:00
|
||||
2025-06-03T04:00:21.393124+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-03T01:00:01.953000+00:00
|
||||
2025-06-03T03:15:28.460000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,29 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
296263
|
||||
296266
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2025-49162](CVE-2025/CVE-2025-491xx/CVE-2025-49162.json) (`2025-06-03T00:15:20.103`)
|
||||
- [CVE-2025-49163](CVE-2025/CVE-2025-491xx/CVE-2025-49163.json) (`2025-06-03T00:15:20.583`)
|
||||
- [CVE-2025-49164](CVE-2025/CVE-2025-491xx/CVE-2025-49164.json) (`2025-06-03T00:15:20.740`)
|
||||
- [CVE-2025-5068](CVE-2025/CVE-2025-50xx/CVE-2025-5068.json) (`2025-06-03T00:15:20.907`)
|
||||
- [CVE-2025-5419](CVE-2025/CVE-2025-54xx/CVE-2025-5419.json) (`2025-06-03T00:15:21.043`)
|
||||
- [CVE-2025-2939](CVE-2025/CVE-2025-29xx/CVE-2025-2939.json) (`2025-06-03T03:15:27.137`)
|
||||
- [CVE-2025-4047](CVE-2025/CVE-2025-40xx/CVE-2025-4047.json) (`2025-06-03T03:15:27.910`)
|
||||
- [CVE-2025-4224](CVE-2025/CVE-2025-42xx/CVE-2025-4224.json) (`2025-06-03T03:15:28.093`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `5`
|
||||
Recently modified CVEs: `10`
|
||||
|
||||
- [CVE-2021-32030](CVE-2021/CVE-2021-320xx/CVE-2021-32030.json) (`2025-06-03T01:00:01.953`)
|
||||
- [CVE-2023-39780](CVE-2023/CVE-2023-397xx/CVE-2023-39780.json) (`2025-06-03T01:00:01.953`)
|
||||
- [CVE-2024-56145](CVE-2024/CVE-2024-561xx/CVE-2024-56145.json) (`2025-06-03T01:00:01.953`)
|
||||
- [CVE-2025-35939](CVE-2025/CVE-2025-359xx/CVE-2025-35939.json) (`2025-06-03T01:00:01.953`)
|
||||
- [CVE-2025-3935](CVE-2025/CVE-2025-39xx/CVE-2025-3935.json) (`2025-06-03T01:00:01.953`)
|
||||
- [CVE-2023-4387](CVE-2023/CVE-2023-43xx/CVE-2023-4387.json) (`2025-06-03T03:15:25.913`)
|
||||
- [CVE-2023-48645](CVE-2023/CVE-2023-486xx/CVE-2023-48645.json) (`2025-06-03T03:15:24.817`)
|
||||
- [CVE-2023-48842](CVE-2023/CVE-2023-488xx/CVE-2023-48842.json) (`2025-06-03T03:15:25.490`)
|
||||
- [CVE-2023-48863](CVE-2023/CVE-2023-488xx/CVE-2023-48863.json) (`2025-06-03T03:15:25.703`)
|
||||
- [CVE-2025-23099](CVE-2025/CVE-2025-230xx/CVE-2025-23099.json) (`2025-06-03T03:15:26.790`)
|
||||
- [CVE-2025-23105](CVE-2025/CVE-2025-231xx/CVE-2025-23105.json) (`2025-06-03T03:15:26.957`)
|
||||
- [CVE-2025-3576](CVE-2025/CVE-2025-35xx/CVE-2025-3576.json) (`2025-06-03T03:15:27.320`)
|
||||
- [CVE-2025-40909](CVE-2025/CVE-2025-409xx/CVE-2025-40909.json) (`2025-06-03T02:15:19.980`)
|
||||
- [CVE-2025-5068](CVE-2025/CVE-2025-50xx/CVE-2025-5068.json) (`2025-06-03T03:15:28.280`)
|
||||
- [CVE-2025-5419](CVE-2025/CVE-2025-54xx/CVE-2025-5419.json) (`2025-06-03T03:15:28.460`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
39
_state.csv
39
_state.csv
@ -176307,7 +176307,7 @@ CVE-2021-32025,0,0,be1366e60cdc64085a7ca3378dd8b2945646288a6056d66d9eaf86e564481
|
||||
CVE-2021-32027,0,0,5ee2aa7a5aa3fa8bb911c577fd863dbdb076a0ad3ef0512d7dd32317414b22da,2024-11-21T06:06:44.467000
|
||||
CVE-2021-32028,0,0,84c85cca513953c25777bc582de148d107114d46d9b13227dc0a8bf544f4d415,2024-11-21T06:06:44.593000
|
||||
CVE-2021-32029,0,0,56c471bfaedf8eeeae330cda0d2954472dbd44261f536849dbc437841365a531,2024-11-21T06:06:44.717000
|
||||
CVE-2021-32030,0,1,fb42eba0d5078ccd62daf76a1bd219077d18e5d3bb0a5ca36cf00edadf221729,2025-06-03T01:00:01.953000
|
||||
CVE-2021-32030,0,0,fb42eba0d5078ccd62daf76a1bd219077d18e5d3bb0a5ca36cf00edadf221729,2025-06-03T01:00:01.953000
|
||||
CVE-2021-32032,0,0,d4a228b8d3584c392915c1306de9b4891f451e0bcc887a1a2c922b4efeafaf40,2024-11-21T06:06:44.993000
|
||||
CVE-2021-32033,0,0,9d53a703f8e89930e795f200116050cb1538597c59d5f4de2f68d4733f37ec27,2024-11-21T06:06:45.167000
|
||||
CVE-2021-32036,0,0,5f2cf3c6d2205a2b02a642da73b2e1978439d07a378edd4a500d10314baf33fc,2024-11-21T06:06:45.330000
|
||||
@ -232244,7 +232244,7 @@ CVE-2023-3977,0,0,84902e819982af0b9f065234a0836a81763e8b0f2e4e907e1bbbe68d767e81
|
||||
CVE-2023-39776,0,0,9b60b215af8c2d67e87c6d5b391a0df3e7a6b70a40e3e4b39dc5a5ea32f92ba1,2024-11-21T08:15:55.693000
|
||||
CVE-2023-39777,0,0,9dfd7018882af2d3838b8e1f388c9f433b085bd7ce4432cda211f24935c024c7,2024-11-21T08:15:55.840000
|
||||
CVE-2023-3978,0,0,b7e7bb1677040677e1bec81f12358ded6ce067b6554a2a9c8d6bc2995d761ab4,2024-11-21T08:18:27.680000
|
||||
CVE-2023-39780,0,1,8aaed17abfac7db92590434a92337bfd56a791d751f41ed2901c6a306cf85009,2025-06-03T01:00:01.953000
|
||||
CVE-2023-39780,0,0,8aaed17abfac7db92590434a92337bfd56a791d751f41ed2901c6a306cf85009,2025-06-03T01:00:01.953000
|
||||
CVE-2023-39784,0,0,fa5e5f530f2111747230342eb0d98696d09982b69a86e9944049f9a5b35467fc,2024-11-21T08:15:56.160000
|
||||
CVE-2023-39785,0,0,ab6675e15398e8b1e39aac3c2e69cd38a033f5e2b023ff7bee7de08be10cd49f,2024-11-21T08:15:56.323000
|
||||
CVE-2023-39786,0,0,bba41e5480cecce81d7e21ffe2ac3ddfc75f323f9c4619f972d540cef32fc36b,2024-11-21T08:15:56.473000
|
||||
@ -235378,7 +235378,7 @@ CVE-2023-43866,0,0,ebf03074293379587f7609720d91553532b05176813b28fefe2c355c22a1b
|
||||
CVE-2023-43867,0,0,842e70b3499864839d018b32f7c4d1eb981e53fa554060e7b1172f67105881d3,2024-11-21T08:24:55.360000
|
||||
CVE-2023-43868,0,0,355b5d787c34573eba9c8cbd596ba4fc21185320e4e57082845f0c6054f9609e,2024-11-21T08:24:55.510000
|
||||
CVE-2023-43869,0,0,c26bd2d2ce9de349c7c081fc34f08c5d461ce7953c4d4fe2150650b0fabfdcf8,2024-11-21T08:24:55.667000
|
||||
CVE-2023-4387,0,0,ae52646967a59ad688de1610634a6c85b462d3f249fda219a83d643cfe61af25,2024-12-15T21:15:15.583000
|
||||
CVE-2023-4387,0,1,1c9872c3599b2378a8c0c5f74333d0eb1cf6ec4a15f1e499527068eea8763c90,2025-06-03T03:15:25.913000
|
||||
CVE-2023-43870,0,0,b0d3e092274d7c5697df5b0d058f09d25c39bdf97516b2fc70310ef4f3c07edf,2024-11-21T08:24:55.823000
|
||||
CVE-2023-43871,0,0,be1d80b1f974300aff33bd57027a11205af80ba254b5a86c25c62d3e9d102197,2024-11-21T08:24:55.957000
|
||||
CVE-2023-43872,0,0,24d5a634d9c8ce2c391d87beaf7efcada6fb1abc3aab25fbe3f2373d6bd68334,2024-11-21T08:24:56.097000
|
||||
@ -238839,7 +238839,7 @@ CVE-2023-48641,0,0,c24041bef291d2c67ab0547c0c7156f6d11f3f2bfbdec99a5ee5d6990d28d
|
||||
CVE-2023-48642,0,0,b4b49c8b101d698803959efb2563613bab33612aa31700913a87a94a8ea73893,2024-11-21T08:32:10.027000
|
||||
CVE-2023-48643,0,0,2838e9b9ca60bb275452350e91ce2548d693e9b81880e886462f4139c20e5e57,2024-11-21T08:32:10.197000
|
||||
CVE-2023-48644,0,0,70935b5e1a6496a8d5262a2a9657894b2ba775ae0d586e510eb3bd9d294d04c1,2025-05-30T16:15:35.230000
|
||||
CVE-2023-48645,0,0,35928ac27fc6c53c9ec7e79085a4bb571d89398ff88be793d363e9c995c88ef8,2025-05-30T16:15:35.430000
|
||||
CVE-2023-48645,0,1,e7eff98b35f3760b95fb297869efa093fbbbdd862e0fec203f9302f60f4c67df,2025-06-03T03:15:24.817000
|
||||
CVE-2023-48646,0,0,d8d44a25061fe6648386811c26e32dfa15cbf4ade54b0e2f313e86e77e068aeb,2024-11-21T08:32:10.810000
|
||||
CVE-2023-48648,0,0,400529bac8d85308ebcf902245fbc1a5339515f7c784c020b227fde6296562f0,2024-11-21T08:32:10.960000
|
||||
CVE-2023-48649,0,0,d1d86fedc0dd2c0f49f249f69bac57a864c3ba4488104cef2738133899417fec,2024-11-21T08:32:11.190000
|
||||
@ -239031,7 +239031,7 @@ CVE-2023-48839,0,0,e8e30eb84ef1188a5aee5060102f56ab910aca63bcd26ef14781e36fc52f2
|
||||
CVE-2023-4884,0,0,1daa1aa188058e958bbc5c2d9c09934d0a0771b48b2e20697431fbf27698801f,2024-11-21T08:36:11.070000
|
||||
CVE-2023-48840,0,0,5017064be181620ce29c4b80d639cf7feaed1215a2dbdee80fe280df89a2c170,2024-11-21T08:32:32.473000
|
||||
CVE-2023-48841,0,0,4bc429f23fb95a2f9513d2f4a3a8e26007bd0fab68e34421a6b1bcb96206afcb,2024-11-21T08:32:32.630000
|
||||
CVE-2023-48842,0,0,d7d1454819f1dcdd14528a1d9f62c6c0ce99da0350570de551d8614dfc285171,2024-11-21T08:32:32.853000
|
||||
CVE-2023-48842,0,1,95688c098a154cac664361d5220f856394298213e102027ca3ed943d5cbc4bc9,2025-06-03T03:15:25.490000
|
||||
CVE-2023-48848,0,0,833c54e750b28847a055f211313ad917d61a7c10771960d3ca25918d56e67af5,2024-11-21T08:32:33.003000
|
||||
CVE-2023-48849,0,0,966a1549d30c886b6324a18fa1c5e2305f618ff5ac3cff3211d2d6884236edce,2024-11-21T08:32:33.227000
|
||||
CVE-2023-4885,0,0,20d51472315535f916beba5b70efac40bd64ba77bb70a5c4a1070eff5650bcb9,2024-11-21T08:36:11.207000
|
||||
@ -239040,7 +239040,7 @@ CVE-2023-48859,0,0,9ac2603fca4a5ab31df2b9156386a46c755a85f515a18a4e785544aaeb000
|
||||
CVE-2023-4886,0,0,8f2d70647d8c027fd6ff5469d2fc104d09830f4fc19038f5e962ea02566dc513,2024-11-21T08:36:11.347000
|
||||
CVE-2023-48860,0,0,af1254a0cba48df114b71f85053e187c5308de39d1f8346f841d080a150ff4e1,2024-11-21T08:32:33.713000
|
||||
CVE-2023-48861,0,0,571a3e7ddec5c06aadbc62f72801b18ec4f356731ccdf6eb6e71e6ea16abacdc,2024-11-21T08:32:33.857000
|
||||
CVE-2023-48863,0,0,96c649c3b3966f74efdf2a739ec57747c26dd9081c51366e2161fc54dcbf9a0b,2024-11-21T08:32:34.003000
|
||||
CVE-2023-48863,0,1,1ae61be64013ef0eab00cb9dccde3d835e8ca37020ed5b6b9fe00ac85a923194,2025-06-03T03:15:25.703000
|
||||
CVE-2023-48864,0,0,4271455018fc109a756046144a3b9013c32e0e975c36a0c23ee9bfb0994de8f0,2024-11-21T08:32:34.160000
|
||||
CVE-2023-48865,0,0,47093d97d4d864ef5d290032e9ee95f309585e3a36162ffa6151ca39e74f0dca,2024-11-21T08:32:34.300000
|
||||
CVE-2023-48866,0,0,36d6615e3d9bd48bb2137e1a9943fbfa1dfdb0fe2348c26aa112b18cb06c7d48,2024-11-21T08:32:34.510000
|
||||
@ -277023,7 +277023,7 @@ CVE-2024-5614,0,0,dbfe1b67548311692c56bb8d68c3048c964ba6dbbed397928536eff3aafacb
|
||||
CVE-2024-56140,0,0,5e773e07d0eed57889259343301d38e685c0a1811e50189d4f1636233600aa01,2024-12-18T21:15:08.353000
|
||||
CVE-2024-56142,0,0,d0863d2f76899d0c75d2dc51b8dc37ad0a79fde1963b9a5230e4e213f062dcd8,2024-12-18T16:15:15.433000
|
||||
CVE-2024-56144,0,0,5a8f246b3ee58fe0b6aa1f12215528f9f3e515638bc6c966a2d94ef6b9b54d81,2025-04-28T16:44:52.353000
|
||||
CVE-2024-56145,0,1,36b843b9c003d84de13f0344899a81985eb990f4db3f7ba77c9941df859ba5ce,2025-06-03T01:00:01.953000
|
||||
CVE-2024-56145,0,0,36b843b9c003d84de13f0344899a81985eb990f4db3f7ba77c9941df859ba5ce,2025-06-03T01:00:01.953000
|
||||
CVE-2024-5615,0,0,37856ff1a2df0ee42bdd2faed17aef170393a5807410ba1a41f1c8e8ad65ffc3,2024-11-21T09:48:01.413000
|
||||
CVE-2024-56156,0,0,cae65d20ed1341191924655de46d8c441aafee12637a5c5ce19d1dfd5a9e24e6,2025-04-29T13:52:28.490000
|
||||
CVE-2024-56157,0,0,d2e733cd7775d29d2be4bb2e0ae8acc158ce5f62f3bbfa722ba2bdf2f22359ff,2025-05-16T14:43:56.797000
|
||||
@ -286164,10 +286164,10 @@ CVE-2025-23090,0,0,db1a04b33215738ef9ff89e7dd3243ce6839535b0728d9bb0d1927af1170a
|
||||
CVE-2025-23091,0,0,52be052e818e282e438c6b1d873e178494e11252bb26056a7aa314d364167b02,2025-03-13T13:15:57.990000
|
||||
CVE-2025-23093,0,0,7320826aecf4e98ab5895586ea1e6e8575244a0f095c3e1b8e12bb0d362e3614,2025-02-12T15:15:18.597000
|
||||
CVE-2025-23094,0,0,7cea7e6e51afc006925b4e48de2308fe64516f9177080ff30f9a60f654ae9082,2025-02-11T22:15:30.597000
|
||||
CVE-2025-23099,0,0,638d95b47287a72c94e295b1bb0dbb38db027eebe544a83587c4d889951065a7,2025-06-02T19:15:26.213000
|
||||
CVE-2025-23099,0,1,2c5f8647f6b1da5927512d94bb2c685c4b7491802e2e8ca1a9f5368402ddc658,2025-06-03T03:15:26.790000
|
||||
CVE-2025-2310,0,0,1254bedeef285364d4ce4cc304a3b27319f0e76b0b0498fd69d05aba0b6f3806,2025-05-28T18:12:42.130000
|
||||
CVE-2025-23104,0,0,6610497cadc4747ca925b32a7c9cf6b309d77c571ee095b8f68729e046c6562d,2025-06-02T21:15:21.473000
|
||||
CVE-2025-23105,0,0,ea8519742f6d9e4a6c3120609be4fc42d17a4e5304581e9e5b5347d0a4007a99,2025-06-02T19:15:26.913000
|
||||
CVE-2025-23105,0,1,76af3a585a1106927951b0a08d54a00fd760a17c06bf43c56a5b0473237f5cb9,2025-06-03T03:15:26.957000
|
||||
CVE-2025-23108,0,0,43dfea536f21c7dddc3256c2f1e274765fe5955541d1af65c01a12871277b7ff,2025-04-03T18:58:00.940000
|
||||
CVE-2025-23109,0,0,dab09ed4e1fbec86e8afd75398d8d3c5a65ca2a268fa35cb5d3a1b5459dc4d18,2025-04-03T18:52:57.410000
|
||||
CVE-2025-2311,0,0,0549a26ae70964117a933b4c0694a85dc38e847ae92918cf4a69583f79013968,2025-03-21T07:15:36.820000
|
||||
@ -290015,6 +290015,7 @@ CVE-2025-29385,0,0,f60ee6091bef3db2d6081e2edd6e0a4a37d7ecd5c70fcec7c258e2d44478f
|
||||
CVE-2025-29386,0,0,f142ce16dea374d9a9926fc7db0f8c42e7cb63baff73e2c1cd84f28fd5ff529e,2025-03-19T19:15:49.423000
|
||||
CVE-2025-29387,0,0,b884feacdec450fec77e09de60b95a7b9adedf54ff8f4d0b7df747bf1bec2f45,2025-03-17T19:51:04.180000
|
||||
CVE-2025-29389,0,0,b6e910417322f02be556ac9b548f6e8b6c35848d660fba9931faab004d75355d,2025-04-15T13:42:23.447000
|
||||
CVE-2025-2939,1,1,56ca324058fe3e567f41612a0636860d8ad888c64ad6d6ad9522cfc15a5b8bde,2025-06-03T03:15:27.137000
|
||||
CVE-2025-29390,0,0,2af3ceeb0b0e4ec487468d0265cf4f9bf7105f9f26e650a3615e67390bc16783,2025-04-22T17:06:50.490000
|
||||
CVE-2025-29391,0,0,3957a6f12658ba0f8a64a4509b31e9cff0f721c7269083a2c5583c8497158773,2025-04-22T17:02:50.427000
|
||||
CVE-2025-29394,0,0,4090687a0b04adebceb5be059956dcab0a952bc601580bcce43cec2c0d6a13ba,2025-04-22T21:15:45.123000
|
||||
@ -292917,7 +292918,7 @@ CVE-2025-3572,0,0,85452ae8a7fdcd086072bc1a78d977cf0bc1d5dd6fa9f5553989fa8c8fb7fd
|
||||
CVE-2025-3573,0,0,095399568374006bc1e93d539eebcb743d7cc965cdc4a121e4480938fddae558,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3574,0,0,94473ff233af08be74c232281156bfa5db699f8872e1802977040bd9e36c2d62,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3575,0,0,73e2cf1e3fbb3ccb86ef07985e1084456954c5cbbd5b3215dbed3da8318cbbf4,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3576,0,0,8c6e95ba882b09773047cea5529fb4a4b7fe62db2a80b9c393182abf0b56e929,2025-05-30T17:15:28.940000
|
||||
CVE-2025-3576,0,1,9b3aa58189686705418209c5611fd3289a98feb13dc788c78e80ec6eb48d7124,2025-06-03T03:15:27.320000
|
||||
CVE-2025-3577,0,0,dfdef997e669866588ab8eb7c1ca73b6cf2cbe16fcb69f43d2b34abd27af8076,2025-04-23T14:08:13.383000
|
||||
CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000
|
||||
@ -292931,7 +292932,7 @@ CVE-2025-3590,0,0,4a0453d8b3689d6f2e7dcbfdf29c48f9e72ed335c884f8c177d44093a3f9f8
|
||||
CVE-2025-3591,0,0,9faf0d8d54afa4d861e787bba12e728bac4244da2f6db382b13f6aac7674e68a,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3592,0,0,3766f02a8a9b7546b3744ae601fb2a46406e95eb867e2ef9712274445e3cdb7b,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3593,0,0,a01f66982e63d1a9077a22fb9d3bb17c3788e9968a5ce8acfaa25734a955883b,2025-04-15T18:39:27.967000
|
||||
CVE-2025-35939,0,1,4e32c39745c4da1f208b25109a0e587dd57fd0b27edd782ef59c3261d88e897e,2025-06-03T01:00:01.953000
|
||||
CVE-2025-35939,0,0,4e32c39745c4da1f208b25109a0e587dd57fd0b27edd782ef59c3261d88e897e,2025-06-03T01:00:01.953000
|
||||
CVE-2025-35965,0,0,4aa642d84377cde687111c4598cf1eaeacbb56cf1c939bfc9602ea66c09fbf1f,2025-04-29T13:52:47.470000
|
||||
CVE-2025-3597,0,0,929499c3aa76135ea39f425514ee0364a89d92a5d37194846e80b60b696e4a4b,2025-05-12T18:15:44.970000
|
||||
CVE-2025-35975,0,0,ff6f53919e1d0edd41e3d119f9454f71c4e7dd5f4908d853817e3fb24cd36fe2,2025-05-02T13:52:51.693000
|
||||
@ -293489,7 +293490,7 @@ CVE-2025-3931,0,0,1df28a65d58b1b11dd55fb48e21c28c39df5dac9e59f3f4980170b9f3362a2
|
||||
CVE-2025-3932,0,0,bb3142c71f5eed4ff8b3f0ae9b64a77d14b97d1793be58115a0c31b67d9c7e11,2025-05-16T14:43:56.797000
|
||||
CVE-2025-39348,0,0,9d07c4215885d09159fcdb803c06dd845d20d8b7211f21c96080caa574b77db4,2025-05-29T21:25:34.930000
|
||||
CVE-2025-39349,0,0,1c1c3f689b711b2f96c461587a438e532d44de8ec5f06cddb3eceb6d5faa7f0f,2025-05-29T21:27:24.223000
|
||||
CVE-2025-3935,0,1,94b13f4d383136a73e9447f741a0249a7178bdf0338705079576c82a6a153caf,2025-06-03T01:00:01.953000
|
||||
CVE-2025-3935,0,0,94b13f4d383136a73e9447f741a0249a7178bdf0338705079576c82a6a153caf,2025-06-03T01:00:01.953000
|
||||
CVE-2025-39350,0,0,1f2a18c3df50c0c8581af9839dea436f1bfbc81b9f75b37ec3a415a12e0f7cb9,2025-05-21T20:25:16.407000
|
||||
CVE-2025-39351,0,0,453b615dce99e3118800c3b3ed1ff1e8978999aa77e5900459827bf7cc51d266,2025-05-21T20:25:16.407000
|
||||
CVE-2025-39352,0,0,f176b617e367ad8432a233cf334fc673d4423789a2e58b98ee771101c071d706,2025-05-21T20:25:16.407000
|
||||
@ -293827,6 +293828,7 @@ CVE-2025-4038,0,0,811046a13e982bc58a873e9f3dcdd8f0924b9962b393b0dcd42ae969573255
|
||||
CVE-2025-4039,0,0,82997abe4f3d1a06f2c0c0c7affe39718ef0820c54c5fc54b87a7722e7f87a51,2025-04-29T21:08:47.950000
|
||||
CVE-2025-4041,0,0,81f238f672f184f46ddf27c78435ddee43bf5343b5983877b97d104b8691f898,2025-05-07T14:13:20.483000
|
||||
CVE-2025-4043,0,0,c5f411ffc1c0bfefdd17b991af2ebe0c8e5cb9dbd004f8186edb3edb010429e3,2025-05-08T16:15:28.283000
|
||||
CVE-2025-4047,1,1,836a95dd65686d0d682016e6fd63c4ead0b69b0b35553658665e8685f649c276,2025-06-03T03:15:27.910000
|
||||
CVE-2025-4050,0,0,ccfe15f2834569ec41cc4a482172c37e9ee278c6a1d3b20eba7b56bd00075454,2025-05-28T20:08:51.557000
|
||||
CVE-2025-4051,0,0,ff804ba52545392d7d95b067994000fe8637ebe480f1a272e743d510a5634584,2025-05-28T20:08:14.553000
|
||||
CVE-2025-4052,0,0,517c90a400d1c4a1769ad78093028d80e32695c5738c9e0a5933de416f48d31d,2025-05-28T20:07:45.097000
|
||||
@ -293922,7 +293924,7 @@ CVE-2025-4090,0,0,7f9eabb4ad6772523e0c5f0a270166b4617494fcbb3075e75cc2736a0fa15b
|
||||
CVE-2025-40906,0,0,3bcd0a99f567a8c8c8c888444bf8652ce672ff26763dd9562ab4be9a1279c017,2025-05-19T13:35:50.497000
|
||||
CVE-2025-40907,0,0,02479ee238b9c2c4380d00bd9d3c9ee05adf00f8c7961fd6f9263c931d94c687,2025-05-16T16:15:41.590000
|
||||
CVE-2025-40908,0,0,722712dc5b770bb0a13e0d20171378b8e4b0cbd179a3c72e1857a82c7cd5d920,2025-06-02T17:32:17.397000
|
||||
CVE-2025-40909,0,0,7950328de3aad73bd86d6f5635c46a4f7c6c027e20f309b9c54252d6efa794fa,2025-06-02T20:15:22.463000
|
||||
CVE-2025-40909,0,1,c6ab9968b5d5edb9c49ad2b15eade556bdef9e0c266f60618cb84e9aea133d14,2025-06-03T02:15:19.980000
|
||||
CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000
|
||||
CVE-2025-40911,0,0,fcf4deedf6cc79e67d521479df45c4b1f5ac81bf8605fcf0e3b318f0c121b089,2025-05-28T15:01:30.720000
|
||||
CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000
|
||||
@ -294076,6 +294078,7 @@ CVE-2025-4220,0,0,5c86caee7e1d137cda1341728be0ecf7fbbff93f4260af3080c92a642cb601
|
||||
CVE-2025-4221,0,0,0fd12a0e5b55ee42c307389a259ec1bd53c25a7a1b0cd952ead8bf19842b795b,2025-05-21T20:24:58.133000
|
||||
CVE-2025-4222,0,0,0ac402cc845bab4a30e9252ea588813619c6f19618452a717b52c67067208bc3,2025-05-13T18:15:41.657000
|
||||
CVE-2025-4223,0,0,956f48551f11f91b052ecedb14a153aceab464c078b4bc0b79be148ceb74f438,2025-05-28T14:58:52.920000
|
||||
CVE-2025-4224,1,1,bacedcc2a915ca9baa74deee54ca1a1e788f8cb42cf9f1bfafe6bf4f19529220,2025-06-03T03:15:28.093000
|
||||
CVE-2025-4226,0,0,553848fc8965850ce01d7354687a65a57c667ad58d4e47460cbb85b0387517fd,2025-05-30T10:15:23.343000
|
||||
CVE-2025-4236,0,0,4a998b3d009e2e5b8d6c745dec0a05483fadfb16e9111b778387c6694f340a68,2025-05-16T15:04:03.170000
|
||||
CVE-2025-4237,0,0,6e9102316b2d9622f5dbc1640c375fa9a5bfea77a1257bb79b559d426c098991,2025-05-16T15:03:54.820000
|
||||
@ -295916,9 +295919,9 @@ CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149
|
||||
CVE-2025-4914,0,0,a988b116f09ba2a954362a47d883dbc77032cfbf0fc2d8366f3812d4ec746e85,2025-05-19T17:37:31.327000
|
||||
CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000
|
||||
CVE-2025-4916,0,0,f4f666575ba307bca9e4be1cb48057a5262f7335ea23c5ca4141ce76f034cc3f,2025-05-19T17:37:50.063000
|
||||
CVE-2025-49162,1,1,0934e3250beffc21d4128bb1746955a06a20fce021d510d38b414f5358ff0814,2025-06-03T00:15:20.103000
|
||||
CVE-2025-49163,1,1,5ac2d3b4d109a877de24814e58aa1ebc7f91f2d2486be5a5e8624be49a6e92d9,2025-06-03T00:15:20.583000
|
||||
CVE-2025-49164,1,1,33e54d3e5b62607b96537468811ac3d84c787f83ce5aa0f13b239f92b783fa04,2025-06-03T00:15:20.740000
|
||||
CVE-2025-49162,0,0,0934e3250beffc21d4128bb1746955a06a20fce021d510d38b414f5358ff0814,2025-06-03T00:15:20.103000
|
||||
CVE-2025-49163,0,0,5ac2d3b4d109a877de24814e58aa1ebc7f91f2d2486be5a5e8624be49a6e92d9,2025-06-03T00:15:20.583000
|
||||
CVE-2025-49164,0,0,33e54d3e5b62607b96537468811ac3d84c787f83ce5aa0f13b239f92b783fa04,2025-06-03T00:15:20.740000
|
||||
CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000
|
||||
CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000
|
||||
CVE-2025-4919,0,0,d317e3bd578018ad84a455f2232992db1a6397292bb6496f6e9135fa366be8bd,2025-05-28T14:08:29.293000
|
||||
@ -296010,7 +296013,7 @@ CVE-2025-5064,0,0,87518e9ed6daee720522048748a5340f904ec1b27742821c54fbc97a801d9e
|
||||
CVE-2025-5065,0,0,8fc53b66fe42da4959811ef54b22b91af2bd35c9f4f954731cade0848a818fac,2025-05-29T15:50:57.497000
|
||||
CVE-2025-5066,0,0,c2e1df9fe6cae5990ac135a3976d91b02429d110b23d2797a3b2dababf03dd2d,2025-05-29T15:50:51.310000
|
||||
CVE-2025-5067,0,0,cf2723dbc4b2f797991ebafc1c2cb069497cee2d74a6a84ebec9dcde1e0dd29e,2025-05-29T15:50:43.240000
|
||||
CVE-2025-5068,1,1,cb23e839b384b1284072d0ade7f5dcffd3065cb3e4b8c8eb438ab2a591d0d4b7,2025-06-03T00:15:20.907000
|
||||
CVE-2025-5068,0,1,2a2857b51afe406d8cfa48681676a3b448add552b1d8ba221cb6e1bf08b8548e,2025-06-03T03:15:28.280000
|
||||
CVE-2025-5073,0,0,baf1c84b4e2167692053943d4c0fd05e8f8f1a1d5bd906b6480eed1245a366ce,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5074,0,0,9ba68eed20e336e3555aa374d8a228cbc63c1570f254cad86d2d34a36791d8af,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5075,0,0,3557427c3c8420f28dd5505d5532f5e698013ee739fdf7287e91d365cc97d126,2025-05-23T15:55:02.040000
|
||||
@ -296232,7 +296235,7 @@ CVE-2025-5409,0,0,209b521ab5ccc30904997673163794c81e8bbcd661514ad5d6db90496c692a
|
||||
CVE-2025-5410,0,0,8f6aec665b1901bf160e99989f915904c0b12f976e27a46b4117cb6a4d26984d,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5411,0,0,bda57e821f06e7acb04b67298784cbbe1631c5e86f17b6a45cfc7ca79da6e664,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5412,0,0,753b4152a593f449df2c00057cf330d4f98993025991e4c159242de574477a9d,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5419,1,1,f582126ca32a3b4c3d4d78f22963347e1d49c0b6f7928950ed86e2b93e5d50e2,2025-06-03T00:15:21.043000
|
||||
CVE-2025-5419,0,1,7c182b9e1d8229ac433b17b025bf2a361a490b3acf344a00cf760ddbe7a51b03,2025-06-03T03:15:28.460000
|
||||
CVE-2025-5420,0,0,febb25c16bce360c4a759b2a4127c671c1e4f8d4aafbd5e7bf731b1578cd725f,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5421,0,0,aaf7308ceb57221ad68dbb7db22ba2000af542ccf461039f6c7d796fca57cef7,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5422,0,0,9e450c046e1f91b7dd55771f187d3de2563113f044a3b50f5e4e98096355fb9a,2025-06-02T17:32:17.397000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user