mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2025-07-08T04:00:10.772413+00:00
This commit is contained in:
parent
91d994126e
commit
e2bdcb404a
33
CVE-2025/CVE-2025-206xx/CVE-2025-20680.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20680.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20680",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:26.423",
|
||||
"lastModified": "2025-07-08T03:15:26.423",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Bluetooth driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418044; Issue ID: MSV-3482."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20681.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20681.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20681",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:27.260",
|
||||
"lastModified": "2025-07-08T03:15:27.260",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416936; Issue ID: MSV-3446."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20682.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20682.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20682",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:27.407",
|
||||
"lastModified": "2025-07-08T03:15:27.407",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416937; Issue ID: MSV-3445."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20683.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20683.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20683",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:27.550",
|
||||
"lastModified": "2025-07-08T03:15:27.550",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416938; Issue ID: MSV-3444."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20684.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20684.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20684",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:27.690",
|
||||
"lastModified": "2025-07-08T03:15:27.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416939; Issue ID: MSV-3422."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20685.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20685.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20685",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:27.833",
|
||||
"lastModified": "2025-07-08T03:15:27.833",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416226; Issue ID: MSV-3409."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20686.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20686.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20686",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:27.987",
|
||||
"lastModified": "2025-07-08T03:15:27.987",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00415570; Issue ID: MSV-3404."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20687.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20687.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20687",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:28.143",
|
||||
"lastModified": "2025-07-08T03:15:28.143",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Bluetooth driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418045; Issue ID: MSV-3481."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20688.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20688.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20688",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:28.350",
|
||||
"lastModified": "2025-07-08T03:15:28.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418047; Issue ID: MSV-3480."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20689.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20689.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20689",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:28.503",
|
||||
"lastModified": "2025-07-08T03:15:28.503",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418048; Issue ID: MSV-3479."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20690.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20690.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20690",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:28.653",
|
||||
"lastModified": "2025-07-08T03:15:28.653",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418038; Issue ID: MSV-3478."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20691.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20691.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20691",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:28.807",
|
||||
"lastModified": "2025-07-08T03:15:28.807",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418039; Issue ID: MSV-3477."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20692.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20692.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20692",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:28.950",
|
||||
"lastModified": "2025-07-08T03:15:28.950",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418040; Issue ID: MSV-3476."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20693.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20693.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20693",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:29.100",
|
||||
"lastModified": "2025-07-08T03:15:29.100",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan STA driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09812521; Issue ID: MSV-3421."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20694.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20694.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20694",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:29.250",
|
||||
"lastModified": "2025-07-08T03:15:29.250",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Bluetooth FW, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09752821; Issue ID: MSV-3342."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-124"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-206xx/CVE-2025-20695.json
Normal file
33
CVE-2025/CVE-2025-206xx/CVE-2025-20695.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-20695",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2025-07-08T03:15:29.433",
|
||||
"lastModified": "2025-07-08T03:15:29.433",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Bluetooth FW, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09741871; Issue ID: MSV-3317."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-124"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/July-2025",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2025/CVE-2025-536xx/CVE-2025-53610.json
Normal file
16
CVE-2025/CVE-2025-536xx/CVE-2025-53610.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-53610",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-07-08T03:15:29.617",
|
||||
"lastModified": "2025-07-08T03:15:29.617",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-536xx/CVE-2025-53611.json
Normal file
16
CVE-2025/CVE-2025-536xx/CVE-2025-53611.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-53611",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-07-08T03:15:29.727",
|
||||
"lastModified": "2025-07-08T03:15:29.727",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-536xx/CVE-2025-53612.json
Normal file
16
CVE-2025/CVE-2025-536xx/CVE-2025-53612.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-53612",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-07-08T03:15:29.810",
|
||||
"lastModified": "2025-07-08T03:15:29.810",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-536xx/CVE-2025-53613.json
Normal file
16
CVE-2025/CVE-2025-536xx/CVE-2025-53613.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-53613",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-07-08T03:15:29.913",
|
||||
"lastModified": "2025-07-08T03:15:29.913",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-536xx/CVE-2025-53614.json
Normal file
16
CVE-2025/CVE-2025-536xx/CVE-2025-53614.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-53614",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-07-08T03:15:30.007",
|
||||
"lastModified": "2025-07-08T03:15:30.007",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-536xx/CVE-2025-53615.json
Normal file
16
CVE-2025/CVE-2025-536xx/CVE-2025-53615.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-53615",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-07-08T03:15:30.117",
|
||||
"lastModified": "2025-07-08T03:15:30.117",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-536xx/CVE-2025-53616.json
Normal file
16
CVE-2025/CVE-2025-536xx/CVE-2025-53616.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-53616",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-07-08T03:15:30.240",
|
||||
"lastModified": "2025-07-08T03:15:30.240",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-536xx/CVE-2025-53617.json
Normal file
16
CVE-2025/CVE-2025-536xx/CVE-2025-53617.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-53617",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-07-08T03:15:30.337",
|
||||
"lastModified": "2025-07-08T03:15:30.337",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
60
CVE-2025/CVE-2025-55xx/CVE-2025-5570.json
Normal file
60
CVE-2025/CVE-2025-55xx/CVE-2025-5570.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-5570",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-07-08T03:15:30.423",
|
||||
"lastModified": "2025-07-08T03:15:30.423",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The AI Engine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the mwai_chatbot shortcode 'id' parameter in all versions up to, and including, 2.8.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ai-engine/tags/2.8.2/classes/modules/chatbot.php#L617",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a32dcf96-ec75-46b1-8f1d-608411ad5147?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-6032",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-06-24T14:15:30.703",
|
||||
"lastModified": "2025-07-02T08:15:57.507",
|
||||
"lastModified": "2025-07-08T03:15:30.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,18 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:10549",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:10550",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:10551",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:9726",
|
||||
"source": "secalert@redhat.com"
|
||||
|
60
CVE-2025/CVE-2025-62xx/CVE-2025-6244.json
Normal file
60
CVE-2025/CVE-2025-62xx/CVE-2025-6244.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-6244",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-07-08T03:15:30.947",
|
||||
"lastModified": "2025-07-08T03:15:30.947",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Essential Addons for Elementor \u2013 Popular Elementor Templates and Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the via `Calendar` And `Business Reviews` Widgets attributes in all versions up to, and including, 6.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3318211/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/847a4fc7-3580-421e-8045-41b5a85f2d97?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
104
CVE-2025/CVE-2025-71xx/CVE-2025-7146.json
Normal file
104
CVE-2025/CVE-2025-71xx/CVE-2025-7146.json
Normal file
@ -0,0 +1,104 @@
|
||||
{
|
||||
"id": "CVE-2025-7146",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2025-07-08T02:15:22.367",
|
||||
"lastModified": "2025-07-08T02:15:22.367",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The iPublish System developed by Jhenggao has an Arbitrary File Reading vulnerability, allowing unauthenticated remote attackers to read arbitrary system file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-23"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-10234-38665-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-10233-45fc8-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-71xx/CVE-2025-7156.json
Normal file
141
CVE-2025/CVE-2025-71xx/CVE-2025-7156.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-7156",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-07-08T02:15:22.580",
|
||||
"lastModified": "2025-07-08T02:15:22.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in hitsz-ids airda 0.0.3 and classified as critical. This vulnerability affects the function execute of the file /v1/chat/completions. The manipulation of the argument question leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.315094",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.315094",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.606352",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cnblogs.com/aibot/p/18956966",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-71xx/CVE-2025-7157.json
Normal file
145
CVE-2025/CVE-2025-71xx/CVE-2025-7157.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-7157",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-07-08T03:15:31.123",
|
||||
"lastModified": "2025-07-08T03:15:31.123",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Online Note Sharing 1.0. It has been classified as critical. Affected is an unknown function of the file /login.php. The manipulation of the argument username/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yihaofuweng/cve/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.315096",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.315096",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.606355",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-71xx/CVE-2025-7158.json
Normal file
145
CVE-2025/CVE-2025-71xx/CVE-2025-7158.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-7158",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-07-08T03:15:31.373",
|
||||
"lastModified": "2025-07-08T03:15:31.373",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHPGurukul Zoo Management System 2.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/manage-normal-ticket.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/101",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.315097",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.315097",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.606365",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-71xx/CVE-2025-7159.json
Normal file
145
CVE-2025/CVE-2025-71xx/CVE-2025-7159.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-7159",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-07-08T03:15:31.590",
|
||||
"lastModified": "2025-07-08T03:15:31.590",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHPGurukul Zoo Management System 2.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/manage-animals.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/102",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.315098",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.315098",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.606366",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
63
README.md
63
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-07-08T02:00:11.860634+00:00
|
||||
2025-07-08T04:00:10.772413+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-07-08T01:15:26.400000+00:00
|
||||
2025-07-08T03:15:31.590000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,48 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
300738
|
||||
300769
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `31`
|
||||
|
||||
- [CVE-2025-42961](CVE-2025/CVE-2025-429xx/CVE-2025-42961.json) (`2025-07-08T01:15:22.783`)
|
||||
- [CVE-2025-42962](CVE-2025/CVE-2025-429xx/CVE-2025-42962.json) (`2025-07-08T01:15:22.937`)
|
||||
- [CVE-2025-42963](CVE-2025/CVE-2025-429xx/CVE-2025-42963.json) (`2025-07-08T01:15:23.093`)
|
||||
- [CVE-2025-42964](CVE-2025/CVE-2025-429xx/CVE-2025-42964.json) (`2025-07-08T01:15:23.240`)
|
||||
- [CVE-2025-42965](CVE-2025/CVE-2025-429xx/CVE-2025-42965.json) (`2025-07-08T01:15:23.440`)
|
||||
- [CVE-2025-42966](CVE-2025/CVE-2025-429xx/CVE-2025-42966.json) (`2025-07-08T01:15:23.630`)
|
||||
- [CVE-2025-42967](CVE-2025/CVE-2025-429xx/CVE-2025-42967.json) (`2025-07-08T01:15:23.787`)
|
||||
- [CVE-2025-42968](CVE-2025/CVE-2025-429xx/CVE-2025-42968.json) (`2025-07-08T01:15:23.950`)
|
||||
- [CVE-2025-42969](CVE-2025/CVE-2025-429xx/CVE-2025-42969.json) (`2025-07-08T01:15:24.120`)
|
||||
- [CVE-2025-42970](CVE-2025/CVE-2025-429xx/CVE-2025-42970.json) (`2025-07-08T01:15:24.290`)
|
||||
- [CVE-2025-42971](CVE-2025/CVE-2025-429xx/CVE-2025-42971.json) (`2025-07-08T01:15:24.463`)
|
||||
- [CVE-2025-42973](CVE-2025/CVE-2025-429xx/CVE-2025-42973.json) (`2025-07-08T01:15:24.623`)
|
||||
- [CVE-2025-42974](CVE-2025/CVE-2025-429xx/CVE-2025-42974.json) (`2025-07-08T01:15:24.773`)
|
||||
- [CVE-2025-42978](CVE-2025/CVE-2025-429xx/CVE-2025-42978.json) (`2025-07-08T01:15:24.930`)
|
||||
- [CVE-2025-42979](CVE-2025/CVE-2025-429xx/CVE-2025-42979.json) (`2025-07-08T01:15:25.107`)
|
||||
- [CVE-2025-42980](CVE-2025/CVE-2025-429xx/CVE-2025-42980.json) (`2025-07-08T01:15:25.270`)
|
||||
- [CVE-2025-42981](CVE-2025/CVE-2025-429xx/CVE-2025-42981.json) (`2025-07-08T01:15:25.427`)
|
||||
- [CVE-2025-42985](CVE-2025/CVE-2025-429xx/CVE-2025-42985.json) (`2025-07-08T01:15:25.577`)
|
||||
- [CVE-2025-42986](CVE-2025/CVE-2025-429xx/CVE-2025-42986.json) (`2025-07-08T01:15:25.730`)
|
||||
- [CVE-2025-42992](CVE-2025/CVE-2025-429xx/CVE-2025-42992.json) (`2025-07-08T01:15:25.887`)
|
||||
- [CVE-2025-43001](CVE-2025/CVE-2025-430xx/CVE-2025-43001.json) (`2025-07-08T01:15:26.047`)
|
||||
- [CVE-2025-7152](CVE-2025/CVE-2025-71xx/CVE-2025-7152.json) (`2025-07-08T00:15:22.443`)
|
||||
- [CVE-2025-7153](CVE-2025/CVE-2025-71xx/CVE-2025-7153.json) (`2025-07-08T00:15:23.237`)
|
||||
- [CVE-2025-7154](CVE-2025/CVE-2025-71xx/CVE-2025-7154.json) (`2025-07-08T01:15:26.200`)
|
||||
- [CVE-2025-7155](CVE-2025/CVE-2025-71xx/CVE-2025-7155.json) (`2025-07-08T01:15:26.400`)
|
||||
- [CVE-2025-20686](CVE-2025/CVE-2025-206xx/CVE-2025-20686.json) (`2025-07-08T03:15:27.987`)
|
||||
- [CVE-2025-20687](CVE-2025/CVE-2025-206xx/CVE-2025-20687.json) (`2025-07-08T03:15:28.143`)
|
||||
- [CVE-2025-20688](CVE-2025/CVE-2025-206xx/CVE-2025-20688.json) (`2025-07-08T03:15:28.350`)
|
||||
- [CVE-2025-20689](CVE-2025/CVE-2025-206xx/CVE-2025-20689.json) (`2025-07-08T03:15:28.503`)
|
||||
- [CVE-2025-20690](CVE-2025/CVE-2025-206xx/CVE-2025-20690.json) (`2025-07-08T03:15:28.653`)
|
||||
- [CVE-2025-20691](CVE-2025/CVE-2025-206xx/CVE-2025-20691.json) (`2025-07-08T03:15:28.807`)
|
||||
- [CVE-2025-20692](CVE-2025/CVE-2025-206xx/CVE-2025-20692.json) (`2025-07-08T03:15:28.950`)
|
||||
- [CVE-2025-20693](CVE-2025/CVE-2025-206xx/CVE-2025-20693.json) (`2025-07-08T03:15:29.100`)
|
||||
- [CVE-2025-20694](CVE-2025/CVE-2025-206xx/CVE-2025-20694.json) (`2025-07-08T03:15:29.250`)
|
||||
- [CVE-2025-20695](CVE-2025/CVE-2025-206xx/CVE-2025-20695.json) (`2025-07-08T03:15:29.433`)
|
||||
- [CVE-2025-53610](CVE-2025/CVE-2025-536xx/CVE-2025-53610.json) (`2025-07-08T03:15:29.617`)
|
||||
- [CVE-2025-53611](CVE-2025/CVE-2025-536xx/CVE-2025-53611.json) (`2025-07-08T03:15:29.727`)
|
||||
- [CVE-2025-53612](CVE-2025/CVE-2025-536xx/CVE-2025-53612.json) (`2025-07-08T03:15:29.810`)
|
||||
- [CVE-2025-53613](CVE-2025/CVE-2025-536xx/CVE-2025-53613.json) (`2025-07-08T03:15:29.913`)
|
||||
- [CVE-2025-53614](CVE-2025/CVE-2025-536xx/CVE-2025-53614.json) (`2025-07-08T03:15:30.007`)
|
||||
- [CVE-2025-53615](CVE-2025/CVE-2025-536xx/CVE-2025-53615.json) (`2025-07-08T03:15:30.117`)
|
||||
- [CVE-2025-53616](CVE-2025/CVE-2025-536xx/CVE-2025-53616.json) (`2025-07-08T03:15:30.240`)
|
||||
- [CVE-2025-53617](CVE-2025/CVE-2025-536xx/CVE-2025-53617.json) (`2025-07-08T03:15:30.337`)
|
||||
- [CVE-2025-5570](CVE-2025/CVE-2025-55xx/CVE-2025-5570.json) (`2025-07-08T03:15:30.423`)
|
||||
- [CVE-2025-6244](CVE-2025/CVE-2025-62xx/CVE-2025-6244.json) (`2025-07-08T03:15:30.947`)
|
||||
- [CVE-2025-7146](CVE-2025/CVE-2025-71xx/CVE-2025-7146.json) (`2025-07-08T02:15:22.367`)
|
||||
- [CVE-2025-7156](CVE-2025/CVE-2025-71xx/CVE-2025-7156.json) (`2025-07-08T02:15:22.580`)
|
||||
- [CVE-2025-7157](CVE-2025/CVE-2025-71xx/CVE-2025-7157.json) (`2025-07-08T03:15:31.123`)
|
||||
- [CVE-2025-7158](CVE-2025/CVE-2025-71xx/CVE-2025-7158.json) (`2025-07-08T03:15:31.373`)
|
||||
- [CVE-2025-7159](CVE-2025/CVE-2025-71xx/CVE-2025-7159.json) (`2025-07-08T03:15:31.590`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2014-3931](CVE-2014/CVE-2014-39xx/CVE-2014-3931.json) (`2025-07-08T01:00:02.203`)
|
||||
- [CVE-2016-10033](CVE-2016/CVE-2016-100xx/CVE-2016-10033.json) (`2025-07-08T01:00:02.203`)
|
||||
- [CVE-2019-5418](CVE-2019/CVE-2019-54xx/CVE-2019-5418.json) (`2025-07-08T01:00:02.203`)
|
||||
- [CVE-2019-9621](CVE-2019/CVE-2019-96xx/CVE-2019-9621.json) (`2025-07-08T01:00:02.203`)
|
||||
- [CVE-2025-6032](CVE-2025/CVE-2025-60xx/CVE-2025-6032.json) (`2025-07-08T03:15:30.727`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
103
_state.csv
103
_state.csv
@ -68077,7 +68077,7 @@ CVE-2014-3927,0,0,86f636600b41c5e01ae9967b39f677a51a2614708364a31a10d26e1eca205a
|
||||
CVE-2014-3928,0,0,903fe252a26598e26721b5e748691d6e637f528bf5e422b456648cde071378fc,2025-04-20T01:37:25.860000
|
||||
CVE-2014-3929,0,0,a04e609ecad2281abeae888f29ace5eb02089955860b530f0f5076208b03f57c,2025-04-20T01:37:25.860000
|
||||
CVE-2014-3930,0,0,a98d9d9f1bbc1b58fcae623f751d2a962630568247ddb3bca8772d4427b3bca7,2025-04-20T01:37:25.860000
|
||||
CVE-2014-3931,0,1,628d07f0c1c56b2cc5a6ff2040e4011b02801df70e31b448ea860c0f2309565f,2025-07-08T01:00:02.203000
|
||||
CVE-2014-3931,0,0,628d07f0c1c56b2cc5a6ff2040e4011b02801df70e31b448ea860c0f2309565f,2025-07-08T01:00:02.203000
|
||||
CVE-2014-3932,0,0,ec39df121430fdf6f013310dfb615cec4434a46af1eee3651caae1ec3608387f,2025-04-12T10:46:40.837000
|
||||
CVE-2014-3933,0,0,7629fc2ce8142d295259c168213a9f8a3f509951c17abd0ff5932ddf5a1bdab8,2025-04-12T10:46:40.837000
|
||||
CVE-2014-3934,0,0,def88b2e92d8f646c21582f774bcc5bc7fd2f8fe2ce4066cdc5029d389b5b5be,2025-04-12T10:46:40.837000
|
||||
@ -83370,7 +83370,7 @@ CVE-2016-10029,0,0,982b531edcf8cdd93554ea1fb21fb6f57d44ee3b5c10cc1164cc6767eac73
|
||||
CVE-2016-1003,0,0,46f4e8b9f3f1587cc78f0e4731fc46641c247866f4b72789f875d8e0fe9630d3,2023-11-07T02:29:50.493000
|
||||
CVE-2016-10030,0,0,48644b453420d45898b778f35cf7709150aa36ac2e0fc075871d929b762614ba,2025-04-12T10:46:40.837000
|
||||
CVE-2016-10031,0,0,499234c3922a7ad8a4fa0e055a5f42b6648f3167133f5b84c539fdb775e59d66,2025-04-12T10:46:40.837000
|
||||
CVE-2016-10033,0,1,7b3a3e63d01eee64e8977e4bfcd78a186b1a3712c95acfaf66e32aa1e3c6a0bc,2025-07-08T01:00:02.203000
|
||||
CVE-2016-10033,0,0,7b3a3e63d01eee64e8977e4bfcd78a186b1a3712c95acfaf66e32aa1e3c6a0bc,2025-07-08T01:00:02.203000
|
||||
CVE-2016-10034,0,0,4b4e8dfb9cf57831c04fd52dbf89ae45182ae1bd15cfad3c3cfeba8de274476e,2025-04-12T10:46:40.837000
|
||||
CVE-2016-10036,0,0,ff09b000fa6dd15cb7c2846e0b66629a237528e8defb152934ba992b988032f2,2024-11-21T02:43:07.953000
|
||||
CVE-2016-10037,0,0,adcdda088e2432a6585e17a419dd984b0727cab2390a62345c5125065180e123,2025-04-12T10:46:40.837000
|
||||
@ -140663,7 +140663,7 @@ CVE-2019-5414,0,0,0b6e623da7fa05cc02c9d4ae273975a56909dde7118ce987ea3ad6d32acc92
|
||||
CVE-2019-5415,0,0,1e91a7c37cbce12d8b7111c2c34f6147cf14cd1ced6bddf7c149d21750872544,2024-11-21T04:44:53.557000
|
||||
CVE-2019-5416,0,0,b100879971280c379ffe8a500bc78a0ea0baf7b8f5be094c6a408a9a239580ef,2024-11-21T04:44:53.667000
|
||||
CVE-2019-5417,0,0,d98c5f7add52766fc7c3e142426b4ba800ad9d35719d2543c1e890dd9b2efb27,2024-11-21T04:44:53.777000
|
||||
CVE-2019-5418,0,1,0ca62e2a1a1492d82f32aebdb56b377303eb90309149976f1dcdcac5aea3164a,2025-07-08T01:00:02.203000
|
||||
CVE-2019-5418,0,0,0ca62e2a1a1492d82f32aebdb56b377303eb90309149976f1dcdcac5aea3164a,2025-07-08T01:00:02.203000
|
||||
CVE-2019-5419,0,0,2ac65527707212d60b559b1ed0c37c5ef3373d700a556d668634c4b4b1fe2523,2024-11-21T04:44:54.017000
|
||||
CVE-2019-5420,0,0,f19b3724aa167883e4e4e56b2c5c938fcb345d2d81dc9479f43ac2289ffe0ce0,2024-11-21T04:44:54.150000
|
||||
CVE-2019-5421,0,0,a858970ade7d911d7af83b8bcbd0976bda524681608de710f41e0feb41cc2376,2024-11-21T04:44:54.277000
|
||||
@ -144022,7 +144022,7 @@ CVE-2019-9616,0,0,a66344f9c3f4cda343b0f89c1932c7c323618ca0c5677bd95ae90978bdd96c
|
||||
CVE-2019-9617,0,0,b95d192402e6296f016c4d751164ca3cf0686290005bd89d09ee11437643981c,2024-11-21T04:51:58.763000
|
||||
CVE-2019-9618,0,0,dfc826e406483085c59aa198a8cd6c3ac0f507e9de2603141a59077d821c0bc0,2024-11-21T04:51:58.900000
|
||||
CVE-2019-9619,0,0,529d01e46fda23f944ae56887b327d92043af68907cc5438f833b6270706b398,2023-11-07T03:13:44.243000
|
||||
CVE-2019-9621,0,1,621e1d19c00a9e4cebb683612101386bde7ef8775dd41e0b53b56795c1ba5f31,2025-07-08T01:00:02.203000
|
||||
CVE-2019-9621,0,0,621e1d19c00a9e4cebb683612101386bde7ef8775dd41e0b53b56795c1ba5f31,2025-07-08T01:00:02.203000
|
||||
CVE-2019-9622,0,0,a5313a359c697e81fe3f797489d45a2f1b7097f6e6cea15017862e84fe5fee4d,2024-11-21T04:51:59.223000
|
||||
CVE-2019-9623,0,0,3c5698b655752a654204af8c8ad0713732eb40f37e01a957d6775d041ae21380,2024-11-21T04:51:59.367000
|
||||
CVE-2019-9624,0,0,cea2615715668acccc818448dcb48e3ad579d43c3e890307bbe45eb64b410d05,2024-11-21T04:51:59.507000
|
||||
@ -284826,7 +284826,23 @@ CVE-2025-20676,0,0,6ffa62b39c924bd91e9970f05d2047c0093e00eff6344a8042d1538b148b1
|
||||
CVE-2025-20677,0,0,361a457eff90f26ccd673ab8175f2254dd335c177659182e175423ee667fba79,2025-06-03T18:15:24.633000
|
||||
CVE-2025-20678,0,0,4eba7220663cf1a323051976c87005046899f50b2e0b9319a8560eb4c82ecc09,2025-06-02T17:32:17.397000
|
||||
CVE-2025-2068,0,0,caea7b6972516a21e1fb4cb2f8db6e455533cd0aab201f39e697eeb619aa0bfd,2025-04-29T13:52:28.490000
|
||||
CVE-2025-20680,1,1,af8a0b5f8f03ed5a2f5de13e2c519ae6c77bf4f4aaa87f9bc98159879a328feb,2025-07-08T03:15:26.423000
|
||||
CVE-2025-20681,1,1,7594ebad7b7359d24de8a23fa7541dbff7a4cf3a3c1e49dd5330c19b782b3d9e,2025-07-08T03:15:27.260000
|
||||
CVE-2025-20682,1,1,4b69e5425517559b1beb51834b9ee76441edc719bc4ee1396f9848e71eb212f2,2025-07-08T03:15:27.407000
|
||||
CVE-2025-20683,1,1,9a9b9674417f2f91ab30ae5dd2805f5fc6164e1229d67c7c3426c8efe3be3e84,2025-07-08T03:15:27.550000
|
||||
CVE-2025-20684,1,1,0fa97884ee2ad1f3eb122e6ee8b5207851284fa340529389c4cdec1201b77d83,2025-07-08T03:15:27.690000
|
||||
CVE-2025-20685,1,1,2a915cf6088c75f058712907edb2831dab35a45b8474502bf6bac7a9dd0928c4,2025-07-08T03:15:27.833000
|
||||
CVE-2025-20686,1,1,aed6eff96e662130089b9d0adaff6a7759ec6a49178c8a24f522e9ec62b0cf62,2025-07-08T03:15:27.987000
|
||||
CVE-2025-20687,1,1,3b373e2bd808b3e7732df6b725abb80bea0db42f74adca01670d3c83d5d5c9fc,2025-07-08T03:15:28.143000
|
||||
CVE-2025-20688,1,1,cf137b5a7eb6c1d923c526c7ea0b646dacd66008c873407035d566f5a60fc08b,2025-07-08T03:15:28.350000
|
||||
CVE-2025-20689,1,1,0f50a3ab765f0f4eecac6b716ab4a0dbf59c8bbd9853a4d482bf807fdf0813a8,2025-07-08T03:15:28.503000
|
||||
CVE-2025-2069,0,0,3be67bf54f8ec61314fa1aeec7cad10107ab60b66fe6d57dfc7b2068092e5954,2025-04-29T13:52:28.490000
|
||||
CVE-2025-20690,1,1,43dd2fbd89c284e7500283bb9f60939532861dfcf0337ebe4f25146c3cff23d8,2025-07-08T03:15:28.653000
|
||||
CVE-2025-20691,1,1,b33b408b319c412ca684c6f5d7374cf9976c5af8b57b3992317a41bbc4039120,2025-07-08T03:15:28.807000
|
||||
CVE-2025-20692,1,1,e4b0b083e98bd13ee17d0fa70355eb35ebf9026ae40205cd0cb6ff608fb9d0b2,2025-07-08T03:15:28.950000
|
||||
CVE-2025-20693,1,1,71ed0f04f93379c99f8830f622f25680ce7128d08e58fd772391e1a6351072ab,2025-07-08T03:15:29.100000
|
||||
CVE-2025-20694,1,1,a77d6d7f6bcac2a8dcbbb7f25ac1ce9d5b8ac6fbc49b2b8f38d860b82c0a39f4,2025-07-08T03:15:29.250000
|
||||
CVE-2025-20695,1,1,7779e0cd59eab3d08abd061a93fd36d2611eb1c7d65794528df3df7d40543de5,2025-07-08T03:15:29.433000
|
||||
CVE-2025-2070,0,0,aa6c57d00653559715f3617271164e399083db51bc42952895ad83bcf08a7d15,2025-04-29T13:52:28.490000
|
||||
CVE-2025-2071,0,0,f72741a6a8cd10ef9b626183eff7ab8b6e66837ba6759a6a57e284a984d113e1,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2072,0,0,8e644488e83c18f58cc5036e9fa9ebc749bbf6017963c3bc2cbe7baae1385ee2,2025-04-01T20:26:30.593000
|
||||
@ -292332,7 +292348,7 @@ CVE-2025-3130,0,0,3331839c90977481f0952c53c01c561e7ce3f9a4b6241dc2a679ea92329653
|
||||
CVE-2025-3131,0,0,22058460edb80eeb28e47627ce19a90708c04371cfdf5beafe6e1efa2f6db14c,2025-04-22T16:16:30.543000
|
||||
CVE-2025-31324,0,0,f022551eb03f972b51d5adf3fa8b8bd88e48c383f69788d6260b2cb6e8237e8d,2025-05-06T20:59:33.773000
|
||||
CVE-2025-31325,0,0,550c7b1d47a5a5766f5606913daeeb0e6f07a070553574431b9e6eac29d0e505,2025-06-12T16:06:39.330000
|
||||
CVE-2025-31326,1,1,97747191f9d7ecb4e551a0c0d26b8a5797d5787be7e35a1195ff20aa4c1d858d,2025-07-08T01:15:21.810000
|
||||
CVE-2025-31326,0,0,97747191f9d7ecb4e551a0c0d26b8a5797d5787be7e35a1195ff20aa4c1d858d,2025-07-08T01:15:21.810000
|
||||
CVE-2025-31327,0,0,32f90adc396c5de5b649e8fa5cbb5b70c97a786ce6ce173df87cdac30806552e,2025-04-23T14:08:13.383000
|
||||
CVE-2025-31328,0,0,7562727b37bc696206e3437191848ea7fd9fb71483caff96e2687c6513ba8732,2025-04-23T14:08:13.383000
|
||||
CVE-2025-31329,0,0,1fc101be6dd06c49bba529860427b1b9723c1206bb0b29e1d558e09c6f01e194,2025-05-13T19:35:25.503000
|
||||
@ -295810,43 +295826,43 @@ CVE-2025-4291,0,0,3c966d095e0027ee25fc69633f95e30252d911138428dd59f98b42d5972922
|
||||
CVE-2025-4292,0,0,3b0e06bfdd97a17ba7f68946a85abe7ce662b331b5db371d423d8c2c22e38a38,2025-06-17T20:17:44
|
||||
CVE-2025-42921,0,0,fe45c9bf48d8b64b0cac9604dcc1ad3071452dfd7112cafe12dd9c33c82af017,2025-04-23T15:25:30.927000
|
||||
CVE-2025-4293,0,0,3e0fba3b11651bbd0f80afc0b87a24c09c8226e80f3350735e023f15e0a509b4,2025-06-17T20:17:29.200000
|
||||
CVE-2025-42952,1,1,768bcb21d776f11485a2152ac2dc0bc7598a8ee5e50ee1082d5b052c728d9328,2025-07-08T01:15:22
|
||||
CVE-2025-42953,1,1,1741d0db8362bf68b72a94a7bc94759493f1591ad7cdcbfb856df8c762f30086,2025-07-08T01:15:22.163000
|
||||
CVE-2025-42954,1,1,3d6fa81167173620b022305ba34ea04bc5b97373e3681aaccd6730092982902a,2025-07-08T01:15:22.317000
|
||||
CVE-2025-42959,1,1,d5b01cf70a8a433d4660d71c79e0cd35066490817f078e01438734aadc02e44f,2025-07-08T01:15:22.477000
|
||||
CVE-2025-42960,1,1,a89186331f55bed8cbab7ef13d784bde9dc4953755cfe296098974f13d09bafe,2025-07-08T01:15:22.633000
|
||||
CVE-2025-42961,1,1,2a9cd005f1d38d17bbbd4cdadb65a99fa4810911bd990533ae7e0c7f7028d38f,2025-07-08T01:15:22.783000
|
||||
CVE-2025-42962,1,1,10a76ecedc82f8c73f4165b127729cde329e2a1b8397decd07283e995d13713f,2025-07-08T01:15:22.937000
|
||||
CVE-2025-42963,1,1,3eceb758431bd7a9b776e6e359f16ac8c0bd21ef6b4f957b0e4b861a43f9a6ad,2025-07-08T01:15:23.093000
|
||||
CVE-2025-42964,1,1,35eca8fe2e5b0b8592914d5f9aceac811262537d112dd16fac42dd7a2874f291,2025-07-08T01:15:23.240000
|
||||
CVE-2025-42965,1,1,5468ec2b856abda7976d3a7237854316e3a567ad8f1e21914fd754cca072a790,2025-07-08T01:15:23.440000
|
||||
CVE-2025-42966,1,1,f5060d8be8c97a112f6bc890e97f1361483623af18e26949db8b983231720bd9,2025-07-08T01:15:23.630000
|
||||
CVE-2025-42967,1,1,a6e510917a634ebb18bbae9d20133392f6b21c2e7e0c465ace2491b306170cbb,2025-07-08T01:15:23.787000
|
||||
CVE-2025-42968,1,1,8d0a352810ded26f1ea99be4361c89b7f442d5266f1052174dabce56e8dd9e2f,2025-07-08T01:15:23.950000
|
||||
CVE-2025-42969,1,1,9338f259fb3824acc0cf0f061beeaca8fff6d92da434d45e0c6b7290c985ddcf,2025-07-08T01:15:24.120000
|
||||
CVE-2025-42952,0,0,768bcb21d776f11485a2152ac2dc0bc7598a8ee5e50ee1082d5b052c728d9328,2025-07-08T01:15:22
|
||||
CVE-2025-42953,0,0,1741d0db8362bf68b72a94a7bc94759493f1591ad7cdcbfb856df8c762f30086,2025-07-08T01:15:22.163000
|
||||
CVE-2025-42954,0,0,3d6fa81167173620b022305ba34ea04bc5b97373e3681aaccd6730092982902a,2025-07-08T01:15:22.317000
|
||||
CVE-2025-42959,0,0,d5b01cf70a8a433d4660d71c79e0cd35066490817f078e01438734aadc02e44f,2025-07-08T01:15:22.477000
|
||||
CVE-2025-42960,0,0,a89186331f55bed8cbab7ef13d784bde9dc4953755cfe296098974f13d09bafe,2025-07-08T01:15:22.633000
|
||||
CVE-2025-42961,0,0,2a9cd005f1d38d17bbbd4cdadb65a99fa4810911bd990533ae7e0c7f7028d38f,2025-07-08T01:15:22.783000
|
||||
CVE-2025-42962,0,0,10a76ecedc82f8c73f4165b127729cde329e2a1b8397decd07283e995d13713f,2025-07-08T01:15:22.937000
|
||||
CVE-2025-42963,0,0,3eceb758431bd7a9b776e6e359f16ac8c0bd21ef6b4f957b0e4b861a43f9a6ad,2025-07-08T01:15:23.093000
|
||||
CVE-2025-42964,0,0,35eca8fe2e5b0b8592914d5f9aceac811262537d112dd16fac42dd7a2874f291,2025-07-08T01:15:23.240000
|
||||
CVE-2025-42965,0,0,5468ec2b856abda7976d3a7237854316e3a567ad8f1e21914fd754cca072a790,2025-07-08T01:15:23.440000
|
||||
CVE-2025-42966,0,0,f5060d8be8c97a112f6bc890e97f1361483623af18e26949db8b983231720bd9,2025-07-08T01:15:23.630000
|
||||
CVE-2025-42967,0,0,a6e510917a634ebb18bbae9d20133392f6b21c2e7e0c465ace2491b306170cbb,2025-07-08T01:15:23.787000
|
||||
CVE-2025-42968,0,0,8d0a352810ded26f1ea99be4361c89b7f442d5266f1052174dabce56e8dd9e2f,2025-07-08T01:15:23.950000
|
||||
CVE-2025-42969,0,0,9338f259fb3824acc0cf0f061beeaca8fff6d92da434d45e0c6b7290c985ddcf,2025-07-08T01:15:24.120000
|
||||
CVE-2025-4297,0,0,2125bd423cd8ee8185dc917035443ae13b98a933b8dab9e4e9a974e1b93ea733,2025-05-16T17:44:43.850000
|
||||
CVE-2025-42970,1,1,297fc1e2ba1c14dbe5bd505fa3c89552007ea34556578cbbf833ac087705be7b,2025-07-08T01:15:24.290000
|
||||
CVE-2025-42971,1,1,4cad154b4ee90a857234e7063e5c465f9082e3eb4d5b97a829dcca0253a74c9d,2025-07-08T01:15:24.463000
|
||||
CVE-2025-42973,1,1,49b8336a92be1c55e6b9eb63e4c5855a9103ff4ee08c29904e5bb21666614cfc,2025-07-08T01:15:24.623000
|
||||
CVE-2025-42974,1,1,2110eefab2c0feb97089f6b4f42310beea47c1c0fe5b1d7e1f69b412e743935a,2025-07-08T01:15:24.773000
|
||||
CVE-2025-42970,0,0,297fc1e2ba1c14dbe5bd505fa3c89552007ea34556578cbbf833ac087705be7b,2025-07-08T01:15:24.290000
|
||||
CVE-2025-42971,0,0,4cad154b4ee90a857234e7063e5c465f9082e3eb4d5b97a829dcca0253a74c9d,2025-07-08T01:15:24.463000
|
||||
CVE-2025-42973,0,0,49b8336a92be1c55e6b9eb63e4c5855a9103ff4ee08c29904e5bb21666614cfc,2025-07-08T01:15:24.623000
|
||||
CVE-2025-42974,0,0,2110eefab2c0feb97089f6b4f42310beea47c1c0fe5b1d7e1f69b412e743935a,2025-07-08T01:15:24.773000
|
||||
CVE-2025-42977,0,0,cc9ae0e46200dea4243b9844a4fe105554475587976aa2e885549e66131394da,2025-06-12T16:06:39.330000
|
||||
CVE-2025-42978,1,1,2523b44e162b8bd1d841960211fe9d53134ee2f7a88691f864fd3ddeb7e14606,2025-07-08T01:15:24.930000
|
||||
CVE-2025-42979,1,1,05a43941f2db0c355cef3d700bc8e776e51a17162eeda5028cce22375c0f9b15,2025-07-08T01:15:25.107000
|
||||
CVE-2025-42978,0,0,2523b44e162b8bd1d841960211fe9d53134ee2f7a88691f864fd3ddeb7e14606,2025-07-08T01:15:24.930000
|
||||
CVE-2025-42979,0,0,05a43941f2db0c355cef3d700bc8e776e51a17162eeda5028cce22375c0f9b15,2025-07-08T01:15:25.107000
|
||||
CVE-2025-4298,0,0,e54afc5cb294aa37ab5ddf7cb60307aaa6afeb78004ee588006228c0c5b744b4,2025-05-13T20:06:19.080000
|
||||
CVE-2025-42980,1,1,025244ac3cd19547b69de612ccd1f7e177717aacc7ebab940de3d9eb2517fa1d,2025-07-08T01:15:25.270000
|
||||
CVE-2025-42981,1,1,c03cbc3aec3769340850877e016e67298a888abdd40e3cc82b8b3705d8fe406a,2025-07-08T01:15:25.427000
|
||||
CVE-2025-42980,0,0,025244ac3cd19547b69de612ccd1f7e177717aacc7ebab940de3d9eb2517fa1d,2025-07-08T01:15:25.270000
|
||||
CVE-2025-42981,0,0,c03cbc3aec3769340850877e016e67298a888abdd40e3cc82b8b3705d8fe406a,2025-07-08T01:15:25.427000
|
||||
CVE-2025-42982,0,0,e6968c3fd7871556e1e29606a4f8dbcd4707b8846dc0d2a09bc157db8b57cc24,2025-06-12T16:06:39.330000
|
||||
CVE-2025-42983,0,0,1b0371afa97d4d0347bddcd8ab1cfda4660ea8f2c5878217b37c9e5cdc2ac967,2025-06-12T16:06:39.330000
|
||||
CVE-2025-42984,0,0,7e6a153ab4f0a760b3d0e2df015134c0a7cce8a9e0c5a0424eb4c14f09f58894,2025-06-12T16:06:39.330000
|
||||
CVE-2025-42985,1,1,23bfa90335b4026cee62c8268f435b9b1edd6f9821da86eb80e036ca956ae9e3,2025-07-08T01:15:25.577000
|
||||
CVE-2025-42986,1,1,eb2ac8fff323b248a9469f1f0699df7f57c8a401b7d13bc375054f7b2bdb9f8b,2025-07-08T01:15:25.730000
|
||||
CVE-2025-42985,0,0,23bfa90335b4026cee62c8268f435b9b1edd6f9821da86eb80e036ca956ae9e3,2025-07-08T01:15:25.577000
|
||||
CVE-2025-42986,0,0,eb2ac8fff323b248a9469f1f0699df7f57c8a401b7d13bc375054f7b2bdb9f8b,2025-07-08T01:15:25.730000
|
||||
CVE-2025-42987,0,0,57e561deb69074295408ad93b87915b59df3e27da58e7c9dc77ffc675fb4f969,2025-06-12T16:06:39.330000
|
||||
CVE-2025-42988,0,0,802715f7a93ebc8f9f5311d82d3ea45d70eb23bce1f100c736f7d19e12e423ab,2025-06-12T16:06:39.330000
|
||||
CVE-2025-42989,0,0,f7c874047faa5bbde13807979293b3a3f749e5612e701215df5efa9c37a39e0c,2025-06-12T16:06:39.330000
|
||||
CVE-2025-4299,0,0,cc4a3e24204515aaf4850521a61cefe5731008dd8b97ebba472ff5c5a801f5ca,2025-05-13T20:06:00.377000
|
||||
CVE-2025-42990,0,0,3a9e5f7c57455afc01a40c0ea2245139d37a87774fde193be7c4255a63f51cb4,2025-06-12T16:06:39.330000
|
||||
CVE-2025-42991,0,0,483fe762357a709c84ee8b01c25339045c78ff0318a3cc007a6356796e166421,2025-06-12T16:06:39.330000
|
||||
CVE-2025-42992,1,1,96ce2567afed88e5f49a397de2e5cd2b29cc5415d8f6a30174112626eb1ac1e0,2025-07-08T01:15:25.887000
|
||||
CVE-2025-42992,0,0,96ce2567afed88e5f49a397de2e5cd2b29cc5415d8f6a30174112626eb1ac1e0,2025-07-08T01:15:25.887000
|
||||
CVE-2025-42993,0,0,770b23d31b6a3733e5f2e2910516b7bc5d5f11275ee3a601562cde06caf0884c,2025-06-12T16:06:39.330000
|
||||
CVE-2025-42994,0,0,145ac3aa415b4167c9777bfe2d4a55a89181bcc2e386f22a825736b3071eaabb,2025-06-12T16:06:39.330000
|
||||
CVE-2025-42995,0,0,3ec9ec8f855874770ecce1d03a99a91e674f14d0bfac33ac9017da879811ca6f,2025-06-12T16:06:39.330000
|
||||
@ -295856,7 +295872,7 @@ CVE-2025-42998,0,0,2bfe656344a0b85a5f4fff2abcf4a6577e799789f89dc0ea98745669a30ec
|
||||
CVE-2025-42999,0,0,a0a9942912bd021b739fb32ce123af4bb7497f07493d1c056f2a75451f04f20d,2025-05-16T19:44:49.400000
|
||||
CVE-2025-4300,0,0,f7c03ed92744380706d903a9f694588f32e405152084eae0fc0569337f5db7ce,2025-05-13T20:22:08.717000
|
||||
CVE-2025-43000,0,0,e31fc74811b3e3770c864cd0f324b9ae9ae79a3c82cdc5b33a35261048a81925,2025-05-13T19:35:25.503000
|
||||
CVE-2025-43001,1,1,b0c7292d301e8ed28cbd3ff11650a2455582cf81da9979e867729586e9206a22,2025-07-08T01:15:26.047000
|
||||
CVE-2025-43001,0,0,b0c7292d301e8ed28cbd3ff11650a2455582cf81da9979e867729586e9206a22,2025-07-08T01:15:26.047000
|
||||
CVE-2025-43002,0,0,434480ab85f45382cf8911be3496b00027aeca710a87c1831baed9aeffb6a42f,2025-05-13T19:35:18.080000
|
||||
CVE-2025-43003,0,0,c5a14dcddb63dd3a6317cb81df2b91482d1e16b9c687c3fd2da6622f294a0a59,2025-05-13T19:35:18.080000
|
||||
CVE-2025-43004,0,0,c44496c430b2ebc5fb5dac27e9ac73a29a0d9eebcd7c1bf6e68e10748aefecc2,2025-05-13T19:35:18.080000
|
||||
@ -299466,6 +299482,14 @@ CVE-2025-53603,0,0,0ef57944661b4a8c37178144fe0bcd4e8f50c238641c089e241bfcc769261
|
||||
CVE-2025-53604,0,0,1bab9e277cfa892c064c40bbba3b5c77ef51c31c8d81c51bf21cb4ac9451d9e9,2025-07-05T01:15:28.340000
|
||||
CVE-2025-53605,0,0,e1850a90bbd00208fdd0f92f6be0091829f3c2d4f97e87d63797a52d65dc4d4d,2025-07-05T01:15:28.523000
|
||||
CVE-2025-5361,0,0,63ed55da0a8819c3072e9ae5cbf20f6ad96bd8fa3415071144a15d946aef0cb0,2025-06-03T15:35:09.950000
|
||||
CVE-2025-53610,1,1,156dd78a0c1b31a38abe89aaf6d0ce2631a27f0548bb6395c2827bca8600bd0d,2025-07-08T03:15:29.617000
|
||||
CVE-2025-53611,1,1,bfd482962f5103cd0aa9fa24e86320a1b2a415984fe058e01ecfaf089a3342d6,2025-07-08T03:15:29.727000
|
||||
CVE-2025-53612,1,1,2f78f0acf63fe51038e0445f7a1597f9d4a318bb4b2f3f536ec2c854804f7320,2025-07-08T03:15:29.810000
|
||||
CVE-2025-53613,1,1,e3c15eaea1ad8b963cee31efb9bf97eb50568119e629cdbdfc4bb61fc0acb05e,2025-07-08T03:15:29.913000
|
||||
CVE-2025-53614,1,1,1455a49a2896192a3a9e4e1c0662a97b634f4f07e1f877901bfc57552994a878,2025-07-08T03:15:30.007000
|
||||
CVE-2025-53615,1,1,633e3bf8ba00420527ab77486009eed1958a5e888b671857bb2673569610c633,2025-07-08T03:15:30.117000
|
||||
CVE-2025-53616,1,1,1cf0204b7330bfe8e4e3f581ea40aa23326df22768a5dd743b5aed895531417e,2025-07-08T03:15:30.240000
|
||||
CVE-2025-53617,1,1,bbf57c26ed72eb04e66ebb33ac077758620f1eff2be7f8e7251ed7d98e97a9ca,2025-07-08T03:15:30.337000
|
||||
CVE-2025-5362,0,0,33b74730f9e7ac14985e93de797c2da60e582983293fbae692e330f50a44162c,2025-06-03T15:34:57.473000
|
||||
CVE-2025-5363,0,0,d48d3a878cc2187658148b214cb6829e36972108c01dfa0cb86b9cac54da6616,2025-06-03T15:34:39.567000
|
||||
CVE-2025-5364,0,0,95a5e56210a5d35c1ea6e33ff22c35248d45f8b8e37cb258e052523a9909bca6,2025-06-03T15:34:20.917000
|
||||
@ -299628,6 +299652,7 @@ CVE-2025-5566,0,0,779c860a161eb64dc6f40dd7f0ca399f4546b6e4ee22bf38748c51ae144c43
|
||||
CVE-2025-5567,0,0,da23b4ba25131dd28d32f4d0fb99f3359181dd06bd95a7ecaf592a778a36fae8,2025-07-04T03:15:21.040000
|
||||
CVE-2025-5568,0,0,3985b2b3c56041cfacfc47ea29b5076a771839690445a0941918b66a37c31945,2025-06-09T12:15:47.880000
|
||||
CVE-2025-5569,0,0,4c30b6740d26360ebc0aa84c2a25fe04c9749eefc6a71facbba872eca1a65c71,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5570,1,1,4d00f47ecd2b611a14b258e837d2ce9ee5cf2a39afcfba71ea3f9783a041339c,2025-07-08T03:15:30.423000
|
||||
CVE-2025-5571,0,0,88815a4b21737d58e162800981d93fa4afd05c1cd7a98afd3597a0eeba47b636,2025-06-04T14:54:33.783000
|
||||
CVE-2025-5572,0,0,f58a8b0d677b3b1e3374f5b4bd151cd210da95aa5b9dd2a74ae8e59ebb8e1e16,2025-06-06T18:48:37.333000
|
||||
CVE-2025-5573,0,0,6e69e3f6614bb634486e032f3753cb8f537723c56a38d21eec74aa1f5111ea31,2025-06-06T18:48:46.463000
|
||||
@ -300000,7 +300025,7 @@ CVE-2025-6022,0,0,673713355118472c1ebaabd5c5e4854e0f9320e04b049cdd5cc68d5d0f25f0
|
||||
CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6030,0,0,e2d083f85b4980fab673be25fe64ff6c58fe5f2e84e15893b8c80d92f1561a4f,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6031,0,0,8862006220262f75545734fb5f034c6db29d3c4cbd11030b12e4d70636f9f9cc,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6032,0,0,7d36c2d58b732d43afa3008a3147d35986d6ec9223b352842d54a5562a9f2d17,2025-07-02T08:15:57.507000
|
||||
CVE-2025-6032,0,1,f67e1ca89d1ad9336fecdae2d68d83e9b02b8f60c5d6e81682efbe05551b8c71,2025-07-08T03:15:30.727000
|
||||
CVE-2025-6035,0,0,b71b50bc0c235c19b2d078bb69ae3921b820489d58f8688dea7a7bdd7515f125,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6039,0,0,54678a3c3f873d8ba1f08ff048f062b795fa075b8a73a104c49bcf010b698d72,2025-07-04T03:15:21.910000
|
||||
CVE-2025-6040,0,0,76a8c143b5834b0cf93cda3bf80ab595e40b144f2532ce0d72ddcf42d08934bb,2025-06-16T12:32:18.840000
|
||||
@ -300128,6 +300153,7 @@ CVE-2025-6220,0,0,70ba2b5176193b00d7c5791b5a8342d63e62622f52556ab6ab22db00bbc145
|
||||
CVE-2025-6224,0,0,c2476a14c43ef31967d89288ff41b75746283c187c9c6cdc794d96fe44a26458,2025-07-03T15:14:12.767000
|
||||
CVE-2025-6238,0,0,43536995b122e8c09fc85415169b6ce2705e742ae7515aa376619850727f57b7,2025-07-04T03:15:22.237000
|
||||
CVE-2025-6240,0,0,ba4da5fd605eca3c919532cf0a8a1661ebda5a87c35d4010c4dddeaa23d93e9a,2025-06-23T20:16:59.783000
|
||||
CVE-2025-6244,1,1,d19de841906576e8324a3c92e6164494344d5067aac942ccb32f69872f61c68d,2025-07-08T03:15:30.947000
|
||||
CVE-2025-6252,0,0,04266fde32de91a19cd75afe711753a0e9f9154bece1418589e4e14bad3b2599,2025-07-07T14:51:20.410000
|
||||
CVE-2025-6257,0,0,cc91b7557b526c88672e08add1b684bde89a65ab4dd7fa052a99a1c1c9c823b5,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6258,0,0,a4b6be5935c4432c7a129304f469494da82c625050798afddedddfa563a7fe1e,2025-06-26T18:57:43.670000
|
||||
@ -300727,13 +300753,18 @@ CVE-2025-7142,0,0,960c733c5d78dc534f46715948164cd98d18a21f0c8d4024e18875007a7824
|
||||
CVE-2025-7143,0,0,441a473db5cda09d82dbc5979193f84fa710d47454b8ae4677353bd10912f319,2025-07-07T20:15:28.973000
|
||||
CVE-2025-7144,0,0,3a3f7e613c6b4721f9d407a0cae7ad541c6187fe8ca540eb529ba3f7de3b744e,2025-07-07T21:15:25.987000
|
||||
CVE-2025-7145,0,0,0431922fce794ebe2fb76c85f6a92686a8078a8927733582f3cad39cb892c9b6,2025-07-07T03:15:30.917000
|
||||
CVE-2025-7146,1,1,a7c6ba2bffaec4d9e671683ddf3f31d6ff033dcb7ed7c37d75dbdb7a67497fc5,2025-07-08T02:15:22.367000
|
||||
CVE-2025-7147,0,0,36fb7d2d81135c9ac916fbf4d35323ae340d8c03e69ce3da100c81c97b562e84,2025-07-07T21:15:26.187000
|
||||
CVE-2025-7148,0,0,fdd19e0d59a74004f00a2708d969a7d930d66906c39a8978c5f58893af295960,2025-07-07T22:15:27.227000
|
||||
CVE-2025-7149,0,0,ad9d73cf832c7ebd837d39ea1fe909f87836f7cdc3f8f0ff995d4a33ff766e76,2025-07-07T22:15:27.460000
|
||||
CVE-2025-7150,0,0,b77fe5f832cdc2282a603bb6e72f3afbcd6c075b6d2bbdb84173fce9a56d61d3,2025-07-07T23:15:23.207000
|
||||
CVE-2025-7151,0,0,e82251d7fe83a1332b07026c390af5ec1aa1c1e0d2d58d9e016eca5cf7deba86,2025-07-07T23:15:23.813000
|
||||
CVE-2025-7152,1,1,b0ead946247ac6343a0ade2c5e0f7cbb077e4de4f4c5032b861f243aebf010bd,2025-07-08T00:15:22.443000
|
||||
CVE-2025-7153,1,1,da301161fc245318be20b04dc3fd4bdfe29fcc0f9c8a67e241a00dbb990ab636,2025-07-08T00:15:23.237000
|
||||
CVE-2025-7154,1,1,1a8533e879ab30d649d5fc250b936c00821e4e6c5eb1a6831ec7843a20c7863b,2025-07-08T01:15:26.200000
|
||||
CVE-2025-7155,1,1,18f65f6bc617669b8e2e10d2a7c547bbba3f724f23c4fc3a98eafbf5453296a3,2025-07-08T01:15:26.400000
|
||||
CVE-2025-7152,0,0,b0ead946247ac6343a0ade2c5e0f7cbb077e4de4f4c5032b861f243aebf010bd,2025-07-08T00:15:22.443000
|
||||
CVE-2025-7153,0,0,da301161fc245318be20b04dc3fd4bdfe29fcc0f9c8a67e241a00dbb990ab636,2025-07-08T00:15:23.237000
|
||||
CVE-2025-7154,0,0,1a8533e879ab30d649d5fc250b936c00821e4e6c5eb1a6831ec7843a20c7863b,2025-07-08T01:15:26.200000
|
||||
CVE-2025-7155,0,0,18f65f6bc617669b8e2e10d2a7c547bbba3f724f23c4fc3a98eafbf5453296a3,2025-07-08T01:15:26.400000
|
||||
CVE-2025-7156,1,1,69691b32841b06123b32c66248b7e50cfd2b28e05c59a46703f6823598b1a316,2025-07-08T02:15:22.580000
|
||||
CVE-2025-7157,1,1,fb0ab6cdcd483ee5ab2507f21ed657ed272b448e55adaa21678064387511c835,2025-07-08T03:15:31.123000
|
||||
CVE-2025-7158,1,1,d801401be7bfca9ce7b35bab72bb2a194c85030fa8a4a8a6df2185522ff79cd7,2025-07-08T03:15:31.373000
|
||||
CVE-2025-7159,1,1,e94c92ddd35c79d1bb4bca41d4c7fa36ba523f9dbab019a68a36db8f883b8350,2025-07-08T03:15:31.590000
|
||||
CVE-2025-7259,0,0,92aedb6a5e38fb030175a289364c754cf67f487a6a25e9d17c23717610f38507,2025-07-07T16:15:30.440000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user