mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2025-06-24T16:00:34.910461+00:00
This commit is contained in:
parent
77088c2a3c
commit
ed26803442
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "psirt@cisco.com",
|
||||
"published": "2024-11-15T17:15:07.977",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "psirt@cisco.com",
|
||||
"published": "2024-11-15T16:15:21.910",
|
||||
"lastModified": "2025-01-27T18:15:29.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-09T20:15:39.730",
|
||||
"lastModified": "2025-01-16T19:15:28.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1718",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2025-06-24T12:15:20.033",
|
||||
"lastModified": "2025-06-24T13:15:21.547",
|
||||
"lastModified": "2025-06-24T14:15:27.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -12,6 +12,50 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-2403",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2025-06-24T12:15:20.863",
|
||||
"lastModified": "2025-06-24T12:15:20.863",
|
||||
"lastModified": "2025-06-24T14:15:28.330",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -12,6 +12,50 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
@ -38,7 +82,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
60
CVE-2025/CVE-2025-278xx/CVE-2025-27827.json
Normal file
60
CVE-2025/CVE-2025-278xx/CVE-2025-27827.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-27827",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-24T14:15:28.050",
|
||||
"lastModified": "2025-06-24T15:15:23.000",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the legacy chat component of Mitel MiContact Center Business through 10.2.0.3 could allow an unauthenticated attacker to conduct an information disclosure attack due to improper handling of session data. A successful exploit requires user interaction and could allow an attacker to access sensitive information, leading to unauthorized access to active chat rooms, reading chat data, and sending messages during an active chat session."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.mitel.com/support/security-advisories",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2025-0002-0",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-278xx/CVE-2025-27828.json
Normal file
60
CVE-2025/CVE-2025-278xx/CVE-2025-27828.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-27828",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-24T14:15:28.200",
|
||||
"lastModified": "2025-06-24T15:15:23.267",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the legacy chat component of Mitel MiContact Center Business through 10.0.0.4, 10.1.0.0 through 10.1.0.5, and 10.2.0.0 through 10.2.0.4 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient input validation. A successful exploit requires user interaction and could allow an attacker to execute arbitrary scripts with a limited impact on the confidentiality and the integrity."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.mitel.com/support/security-advisories",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2025-0003",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-2828",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2025-06-23T21:15:25.210",
|
||||
"lastModified": "2025-06-23T21:15:25.210",
|
||||
"lastModified": "2025-06-24T14:15:28.490",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://huntr.com/bounties/8f771040-7f34-420a-b96b-5b93d4a99afc",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/8f771040-7f34-420a-b96b-5b93d4a99afc",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,13 @@
|
||||
"id": "CVE-2025-32876",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-20T14:15:27.877",
|
||||
"lastModified": "2025-06-23T20:16:40.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-20T14:15:27.877",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered on COROS PACE 3 devices through 3.0808.0. The BLE implementation of the COROS smartwatch does not support LE Secure Connections and instead enforces BLE Legacy Pairing. In BLE Legacy Pairing, the Short-Term Key (STK) can be easily guessed. This requires knowledge of the Temporary Key (TK), which, in the case of the COROS Pace 3, is set to 0 due to the Just Works pairing method. An attacker within Bluetooth range can therefore perform sniffing attacks, allowing eavesdropping on the communication."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se detect\u00f3 un problema en los dispositivos COROS PACE 3 hasta la versi\u00f3n 3.0808.0. La implementaci\u00f3n BLE del reloj inteligente COROS no es compatible con las conexiones seguras LE y, en su lugar, aplica el emparejamiento heredado BLE. En el emparejamiento heredado BLE, la clave de corto plazo (STK) se puede adivinar f\u00e1cilmente. Esto requiere conocer la clave temporal (TK), que, en el caso del COROS Pace 3, est\u00e1 configurada a 0 debido al m\u00e9todo de emparejamiento Just Works. Por lo tanto, un atacante dentro del alcance de Bluetooth puede realizar ataques de rastreo, lo que permite interceptar la comunicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,17 +2,13 @@
|
||||
"id": "CVE-2025-32879",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-20T14:15:28.783",
|
||||
"lastModified": "2025-06-23T20:16:40.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-20T14:15:28.783",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered on COROS PACE 3 devices through 3.0808.0. It starts advertising if no device is connected via Bluetooth. This allows an attacker to connect with the device via BLE if no other device is connected. While connected, none of the BLE services and characteristics of the device require any authentication or security level. Therefore, any characteristic, depending on their mode of operation (read/write/notify), can be used by the connected attacker. This allows, for example, configuring the device, sending notifications, resetting the device to factory settings, or installing software."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se detect\u00f3 un problema en dispositivos COROS PACE 3 hasta la versi\u00f3n 3.0808.0. Este problema inicia la publicidad si no hay ning\u00fan dispositivo conectado por Bluetooth. Esto permite a un atacante conectarse al dispositivo mediante Bluetooth de baja energ\u00eda (BLE) si no hay ning\u00fan otro dispositivo conectado. Mientras est\u00e9 conectado, ninguno de los servicios ni caracter\u00edsticas de Bluetooth de este dispositivo requiere autenticaci\u00f3n ni nivel de seguridad. Por lo tanto, cualquier caracter\u00edstica, seg\u00fan su modo de funcionamiento (lectura/escritura/notificaci\u00f3n), puede ser utilizada por el atacante conectado. Esto permite, por ejemplo, configurar el dispositivo, enviar notificaciones, restablecer la configuraci\u00f3n de f\u00e1brica o instalar software."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
64
CVE-2025/CVE-2025-329xx/CVE-2025-32975.json
Normal file
64
CVE-2025/CVE-2025-329xx/CVE-2025-32975.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-32975",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-24T15:15:23.710",
|
||||
"lastModified": "2025-06-24T15:15:23.710",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead to complete administrative takeover."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2025/Jun/22",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seralys.com/research/CVE-2025-32975.txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-329xx/CVE-2025-32976.json
Normal file
29
CVE-2025/CVE-2025-329xx/CVE-2025-32976.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-32976",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-24T15:15:23.930",
|
||||
"lastModified": "2025-06-24T15:15:23.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains a logic flaw in its two-factor authentication implementation that allows authenticated users to bypass TOTP-based 2FA requirements. The vulnerability exists in the 2FA validation process and can be exploited to gain elevated access."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2025/Jun/23",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seralys.com/research/CVE-2025-32976.txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-329xx/CVE-2025-32977.json
Normal file
64
CVE-2025/CVE-2025-329xx/CVE-2025-32977.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-32977",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-24T15:15:24.063",
|
||||
"lastModified": "2025-06-24T15:15:24.063",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) allows unauthenticated users to upload backup files to the system. While signature validation is implemented, weaknesses in the validation process can be exploited to upload malicious backup content that could compromise system integrity."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2025/Jun/24",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seralys.com/research/CVE-2025-32977.txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-329xx/CVE-2025-32978.json
Normal file
64
CVE-2025/CVE-2025-329xx/CVE-2025-32978.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-32978",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-24T15:15:24.260",
|
||||
"lastModified": "2025-06-24T15:15:24.260",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) allows unauthenticated users to replace system licenses through a web interface intended for license renewal. Attackers can exploit this to replace valid licenses with expired or trial licenses, causing denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2025/Jun/25",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seralys.com/research/CVE-2025-32978.txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-34035",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-24T01:15:24.763",
|
||||
"lastModified": "2025-06-24T03:15:33.293",
|
||||
"lastModified": "2025-06-24T14:15:28.820",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -93,6 +93,10 @@
|
||||
{
|
||||
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-34036",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-24T01:15:24.903",
|
||||
"lastModified": "2025-06-24T01:15:24.903",
|
||||
"lastModified": "2025-06-24T14:15:28.953",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,6 +85,10 @@
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/39596",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://web.archive.org/web/20160322204109/http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-365xx/CVE-2025-36537.json
Normal file
56
CVE-2025/CVE-2025-365xx/CVE-2025-36537.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-36537",
|
||||
"sourceIdentifier": "psirt@teamviewer.com",
|
||||
"published": "2025-06-24T15:15:24.453",
|
||||
"lastModified": "2025-06-24T15:15:24.453",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Permission Assignment for Critical Resource in the TeamViewer Client (Full and Host) of TeamViewer Remote and Tensor prior Version 15.67 on Windows allows a local unprivileged user to trigger arbitrary file deletion with SYSTEM privileges via leveraging the MSI rollback mechanism. The vulnerability only applies to the Remote Management features: Backup, Monitoring, and Patch Management."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@teamviewer.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1002/",
|
||||
"source": "psirt@teamviewer.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-39201",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2025-06-24T12:15:21.050",
|
||||
"lastModified": "2025-06-24T12:15:21.050",
|
||||
"lastModified": "2025-06-24T14:15:29.090",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -12,6 +12,50 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "LOW",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
@ -38,7 +82,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-39202",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2025-06-24T12:15:21.200",
|
||||
"lastModified": "2025-06-24T12:15:21.200",
|
||||
"lastModified": "2025-06-24T14:15:29.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,12 +55,34 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-39203",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2025-06-24T12:15:21.380",
|
||||
"lastModified": "2025-06-24T12:15:21.380",
|
||||
"lastModified": "2025-06-24T14:15:29.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,12 +55,34 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-39204",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2025-06-24T12:15:21.523",
|
||||
"lastModified": "2025-06-24T12:15:21.523",
|
||||
"lastModified": "2025-06-24T14:15:29.553",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,12 +55,34 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-39205",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2025-06-24T13:15:22.470",
|
||||
"lastModified": "2025-06-24T13:15:22.470",
|
||||
"lastModified": "2025-06-24T14:15:29.707",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -12,6 +12,50 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
@ -38,7 +82,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-18T09:15:17.927",
|
||||
"lastModified": "2025-05-19T13:35:20.460",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-52879",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2025-06-23T15:15:28.933",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-24T15:15:25.180",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
64
CVE-2025/CVE-2025-53xx/CVE-2025-5318.json
Normal file
64
CVE-2025/CVE-2025-53xx/CVE-2025-5318.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-5318",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-06-24T14:15:30.523",
|
||||
"lastModified": "2025-06-24T14:15:30.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in the libssh library. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-5318",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369131",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.libssh.org/security/advisories/CVE-2025-5318.txt",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-60xx/CVE-2025-6032.json
Normal file
60
CVE-2025/CVE-2025-60xx/CVE-2025-6032.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-6032",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-06-24T14:15:30.703",
|
||||
"lastModified": "2025-06-24T14:15:30.703",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Podman. The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry. This issue results in a Man In The Middle attack."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-6032",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372501",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T14:15:22.960",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T15:15:25.327",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T15:15:25.510",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-17T03:15:25.743",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-17T03:15:25.947",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-17T03:15:26.147",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-17T03:15:26.340",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-17T03:15:26.553",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6410",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-21T17:15:23.580",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-24T14:51:28.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -124,30 +144,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/83",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313404",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313404",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.598226",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/83",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6411",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-21T17:15:23.800",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-24T14:51:00.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -124,30 +144,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/84",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313405",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313405",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.598227",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/84",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6412",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-21T18:15:23.830",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-24T14:45:30.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -124,30 +144,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/85",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313406",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313406",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.598228",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/85",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6413",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-21T18:15:24.720",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-24T14:44:44.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -124,30 +144,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/86",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313407",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313407",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.598229",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/86",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6414",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-21T19:15:22.377",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-24T14:43:54.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -124,30 +144,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/87",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313408",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313408",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.598230",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/87",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6415",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-21T19:15:22.583",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-24T14:42:25.020",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -124,30 +144,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/88",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313409",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313409",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.598231",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/88",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6416",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-21T20:15:26.237",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-24T14:42:10.153",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -124,30 +144,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/89",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313410",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313410",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.598232",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/89",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6417",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-21T20:15:27.210",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-24T14:41:39.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -124,30 +144,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/90",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313411",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313411",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.598233",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/90",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-6435",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-06-24T13:15:24.560",
|
||||
"lastModified": "2025-06-24T13:15:24.560",
|
||||
"lastModified": "2025-06-24T14:15:30.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "If a user saved a response from the Network tab in Devtools using the Save As context menu option, that file may not have been saved with the `.download` file extension. This could have led to the user inadvertently running a malicious executable. This vulnerability affects Firefox < 140."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1950056",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-6517",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-23T18:15:22.797",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"lastModified": "2025-06-24T14:15:31.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +136,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593111",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/honorseclab/vulns/blob/main/dromara_MaxKey/SSRF.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-6535",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-24T01:15:25.513",
|
||||
"lastModified": "2025-06-24T01:15:25.513",
|
||||
"lastModified": "2025-06-24T14:15:31.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.596573",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://blog.0xd00.com/blog/sqli-in-user-list-leads-to-sensitive-data-disclosure",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-6551",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-24T02:15:23.170",
|
||||
"lastModified": "2025-06-24T02:15:23.170",
|
||||
"lastModified": "2025-06-24T14:15:31.390",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.596615",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-01/report.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-65xx/CVE-2025-6567.json
Normal file
145
CVE-2025/CVE-2025-65xx/CVE-2025-6567.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-6567",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-24T15:15:25.623",
|
||||
"lastModified": "2025-06-24T15:15:25.623",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Online Recruitment Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file Recruitment/admin/view_application.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Sp1d3rL1/CVE/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313739",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313739",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.601339",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
149
CVE-2025/CVE-2025-65xx/CVE-2025-6568.json
Normal file
149
CVE-2025/CVE-2025-65xx/CVE-2025-6568.json
Normal file
@ -0,0 +1,149 @@
|
||||
{
|
||||
"id": "CVE-2025-6568",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-24T15:15:25.823",
|
||||
"lastModified": "2025-06-24T15:15:25.823",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formIpv6Setup of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/d2pq/cve/blob/main/616/23.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/d2pq/cve/blob/main/616/23.md#poc",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313740",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313740",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.601344",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-65xx/CVE-2025-6569.json
Normal file
145
CVE-2025/CVE-2025-65xx/CVE-2025-6569.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-6569",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-24T15:15:26.017",
|
||||
"lastModified": "2025-06-24T15:15:26.017",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in code-projects School Fees Payment System 1.0. Affected by this vulnerability is an unknown functionality of the file /student.php. The manipulation of the argument sname/contact/about/emailid/transcation_remark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"baseScore": 5.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/tuooo/CVE/issues/18",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313741",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313741",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.601612",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
80
README.md
80
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-24T14:00:22.892829+00:00
|
||||
2025-06-24T16:00:34.910461+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-24T13:47:04.127000+00:00
|
||||
2025-06-24T15:15:26.017000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,52 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
299207
|
||||
299219
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `22`
|
||||
Recently added CVEs: `12`
|
||||
|
||||
- [CVE-2025-1718](CVE-2025/CVE-2025-17xx/CVE-2025-1718.json) (`2025-06-24T12:15:20.033`)
|
||||
- [CVE-2025-2403](CVE-2025/CVE-2025-24xx/CVE-2025-2403.json) (`2025-06-24T12:15:20.863`)
|
||||
- [CVE-2025-39201](CVE-2025/CVE-2025-392xx/CVE-2025-39201.json) (`2025-06-24T12:15:21.050`)
|
||||
- [CVE-2025-39202](CVE-2025/CVE-2025-392xx/CVE-2025-39202.json) (`2025-06-24T12:15:21.200`)
|
||||
- [CVE-2025-39203](CVE-2025/CVE-2025-392xx/CVE-2025-39203.json) (`2025-06-24T12:15:21.380`)
|
||||
- [CVE-2025-39204](CVE-2025/CVE-2025-392xx/CVE-2025-39204.json) (`2025-06-24T12:15:21.523`)
|
||||
- [CVE-2025-39205](CVE-2025/CVE-2025-392xx/CVE-2025-39205.json) (`2025-06-24T13:15:22.470`)
|
||||
- [CVE-2025-6424](CVE-2025/CVE-2025-64xx/CVE-2025-6424.json) (`2025-06-24T13:15:23.273`)
|
||||
- [CVE-2025-6425](CVE-2025/CVE-2025-64xx/CVE-2025-6425.json) (`2025-06-24T13:15:23.403`)
|
||||
- [CVE-2025-6426](CVE-2025/CVE-2025-64xx/CVE-2025-6426.json) (`2025-06-24T13:15:23.537`)
|
||||
- [CVE-2025-6427](CVE-2025/CVE-2025-64xx/CVE-2025-6427.json) (`2025-06-24T13:15:23.650`)
|
||||
- [CVE-2025-6428](CVE-2025/CVE-2025-64xx/CVE-2025-6428.json) (`2025-06-24T13:15:23.770`)
|
||||
- [CVE-2025-6429](CVE-2025/CVE-2025-64xx/CVE-2025-6429.json) (`2025-06-24T13:15:23.877`)
|
||||
- [CVE-2025-6430](CVE-2025/CVE-2025-64xx/CVE-2025-6430.json) (`2025-06-24T13:15:23.993`)
|
||||
- [CVE-2025-6431](CVE-2025/CVE-2025-64xx/CVE-2025-6431.json) (`2025-06-24T13:15:24.103`)
|
||||
- [CVE-2025-6432](CVE-2025/CVE-2025-64xx/CVE-2025-6432.json) (`2025-06-24T13:15:24.220`)
|
||||
- [CVE-2025-6433](CVE-2025/CVE-2025-64xx/CVE-2025-6433.json) (`2025-06-24T13:15:24.327`)
|
||||
- [CVE-2025-6434](CVE-2025/CVE-2025-64xx/CVE-2025-6434.json) (`2025-06-24T13:15:24.447`)
|
||||
- [CVE-2025-6435](CVE-2025/CVE-2025-64xx/CVE-2025-6435.json) (`2025-06-24T13:15:24.560`)
|
||||
- [CVE-2025-6436](CVE-2025/CVE-2025-64xx/CVE-2025-6436.json) (`2025-06-24T13:15:24.677`)
|
||||
- [CVE-2025-6565](CVE-2025/CVE-2025-65xx/CVE-2025-6565.json) (`2025-06-24T13:15:24.790`)
|
||||
- [CVE-2025-6566](CVE-2025/CVE-2025-65xx/CVE-2025-6566.json) (`2025-06-24T13:15:25.057`)
|
||||
- [CVE-2025-27827](CVE-2025/CVE-2025-278xx/CVE-2025-27827.json) (`2025-06-24T14:15:28.050`)
|
||||
- [CVE-2025-27828](CVE-2025/CVE-2025-278xx/CVE-2025-27828.json) (`2025-06-24T14:15:28.200`)
|
||||
- [CVE-2025-32975](CVE-2025/CVE-2025-329xx/CVE-2025-32975.json) (`2025-06-24T15:15:23.710`)
|
||||
- [CVE-2025-32976](CVE-2025/CVE-2025-329xx/CVE-2025-32976.json) (`2025-06-24T15:15:23.930`)
|
||||
- [CVE-2025-32977](CVE-2025/CVE-2025-329xx/CVE-2025-32977.json) (`2025-06-24T15:15:24.063`)
|
||||
- [CVE-2025-32978](CVE-2025/CVE-2025-329xx/CVE-2025-32978.json) (`2025-06-24T15:15:24.260`)
|
||||
- [CVE-2025-36537](CVE-2025/CVE-2025-365xx/CVE-2025-36537.json) (`2025-06-24T15:15:24.453`)
|
||||
- [CVE-2025-5318](CVE-2025/CVE-2025-53xx/CVE-2025-5318.json) (`2025-06-24T14:15:30.523`)
|
||||
- [CVE-2025-6032](CVE-2025/CVE-2025-60xx/CVE-2025-6032.json) (`2025-06-24T14:15:30.703`)
|
||||
- [CVE-2025-6567](CVE-2025/CVE-2025-65xx/CVE-2025-6567.json) (`2025-06-24T15:15:25.623`)
|
||||
- [CVE-2025-6568](CVE-2025/CVE-2025-65xx/CVE-2025-6568.json) (`2025-06-24T15:15:25.823`)
|
||||
- [CVE-2025-6569](CVE-2025/CVE-2025-65xx/CVE-2025-6569.json) (`2025-06-24T15:15:26.017`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `11`
|
||||
Recently modified CVEs: `37`
|
||||
|
||||
- [CVE-2023-1932](CVE-2023/CVE-2023-19xx/CVE-2023-1932.json) (`2025-06-24T13:07:42.087`)
|
||||
- [CVE-2024-47796](CVE-2024/CVE-2024-477xx/CVE-2024-47796.json) (`2025-06-24T13:47:04.127`)
|
||||
- [CVE-2024-51379](CVE-2024/CVE-2024-513xx/CVE-2024-51379.json) (`2025-06-24T13:28:19.803`)
|
||||
- [CVE-2024-51380](CVE-2024/CVE-2024-513xx/CVE-2024-51380.json) (`2025-06-24T13:22:14.297`)
|
||||
- [CVE-2024-51381](CVE-2024/CVE-2024-513xx/CVE-2024-51381.json) (`2025-06-24T13:20:52.710`)
|
||||
- [CVE-2024-51382](CVE-2024/CVE-2024-513xx/CVE-2024-51382.json) (`2025-06-24T13:13:53.583`)
|
||||
- [CVE-2024-51504](CVE-2024/CVE-2024-515xx/CVE-2024-51504.json) (`2025-06-24T12:27:49.960`)
|
||||
- [CVE-2024-52333](CVE-2024/CVE-2024-523xx/CVE-2024-52333.json) (`2025-06-24T13:44:55.670`)
|
||||
- [CVE-2025-3576](CVE-2025/CVE-2025-35xx/CVE-2025-3576.json) (`2025-06-24T13:15:22.657`)
|
||||
- [CVE-2025-48797](CVE-2025/CVE-2025-487xx/CVE-2025-48797.json) (`2025-06-24T13:15:22.917`)
|
||||
- [CVE-2025-48798](CVE-2025/CVE-2025-487xx/CVE-2025-48798.json) (`2025-06-24T13:15:23.123`)
|
||||
- [CVE-2025-39203](CVE-2025/CVE-2025-392xx/CVE-2025-39203.json) (`2025-06-24T14:15:29.410`)
|
||||
- [CVE-2025-39204](CVE-2025/CVE-2025-392xx/CVE-2025-39204.json) (`2025-06-24T14:15:29.553`)
|
||||
- [CVE-2025-39205](CVE-2025/CVE-2025-392xx/CVE-2025-39205.json) (`2025-06-24T14:15:29.707`)
|
||||
- [CVE-2025-4867](CVE-2025/CVE-2025-48xx/CVE-2025-4867.json) (`2025-05-19T13:35:20.460`)
|
||||
- [CVE-2025-52879](CVE-2025/CVE-2025-528xx/CVE-2025-52879.json) (`2025-06-24T15:15:25.180`)
|
||||
- [CVE-2025-6125](CVE-2025/CVE-2025-61xx/CVE-2025-6125.json) (`2025-06-17T20:50:23.507`)
|
||||
- [CVE-2025-6126](CVE-2025/CVE-2025-61xx/CVE-2025-6126.json) (`2025-06-17T20:50:23.507`)
|
||||
- [CVE-2025-6127](CVE-2025/CVE-2025-61xx/CVE-2025-6127.json) (`2025-06-17T20:50:23.507`)
|
||||
- [CVE-2025-6153](CVE-2025/CVE-2025-61xx/CVE-2025-6153.json) (`2025-06-17T20:50:23.507`)
|
||||
- [CVE-2025-6154](CVE-2025/CVE-2025-61xx/CVE-2025-6154.json) (`2025-06-17T20:50:23.507`)
|
||||
- [CVE-2025-6155](CVE-2025/CVE-2025-61xx/CVE-2025-6155.json) (`2025-06-17T20:50:23.507`)
|
||||
- [CVE-2025-6156](CVE-2025/CVE-2025-61xx/CVE-2025-6156.json) (`2025-06-17T20:50:23.507`)
|
||||
- [CVE-2025-6157](CVE-2025/CVE-2025-61xx/CVE-2025-6157.json) (`2025-06-17T20:50:23.507`)
|
||||
- [CVE-2025-6410](CVE-2025/CVE-2025-64xx/CVE-2025-6410.json) (`2025-06-24T14:51:28.207`)
|
||||
- [CVE-2025-6411](CVE-2025/CVE-2025-64xx/CVE-2025-6411.json) (`2025-06-24T14:51:00.910`)
|
||||
- [CVE-2025-6412](CVE-2025/CVE-2025-64xx/CVE-2025-6412.json) (`2025-06-24T14:45:30.210`)
|
||||
- [CVE-2025-6413](CVE-2025/CVE-2025-64xx/CVE-2025-6413.json) (`2025-06-24T14:44:44.467`)
|
||||
- [CVE-2025-6414](CVE-2025/CVE-2025-64xx/CVE-2025-6414.json) (`2025-06-24T14:43:54.553`)
|
||||
- [CVE-2025-6415](CVE-2025/CVE-2025-64xx/CVE-2025-6415.json) (`2025-06-24T14:42:25.020`)
|
||||
- [CVE-2025-6416](CVE-2025/CVE-2025-64xx/CVE-2025-6416.json) (`2025-06-24T14:42:10.153`)
|
||||
- [CVE-2025-6417](CVE-2025/CVE-2025-64xx/CVE-2025-6417.json) (`2025-06-24T14:41:39.197`)
|
||||
- [CVE-2025-6435](CVE-2025/CVE-2025-64xx/CVE-2025-6435.json) (`2025-06-24T14:15:30.930`)
|
||||
- [CVE-2025-6517](CVE-2025/CVE-2025-65xx/CVE-2025-6517.json) (`2025-06-24T14:15:31.093`)
|
||||
- [CVE-2025-6535](CVE-2025/CVE-2025-65xx/CVE-2025-6535.json) (`2025-06-24T14:15:31.237`)
|
||||
- [CVE-2025-6551](CVE-2025/CVE-2025-65xx/CVE-2025-6551.json) (`2025-06-24T14:15:31.390`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
136
_state.csv
136
_state.csv
@ -166187,7 +166187,7 @@ CVE-2021-1466,0,0,73d1ab1dba7b93614d4456f7c4154a9051b3311fd597548613460e253f8816
|
||||
CVE-2021-1467,0,0,37cd1b0388d59a074ae1b248547247cab652ecdcf418f496874b46d7894f4fea,2024-11-21T05:44:25.383000
|
||||
CVE-2021-1468,0,0,94dddc2bb33a1a5bbdd2a5ca364627e60173fbecdf4e1a69011a7fe666c23acd,2024-11-21T05:44:25.520000
|
||||
CVE-2021-1469,0,0,a249832e104b4956ca7a008b4b77116e8fcef6bd075ba8cd8efd905250eb8669,2024-11-21T05:44:25.653000
|
||||
CVE-2021-1470,0,0,b19148fbd05428a7d79b2eb78a799c57c7354cff2b4c3978a4cd26e7b68edaba,2024-11-18T17:11:56.587000
|
||||
CVE-2021-1470,0,1,09e4dd6b2e446f18539553f94e26fb568c68e227569336aba0d18492575bb1fa,2024-11-18T17:11:56.587000
|
||||
CVE-2021-1471,0,0,d8e00b3f829fdaca83472335b9607fb434f6533d18f09e893d5e153481995271,2024-11-21T05:44:25.900000
|
||||
CVE-2021-1472,0,0,cb714db37398c37a1853461ae4302afc31c17d76f152f27fa18411a5240b948b,2024-11-21T05:44:26.040000
|
||||
CVE-2021-1473,0,0,d51b1ce3c7393305aafcc238a46d576cb7b56fe45fcc65110bb32c966ff5cc45,2024-11-21T05:44:26.183000
|
||||
@ -190604,7 +190604,7 @@ CVE-2022-20681,0,0,280bf92419fd301fbd908288efb43ca833598900fb53a9b6250a1ec7dddf6
|
||||
CVE-2022-20682,0,0,1fa71ee857c33f00b556e052007e94caeb65b734be0c94eb81a75c820f03cb63,2024-11-21T06:43:18.730000
|
||||
CVE-2022-20683,0,0,8bc8a3d3cd8a40fc693531753717605296f704be039710d68f204e467f0b5ea0,2024-11-21T06:43:18.867000
|
||||
CVE-2022-20684,0,0,ab63b4c838f302c6526c81b8e341f0cfda8c2f5e8bb923caf295f3412a9c5f06,2024-11-21T06:43:19.027000
|
||||
CVE-2022-20685,0,0,500acd8f1d43926f0473c0f9c1ad055cef4f8bcf6dada43df171deec7fa1cdce,2025-01-27T18:15:29.790000
|
||||
CVE-2022-20685,0,1,930be8372472d203f80fb02efe0d59c887f0f68be43d0a352ad378ebbe4db2f1,2025-01-27T18:15:29.790000
|
||||
CVE-2022-20686,0,0,600b7ff1394c351d716cddf546c26028d7ecb7ef8b18801ac32a7123861efb3c,2024-11-21T06:43:19.270000
|
||||
CVE-2022-20687,0,0,5d18dbdb3617cc3203763429f5c75eebd258fe4458168c096533f5288bbfb8f0,2024-11-21T06:43:19.417000
|
||||
CVE-2022-20688,0,0,6528ed176b6b729cf5d0d6c83ec1e5efbd5de1b84c9c813ad67aa56478111cbb,2024-11-21T06:43:19.557000
|
||||
@ -216552,7 +216552,7 @@ CVE-2023-1928,0,0,8763c818f493e7271a7087e59be9778bb487db7538d460e423ab7153b6d87e
|
||||
CVE-2023-1929,0,0,204c57af056c484d5462acf184d2d8cd9606d5fba79de55bddd06a7bd216efe8,2024-11-21T07:40:09.467000
|
||||
CVE-2023-1930,0,0,c8e908b38326d5b4768b11783dc2c91330770349492af5fc20a4ad3bddbab7b8,2024-11-21T07:40:09.570000
|
||||
CVE-2023-1931,0,0,0b288b22bb931e38df7fce760f61fdcf70cd6b924be176d1f6a2a1416a4b0ebd,2024-11-21T07:40:09.670000
|
||||
CVE-2023-1932,0,1,47a066350b4f3c7af8c5bca8c9e72e8a22b5fbbd242580e75ffd53ad0e4afa44,2025-06-24T13:07:42.087000
|
||||
CVE-2023-1932,0,0,47a066350b4f3c7af8c5bca8c9e72e8a22b5fbbd242580e75ffd53ad0e4afa44,2025-06-24T13:07:42.087000
|
||||
CVE-2023-1934,0,0,1969e80b4d23640cff91a76a5a1f40d91535e51ecd25ec64ce83f2b09cebf529,2025-02-13T17:16:00.967000
|
||||
CVE-2023-1935,0,0,ef36ae8e60a399ff6480df6d7ac2a28a7a5d41184ed75ae8a4bccc47508f9fea,2024-11-21T07:40:09.973000
|
||||
CVE-2023-1936,0,0,04e4ee886165d2604590b79afe266663161903b8f56eed90e8ad2e74b29f605c,2024-11-21T07:40:10.853000
|
||||
@ -271705,7 +271705,7 @@ CVE-2024-47791,0,0,71a59e4b7f657785b7efb1d1c710d18d9ab869da4b56d86c25790c7b8675e
|
||||
CVE-2024-47793,0,0,882b9f21365001a1bbe1427d7ecd7686f09cb53c26df041c802a57c5badf616d,2024-10-21T21:25:36.697000
|
||||
CVE-2024-47794,0,0,5f08b59a295e74bd759bb3415b51927fbe86f46c8a55f75f87047c201f0f2904,2025-01-11T13:15:22.390000
|
||||
CVE-2024-47795,0,0,10e9418b0b5a0bf5163545d663192273bb472168c5c5fefe85382cb82093049c,2025-05-16T14:43:56.797000
|
||||
CVE-2024-47796,0,1,03d29b641c26b81d3c5622c5eee6943c23acfb19588990f033695e199f730d96,2025-06-24T13:47:04.127000
|
||||
CVE-2024-47796,0,0,03d29b641c26b81d3c5622c5eee6943c23acfb19588990f033695e199f730d96,2025-06-24T13:47:04.127000
|
||||
CVE-2024-47797,0,0,1db7c191d78a0c4eb63d4cdd8fe193396dc3e7794237bd9d846daea68af0e9f7,2024-11-06T15:24:53.210000
|
||||
CVE-2024-47799,0,0,c3938335baae6d700a63faf82e2306985214819a9aa9e9a31818efb7cbeda4db,2024-11-12T13:55:21.227000
|
||||
CVE-2024-4780,0,0,d587053157d7c17d807fe8569feada4a245f1bae752836389b387fd0d926bac1,2024-11-21T09:43:35.980000
|
||||
@ -274259,11 +274259,11 @@ CVE-2024-5137,0,0,14cc0e878710b854541124ba59367506c2de95b027aa7063332dbde02ef14e
|
||||
CVE-2024-51376,0,0,f700ac102ba582e72dbdc7fed72c59b433027ff0357273ca7f73e1576035ebe0,2025-02-13T21:15:15.083000
|
||||
CVE-2024-51377,0,0,454a574f7d41cec5c0e5592441622f9e1eef9cc67c58f07bfdfa7571c5635b7b,2024-11-14T23:23:52.997000
|
||||
CVE-2024-51378,0,0,60b518476e0f52f1f42de1d9edd060a172f8f183ad7a51b636d39c5e7781b145,2024-12-06T18:17:17.377000
|
||||
CVE-2024-51379,0,1,200743168a58cf06cbc21ee80028535533bc9bb74492051502e8c5fff5286cff,2025-06-24T13:28:19.803000
|
||||
CVE-2024-51379,0,0,200743168a58cf06cbc21ee80028535533bc9bb74492051502e8c5fff5286cff,2025-06-24T13:28:19.803000
|
||||
CVE-2024-5138,0,0,140f774b20fa807afb7fb688713e1cf4fd50bd4b8c4c7cf0bda80526ec06f84f,2024-11-21T09:47:03.263000
|
||||
CVE-2024-51380,0,1,29d60b6fd2ac7c648bf078ce05d2242586dad9e027af28bd62240a434d3c55fb,2025-06-24T13:22:14.297000
|
||||
CVE-2024-51381,0,1,ec2f6b9867725fdc19efd7a1013e38218fbe428ee1337cbf0242dc13d601bd43,2025-06-24T13:20:52.710000
|
||||
CVE-2024-51382,0,1,63e400f9d77f048ee2deef865d5f75efebba7225ec79595bcabf65e0fd3658e7,2025-06-24T13:13:53.583000
|
||||
CVE-2024-51380,0,0,29d60b6fd2ac7c648bf078ce05d2242586dad9e027af28bd62240a434d3c55fb,2025-06-24T13:22:14.297000
|
||||
CVE-2024-51381,0,0,ec2f6b9867725fdc19efd7a1013e38218fbe428ee1337cbf0242dc13d601bd43,2025-06-24T13:20:52.710000
|
||||
CVE-2024-51382,0,0,63e400f9d77f048ee2deef865d5f75efebba7225ec79595bcabf65e0fd3658e7,2025-06-24T13:13:53.583000
|
||||
CVE-2024-51392,0,0,c28913cf9578463f4763dccada8773c2d0b70c039999d2c8d3d568551fd804da,2025-05-30T16:31:03.107000
|
||||
CVE-2024-51398,0,0,cea8f8f4881380dbaa2cfe732dffbd060c56c48b06b04f4d982be54dbdad46e4,2024-11-05T18:35:17.420000
|
||||
CVE-2024-51399,0,0,7797cfea236d02f4c030090ec48621397eecdb65349aff9b28f04a876b406896,2024-11-05T18:35:18.260000
|
||||
@ -274343,7 +274343,7 @@ CVE-2024-51500,0,0,9f79bcd5037557dd7e0cb267397d832d1535c16ed992bdeffa51cc73eef4d
|
||||
CVE-2024-51501,0,0,b585036c51d67ee5dc1d50b01aef95445cf1220ae53ecc21ca9038c2aa3d0733,2024-11-08T16:15:50.200000
|
||||
CVE-2024-51502,0,0,d7dbefbfb53dbcc55361828d1af8973baaef8a002ed3b6e965f9f646792737a2,2024-11-21T17:15:22.737000
|
||||
CVE-2024-51503,0,0,e1b49616d4a00e7d7d3cfa9d7aea7e4c02706f35f12a6b64bc3311e1675452c3,2024-11-19T21:56:45.533000
|
||||
CVE-2024-51504,0,1,18454e061ade7d61b8dd21d70902e9da78dc1967ff68c671bd62b476c8e160fd,2025-06-24T12:27:49.960000
|
||||
CVE-2024-51504,0,0,18454e061ade7d61b8dd21d70902e9da78dc1967ff68c671bd62b476c8e160fd,2025-06-24T12:27:49.960000
|
||||
CVE-2024-51505,0,0,59a9c27ff1aa6293764a1805d129d78b3200f41b807deae85bed614c1c751bd1,2025-02-18T18:15:26.420000
|
||||
CVE-2024-51506,0,0,0f188b847dff5756f20c14ac8f67f7dd3df9f93024ac2a0910692ac01579c55b,2025-06-03T14:53:08.277000
|
||||
CVE-2024-51507,0,0,30943843e052c701df27f4a2af3e73dbcc49ed636de642936e8481f479bbdf57,2025-06-03T14:55:25.300000
|
||||
@ -274989,7 +274989,7 @@ CVE-2024-5233,0,0,749403088352361e2986fc2566426aafc544613446ac5fd3ac82ce8b947196
|
||||
CVE-2024-52330,0,0,b205d5d2afaa38c34428a1eeef7e76ca6fed50de8ad2e5a1eac6a8c24e6f1ff8,2025-01-23T17:15:14.427000
|
||||
CVE-2024-52331,0,0,180e174e5208ca4d900653122ec4e97c4ab3215251616b3d737907effe366848,2025-01-23T17:15:14.563000
|
||||
CVE-2024-52332,0,0,58837c5feb4aa8da96238f281eca729502def4e6f29469edf4244234ba0fc606,2025-01-11T13:15:25.070000
|
||||
CVE-2024-52333,0,1,b7d0f71813f948324a406290fa6ccd1c978c2190104ced6f812939e57d54f6b3,2025-06-24T13:44:55.670000
|
||||
CVE-2024-52333,0,0,b7d0f71813f948324a406290fa6ccd1c978c2190104ced6f812939e57d54f6b3,2025-06-24T13:44:55.670000
|
||||
CVE-2024-52335,0,0,dd4f62d353da42f6dc7115815924c982f0175669a07ab002418fb12d6de291f2,2024-12-06T14:15:21.230000
|
||||
CVE-2024-52336,0,0,b6e9b11addff6749adae872dd38056b35e5782b328e6ea56a9be94620e0c21ab,2025-02-03T20:15:33.123000
|
||||
CVE-2024-52337,0,0,1ac7c50918581434060258b6237ca41183133897d488a97678a496cbf023aa66,2025-02-25T12:15:31
|
||||
@ -277407,7 +277407,7 @@ CVE-2024-5610,0,0,c876fccd541dbbe5edac90b3257f7d2b3efde4d5bff83326921f06d03b7a38
|
||||
CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000
|
||||
CVE-2024-56112,0,0,9c37554a9e3e8121be632deb2b2e9ed13eeb0233b63a1c1f431c838fba55a392,2024-12-16T16:15:10.313000
|
||||
CVE-2024-56113,0,0,c2004a54de70b831a98d60d2c2fb6bca131b530775b8918ef6395e30cd829051,2025-01-23T18:15:32.603000
|
||||
CVE-2024-56114,0,0,80b97861862ba12f51aa4e46485551b632a0c2a52df86bcb564294ea58a1f8c7,2025-01-16T19:15:28.787000
|
||||
CVE-2024-56114,0,1,edcf852199e0cd801e3ae938f8e870bfbcdb97c2eab2d9e5d6d32c5828fdd5a3,2025-01-16T19:15:28.787000
|
||||
CVE-2024-56115,0,0,17cd74ad25051a45f91521081be96f78ec43985fc62b9893fc5da74912ce6906,2025-04-23T21:33:33.170000
|
||||
CVE-2024-56116,0,0,e8aea0c63708e7b9ae4ad86601eeb2e56348e008753c0c18fd2bb0a490431bf6,2025-04-23T21:34:38.623000
|
||||
CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000
|
||||
@ -284124,7 +284124,7 @@ CVE-2025-1712,0,0,b94d0190ebdb3831769a5867dbc038d4d7585fa2490152c1e878c7d5a70443
|
||||
CVE-2025-1714,0,0,6e67e5fe1ad7d1f8ea60e413f9fa7e7e2f63bd8d4c4369040436660c144fa80c,2025-03-07T05:15:16.233000
|
||||
CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d41,2025-03-03T16:15:39.520000
|
||||
CVE-2025-1717,0,0,3d4f0d449e7852a9bab717d0d55b537c9dc57d522d200e81bab92be20a7c833d,2025-03-11T16:12:42.783000
|
||||
CVE-2025-1718,1,1,254cd868400522121cc41a81158cb75e8ca4970550a9cd680981ee7f4e122c33,2025-06-24T13:15:21.547000
|
||||
CVE-2025-1718,0,1,6d0a145d557996297ca811dce1e9777bace02acfc8140401301ce1a24f26950e,2025-06-24T14:15:27.847000
|
||||
CVE-2025-1723,0,0,c7576768b3fcdf2c172cabd995356c9a4e187202d556f18e62eeaf91cbbf52b2,2025-03-03T08:15:15.717000
|
||||
CVE-2025-1724,0,0,b8e86d6fa70198b5cc9fe6224a04663cb9564b5f8c33fbf347cdad07f13847ed,2025-03-17T07:15:33.467000
|
||||
CVE-2025-1725,0,0,c49b8d1c27e2c6728ab571d7d9ee0274a46175f957660be0c5aa759fde493bd7,2025-06-04T14:54:33.783000
|
||||
@ -287550,7 +287550,7 @@ CVE-2025-24026,0,0,851a3bf68c954484658a3468537933c8ee28750382a531089af82c153a4aa
|
||||
CVE-2025-24027,0,0,7aafd16a9bde691788eff3c983eb76660cc50c899ff68b8c3f8ccfb1cc458ed4,2025-01-22T15:15:27.090000
|
||||
CVE-2025-24028,0,0,545c071838c816be977c3520d8d21408e612d6f5f92969ce1c4368203cb04b22,2025-04-18T01:57:17.133000
|
||||
CVE-2025-24029,0,0,78ccc702bd5d12fe713f342eb01497f1004c6f35d754359834f77e673529d847,2025-02-03T22:15:28.320000
|
||||
CVE-2025-2403,1,1,f5056a4da79b936d803f5f9b3c662f9cb45c3707feab2a244ec3003b84f14580,2025-06-24T12:15:20.863000
|
||||
CVE-2025-2403,0,1,922dc374a649eb9a1795e8b830be58e7133f61414894da64a4c520128e51690d,2025-06-24T14:15:28.330000
|
||||
CVE-2025-24030,0,0,53ed9f8c2f1606c3ac2d0893d8b45d45add03d54f0c0cb325356c13a37ba8b27,2025-01-23T04:15:07.100000
|
||||
CVE-2025-24031,0,0,f001af7155fa77b1de37ced441ee4e39c1454b911ef9ca1ee83e5bda55f8dc14,2025-02-10T16:15:38.990000
|
||||
CVE-2025-24032,0,0,1178a4dc66e28f37c78bc3ebc36c9a48c540f3ad31de8ebddc9029a3c39156bd,2025-05-21T16:15:30.827000
|
||||
@ -290203,6 +290203,8 @@ CVE-2025-27823,0,0,ae3d83d8b696c6651ddc09be1ef36d15fa5d89a5eeb42b0a2ba26ad0db25f
|
||||
CVE-2025-27824,0,0,2d002361cc885b5990daf4c3973db9ef130ec1a7bfde36407db01c4a68cfa628,2025-03-07T22:15:38.220000
|
||||
CVE-2025-27825,0,0,204298b7de8459d92cd5ca573fe552fd0eb50c7361c94c6261df8c437005a654,2025-03-07T22:15:38.380000
|
||||
CVE-2025-27826,0,0,1af8c747c5098697d6723ab302d54ea95cbfca134be905c245ce43480244837e,2025-03-07T22:15:38.527000
|
||||
CVE-2025-27827,1,1,5b3ba326fa4303e1f16d5e10eab4ee203d2f4b406490542503a551359ca434e6,2025-06-24T15:15:23
|
||||
CVE-2025-27828,1,1,dba5fd6802450b24a8c6dc40028328c85e74ec93354031d5ad5d4eefc139c69a,2025-06-24T15:15:23.267000
|
||||
CVE-2025-27829,0,0,9ae86cabd1b5a8793e47645f5ed6e4bec7bf508d33296df63c4497b12aa63bd8,2025-04-14T18:15:28.697000
|
||||
CVE-2025-2783,0,0,cac125e06bdfcf5101179da397d83671a8e22970d5207dd362f2ac73d6465a33,2025-03-28T01:00:02.260000
|
||||
CVE-2025-27830,0,0,da10ce085c8af9893377a339d8c2cf0db7181ab295e76a10e0b8a5e6254179ce,2025-04-01T16:44:47.883000
|
||||
@ -290364,7 +290366,7 @@ CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e
|
||||
CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18
|
||||
CVE-2025-28256,0,0,c16943b644cdad0f362ff940632bf3b431153c240410202f1016e53c5c3bd875,2025-04-14T17:06:52.373000
|
||||
CVE-2025-2826,0,0,73d45c19b2e4c3bc4d80772bd5509ff4acb0a98a2510975df320963b1c203a94,2025-05-28T15:01:30.720000
|
||||
CVE-2025-2828,0,0,4dc8c084884ef5b69b766a3edf30d3b934591e561b9cb7ae7c931516c27ac379,2025-06-23T21:15:25.210000
|
||||
CVE-2025-2828,0,1,5dcd8fb6602d0a5a28886880344c032e2bbe46511d3d7578cfc919bbf94a1b7a,2025-06-24T14:15:28.490000
|
||||
CVE-2025-2829,0,0,059a0cf4c937544428f8f9992f350ccef1c580a6c89e3bad6c17d91e38c4aa72,2025-04-08T18:13:53.347000
|
||||
CVE-2025-2830,0,0,44fbd6035d3d2cc03539fdc4859074e0483d9335c2d68a4a16795d3b39b2fa35,2025-06-18T13:37:00.120000
|
||||
CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed85834a,2025-04-11T17:00:07.067000
|
||||
@ -293420,10 +293422,10 @@ CVE-2025-32871,0,0,0858782c82e95a39be97e7ffdc176ada44bec9377cc23b99d288083a9a1b8
|
||||
CVE-2025-32872,0,0,a6acd2c4749d25af3a9674e470b92f66756a824f6626eef20d9bf26ef8cf4544,2025-04-17T20:21:48.243000
|
||||
CVE-2025-32873,0,0,f7d763f6cf9dd2dd2fc4fd446f09dcd8aecf88b16e7b9cbc3c04e6b52caefba3,2025-06-17T19:44:20.957000
|
||||
CVE-2025-32875,0,0,ef16cc45f9d463b891fcccd40892c4fbe4ce3dc0b696a29a1045a30b036ebb7c,2025-06-23T20:16:40.143000
|
||||
CVE-2025-32876,0,0,d0c5dacb199f8bb490576d803a2540d8d367a87fa8e046871ecfa2850d2ecade,2025-06-23T20:16:40.143000
|
||||
CVE-2025-32876,0,1,b359294b619c26c8351a299d7818957dd391eeaf6565d3672638043e8443c0e5,2025-06-20T14:15:27.877000
|
||||
CVE-2025-32877,0,0,74607664ebbbbcceb329bf3374e41935fdbdb1b26282ce7b04b4015abab39cd7,2025-06-23T20:16:40.143000
|
||||
CVE-2025-32878,0,0,b43ea98c820eba767a823504fa14736ae60799328c6d58085470cd470347b3e1,2025-06-23T20:16:40.143000
|
||||
CVE-2025-32879,0,0,6b56549ac1cf6dfd0b2a41dc233d9b457d1d16d3a502b5db7f1cfdf2c8d42266,2025-06-23T20:16:40.143000
|
||||
CVE-2025-32879,0,1,d6389a00aca6f8d6250c1180546d76508f1e89722e323785ad1a9d5739f227fb,2025-06-20T14:15:28.783000
|
||||
CVE-2025-3288,0,0,f38b6103c86e4b43a603efa2302f1894dd9c86a56576c13140616463a055f77c,2025-04-08T18:13:53.347000
|
||||
CVE-2025-32880,0,0,908f205c48f4ce6ec052266214a72cc2adc228fe98b67d23faadb405e9192759,2025-06-23T20:16:40.143000
|
||||
CVE-2025-32881,0,0,2e6693087c6469e2e3ed7d14a7bafcb787b21e7f52bc589483e80625632ed3de,2025-06-20T16:53:44.603000
|
||||
@ -293505,6 +293507,10 @@ CVE-2025-32971,0,0,5487e79975fb0abb9378187756241a4603127b98b0de118af3bf155fc0457
|
||||
CVE-2025-32972,0,0,f920511713bca3379924622d60cbe669c2136f54d45d25f9a06a402b14d9c31a,2025-05-13T15:05:07.237000
|
||||
CVE-2025-32973,0,0,f240c0c82a1f9443b1a09de6c7f01c454aa45175be7a1efc3f550e2af9ed0e46,2025-05-13T14:58:48.890000
|
||||
CVE-2025-32974,0,0,212ebce768fe1e6e3809501bd5b1c16e6076b1bd5655a4578512b867f7767f49,2025-05-13T14:55:03.707000
|
||||
CVE-2025-32975,1,1,d407c389f501a62ed1abc8ff0569ea2244d7e6c665fd13048e07cb0b7ab5ca77,2025-06-24T15:15:23.710000
|
||||
CVE-2025-32976,1,1,50002b2a08f283c271ee34483a954e057fa085bc870be4cb5abede59cb3e6deb,2025-06-24T15:15:23.930000
|
||||
CVE-2025-32977,1,1,636e65234014fe9ce99deefc49b4066edbec4880a58263af1e963d32340e786f,2025-06-24T15:15:24.063000
|
||||
CVE-2025-32978,1,1,77a786818286aff3233be916932d06ae584781a8e48fdca955b071b9bf67c519,2025-06-24T15:15:24.260000
|
||||
CVE-2025-32979,0,0,64a29053417365e3bc807f310a7262b7a642ecb58a326e442c57ce048a184d74,2025-05-27T16:58:18.660000
|
||||
CVE-2025-3298,0,0,42b3c11a03b3e330acf149137409814de4838d8396b46617a725d88596b9ad1f,2025-04-08T16:49:00.290000
|
||||
CVE-2025-32980,0,0,ecd87f951455efbd2f051fc9c63fa88d716a4beefc941d871df4d77e37aa2f94,2025-05-09T17:15:51.220000
|
||||
@ -293676,8 +293682,8 @@ CVE-2025-34031,0,0,a83a89ead5008a99e70e59878287331f19ed475018e97ea254d5a6edcad82
|
||||
CVE-2025-34032,0,0,1662c51249658a2df2b7fe7125b51d9c24492c5099a19327f9c89f372b8d7c6f,2025-06-24T03:15:32.987000
|
||||
CVE-2025-34033,0,0,efbb2094e27eadf32cf2e2b87f771d72dc8ffd0952a128e2c253c810271eb5fe,2025-06-24T03:15:33.090000
|
||||
CVE-2025-34034,0,0,9349522151798c41468e27385e7fbe77af654ab0fc85de66c1e4f22953696889,2025-06-24T03:15:33.193000
|
||||
CVE-2025-34035,0,0,ce2721f03a0b278f0cc26f99ff904d9fab13fc67019d936b442cf9447da7781d,2025-06-24T03:15:33.293000
|
||||
CVE-2025-34036,0,0,6b7350c61be49a76f76dc5d944c8fd7a529dcca7640facf7eca714339387463d,2025-06-24T01:15:24.903000
|
||||
CVE-2025-34035,0,1,875b7d990fc0620b461d78bcd5eb0a7cc37310985a6cc30d439b019a31ebffaa,2025-06-24T14:15:28.820000
|
||||
CVE-2025-34036,0,1,bf1ed7abf4ceff89d0043a51f6a47cfdcefc55033dd2180ec67b70376832b568,2025-06-24T14:15:28.953000
|
||||
CVE-2025-34037,0,0,57a7e6a6846827b91b7736feffed008814a2f3414dc595a6f1c81aa1a94cc3f7,2025-06-24T03:15:33.400000
|
||||
CVE-2025-34038,0,0,d6d8009e58294a673d7d0c556296273a5a5d83087c8fbf680e06184934d5f96d,2025-06-24T03:15:33.507000
|
||||
CVE-2025-34039,0,0,33065581e59fb510332e7c56f1b2c71b818ba8cafc063bc369ac3087f87d0806,2025-06-24T02:15:22.540000
|
||||
@ -293846,7 +293852,7 @@ CVE-2025-3572,0,0,85452ae8a7fdcd086072bc1a78d977cf0bc1d5dd6fa9f5553989fa8c8fb7fd
|
||||
CVE-2025-3573,0,0,095399568374006bc1e93d539eebcb743d7cc965cdc4a121e4480938fddae558,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3574,0,0,94473ff233af08be74c232281156bfa5db699f8872e1802977040bd9e36c2d62,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3575,0,0,73e2cf1e3fbb3ccb86ef07985e1084456954c5cbbd5b3215dbed3da8318cbbf4,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3576,0,1,957bbbebfac26fb5d2c366a1581678e2e0c111337065d1b5061024ff1fcc5960,2025-06-24T13:15:22.657000
|
||||
CVE-2025-3576,0,0,957bbbebfac26fb5d2c366a1581678e2e0c111337065d1b5061024ff1fcc5960,2025-06-24T13:15:22.657000
|
||||
CVE-2025-3577,0,0,56629bd7e990c7a0d492f7fcbfe38c7580cf294d9e5db776d3fa189b9e593731,2025-06-23T19:29:59.393000
|
||||
CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000
|
||||
@ -293930,6 +293936,7 @@ CVE-2025-36525,0,0,304058dc6057ec0d8f22d43f92f7c943e71e5e18bc158b199ea34013a3ed4
|
||||
CVE-2025-36527,0,0,760bc907999d36f8a046dc03eb19c07cc3891fbdfc35cb8c53858aa720a6ac60,2025-06-16T15:15:28.320000
|
||||
CVE-2025-36528,0,0,8cc5e94db4f898b6df57b60f4eabfb85cbf2d0b38d981f1163ef01852ec4f727,2025-06-16T15:14:39.797000
|
||||
CVE-2025-36535,0,0,c9bb02422d586f784be4fd92873208eebb00e7be6f50c78d2e7b7d5656e18b71,2025-05-21T20:24:58.133000
|
||||
CVE-2025-36537,1,1,537d9428fe6d511877f1732e2599f4649461561b08464759f0ce4098dd36210b,2025-06-24T15:15:24.453000
|
||||
CVE-2025-36539,0,0,c0894e36c5a4bf5ae06107887e6e7bc4869da6fc581815f366cc900be9ce130c,2025-06-16T12:32:18.840000
|
||||
CVE-2025-36546,0,0,a3d190116ff33d28a9568351832ce70c70aecf8ab001cfb216ed0ea5695cb9ef,2025-05-08T14:39:09.683000
|
||||
CVE-2025-36557,0,0,10d4b26bd4092d9203a2e113b056bea851721ed63eca24b2006dce264ace1ecf,2025-05-08T14:39:09.683000
|
||||
@ -294530,11 +294537,11 @@ CVE-2025-3916,0,0,045ece3601bd5ccbedc31ea0240de6aa0afd0b9d1478dcdfa2e80b8a58fde7
|
||||
CVE-2025-3917,0,0,c5171151eebd44803f90dc57bca3ca581e3f3a3b4495aa64f3e44a3933917ede,2025-05-16T14:43:26.160000
|
||||
CVE-2025-3918,0,0,63b01e62f8046021d2f78807719fa3fd3623a650f7755e4a8a67c57ed80094c1,2025-05-05T20:54:19.760000
|
||||
CVE-2025-3919,0,0,a87264f5c964c1b9f0e2df5faae10e0481d418f0fb1502b0ee9da33cc507ee91,2025-06-04T14:54:33.783000
|
||||
CVE-2025-39201,1,1,02cfed698ec42683688284364461ec516c3f201fff787dca36f4bfac3388505d,2025-06-24T12:15:21.050000
|
||||
CVE-2025-39202,1,1,1ceb79e8683ca8b86085aee73b52d64a9420063a94a3ec0231aac3d6010adcd4,2025-06-24T12:15:21.200000
|
||||
CVE-2025-39203,1,1,105effc7d2cc0a50f2f8a11eccb1fa8d014885672d5e0acca9751a293116274a,2025-06-24T12:15:21.380000
|
||||
CVE-2025-39204,1,1,f9db2ea96e48656857748f0dcd014508d330f37fae87d14bc9db98d65bd1cdfe,2025-06-24T12:15:21.523000
|
||||
CVE-2025-39205,1,1,c2e8c085466724619991e0074af53a5491b0f8345d0c2e7edce628b578d4c3f8,2025-06-24T13:15:22.470000
|
||||
CVE-2025-39201,0,1,2a2b705d59d2db641dc13896dc38ae8450e764fe971fa82649b4efcaee535293,2025-06-24T14:15:29.090000
|
||||
CVE-2025-39202,0,1,378620856d3c2a1e2dda8cb9c122f4cdb4c98bfce82101c988da7af28b6db22c,2025-06-24T14:15:29.253000
|
||||
CVE-2025-39203,0,1,8a03c141ca6cca748bcd6d5053974606d53be79d7d4fff4e1c4a8a5351c52e71,2025-06-24T14:15:29.410000
|
||||
CVE-2025-39204,0,1,9a86a2eece1fba5610daf326fe4a9156f29d653dff3ac1a91dcf7b585fae1fb8,2025-06-24T14:15:29.553000
|
||||
CVE-2025-39205,0,1,bc324f59e73cfbf570b8d138ca8e0069cd4c714e1af6749bc77c49f6ec85acc0,2025-06-24T14:15:29.707000
|
||||
CVE-2025-3921,0,0,9797fba579692252283cd90745f54a1a6a5a7131fc66f684fa524a93339f9b2c,2025-05-07T14:13:20.483000
|
||||
CVE-2025-3923,0,0,ee152c7f1a42d63e1ca21cb1c49adcbe2fb8c27f05521d2bf1672c2da0c26904,2025-04-29T13:52:28.490000
|
||||
CVE-2025-3924,0,0,7b87f51ca3c311667e1b7a4df04e30967e599dbb013055d4845862729654e283,2025-05-07T14:13:20.483000
|
||||
@ -297407,7 +297414,7 @@ CVE-2025-4863,0,0,43249181bdffc79d79f7051e6bf0b2e14593429b9b9273955a6682bdc98d5c
|
||||
CVE-2025-4864,0,0,6c043d94b451b0fea234b80943adf86f4d0d57aafd4c1ec310404002722a628f,2025-05-21T19:40:43.810000
|
||||
CVE-2025-4865,0,0,1b90218d6ac12941641af735315ee2bba9918452b68b7460362d9a85bb72a4f9,2025-05-21T19:40:37.067000
|
||||
CVE-2025-4866,0,0,0a7ac96ca7c9857605322d3dcc0b2d69bad50fd7149a1213ff9c9a3542da1a9d,2025-06-12T16:28:04.683000
|
||||
CVE-2025-4867,0,0,6969638a2809a255e3ca8192501edf4f067c74e1c1ac33da4faf9cfcf64ecf64,2025-05-19T13:35:20.460000
|
||||
CVE-2025-4867,0,1,3bb4ea7e467155b2b91320f132f4897443555070e946e86974e870aea250cfac,2025-05-19T13:35:20.460000
|
||||
CVE-2025-4868,0,0,4b7e47c9fd74fa1deae3b46f591f039a3d43fcc446d7c3e49e093358b630ff92,2025-05-19T13:35:20.460000
|
||||
CVE-2025-4869,0,0,870b6fb7f96763d1ac0b1ff6f50594749d4dd6426d23a4566486d6e216908d08,2025-05-28T11:48:37.013000
|
||||
CVE-2025-48695,0,0,39b88432a15a3b8e91feb94d32e426fa969d9198b6e75ff2ba9bd798bc547242,2025-05-23T15:54:42.643000
|
||||
@ -297462,8 +297469,8 @@ CVE-2025-48792,0,0,2c0b02c33ee81c6b1c7f3bc9767aecae1b833af65e4351c0dd81998c4a119
|
||||
CVE-2025-48793,0,0,c894ec9ed8b3b5d1fda9891ce2808a0fb7689dd63eec3c7bb7e9e649736a365c,2025-05-27T04:15:41.090000
|
||||
CVE-2025-48794,0,0,0f60a10fd5bbac90e9e184a916afa3ee1c6a6178325620c93725d026aac184ad,2025-05-27T04:15:41.160000
|
||||
CVE-2025-48796,0,0,5c467d1a2669d77ceb69e55cea05d09cde2aaa034119240321683e5490565638,2025-05-28T15:01:30.720000
|
||||
CVE-2025-48797,0,1,48040f572339677d8b62940bd3d85033c4e66b3c622b11f3747758e577f53a7d,2025-06-24T13:15:22.917000
|
||||
CVE-2025-48798,0,1,b9e6523b4026bcad2c811e2a8cc3b8fcc3580c3172ff91ee8792d194ce1f26a1,2025-06-24T13:15:23.123000
|
||||
CVE-2025-48797,0,0,48040f572339677d8b62940bd3d85033c4e66b3c622b11f3747758e577f53a7d,2025-06-24T13:15:22.917000
|
||||
CVE-2025-48798,0,0,b9e6523b4026bcad2c811e2a8cc3b8fcc3580c3172ff91ee8792d194ce1f26a1,2025-06-24T13:15:23.123000
|
||||
CVE-2025-4880,0,0,e66433f376d95dc941d17745f27a53d60427f87111077aee793bacaa1dd21351,2025-05-21T17:33:42.373000
|
||||
CVE-2025-4881,0,0,3fdda22eaf1afa96c9c6bfb121fd7cc7da116831a6f494c0b7df343d1eed58c4,2025-05-21T19:38:39.660000
|
||||
CVE-2025-4882,0,0,9ae533a1d17c0bc7b22051d58510b828885d48326cbc794d7bf23ceba43e10c0,2025-05-21T19:38:24.990000
|
||||
@ -298337,7 +298344,7 @@ CVE-2025-52875,0,0,70ff6c04abc6cfce849406946b406a459cb9d17561e94e81ec5aa5fb6103e
|
||||
CVE-2025-52876,0,0,04a8f13c1a5d28a7ba2f4420d94289fb86c66499f08f149bf03ece2dbbc8cea7,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52877,0,0,c1d6e2b07ce02bba590986d3df9c7581e2aa81b981d3f15dad43eb041681dd92,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52878,0,0,e55775b8d24e3fed0ad2e0acdd563793038173ab54bc92391fdb84ab91ed384a,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52879,0,0,1c63908c7662c118128e37655472b7011228940fa4e77bb1378e7765ad171bc5,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52879,0,1,36a19ea63eabffb0ae9b5df676b3f85180b31571a550ff8a02ef30a65c0880dd,2025-06-24T15:15:25.180000
|
||||
CVE-2025-5288,0,0,5b20c7a865ed486d932e1f5165bbcfd30ae2f04bc0acfb20d9396799c2c655a3,2025-06-16T12:32:18.840000
|
||||
CVE-2025-5289,0,0,7c7a7fd94b9e27905a1cadcd118b0b2af6a175d504b657fe651e510f41cabc00,2025-06-23T20:16:21.633000
|
||||
CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000
|
||||
@ -298377,6 +298384,7 @@ CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a15
|
||||
CVE-2025-5303,0,0,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000
|
||||
CVE-2025-5307,0,0,7244ff154b85c92ca09019f8de869bb0541c220b74776be3851e4cfba38a0ca8,2025-05-30T16:31:03.107000
|
||||
CVE-2025-5309,0,0,4f40b16e57161a0b02ce9c3f4d7e0ba4cf08b0282b7954a09175078f67da41cb,2025-06-17T20:50:23.507000
|
||||
CVE-2025-5318,1,1,43978098e56851e5b415c4c8f175357a6aaaecebbdcfcfe803fcf95f094aa057,2025-06-24T14:15:30.523000
|
||||
CVE-2025-5320,0,0,772070621ad15a70df6397a0142dc45fe5fca6b991b5410b5c6912332a34a15a,2025-06-01T05:15:19.883000
|
||||
CVE-2025-5321,0,0,31d96e00ea1024b8084a7837ef9bf0b4fd55d789d529b1f4fae375684c451003,2025-06-01T05:15:20.947000
|
||||
CVE-2025-5323,0,0,b0785ba87cd1215b18904af4ecc0dec4461f38599fcb91263ef5f63563e48a70,2025-05-30T16:31:03.107000
|
||||
@ -298878,6 +298886,7 @@ CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439
|
||||
CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6030,0,0,e2d083f85b4980fab673be25fe64ff6c58fe5f2e84e15893b8c80d92f1561a4f,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6031,0,0,8862006220262f75545734fb5f034c6db29d3c4cbd11030b12e4d70636f9f9cc,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6032,1,1,d34db860f10fbaf4dc7b8227df55ccd2b29ad245beaf16847e29b7a4d47834c3,2025-06-24T14:15:30.703000
|
||||
CVE-2025-6035,0,0,b71b50bc0c235c19b2d078bb69ae3921b820489d58f8688dea7a7bdd7515f125,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6040,0,0,76a8c143b5834b0cf93cda3bf80ab595e40b144f2532ce0d72ddcf42d08934bb,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6050,0,0,67e03dde344620698f5a7773057ca524136abcdd721ce9bc82366b3da1039da8,2025-06-17T20:50:23.507000
|
||||
@ -298930,9 +298939,9 @@ CVE-2025-6121,0,0,ac34c215559700b52c27e4eb85187c0f90e04bada26cf85e1da5d5a006994f
|
||||
CVE-2025-6122,0,0,79bab9242c697b56597a153f6c6518ac5d670e665734da46c0282253ae61aec7,2025-06-17T20:50:33.517000
|
||||
CVE-2025-6123,0,0,d43d6d94100d023989c481dec6c898d450ddbc20841ed4ddfcc99856183ef27f,2025-06-17T20:50:33.517000
|
||||
CVE-2025-6124,0,0,5b60d811bf3cb9ef911f8612e6315e9b0b0997b30f24c3bf22952f378649f104,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6125,0,0,845baaf06b498d67300e9383b189c90f15251cb9aa8584c2ad9756215c94ada1,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6126,0,0,147bb2fcef9c6bc3415f0511de5c582b372e8ec5bd3f4621eaa46780ead3cda9,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6127,0,0,23a983073a9d57505230a3940ec829bac38bd4d9f1a280ab883796d1888ab61c,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6125,0,1,18afb62db98610dc3337e002140e0da5a295f857214abce94df772a0d52e12dd,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6126,0,1,88235c21160075c480952838de6debb5ad37cb995ebb7db692c96370f9a531d2,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6127,0,1,20c9da6df7a99689522c7c15589e8525b4579befe4a6c774e5ce491386916b7a,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6128,0,0,1e377ac73a59a167c73fcf96e4c6971eb9041bf3cc73e824932eb4a056ae1f9f,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6129,0,0,c11fcf3a911a2d8d8c4b37d8252afa26669376fbb7214d4fcbed546932aa455b,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6130,0,0,cb569be39f5f1da076d06669e0896e22c8cd60dff8ebc57d155295bc5acb6c81,2025-06-20T14:39:23.200000
|
||||
@ -298958,11 +298967,11 @@ CVE-2025-6149,0,0,bfa9b70c74b833d4b13edc2b8c0deb75557d095959799446cbc897b529f453
|
||||
CVE-2025-6150,0,0,1c1c8c9840248db413992659480d6a0621f81bf1fb34376aa4877ba8e62a64a5,2025-06-23T19:28:18.330000
|
||||
CVE-2025-6151,0,0,66f985d955d28732cb3e20742ce5c2b75d056fdf6e0c0fd5329b3e2551fd465e,2025-06-19T01:20:04.247000
|
||||
CVE-2025-6152,0,0,ff4ccaf39bf818abdc375e234ccbed4be33d2e886689e2e8335c122e3871c2eb,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6153,0,0,2fc60dca756ddc4e172d6897384ac8518a5ff1f5174120a3dcec13ba5207b272,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6154,0,0,f1415c5a2eb0eacb2f774f7a7fb86d492db28bb7f75636c28658e54eafbc0f4f,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6155,0,0,be11d001072469fc87458e52f5d19346f46beeb8af1d40a7e97c5ddedad3b12d,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6156,0,0,85583d7bd2902eb7639c6c1aa8ad39c82190eb0e792586e6c3dcbe77c821d0e1,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6157,0,0,18b8bacb7e7608c9c770eca0a6aa66a6d43337b92593fd019530530522499345,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6153,0,1,84c54f12ce3c4b2788acc50498f1e5b6b54cd80844bea96e08e9041eee82570d,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6154,0,1,784a399212f7e19dcdd4a48307096b2f0ab3d4e2d63511008fff789baf0e4bf8,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6155,0,1,2c57494ff5fbd6c3d33e6762ebd24c63b2d0e3f1ab5a220ef66bbd7671547bbd,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6156,0,1,0d32496606d006c3ba82b347d139253ef04f11ffe625ca034e0ac245714b6a7b,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6157,0,1,90f59e8d7123b39365e840973bb9606b8a67273ee78e33fa045e1a4c6f50da0b,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6158,0,0,2f36d74bb802a051d651546127c3dc725b5baddaf659643b5bacdd29188892d6,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6159,0,0,38e8ac5e5294c42b259b82c8daef65af0d7b30e502051f62b250d30a5a031545,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6160,0,0,ade16d050fe213428b173ad29429dde198ba45d3ed2aa7e95b41154f41eeda9d,2025-06-17T20:50:23.507000
|
||||
@ -299104,32 +299113,32 @@ CVE-2025-6406,0,0,8e98eb43ab331ce625be77bc96e3beed8b2dc8cdddf070452c440c196f0871
|
||||
CVE-2025-6407,0,0,2c5b5c8dcc8d6c7c975193c22c2fce6d047e7cb94f11bcfcbec6cb37cf8e66ce,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6408,0,0,223016691e0988d905245099e386f66215b44ae2ab1d500d2394d1534fb283c6,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6409,0,0,5b6c3f8f913fad4b69daaad6404be658fe7e6646a82367b1f57133278330f71c,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6410,0,0,10c0e995048a5fe80535330f88c3842563bb9d2a6fa7aa77d6801c8e012f2342,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6411,0,0,758f124c49d1a0adb23c5330253f0da8fc25bf7c6c10c0f8e0fa9f91867044a1,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6412,0,0,4bc4619b32fff5416958d58ac751ed0e1ff6677e6229bb2b763e46f7c48d1da7,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6413,0,0,688af4e324d3a4604fc65318f683d9cba7c79a0f0c75e629bbd28153a77ca83d,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6414,0,0,2514edd847894d548106771ca05d4d2a028bc6ad228392af03505a56c1f5f91e,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6415,0,0,dc41afbd76d60357eafe65d092bf38ddea2a9fe59d3ca007ba198ca39fc40749,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6416,0,0,8d43992b59606b70f54ebd60d55d3ffe362388b5bae77904f49a2df9d302c111,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6417,0,0,a903dee3489b79a97e9cf3b4cfb44f4d6b6dc6e55a15846d3b20ad4297e1e2be,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6410,0,1,d5093121a62c3b03264c8b74cf8cee58e08566191457abd305673f3d7b08558c,2025-06-24T14:51:28.207000
|
||||
CVE-2025-6411,0,1,0e09e6bd75e65ae7b58d0e0820c1abe7bd7d437f8f8a3059af1dd0350f51a6eb,2025-06-24T14:51:00.910000
|
||||
CVE-2025-6412,0,1,079483de9c3bd0a5bc9a675e45d922c2a7f9e0ab5ec14494088543bc4cc27948,2025-06-24T14:45:30.210000
|
||||
CVE-2025-6413,0,1,def8ac7153cd4247d0c4cdbb262191ec85518ce8bb9fdb44e2051c1b4248ee65,2025-06-24T14:44:44.467000
|
||||
CVE-2025-6414,0,1,4eee093f61e0856e820fcce1dd983d848e970d6e3ba9a8157662d6a173a0c8a8,2025-06-24T14:43:54.553000
|
||||
CVE-2025-6415,0,1,d99b1b62da229a57bb10bf97c0f53cd32822887e7cf2412dbde9d23a1b40c301,2025-06-24T14:42:25.020000
|
||||
CVE-2025-6416,0,1,d915af97a76985615ef155ac953ed99c7fa06d79c350cbb3611f921c94d13007,2025-06-24T14:42:10.153000
|
||||
CVE-2025-6417,0,1,5fc9eb7d4ff925279bc28755909d00f7292cf787d506364151545ca582306f41,2025-06-24T14:41:39.197000
|
||||
CVE-2025-6418,0,0,f7f733adc12154a9b9fe75cebdc155063670b53939728e76deeaf5149ae11e9b,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6419,0,0,3617b941b01f49b9887977e8c6068fd5eeb7fe8de612aa23856dff79b97287cf,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6420,0,0,6cdd074ad9636d47cb353088e65c5fe1d77bedf88b71bf3c2519aff243ef5171,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6421,0,0,5609a4a5b8ba6038f8f981b034f22b275327d1d8839411237326052b483006a3,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6422,0,0,106ef9916b04166cc5945f1203191244e9fd131bda586696c6c5fbd69a1a1382,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6424,1,1,9313426f660ccdc0028a285f0ebda07fd1723d8f2e14b0d7e53cc6ab2b265e80,2025-06-24T13:15:23.273000
|
||||
CVE-2025-6425,1,1,fe323b43bab8acd504006d763b5431357cc57c85d975615a28223b8ddbeb232c,2025-06-24T13:15:23.403000
|
||||
CVE-2025-6426,1,1,62ec6140619138de1ff0c6c2430da6a5944432b22fef80b8daec8bd1d41ac50c,2025-06-24T13:15:23.537000
|
||||
CVE-2025-6427,1,1,9b2a62aa828fd0783c24a61ccadc32208967da6bed3843b463a3b47b961b4a6c,2025-06-24T13:15:23.650000
|
||||
CVE-2025-6428,1,1,e2ee855e3a007fe69f1a84502b9280b01542f868cd0364afd8f0378d3e191171,2025-06-24T13:15:23.770000
|
||||
CVE-2025-6429,1,1,e4079d02afc4266101c6c99a54d823e31cc61c3e1ac8d26773a179f8d7ceff4e,2025-06-24T13:15:23.877000
|
||||
CVE-2025-6430,1,1,03899b32fe396c89196bbf57550983927bd75479d35e17ab4eefdf7973a1595b,2025-06-24T13:15:23.993000
|
||||
CVE-2025-6431,1,1,0d197b928405a0f7bd6fa1fb8bec500dd650a298f33ac8609c7a42ea3711ce62,2025-06-24T13:15:24.103000
|
||||
CVE-2025-6432,1,1,dc1b5c4e50cf6f515296b16df4fc1504a747cae8428b86a0ca25c0f18fd9fa30,2025-06-24T13:15:24.220000
|
||||
CVE-2025-6433,1,1,e9e6886748c1945d8162fd820ccc8b3502d8220fe8515a455d8264322c547839,2025-06-24T13:15:24.327000
|
||||
CVE-2025-6434,1,1,599cc13e47b64b667eda8d1a374814f3f336fa1a7f1de206c253b383dca38651,2025-06-24T13:15:24.447000
|
||||
CVE-2025-6435,1,1,a4f11279479a34cb7bd8fbada0da1482074cfe4aa0941feb03a5381d18eb3739,2025-06-24T13:15:24.560000
|
||||
CVE-2025-6436,1,1,a86bef510ff7551eac1bbe2f43ff96eabbbcfe6b21cca459abc01b1f7cc075cb,2025-06-24T13:15:24.677000
|
||||
CVE-2025-6424,0,0,9313426f660ccdc0028a285f0ebda07fd1723d8f2e14b0d7e53cc6ab2b265e80,2025-06-24T13:15:23.273000
|
||||
CVE-2025-6425,0,0,fe323b43bab8acd504006d763b5431357cc57c85d975615a28223b8ddbeb232c,2025-06-24T13:15:23.403000
|
||||
CVE-2025-6426,0,0,62ec6140619138de1ff0c6c2430da6a5944432b22fef80b8daec8bd1d41ac50c,2025-06-24T13:15:23.537000
|
||||
CVE-2025-6427,0,0,9b2a62aa828fd0783c24a61ccadc32208967da6bed3843b463a3b47b961b4a6c,2025-06-24T13:15:23.650000
|
||||
CVE-2025-6428,0,0,e2ee855e3a007fe69f1a84502b9280b01542f868cd0364afd8f0378d3e191171,2025-06-24T13:15:23.770000
|
||||
CVE-2025-6429,0,0,e4079d02afc4266101c6c99a54d823e31cc61c3e1ac8d26773a179f8d7ceff4e,2025-06-24T13:15:23.877000
|
||||
CVE-2025-6430,0,0,03899b32fe396c89196bbf57550983927bd75479d35e17ab4eefdf7973a1595b,2025-06-24T13:15:23.993000
|
||||
CVE-2025-6431,0,0,0d197b928405a0f7bd6fa1fb8bec500dd650a298f33ac8609c7a42ea3711ce62,2025-06-24T13:15:24.103000
|
||||
CVE-2025-6432,0,0,dc1b5c4e50cf6f515296b16df4fc1504a747cae8428b86a0ca25c0f18fd9fa30,2025-06-24T13:15:24.220000
|
||||
CVE-2025-6433,0,0,e9e6886748c1945d8162fd820ccc8b3502d8220fe8515a455d8264322c547839,2025-06-24T13:15:24.327000
|
||||
CVE-2025-6434,0,0,599cc13e47b64b667eda8d1a374814f3f336fa1a7f1de206c253b383dca38651,2025-06-24T13:15:24.447000
|
||||
CVE-2025-6435,0,1,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000
|
||||
CVE-2025-6436,0,0,a86bef510ff7551eac1bbe2f43ff96eabbbcfe6b21cca459abc01b1f7cc075cb,2025-06-24T13:15:24.677000
|
||||
CVE-2025-6446,0,0,3600b7ecc27e2374ecf53656a0787999f8467a509514c75f50c495fcd2cddda1,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6447,0,0,ccb7491a53a65edb2a46fa34f91bfc98d3e4b5a673ea57cbc2e7809ed2b6f681,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6448,0,0,8222bc4acb92d0f776e1d0bca83e07196c49a6462816bce44b6bf839e1dbed85,2025-06-23T20:16:21.633000
|
||||
@ -299183,7 +299192,7 @@ CVE-2025-6511,0,0,cc8ab409e471e104e8e1fc80b5595697eff632bcca500a8d8c88c3888c6686
|
||||
CVE-2025-6512,0,0,9438eabdabda483dd3b2ea151d5688e848c8b3bd4d972d71e143c1071f589b10,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6513,0,0,6fcda6ec8fe8d4d7a71ff944570d0aef3cd920458f304839d1b1f59be7ed3d56,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6516,0,0,e83db0c9c5092f4cce7b7b0f8d09e2747b540199cda06219d8f0e056f084fbf0,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6517,0,0,866bf0b3827ed5b1b4db7d2e627753bd746fb1a76e73c54ae14f2575f0c61270,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6517,0,1,ccb7b7977bc47f9b2f5f57f3b073cd6f70cdee9c4ad69519d93767dd6116a3b9,2025-06-24T14:15:31.093000
|
||||
CVE-2025-6518,0,0,79913a6994b5a0cfc1a00cf4e1af2784faaece099aa53440c6a31b8bb0c63ace,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6524,0,0,e49785f0fd827aecc01b85ae4e043e18698692ec26bc7ec337665a5554061752,2025-06-23T21:15:27.970000
|
||||
CVE-2025-6525,0,0,35605120f939d0314ffb4372828fc2819d48e220e02caf00b1c5333f290dc2d4,2025-06-23T22:15:22.697000
|
||||
@ -299196,13 +299205,16 @@ CVE-2025-6531,0,0,d50d6ae82fb8168856da35552b669299a85e5954fcbcd9145d4e9001056a99
|
||||
CVE-2025-6532,0,0,f045d33f336030aac6bc659f0e76b4f67938e1fa62f91ed9a7dcc7388277bc3d,2025-06-24T00:15:26.213000
|
||||
CVE-2025-6533,0,0,acda853366c2c017a02233aa53f424d13f44087d6fa69452779a88de8132b41e,2025-06-24T00:15:26.397000
|
||||
CVE-2025-6534,0,0,8d84160f3e12d58cb253923c278d312cf4073fd0f90fe9eb6bb8d69f1025e0fd,2025-06-24T01:15:25.303000
|
||||
CVE-2025-6535,0,0,8a2e2c08150c23298f895d6a8de96df4340489455f5e26a4dde31f70afc5bfd3,2025-06-24T01:15:25.513000
|
||||
CVE-2025-6535,0,1,e42f1a6543dbf0ee5c229c993281b53636fa2406c8182d5b8ffaa7f8f3686b13,2025-06-24T14:15:31.237000
|
||||
CVE-2025-6536,0,0,d013adec60ee7bce984765f553f00621206bf7b36426e84a34c5c79dd02e790d,2025-06-24T02:15:22.967000
|
||||
CVE-2025-6545,0,0,4a2e9a49fc7908d94e6672d7a2b53a6f95fca2e09b0d849d624a1d4044dc33c8,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad19,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6551,0,0,a52fe52125cb153ac1dee3a35a2dc92fb922b4d13172e77504580f4841a730e4,2025-06-24T02:15:23.170000
|
||||
CVE-2025-6551,0,1,28b300bbd8c144f51c63879310dc12af5cc8cc1da1c90b362d6276ed1d7f06a4,2025-06-24T14:15:31.390000
|
||||
CVE-2025-6552,0,0,803ee4a1ec8be82f7a7266a0e0782f249d6c01547f2c273254ca519cada86f3d,2025-06-24T03:15:35.520000
|
||||
CVE-2025-6559,0,0,444ed8a45550b3671771862423149729d25531cb4fc98aee2a01e13a863dcde8,2025-06-24T03:15:35.700000
|
||||
CVE-2025-6560,0,0,49ff1f0a782ce228cea5686f0cb1a3280168d6abbcd267d809259241cd7f946f,2025-06-24T03:15:35.897000
|
||||
CVE-2025-6565,1,1,7c02fe0d71d3ef34b32cfe8d9c10c27142ce892b4368d3b905ba19c7208bc8cf,2025-06-24T13:15:24.790000
|
||||
CVE-2025-6566,1,1,80c33a5e765c828c57a43e47bfe700e09d31372257b02be3aed80b3dd3347991,2025-06-24T13:15:25.057000
|
||||
CVE-2025-6565,0,0,7c02fe0d71d3ef34b32cfe8d9c10c27142ce892b4368d3b905ba19c7208bc8cf,2025-06-24T13:15:24.790000
|
||||
CVE-2025-6566,0,0,80c33a5e765c828c57a43e47bfe700e09d31372257b02be3aed80b3dd3347991,2025-06-24T13:15:25.057000
|
||||
CVE-2025-6567,1,1,5d754149f93ad7069f2d6b06b39e9a8d3070555d19c5f3fd33d0f2fd359ea32d,2025-06-24T15:15:25.623000
|
||||
CVE-2025-6568,1,1,78c40c1dd546517356b970cf01de10a143e7aca6dbd9dbb56f6a07312247f2e6,2025-06-24T15:15:25.823000
|
||||
CVE-2025-6569,1,1,a9a253cca959ecf71ee669abff58d1659a78fe1070e8dc321456c5ad3c982f46,2025-06-24T15:15:26.017000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user