Auto-Update: 2025-06-24T16:00:34.910461+00:00

This commit is contained in:
cad-safe-bot 2025-06-24 16:04:16 +00:00
parent 77088c2a3c
commit ed26803442
51 changed files with 1969 additions and 218 deletions

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T17:15:07.977",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@cisco.com",
"published": "2024-11-15T16:15:21.910",
"lastModified": "2025-01-27T18:15:29.790",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-09T20:15:39.730",
"lastModified": "2025-01-16T19:15:28.787",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-1718",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2025-06-24T12:15:20.033",
"lastModified": "2025-06-24T13:15:21.547",
"lastModified": "2025-06-24T14:15:27.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -12,6 +12,50 @@
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cybersecurity@hitachienergy.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-2403",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2025-06-24T12:15:20.863",
"lastModified": "2025-06-24T12:15:20.863",
"lastModified": "2025-06-24T14:15:28.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -12,6 +12,50 @@
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cybersecurity@hitachienergy.com",
@ -38,7 +82,7 @@
"weaknesses": [
{
"source": "cybersecurity@hitachienergy.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-27827",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-24T14:15:28.050",
"lastModified": "2025-06-24T15:15:23.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the legacy chat component of Mitel MiContact Center Business through 10.2.0.3 could allow an unauthenticated attacker to conduct an information disclosure attack due to improper handling of session data. A successful exploit requires user interaction and could allow an attacker to access sensitive information, leading to unauthorized access to active chat rooms, reading chat data, and sending messages during an active chat session."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2025-0002-0",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-27828",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-24T14:15:28.200",
"lastModified": "2025-06-24T15:15:23.267",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the legacy chat component of Mitel MiContact Center Business through 10.0.0.4, 10.1.0.0 through 10.1.0.5, and 10.2.0.0 through 10.2.0.4 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient input validation. A successful exploit requires user interaction and could allow an attacker to execute arbitrary scripts with a limited impact on the confidentiality and the integrity."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2025-0003",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-2828",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-06-23T21:15:25.210",
"lastModified": "2025-06-23T21:15:25.210",
"lastModified": "2025-06-24T14:15:28.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +55,10 @@
{
"url": "https://huntr.com/bounties/8f771040-7f34-420a-b96b-5b93d4a99afc",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/8f771040-7f34-420a-b96b-5b93d4a99afc",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,17 +2,13 @@
"id": "CVE-2025-32876",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-20T14:15:27.877",
"lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-20T14:15:27.877",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on COROS PACE 3 devices through 3.0808.0. The BLE implementation of the COROS smartwatch does not support LE Secure Connections and instead enforces BLE Legacy Pairing. In BLE Legacy Pairing, the Short-Term Key (STK) can be easily guessed. This requires knowledge of the Temporary Key (TK), which, in the case of the COROS Pace 3, is set to 0 due to the Just Works pairing method. An attacker within Bluetooth range can therefore perform sniffing attacks, allowing eavesdropping on the communication."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en los dispositivos COROS PACE 3 hasta la versi\u00f3n 3.0808.0. La implementaci\u00f3n BLE del reloj inteligente COROS no es compatible con las conexiones seguras LE y, en su lugar, aplica el emparejamiento heredado BLE. En el emparejamiento heredado BLE, la clave de corto plazo (STK) se puede adivinar f\u00e1cilmente. Esto requiere conocer la clave temporal (TK), que, en el caso del COROS Pace 3, est\u00e1 configurada a 0 debido al m\u00e9todo de emparejamiento Just Works. Por lo tanto, un atacante dentro del alcance de Bluetooth puede realizar ataques de rastreo, lo que permite interceptar la comunicaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,17 +2,13 @@
"id": "CVE-2025-32879",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-20T14:15:28.783",
"lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-20T14:15:28.783",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on COROS PACE 3 devices through 3.0808.0. It starts advertising if no device is connected via Bluetooth. This allows an attacker to connect with the device via BLE if no other device is connected. While connected, none of the BLE services and characteristics of the device require any authentication or security level. Therefore, any characteristic, depending on their mode of operation (read/write/notify), can be used by the connected attacker. This allows, for example, configuring the device, sending notifications, resetting the device to factory settings, or installing software."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en dispositivos COROS PACE 3 hasta la versi\u00f3n 3.0808.0. Este problema inicia la publicidad si no hay ning\u00fan dispositivo conectado por Bluetooth. Esto permite a un atacante conectarse al dispositivo mediante Bluetooth de baja energ\u00eda (BLE) si no hay ning\u00fan otro dispositivo conectado. Mientras est\u00e9 conectado, ninguno de los servicios ni caracter\u00edsticas de Bluetooth de este dispositivo requiere autenticaci\u00f3n ni nivel de seguridad. Por lo tanto, cualquier caracter\u00edstica, seg\u00fan su modo de funcionamiento (lectura/escritura/notificaci\u00f3n), puede ser utilizada por el atacante conectado. Esto permite, por ejemplo, configurar el dispositivo, enviar notificaciones, restablecer la configuraci\u00f3n de f\u00e1brica o instalar software."
}
],
"metrics": {},

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-32975",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-24T15:15:23.710",
"lastModified": "2025-06-24T15:15:23.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead to complete administrative takeover."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://seclists.org/fulldisclosure/2025/Jun/22",
"source": "cve@mitre.org"
},
{
"url": "https://seralys.com/research/CVE-2025-32975.txt",
"source": "cve@mitre.org"
},
{
"url": "https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-32976",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-24T15:15:23.930",
"lastModified": "2025-06-24T15:15:23.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains a logic flaw in its two-factor authentication implementation that allows authenticated users to bypass TOTP-based 2FA requirements. The vulnerability exists in the 2FA validation process and can be exploited to gain elevated access."
}
],
"metrics": {},
"references": [
{
"url": "https://seclists.org/fulldisclosure/2025/Jun/23",
"source": "cve@mitre.org"
},
{
"url": "https://seralys.com/research/CVE-2025-32976.txt",
"source": "cve@mitre.org"
},
{
"url": "https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-32977",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-24T15:15:24.063",
"lastModified": "2025-06-24T15:15:24.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) allows unauthenticated users to upload backup files to the system. While signature validation is implemented, weaknesses in the validation process can be exploited to upload malicious backup content that could compromise system integrity."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"references": [
{
"url": "https://seclists.org/fulldisclosure/2025/Jun/24",
"source": "cve@mitre.org"
},
{
"url": "https://seralys.com/research/CVE-2025-32977.txt",
"source": "cve@mitre.org"
},
{
"url": "https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-32978",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-24T15:15:24.260",
"lastModified": "2025-06-24T15:15:24.260",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) allows unauthenticated users to replace system licenses through a web interface intended for license renewal. Attackers can exploit this to replace valid licenses with expired or trial licenses, causing denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://seclists.org/fulldisclosure/2025/Jun/25",
"source": "cve@mitre.org"
},
{
"url": "https://seralys.com/research/CVE-2025-32978.txt",
"source": "cve@mitre.org"
},
{
"url": "https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-34035",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:24.763",
"lastModified": "2025-06-24T03:15:33.293",
"lastModified": "2025-06-24T14:15:28.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -93,6 +93,10 @@
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-34036",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:24.903",
"lastModified": "2025-06-24T01:15:24.903",
"lastModified": "2025-06-24T14:15:28.953",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -85,6 +85,10 @@
{
"url": "https://www.exploit-db.com/exploits/39596",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://web.archive.org/web/20160322204109/http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-36537",
"sourceIdentifier": "psirt@teamviewer.com",
"published": "2025-06-24T15:15:24.453",
"lastModified": "2025-06-24T15:15:24.453",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Permission Assignment for Critical Resource in the TeamViewer Client (Full and Host) of TeamViewer Remote and Tensor prior Version 15.67 on Windows allows a local unprivileged user to trigger arbitrary file deletion with SYSTEM privileges via leveraging the MSI rollback mechanism. The vulnerability only applies to the Remote Management features: Backup, Monitoring, and Patch Management."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@teamviewer.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1002/",
"source": "psirt@teamviewer.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-39201",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2025-06-24T12:15:21.050",
"lastModified": "2025-06-24T12:15:21.050",
"lastModified": "2025-06-24T14:15:29.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -12,6 +12,50 @@
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cybersecurity@hitachienergy.com",
@ -38,7 +82,7 @@
"weaknesses": [
{
"source": "cybersecurity@hitachienergy.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-39202",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2025-06-24T12:15:21.200",
"lastModified": "2025-06-24T12:15:21.200",
"lastModified": "2025-06-24T14:15:29.253",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,12 +55,34 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "cybersecurity@hitachienergy.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-39203",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2025-06-24T12:15:21.380",
"lastModified": "2025-06-24T12:15:21.380",
"lastModified": "2025-06-24T14:15:29.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,12 +55,34 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cybersecurity@hitachienergy.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-39204",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2025-06-24T12:15:21.523",
"lastModified": "2025-06-24T12:15:21.523",
"lastModified": "2025-06-24T14:15:29.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,12 +55,34 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cybersecurity@hitachienergy.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-39205",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2025-06-24T13:15:22.470",
"lastModified": "2025-06-24T13:15:22.470",
"lastModified": "2025-06-24T14:15:29.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -12,6 +12,50 @@
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cybersecurity@hitachienergy.com",
@ -38,7 +82,7 @@
"weaknesses": [
{
"source": "cybersecurity@hitachienergy.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-18T09:15:17.927",
"lastModified": "2025-05-19T13:35:20.460",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-52879",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2025-06-23T15:15:28.933",
"lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T15:15:25.180",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -45,6 +45,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-5318",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-24T14:15:30.523",
"lastModified": "2025-06-24T14:15:30.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the libssh library. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-5318",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369131",
"source": "secalert@redhat.com"
},
{
"url": "https://www.libssh.org/security/advisories/CVE-2025-5318.txt",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6032",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-24T14:15:30.703",
"lastModified": "2025-06-24T14:15:30.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Podman. The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry. This issue results in a Man In The Middle attack."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-6032",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372501",
"source": "secalert@redhat.com"
}
]
}

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T14:15:22.960",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T15:15:25.327",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T15:15:25.510",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T03:15:25.743",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T03:15:25.947",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T03:15:26.147",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T03:15:26.340",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T03:15:26.553",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6410",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-21T17:15:23.580",
"lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T14:51:28.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -124,30 +144,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/83",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.313404",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.313404",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.598226",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/83",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6411",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-21T17:15:23.800",
"lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T14:51:00.910",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -124,30 +144,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/84",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.313405",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.313405",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.598227",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/84",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6412",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-21T18:15:23.830",
"lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T14:45:30.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -124,30 +144,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/85",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.313406",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.313406",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.598228",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/85",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6413",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-21T18:15:24.720",
"lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T14:44:44.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -124,30 +144,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/86",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.313407",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.313407",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.598229",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/86",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6414",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-21T19:15:22.377",
"lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T14:43:54.553",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -124,30 +144,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/87",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.313408",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.313408",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.598230",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/87",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6415",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-21T19:15:22.583",
"lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T14:42:25.020",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -124,30 +144,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/88",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.313409",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.313409",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.598231",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/88",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6416",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-21T20:15:26.237",
"lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T14:42:10.153",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -124,30 +144,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/89",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.313410",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.313410",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.598232",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/89",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6417",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-21T20:15:27.210",
"lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T14:41:39.197",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -124,30 +144,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/90",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.313411",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.313411",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.598233",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/90",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-6435",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-06-24T13:15:24.560",
"lastModified": "2025-06-24T13:15:24.560",
"lastModified": "2025-06-24T14:15:30.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "If a user saved a response from the Network tab in Devtools using the Save As context menu option, that file may not have been saved with the `.download` file extension. This could have led to the user inadvertently running a malicious executable. This vulnerability affects Firefox < 140."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1950056",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-6517",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-23T18:15:22.797",
"lastModified": "2025-06-23T20:16:21.633",
"lastModified": "2025-06-24T14:15:31.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.593111",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/honorseclab/vulns/blob/main/dromara_MaxKey/SSRF.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-6535",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-24T01:15:25.513",
"lastModified": "2025-06-24T01:15:25.513",
"lastModified": "2025-06-24T14:15:31.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.596573",
"source": "cna@vuldb.com"
},
{
"url": "https://blog.0xd00.com/blog/sqli-in-user-list-leads-to-sensitive-data-disclosure",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-6551",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-24T02:15:23.170",
"lastModified": "2025-06-24T02:15:23.170",
"lastModified": "2025-06-24T14:15:31.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.596615",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-01/report.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6567",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-24T15:15:25.623",
"lastModified": "2025-06-24T15:15:25.623",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Online Recruitment Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file Recruitment/admin/view_application.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Sp1d3rL1/CVE/issues/3",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313739",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313739",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.601339",
"source": "cna@vuldb.com"
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2025-6568",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-24T15:15:25.823",
"lastModified": "2025-06-24T15:15:25.823",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formIpv6Setup of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/d2pq/cve/blob/main/616/23.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/d2pq/cve/blob/main/616/23.md#poc",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313740",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313740",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.601344",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6569",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-24T15:15:26.017",
"lastModified": "2025-06-24T15:15:26.017",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in code-projects School Fees Payment System 1.0. Affected by this vulnerability is an unknown functionality of the file /student.php. The manipulation of the argument sname/contact/about/emailid/transcation_remark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/tuooo/CVE/issues/18",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313741",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313741",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.601612",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-24T14:00:22.892829+00:00
2025-06-24T16:00:34.910461+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-24T13:47:04.127000+00:00
2025-06-24T15:15:26.017000+00:00
```
### Last Data Feed Release
@ -33,52 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
299207
299219
```
### CVEs added in the last Commit
Recently added CVEs: `22`
Recently added CVEs: `12`
- [CVE-2025-1718](CVE-2025/CVE-2025-17xx/CVE-2025-1718.json) (`2025-06-24T12:15:20.033`)
- [CVE-2025-2403](CVE-2025/CVE-2025-24xx/CVE-2025-2403.json) (`2025-06-24T12:15:20.863`)
- [CVE-2025-39201](CVE-2025/CVE-2025-392xx/CVE-2025-39201.json) (`2025-06-24T12:15:21.050`)
- [CVE-2025-39202](CVE-2025/CVE-2025-392xx/CVE-2025-39202.json) (`2025-06-24T12:15:21.200`)
- [CVE-2025-39203](CVE-2025/CVE-2025-392xx/CVE-2025-39203.json) (`2025-06-24T12:15:21.380`)
- [CVE-2025-39204](CVE-2025/CVE-2025-392xx/CVE-2025-39204.json) (`2025-06-24T12:15:21.523`)
- [CVE-2025-39205](CVE-2025/CVE-2025-392xx/CVE-2025-39205.json) (`2025-06-24T13:15:22.470`)
- [CVE-2025-6424](CVE-2025/CVE-2025-64xx/CVE-2025-6424.json) (`2025-06-24T13:15:23.273`)
- [CVE-2025-6425](CVE-2025/CVE-2025-64xx/CVE-2025-6425.json) (`2025-06-24T13:15:23.403`)
- [CVE-2025-6426](CVE-2025/CVE-2025-64xx/CVE-2025-6426.json) (`2025-06-24T13:15:23.537`)
- [CVE-2025-6427](CVE-2025/CVE-2025-64xx/CVE-2025-6427.json) (`2025-06-24T13:15:23.650`)
- [CVE-2025-6428](CVE-2025/CVE-2025-64xx/CVE-2025-6428.json) (`2025-06-24T13:15:23.770`)
- [CVE-2025-6429](CVE-2025/CVE-2025-64xx/CVE-2025-6429.json) (`2025-06-24T13:15:23.877`)
- [CVE-2025-6430](CVE-2025/CVE-2025-64xx/CVE-2025-6430.json) (`2025-06-24T13:15:23.993`)
- [CVE-2025-6431](CVE-2025/CVE-2025-64xx/CVE-2025-6431.json) (`2025-06-24T13:15:24.103`)
- [CVE-2025-6432](CVE-2025/CVE-2025-64xx/CVE-2025-6432.json) (`2025-06-24T13:15:24.220`)
- [CVE-2025-6433](CVE-2025/CVE-2025-64xx/CVE-2025-6433.json) (`2025-06-24T13:15:24.327`)
- [CVE-2025-6434](CVE-2025/CVE-2025-64xx/CVE-2025-6434.json) (`2025-06-24T13:15:24.447`)
- [CVE-2025-6435](CVE-2025/CVE-2025-64xx/CVE-2025-6435.json) (`2025-06-24T13:15:24.560`)
- [CVE-2025-6436](CVE-2025/CVE-2025-64xx/CVE-2025-6436.json) (`2025-06-24T13:15:24.677`)
- [CVE-2025-6565](CVE-2025/CVE-2025-65xx/CVE-2025-6565.json) (`2025-06-24T13:15:24.790`)
- [CVE-2025-6566](CVE-2025/CVE-2025-65xx/CVE-2025-6566.json) (`2025-06-24T13:15:25.057`)
- [CVE-2025-27827](CVE-2025/CVE-2025-278xx/CVE-2025-27827.json) (`2025-06-24T14:15:28.050`)
- [CVE-2025-27828](CVE-2025/CVE-2025-278xx/CVE-2025-27828.json) (`2025-06-24T14:15:28.200`)
- [CVE-2025-32975](CVE-2025/CVE-2025-329xx/CVE-2025-32975.json) (`2025-06-24T15:15:23.710`)
- [CVE-2025-32976](CVE-2025/CVE-2025-329xx/CVE-2025-32976.json) (`2025-06-24T15:15:23.930`)
- [CVE-2025-32977](CVE-2025/CVE-2025-329xx/CVE-2025-32977.json) (`2025-06-24T15:15:24.063`)
- [CVE-2025-32978](CVE-2025/CVE-2025-329xx/CVE-2025-32978.json) (`2025-06-24T15:15:24.260`)
- [CVE-2025-36537](CVE-2025/CVE-2025-365xx/CVE-2025-36537.json) (`2025-06-24T15:15:24.453`)
- [CVE-2025-5318](CVE-2025/CVE-2025-53xx/CVE-2025-5318.json) (`2025-06-24T14:15:30.523`)
- [CVE-2025-6032](CVE-2025/CVE-2025-60xx/CVE-2025-6032.json) (`2025-06-24T14:15:30.703`)
- [CVE-2025-6567](CVE-2025/CVE-2025-65xx/CVE-2025-6567.json) (`2025-06-24T15:15:25.623`)
- [CVE-2025-6568](CVE-2025/CVE-2025-65xx/CVE-2025-6568.json) (`2025-06-24T15:15:25.823`)
- [CVE-2025-6569](CVE-2025/CVE-2025-65xx/CVE-2025-6569.json) (`2025-06-24T15:15:26.017`)
### CVEs modified in the last Commit
Recently modified CVEs: `11`
Recently modified CVEs: `37`
- [CVE-2023-1932](CVE-2023/CVE-2023-19xx/CVE-2023-1932.json) (`2025-06-24T13:07:42.087`)
- [CVE-2024-47796](CVE-2024/CVE-2024-477xx/CVE-2024-47796.json) (`2025-06-24T13:47:04.127`)
- [CVE-2024-51379](CVE-2024/CVE-2024-513xx/CVE-2024-51379.json) (`2025-06-24T13:28:19.803`)
- [CVE-2024-51380](CVE-2024/CVE-2024-513xx/CVE-2024-51380.json) (`2025-06-24T13:22:14.297`)
- [CVE-2024-51381](CVE-2024/CVE-2024-513xx/CVE-2024-51381.json) (`2025-06-24T13:20:52.710`)
- [CVE-2024-51382](CVE-2024/CVE-2024-513xx/CVE-2024-51382.json) (`2025-06-24T13:13:53.583`)
- [CVE-2024-51504](CVE-2024/CVE-2024-515xx/CVE-2024-51504.json) (`2025-06-24T12:27:49.960`)
- [CVE-2024-52333](CVE-2024/CVE-2024-523xx/CVE-2024-52333.json) (`2025-06-24T13:44:55.670`)
- [CVE-2025-3576](CVE-2025/CVE-2025-35xx/CVE-2025-3576.json) (`2025-06-24T13:15:22.657`)
- [CVE-2025-48797](CVE-2025/CVE-2025-487xx/CVE-2025-48797.json) (`2025-06-24T13:15:22.917`)
- [CVE-2025-48798](CVE-2025/CVE-2025-487xx/CVE-2025-48798.json) (`2025-06-24T13:15:23.123`)
- [CVE-2025-39203](CVE-2025/CVE-2025-392xx/CVE-2025-39203.json) (`2025-06-24T14:15:29.410`)
- [CVE-2025-39204](CVE-2025/CVE-2025-392xx/CVE-2025-39204.json) (`2025-06-24T14:15:29.553`)
- [CVE-2025-39205](CVE-2025/CVE-2025-392xx/CVE-2025-39205.json) (`2025-06-24T14:15:29.707`)
- [CVE-2025-4867](CVE-2025/CVE-2025-48xx/CVE-2025-4867.json) (`2025-05-19T13:35:20.460`)
- [CVE-2025-52879](CVE-2025/CVE-2025-528xx/CVE-2025-52879.json) (`2025-06-24T15:15:25.180`)
- [CVE-2025-6125](CVE-2025/CVE-2025-61xx/CVE-2025-6125.json) (`2025-06-17T20:50:23.507`)
- [CVE-2025-6126](CVE-2025/CVE-2025-61xx/CVE-2025-6126.json) (`2025-06-17T20:50:23.507`)
- [CVE-2025-6127](CVE-2025/CVE-2025-61xx/CVE-2025-6127.json) (`2025-06-17T20:50:23.507`)
- [CVE-2025-6153](CVE-2025/CVE-2025-61xx/CVE-2025-6153.json) (`2025-06-17T20:50:23.507`)
- [CVE-2025-6154](CVE-2025/CVE-2025-61xx/CVE-2025-6154.json) (`2025-06-17T20:50:23.507`)
- [CVE-2025-6155](CVE-2025/CVE-2025-61xx/CVE-2025-6155.json) (`2025-06-17T20:50:23.507`)
- [CVE-2025-6156](CVE-2025/CVE-2025-61xx/CVE-2025-6156.json) (`2025-06-17T20:50:23.507`)
- [CVE-2025-6157](CVE-2025/CVE-2025-61xx/CVE-2025-6157.json) (`2025-06-17T20:50:23.507`)
- [CVE-2025-6410](CVE-2025/CVE-2025-64xx/CVE-2025-6410.json) (`2025-06-24T14:51:28.207`)
- [CVE-2025-6411](CVE-2025/CVE-2025-64xx/CVE-2025-6411.json) (`2025-06-24T14:51:00.910`)
- [CVE-2025-6412](CVE-2025/CVE-2025-64xx/CVE-2025-6412.json) (`2025-06-24T14:45:30.210`)
- [CVE-2025-6413](CVE-2025/CVE-2025-64xx/CVE-2025-6413.json) (`2025-06-24T14:44:44.467`)
- [CVE-2025-6414](CVE-2025/CVE-2025-64xx/CVE-2025-6414.json) (`2025-06-24T14:43:54.553`)
- [CVE-2025-6415](CVE-2025/CVE-2025-64xx/CVE-2025-6415.json) (`2025-06-24T14:42:25.020`)
- [CVE-2025-6416](CVE-2025/CVE-2025-64xx/CVE-2025-6416.json) (`2025-06-24T14:42:10.153`)
- [CVE-2025-6417](CVE-2025/CVE-2025-64xx/CVE-2025-6417.json) (`2025-06-24T14:41:39.197`)
- [CVE-2025-6435](CVE-2025/CVE-2025-64xx/CVE-2025-6435.json) (`2025-06-24T14:15:30.930`)
- [CVE-2025-6517](CVE-2025/CVE-2025-65xx/CVE-2025-6517.json) (`2025-06-24T14:15:31.093`)
- [CVE-2025-6535](CVE-2025/CVE-2025-65xx/CVE-2025-6535.json) (`2025-06-24T14:15:31.237`)
- [CVE-2025-6551](CVE-2025/CVE-2025-65xx/CVE-2025-6551.json) (`2025-06-24T14:15:31.390`)
## Download and Usage

View File

@ -166187,7 +166187,7 @@ CVE-2021-1466,0,0,73d1ab1dba7b93614d4456f7c4154a9051b3311fd597548613460e253f8816
CVE-2021-1467,0,0,37cd1b0388d59a074ae1b248547247cab652ecdcf418f496874b46d7894f4fea,2024-11-21T05:44:25.383000
CVE-2021-1468,0,0,94dddc2bb33a1a5bbdd2a5ca364627e60173fbecdf4e1a69011a7fe666c23acd,2024-11-21T05:44:25.520000
CVE-2021-1469,0,0,a249832e104b4956ca7a008b4b77116e8fcef6bd075ba8cd8efd905250eb8669,2024-11-21T05:44:25.653000
CVE-2021-1470,0,0,b19148fbd05428a7d79b2eb78a799c57c7354cff2b4c3978a4cd26e7b68edaba,2024-11-18T17:11:56.587000
CVE-2021-1470,0,1,09e4dd6b2e446f18539553f94e26fb568c68e227569336aba0d18492575bb1fa,2024-11-18T17:11:56.587000
CVE-2021-1471,0,0,d8e00b3f829fdaca83472335b9607fb434f6533d18f09e893d5e153481995271,2024-11-21T05:44:25.900000
CVE-2021-1472,0,0,cb714db37398c37a1853461ae4302afc31c17d76f152f27fa18411a5240b948b,2024-11-21T05:44:26.040000
CVE-2021-1473,0,0,d51b1ce3c7393305aafcc238a46d576cb7b56fe45fcc65110bb32c966ff5cc45,2024-11-21T05:44:26.183000
@ -190604,7 +190604,7 @@ CVE-2022-20681,0,0,280bf92419fd301fbd908288efb43ca833598900fb53a9b6250a1ec7dddf6
CVE-2022-20682,0,0,1fa71ee857c33f00b556e052007e94caeb65b734be0c94eb81a75c820f03cb63,2024-11-21T06:43:18.730000
CVE-2022-20683,0,0,8bc8a3d3cd8a40fc693531753717605296f704be039710d68f204e467f0b5ea0,2024-11-21T06:43:18.867000
CVE-2022-20684,0,0,ab63b4c838f302c6526c81b8e341f0cfda8c2f5e8bb923caf295f3412a9c5f06,2024-11-21T06:43:19.027000
CVE-2022-20685,0,0,500acd8f1d43926f0473c0f9c1ad055cef4f8bcf6dada43df171deec7fa1cdce,2025-01-27T18:15:29.790000
CVE-2022-20685,0,1,930be8372472d203f80fb02efe0d59c887f0f68be43d0a352ad378ebbe4db2f1,2025-01-27T18:15:29.790000
CVE-2022-20686,0,0,600b7ff1394c351d716cddf546c26028d7ecb7ef8b18801ac32a7123861efb3c,2024-11-21T06:43:19.270000
CVE-2022-20687,0,0,5d18dbdb3617cc3203763429f5c75eebd258fe4458168c096533f5288bbfb8f0,2024-11-21T06:43:19.417000
CVE-2022-20688,0,0,6528ed176b6b729cf5d0d6c83ec1e5efbd5de1b84c9c813ad67aa56478111cbb,2024-11-21T06:43:19.557000
@ -216552,7 +216552,7 @@ CVE-2023-1928,0,0,8763c818f493e7271a7087e59be9778bb487db7538d460e423ab7153b6d87e
CVE-2023-1929,0,0,204c57af056c484d5462acf184d2d8cd9606d5fba79de55bddd06a7bd216efe8,2024-11-21T07:40:09.467000
CVE-2023-1930,0,0,c8e908b38326d5b4768b11783dc2c91330770349492af5fc20a4ad3bddbab7b8,2024-11-21T07:40:09.570000
CVE-2023-1931,0,0,0b288b22bb931e38df7fce760f61fdcf70cd6b924be176d1f6a2a1416a4b0ebd,2024-11-21T07:40:09.670000
CVE-2023-1932,0,1,47a066350b4f3c7af8c5bca8c9e72e8a22b5fbbd242580e75ffd53ad0e4afa44,2025-06-24T13:07:42.087000
CVE-2023-1932,0,0,47a066350b4f3c7af8c5bca8c9e72e8a22b5fbbd242580e75ffd53ad0e4afa44,2025-06-24T13:07:42.087000
CVE-2023-1934,0,0,1969e80b4d23640cff91a76a5a1f40d91535e51ecd25ec64ce83f2b09cebf529,2025-02-13T17:16:00.967000
CVE-2023-1935,0,0,ef36ae8e60a399ff6480df6d7ac2a28a7a5d41184ed75ae8a4bccc47508f9fea,2024-11-21T07:40:09.973000
CVE-2023-1936,0,0,04e4ee886165d2604590b79afe266663161903b8f56eed90e8ad2e74b29f605c,2024-11-21T07:40:10.853000
@ -271705,7 +271705,7 @@ CVE-2024-47791,0,0,71a59e4b7f657785b7efb1d1c710d18d9ab869da4b56d86c25790c7b8675e
CVE-2024-47793,0,0,882b9f21365001a1bbe1427d7ecd7686f09cb53c26df041c802a57c5badf616d,2024-10-21T21:25:36.697000
CVE-2024-47794,0,0,5f08b59a295e74bd759bb3415b51927fbe86f46c8a55f75f87047c201f0f2904,2025-01-11T13:15:22.390000
CVE-2024-47795,0,0,10e9418b0b5a0bf5163545d663192273bb472168c5c5fefe85382cb82093049c,2025-05-16T14:43:56.797000
CVE-2024-47796,0,1,03d29b641c26b81d3c5622c5eee6943c23acfb19588990f033695e199f730d96,2025-06-24T13:47:04.127000
CVE-2024-47796,0,0,03d29b641c26b81d3c5622c5eee6943c23acfb19588990f033695e199f730d96,2025-06-24T13:47:04.127000
CVE-2024-47797,0,0,1db7c191d78a0c4eb63d4cdd8fe193396dc3e7794237bd9d846daea68af0e9f7,2024-11-06T15:24:53.210000
CVE-2024-47799,0,0,c3938335baae6d700a63faf82e2306985214819a9aa9e9a31818efb7cbeda4db,2024-11-12T13:55:21.227000
CVE-2024-4780,0,0,d587053157d7c17d807fe8569feada4a245f1bae752836389b387fd0d926bac1,2024-11-21T09:43:35.980000
@ -274259,11 +274259,11 @@ CVE-2024-5137,0,0,14cc0e878710b854541124ba59367506c2de95b027aa7063332dbde02ef14e
CVE-2024-51376,0,0,f700ac102ba582e72dbdc7fed72c59b433027ff0357273ca7f73e1576035ebe0,2025-02-13T21:15:15.083000
CVE-2024-51377,0,0,454a574f7d41cec5c0e5592441622f9e1eef9cc67c58f07bfdfa7571c5635b7b,2024-11-14T23:23:52.997000
CVE-2024-51378,0,0,60b518476e0f52f1f42de1d9edd060a172f8f183ad7a51b636d39c5e7781b145,2024-12-06T18:17:17.377000
CVE-2024-51379,0,1,200743168a58cf06cbc21ee80028535533bc9bb74492051502e8c5fff5286cff,2025-06-24T13:28:19.803000
CVE-2024-51379,0,0,200743168a58cf06cbc21ee80028535533bc9bb74492051502e8c5fff5286cff,2025-06-24T13:28:19.803000
CVE-2024-5138,0,0,140f774b20fa807afb7fb688713e1cf4fd50bd4b8c4c7cf0bda80526ec06f84f,2024-11-21T09:47:03.263000
CVE-2024-51380,0,1,29d60b6fd2ac7c648bf078ce05d2242586dad9e027af28bd62240a434d3c55fb,2025-06-24T13:22:14.297000
CVE-2024-51381,0,1,ec2f6b9867725fdc19efd7a1013e38218fbe428ee1337cbf0242dc13d601bd43,2025-06-24T13:20:52.710000
CVE-2024-51382,0,1,63e400f9d77f048ee2deef865d5f75efebba7225ec79595bcabf65e0fd3658e7,2025-06-24T13:13:53.583000
CVE-2024-51380,0,0,29d60b6fd2ac7c648bf078ce05d2242586dad9e027af28bd62240a434d3c55fb,2025-06-24T13:22:14.297000
CVE-2024-51381,0,0,ec2f6b9867725fdc19efd7a1013e38218fbe428ee1337cbf0242dc13d601bd43,2025-06-24T13:20:52.710000
CVE-2024-51382,0,0,63e400f9d77f048ee2deef865d5f75efebba7225ec79595bcabf65e0fd3658e7,2025-06-24T13:13:53.583000
CVE-2024-51392,0,0,c28913cf9578463f4763dccada8773c2d0b70c039999d2c8d3d568551fd804da,2025-05-30T16:31:03.107000
CVE-2024-51398,0,0,cea8f8f4881380dbaa2cfe732dffbd060c56c48b06b04f4d982be54dbdad46e4,2024-11-05T18:35:17.420000
CVE-2024-51399,0,0,7797cfea236d02f4c030090ec48621397eecdb65349aff9b28f04a876b406896,2024-11-05T18:35:18.260000
@ -274343,7 +274343,7 @@ CVE-2024-51500,0,0,9f79bcd5037557dd7e0cb267397d832d1535c16ed992bdeffa51cc73eef4d
CVE-2024-51501,0,0,b585036c51d67ee5dc1d50b01aef95445cf1220ae53ecc21ca9038c2aa3d0733,2024-11-08T16:15:50.200000
CVE-2024-51502,0,0,d7dbefbfb53dbcc55361828d1af8973baaef8a002ed3b6e965f9f646792737a2,2024-11-21T17:15:22.737000
CVE-2024-51503,0,0,e1b49616d4a00e7d7d3cfa9d7aea7e4c02706f35f12a6b64bc3311e1675452c3,2024-11-19T21:56:45.533000
CVE-2024-51504,0,1,18454e061ade7d61b8dd21d70902e9da78dc1967ff68c671bd62b476c8e160fd,2025-06-24T12:27:49.960000
CVE-2024-51504,0,0,18454e061ade7d61b8dd21d70902e9da78dc1967ff68c671bd62b476c8e160fd,2025-06-24T12:27:49.960000
CVE-2024-51505,0,0,59a9c27ff1aa6293764a1805d129d78b3200f41b807deae85bed614c1c751bd1,2025-02-18T18:15:26.420000
CVE-2024-51506,0,0,0f188b847dff5756f20c14ac8f67f7dd3df9f93024ac2a0910692ac01579c55b,2025-06-03T14:53:08.277000
CVE-2024-51507,0,0,30943843e052c701df27f4a2af3e73dbcc49ed636de642936e8481f479bbdf57,2025-06-03T14:55:25.300000
@ -274989,7 +274989,7 @@ CVE-2024-5233,0,0,749403088352361e2986fc2566426aafc544613446ac5fd3ac82ce8b947196
CVE-2024-52330,0,0,b205d5d2afaa38c34428a1eeef7e76ca6fed50de8ad2e5a1eac6a8c24e6f1ff8,2025-01-23T17:15:14.427000
CVE-2024-52331,0,0,180e174e5208ca4d900653122ec4e97c4ab3215251616b3d737907effe366848,2025-01-23T17:15:14.563000
CVE-2024-52332,0,0,58837c5feb4aa8da96238f281eca729502def4e6f29469edf4244234ba0fc606,2025-01-11T13:15:25.070000
CVE-2024-52333,0,1,b7d0f71813f948324a406290fa6ccd1c978c2190104ced6f812939e57d54f6b3,2025-06-24T13:44:55.670000
CVE-2024-52333,0,0,b7d0f71813f948324a406290fa6ccd1c978c2190104ced6f812939e57d54f6b3,2025-06-24T13:44:55.670000
CVE-2024-52335,0,0,dd4f62d353da42f6dc7115815924c982f0175669a07ab002418fb12d6de291f2,2024-12-06T14:15:21.230000
CVE-2024-52336,0,0,b6e9b11addff6749adae872dd38056b35e5782b328e6ea56a9be94620e0c21ab,2025-02-03T20:15:33.123000
CVE-2024-52337,0,0,1ac7c50918581434060258b6237ca41183133897d488a97678a496cbf023aa66,2025-02-25T12:15:31
@ -277407,7 +277407,7 @@ CVE-2024-5610,0,0,c876fccd541dbbe5edac90b3257f7d2b3efde4d5bff83326921f06d03b7a38
CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000
CVE-2024-56112,0,0,9c37554a9e3e8121be632deb2b2e9ed13eeb0233b63a1c1f431c838fba55a392,2024-12-16T16:15:10.313000
CVE-2024-56113,0,0,c2004a54de70b831a98d60d2c2fb6bca131b530775b8918ef6395e30cd829051,2025-01-23T18:15:32.603000
CVE-2024-56114,0,0,80b97861862ba12f51aa4e46485551b632a0c2a52df86bcb564294ea58a1f8c7,2025-01-16T19:15:28.787000
CVE-2024-56114,0,1,edcf852199e0cd801e3ae938f8e870bfbcdb97c2eab2d9e5d6d32c5828fdd5a3,2025-01-16T19:15:28.787000
CVE-2024-56115,0,0,17cd74ad25051a45f91521081be96f78ec43985fc62b9893fc5da74912ce6906,2025-04-23T21:33:33.170000
CVE-2024-56116,0,0,e8aea0c63708e7b9ae4ad86601eeb2e56348e008753c0c18fd2bb0a490431bf6,2025-04-23T21:34:38.623000
CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000
@ -284124,7 +284124,7 @@ CVE-2025-1712,0,0,b94d0190ebdb3831769a5867dbc038d4d7585fa2490152c1e878c7d5a70443
CVE-2025-1714,0,0,6e67e5fe1ad7d1f8ea60e413f9fa7e7e2f63bd8d4c4369040436660c144fa80c,2025-03-07T05:15:16.233000
CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d41,2025-03-03T16:15:39.520000
CVE-2025-1717,0,0,3d4f0d449e7852a9bab717d0d55b537c9dc57d522d200e81bab92be20a7c833d,2025-03-11T16:12:42.783000
CVE-2025-1718,1,1,254cd868400522121cc41a81158cb75e8ca4970550a9cd680981ee7f4e122c33,2025-06-24T13:15:21.547000
CVE-2025-1718,0,1,6d0a145d557996297ca811dce1e9777bace02acfc8140401301ce1a24f26950e,2025-06-24T14:15:27.847000
CVE-2025-1723,0,0,c7576768b3fcdf2c172cabd995356c9a4e187202d556f18e62eeaf91cbbf52b2,2025-03-03T08:15:15.717000
CVE-2025-1724,0,0,b8e86d6fa70198b5cc9fe6224a04663cb9564b5f8c33fbf347cdad07f13847ed,2025-03-17T07:15:33.467000
CVE-2025-1725,0,0,c49b8d1c27e2c6728ab571d7d9ee0274a46175f957660be0c5aa759fde493bd7,2025-06-04T14:54:33.783000
@ -287550,7 +287550,7 @@ CVE-2025-24026,0,0,851a3bf68c954484658a3468537933c8ee28750382a531089af82c153a4aa
CVE-2025-24027,0,0,7aafd16a9bde691788eff3c983eb76660cc50c899ff68b8c3f8ccfb1cc458ed4,2025-01-22T15:15:27.090000
CVE-2025-24028,0,0,545c071838c816be977c3520d8d21408e612d6f5f92969ce1c4368203cb04b22,2025-04-18T01:57:17.133000
CVE-2025-24029,0,0,78ccc702bd5d12fe713f342eb01497f1004c6f35d754359834f77e673529d847,2025-02-03T22:15:28.320000
CVE-2025-2403,1,1,f5056a4da79b936d803f5f9b3c662f9cb45c3707feab2a244ec3003b84f14580,2025-06-24T12:15:20.863000
CVE-2025-2403,0,1,922dc374a649eb9a1795e8b830be58e7133f61414894da64a4c520128e51690d,2025-06-24T14:15:28.330000
CVE-2025-24030,0,0,53ed9f8c2f1606c3ac2d0893d8b45d45add03d54f0c0cb325356c13a37ba8b27,2025-01-23T04:15:07.100000
CVE-2025-24031,0,0,f001af7155fa77b1de37ced441ee4e39c1454b911ef9ca1ee83e5bda55f8dc14,2025-02-10T16:15:38.990000
CVE-2025-24032,0,0,1178a4dc66e28f37c78bc3ebc36c9a48c540f3ad31de8ebddc9029a3c39156bd,2025-05-21T16:15:30.827000
@ -290203,6 +290203,8 @@ CVE-2025-27823,0,0,ae3d83d8b696c6651ddc09be1ef36d15fa5d89a5eeb42b0a2ba26ad0db25f
CVE-2025-27824,0,0,2d002361cc885b5990daf4c3973db9ef130ec1a7bfde36407db01c4a68cfa628,2025-03-07T22:15:38.220000
CVE-2025-27825,0,0,204298b7de8459d92cd5ca573fe552fd0eb50c7361c94c6261df8c437005a654,2025-03-07T22:15:38.380000
CVE-2025-27826,0,0,1af8c747c5098697d6723ab302d54ea95cbfca134be905c245ce43480244837e,2025-03-07T22:15:38.527000
CVE-2025-27827,1,1,5b3ba326fa4303e1f16d5e10eab4ee203d2f4b406490542503a551359ca434e6,2025-06-24T15:15:23
CVE-2025-27828,1,1,dba5fd6802450b24a8c6dc40028328c85e74ec93354031d5ad5d4eefc139c69a,2025-06-24T15:15:23.267000
CVE-2025-27829,0,0,9ae86cabd1b5a8793e47645f5ed6e4bec7bf508d33296df63c4497b12aa63bd8,2025-04-14T18:15:28.697000
CVE-2025-2783,0,0,cac125e06bdfcf5101179da397d83671a8e22970d5207dd362f2ac73d6465a33,2025-03-28T01:00:02.260000
CVE-2025-27830,0,0,da10ce085c8af9893377a339d8c2cf0db7181ab295e76a10e0b8a5e6254179ce,2025-04-01T16:44:47.883000
@ -290364,7 +290366,7 @@ CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e
CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18
CVE-2025-28256,0,0,c16943b644cdad0f362ff940632bf3b431153c240410202f1016e53c5c3bd875,2025-04-14T17:06:52.373000
CVE-2025-2826,0,0,73d45c19b2e4c3bc4d80772bd5509ff4acb0a98a2510975df320963b1c203a94,2025-05-28T15:01:30.720000
CVE-2025-2828,0,0,4dc8c084884ef5b69b766a3edf30d3b934591e561b9cb7ae7c931516c27ac379,2025-06-23T21:15:25.210000
CVE-2025-2828,0,1,5dcd8fb6602d0a5a28886880344c032e2bbe46511d3d7578cfc919bbf94a1b7a,2025-06-24T14:15:28.490000
CVE-2025-2829,0,0,059a0cf4c937544428f8f9992f350ccef1c580a6c89e3bad6c17d91e38c4aa72,2025-04-08T18:13:53.347000
CVE-2025-2830,0,0,44fbd6035d3d2cc03539fdc4859074e0483d9335c2d68a4a16795d3b39b2fa35,2025-06-18T13:37:00.120000
CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed85834a,2025-04-11T17:00:07.067000
@ -293420,10 +293422,10 @@ CVE-2025-32871,0,0,0858782c82e95a39be97e7ffdc176ada44bec9377cc23b99d288083a9a1b8
CVE-2025-32872,0,0,a6acd2c4749d25af3a9674e470b92f66756a824f6626eef20d9bf26ef8cf4544,2025-04-17T20:21:48.243000
CVE-2025-32873,0,0,f7d763f6cf9dd2dd2fc4fd446f09dcd8aecf88b16e7b9cbc3c04e6b52caefba3,2025-06-17T19:44:20.957000
CVE-2025-32875,0,0,ef16cc45f9d463b891fcccd40892c4fbe4ce3dc0b696a29a1045a30b036ebb7c,2025-06-23T20:16:40.143000
CVE-2025-32876,0,0,d0c5dacb199f8bb490576d803a2540d8d367a87fa8e046871ecfa2850d2ecade,2025-06-23T20:16:40.143000
CVE-2025-32876,0,1,b359294b619c26c8351a299d7818957dd391eeaf6565d3672638043e8443c0e5,2025-06-20T14:15:27.877000
CVE-2025-32877,0,0,74607664ebbbbcceb329bf3374e41935fdbdb1b26282ce7b04b4015abab39cd7,2025-06-23T20:16:40.143000
CVE-2025-32878,0,0,b43ea98c820eba767a823504fa14736ae60799328c6d58085470cd470347b3e1,2025-06-23T20:16:40.143000
CVE-2025-32879,0,0,6b56549ac1cf6dfd0b2a41dc233d9b457d1d16d3a502b5db7f1cfdf2c8d42266,2025-06-23T20:16:40.143000
CVE-2025-32879,0,1,d6389a00aca6f8d6250c1180546d76508f1e89722e323785ad1a9d5739f227fb,2025-06-20T14:15:28.783000
CVE-2025-3288,0,0,f38b6103c86e4b43a603efa2302f1894dd9c86a56576c13140616463a055f77c,2025-04-08T18:13:53.347000
CVE-2025-32880,0,0,908f205c48f4ce6ec052266214a72cc2adc228fe98b67d23faadb405e9192759,2025-06-23T20:16:40.143000
CVE-2025-32881,0,0,2e6693087c6469e2e3ed7d14a7bafcb787b21e7f52bc589483e80625632ed3de,2025-06-20T16:53:44.603000
@ -293505,6 +293507,10 @@ CVE-2025-32971,0,0,5487e79975fb0abb9378187756241a4603127b98b0de118af3bf155fc0457
CVE-2025-32972,0,0,f920511713bca3379924622d60cbe669c2136f54d45d25f9a06a402b14d9c31a,2025-05-13T15:05:07.237000
CVE-2025-32973,0,0,f240c0c82a1f9443b1a09de6c7f01c454aa45175be7a1efc3f550e2af9ed0e46,2025-05-13T14:58:48.890000
CVE-2025-32974,0,0,212ebce768fe1e6e3809501bd5b1c16e6076b1bd5655a4578512b867f7767f49,2025-05-13T14:55:03.707000
CVE-2025-32975,1,1,d407c389f501a62ed1abc8ff0569ea2244d7e6c665fd13048e07cb0b7ab5ca77,2025-06-24T15:15:23.710000
CVE-2025-32976,1,1,50002b2a08f283c271ee34483a954e057fa085bc870be4cb5abede59cb3e6deb,2025-06-24T15:15:23.930000
CVE-2025-32977,1,1,636e65234014fe9ce99deefc49b4066edbec4880a58263af1e963d32340e786f,2025-06-24T15:15:24.063000
CVE-2025-32978,1,1,77a786818286aff3233be916932d06ae584781a8e48fdca955b071b9bf67c519,2025-06-24T15:15:24.260000
CVE-2025-32979,0,0,64a29053417365e3bc807f310a7262b7a642ecb58a326e442c57ce048a184d74,2025-05-27T16:58:18.660000
CVE-2025-3298,0,0,42b3c11a03b3e330acf149137409814de4838d8396b46617a725d88596b9ad1f,2025-04-08T16:49:00.290000
CVE-2025-32980,0,0,ecd87f951455efbd2f051fc9c63fa88d716a4beefc941d871df4d77e37aa2f94,2025-05-09T17:15:51.220000
@ -293676,8 +293682,8 @@ CVE-2025-34031,0,0,a83a89ead5008a99e70e59878287331f19ed475018e97ea254d5a6edcad82
CVE-2025-34032,0,0,1662c51249658a2df2b7fe7125b51d9c24492c5099a19327f9c89f372b8d7c6f,2025-06-24T03:15:32.987000
CVE-2025-34033,0,0,efbb2094e27eadf32cf2e2b87f771d72dc8ffd0952a128e2c253c810271eb5fe,2025-06-24T03:15:33.090000
CVE-2025-34034,0,0,9349522151798c41468e27385e7fbe77af654ab0fc85de66c1e4f22953696889,2025-06-24T03:15:33.193000
CVE-2025-34035,0,0,ce2721f03a0b278f0cc26f99ff904d9fab13fc67019d936b442cf9447da7781d,2025-06-24T03:15:33.293000
CVE-2025-34036,0,0,6b7350c61be49a76f76dc5d944c8fd7a529dcca7640facf7eca714339387463d,2025-06-24T01:15:24.903000
CVE-2025-34035,0,1,875b7d990fc0620b461d78bcd5eb0a7cc37310985a6cc30d439b019a31ebffaa,2025-06-24T14:15:28.820000
CVE-2025-34036,0,1,bf1ed7abf4ceff89d0043a51f6a47cfdcefc55033dd2180ec67b70376832b568,2025-06-24T14:15:28.953000
CVE-2025-34037,0,0,57a7e6a6846827b91b7736feffed008814a2f3414dc595a6f1c81aa1a94cc3f7,2025-06-24T03:15:33.400000
CVE-2025-34038,0,0,d6d8009e58294a673d7d0c556296273a5a5d83087c8fbf680e06184934d5f96d,2025-06-24T03:15:33.507000
CVE-2025-34039,0,0,33065581e59fb510332e7c56f1b2c71b818ba8cafc063bc369ac3087f87d0806,2025-06-24T02:15:22.540000
@ -293846,7 +293852,7 @@ CVE-2025-3572,0,0,85452ae8a7fdcd086072bc1a78d977cf0bc1d5dd6fa9f5553989fa8c8fb7fd
CVE-2025-3573,0,0,095399568374006bc1e93d539eebcb743d7cc965cdc4a121e4480938fddae558,2025-04-15T18:39:27.967000
CVE-2025-3574,0,0,94473ff233af08be74c232281156bfa5db699f8872e1802977040bd9e36c2d62,2025-04-15T18:39:27.967000
CVE-2025-3575,0,0,73e2cf1e3fbb3ccb86ef07985e1084456954c5cbbd5b3215dbed3da8318cbbf4,2025-04-15T18:39:27.967000
CVE-2025-3576,0,1,957bbbebfac26fb5d2c366a1581678e2e0c111337065d1b5061024ff1fcc5960,2025-06-24T13:15:22.657000
CVE-2025-3576,0,0,957bbbebfac26fb5d2c366a1581678e2e0c111337065d1b5061024ff1fcc5960,2025-06-24T13:15:22.657000
CVE-2025-3577,0,0,56629bd7e990c7a0d492f7fcbfe38c7580cf294d9e5db776d3fa189b9e593731,2025-06-23T19:29:59.393000
CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000
CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000
@ -293930,6 +293936,7 @@ CVE-2025-36525,0,0,304058dc6057ec0d8f22d43f92f7c943e71e5e18bc158b199ea34013a3ed4
CVE-2025-36527,0,0,760bc907999d36f8a046dc03eb19c07cc3891fbdfc35cb8c53858aa720a6ac60,2025-06-16T15:15:28.320000
CVE-2025-36528,0,0,8cc5e94db4f898b6df57b60f4eabfb85cbf2d0b38d981f1163ef01852ec4f727,2025-06-16T15:14:39.797000
CVE-2025-36535,0,0,c9bb02422d586f784be4fd92873208eebb00e7be6f50c78d2e7b7d5656e18b71,2025-05-21T20:24:58.133000
CVE-2025-36537,1,1,537d9428fe6d511877f1732e2599f4649461561b08464759f0ce4098dd36210b,2025-06-24T15:15:24.453000
CVE-2025-36539,0,0,c0894e36c5a4bf5ae06107887e6e7bc4869da6fc581815f366cc900be9ce130c,2025-06-16T12:32:18.840000
CVE-2025-36546,0,0,a3d190116ff33d28a9568351832ce70c70aecf8ab001cfb216ed0ea5695cb9ef,2025-05-08T14:39:09.683000
CVE-2025-36557,0,0,10d4b26bd4092d9203a2e113b056bea851721ed63eca24b2006dce264ace1ecf,2025-05-08T14:39:09.683000
@ -294530,11 +294537,11 @@ CVE-2025-3916,0,0,045ece3601bd5ccbedc31ea0240de6aa0afd0b9d1478dcdfa2e80b8a58fde7
CVE-2025-3917,0,0,c5171151eebd44803f90dc57bca3ca581e3f3a3b4495aa64f3e44a3933917ede,2025-05-16T14:43:26.160000
CVE-2025-3918,0,0,63b01e62f8046021d2f78807719fa3fd3623a650f7755e4a8a67c57ed80094c1,2025-05-05T20:54:19.760000
CVE-2025-3919,0,0,a87264f5c964c1b9f0e2df5faae10e0481d418f0fb1502b0ee9da33cc507ee91,2025-06-04T14:54:33.783000
CVE-2025-39201,1,1,02cfed698ec42683688284364461ec516c3f201fff787dca36f4bfac3388505d,2025-06-24T12:15:21.050000
CVE-2025-39202,1,1,1ceb79e8683ca8b86085aee73b52d64a9420063a94a3ec0231aac3d6010adcd4,2025-06-24T12:15:21.200000
CVE-2025-39203,1,1,105effc7d2cc0a50f2f8a11eccb1fa8d014885672d5e0acca9751a293116274a,2025-06-24T12:15:21.380000
CVE-2025-39204,1,1,f9db2ea96e48656857748f0dcd014508d330f37fae87d14bc9db98d65bd1cdfe,2025-06-24T12:15:21.523000
CVE-2025-39205,1,1,c2e8c085466724619991e0074af53a5491b0f8345d0c2e7edce628b578d4c3f8,2025-06-24T13:15:22.470000
CVE-2025-39201,0,1,2a2b705d59d2db641dc13896dc38ae8450e764fe971fa82649b4efcaee535293,2025-06-24T14:15:29.090000
CVE-2025-39202,0,1,378620856d3c2a1e2dda8cb9c122f4cdb4c98bfce82101c988da7af28b6db22c,2025-06-24T14:15:29.253000
CVE-2025-39203,0,1,8a03c141ca6cca748bcd6d5053974606d53be79d7d4fff4e1c4a8a5351c52e71,2025-06-24T14:15:29.410000
CVE-2025-39204,0,1,9a86a2eece1fba5610daf326fe4a9156f29d653dff3ac1a91dcf7b585fae1fb8,2025-06-24T14:15:29.553000
CVE-2025-39205,0,1,bc324f59e73cfbf570b8d138ca8e0069cd4c714e1af6749bc77c49f6ec85acc0,2025-06-24T14:15:29.707000
CVE-2025-3921,0,0,9797fba579692252283cd90745f54a1a6a5a7131fc66f684fa524a93339f9b2c,2025-05-07T14:13:20.483000
CVE-2025-3923,0,0,ee152c7f1a42d63e1ca21cb1c49adcbe2fb8c27f05521d2bf1672c2da0c26904,2025-04-29T13:52:28.490000
CVE-2025-3924,0,0,7b87f51ca3c311667e1b7a4df04e30967e599dbb013055d4845862729654e283,2025-05-07T14:13:20.483000
@ -297407,7 +297414,7 @@ CVE-2025-4863,0,0,43249181bdffc79d79f7051e6bf0b2e14593429b9b9273955a6682bdc98d5c
CVE-2025-4864,0,0,6c043d94b451b0fea234b80943adf86f4d0d57aafd4c1ec310404002722a628f,2025-05-21T19:40:43.810000
CVE-2025-4865,0,0,1b90218d6ac12941641af735315ee2bba9918452b68b7460362d9a85bb72a4f9,2025-05-21T19:40:37.067000
CVE-2025-4866,0,0,0a7ac96ca7c9857605322d3dcc0b2d69bad50fd7149a1213ff9c9a3542da1a9d,2025-06-12T16:28:04.683000
CVE-2025-4867,0,0,6969638a2809a255e3ca8192501edf4f067c74e1c1ac33da4faf9cfcf64ecf64,2025-05-19T13:35:20.460000
CVE-2025-4867,0,1,3bb4ea7e467155b2b91320f132f4897443555070e946e86974e870aea250cfac,2025-05-19T13:35:20.460000
CVE-2025-4868,0,0,4b7e47c9fd74fa1deae3b46f591f039a3d43fcc446d7c3e49e093358b630ff92,2025-05-19T13:35:20.460000
CVE-2025-4869,0,0,870b6fb7f96763d1ac0b1ff6f50594749d4dd6426d23a4566486d6e216908d08,2025-05-28T11:48:37.013000
CVE-2025-48695,0,0,39b88432a15a3b8e91feb94d32e426fa969d9198b6e75ff2ba9bd798bc547242,2025-05-23T15:54:42.643000
@ -297462,8 +297469,8 @@ CVE-2025-48792,0,0,2c0b02c33ee81c6b1c7f3bc9767aecae1b833af65e4351c0dd81998c4a119
CVE-2025-48793,0,0,c894ec9ed8b3b5d1fda9891ce2808a0fb7689dd63eec3c7bb7e9e649736a365c,2025-05-27T04:15:41.090000
CVE-2025-48794,0,0,0f60a10fd5bbac90e9e184a916afa3ee1c6a6178325620c93725d026aac184ad,2025-05-27T04:15:41.160000
CVE-2025-48796,0,0,5c467d1a2669d77ceb69e55cea05d09cde2aaa034119240321683e5490565638,2025-05-28T15:01:30.720000
CVE-2025-48797,0,1,48040f572339677d8b62940bd3d85033c4e66b3c622b11f3747758e577f53a7d,2025-06-24T13:15:22.917000
CVE-2025-48798,0,1,b9e6523b4026bcad2c811e2a8cc3b8fcc3580c3172ff91ee8792d194ce1f26a1,2025-06-24T13:15:23.123000
CVE-2025-48797,0,0,48040f572339677d8b62940bd3d85033c4e66b3c622b11f3747758e577f53a7d,2025-06-24T13:15:22.917000
CVE-2025-48798,0,0,b9e6523b4026bcad2c811e2a8cc3b8fcc3580c3172ff91ee8792d194ce1f26a1,2025-06-24T13:15:23.123000
CVE-2025-4880,0,0,e66433f376d95dc941d17745f27a53d60427f87111077aee793bacaa1dd21351,2025-05-21T17:33:42.373000
CVE-2025-4881,0,0,3fdda22eaf1afa96c9c6bfb121fd7cc7da116831a6f494c0b7df343d1eed58c4,2025-05-21T19:38:39.660000
CVE-2025-4882,0,0,9ae533a1d17c0bc7b22051d58510b828885d48326cbc794d7bf23ceba43e10c0,2025-05-21T19:38:24.990000
@ -298337,7 +298344,7 @@ CVE-2025-52875,0,0,70ff6c04abc6cfce849406946b406a459cb9d17561e94e81ec5aa5fb6103e
CVE-2025-52876,0,0,04a8f13c1a5d28a7ba2f4420d94289fb86c66499f08f149bf03ece2dbbc8cea7,2025-06-23T20:16:21.633000
CVE-2025-52877,0,0,c1d6e2b07ce02bba590986d3df9c7581e2aa81b981d3f15dad43eb041681dd92,2025-06-23T20:16:21.633000
CVE-2025-52878,0,0,e55775b8d24e3fed0ad2e0acdd563793038173ab54bc92391fdb84ab91ed384a,2025-06-23T20:16:21.633000
CVE-2025-52879,0,0,1c63908c7662c118128e37655472b7011228940fa4e77bb1378e7765ad171bc5,2025-06-23T20:16:21.633000
CVE-2025-52879,0,1,36a19ea63eabffb0ae9b5df676b3f85180b31571a550ff8a02ef30a65c0880dd,2025-06-24T15:15:25.180000
CVE-2025-5288,0,0,5b20c7a865ed486d932e1f5165bbcfd30ae2f04bc0acfb20d9396799c2c655a3,2025-06-16T12:32:18.840000
CVE-2025-5289,0,0,7c7a7fd94b9e27905a1cadcd118b0b2af6a175d504b657fe651e510f41cabc00,2025-06-23T20:16:21.633000
CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000
@ -298377,6 +298384,7 @@ CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a15
CVE-2025-5303,0,0,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000
CVE-2025-5307,0,0,7244ff154b85c92ca09019f8de869bb0541c220b74776be3851e4cfba38a0ca8,2025-05-30T16:31:03.107000
CVE-2025-5309,0,0,4f40b16e57161a0b02ce9c3f4d7e0ba4cf08b0282b7954a09175078f67da41cb,2025-06-17T20:50:23.507000
CVE-2025-5318,1,1,43978098e56851e5b415c4c8f175357a6aaaecebbdcfcfe803fcf95f094aa057,2025-06-24T14:15:30.523000
CVE-2025-5320,0,0,772070621ad15a70df6397a0142dc45fe5fca6b991b5410b5c6912332a34a15a,2025-06-01T05:15:19.883000
CVE-2025-5321,0,0,31d96e00ea1024b8084a7837ef9bf0b4fd55d789d529b1f4fae375684c451003,2025-06-01T05:15:20.947000
CVE-2025-5323,0,0,b0785ba87cd1215b18904af4ecc0dec4461f38599fcb91263ef5f63563e48a70,2025-05-30T16:31:03.107000
@ -298878,6 +298886,7 @@ CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439
CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000
CVE-2025-6030,0,0,e2d083f85b4980fab673be25fe64ff6c58fe5f2e84e15893b8c80d92f1561a4f,2025-06-16T12:32:18.840000
CVE-2025-6031,0,0,8862006220262f75545734fb5f034c6db29d3c4cbd11030b12e4d70636f9f9cc,2025-06-16T12:32:18.840000
CVE-2025-6032,1,1,d34db860f10fbaf4dc7b8227df55ccd2b29ad245beaf16847e29b7a4d47834c3,2025-06-24T14:15:30.703000
CVE-2025-6035,0,0,b71b50bc0c235c19b2d078bb69ae3921b820489d58f8688dea7a7bdd7515f125,2025-06-16T12:32:18.840000
CVE-2025-6040,0,0,76a8c143b5834b0cf93cda3bf80ab595e40b144f2532ce0d72ddcf42d08934bb,2025-06-16T12:32:18.840000
CVE-2025-6050,0,0,67e03dde344620698f5a7773057ca524136abcdd721ce9bc82366b3da1039da8,2025-06-17T20:50:23.507000
@ -298930,9 +298939,9 @@ CVE-2025-6121,0,0,ac34c215559700b52c27e4eb85187c0f90e04bada26cf85e1da5d5a006994f
CVE-2025-6122,0,0,79bab9242c697b56597a153f6c6518ac5d670e665734da46c0282253ae61aec7,2025-06-17T20:50:33.517000
CVE-2025-6123,0,0,d43d6d94100d023989c481dec6c898d450ddbc20841ed4ddfcc99856183ef27f,2025-06-17T20:50:33.517000
CVE-2025-6124,0,0,5b60d811bf3cb9ef911f8612e6315e9b0b0997b30f24c3bf22952f378649f104,2025-06-17T20:50:23.507000
CVE-2025-6125,0,0,845baaf06b498d67300e9383b189c90f15251cb9aa8584c2ad9756215c94ada1,2025-06-17T20:50:23.507000
CVE-2025-6126,0,0,147bb2fcef9c6bc3415f0511de5c582b372e8ec5bd3f4621eaa46780ead3cda9,2025-06-17T20:50:23.507000
CVE-2025-6127,0,0,23a983073a9d57505230a3940ec829bac38bd4d9f1a280ab883796d1888ab61c,2025-06-17T20:50:23.507000
CVE-2025-6125,0,1,18afb62db98610dc3337e002140e0da5a295f857214abce94df772a0d52e12dd,2025-06-17T20:50:23.507000
CVE-2025-6126,0,1,88235c21160075c480952838de6debb5ad37cb995ebb7db692c96370f9a531d2,2025-06-17T20:50:23.507000
CVE-2025-6127,0,1,20c9da6df7a99689522c7c15589e8525b4579befe4a6c774e5ce491386916b7a,2025-06-17T20:50:23.507000
CVE-2025-6128,0,0,1e377ac73a59a167c73fcf96e4c6971eb9041bf3cc73e824932eb4a056ae1f9f,2025-06-17T20:50:23.507000
CVE-2025-6129,0,0,c11fcf3a911a2d8d8c4b37d8252afa26669376fbb7214d4fcbed546932aa455b,2025-06-17T20:50:23.507000
CVE-2025-6130,0,0,cb569be39f5f1da076d06669e0896e22c8cd60dff8ebc57d155295bc5acb6c81,2025-06-20T14:39:23.200000
@ -298958,11 +298967,11 @@ CVE-2025-6149,0,0,bfa9b70c74b833d4b13edc2b8c0deb75557d095959799446cbc897b529f453
CVE-2025-6150,0,0,1c1c8c9840248db413992659480d6a0621f81bf1fb34376aa4877ba8e62a64a5,2025-06-23T19:28:18.330000
CVE-2025-6151,0,0,66f985d955d28732cb3e20742ce5c2b75d056fdf6e0c0fd5329b3e2551fd465e,2025-06-19T01:20:04.247000
CVE-2025-6152,0,0,ff4ccaf39bf818abdc375e234ccbed4be33d2e886689e2e8335c122e3871c2eb,2025-06-17T20:50:23.507000
CVE-2025-6153,0,0,2fc60dca756ddc4e172d6897384ac8518a5ff1f5174120a3dcec13ba5207b272,2025-06-17T20:50:23.507000
CVE-2025-6154,0,0,f1415c5a2eb0eacb2f774f7a7fb86d492db28bb7f75636c28658e54eafbc0f4f,2025-06-17T20:50:23.507000
CVE-2025-6155,0,0,be11d001072469fc87458e52f5d19346f46beeb8af1d40a7e97c5ddedad3b12d,2025-06-17T20:50:23.507000
CVE-2025-6156,0,0,85583d7bd2902eb7639c6c1aa8ad39c82190eb0e792586e6c3dcbe77c821d0e1,2025-06-17T20:50:23.507000
CVE-2025-6157,0,0,18b8bacb7e7608c9c770eca0a6aa66a6d43337b92593fd019530530522499345,2025-06-17T20:50:23.507000
CVE-2025-6153,0,1,84c54f12ce3c4b2788acc50498f1e5b6b54cd80844bea96e08e9041eee82570d,2025-06-17T20:50:23.507000
CVE-2025-6154,0,1,784a399212f7e19dcdd4a48307096b2f0ab3d4e2d63511008fff789baf0e4bf8,2025-06-17T20:50:23.507000
CVE-2025-6155,0,1,2c57494ff5fbd6c3d33e6762ebd24c63b2d0e3f1ab5a220ef66bbd7671547bbd,2025-06-17T20:50:23.507000
CVE-2025-6156,0,1,0d32496606d006c3ba82b347d139253ef04f11ffe625ca034e0ac245714b6a7b,2025-06-17T20:50:23.507000
CVE-2025-6157,0,1,90f59e8d7123b39365e840973bb9606b8a67273ee78e33fa045e1a4c6f50da0b,2025-06-17T20:50:23.507000
CVE-2025-6158,0,0,2f36d74bb802a051d651546127c3dc725b5baddaf659643b5bacdd29188892d6,2025-06-17T20:50:23.507000
CVE-2025-6159,0,0,38e8ac5e5294c42b259b82c8daef65af0d7b30e502051f62b250d30a5a031545,2025-06-17T20:50:23.507000
CVE-2025-6160,0,0,ade16d050fe213428b173ad29429dde198ba45d3ed2aa7e95b41154f41eeda9d,2025-06-17T20:50:23.507000
@ -299104,32 +299113,32 @@ CVE-2025-6406,0,0,8e98eb43ab331ce625be77bc96e3beed8b2dc8cdddf070452c440c196f0871
CVE-2025-6407,0,0,2c5b5c8dcc8d6c7c975193c22c2fce6d047e7cb94f11bcfcbec6cb37cf8e66ce,2025-06-23T20:16:21.633000
CVE-2025-6408,0,0,223016691e0988d905245099e386f66215b44ae2ab1d500d2394d1534fb283c6,2025-06-23T20:16:21.633000
CVE-2025-6409,0,0,5b6c3f8f913fad4b69daaad6404be658fe7e6646a82367b1f57133278330f71c,2025-06-23T20:16:21.633000
CVE-2025-6410,0,0,10c0e995048a5fe80535330f88c3842563bb9d2a6fa7aa77d6801c8e012f2342,2025-06-23T20:16:21.633000
CVE-2025-6411,0,0,758f124c49d1a0adb23c5330253f0da8fc25bf7c6c10c0f8e0fa9f91867044a1,2025-06-23T20:16:21.633000
CVE-2025-6412,0,0,4bc4619b32fff5416958d58ac751ed0e1ff6677e6229bb2b763e46f7c48d1da7,2025-06-23T20:16:21.633000
CVE-2025-6413,0,0,688af4e324d3a4604fc65318f683d9cba7c79a0f0c75e629bbd28153a77ca83d,2025-06-23T20:16:21.633000
CVE-2025-6414,0,0,2514edd847894d548106771ca05d4d2a028bc6ad228392af03505a56c1f5f91e,2025-06-23T20:16:21.633000
CVE-2025-6415,0,0,dc41afbd76d60357eafe65d092bf38ddea2a9fe59d3ca007ba198ca39fc40749,2025-06-23T20:16:21.633000
CVE-2025-6416,0,0,8d43992b59606b70f54ebd60d55d3ffe362388b5bae77904f49a2df9d302c111,2025-06-23T20:16:21.633000
CVE-2025-6417,0,0,a903dee3489b79a97e9cf3b4cfb44f4d6b6dc6e55a15846d3b20ad4297e1e2be,2025-06-23T20:16:21.633000
CVE-2025-6410,0,1,d5093121a62c3b03264c8b74cf8cee58e08566191457abd305673f3d7b08558c,2025-06-24T14:51:28.207000
CVE-2025-6411,0,1,0e09e6bd75e65ae7b58d0e0820c1abe7bd7d437f8f8a3059af1dd0350f51a6eb,2025-06-24T14:51:00.910000
CVE-2025-6412,0,1,079483de9c3bd0a5bc9a675e45d922c2a7f9e0ab5ec14494088543bc4cc27948,2025-06-24T14:45:30.210000
CVE-2025-6413,0,1,def8ac7153cd4247d0c4cdbb262191ec85518ce8bb9fdb44e2051c1b4248ee65,2025-06-24T14:44:44.467000
CVE-2025-6414,0,1,4eee093f61e0856e820fcce1dd983d848e970d6e3ba9a8157662d6a173a0c8a8,2025-06-24T14:43:54.553000
CVE-2025-6415,0,1,d99b1b62da229a57bb10bf97c0f53cd32822887e7cf2412dbde9d23a1b40c301,2025-06-24T14:42:25.020000
CVE-2025-6416,0,1,d915af97a76985615ef155ac953ed99c7fa06d79c350cbb3611f921c94d13007,2025-06-24T14:42:10.153000
CVE-2025-6417,0,1,5fc9eb7d4ff925279bc28755909d00f7292cf787d506364151545ca582306f41,2025-06-24T14:41:39.197000
CVE-2025-6418,0,0,f7f733adc12154a9b9fe75cebdc155063670b53939728e76deeaf5149ae11e9b,2025-06-23T20:16:21.633000
CVE-2025-6419,0,0,3617b941b01f49b9887977e8c6068fd5eeb7fe8de612aa23856dff79b97287cf,2025-06-23T20:16:21.633000
CVE-2025-6420,0,0,6cdd074ad9636d47cb353088e65c5fe1d77bedf88b71bf3c2519aff243ef5171,2025-06-23T20:16:21.633000
CVE-2025-6421,0,0,5609a4a5b8ba6038f8f981b034f22b275327d1d8839411237326052b483006a3,2025-06-23T20:16:21.633000
CVE-2025-6422,0,0,106ef9916b04166cc5945f1203191244e9fd131bda586696c6c5fbd69a1a1382,2025-06-23T20:16:21.633000
CVE-2025-6424,1,1,9313426f660ccdc0028a285f0ebda07fd1723d8f2e14b0d7e53cc6ab2b265e80,2025-06-24T13:15:23.273000
CVE-2025-6425,1,1,fe323b43bab8acd504006d763b5431357cc57c85d975615a28223b8ddbeb232c,2025-06-24T13:15:23.403000
CVE-2025-6426,1,1,62ec6140619138de1ff0c6c2430da6a5944432b22fef80b8daec8bd1d41ac50c,2025-06-24T13:15:23.537000
CVE-2025-6427,1,1,9b2a62aa828fd0783c24a61ccadc32208967da6bed3843b463a3b47b961b4a6c,2025-06-24T13:15:23.650000
CVE-2025-6428,1,1,e2ee855e3a007fe69f1a84502b9280b01542f868cd0364afd8f0378d3e191171,2025-06-24T13:15:23.770000
CVE-2025-6429,1,1,e4079d02afc4266101c6c99a54d823e31cc61c3e1ac8d26773a179f8d7ceff4e,2025-06-24T13:15:23.877000
CVE-2025-6430,1,1,03899b32fe396c89196bbf57550983927bd75479d35e17ab4eefdf7973a1595b,2025-06-24T13:15:23.993000
CVE-2025-6431,1,1,0d197b928405a0f7bd6fa1fb8bec500dd650a298f33ac8609c7a42ea3711ce62,2025-06-24T13:15:24.103000
CVE-2025-6432,1,1,dc1b5c4e50cf6f515296b16df4fc1504a747cae8428b86a0ca25c0f18fd9fa30,2025-06-24T13:15:24.220000
CVE-2025-6433,1,1,e9e6886748c1945d8162fd820ccc8b3502d8220fe8515a455d8264322c547839,2025-06-24T13:15:24.327000
CVE-2025-6434,1,1,599cc13e47b64b667eda8d1a374814f3f336fa1a7f1de206c253b383dca38651,2025-06-24T13:15:24.447000
CVE-2025-6435,1,1,a4f11279479a34cb7bd8fbada0da1482074cfe4aa0941feb03a5381d18eb3739,2025-06-24T13:15:24.560000
CVE-2025-6436,1,1,a86bef510ff7551eac1bbe2f43ff96eabbbcfe6b21cca459abc01b1f7cc075cb,2025-06-24T13:15:24.677000
CVE-2025-6424,0,0,9313426f660ccdc0028a285f0ebda07fd1723d8f2e14b0d7e53cc6ab2b265e80,2025-06-24T13:15:23.273000
CVE-2025-6425,0,0,fe323b43bab8acd504006d763b5431357cc57c85d975615a28223b8ddbeb232c,2025-06-24T13:15:23.403000
CVE-2025-6426,0,0,62ec6140619138de1ff0c6c2430da6a5944432b22fef80b8daec8bd1d41ac50c,2025-06-24T13:15:23.537000
CVE-2025-6427,0,0,9b2a62aa828fd0783c24a61ccadc32208967da6bed3843b463a3b47b961b4a6c,2025-06-24T13:15:23.650000
CVE-2025-6428,0,0,e2ee855e3a007fe69f1a84502b9280b01542f868cd0364afd8f0378d3e191171,2025-06-24T13:15:23.770000
CVE-2025-6429,0,0,e4079d02afc4266101c6c99a54d823e31cc61c3e1ac8d26773a179f8d7ceff4e,2025-06-24T13:15:23.877000
CVE-2025-6430,0,0,03899b32fe396c89196bbf57550983927bd75479d35e17ab4eefdf7973a1595b,2025-06-24T13:15:23.993000
CVE-2025-6431,0,0,0d197b928405a0f7bd6fa1fb8bec500dd650a298f33ac8609c7a42ea3711ce62,2025-06-24T13:15:24.103000
CVE-2025-6432,0,0,dc1b5c4e50cf6f515296b16df4fc1504a747cae8428b86a0ca25c0f18fd9fa30,2025-06-24T13:15:24.220000
CVE-2025-6433,0,0,e9e6886748c1945d8162fd820ccc8b3502d8220fe8515a455d8264322c547839,2025-06-24T13:15:24.327000
CVE-2025-6434,0,0,599cc13e47b64b667eda8d1a374814f3f336fa1a7f1de206c253b383dca38651,2025-06-24T13:15:24.447000
CVE-2025-6435,0,1,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000
CVE-2025-6436,0,0,a86bef510ff7551eac1bbe2f43ff96eabbbcfe6b21cca459abc01b1f7cc075cb,2025-06-24T13:15:24.677000
CVE-2025-6446,0,0,3600b7ecc27e2374ecf53656a0787999f8467a509514c75f50c495fcd2cddda1,2025-06-23T20:16:21.633000
CVE-2025-6447,0,0,ccb7491a53a65edb2a46fa34f91bfc98d3e4b5a673ea57cbc2e7809ed2b6f681,2025-06-23T20:16:21.633000
CVE-2025-6448,0,0,8222bc4acb92d0f776e1d0bca83e07196c49a6462816bce44b6bf839e1dbed85,2025-06-23T20:16:21.633000
@ -299183,7 +299192,7 @@ CVE-2025-6511,0,0,cc8ab409e471e104e8e1fc80b5595697eff632bcca500a8d8c88c3888c6686
CVE-2025-6512,0,0,9438eabdabda483dd3b2ea151d5688e848c8b3bd4d972d71e143c1071f589b10,2025-06-23T20:16:21.633000
CVE-2025-6513,0,0,6fcda6ec8fe8d4d7a71ff944570d0aef3cd920458f304839d1b1f59be7ed3d56,2025-06-23T20:16:21.633000
CVE-2025-6516,0,0,e83db0c9c5092f4cce7b7b0f8d09e2747b540199cda06219d8f0e056f084fbf0,2025-06-23T20:16:21.633000
CVE-2025-6517,0,0,866bf0b3827ed5b1b4db7d2e627753bd746fb1a76e73c54ae14f2575f0c61270,2025-06-23T20:16:21.633000
CVE-2025-6517,0,1,ccb7b7977bc47f9b2f5f57f3b073cd6f70cdee9c4ad69519d93767dd6116a3b9,2025-06-24T14:15:31.093000
CVE-2025-6518,0,0,79913a6994b5a0cfc1a00cf4e1af2784faaece099aa53440c6a31b8bb0c63ace,2025-06-23T20:16:21.633000
CVE-2025-6524,0,0,e49785f0fd827aecc01b85ae4e043e18698692ec26bc7ec337665a5554061752,2025-06-23T21:15:27.970000
CVE-2025-6525,0,0,35605120f939d0314ffb4372828fc2819d48e220e02caf00b1c5333f290dc2d4,2025-06-23T22:15:22.697000
@ -299196,13 +299205,16 @@ CVE-2025-6531,0,0,d50d6ae82fb8168856da35552b669299a85e5954fcbcd9145d4e9001056a99
CVE-2025-6532,0,0,f045d33f336030aac6bc659f0e76b4f67938e1fa62f91ed9a7dcc7388277bc3d,2025-06-24T00:15:26.213000
CVE-2025-6533,0,0,acda853366c2c017a02233aa53f424d13f44087d6fa69452779a88de8132b41e,2025-06-24T00:15:26.397000
CVE-2025-6534,0,0,8d84160f3e12d58cb253923c278d312cf4073fd0f90fe9eb6bb8d69f1025e0fd,2025-06-24T01:15:25.303000
CVE-2025-6535,0,0,8a2e2c08150c23298f895d6a8de96df4340489455f5e26a4dde31f70afc5bfd3,2025-06-24T01:15:25.513000
CVE-2025-6535,0,1,e42f1a6543dbf0ee5c229c993281b53636fa2406c8182d5b8ffaa7f8f3686b13,2025-06-24T14:15:31.237000
CVE-2025-6536,0,0,d013adec60ee7bce984765f553f00621206bf7b36426e84a34c5c79dd02e790d,2025-06-24T02:15:22.967000
CVE-2025-6545,0,0,4a2e9a49fc7908d94e6672d7a2b53a6f95fca2e09b0d849d624a1d4044dc33c8,2025-06-23T20:16:21.633000
CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad19,2025-06-23T20:16:21.633000
CVE-2025-6551,0,0,a52fe52125cb153ac1dee3a35a2dc92fb922b4d13172e77504580f4841a730e4,2025-06-24T02:15:23.170000
CVE-2025-6551,0,1,28b300bbd8c144f51c63879310dc12af5cc8cc1da1c90b362d6276ed1d7f06a4,2025-06-24T14:15:31.390000
CVE-2025-6552,0,0,803ee4a1ec8be82f7a7266a0e0782f249d6c01547f2c273254ca519cada86f3d,2025-06-24T03:15:35.520000
CVE-2025-6559,0,0,444ed8a45550b3671771862423149729d25531cb4fc98aee2a01e13a863dcde8,2025-06-24T03:15:35.700000
CVE-2025-6560,0,0,49ff1f0a782ce228cea5686f0cb1a3280168d6abbcd267d809259241cd7f946f,2025-06-24T03:15:35.897000
CVE-2025-6565,1,1,7c02fe0d71d3ef34b32cfe8d9c10c27142ce892b4368d3b905ba19c7208bc8cf,2025-06-24T13:15:24.790000
CVE-2025-6566,1,1,80c33a5e765c828c57a43e47bfe700e09d31372257b02be3aed80b3dd3347991,2025-06-24T13:15:25.057000
CVE-2025-6565,0,0,7c02fe0d71d3ef34b32cfe8d9c10c27142ce892b4368d3b905ba19c7208bc8cf,2025-06-24T13:15:24.790000
CVE-2025-6566,0,0,80c33a5e765c828c57a43e47bfe700e09d31372257b02be3aed80b3dd3347991,2025-06-24T13:15:25.057000
CVE-2025-6567,1,1,5d754149f93ad7069f2d6b06b39e9a8d3070555d19c5f3fd33d0f2fd359ea32d,2025-06-24T15:15:25.623000
CVE-2025-6568,1,1,78c40c1dd546517356b970cf01de10a143e7aca6dbd9dbb56f6a07312247f2e6,2025-06-24T15:15:25.823000
CVE-2025-6569,1,1,a9a253cca959ecf71ee669abff58d1659a78fe1070e8dc321456c5ad3c982f46,2025-06-24T15:15:26.017000

Can't render this file because it is too large.