mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-05T02:00:20.469210+00:00
This commit is contained in:
parent
e1f5a0856c
commit
e2a1e1f5fe
86
CVE-2025/CVE-2025-490xx/CVE-2025-49008.json
Normal file
86
CVE-2025/CVE-2025-490xx/CVE-2025-49008.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-49008",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-05T01:15:21.120",
|
||||
"lastModified": "2025-06-05T01:15:21.120",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Atheos is a self-hosted browser-based cloud integrated development environment. Prior to version 6.0.4, improper use of `escapeshellcmd()` in `/components/codegit/traits/execute.php` allows argument injection, leading to arbitrary command execution. Atheos administrators and users of vulnerable versions are at risk of data breaches or server compromise. Version 6.0.4 introduces a `Common::safe_execute` function that sanitizes all arguments using `escapeshellarg()` prior to execution and migrated all components potentially vulnerable to similar exploits to use this new templated execution system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-88"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Atheos/Atheos/commit/7e6c0eb45fa6d04d786a0037389540f2638fe792",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Atheos/Atheos/security/advisories/GHSA-rwc2-4q8c-xj48",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
152
CVE-2025/CVE-2025-56xx/CVE-2025-5620.json
Normal file
152
CVE-2025/CVE-2025-56xx/CVE-2025-5620.json
Normal file
@ -0,0 +1,152 @@
|
||||
{
|
||||
"id": "CVE-2025-5620",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T00:15:23.513",
|
||||
"lastModified": "2025-06-05T00:15:23.513",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in D-Link DIR-816 1.10CNB05. Affected is the function setipsec_config of the file /goform/setipsec_config. The manipulation of the argument localIP/remoteIP leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_48/48.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311106",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311106",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.589220",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
152
CVE-2025/CVE-2025-56xx/CVE-2025-5621.json
Normal file
152
CVE-2025/CVE-2025-56xx/CVE-2025-5621.json
Normal file
@ -0,0 +1,152 @@
|
||||
{
|
||||
"id": "CVE-2025-5621",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T00:15:23.760",
|
||||
"lastModified": "2025-06-05T00:15:23.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in D-Link DIR-816 1.10CNB05 and classified as critical. Affected by this vulnerability is the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_49/49.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311107",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311107",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.589221",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
152
CVE-2025/CVE-2025-56xx/CVE-2025-5622.json
Normal file
152
CVE-2025/CVE-2025-56xx/CVE-2025-5622.json
Normal file
@ -0,0 +1,152 @@
|
||||
{
|
||||
"id": "CVE-2025-5622",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T00:15:23.947",
|
||||
"lastModified": "2025-06-05T00:15:23.947",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in D-Link DIR-816 1.10CNB05 and classified as critical. Affected by this issue is the function wirelessApcli_5g of the file /goform/wirelessApcli_5g. The manipulation of the argument apcli_mode_5g/apcli_enc_5g/apcli_default_key_5g leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||||
"baseScore": 10.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_50/50.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311108",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311108",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.589222",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
152
CVE-2025/CVE-2025-56xx/CVE-2025-5623.json
Normal file
152
CVE-2025/CVE-2025-56xx/CVE-2025-5623.json
Normal file
@ -0,0 +1,152 @@
|
||||
{
|
||||
"id": "CVE-2025-5623",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T00:15:24.133",
|
||||
"lastModified": "2025-06-05T00:15:24.133",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been classified as critical. This affects the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||||
"baseScore": 10.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_51/51.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311109",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311109",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.589224",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
152
CVE-2025/CVE-2025-56xx/CVE-2025-5624.json
Normal file
152
CVE-2025/CVE-2025-56xx/CVE-2025-5624.json
Normal file
@ -0,0 +1,152 @@
|
||||
{
|
||||
"id": "CVE-2025-5624",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T01:15:21.293",
|
||||
"lastModified": "2025-06-05T01:15:21.293",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been declared as critical. This vulnerability affects the function QoSPortSetup of the file /goform/QoSPortSetup. The manipulation of the argument port0_group/port0_remarker/ssid0_group/ssid0_remarker leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||||
"baseScore": 10.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_53/53.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311110",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311110",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.589226",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-56xx/CVE-2025-5625.json
Normal file
145
CVE-2025/CVE-2025-56xx/CVE-2025-5625.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5625",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T01:15:21.480",
|
||||
"lastModified": "2025-06-05T01:15:21.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Online Teacher Record Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /search-teacher.php. The manipulation of the argument searchteacher leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nikeWRL/CVE-/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311111",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311111",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.589279",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-56xx/CVE-2025-5626.json
Normal file
145
CVE-2025/CVE-2025-56xx/CVE-2025-5626.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5626",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T01:15:21.663",
|
||||
"lastModified": "2025-06-05T01:15:21.663",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Campcodes Online Teacher Record Management System 1.0. Affected is an unknown function of the file /admin/edit-subjects-detail.php. The manipulation of the argument editid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nikeWRL/CVE-/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311112",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311112",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.589309",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-56xx/CVE-2025-5627.json
Normal file
145
CVE-2025/CVE-2025-56xx/CVE-2025-5627.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5627",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T01:15:21.850",
|
||||
"lastModified": "2025-06-05T01:15:21.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in code-projects Patient Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /sputum_form.php. The manipulation of the argument itr_no leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bazhahei123/CVE/blob/main/sql_cve_6_3.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311113",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311113",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.589364",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
53
README.md
53
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-04T23:55:19.453735+00:00
|
||||
2025-06-05T02:00:20.469210+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-04T23:15:22.247000+00:00
|
||||
2025-06-05T01:15:21.850000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,59 +27,34 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2025-06-04T00:00:04.320392+00:00
|
||||
2025-06-05T00:00:04.323256+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
296520
|
||||
296529
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
|
||||
- [CVE-2025-49007](CVE-2025/CVE-2025-490xx/CVE-2025-49007.json) (`2025-06-04T23:15:21.540`)
|
||||
- [CVE-2025-5613](CVE-2025/CVE-2025-56xx/CVE-2025-5613.json) (`2025-06-04T22:15:25.933`)
|
||||
- [CVE-2025-5614](CVE-2025/CVE-2025-56xx/CVE-2025-5614.json) (`2025-06-04T22:15:26.117`)
|
||||
- [CVE-2025-5615](CVE-2025/CVE-2025-56xx/CVE-2025-5615.json) (`2025-06-04T22:15:26.293`)
|
||||
- [CVE-2025-5616](CVE-2025/CVE-2025-56xx/CVE-2025-5616.json) (`2025-06-04T23:15:21.700`)
|
||||
- [CVE-2025-5617](CVE-2025/CVE-2025-56xx/CVE-2025-5617.json) (`2025-06-04T23:15:21.893`)
|
||||
- [CVE-2025-5618](CVE-2025/CVE-2025-56xx/CVE-2025-5618.json) (`2025-06-04T23:15:22.070`)
|
||||
- [CVE-2025-5619](CVE-2025/CVE-2025-56xx/CVE-2025-5619.json) (`2025-06-04T23:15:22.247`)
|
||||
- [CVE-2025-5690](CVE-2025/CVE-2025-56xx/CVE-2025-5690.json) (`2025-06-04T22:15:26.470`)
|
||||
- [CVE-2025-49008](CVE-2025/CVE-2025-490xx/CVE-2025-49008.json) (`2025-06-05T01:15:21.120`)
|
||||
- [CVE-2025-5620](CVE-2025/CVE-2025-56xx/CVE-2025-5620.json) (`2025-06-05T00:15:23.513`)
|
||||
- [CVE-2025-5621](CVE-2025/CVE-2025-56xx/CVE-2025-5621.json) (`2025-06-05T00:15:23.760`)
|
||||
- [CVE-2025-5622](CVE-2025/CVE-2025-56xx/CVE-2025-5622.json) (`2025-06-05T00:15:23.947`)
|
||||
- [CVE-2025-5623](CVE-2025/CVE-2025-56xx/CVE-2025-5623.json) (`2025-06-05T00:15:24.133`)
|
||||
- [CVE-2025-5624](CVE-2025/CVE-2025-56xx/CVE-2025-5624.json) (`2025-06-05T01:15:21.293`)
|
||||
- [CVE-2025-5625](CVE-2025/CVE-2025-56xx/CVE-2025-5625.json) (`2025-06-05T01:15:21.480`)
|
||||
- [CVE-2025-5626](CVE-2025/CVE-2025-56xx/CVE-2025-5626.json) (`2025-06-05T01:15:21.663`)
|
||||
- [CVE-2025-5627](CVE-2025/CVE-2025-56xx/CVE-2025-5627.json) (`2025-06-05T01:15:21.850`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `37`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2022-23092](CVE-2022/CVE-2022-230xx/CVE-2022-23092.json) (`2025-06-04T22:09:43.293`)
|
||||
- [CVE-2022-23093](CVE-2022/CVE-2022-230xx/CVE-2022-23093.json) (`2025-06-04T22:15:09.143`)
|
||||
- [CVE-2024-11831](CVE-2024/CVE-2024-118xx/CVE-2024-11831.json) (`2025-06-04T23:15:20.670`)
|
||||
- [CVE-2024-13776](CVE-2024/CVE-2024-137xx/CVE-2024-13776.json) (`2025-06-04T22:25:52.097`)
|
||||
- [CVE-2024-13793](CVE-2024/CVE-2024-137xx/CVE-2024-13793.json) (`2025-06-04T22:40:36.310`)
|
||||
- [CVE-2024-22048](CVE-2024/CVE-2024-220xx/CVE-2024-22048.json) (`2025-06-04T22:15:24.567`)
|
||||
- [CVE-2024-22529](CVE-2024/CVE-2024-225xx/CVE-2024-22529.json) (`2025-06-04T22:15:24.783`)
|
||||
- [CVE-2024-22625](CVE-2024/CVE-2024-226xx/CVE-2024-22625.json) (`2025-06-04T22:15:24.970`)
|
||||
- [CVE-2024-22725](CVE-2024/CVE-2024-227xx/CVE-2024-22725.json) (`2025-06-04T22:15:25.180`)
|
||||
- [CVE-2024-22729](CVE-2024/CVE-2024-227xx/CVE-2024-22729.json) (`2025-06-04T22:15:25.360`)
|
||||
- [CVE-2024-22903](CVE-2024/CVE-2024-229xx/CVE-2024-22903.json) (`2025-06-04T22:15:25.547`)
|
||||
- [CVE-2024-22922](CVE-2024/CVE-2024-229xx/CVE-2024-22922.json) (`2025-06-04T22:15:25.727`)
|
||||
- [CVE-2025-0839](CVE-2025/CVE-2025-08xx/CVE-2025-0839.json) (`2025-06-04T22:26:13.510`)
|
||||
- [CVE-2025-2789](CVE-2025/CVE-2025-27xx/CVE-2025-2789.json) (`2025-06-04T22:26:48.120`)
|
||||
- [CVE-2025-2806](CVE-2025/CVE-2025-28xx/CVE-2025-2806.json) (`2025-06-04T22:53:20.850`)
|
||||
- [CVE-2025-2892](CVE-2025/CVE-2025-28xx/CVE-2025-2892.json) (`2025-06-04T23:03:24.370`)
|
||||
- [CVE-2025-3077](CVE-2025/CVE-2025-30xx/CVE-2025-3077.json) (`2025-06-04T22:38:13.343`)
|
||||
- [CVE-2025-3276](CVE-2025/CVE-2025-32xx/CVE-2025-3276.json) (`2025-06-04T22:32:03.090`)
|
||||
- [CVE-2025-3419](CVE-2025/CVE-2025-34xx/CVE-2025-3419.json) (`2025-06-04T22:42:06.187`)
|
||||
- [CVE-2025-3431](CVE-2025/CVE-2025-34xx/CVE-2025-3431.json) (`2025-06-04T22:27:39.390`)
|
||||
- [CVE-2025-3468](CVE-2025/CVE-2025-34xx/CVE-2025-3468.json) (`2025-06-04T22:54:54.960`)
|
||||
- [CVE-2025-3862](CVE-2025/CVE-2025-38xx/CVE-2025-3862.json) (`2025-06-04T22:57:04.867`)
|
||||
- [CVE-2025-4127](CVE-2025/CVE-2025-41xx/CVE-2025-4127.json) (`2025-06-04T22:46:00.467`)
|
||||
- [CVE-2025-4204](CVE-2025/CVE-2025-42xx/CVE-2025-4204.json) (`2025-06-04T22:39:20.750`)
|
||||
- [CVE-2025-4208](CVE-2025/CVE-2025-42xx/CVE-2025-4208.json) (`2025-06-04T22:58:48.523`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
101
_state.csv
101
_state.csv
@ -147236,7 +147236,7 @@ CVE-2020-1202,0,0,88ca064af43a331ca93f34454fb4aa1eb290c4e8a000583e0f77582ba70058
|
||||
CVE-2020-12020,0,0,1bdee6a6e9603cb4ad355eac49328f12b3e2411a4317c25f4cad071535f8494a,2024-11-21T04:59:07.700000
|
||||
CVE-2020-12021,0,0,7d39c53b07000c2d705a860bb1a7e1aff8cba61c23e762f26ecb5a22762058d7,2024-11-21T04:59:07.807000
|
||||
CVE-2020-12022,0,0,79984606d1c0adcd810ab8c87706ab2a305d8a5d34cb6ee1e7601a799b924495,2024-11-21T04:59:07.913000
|
||||
CVE-2020-12023,0,1,fbf2cf345d14b35a08324ba84ad7dea3e49dcbccfc27a7cc8a43321fb65553d0,2025-06-04T22:15:22.557000
|
||||
CVE-2020-12023,0,0,fbf2cf345d14b35a08324ba84ad7dea3e49dcbccfc27a7cc8a43321fb65553d0,2025-06-04T22:15:22.557000
|
||||
CVE-2020-12024,0,0,7f321ce5f5c200fb6ba6cf41df8d3796703487d6f2dcfdbe682cb8439244c31f,2024-11-21T04:59:08.123000
|
||||
CVE-2020-12025,0,0,cec25944ffac63b273e393e80d5871d4776547516ad6596aa7eec5e6700f3b29,2024-11-21T04:59:08.237000
|
||||
CVE-2020-12026,0,0,41e22023062ac9d46c1d1ac98d046e10883bfcfbecae597e526b6ad04bfcba9b,2024-11-21T04:59:08.347000
|
||||
@ -149460,7 +149460,7 @@ CVE-2020-14473,0,0,43188d2c20cf07e32311d7b586bd81cb15c3bab30d69bbf239c3034be2d6b
|
||||
CVE-2020-14474,0,0,f4915c5ea927581f5da7a0e4d333620dd55a889876a6f7ed3ee39bad34809d6f,2024-11-21T05:03:20.983000
|
||||
CVE-2020-14475,0,0,b581b3ecf7ae3331b2a3ffeaaf93c26c5e4e2c6f0d6e7a885196edc95352dbfd,2024-11-21T05:03:21.177000
|
||||
CVE-2020-14476,0,0,9036e2638d7772dd4e302b00687841c224ae00e65c08033366afd6086e3ac016,2023-11-07T03:17:14.560000
|
||||
CVE-2020-14477,0,1,586d23a20b103592a649e50b4f276e3313dcf42e03f4c4be47d433ffe4ed9fd6,2025-06-04T22:15:22.960000
|
||||
CVE-2020-14477,0,0,586d23a20b103592a649e50b4f276e3313dcf42e03f4c4be47d433ffe4ed9fd6,2025-06-04T22:15:22.960000
|
||||
CVE-2020-14478,0,0,e3a9af839d20c14d26165dc593cc89ad7c1c91bec9ca64f2a2bc29702b1366e3,2025-04-17T19:15:49.883000
|
||||
CVE-2020-14479,0,0,dafdd4622121f973e6784cdddfd71b265be146e8898dfd514e1542cece7e6566,2024-11-21T05:03:21.647000
|
||||
CVE-2020-1448,0,0,c81b9bfbb251af080e75dd9b3f184e3f8afc92cab380602cdec33481d5ce30f1,2024-11-21T05:10:34.290000
|
||||
@ -149505,7 +149505,7 @@ CVE-2020-14514,0,0,eadd09260a1be7f456671622af9984e154c4e1dcef080a7d0036e3044136d
|
||||
CVE-2020-14515,0,0,1949e55f64dbf8db64a04d20ed7c52eb3a1f8c73ae3a5712f97133978876a59e,2024-11-21T05:03:26.193000
|
||||
CVE-2020-14516,0,0,cc8425a5cb8b5fa3de03daa4ab33ae5021ff4d5ab706e78aa4d7e0513271891d,2024-11-21T05:03:26.307000
|
||||
CVE-2020-14517,0,0,39fb50c5131114362a8ff8bdef00deb9289fa6955cfb890e6523c06dfa272a78,2024-11-21T05:03:26.437000
|
||||
CVE-2020-14518,0,1,5cc5f9f7eeb40b0710d54ffab6f26669b8f64c7c8cd57f006e878e774cf97a37,2025-06-04T22:15:23.157000
|
||||
CVE-2020-14518,0,0,5cc5f9f7eeb40b0710d54ffab6f26669b8f64c7c8cd57f006e878e774cf97a37,2025-06-04T22:15:23.157000
|
||||
CVE-2020-14519,0,0,76936ca199b64957d9b41b0a5ed2afa3fd45a637adb7413b539071dfd6340feb,2024-11-21T05:03:26.710000
|
||||
CVE-2020-1452,0,0,5e9d7a8d68ddb362b6b37cd71ee5e3bfdd59db79dad94984047ee1913c1c19c6,2024-11-21T05:10:34.793000
|
||||
CVE-2020-14520,0,0,e8ed9db0472e8828cbcffe1689ca560659e681c0fb0b06077ff987e261dc924a,2024-11-21T05:03:26.827000
|
||||
@ -149513,7 +149513,7 @@ CVE-2020-14521,0,0,74acad6e8f6857ff9b6448b117eadd1e2cf684c433a9babea6c245c37d53f
|
||||
CVE-2020-14522,0,0,54c7150550c757c1c24e9d50716b0243dd4deaa89d4a8d1e5d4cbcc5588133c0,2024-11-21T05:03:27.163000
|
||||
CVE-2020-14523,0,0,3cb6b3a3f8236778875d104127f2f6d89f904035b003cc2d0fe06a9e7d785d52,2024-11-21T05:03:27.300000
|
||||
CVE-2020-14524,0,0,d235d1cdc874fdc9d5efb6a066740d1fce66c123fd45f48c9ec3fa5d3f061905,2024-11-21T05:03:27.457000
|
||||
CVE-2020-14525,0,1,03d4531ba3accc12f5d3fdffde0c969291ca25d831d02321002385664ce559f9,2025-06-04T22:15:23.333000
|
||||
CVE-2020-14525,0,0,03d4531ba3accc12f5d3fdffde0c969291ca25d831d02321002385664ce559f9,2025-06-04T22:15:23.333000
|
||||
CVE-2020-14527,0,0,f2ce8301ce8a9cd112b18ce060d32a74a19ab0871b056e872f324c62b9c1730c,2024-11-21T05:03:27.727000
|
||||
CVE-2020-14528,0,0,787446c730275f6d89e96d310c971de8b56ed84d730f71762a329a757f7148b3,2024-11-21T05:03:27.880000
|
||||
CVE-2020-14529,0,0,ca6c2aeb4b3e66b76bdfec95f7a4481c11b380d2e8f00d158c386659bc2ad4ac,2024-11-21T05:03:28.030000
|
||||
@ -151112,10 +151112,10 @@ CVE-2020-16193,0,0,9e83246e68e0f44f055f794e3c0c869aa263965a298faa16fd1efeba75779
|
||||
CVE-2020-16194,0,0,bc7cd15529527318b75baec31638e0980c03f097c4ca992f578ddb2aba193fa8,2024-11-21T05:06:54.793000
|
||||
CVE-2020-16196,0,0,8c2ab19c8fbd2d50f61800cf613912eac1139ae6547f006672d1513675e4c1c5,2023-11-07T03:18:13.300000
|
||||
CVE-2020-16197,0,0,6cc875ea72538bfdc794b57849f56493201e3c39e4710b5ff84b8a73b2a1d9dd,2024-11-21T05:06:54.957000
|
||||
CVE-2020-16198,0,1,7f0f35ff9301d1583f45e1b490f5f3d6eb990c430de57d01b3b336a6c143daf3,2025-06-04T22:15:23.507000
|
||||
CVE-2020-16198,0,0,7f0f35ff9301d1583f45e1b490f5f3d6eb990c430de57d01b3b336a6c143daf3,2025-06-04T22:15:23.507000
|
||||
CVE-2020-16199,0,0,3ee94713a773a0017c05575c0e4123d20229d483389fa69bb49af8e185d57885,2024-11-21T05:06:55.213000
|
||||
CVE-2020-1620,0,0,486d0ef24f53ee5b963c6730303da1faa397c61df8247eb504efc86a3c45b574,2024-11-21T05:11:00.913000
|
||||
CVE-2020-16200,0,1,4bbc2eaf07b89e7d2af6e58714cd57d2554399e11f479cea77d45b7066c8d1de,2025-06-04T22:15:23.680000
|
||||
CVE-2020-16200,0,0,4bbc2eaf07b89e7d2af6e58714cd57d2554399e11f479cea77d45b7066c8d1de,2025-06-04T22:15:23.680000
|
||||
CVE-2020-16201,0,0,ca59489c5e1f9b1e51aa4e6a1c5917cf148d9f24ca2cc46365a08e08741f0406,2024-11-21T05:06:55.450000
|
||||
CVE-2020-16202,0,0,b73af3688259d22091171dc509710ae2481830be52b8ca4c12aa5a6ed144c7d2,2024-11-21T05:06:55.577000
|
||||
CVE-2020-16203,0,0,eaec7fb61f982fbcda0555c0644fa05ebc1d2a72eeafad32a7b0fcca0e3e5c15,2024-11-21T05:06:55.687000
|
||||
@ -151155,18 +151155,18 @@ CVE-2020-16233,0,0,4d8cecb052a6913735d1000812c9e8f7ac020c2f20e58f0ba88644cc6957c
|
||||
CVE-2020-16234,0,0,086460b5e902f6f644a00e617ce30a62bdc787d9aac745f5e5c356a80626ee60,2024-11-21T05:06:59.650000
|
||||
CVE-2020-16235,0,0,4fa09c5a6acdebea49e80de1c84a3d2468c5daeb68efe7818672370f56c15f14,2024-11-21T05:06:59.757000
|
||||
CVE-2020-16236,0,0,10a3c01509715af1de8b046097286769a60598492e065037d521fe9f967fd92e,2024-11-21T05:06:59.873000
|
||||
CVE-2020-16237,0,1,39f0feb3341d9f9489dab6abc84bd42647b373d86638773762a46ed29017dda3,2025-06-04T22:15:23.847000
|
||||
CVE-2020-16237,0,0,39f0feb3341d9f9489dab6abc84bd42647b373d86638773762a46ed29017dda3,2025-06-04T22:15:23.847000
|
||||
CVE-2020-16238,0,0,8a53a9ad43117d9e48b8367bc91bcf5b0e85a301ae89f2b4832b5dcc63fc91cc,2024-11-21T05:07:00.120000
|
||||
CVE-2020-16239,0,1,5fb632d95605c15549fd088bf968e32c01142ae7ad992a5d75fe6a345163f141,2025-06-04T22:15:24.027000
|
||||
CVE-2020-16239,0,0,5fb632d95605c15549fd088bf968e32c01142ae7ad992a5d75fe6a345163f141,2025-06-04T22:15:24.027000
|
||||
CVE-2020-1624,0,0,557eb901857befb38d78ad688fcac58cdad18eff2e247aa51da7f264036cb194,2024-11-21T05:11:01.417000
|
||||
CVE-2020-16240,0,0,cc622a30467fa12fd8b7997de355e9ba210a79cff4b774d0f02c18bd71d6fccb,2024-11-21T05:07:00.387000
|
||||
CVE-2020-16241,0,1,ba69c5d6ad9ee40221610c877fe07ffa54ec3a34ff432e852e794579848815b9,2025-06-04T22:15:24.187000
|
||||
CVE-2020-16241,0,0,ba69c5d6ad9ee40221610c877fe07ffa54ec3a34ff432e852e794579848815b9,2025-06-04T22:15:24.187000
|
||||
CVE-2020-16242,0,0,0b76989f333c70b3b3f8d0530b4de2aad82e279210c34a13dcd26a25648db9f9,2024-11-21T05:07:00.613000
|
||||
CVE-2020-16243,0,0,1df3b74e1b199b4ea22a97c33b051459b8440355188ae93ca8b7bc39136aacf7,2024-11-21T05:07:00.730000
|
||||
CVE-2020-16244,0,0,6859d106ed63ed05f8ed315af2bfa29090b9cdb8b54be70c22b2eab7c9e51b33,2024-11-21T05:07:00.843000
|
||||
CVE-2020-16245,0,0,66a5087e75bbce09cd45b85adfe500f0011162644e4b788f7f08a2d3e98f8cd9,2024-11-21T05:07:00.960000
|
||||
CVE-2020-16246,0,0,85efd4adc8d609c48088fa6675c9a8edb0b9de82418d9c1b27ea8b6d16b4a405,2024-11-21T05:07:01.097000
|
||||
CVE-2020-16247,0,1,caa70b27fb8ed2cafec5ff9306ca4e8df446bc87d1486e1341e924c32f07c73f,2025-06-04T22:15:24.350000
|
||||
CVE-2020-16247,0,0,caa70b27fb8ed2cafec5ff9306ca4e8df446bc87d1486e1341e924c32f07c73f,2025-06-04T22:15:24.350000
|
||||
CVE-2020-16248,0,0,d6f5a1cf71e475e19e1bfa7bcf436b52af9ccb997eaf0d118d40041e4add90e7,2024-11-21T05:07:01.353000
|
||||
CVE-2020-1625,0,0,98e043280392fb6f45dce8042e2b3795d1824dd136b5649c495f43bbd0d3d29c,2024-11-21T05:11:01.550000
|
||||
CVE-2020-16250,0,0,300d7ccbd8989bd836dfb6d2f877f295eb5d0ef3fc317cfe0c75f847581b4015,2024-11-21T05:07:01.520000
|
||||
@ -192861,13 +192861,13 @@ CVE-2022-23084,0,0,6a2ae41871be721436e219d7e0389dac1fc31c85838d980f693b5dba18326
|
||||
CVE-2022-23085,0,0,6412c8372d862dcc0a3cf5bd7c1efba690d9a88863c7674f559c75ca93e49e66,2024-12-09T17:27:22.803000
|
||||
CVE-2022-23086,0,0,9eb758d3b3f002e65dc4f7fa151bd7eef0a9a77d4095c5f040d86603a18d59cf,2024-12-09T23:24:03.727000
|
||||
CVE-2022-23087,0,0,f5c20b4d02f108f337dd632dae4a5ffc6be3ceb3ac9cea5b8baf4ea214f6bd86,2025-03-27T20:15:16.600000
|
||||
CVE-2022-23088,0,1,d1c82c7fe1880449f2c6892b572e9b89c4f9390b932807531d758fe618dc7665,2025-06-04T22:16:17.550000
|
||||
CVE-2022-23088,0,0,d1c82c7fe1880449f2c6892b572e9b89c4f9390b932807531d758fe618dc7665,2025-06-04T22:16:17.550000
|
||||
CVE-2022-23089,0,0,ace1087202101819261e316ec59aafbb23438a12c187ab582748d97f4ca3a7fa,2025-06-04T21:11:31.653000
|
||||
CVE-2022-2309,0,0,c1e27ddb7db8d117df512ea1a0dccd33df5b4b4a4eb6a99e7d3dae6a4563a3fc,2024-11-21T07:00:44.473000
|
||||
CVE-2022-23090,0,0,7b11202751a4b72a1550d1c0e6f8da16b2c1e624ba1e3807afdedd7015db4e31,2025-06-04T21:59:04.990000
|
||||
CVE-2022-23091,0,1,a9a4a6a363a97901bee63acb2f18b4f4e9cd08664c11219f9d5069ee1a38917e,2025-06-04T22:09:07.247000
|
||||
CVE-2022-23092,0,1,7b176c77478a7aaa87747a5a75a9bdbc994e2a2e2d055f122c7b3b791b7c0a94,2025-06-04T22:09:43.293000
|
||||
CVE-2022-23093,0,1,eff11177d8c5c8764c5f340d6d200c249c69d8097db3e9afa04b5617c05988a4,2025-06-04T22:15:09.143000
|
||||
CVE-2022-23091,0,0,a9a4a6a363a97901bee63acb2f18b4f4e9cd08664c11219f9d5069ee1a38917e,2025-06-04T22:09:07.247000
|
||||
CVE-2022-23092,0,0,7b176c77478a7aaa87747a5a75a9bdbc994e2a2e2d055f122c7b3b791b7c0a94,2025-06-04T22:09:43.293000
|
||||
CVE-2022-23093,0,0,eff11177d8c5c8764c5f340d6d200c249c69d8097db3e9afa04b5617c05988a4,2025-06-04T22:15:09.143000
|
||||
CVE-2022-23094,0,0,07589043c7462bc32cc04f77e7d591de3cf431a5f3d376dc83197411f8726e8d,2024-11-21T06:47:58.540000
|
||||
CVE-2022-23095,0,0,66258bc7f94fc21b028d36de31d17a321c24dade09f85f9f7740c0fd0ba59d8e,2025-05-05T17:17:55.063000
|
||||
CVE-2022-23096,0,0,cad0c3bbaf17f100d5df03c628cb88868089138e639e03e8189b5d480b523f5c,2024-11-21T06:47:58.880000
|
||||
@ -246940,7 +246940,7 @@ CVE-2024-11828,0,0,2182fcc94d5c2924b387611eabcc64629aff0d6ea201e85bc92b19a7228cc
|
||||
CVE-2024-11829,0,0,69c985051f8ba94b9fa4dc84b0c753dff2563e51518549f413112c5cfd5d6732,2025-02-04T17:49:14.273000
|
||||
CVE-2024-1183,0,0,65ecfa5c3d2b221c19281f6b798c6cc7087d171223e10f3dd191314d09620aec,2024-11-21T08:49:58.950000
|
||||
CVE-2024-11830,0,0,2b9bcbcc6b8510fbe3715609ebd917cba06af0eebf5118baa1afa85039e0b1f0,2025-01-08T11:15:06.443000
|
||||
CVE-2024-11831,0,1,819f7f63288af73cd79ceed20eedceffc7f9b62310d3d18bfffbdc501c5f4454,2025-06-04T23:15:20.670000
|
||||
CVE-2024-11831,0,0,819f7f63288af73cd79ceed20eedceffc7f9b62310d3d18bfffbdc501c5f4454,2025-06-04T23:15:20.670000
|
||||
CVE-2024-11832,0,0,7a6414b8a97e02ea73c05598b642d3e1c0cc9c0557b16b568dca85c729ab2498,2025-01-07T18:12:54.040000
|
||||
CVE-2024-11833,0,0,508bcce82814de0a5ab20d2d4557e0c0ce4c9dd038000fc513cde0b65b845abf,2024-12-13T06:15:25.233000
|
||||
CVE-2024-11834,0,0,3e4bbf7d975d33cb98deb34c5acbe1f3c43954f92e3b7f44576d4d1a8fcd397a,2024-12-16T18:15:08.243000
|
||||
@ -248943,7 +248943,7 @@ CVE-2024-13772,0,0,88884999e94fd136c006ac34f09e297f89dc65accdc929080bc3b41b173e6
|
||||
CVE-2024-13773,0,0,884e6660fe51b9ec6023ab482afcf022fac478d2e85e96c2af67b306b6450292,2025-03-27T01:07:51.827000
|
||||
CVE-2024-13774,0,0,e6ae1b409727feaef83d8ef3920cb55c315f293b5e235e9cdd591e9ba27fa7cf,2025-03-12T17:01:06.413000
|
||||
CVE-2024-13775,0,0,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000
|
||||
CVE-2024-13776,0,1,417319261e07d6ec07c6472e9a90d4a7ad2527a900f5a6ef02e01247d3360b87,2025-06-04T22:25:52.097000
|
||||
CVE-2024-13776,0,0,417319261e07d6ec07c6472e9a90d4a7ad2527a900f5a6ef02e01247d3360b87,2025-06-04T22:25:52.097000
|
||||
CVE-2024-13777,0,0,d9db0831448ca8b1f58d35fbcea0949697923acee869bca28598064053d1762e,2025-05-26T01:44:28.843000
|
||||
CVE-2024-13778,0,0,25e48974c7c2e8b9485e2a450a8fcfd8529904956dfee29086563b2afc474b01,2025-03-05T10:15:15.720000
|
||||
CVE-2024-13779,0,0,2c25d0f931499e640a9b9d1a52e16ff0830016b962d04d2c777eb106c9eed5e0,2025-03-05T10:15:16.213000
|
||||
@ -248957,7 +248957,7 @@ CVE-2024-1379,0,0,329b3b08765a69102416ab28d875ef22ab72660cea0367e0a1a6768dc93176
|
||||
CVE-2024-13790,0,0,5ba2b4aa3f9e5ca19f6db2b23c62c6b59fa6ef48bdc3c75c47e6b8b955b8ac49,2025-03-19T09:15:14.250000
|
||||
CVE-2024-13791,0,0,87d34d666cc6abe64fd811a08f4df25c9dcd54e5f0bd075f781061adfbd26e98,2025-02-25T04:01:52.803000
|
||||
CVE-2024-13792,0,0,95c136c58ffd0d86dab2da9aa86fa75170f9d7e438d0612c3363162ba0d1c0ed,2025-02-25T20:56:55.553000
|
||||
CVE-2024-13793,0,1,a7729c643045d70ac403afe71d9fd278331501c2c5d82ad55c7881ddb4565757,2025-06-04T22:40:36.310000
|
||||
CVE-2024-13793,0,0,a7729c643045d70ac403afe71d9fd278331501c2c5d82ad55c7881ddb4565757,2025-06-04T22:40:36.310000
|
||||
CVE-2024-13794,0,0,2d8d5be50ddd666dfa8aefe99d8514a1f4096750b869d231f17079ac008b636d,2025-02-25T19:38:05.950000
|
||||
CVE-2024-13795,0,0,5c01555cf2ad62d519339aa7fca734aa9775ae1bd36f752424bbf014d4c482c0,2025-02-21T15:33:49.100000
|
||||
CVE-2024-13796,0,0,db083a01e38a3c950e08c19397cb9e8a9a907dffb08430b808a3c4350a42290b,2025-03-06T20:49:05.680000
|
||||
@ -251542,7 +251542,7 @@ CVE-2024-22043,0,0,ab28b95c2293e8d043005b472ee1c195b171baa49ef18712f7c1bbd1f4e21
|
||||
CVE-2024-22044,0,0,3785c041801c9e494f1163bcded486ac4d8ba2b4daeeba43f718d07aa287ce8a,2024-11-21T08:55:27.110000
|
||||
CVE-2024-22045,0,0,0fc85a36de1553626b26231251df9561b8f82694677467031c0736aaeb797b1f,2024-11-21T08:55:27.243000
|
||||
CVE-2024-22047,0,0,d68430b2edf0851d21b381563fe0dbf2b683387b65fe0fd96257221e8d051bd8,2024-11-21T08:55:27.380000
|
||||
CVE-2024-22048,0,1,9e2b337346d1824a5e479cf5a4d13d338a30b85ab1b633875cd5dc9f2e4565f1,2025-06-04T22:15:24.567000
|
||||
CVE-2024-22048,0,0,9e2b337346d1824a5e479cf5a4d13d338a30b85ab1b633875cd5dc9f2e4565f1,2025-06-04T22:15:24.567000
|
||||
CVE-2024-22049,0,0,a1b964cc03288247a11bfeed2ea96977953a2e2787b63c60f3d57d8bec564860,2025-06-03T15:15:56.780000
|
||||
CVE-2024-22050,0,0,e1cb308d379dc9b0fd0d21838c350f2334d03c72b5ac66c2e1a1d1fd634f4cfe,2024-11-21T08:55:27.833000
|
||||
CVE-2024-22051,0,0,f86dfde6e0319e1e548f64efe750a5e71365e897154e51ab6597eeb44aaac8b1,2025-04-17T19:15:59.030000
|
||||
@ -251970,7 +251970,7 @@ CVE-2024-22523,0,0,6e5964ba2742903a94d6ed6e7d813b2cb962e78d9d72ebf5a21537964e4c3
|
||||
CVE-2024-22524,0,0,8852239bf4d21781171a67a8f716aa5208e8958cf6064743f39cd80dce1ba0c9,2025-03-27T21:15:45.220000
|
||||
CVE-2024-22525,0,0,648e518c38d5bf43c132d3a4d8a8ea349898dca3d1c6692489faad9d15749e02,2025-03-18T16:15:20.850000
|
||||
CVE-2024-22526,0,0,be0cd17245feb37010512e9e801fc3cf88fa259a228b2653acad22a5e1382569,2024-11-21T08:56:24.543000
|
||||
CVE-2024-22529,0,1,6ff6964af6dcf37228963edad1e1a72d4daa6ec595720f814030f9445d7fd173,2025-06-04T22:15:24.783000
|
||||
CVE-2024-22529,0,0,6ff6964af6dcf37228963edad1e1a72d4daa6ec595720f814030f9445d7fd173,2025-06-04T22:15:24.783000
|
||||
CVE-2024-2253,0,0,fcaa54d611112bbef2bb576728350004bcfdf9fe077edec443da7f473b69b277,2024-11-21T09:09:21.307000
|
||||
CVE-2024-22532,0,0,5752a21af26f07df5f97f702cf28a5f0fbd30a7fc273fee426e54f038bc969a7,2025-05-13T14:43:59.507000
|
||||
CVE-2024-22533,0,0,5103c8569310cce602bdd9c2fb596174835a1b3141133217054fc95f31d140fe,2024-11-21T08:56:25.177000
|
||||
@ -252007,7 +252007,7 @@ CVE-2024-22603,0,0,5c9726a11a96b0648c53639b35fdd408a890f7fc7c068b8dcae9441c85f8a
|
||||
CVE-2024-2261,0,0,4f6d5c9fdf0e5875b684235a52067972acad631b950e5c276c5014b4f1a0e5a5,2024-11-21T09:09:22.330000
|
||||
CVE-2024-22611,0,0,1408179a9b253291f69ec012e22969387220732beab3b370615262825f963a34,2025-04-08T20:21:55.530000
|
||||
CVE-2024-2262,0,0,4b0d702c0b435d7f0967193f803419e305292927001551af4197667eb671c414,2025-05-13T01:01:40.560000
|
||||
CVE-2024-22625,0,1,f193a7b6e4ebba15f3033c92509ae76d36c1692494112207cec39a36bf84aa14,2025-06-04T22:15:24.970000
|
||||
CVE-2024-22625,0,0,f193a7b6e4ebba15f3033c92509ae76d36c1692494112207cec39a36bf84aa14,2025-06-04T22:15:24.970000
|
||||
CVE-2024-22626,0,0,d0c37d94f786790ae4c026c15eb8a9f611493ce750859e2975eeb20d428237e0,2025-06-04T21:15:37.340000
|
||||
CVE-2024-22627,0,0,5726bfed626589683cc6e1da539f71df08b7ebe00db4fda1992ba0cb4c8141c0,2024-11-21T08:56:29.890000
|
||||
CVE-2024-22628,0,0,3427ab69db61c12705a1e20c3b4be01cda6992c8ab181d0e7c2aef9a915fb930,2025-06-02T16:15:26.680000
|
||||
@ -252054,9 +252054,9 @@ CVE-2024-22721,0,0,d65e8b48a2b38e89fb21cd524e004ad80ee473c585bc71d76ab768f65ebe6
|
||||
CVE-2024-22722,0,0,b52b3ea4f13cfa5524c524b96d16ace3a07bc5602ec4988ddb0bfba4fde7c250,2025-04-08T15:20:57.363000
|
||||
CVE-2024-22723,0,0,590504d6ddbcfe59132e37aee995b9e0b4e9718bb7fbd1999a65e80b0cef714a,2025-01-21T18:31:46.820000
|
||||
CVE-2024-22724,0,0,3a01194172a7704aa0a2e9eba3a40f97fe0e459b77ede1bf851b722b6900375b,2024-11-21T08:56:35.627000
|
||||
CVE-2024-22725,0,1,ac8ec4b1a56ac431a0eb50b48f09c9776f0337d224ce501bbb2f0a8d435288fb,2025-06-04T22:15:25.180000
|
||||
CVE-2024-22725,0,0,ac8ec4b1a56ac431a0eb50b48f09c9776f0337d224ce501bbb2f0a8d435288fb,2025-06-04T22:15:25.180000
|
||||
CVE-2024-22727,0,0,bc17139817b54dbe557343f06cbe3841eb840d2294a7055da210550585fddca2,2024-12-03T17:15:09.237000
|
||||
CVE-2024-22729,0,1,ceac2812632cca63d8f89f0112e4f876ec0e99a153421e7592a09f58ba0b396c,2025-06-04T22:15:25.360000
|
||||
CVE-2024-22729,0,0,ceac2812632cca63d8f89f0112e4f876ec0e99a153421e7592a09f58ba0b396c,2025-06-04T22:15:25.360000
|
||||
CVE-2024-2273,0,0,1c91bfcd7e82ae682987d003db976887f29e3f7b70154699825cc6f5f51d7ac9,2025-02-07T02:17:45.397000
|
||||
CVE-2024-22733,0,0,213eb664d127485ccd0803000662ea0b5a537ebf3f8c7700bd5296349f3c1db1,2024-11-05T21:35:05.440000
|
||||
CVE-2024-22734,0,0,60776f0e696b1ee6fdd4f259358517f31522a475658948c172e66db38eff61b8,2024-11-21T08:56:36.573000
|
||||
@ -252130,7 +252130,7 @@ CVE-2024-2290,0,0,9d1c9ebac87a4153137b27026706ecff54dacd80661ace88cd79b9e6caec78
|
||||
CVE-2024-22900,0,0,a6cf4dccbb4086d0140c6a89c699c9a0b37cc44314234bc884861be28bedd9aa,2024-11-21T08:56:46.100000
|
||||
CVE-2024-22901,0,0,71749aee14b69c7b84be9dde95258014efea7717e6fd01e7957ac0e0f3516632,2025-05-15T20:15:43.720000
|
||||
CVE-2024-22902,0,0,e3b38c47e1cce014b3c968124b81a27e2695fde6783958e491b8641127c2af8d,2025-05-15T20:15:43.900000
|
||||
CVE-2024-22903,0,1,f03d3409124dee699a8824200879f5bb07df35f51b7ef94e62bbd5481e177047,2025-06-04T22:15:25.547000
|
||||
CVE-2024-22903,0,0,f03d3409124dee699a8824200879f5bb07df35f51b7ef94e62bbd5481e177047,2025-06-04T22:15:25.547000
|
||||
CVE-2024-22905,0,0,af861a89b31b1cd519cf02c39e78baf454e4f374e5027f26c4ee555cf353373b,2024-11-21T08:56:46.740000
|
||||
CVE-2024-2291,0,0,619d761e61f944fc6b549132505892b7a31cc16bd266518c53fa8681dacbbe93,2025-01-16T18:02:45.747000
|
||||
CVE-2024-22910,0,0,8c467bd6905f47328179bbf1d802932c88b496fc8de8231d42c1b81ba98e84e0,2024-12-04T17:15:12.300000
|
||||
@ -252144,7 +252144,7 @@ CVE-2024-22917,0,0,5dc97677d5637b8c93ae6363792ebfbbd65b3bd87e7df4c274e6739509ee8
|
||||
CVE-2024-22919,0,0,3b69e5a76accc2fa8472f8d4b7c2a0904d15d82b1439b99814e60f0b966d5433,2024-11-21T08:56:48.407000
|
||||
CVE-2024-2292,0,0,456ca10d707e4bab1681a8f348e451b4c7e5812faea70f8784757c6398afe5c2,2025-03-20T10:15:32.340000
|
||||
CVE-2024-22920,0,0,2cb66f94468eec9fedec18126fbe216bba0b632eb7a0d63f08f9dbf5b8974cf0,2024-11-21T08:56:48.570000
|
||||
CVE-2024-22922,0,1,5b54c415def3bf9eb39c85aa178ff01a006a91dfa9aa9128f69f1cbe40482745,2025-06-04T22:15:25.727000
|
||||
CVE-2024-22922,0,0,5b54c415def3bf9eb39c85aa178ff01a006a91dfa9aa9128f69f1cbe40482745,2025-06-04T22:15:25.727000
|
||||
CVE-2024-22923,0,0,651b9c7e612c9e2a2c9012908577263065029ca56ee59c54f109c47bc57b0929,2025-03-13T21:15:37.870000
|
||||
CVE-2024-22927,0,0,a4c12fc550d4c467dfccbded7ca7146a33953924ab3a53e155794cab02357b5b,2025-05-15T16:15:32.147000
|
||||
CVE-2024-2293,0,0,700e1fca060eef4c58290073679482a5324e031199ecfbd1ec6cabd10e14554f,2024-11-21T09:09:26.767000
|
||||
@ -282994,7 +282994,7 @@ CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b0120734
|
||||
CVE-2025-0835,0,0,86c0cb2e488afc89fa52f180613ab97692422d807ab06537e40f2f9f52bbe16f,2025-03-27T16:44:44.143000
|
||||
CVE-2025-0837,0,0,edb903a525c34e5db3f70de24ac0ad9bb2158867f6a7f92ca61239987715eef7,2025-02-24T17:08:29.033000
|
||||
CVE-2025-0838,0,0,a7c2e3cebe90652a13ab9c0fce8ddfe63f9e04122f1c18d2bd950ac62ad7c237,2025-04-05T16:15:33.450000
|
||||
CVE-2025-0839,0,1,31e1b673da3dde50cee5f52f890f71559114e46c9bddced572660671499f6e10,2025-06-04T22:26:13.510000
|
||||
CVE-2025-0839,0,0,31e1b673da3dde50cee5f52f890f71559114e46c9bddced572660671499f6e10,2025-06-04T22:26:13.510000
|
||||
CVE-2025-0840,0,0,ad52784c9689f7e5a12133bf5b8e57840dc23d31e5e9f25f1808977a060838b2,2025-03-04T15:08:47.770000
|
||||
CVE-2025-0841,0,0,b774fca3a24dc7d508cd784f030d5801ea9f63adf71e1a38a09a02a937c41b6d,2025-01-29T21:15:20.973000
|
||||
CVE-2025-0842,0,0,880989b2076d537c6bb018739fce330a49d894aec3d353193ef18e6fe884c71a,2025-02-25T19:45:04.700000
|
||||
@ -289667,7 +289667,7 @@ CVE-2025-2786,0,0,e956eb7658768af7a71ab8b6f13dbc2bb5f58d8f62cbc9c5c71f0b357f132e
|
||||
CVE-2025-27867,0,0,706ccc11683336c438698de97765a7b785ce156810f1f1b352bcbe344a4419e0,2025-03-21T21:15:36.910000
|
||||
CVE-2025-2787,0,0,4aa889cfcc070b06e1753e76a9737fc448b22e64e5347c5b1fb406395a105243,2025-03-31T07:15:18.557000
|
||||
CVE-2025-27888,0,0,8a8aa5b91d5bfb492ad148fbb9efc0a6effab4f3d802fb1b2e446246bda2ee28,2025-03-20T12:15:14.563000
|
||||
CVE-2025-2789,0,1,0458d69a20f098d274f8c2ac575883ae4eb7eb4e2d6beb3334215a1adfc0a949,2025-06-04T22:26:48.120000
|
||||
CVE-2025-2789,0,0,0458d69a20f098d274f8c2ac575883ae4eb7eb4e2d6beb3334215a1adfc0a949,2025-06-04T22:26:48.120000
|
||||
CVE-2025-27891,0,0,439ddd7d791141aa52566cacd75b73359e9608cde16a026bc9235df204569391,2025-05-19T14:15:23.157000
|
||||
CVE-2025-27892,0,0,27abb1742b36e0ac37dfd7f834b18eb854ffa3a65060c15d0a9a8760540e8205,2025-04-23T16:30:45.300000
|
||||
CVE-2025-27893,0,0,e84577b5fcdd778bbc1f7429e59a23dbdaffc7f181556a9020c20ce55649162f,2025-03-11T14:15:26.033000
|
||||
@ -289738,7 +289738,7 @@ CVE-2025-28055,0,0,ce78de505057aed6b1ad7ca0d3670c3be55f6f022d99c5a98028ac77810f0
|
||||
CVE-2025-28056,0,0,b4c5ed87181d52dc5e9bd019277d34161f11d988d640f052c8d45472fa8ab4cf,2025-05-14T14:15:28.580000
|
||||
CVE-2025-28057,0,0,631e6e6f013829d26e8d01802f279e396e4ee4a0af8a44f7acb3a0f54ba8ecf5,2025-05-14T15:15:57.120000
|
||||
CVE-2025-28059,0,0,0b528bcd391ca7d8898ab4bd4553bb61f607c8c85b3fa32f1b18963847081036,2025-04-22T15:16:10.627000
|
||||
CVE-2025-2806,0,1,6b6d32bab86f8065f4651aeecc3deaaa96ebe10ed3b688f80b2cc292ba9dad1d,2025-06-04T22:53:20.850000
|
||||
CVE-2025-2806,0,0,6b6d32bab86f8065f4651aeecc3deaaa96ebe10ed3b688f80b2cc292ba9dad1d,2025-06-04T22:53:20.850000
|
||||
CVE-2025-28062,0,0,e1db63ec886621518e90774c46d7bddd3542ce52896dfe84b18e1d20b7e3c53f,2025-05-13T20:15:27.343000
|
||||
CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000
|
||||
CVE-2025-28072,0,0,9d11ce673db5bded08078d90348ac835537e426481654f68c0b7843b05bb341e,2025-04-28T17:38:00.493000
|
||||
@ -289952,7 +289952,7 @@ CVE-2025-28916,0,0,d3414a3d6aa8011b44c8a028516f43a6a4fbe2fe98478e47a933c00af4ebd
|
||||
CVE-2025-28917,0,0,e67e97f24c984128f66143419f730643f0c93a942f9e07e45adf096399200416,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28918,0,0,fdafb0cadbdc8702c914c4b18f3da98b888fc45b917f3a8f53be26fb090f5d81,2025-03-11T21:15:49.477000
|
||||
CVE-2025-28919,0,0,e6672d722a11dcfca58aa36b7a671c1f514123681fc1ee91277ee2808176f84d,2025-03-11T21:15:49.623000
|
||||
CVE-2025-2892,0,1,d9be65baf93a73e6c931482069aa76ef192cedbd4d5773940c11522fea337d65,2025-06-04T23:03:24.370000
|
||||
CVE-2025-2892,0,0,d9be65baf93a73e6c931482069aa76ef192cedbd4d5773940c11522fea337d65,2025-06-04T23:03:24.370000
|
||||
CVE-2025-28920,0,0,1b39516a58e980ceafff6c35c5258f2defea2070ea7dcb67965a1cfa09291c9e,2025-03-11T21:15:49.780000
|
||||
CVE-2025-28921,0,0,b3b52a8f0a2431089fa08adb8a54ce8cd32f2c33bbe78ebb9f321e3e7fffa0a4,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28922,0,0,2a34783987ce2da8a6d7f97c25f9b57365e5fab3264e58b957c07ae86bb16f03,2025-03-11T21:15:49.930000
|
||||
@ -290942,7 +290942,7 @@ CVE-2025-30766,0,0,b959d5b90514fcda1f235f5f0cdc6456653b8a74c7a69faed76c642563713
|
||||
CVE-2025-30767,0,0,2cd416346be5e5c4eb60291951595fab2d1897d1a2a5870fcf71565e31b0348c,2025-03-27T16:45:27.850000
|
||||
CVE-2025-30768,0,0,327842b4665976903497c3474c4429ccb925ec9c8575b431a01ca46ec9cc40c0,2025-03-27T16:45:27.850000
|
||||
CVE-2025-30769,0,0,cce80edd1330c7e05e676ba6209c7d7c8b963a033a628fd98a1f094c897a18d9,2025-03-27T16:45:27.850000
|
||||
CVE-2025-3077,0,1,bb5d702f7d6f6593327abe562d0c45ff3689f7ec6121d7f1dcab2dc136c60d49,2025-06-04T22:38:13.343000
|
||||
CVE-2025-3077,0,0,bb5d702f7d6f6593327abe562d0c45ff3689f7ec6121d7f1dcab2dc136c60d49,2025-06-04T22:38:13.343000
|
||||
CVE-2025-30770,0,0,dab4ea9f83ab36dcead4f406120c8660a192dafbed11b3cf32455fb77181496c,2025-03-27T16:45:27.850000
|
||||
CVE-2025-30771,0,0,4bc7204c9348fe2621346e8eac40aa2932f849595d64cbefee5e299599efe9c6,2025-03-27T16:45:27.850000
|
||||
CVE-2025-30772,0,0,3ddd942d529dcad81069b9d4fc16adf3a7169a1e32d2feeb4eedd047e790943a,2025-03-27T16:45:27.850000
|
||||
@ -292552,7 +292552,7 @@ CVE-2025-32756,0,0,fbdc9b831e5deab8726af8a4df615176143d7b283387380b2941606ab0563
|
||||
CVE-2025-32757,0,0,c640364748c5c666fd6dc8aec9d84948af9deb15cd9711efe75ce6833fb0d8c1,2025-04-11T03:15:13.903000
|
||||
CVE-2025-32758,0,0,d3608f6f13a9a5b49230d2ebeae393f102196b87b92e834ebddf934752919dc3,2025-04-11T03:15:14.427000
|
||||
CVE-2025-32759,0,0,4ec2028500fce9598ebd65d94b8913a1d569360cd32f22b47c68102fcbfca47a,2025-04-11T03:15:14.477000
|
||||
CVE-2025-3276,0,1,8f771c953fb6fab03245f748108a734192e38ff42c324ec9c60c84cc4fb81fb7,2025-06-04T22:32:03.090000
|
||||
CVE-2025-3276,0,0,8f771c953fb6fab03245f748108a734192e38ff42c324ec9c60c84cc4fb81fb7,2025-06-04T22:32:03.090000
|
||||
CVE-2025-32760,0,0,b49616aee650d484034da17cd41c523e46d17a1af9bca82d77fef3f534ef6eb7,2025-04-11T03:15:14.530000
|
||||
CVE-2025-32761,0,0,177a1c1146899dbe2adee28b3395241103cc5f3e843fc2a57149473c7e8b0150,2025-04-11T03:15:14.583000
|
||||
CVE-2025-32762,0,0,d0d8b9a3f3412c3e1ec3920ce0a53310113d5e2867a9b430bee3e240824aae2c,2025-04-11T03:15:14.637000
|
||||
@ -292881,7 +292881,7 @@ CVE-2025-3413,0,0,e9ae6f9ee954dc0b39e2e9a8b6ad41f6cbd8628b2d84dff62138fbf7e2823b
|
||||
CVE-2025-3416,0,0,f396af91c8d0f14de681c7f1a705f462d53f2ce1b368dcafa39c832d359d947f,2025-04-09T20:02:41.860000
|
||||
CVE-2025-3417,0,0,e393b15114feb46d95f488ee34d16b125c38ee49e2798d5b216b189c39465cf9,2025-04-11T15:39:52.920000
|
||||
CVE-2025-3418,0,0,339c13b005a4f5030fbc9506024b1d7817e98dc63768ee98336e99fe36b19c7e,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3419,0,1,83686447659d1374debfbd584a9e75e08e8154b34b844ae39a181c0642efa458,2025-06-04T22:42:06.187000
|
||||
CVE-2025-3419,0,0,83686447659d1374debfbd584a9e75e08e8154b34b844ae39a181c0642efa458,2025-06-04T22:42:06.187000
|
||||
CVE-2025-3421,0,0,8b04ec1213d918fedbb313dff70ced37521ef6f28005f99da455f47fabed0221,2025-04-23T16:47:22.047000
|
||||
CVE-2025-3422,0,0,40c8ab93777a6577a6adcf219424be5e6b7b1fdd10df8411955a4a2d1e0f546a,2025-04-23T16:46:51.793000
|
||||
CVE-2025-3423,0,0,3fa8a09778f16c82b1e19ba21bd25b5abb35659f095b1243e7d4bba8cca3f5c2,2025-04-15T18:39:27.967000
|
||||
@ -292892,7 +292892,7 @@ CVE-2025-3427,0,0,60de0d2b8e5442f91f236a2edcb1916d069f3afe24a82799e57df8ca160012
|
||||
CVE-2025-3428,0,0,cca22a6d17d962d6a506d0c59b8aae3f3711140d89d3c131d3446ceef91483fb,2025-04-08T18:13:53.347000
|
||||
CVE-2025-3429,0,0,25313d6c76acd6c4506a535b56db39fbc0502345abde5d63fabddd580edbfc83,2025-04-08T18:13:53.347000
|
||||
CVE-2025-3430,0,0,4108de5de28ea6ad3b283f6b1b4e124b53de0d34b577f3df5c6e6463ccd23bef,2025-04-08T18:13:53.347000
|
||||
CVE-2025-3431,0,1,1b9739a94ae5b4074fbf4f49b44f280bcf9e73440745a031f3bc0447751b9048,2025-06-04T22:27:39.390000
|
||||
CVE-2025-3431,0,0,1b9739a94ae5b4074fbf4f49b44f280bcf9e73440745a031f3bc0447751b9048,2025-06-04T22:27:39.390000
|
||||
CVE-2025-3432,0,0,32b4909a605e3dc15d41b2069e1ead14c30bcbe2dfa78debc747a89be022e4ba,2025-04-08T18:13:53.347000
|
||||
CVE-2025-3433,0,0,46dd66c57af291abbb1b77326145823e13d716692eb68902a18c25a048a17397,2025-04-08T18:13:53.347000
|
||||
CVE-2025-3434,0,0,b8eaddf3b141c5d0cb4bc5eabf7fd897b349acdd6b9551b14d0e525f524ac410,2025-04-11T15:39:52.920000
|
||||
@ -292918,7 +292918,7 @@ CVE-2025-3457,0,0,1ce8b706c7f27acea549531081740896317ac6a97554394545c243bd2df931
|
||||
CVE-2025-3458,0,0,f4c08c655e5360e2158789a545b6b552e0aff82df287be3ab4de5c3123f29f32,2025-04-30T14:05:12.373000
|
||||
CVE-2025-3462,0,0,96a08229937a9712440a065f7abf8858b2712ba35f45d182986e12e301979bf4,2025-05-12T17:32:52.810000
|
||||
CVE-2025-3463,0,0,b9c293fc915bcaaa130da553f49fb5680a86dfb762948cd4b867acf35ebae4a2,2025-05-12T17:32:52.810000
|
||||
CVE-2025-3468,0,1,136950783d88ce0e5a3cbb5efc9cbb24284feffc83746ee503e38c1107465276,2025-06-04T22:54:54.960000
|
||||
CVE-2025-3468,0,0,136950783d88ce0e5a3cbb5efc9cbb24284feffc83746ee503e38c1107465276,2025-06-04T22:54:54.960000
|
||||
CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc139092,2025-04-11T15:39:52.920000
|
||||
CVE-2025-3470,0,0,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3471,0,0,7540bf9b66a7c3d2886148e18ad0354d6f76696c333def82e90f9e267caa6c25,2025-05-09T13:48:03.503000
|
||||
@ -293525,7 +293525,7 @@ CVE-2025-3858,0,0,b0c233abcc56a37a7e69c6c95b9ee650bfcc4486d10663c63fb9b139f7538a
|
||||
CVE-2025-3859,0,0,a29a57ac270a67a8a80d7a27d65d1908e1a6341184cc826f13ca8a179d89bf80,2025-05-12T19:43:47.097000
|
||||
CVE-2025-3860,0,0,fca8c022ec9b8f06256fbd6a7ef809d716eebdf10997075b00d5c8b65a08bd5e,2025-05-07T14:13:20.483000
|
||||
CVE-2025-3861,0,0,814eb53ad48b43f5db92e3f7ea50ed6f51b228179421c817444bf02a986a6f31,2025-04-29T13:52:28.490000
|
||||
CVE-2025-3862,0,1,d676afb0370748c9bc07d4c1748785041cfa500a37f539792fa3e468cbee2ce9,2025-06-04T22:57:04.867000
|
||||
CVE-2025-3862,0,0,d676afb0370748c9bc07d4c1748785041cfa500a37f539792fa3e468cbee2ce9,2025-06-04T22:57:04.867000
|
||||
CVE-2025-38637,0,0,8e0b7e01cf5cda931d029a9556a083a2937b1ed905193fce11df065c9e8763f0,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3864,0,0,444a554174f3a166bd8cf43652805e71b133026b842d6829548d5a78647f68f0,2025-05-28T15:01:30.720000
|
||||
CVE-2025-3866,0,0,0e2c2da6f7c5d300ded32bf87bd65ab48909f1dbdb45bd4cb4a0436c226bf428,2025-04-29T13:52:28.490000
|
||||
@ -294063,7 +294063,7 @@ CVE-2025-41235,0,0,d4d8945eb1b378e0ed66f8c1428c86eda4f61188221c7cba9d8ecf68b09b9
|
||||
CVE-2025-4124,0,0,2116d33601d18584d8ff86788e21befdf79ee067b30d9afca370ae97d0f6cb63,2025-05-16T16:56:49.807000
|
||||
CVE-2025-4125,0,0,9ce360e53c445df2b459e99f4cc1a32fbf05cb06f761d7887ca2ad1edf5cdba7,2025-05-16T16:56:47.173000
|
||||
CVE-2025-4126,0,0,c504eb8f9e35e66ea3a2e9e649e0b3ff59910e9bf49695680cf85ff18119f2ac,2025-05-16T14:43:26.160000
|
||||
CVE-2025-4127,0,1,440aeef33b0470c9ce2f9d93f454f227b230a85f1c418afc74834471a41511d6,2025-06-04T22:46:00.467000
|
||||
CVE-2025-4127,0,0,440aeef33b0470c9ce2f9d93f454f227b230a85f1c418afc74834471a41511d6,2025-06-04T22:46:00.467000
|
||||
CVE-2025-4131,0,0,e145db9bdcf5e54a3788ea8919212b2cfcdb96e29e639a2a6fca852d8fbe36f2,2025-05-02T13:52:51.693000
|
||||
CVE-2025-4132,0,0,e4809de586f057a9e14a37c05676b7015f221bfc82c94512bf23f0611070b256,2025-05-12T09:15:16.080000
|
||||
CVE-2025-4133,0,0,b2a95eff8202fe51f88bf1a8dd2a0ef2b05ae5a9078c05ea2d4b5ca75c534aa2,2025-05-23T15:55:02.040000
|
||||
@ -294158,11 +294158,11 @@ CVE-2025-4196,0,0,b26d9e2fad715e7681143157d22f4891b95826ce8e53977c9ecced30c124cc
|
||||
CVE-2025-4197,0,0,ed8ec740b973b92253a741cf6d5d0ac209bbd44763ac57f0fdc0af84aaf28e3c,2025-05-28T16:02:23.317000
|
||||
CVE-2025-4198,0,0,e5602874b7c5cc6f9012651f4a60dc8d2e789373501ddfec072de22c80a74167,2025-05-05T20:54:19.760000
|
||||
CVE-2025-4199,0,0,553c17b65a2b6efd623dda6e1567d529495701f64dcb6b078b725c7f2893112f,2025-05-05T20:54:19.760000
|
||||
CVE-2025-4204,0,1,2e611705c020858b2144a419577c11b9e07bf754b3f98b6b3360986c5bc7b1b4,2025-06-04T22:39:20.750000
|
||||
CVE-2025-4204,0,0,2e611705c020858b2144a419577c11b9e07bf754b3f98b6b3360986c5bc7b1b4,2025-06-04T22:39:20.750000
|
||||
CVE-2025-4205,0,0,e5c422efa7296a5f9776daa32028189294bed6a05affab60f37bd65665314bf9,2025-06-04T14:54:33.783000
|
||||
CVE-2025-4206,0,0,bb3cb9f07bfc9d08a2c0843d010f353ba8ba2d3caafa1bbc30e33b9667f14930,2025-05-12T17:32:32.760000
|
||||
CVE-2025-4207,0,0,98d1135f1a385487da30c39cd5b8b4714c39d026b29a623db1f9e974ad20dd9e,2025-05-12T17:32:52.810000
|
||||
CVE-2025-4208,0,1,82fe184fda5386aea933dabc21118a71717584c2e36933d6baf46d8403d3bcf6,2025-06-04T22:58:48.523000
|
||||
CVE-2025-4208,0,0,82fe184fda5386aea933dabc21118a71717584c2e36933d6baf46d8403d3bcf6,2025-06-04T22:58:48.523000
|
||||
CVE-2025-4209,0,0,36a8c6cfb46d682c1449a56da49264687cdf1563d3b3c671310631cd9bd8fa7b,2025-05-15T23:15:59.153000
|
||||
CVE-2025-4210,0,0,75198efe0de18159aec1a87785e7e16a89c8de06da580116a7e14d570aed6ee1,2025-05-05T20:54:19.760000
|
||||
CVE-2025-4211,0,0,404e0b904354aed3b5baa7e207d5cfca573f55dcef658a41b4b3c736c556ad3a,2025-05-16T14:42:18.700000
|
||||
@ -296045,7 +296045,8 @@ CVE-2025-4900,0,0,a63cc638a24f84eec22901c973a40410ae17057cc7bae6578e39029782b2ee
|
||||
CVE-2025-49000,0,0,f8cce1a2bdee8bde170fefa186e3e45152457ed27acc2f9d05d9f849c91c807b,2025-06-04T14:54:33.783000
|
||||
CVE-2025-49001,0,0,4a31bc7eedd1e5d52b5e6722483951b29d76bf7f2c5ca04ebe2191db078a4eb6,2025-06-04T14:54:33.783000
|
||||
CVE-2025-49002,0,0,77d53d5601ef324c2c2ee6afd2d7b9e91868404c589ddf809743a33d43e6beac,2025-06-04T14:54:33.783000
|
||||
CVE-2025-49007,1,1,d8df88ddb67d849e1e0f062e7015a01cc75e40595f763cd8d0df9b7eb17fb116,2025-06-04T23:15:21.540000
|
||||
CVE-2025-49007,0,0,d8df88ddb67d849e1e0f062e7015a01cc75e40595f763cd8d0df9b7eb17fb116,2025-06-04T23:15:21.540000
|
||||
CVE-2025-49008,1,1,eb8924429b342acd260a999943f95692571e898bde42ae81473e38a8d6fb55f9,2025-06-05T01:15:21.120000
|
||||
CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e8d,2025-05-21T13:40:20.293000
|
||||
CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000
|
||||
CVE-2025-4903,0,0,69886136439184589d2514a03e48b62487582f2c9800b08c9aef0c9095fac7f7,2025-05-27T16:29:52.787000
|
||||
@ -296510,12 +296511,20 @@ CVE-2025-5609,0,0,221ed73736ba323301784b21a6aad271091e1e6e49eb3598e648fe7283b522
|
||||
CVE-2025-5610,0,0,a21f58b42a9bebd695a8b0f29ac732e1dd9eef9b026e94240c4e3feb392d7a0c,2025-06-04T21:15:41.400000
|
||||
CVE-2025-5611,0,0,5a03bf69ccc6cde72d211521d6cb9c1db7d5852e8eeec404f2395283b4825c9e,2025-06-04T21:15:41.577000
|
||||
CVE-2025-5612,0,0,662f48922b84461054f0e674e0b75eedcdcdef5c39bbbd99def0e7f3be8dbcfe,2025-06-04T21:15:41.757000
|
||||
CVE-2025-5613,1,1,dfedfa1e82b5ef268fca67cf5c9cc0d0c8d02c83b92f2193e741173e73c2a501,2025-06-04T22:15:25.933000
|
||||
CVE-2025-5614,1,1,1c1eba1718226aa919d6d6e2bd8196a4e3ef45a61e9afbd1c16cd4c5467b640b,2025-06-04T22:15:26.117000
|
||||
CVE-2025-5615,1,1,dc7916902f5655793c579b60efcafab5518cd46b05ee929a1b8a74cc92eae9d1,2025-06-04T22:15:26.293000
|
||||
CVE-2025-5616,1,1,e57c673acf76501317500e25b8e695197beeb75abd4a8c9af0012f401b1f043c,2025-06-04T23:15:21.700000
|
||||
CVE-2025-5617,1,1,c2ca9b9bce4c954ad43886abe4c5fb4a9e5c58f4d86867a7825aafcbfde5ae50,2025-06-04T23:15:21.893000
|
||||
CVE-2025-5618,1,1,a7a90d65d4d601603b51715cbc1b60ecc93e72b8c3a8ad2e63ea4baab4da968c,2025-06-04T23:15:22.070000
|
||||
CVE-2025-5619,1,1,742861c858fa922645dd62e4603de475fdf3e6576e2376a69aaa09bea10dd1c6,2025-06-04T23:15:22.247000
|
||||
CVE-2025-5613,0,0,dfedfa1e82b5ef268fca67cf5c9cc0d0c8d02c83b92f2193e741173e73c2a501,2025-06-04T22:15:25.933000
|
||||
CVE-2025-5614,0,0,1c1eba1718226aa919d6d6e2bd8196a4e3ef45a61e9afbd1c16cd4c5467b640b,2025-06-04T22:15:26.117000
|
||||
CVE-2025-5615,0,0,dc7916902f5655793c579b60efcafab5518cd46b05ee929a1b8a74cc92eae9d1,2025-06-04T22:15:26.293000
|
||||
CVE-2025-5616,0,0,e57c673acf76501317500e25b8e695197beeb75abd4a8c9af0012f401b1f043c,2025-06-04T23:15:21.700000
|
||||
CVE-2025-5617,0,0,c2ca9b9bce4c954ad43886abe4c5fb4a9e5c58f4d86867a7825aafcbfde5ae50,2025-06-04T23:15:21.893000
|
||||
CVE-2025-5618,0,0,a7a90d65d4d601603b51715cbc1b60ecc93e72b8c3a8ad2e63ea4baab4da968c,2025-06-04T23:15:22.070000
|
||||
CVE-2025-5619,0,0,742861c858fa922645dd62e4603de475fdf3e6576e2376a69aaa09bea10dd1c6,2025-06-04T23:15:22.247000
|
||||
CVE-2025-5620,1,1,80899913bcc18ed22e905bbe7f9b64aae78c3e077a556397bcb8b6e02d95c7dc,2025-06-05T00:15:23.513000
|
||||
CVE-2025-5621,1,1,c1c9cea327facfc827fe20ea8a202cbd830c0d328222722078e3b5a99383aa07,2025-06-05T00:15:23.760000
|
||||
CVE-2025-5622,1,1,f18332f8dccfe073e39baa4010f39e52653c8c69df07dc612f8bb7d7854e6679,2025-06-05T00:15:23.947000
|
||||
CVE-2025-5623,1,1,906e892a332606a0d263245ce412d518175e42c940786ac82edabeeff7771341,2025-06-05T00:15:24.133000
|
||||
CVE-2025-5624,1,1,f0ea60a05c0e4c3bb800efb66cfd02a5e6d1164e0be224375a4b6b710a372139,2025-06-05T01:15:21.293000
|
||||
CVE-2025-5625,1,1,ac034517a7bebf234c901f6761d02b44aea4f24e086f7955457968381a53423d,2025-06-05T01:15:21.480000
|
||||
CVE-2025-5626,1,1,cc26bf9fa06ea09d31db99f558f5168fd86ae5721fbb0a7bfc9c379599167844,2025-06-05T01:15:21.663000
|
||||
CVE-2025-5627,1,1,ebbd25f3bb9aa5e91e9ee20f6262deb7d3ed8f50bba2c51c5e235e6bdbccc533,2025-06-05T01:15:21.850000
|
||||
CVE-2025-5688,0,0,73bb641229fc7f0cc58d056bcd50b9204b2df12fec290a20f6d3344d9742580f,2025-06-04T17:15:29.330000
|
||||
CVE-2025-5690,1,1,ac9502bdafeae675eb4593084c8644a2164e57d1b6a23446acd8173b20c2ef82,2025-06-04T22:15:26.470000
|
||||
CVE-2025-5690,0,0,ac9502bdafeae675eb4593084c8644a2164e57d1b6a23446acd8173b20c2ef82,2025-06-04T22:15:26.470000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user