Auto-Update: 2025-06-30T16:00:11.385363+00:00

This commit is contained in:
cad-safe-bot 2025-06-30 16:03:47 +00:00
parent 1513b8ab58
commit f67a36e9f9
34 changed files with 10725 additions and 204 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46012",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-07T14:15:10.003",
"lastModified": "2025-03-14T02:15:12.757",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T15:13:28.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:ea7500_v3_firmware:3.0.1.207964:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C31082-BA9E-453B-BFFC-2D0EAEE2AF3F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:linksys:ea7500_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F3CEDE6-9138-4ED8-B26A-0111AFDE3F9E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dest-3/CVE-2023-46012/tree/main",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/dest-3/CVE-2023-46012/tree/main",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2023-47310",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-30T15:15:22.493",
"lastModified": "2025-06-30T15:15:22.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A misconfiguration in the default settings of MikroTik RouterOS 7 and fixed in v7.14 allows incoming IPv6 UDP traceroute packets."
}
],
"metrics": {},
"references": [
{
"url": "http://mikrotik.com",
"source": "cve@mitre.org"
},
{
"url": "http://routeros.com",
"source": "cve@mitre.org"
},
{
"url": "https://forum.mikrotik.com/t/fixed-in-7-14-security-vulnerability-default-configuration-firewall-bypass-for-ipv6-udp/262186",
"source": "cve@mitre.org"
}
]
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23335",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-01T07:15:38.240",
"lastModified": "2024-11-21T08:57:32.177",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T15:03:32.623",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,32 +49,80 @@
"value": "CWE-20"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.38",
"matchCriteriaId": "5AA2C895-E246-429E-A8DA-DE9A52BDEEC9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mybb/mybb/commit/450259e501b94c9d483efb167cb2bf875605e111.patch",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/mybb/mybb/security/advisories/GHSA-94xr-g4ww-j47r",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://mybb.com/versions/1.8.38",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product",
"Release Notes"
]
},
{
"url": "https://github.com/mybb/mybb/commit/450259e501b94c9d483efb167cb2bf875605e111.patch",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/mybb/mybb/security/advisories/GHSA-94xr-g4ww-j47r",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://mybb.com/versions/1.8.38",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23336",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-01T07:15:38.660",
"lastModified": "2024-11-21T08:57:32.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T15:10:32.987",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -55,38 +55,82 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.38",
"matchCriteriaId": "5AA2C895-E246-429E-A8DA-DE9A52BDEEC9"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.mybb.com/1.8/administration/configuration-file",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/mybb/mybb/commit/d6a96019025de9149014e06b1df252e6122e5630",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/mybb/mybb/security/advisories/GHSA-qfrj-65mv-h75h",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://mybb.com/versions/1.8.38",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product",
"Release Notes"
]
},
{
"url": "https://docs.mybb.com/1.8/administration/configuration-file",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://github.com/mybb/mybb/commit/d6a96019025de9149014e06b1df252e6122e5630",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/mybb/mybb/security/advisories/GHSA-qfrj-65mv-h75h",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://mybb.com/versions/1.8.38",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28056",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-15T18:15:10.723",
"lastModified": "2025-03-20T19:15:28.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T14:40:14.440",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,46 +51,96 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amazon:amplify_cli:*:*:*:*:*:aws:*:*",
"versionEndExcluding": "12.10.1",
"matchCriteriaId": "35AAD281-C3B3-4CC3-8281-BF023B6906D9"
}
]
}
]
}
],
"references": [
{
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2024-003/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/aws-amplify/amplify-cli/blob/8ad57bf99a404f3c92547c8a175458016f682fac/packages/amplify-provider-awscloudformation/resources/update-idp-roles-cfn.json",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/aws-amplify/amplify-cli/commit/73b08dc424db2fb60399c5343c314e02e849d4a1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/aws-amplify/amplify-cli/releases/tag/v12.10.1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://securitylabs.datadoghq.com/articles/amplified-exposure-how-aws-flaws-made-amplify-iam-roles-vulnerable-to-takeover/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2024-003/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/aws-amplify/amplify-cli/blob/8ad57bf99a404f3c92547c8a175458016f682fac/packages/amplify-provider-awscloudformation/resources/update-idp-roles-cfn.json",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/aws-amplify/amplify-cli/commit/73b08dc424db2fb60399c5343c314e02e849d4a1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/aws-amplify/amplify-cli/releases/tag/v12.10.1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://securitylabs.datadoghq.com/articles/amplified-exposure-how-aws-flaws-made-amplify-iam-roles-vulnerable-to-takeover/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28871",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-04T15:15:38.647",
"lastModified": "2024-11-21T09:07:05.180",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T14:54:40.080",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,38 +51,79 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oisf:libhtp:0.5.46:*:*:*:*:*:*:*",
"matchCriteriaId": "23444241-F9FB-411D-965A-76586A07A815"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/OISF/libhtp/commit/79e713f3e527593a45f545e854cd9e6fbb3cd3ed",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/OISF/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/OISF/libhtp/security/advisories/GHSA-ffr2-45w9-7wmg",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://redmine.openinfosecfoundation.org/issues/6757",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/OISF/libhtp/commit/79e713f3e527593a45f545e854cd9e6fbb3cd3ed",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/OISF/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/OISF/libhtp/security/advisories/GHSA-ffr2-45w9-7wmg",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://redmine.openinfosecfoundation.org/issues/6757",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29007",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-04T08:15:06.970",
"lastModified": "2024-11-21T09:07:21.500",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T15:05:20.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,16 +49,58 @@
"value": "CWE-918"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.9.1.0",
"versionEndExcluding": "4.18.1.1",
"matchCriteriaId": "B2EE4F78-B6F4-43CB-979E-BFFFFA139AD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cloudstack:4.19.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51E212EC-AC62-4533-B3B2-A660807F0C1F"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29008",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-04T08:15:07.063",
"lastModified": "2024-11-21T09:07:21.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T15:00:30.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14.0.0",
"versionEndExcluding": "4.18.1.1",
"matchCriteriaId": "9368B571-30EC-4EAF-BC4E-8D8DADC7D851"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cloudstack:4.19.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51E212EC-AC62-4533-B3B2-A660807F0C1F"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30256",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-16T15:15:36.487",
"lastModified": "2024-11-21T09:11:33.873",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T14:30:00.660",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openwebui:open_webui:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.1.117",
"matchCriteriaId": "93F422C2-AAAB-46C8-8AD5-27DAC5DED36E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/open-webui/open-webui/security/advisories/GHSA-39wr-r5vm-3jxj",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2024-033_open-webui",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory",
"Exploit"
]
},
{
"url": "https://github.com/open-webui/open-webui/security/advisories/GHSA-39wr-r5vm-3jxj",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2024-033_open-webui",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33775",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-01T13:15:52.130",
"lastModified": "2024-11-21T09:17:28.473",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T15:22:14.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,22 +61,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nagios:nagios_xi:2024:r1.0.1:*:*:*:*:*:*",
"matchCriteriaId": "C1FE1A0B-78D1-4626-A4CD-21B843DA596E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Neo-XeD/CVE-2024-33775",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.nagios.com/changelog/#nagios-xi",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/Neo-XeD/CVE-2024-33775",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.nagios.com/changelog/#nagios-xi",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36048",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-18T21:15:47.673",
"lastModified": "2024-11-21T09:21:30.610",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T15:21:31.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,46 +51,135 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.17",
"matchCriteriaId": "06B844AA-8325-4FBB-8B65-56C09DEE08A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndExcluding": "6.2.13",
"matchCriteriaId": "838DE514-7032-40DC-AF57-1661CB8FAFB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.3.0",
"versionEndExcluding": "6.5.6",
"matchCriteriaId": "10881526-5262-4B7D-AB3D-EFF4A458C57B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.0",
"versionEndExcluding": "6.7.1",
"matchCriteriaId": "84302790-D8CB-4737-A582-7FFB743E8DEE"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560317",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560368",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGB6KUPJFQWUBKXVDPJUMAD6KNJJEWPW/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZOOZZZSK5PNRHFGQMUGUHVYWLILFJCRS/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPHAI3DKDCIU6XLNS6PV6GFS2PHH3GZM/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560317",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560368",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGB6KUPJFQWUBKXVDPJUMAD6KNJJEWPW/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZOOZZZSK5PNRHFGQMUGUHVYWLILFJCRS/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPHAI3DKDCIU6XLNS6PV6GFS2PHH3GZM/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36383",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-27T11:15:08.710",
"lastModified": "2024-11-21T09:22:03.837",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T15:22:59.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-706"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:logpoint:saml_authentication:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0.3",
"matchCriteriaId": "0DF7A077-8051-45F1-BC65-AD18F3410B08"
}
]
}
]
}
],
"references": [
{
"url": "https://servicedesk.logpoint.com/hc/en-us/articles/19128172110621-Arbitrary-file-deletion-through-URL-Injection-to-SAML-SSO-URL-Response",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://servicedesk.logpoint.com/hc/en-us/articles/19128172110621-Arbitrary-file-deletion-through-URL-Injection-to-SAML-SSO-URL-Response",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40750",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T20:15:12.357",
"lastModified": "2024-11-22T19:15:07.113",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T15:15:24.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,90 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:mx6200_firmware:1.0.8.215731:*:*:*:*:*:*:*",
"matchCriteriaId": "98BE0603-7E43-48A9-8838-1884AC4BD6F6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:linksys:mx6200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BC95C8A-2720-467C-A911-1896C625A473"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:mbe7000_firmware:1.0.10.215314:*:*:*:*:*:*:*",
"matchCriteriaId": "1AC4F3D2-AF7F-47A4-B6D9-304B7EA62C44"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:linksys:mbe7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56643D1C-DB0B-40A3-9029-E3B95241BB8D"
}
]
}
]
}
],
"references": [
{
"url": "https://news.ycombinator.com/item?id=40917312",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://stackdiary.com/linksys-velop-routers-send-wi-fi-passwords-in-plaintext-to-us-servers/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Press/Media Coverage"
]
},
{
"url": "https://news.ycombinator.com/item?id=40917312",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://stackdiary.com/linksys-velop-routers-send-wi-fi-passwords-in-plaintext-to-us-servers/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Press/Media Coverage"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47226",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-22T02:15:02.797",
"lastModified": "2025-02-10T22:15:35.383",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T14:50:07.543",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
@ -58,14 +58,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netbox:netbox:4.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "AB7E720B-AA69-447A-818C-0E499CDE2200"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.0",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/tu3n4nh/netbox/issues/1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48286",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-21T18:15:09.710",
"lastModified": "2024-11-21T21:15:22.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T15:15:59.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:e3000_firmware:1.0.06.002:*:*:*:*:*:*:*",
"matchCriteriaId": "A29A75AC-CD80-4524-BAD4-20006D38BB27"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:linksys:e3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B6F8223-1DC8-4465-B2A7-3C43EB5FA4D9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/GroundCTL2MajorTom/pocs/blob/main/Cisco_Linksys_E3000_rce.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-53621",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-30T15:15:22.727",
"lastModified": "2025-06-30T15:15:22.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow in the formSetCfm() function of Tenda AC1206 1200M 11ac US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 allows attackers to cause a Denial of Service (DoS) via a crafted POST request."
}
],
"metrics": {},
"references": [
{
"url": "https://drive.google.com/file/d/1b7DlkG7XVmJmCxDrX7u1X7CAk-lOviBX/view?usp=sharing",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/qingwei4/Router-VR/blob/main/CVE-2024-53621/CVE-2024-53621.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54772",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-11T23:15:09.117",
"lastModified": "2025-02-24T16:15:12.213",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T14:48:12.073",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mikrotik:routeros:*:*:*:*:-:*:*:*",
"versionStartIncluding": "6.43",
"versionEndExcluding": "6.49.18",
"matchCriteriaId": "F618C1B1-340C-4893-A0FF-23B533F787E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mikrotik:routeros:*:*:*:*:ltr:*:*:*",
"versionStartIncluding": "6.43.13",
"versionEndIncluding": "6.49.13",
"matchCriteriaId": "2DD4F8E4-8A7E-408E-ACF8-C7D003D78027"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mikrotik:routeros:*:*:*:*:-:*:*:*",
"versionStartIncluding": "7.1",
"versionEndExcluding": "7.18",
"matchCriteriaId": "BD087026-C45D-44F3-A305-41A07FDB14EC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/deauther890/CVE-2024-54772",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54952",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-29T20:15:26.007",
"lastModified": "2025-05-30T16:31:03.107",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T14:46:38.763",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mikrotik:routeros:6.40.5:*:*:*:-:*:*:*",
"matchCriteriaId": "22D51A8C-A3AA-46D3-9191-2C7982039A0A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/noobone123/RouterOS-issues/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-56915",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-26T15:15:22.570",
"lastModified": "2025-06-26T18:57:43.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T14:44:36.367",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Netbox Community v4.1.7 and fixed in v.4.2.2 is vulnerable to Cross Site Scripting (XSS) via the RSS feed widget."
},
{
"lang": "es",
"value": "Netbox Community v4.1.7 y corregido en v.4.2.2 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del widget de fuente RSS."
}
],
"metrics": {
@ -47,18 +51,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netbox:netbox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1.7",
"versionEndExcluding": "4.2.2",
"matchCriteriaId": "054538C0-2600-4CED-BA7D-5A16A950D2BD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/noxlumens/Vulnerability-Research/tree/main/CVE-2024-56915",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://youtu.be/n_5w0WVP8zE",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56916",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-24T18:15:24.240",
"lastModified": "2025-06-26T18:58:14.280",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T14:43:46.500",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netbox:netbox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1.7",
"versionEndIncluding": "4.2.1",
"matchCriteriaId": "F4F7646D-0677-4FE5-B4B1-3F10F068A625"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/noxlumens/Vulnerability-Research/tree/main/CVE-2024-56916",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit"
]
},
{
"url": "https://www.youtube.com/watch?v=GC8-PUlu2i8",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56917",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-24T20:15:24.790",
"lastModified": "2025-06-26T18:58:14.280",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T14:44:01.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netbox:netbox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1.7",
"versionEndIncluding": "4.2.1",
"matchCriteriaId": "F4F7646D-0677-4FE5-B4B1-3F10F068A625"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/noxlumens/Vulnerability-Research/tree/main/CVE-2024-56917",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://youtu.be/GC8-PUlu2i8?si=eoScOk8IUJdwPDc_&t=172",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56918",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-24T17:15:29.333",
"lastModified": "2025-06-26T18:58:14.280",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T14:42:40.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netbox:netbox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1.7",
"versionEndIncluding": "4.2.1",
"matchCriteriaId": "F4F7646D-0677-4FE5-B4B1-3F10F068A625"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/noxlumens/Vulnerability-Research/tree/main/CVE-2024-56918",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://youtu.be/GC8-PUlu2i8?si=cd_dSVno93pCisr-&t=103",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://youtu.be/zBbjNNK79pg",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-24290",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-06-29T20:15:24.930",
"lastModified": "2025-06-29T20:15:24.930",
"lastModified": "2025-06-30T15:15:23.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple Authenticated SQL Injection vulnerabilities found in UISP Application (Version 2.4.206 and earlier) could allow a malicious actor with low privileges to escalate privileges."
},
{
"lang": "es",
"value": "Varias vulnerabilidades de inyecci\u00f3n SQL autenticada encontradas en UISP Application (versi\u00f3n 2.4.206 y anteriores) podr\u00edan permitir que un actor malicioso con bajos privilegios aumente sus privilegios."
}
],
"metrics": {
@ -35,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-048-048/af007d99-bb6d-4368-a12f-75e84de19e8d",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-2895",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-30T15:15:23.133",
"lastModified": "2025-06-30T15:15:23.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Cloud Pak System 2.3.3.6, 2.3.36 iFix1, 2.3.3.7, 2.3.3.7 iFix1, 2.3.4.0, 2.3.4.1, and 2.3.4.1 iFix1 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7237164",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,20 +2,47 @@
"id": "CVE-2025-32897",
"sourceIdentifier": "security@apache.org",
"published": "2025-06-28T19:15:21.917",
"lastModified": "2025-06-28T19:15:21.917",
"lastModified": "2025-06-30T15:15:23.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in Apache Seata (incubating).\n\nThis security vulnerability is the same as CVE-2024-47552, but the version range described in the CVE-2024-47552 definition is too narrow.\nThis issue affects Apache Seata (incubating): from 2.0.0 before 2.3.0.\n\nUsers are recommended to upgrade to version 2.3.0, which fixes the issue."
},
{
"lang": "es",
"value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Apache Seata (en desarrollo). Esta vulnerabilidad de seguridad es similar a la CVE-2024-47552, pero el rango de versiones descrito en la definici\u00f3n de CVE-2024-47552 es demasiado limitado. Este problema afecta a Apache Seata (en desarrollo): desde la versi\u00f3n 2.0.0 hasta la 2.3.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.3.0, que soluciona el problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-45529",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-27T19:15:25.763",
"lastModified": "2025-05-28T15:01:30.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-30T15:24:44.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sscms:siteserver_cms:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3DEF8662-8E5A-4177-B5ED-54EB63B05509"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/sec-Kode/000fbab6dc649888bc196e76a4076b57",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/sec-Kode/cve/blob/main/cve2.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,16 +2,59 @@
"id": "CVE-2025-46014",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-30T02:15:21.077",
"lastModified": "2025-06-30T02:15:21.077",
"lastModified": "2025-06-30T15:15:23.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Several services in Honor Device Co., Ltd Honor PC Manager v16.0.0.118 was discovered to connect services to the named pipe iMateBookAssistant with default or overly permissive security attributes, leading to a privilege escalation."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que varios servicios en Honor Device Co., Ltd Honor PC Manager v16.0.0.118 conectaban servicios a la tuber\u00eda con nombre iMateBookAssistant con atributos de seguridad predeterminados o demasiado permisivos, lo que provocaba una escalada de privilegios."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Souhardya/Exploit-PoCs/tree/main/HonorPCManager-PrivEsc",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-6908",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-30T13:15:32.133",
"lastModified": "2025-06-30T13:15:32.133",
"lastModified": "2025-06-30T15:15:23.970",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.604928",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/91",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2025-6911",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-30T15:15:24.310",
"lastModified": "2025-06-30T15:15:24.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Student Record System 3.2. It has been declared as critical. This vulnerability affects unknown code of the file /manage-subjects.php. The manipulation of the argument del leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/94",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.314404",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.314404",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.605076",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/f1rstb100d/myCVE/issues/94",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6912",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-30T15:15:24.510",
"lastModified": "2025-06-30T15:15:24.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Student Record System 3.2. It has been rated as critical. This issue affects some unknown processing of the file /manage-students.php. The manipulation of the argument del leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/f1rstb100d/myCVE/issues/95",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.314405",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.314405",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.605077",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-30T14:26:59.883158+00:00
2025-06-30T16:00:11.385363+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-30T14:26:28.500000+00:00
2025-06-30T15:24:44.787000+00:00
```
### Last Data Feed Release
@ -27,40 +27,55 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-06-27T00:00:04.323263+00:00
2025-06-30T14:32:06.616569+00:00
```
### Total Number of included CVEs
```plain
299883
299888
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `5`
- [CVE-2025-6909](CVE-2025/CVE-2025-69xx/CVE-2025-6909.json) (`2025-06-30T14:15:25.083`)
- [CVE-2025-6910](CVE-2025/CVE-2025-69xx/CVE-2025-6910.json) (`2025-06-30T14:15:25.343`)
- [CVE-2023-47310](CVE-2023/CVE-2023-473xx/CVE-2023-47310.json) (`2025-06-30T15:15:22.493`)
- [CVE-2024-53621](CVE-2024/CVE-2024-536xx/CVE-2024-53621.json) (`2025-06-30T15:15:22.727`)
- [CVE-2025-2895](CVE-2025/CVE-2025-28xx/CVE-2025-2895.json) (`2025-06-30T15:15:23.133`)
- [CVE-2025-6911](CVE-2025/CVE-2025-69xx/CVE-2025-6911.json) (`2025-06-30T15:15:24.310`)
- [CVE-2025-6912](CVE-2025/CVE-2025-69xx/CVE-2025-6912.json) (`2025-06-30T15:15:24.510`)
### CVEs modified in the last Commit
Recently modified CVEs: `13`
Recently modified CVEs: `27`
- [CVE-2024-22014](CVE-2024/CVE-2024-220xx/CVE-2024-22014.json) (`2025-06-30T14:26:28.500`)
- [CVE-2024-25343](CVE-2024/CVE-2024-253xx/CVE-2024-25343.json) (`2025-06-30T14:06:29.553`)
- [CVE-2024-30219](CVE-2024/CVE-2024-302xx/CVE-2024-30219.json) (`2025-06-30T14:22:16.677`)
- [CVE-2024-30220](CVE-2024/CVE-2024-302xx/CVE-2024-30220.json) (`2025-06-30T14:22:06.540`)
- [CVE-2024-31755](CVE-2024/CVE-2024-317xx/CVE-2024-31755.json) (`2025-06-30T14:15:29.117`)
- [CVE-2024-32404](CVE-2024/CVE-2024-324xx/CVE-2024-32404.json) (`2025-06-30T14:11:32.800`)
- [CVE-2024-32406](CVE-2024/CVE-2024-324xx/CVE-2024-32406.json) (`2025-06-30T14:11:02.940`)
- [CVE-2024-33671](CVE-2024/CVE-2024-336xx/CVE-2024-33671.json) (`2025-06-30T14:25:03.890`)
- [CVE-2024-33673](CVE-2024/CVE-2024-336xx/CVE-2024-33673.json) (`2025-06-30T14:22:57.057`)
- [CVE-2025-1634](CVE-2025/CVE-2025-16xx/CVE-2025-1634.json) (`2025-06-30T14:15:23.023`)
- [CVE-2025-24292](CVE-2025/CVE-2025-242xx/CVE-2025-24292.json) (`2025-06-30T14:15:23.483`)
- [CVE-2025-53391](CVE-2025/CVE-2025-533xx/CVE-2025-53391.json) (`2025-06-30T14:15:24.623`)
- [CVE-2025-53392](CVE-2025/CVE-2025-533xx/CVE-2025-53392.json) (`2025-06-30T14:15:24.803`)
- [CVE-2024-20312](CVE-2024/CVE-2024-203xx/CVE-2024-20312.json) (`2025-06-30T15:21:14.327`)
- [CVE-2024-23335](CVE-2024/CVE-2024-233xx/CVE-2024-23335.json) (`2025-06-30T15:03:32.623`)
- [CVE-2024-23336](CVE-2024/CVE-2024-233xx/CVE-2024-23336.json) (`2025-06-30T15:10:32.987`)
- [CVE-2024-28056](CVE-2024/CVE-2024-280xx/CVE-2024-28056.json) (`2025-06-30T14:40:14.440`)
- [CVE-2024-28871](CVE-2024/CVE-2024-288xx/CVE-2024-28871.json) (`2025-06-30T14:54:40.080`)
- [CVE-2024-29007](CVE-2024/CVE-2024-290xx/CVE-2024-29007.json) (`2025-06-30T15:05:20.587`)
- [CVE-2024-29008](CVE-2024/CVE-2024-290xx/CVE-2024-29008.json) (`2025-06-30T15:00:30.947`)
- [CVE-2024-30256](CVE-2024/CVE-2024-302xx/CVE-2024-30256.json) (`2025-06-30T14:30:00.660`)
- [CVE-2024-33775](CVE-2024/CVE-2024-337xx/CVE-2024-33775.json) (`2025-06-30T15:22:14.757`)
- [CVE-2024-36048](CVE-2024/CVE-2024-360xx/CVE-2024-36048.json) (`2025-06-30T15:21:31.767`)
- [CVE-2024-36383](CVE-2024/CVE-2024-363xx/CVE-2024-36383.json) (`2025-06-30T15:22:59.717`)
- [CVE-2024-40750](CVE-2024/CVE-2024-407xx/CVE-2024-40750.json) (`2025-06-30T15:15:24.097`)
- [CVE-2024-47226](CVE-2024/CVE-2024-472xx/CVE-2024-47226.json) (`2025-06-30T14:50:07.543`)
- [CVE-2024-48286](CVE-2024/CVE-2024-482xx/CVE-2024-48286.json) (`2025-06-30T15:15:59.560`)
- [CVE-2024-54772](CVE-2024/CVE-2024-547xx/CVE-2024-54772.json) (`2025-06-30T14:48:12.073`)
- [CVE-2024-54952](CVE-2024/CVE-2024-549xx/CVE-2024-54952.json) (`2025-06-30T14:46:38.763`)
- [CVE-2024-56915](CVE-2024/CVE-2024-569xx/CVE-2024-56915.json) (`2025-06-30T14:44:36.367`)
- [CVE-2024-56916](CVE-2024/CVE-2024-569xx/CVE-2024-56916.json) (`2025-06-30T14:43:46.500`)
- [CVE-2024-56917](CVE-2024/CVE-2024-569xx/CVE-2024-56917.json) (`2025-06-30T14:44:01.510`)
- [CVE-2024-56918](CVE-2024/CVE-2024-569xx/CVE-2024-56918.json) (`2025-06-30T14:42:40.747`)
- [CVE-2025-24290](CVE-2025/CVE-2025-242xx/CVE-2025-24290.json) (`2025-06-30T15:15:23.027`)
- [CVE-2025-32897](CVE-2025/CVE-2025-328xx/CVE-2025-32897.json) (`2025-06-30T15:15:23.310`)
- [CVE-2025-45529](CVE-2025/CVE-2025-455xx/CVE-2025-45529.json) (`2025-06-30T15:24:44.787`)
- [CVE-2025-46014](CVE-2025/CVE-2025-460xx/CVE-2025-46014.json) (`2025-06-30T15:15:23.493`)
- [CVE-2025-6908](CVE-2025/CVE-2025-69xx/CVE-2025-6908.json) (`2025-06-30T15:15:23.970`)
## Download and Usage

View File

@ -237122,7 +237122,7 @@ CVE-2023-46007,0,0,4d8bd4276a6f33014e5cccd18af44c94accfc3d0d1060f127e226770cd392
CVE-2023-46009,0,0,8d5d3efe4904e9ed396a360bc3df9ca49b5c7f9c24b84c3731c898ca6af2cd25,2024-11-21T08:27:44.953000
CVE-2023-4601,0,0,728105d909686857ff780a9b66797b36d27e19a5c92219c114bd2d57b23068da,2024-11-21T08:35:31.263000
CVE-2023-46010,0,0,a760334e735bf57366f51786ed934ace6ba2334c716b4e9eb441d666baa13d56,2024-11-21T08:27:45.110000
CVE-2023-46012,0,0,2016223adb3bbf483d47e82168fe465164e64c855db4b9a4dcfedc73ae34b506,2025-03-14T02:15:12.757000
CVE-2023-46012,0,1,ecc223c2a6fafdc9017a47680c314114758dfbb8eb3889bafa4cba12718ca375,2025-06-30T15:13:28.630000
CVE-2023-46014,0,0,c1f473e034f1b720c68866b0246e6628e08d7fea94c3c9f33563183efe72b624,2024-11-21T08:27:45.480000
CVE-2023-46015,0,0,6ec7272e35ed39f95a30c44def938c7a1ceb6ac3b9cde73bfc674dee461563d4,2024-11-21T08:27:45.650000
CVE-2023-46016,0,0,63b81b039c3c6d3fe51e8f665338c7f5ffbb44c8095a2fa0358f7c9c87226ef7,2024-11-21T08:27:45.800000
@ -238172,6 +238172,7 @@ CVE-2023-47307,0,0,112c4fcd2316630545c0b8214cf0e27b8ce26f6bb0e9c99277c68ca8f2b87
CVE-2023-47308,0,0,7d5ff54c309fa19adc9e793bda18cb0b740ceb6c9d3315a532ce40f5c4fd1165,2024-11-21T08:30:07.870000
CVE-2023-47309,0,0,24c2011ecb6d7db56739e87951b446acfc2502ed2d4ef1d44fda31d0f3b47ac3,2024-11-21T08:30:08.030000
CVE-2023-4731,0,0,d05232eed0c052dd2a1d5ec6b0be8f9b495ae5a2bd0ca62433c506bf8c986847,2025-01-15T16:31:04.880000
CVE-2023-47310,1,1,8993e802247daefbc7e2827774853725dec479efcc15ab06e893221fb280a062,2025-06-30T15:15:22.493000
CVE-2023-47311,0,0,b95c9f4ee7ff54f1db61b336a25ed1ed49149c6e779141e5eaa4ce520fe1e575,2024-11-21T08:30:08.283000
CVE-2023-47312,0,0,42944cc44c110aadfec0e3ea54804d471daddba94144037ba9fb032325e0ea39,2024-11-21T08:30:08.460000
CVE-2023-47313,0,0,263f2c0543bd5ec30e1b2e45eebc7a95f0ea67b86f319d05fa2226679d75307f,2024-11-21T08:30:08.597000
@ -250310,12 +250311,12 @@ CVE-2024-20304,0,0,f59929d4ee2b44d7536f77812cb12006cdc47f7a16a595b1606514d6161e0
CVE-2024-20305,0,0,bf4e229eeb86abd621b631185424994199aa8e5f1ce1ee169d81b389eb9114cb,2024-11-21T08:52:18.450000
CVE-2024-20306,0,0,da88e22d1c02be9fdc6cbfe89db5d7e8af86893f16e7fe87e6872b4543960bd7,2024-11-21T08:52:18.600000
CVE-2024-20307,0,0,601b50e63106903bdc8774c59e9ce5d6e44c1e420e6e2a0916a5899f36f7a7cb,2024-11-21T08:52:18.737000
CVE-2024-20308,0,0,a198d9a5830ad55d4515f19c5dacac017f121cba3c44155e75db528d1c98a805,2024-11-26T16:15:12.960000
CVE-2024-20308,0,1,d1518cb74f817f77221bb7afc62bf7c6ac14ce3b22dd7d8b7f382166c0376518,2025-06-30T15:13:39.897000
CVE-2024-20309,0,0,4db169b8df55ce9ef7728bc6ce44c7b86a5a4e680a0cde09a602bf1399efb941,2024-11-21T08:52:19.290000
CVE-2024-2031,0,0,bab788affd7bc170d09eebf7b2936381d311fddd48a21ea76b7423049da3c18b,2025-03-13T01:12:05.833000
CVE-2024-20310,0,0,b5320a73716791169e180b2e1614f680f6f9923c6656228c3dc9ca187d070893,2024-11-21T08:52:19.497000
CVE-2024-20311,0,0,53b383d7383e9e3e537e817f6aac5140fa98d7170f0e570bca350aef715ae1d5,2024-11-21T08:52:19.683000
CVE-2024-20312,0,0,f5fcf951f7e90ad8a1dec51aecd1f26e20d95e89d5208b503227941cfee15de6,2024-11-21T08:52:20.100000
CVE-2024-20312,0,1,ecb1edffdd8d0fc50bb84b1c0832d7e759a467fda651959807d9681381b1a514,2025-06-30T15:21:14.327000
CVE-2024-20313,0,0,e0e15a530c0689a3762c376983b46e938a357d447cb246349107cc0b204d199d,2024-11-21T08:52:20.890000
CVE-2024-20314,0,0,0d8e380300e50c4866522f51126c3f734eaebdd9d9fc59ebeee7a03e63e06ebb,2024-11-21T08:52:21.060000
CVE-2024-20315,0,0,7d966db225cabf76c83361d4e7be47d53fbea678ec97467156623f2f786cebc5,2024-11-21T08:52:21.273000
@ -251877,7 +251878,7 @@ CVE-2024-22010,0,0,8d9c2af8232a04979125c301bde0e0e33e9ef004f7a735afb9496b11f7478
CVE-2024-22011,0,0,96c1fc7a4596546c5429b0a68245714dac2517f8d18ad519b95b50d7e93d1612,2025-03-26T21:15:21.553000
CVE-2024-22012,0,0,88165b48b4e490918e0710c9bc3ca6d32b1c2def519419a3f2ddc2bd409c5c89,2025-05-08T19:15:57.907000
CVE-2024-22013,0,0,a1461319ead98423ad6fc0d646b9a33f399dadfb288cdf43b0101e5946e736ce,2024-11-06T21:35:02.500000
CVE-2024-22014,0,1,aa6df7d6dc43aafd6fc00b314d40595a6761891fba6f4344dbac03553c44091f,2025-06-30T14:26:28.500000
CVE-2024-22014,0,0,aa6df7d6dc43aafd6fc00b314d40595a6761891fba6f4344dbac03553c44091f,2025-06-30T14:26:28.500000
CVE-2024-22015,0,0,528b7fc21429577c21dd43b5ff69c927566544892694f980e105e1473c6f6c62,2024-11-21T08:55:23.797000
CVE-2024-22016,0,0,e61d53ad48de566e671c4870524f86981cc84cd4ff147249779157ec803d6562,2024-11-21T08:55:23.953000
CVE-2024-22017,0,0,f8ddd81dce3bf81896e81991f007af8de38ff2bc2bdfa1774945eaac4d130654,2024-11-21T08:55:24.130000
@ -252804,8 +252805,8 @@ CVE-2024-23331,0,0,d249684f95243c86cd9ac165298c6d83c767bd88a7562199924aa7b584973
CVE-2024-23332,0,0,d71e1782a43b90e8f3c6045284fd1374fc8749a7455b52cacdef33d8b65d9b8d,2024-11-21T08:57:31.710000
CVE-2024-23333,0,0,0ce507d9128043e9140244402c880eb4e81dce5a3ce65cedad46c5c7e37a048a,2024-11-21T08:57:31.867000
CVE-2024-23334,0,0,24e22a9f85144a6eb80a966dfeee736b72688dbc715298232762b9057f0067b8,2024-11-21T08:57:32.007000
CVE-2024-23335,0,0,de7f349b152f92f737c021e47e0cabdc50557a944e31259bc2e405bafe42a824,2024-11-21T08:57:32.177000
CVE-2024-23336,0,0,4abac73264efb3ee98b509450e97c2c3efefdddaa6ba486ed0dee4b6115d0057,2024-11-21T08:57:32.330000
CVE-2024-23335,0,1,932d82455042117085b3080e11b9b54b5b2fe8e5dbfad1c868507271da7c8fa8,2025-06-30T15:03:32.623000
CVE-2024-23336,0,1,6a849eeb4c465c817af539ae158a9eeb3ebef70010df83b5e2d70eaa9acc7f6d,2025-06-30T15:10:32.987000
CVE-2024-23337,0,0,4812a44cfcfaeff19ddf932df8105410d7b53fea8400702d0e5bf6b82a124a3c,2025-06-20T17:41:15.807000
CVE-2024-23338,0,0,f58e3dae5cf0c4c68340ef9b15d9086b7094eb5eb8c170306769557f46f11afe,2025-03-28T22:15:16.150000
CVE-2024-23339,0,0,4ed8c1a7853a803ffbe035c0abd3aa76c7fa65b36f181c9915b990b81e7293ca,2024-11-21T08:57:32.477000
@ -254298,7 +254299,7 @@ CVE-2024-25327,0,0,200c2b510342a3e155d5c5aae84c1549b1fe17451fa1d4b0fa553a648fd4f
CVE-2024-2533,0,0,6ae2130a2853cfc35a0325db37738d70d71a25805f631d6422b528a071b1e72e,2025-03-03T16:49:51.433000
CVE-2024-25331,0,0,2b5df9bf20f2ad2788f6bfc10fc6e2710ebce7c5b2ae509b177bc3eeb5d61cac,2024-11-21T09:00:39.057000
CVE-2024-2534,0,0,f24633e3eff1520ce3c2eedeed339e97d80233d79efd834bb5b9d5ffd097cfc8,2025-03-03T16:45:52.740000
CVE-2024-25343,0,1,e3b01a3e47d461bb19d4a2757314cce0c75401bbb6aa8dd7e74cfa1adf0fb398,2025-06-30T14:06:29.553000
CVE-2024-25343,0,0,e3b01a3e47d461bb19d4a2757314cce0c75401bbb6aa8dd7e74cfa1adf0fb398,2025-06-30T14:06:29.553000
CVE-2024-25344,0,0,1d37f417b2857c3f92d549197061b03ca0a3c30434d1771e1f176d151c26b4a1,2025-04-25T19:04:02.670000
CVE-2024-2535,0,0,0bf848903fc38663f407d2d981ac3254e4cae4551d368c29ada205f88200bdc8,2025-03-03T17:08:17.677000
CVE-2024-25350,0,0,4475b2cde03dfd1b78deacd34e1c6eded8bdb8d6a390fd1c3a4b68cda68ace07,2025-03-27T15:09:10.017000
@ -256537,7 +256538,7 @@ CVE-2024-28051,0,0,de198a0eafa66377d1b1913e11ab30e60d08fcf78e4d7e0f859604a31b006
CVE-2024-28052,0,0,c091e5a10488583b0029fed7f1a8e4d1e6cdb2795bd026298532c166c3b5f4bd,2024-11-21T09:05:42.417000
CVE-2024-28053,0,0,9d049b1d60f930519827e1044a4f3fd31b9f0d3b4e2dc36c85f114fc799f4e7b,2024-12-13T17:04:25.663000
CVE-2024-28054,0,0,fa08065bd648393ce8106d68a1c22c495344465ae4a1ec5efff8e744f6459d7b,2025-03-27T15:15:51.183000
CVE-2024-28056,0,0,54ec43d2bd6a1e03728ecaf459c1f7b68dccb34954269202c18491a26f12d2d7,2025-03-20T19:15:28.160000
CVE-2024-28056,0,1,fcff5722866de62d2d3b446f843367f5f01f73092f2fe89f1bd3572396a58a00,2025-06-30T14:40:14.440000
CVE-2024-28058,0,0,787a78d70d26214b6983cf8dcf8276db60e674f375fc2818e93317905b7a88a2,2024-11-21T17:15:12.207000
CVE-2024-2806,0,0,4d6f6543e89281b6263f8cf8af7cacf5366694bd179ef044fb7a7b3d27de5f3b,2024-11-21T09:10:33.937000
CVE-2024-28060,0,0,430e9cb50592c0e24fcf0b0a6df7fab52ef15ed2b5618838340295f89086c9cc,2025-05-30T16:15:37.183000
@ -257040,7 +257041,7 @@ CVE-2024-28868,0,0,eb611e363be714e3967489367b2768d2aad8d5b204059d84423a8d33f9241
CVE-2024-28869,0,0,37b1b2db8728242f0e02311908952ceff63256ca368c823beb03f1803daff4a5,2024-11-21T09:07:04.857000
CVE-2024-2887,0,0,2151745dcd1daf556cb13d574e9eac547b9e2e36f2c3f34a1c838383696c4f69,2025-03-28T20:15:22.407000
CVE-2024-28870,0,0,fd666a29a4cdc30a1bbf0c2ca08eb94fda907da7241920daffa095d89f5c41fe,2025-04-28T16:43:27.213000
CVE-2024-28871,0,0,66beb860b668b240441f397870a5def3e52a27283cc1f106699d7ed5d3fb58ea,2024-11-21T09:07:05.180000
CVE-2024-28871,0,1,9fb35397b5703a2424c95885bbf22334825ce5c7efd04d5f3bee1ee399f24e15,2025-06-30T14:54:40.080000
CVE-2024-28872,0,0,efd605e2b04b121c2231623009b4fa909abf78c19ec3893f1988cbfc577adb70,2025-03-26T15:15:49.380000
CVE-2024-28875,0,0,4dfb9c16f5bf82bf68888163d531fb859006c6398976e17b2766ff7841ca461a,2024-11-13T18:10:05.647000
CVE-2024-28876,0,0,275454f6648ae48abb7dd0bb2572cfbc3374f282a0e739572d5d9f74b7aeb1a2,2024-09-06T18:35:00.337000
@ -257173,8 +257174,8 @@ CVE-2024-29001,0,0,6fc82a6f335f3c5662579fa4bd43a81249ae490e4f8e2e26c0e39a12e19cd
CVE-2024-29003,0,0,8eb3860946e379c345ffc0d82ffcc3fa9093dd59c57f1838dd5ab8d2f9a38c1d,2025-02-26T18:46:56.310000
CVE-2024-29004,0,0,8446272ff6c6520c3561fc5cc637690841bb3c06810fde039230c89325966c27,2025-02-26T18:47:06.700000
CVE-2024-29006,0,0,09d3a39109b536781008f59da0cfe8dc4e1f9f87172f276e502e52b38fb6a60b,2025-03-27T20:15:25.687000
CVE-2024-29007,0,0,9467d08502d3e36b2d3e90e284f19d567ff6430ff612d29071e043652d272704,2024-11-21T09:07:21.500000
CVE-2024-29008,0,0,ca0aecdf68c77dbd22be28cfa60b571dde82304762578b0f93292832da2ce951,2024-11-21T09:07:21.670000
CVE-2024-29007,0,1,7a86dc551817cfa356f5ed10f3f6af0e1988ff955afd32dd191061e59836a046,2025-06-30T15:05:20.587000
CVE-2024-29008,0,1,b5831d29540172edf7046e4842955fe0cc3096b69e6746f3a94242ebb8e3bde6,2025-06-30T15:00:30.947000
CVE-2024-29009,0,0,d62ab061bcc3cb61c24bc6f5800368ca076909ddd0e49b565343116fd7600952,2024-11-21T09:07:21.850000
CVE-2024-2901,0,0,4a7aeac7c015447d111eabc56ba2b8138e6c83716ab3368b8919f39c2cca4f05,2025-01-22T17:51:47.007000
CVE-2024-29010,0,0,4dbbb313be40d0c135584395796085f49dfc5a38f9b20d53ef797f5c9a7732c3,2024-11-21T09:07:22.030000
@ -258077,9 +258078,9 @@ CVE-2024-30215,0,0,a1b0f900cb62de925491aed41f5921b94f9df9f244b21ce8ccb9eca6d15f7
CVE-2024-30216,0,0,b347f4e1cd688789ece90c7e9f749d8a81a14f518a018cb6e704a8c4efadc5e6,2024-11-21T09:11:27.933000
CVE-2024-30217,0,0,8b1ee13cb508bb6c80692072b22edbe0b22fa8c14c399fe6c5445c20f26e9f96,2024-11-21T09:11:28.067000
CVE-2024-30218,0,0,62ab1357959cfbcc7eb28f53243d1a18228ff767f9cfec29cd8382365b686eb9,2024-11-21T09:11:28.190000
CVE-2024-30219,0,1,69446f928f7c6c0828561f636ccbee8b4547c7b47fce36c15f795287a53f1528,2025-06-30T14:22:16.677000
CVE-2024-30219,0,0,69446f928f7c6c0828561f636ccbee8b4547c7b47fce36c15f795287a53f1528,2025-06-30T14:22:16.677000
CVE-2024-3022,0,0,c0b2ab18f4ddf27bd1888310fcf31460b206066adf8181fccf29aff5b55609b6,2025-03-13T01:38:18.387000
CVE-2024-30220,0,1,d1a2a03d425115136f07683f804c002d68e9ebde653c9ab7441b076617abf748,2025-06-30T14:22:06.540000
CVE-2024-30220,0,0,d1a2a03d425115136f07683f804c002d68e9ebde653c9ab7441b076617abf748,2025-06-30T14:22:06.540000
CVE-2024-30221,0,0,2bf4e4f630b8564c6ce7ebaed368d2ce0987c09bd88d0b53cd40b4e16957d1c5,2025-04-08T16:40:47.867000
CVE-2024-30222,0,0,2acbf9926170b6928bfebb087e84997bd435a46d9a573e64828b16eddfc1cfcd,2025-05-29T20:32:56.797000
CVE-2024-30223,0,0,1b115c948d97b97bfc97e8597ecbd8f244b6fa404d47a4f00a9c6f0d86f485e2,2025-05-29T20:30:31.620000
@ -258118,7 +258119,7 @@ CVE-2024-30252,0,0,8b3d976aa65c8aec664fdfec496f8225de753f3f7160d8da85d65bd4c8eab
CVE-2024-30253,0,0,bc4506e5c3b7edd4c1da781f36ecd0afb5af25de6210cbbced76946549d2f93c,2024-11-21T09:11:32.927000
CVE-2024-30254,0,0,35546b7409e4119ccffeb76af2517fdc522bbad8073913d5b4579ec29c98ca9e,2024-11-21T09:11:33.107000
CVE-2024-30255,0,0,78b182f0b7f2b08d83e6ce349e002956760de0eeeb0dd012f4a2379fb98daaa1,2024-11-21T09:11:33.297000
CVE-2024-30256,0,0,8642d5a4ce4d5d68a9754f13f7ba74215b6e90771f5838567192e595626d6804,2024-11-21T09:11:33.873000
CVE-2024-30256,0,1,57a135dda425255e994973373bd2cd20f8632968a1c6037a07340df158a9aa12,2025-06-30T14:30:00.660000
CVE-2024-30257,0,0,0845865de494d27d5f9f6f263c73629509cc017f68c837b3079abf330502dab0,2025-02-11T17:46:01.247000
CVE-2024-30258,0,0,0b28c3da41152db30482ad37add74c4e5433dcd898c75859cafa934294374ca7,2025-01-27T18:19:29.930000
CVE-2024-30259,0,0,675b93802531aba4e1319c2e7eb03e13e1b91c93708bf98d69707b40712e6f03,2025-01-27T18:16:00.440000
@ -259242,7 +259243,7 @@ CVE-2024-31745,0,0,1d2bc6dbb22666ca6fd7636d86e091f5aeff674e8f5352a220c9cbb705a7e
CVE-2024-31747,0,0,1ff83f224bdbf8af1f9f4bcb86a91e1f678c13094ae1a77fdf1fd657baea901e,2024-11-21T09:13:50.523000
CVE-2024-3175,0,0,5f6302a6462e73c7261678b54271c3937e1258b7b4f3007957ea22e83fdb94e8,2024-11-21T09:29:04.757000
CVE-2024-31750,0,0,f96eb8e3bbed78e55e09766d655b63a754ae5a7049972e728e16ce77deb482bc,2025-06-10T01:32:26.340000
CVE-2024-31755,0,1,08a16c97f349722aeb622843685593aa4f1a8356483fc4e7bc0a073f6a4ff7fd,2025-06-30T14:15:29.117000
CVE-2024-31755,0,0,08a16c97f349722aeb622843685593aa4f1a8356483fc4e7bc0a073f6a4ff7fd,2025-06-30T14:15:29.117000
CVE-2024-31756,0,0,0934d41af4d2a8096bf6b79ceb165d1d21a8cb15b32982d5c5355673185c396f,2024-11-21T09:13:51.160000
CVE-2024-31757,0,0,827ecdaa9dc7f88a37dfd8f4c09903a5f5a9992b64bc40c5e964ac858799f717,2024-11-21T09:13:51.390000
CVE-2024-31759,0,0,05e1f4131e61d4f0ada0c5e7d6b8aab829a17b3404edb68b414001697214f750,2025-06-12T23:43:02.223000
@ -259689,9 +259690,9 @@ CVE-2024-32392,0,0,330afcb85bc3b2e0ad48bdcfefc0946f06dfd671d9ada4abd359a61c88627
CVE-2024-32394,0,0,fcd63d75d4da407251404a1d2d08afc172eff51aa3e4e8bae9c2e181b13c6815,2024-11-22T16:15:22.317000
CVE-2024-32399,0,0,451fd8b2233e189ac161bb1115242ec61a34c2ccc4b6f8530cbfaeecf7c2697b,2024-11-21T09:14:52.160000
CVE-2024-3240,0,0,971173d54c1994d6b1cfc2e3e8433d0c58e5901156fde410070d2514a513396a,2024-11-21T09:29:13.397000
CVE-2024-32404,0,1,b4ba0adf593d37cfb68aa1c9c31ca81eb77e945e8c5e77ac96a474bc32d8b75d,2025-06-30T14:11:32.800000
CVE-2024-32404,0,0,b4ba0adf593d37cfb68aa1c9c31ca81eb77e945e8c5e77ac96a474bc32d8b75d,2025-06-30T14:11:32.800000
CVE-2024-32405,0,0,03b8b3b387fd90d2d3e2e81b9e088d252ad26d5ebcb2d54e41548bc8a9a694ff,2025-06-13T16:10:19.593000
CVE-2024-32406,0,1,46b160fd713a4cf4c08eb54dd14a0872ddae158fdce801e0f78117febe9138c3,2025-06-30T14:11:02.940000
CVE-2024-32406,0,0,46b160fd713a4cf4c08eb54dd14a0872ddae158fdce801e0f78117febe9138c3,2025-06-30T14:11:02.940000
CVE-2024-32407,0,0,69b4d3bff3264ca20ca024b87ba188215e92e6004de70e7b110ab1314abf0286,2025-06-13T16:11:59.863000
CVE-2024-32409,0,0,bf9e59848caae45d0cc6872d258056c0c656eeada01f508a560f9f71f7f2c3bf,2025-04-04T13:23:40.187000
CVE-2024-3241,0,0,99a869aa2cdccb45dc97a20b04d1a56e494390a52ac89cc6fa2586d94a876e7a,2025-05-14T16:47:45.590000
@ -260731,9 +260732,9 @@ CVE-2024-33668,0,0,1962d48d8af4b5fba76a435be45e2426ee0538789dff9bbf199c2122d44ad
CVE-2024-33669,0,0,14ac632668cd7a1790904a0dcbe3c48aa1f45ca20bb0c62036cdffd62d89e020,2025-06-18T19:26:21.547000
CVE-2024-3367,0,0,6c0aec54854b096f8e878555e9125762e19df628121d5279f20fc46c0c73cc6e,2024-12-05T14:28:32.407000
CVE-2024-33670,0,0,2cc87f19588498db236ce0af8fa8f9dc28f317a9acfa26ac1fe6f44a0e7a504e,2025-06-18T19:16:31.087000
CVE-2024-33671,0,1,e2a6ee4d8c26e7c762a99869717890ef61990720cfcf0abb96618e6668bfed21,2025-06-30T14:25:03.890000
CVE-2024-33671,0,0,e2a6ee4d8c26e7c762a99869717890ef61990720cfcf0abb96618e6668bfed21,2025-06-30T14:25:03.890000
CVE-2024-33672,0,0,8b1650c8b10c28f09a3826e003aa8dee352e02a41ac68246cc28a5b89f1f6f51,2025-06-10T15:32:30.493000
CVE-2024-33673,0,1,6e36f667c15fedee42d77aae087f11d10e17f3851a21dfb665a95ba3ea59fa36,2025-06-30T14:22:57.057000
CVE-2024-33673,0,0,6e36f667c15fedee42d77aae087f11d10e17f3851a21dfb665a95ba3ea59fa36,2025-06-30T14:22:57.057000
CVE-2024-33677,0,0,8c026ba50efd58074ee9fc7efbb88e0c06b2f621d30fb1b24c5e8cd3b5e751f3,2024-11-21T09:17:23.230000
CVE-2024-33678,0,0,0354f1d0d3f7ae634b20d321a0a5fe882afb0c2e7d1d7eb371cc2e66e362d410,2024-11-21T09:17:23.353000
CVE-2024-33679,0,0,e524c9549813edbcd9f9689d9ec53c4e7a53a76ee24a04f714dcc734db66079c,2024-11-21T09:17:23.480000
@ -260780,7 +260781,7 @@ CVE-2024-33771,0,0,f0add2ede557b0082aae42dabf4ed3c8fbc6aa15a6a6905ad64a036368536
CVE-2024-33772,0,0,91ebf0199b77f4fab29c23a278d1f8ef519ea660b4a9fb2413f7104260f44151,2025-05-21T14:42:45.587000
CVE-2024-33773,0,0,034058b04ec93ca6c5edc4f174f8f4df83d661d3c6f32106b0dd0a828f81c868,2025-05-21T14:42:51.290000
CVE-2024-33774,0,0,52b770b7f333615156ba87f01b3cea08102d5ac65159461b358a36f647f81817,2025-05-21T14:42:59.237000
CVE-2024-33775,0,0,bc597e520cb5802c10bcc9b429b021dd323dfc44b73d29075d59180bbe1246e2,2024-11-21T09:17:28.473000
CVE-2024-33775,0,1,d4b3865c53f90b6f898a30c8676203f5e115205e3e8e1366f928d8e33fbf31f2,2025-06-30T15:22:14.757000
CVE-2024-3378,0,0,3baf56e09d4e512582bd0fad8896d230d93b23be4ed5cff61b2d7585ee2d7eb6,2024-11-21T09:29:29.847000
CVE-2024-33780,0,0,72f8dfcd17909bf4c4e40b8b9d97596995a01e522f1d6a66162a9d0b9be0b1c0,2025-06-16T21:43:46.523000
CVE-2024-33781,0,0,c40d097d94d2077cdf36976c1d28b87ecc6f883a65a6fbf3b75f94d98d4a21cb,2025-06-16T21:45:19.070000
@ -262596,7 +262597,7 @@ CVE-2024-36042,0,0,147ac5bb36af25609df7c5a206485ff9ee935e0717258835639ec8532ecca
CVE-2024-36043,0,0,00a1a26002231c8d734c9833d45a24991429b502146d23df3d35da93eb56d40a,2024-11-25T18:15:12.213000
CVE-2024-36046,0,0,dbd46547d3dec5d0c98da2896a67fc7962c2404b9c30c597494ea1c7fc1fadab,2025-04-10T20:14:10.703000
CVE-2024-36047,0,0,793fcc6c774994a5002b23eb00aa9bbf541b93a5aded3aaa88e32ee8f8c13cae,2025-04-10T16:46:54.717000
CVE-2024-36048,0,0,6b6c5fd388f3c5986f4cdf4b3e4b8816859ba03c7b47f889f37c2525cf73f654,2024-11-21T09:21:30.610000
CVE-2024-36048,0,1,6ecfa5c9b23bd7ef7fbfcec4444507c49d07ac486867f94c0ab5945df059f30f,2025-06-30T15:21:31.767000
CVE-2024-36049,0,0,f9b51d86d685dfe1d063607d35006d32c1c838354d8d3473b5b37799f50e9f38,2024-11-21T09:21:30.857000
CVE-2024-3605,0,0,0fb02c5cf2e5e4c98134033d37fca28c8f48589ec9fb82d576232d111aa1b2cb,2024-11-21T09:29:58.370000
CVE-2024-36050,0,0,334c3edf479897eb18d10ff244ec758c79c04135320e5006a062eb155adde898,2025-06-27T12:15:29.660000
@ -262874,7 +262875,7 @@ CVE-2024-36376,0,0,6461edd50210cfc46752fa81dbb9620b9ae82320c3aec5a0d36aa5f53504f
CVE-2024-36377,0,0,5774a42bf73f3c41e6e49520f598d871b1eef9ca509d792dae9a70b2d31b0ce6,2025-01-27T18:44:59.970000
CVE-2024-36378,0,0,30a1d5f4dc7b8e52011f1153e02eb226d7291e6e9dbbb1330ef0047c379e4d6e,2025-01-27T18:45:58.190000
CVE-2024-3638,0,0,a0e603bd5eafd59fbf4eda4332a70f4ff465bab094cf08cc0dfa6cf90aa9b0d0,2024-11-21T09:30:03.273000
CVE-2024-36383,0,0,dfdcebb9c4ed54272ace1d77d7b46f1144dff670c388870465409c92e750dde7,2024-11-21T09:22:03.837000
CVE-2024-36383,0,1,3e83d39c8415714be1471e58d178cef1237f51e0848fd46075b31f0f32d15d16,2025-06-30T15:22:59.717000
CVE-2024-36384,0,0,f4773f7602bde7ffb495e2fd0dc61ac13b6a017a351ab9847eb4b0f4191cb10a,2024-11-21T09:22:04.047000
CVE-2024-36387,0,0,cdb9f9c6e4f44e520b8a3f1244c0462cddbb4983a3da124e2c5e7faf4bb4d88f,2024-11-25T18:15:12.440000
CVE-2024-36388,0,0,690f978e1151f8e635cdc2eafce3ee23bbc06cad4b079951035ef356d52a2a72,2025-03-04T18:21:06.710000
@ -266240,7 +266241,7 @@ CVE-2024-40747,0,0,b3b8914b8b9a85996e2d8bf463cac468303cea99c40d1585111bf5e31727d
CVE-2024-40748,0,0,54989feba62ce71f70bf6515734070da30856c2a9b0a6ccf8dca47f41cf8bd36,2025-06-04T20:56:03.253000
CVE-2024-40749,0,0,3e9664b890bb6797495d60a2c43e49abe3e5e67aad7dc6961b26d8b2e948f5fb,2025-06-04T20:55:46.570000
CVE-2024-4075,0,0,833bcdf1e94e68a3124787a445c6156093923f6c04c7c02e13218ced02f9eae9,2025-02-27T17:39:00.143000
CVE-2024-40750,0,0,c491090d917045d507fa28976c97558943f972457181ebb36c0ba9aa25c97d61,2024-11-22T19:15:07.113000
CVE-2024-40750,0,1,309e82bd693025aca31f0132ef0cde0377e22f8d0ad4d0a9ac09d4eac8c24cdc,2025-06-30T15:15:24.097000
CVE-2024-40754,0,0,70b4a8750ec4ab34f6c40a9ef9362cb41c8a2241bccc0696bb8518e422734abe,2024-09-10T14:35:04.833000
CVE-2024-4076,0,0,6f41301410bb850ac724eb349beb08670550e5e1ae7ac3c04b8cf5e2d874d5bd,2024-11-21T09:42:08.807000
CVE-2024-40761,0,0,98df27f9ab08289b73f70adffa16577ee132bdfd9b5e346e5d494328018c9b31,2024-11-21T09:31:34.510000
@ -271205,7 +271206,7 @@ CVE-2024-47221,0,0,ad5f394b892b60bbd00529ce857218f4587aca66ed7d172df87e3d22b51af
CVE-2024-47222,0,0,af35ec2b090f518b0dacc1cf6ad59f97af77926ea86cca3bbe8fde63fb5bf8c9,2025-03-18T21:15:30.377000
CVE-2024-47223,0,0,793e25c409356d9e47267c562ba592bb3512ca8ad2a6d2411ca48d0873dfd90f,2024-10-23T15:12:34.673000
CVE-2024-47224,0,0,d6e19c7b2d0feea5eb398cf6834597817b31f7f19c80ef01ddc9f10df502e488,2025-06-24T01:21:34.700000
CVE-2024-47226,0,0,0c9114a6d7b06793fb4df4318fa93c3350cc9dd0329f9a1b32db743ff9d392dd,2025-02-10T22:15:35.383000
CVE-2024-47226,0,1,c0138e86450c00655f37733293efcb457ba59b359e5a8aa33c24e761e24f0271,2025-06-30T14:50:07.543000
CVE-2024-47227,0,0,12cb3d637a00166b3cfe0c18fb70b19ea080bd614b4771496d6beb1981a88cc4,2025-03-25T15:15:22.737000
CVE-2024-4723,0,0,181284b6c997036a8e9487f6d01498e20f407a2bf8f4592e413d9384c6be6c62,2025-02-19T18:33:16.710000
CVE-2024-47238,0,0,3709bb1da472fa14a8861b2d409dfdb7e041dc8d6028f86d52acea12f7a7161a,2025-02-04T15:52:06.230000
@ -272064,7 +272065,7 @@ CVE-2024-48280,0,0,adcf291220a50a17ee9e62ca57acfd894f81d1920dc855db25c190a8f1957
CVE-2024-48282,0,0,857895f3b579ee3c7817f1f1ae932b57ea8e93e9891d2d40c41472e0b9e3de8a,2025-03-31T17:12:33.610000
CVE-2024-48283,0,0,f9813da5f07adf5eb0b828cacb908c1409eccc65eadc9e494240da0cf6bec055,2025-04-04T14:36:27.653000
CVE-2024-48284,0,0,24131b37e3503d0f88373eeb49e74a1db93f0d1406d2b59ea2afec5f898f0a92,2024-11-19T15:45:55.450000
CVE-2024-48286,0,0,a2ee2817026e105eca7578f1a1a8fb654da208c74bd3dbf196d7d8b7a43390e8,2024-11-21T21:15:22.483000
CVE-2024-48286,0,1,b2744ff1701c4e9742e6bd9575d1650242aa76ded7cde1cedf8f5a2d6d3ec310,2025-06-30T15:15:59.560000
CVE-2024-48288,0,0,494a691b25e1aa6801161976e907c245b3d741e9af5a6198aa907820a5c23057,2025-06-24T16:04:52.030000
CVE-2024-48289,0,0,b921205e768bba82b1430cd5c6270a0bd9e403688579c58bd3e67b4bf7d6e4d7,2024-11-04T20:35:09.307000
CVE-2024-48290,0,0,82e5d20156cfa5303ee443ad637debb17563a09e32b9881f878d76599e280044,2024-11-08T19:01:03.880000
@ -275999,6 +276000,7 @@ CVE-2024-53617,0,0,dd2ee5869a76723244988f189f5e4e219fcd77588c7888e87da2897c111b3
CVE-2024-53619,0,0,7e8e9692dc22af705d23ae8b792483811e548f5452e797f9099331427eac5db0,2024-11-26T20:15:33.880000
CVE-2024-5362,0,0,65cc93fbb06de51acd392fcf91df16bbed3865e6bb98fea60125a3f2dc4dd426,2025-02-10T13:55:46.317000
CVE-2024-53620,0,0,0ec00be95852a0998a14f46021597d58d0eefdd89109b46c5f804a1cf687bc07,2024-11-26T20:15:34.050000
CVE-2024-53621,1,1,90c2909779bd40de41e2008c8e2ca57dc2b96e2eabcb67121c4e1727b32fa7ba,2025-06-30T15:15:22.727000
CVE-2024-53623,0,0,531ddce100784ec8b317b297b660a260e518e8b80f64012824aac6bf3d8289e3,2024-12-02T20:15:07.917000
CVE-2024-5363,0,0,1a1d04dd62a3d9ceb936776096c694704c071db758e0c336b93f44ac203c6bde,2025-02-10T14:41:03.540000
CVE-2024-53635,0,0,7a67e9e0d9d71b612bd6cfd95f53056a7f326cdca18b0bdba544dd72fd3cefe4,2025-04-04T15:39:01.230000
@ -276892,7 +276894,7 @@ CVE-2024-54762,0,0,a4972032b68778ca168cb5d10bcf23addecc100bf3dfface8e375ce8e1312
CVE-2024-54763,0,0,35fe6aeaf8ff2a2d9d1415d3e6f03dd3382c26dbe16edd942f9dacbafebc435a,2025-01-07T22:15:30.950000
CVE-2024-54764,0,0,7108368b95c8c33cd12f1a88712752ff55f9a1ed7ed83d67f4ddea2a12f4ec62,2025-01-07T22:15:31.113000
CVE-2024-54767,0,0,8c4bab4764e9a141ba548ee86cbb68266367c0b9186821635463f547e3a12a49,2025-04-02T14:15:44.820000
CVE-2024-54772,0,0,91a3697268affbf0eb80fdd37decc58bf196ba083d66dc0e72ebb567f63733a6,2025-02-24T16:15:12.213000
CVE-2024-54772,0,1,9c2764a7d9a8d65efe31f21016d25111b0c7522750add75b18cc5cf7397d15bb,2025-06-30T14:48:12.073000
CVE-2024-54774,0,0,f4729f792bb626d0ad63a36553265557f43246eb9e15e58f6f629c134348456d,2025-04-21T17:00:56.877000
CVE-2024-54775,0,0,03de079a7c10eead9e4af05c09468a6683068e1ea25d6b843a97d0b7fa560373,2025-04-22T15:46:43.310000
CVE-2024-54779,0,0,0f2e3f4d67ddf5fdef30e273f194ac7d1055ab45d5be390367bd1f63c0a8c033,2025-06-23T14:51:38.127000
@ -276970,7 +276972,7 @@ CVE-2024-54938,0,0,c878de568d97e81472b2e2bc76f9138e19a134b16c42a02a72c8949cbd1a0
CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cff0,2024-12-26T16:38:51.957000
CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000
CVE-2024-54951,0,0,5d19b9002b3d609d782a9b71d0927437769cc7cbd3c6535e97fd8da5cd4a41ad,2025-02-14T16:15:34.060000
CVE-2024-54952,0,0,0e17effbe40c2ff5d4aedbaa22264ddc30967779ff81f53f33ab36e15aed3666,2025-05-30T16:31:03.107000
CVE-2024-54952,0,1,3ba3cbe5abd29d54d060f58fc9f2a8729d0e932da40d3d524d3a592774828186,2025-06-30T14:46:38.763000
CVE-2024-54954,0,0,bd6322507b33dbf7676b3d047db7e71ad46212f09cfe0c196ceeabe7a1c0b796,2025-03-28T16:49:01.760000
CVE-2024-54957,0,0,e4e8d12c7fc7d58c0714df01efc15cd62969d1708fd6892bccb61bf01ac33284,2025-03-03T16:15:38.450000
CVE-2024-54958,0,0,05aa071d04d451a63fdeb28f8fd1c549b9935b77ac20404b5acdb6c9e76ec452,2025-02-21T22:15:12.440000
@ -278105,10 +278107,10 @@ CVE-2024-56903,0,0,b897be5c821ce23ff62ebbc786466003154e6577f97fa83d87efcf2c721a7
CVE-2024-56908,0,0,bbe0040508ad69151e90ab47c62a14618486e1b0815c01e094680be9e1e713d0,2025-03-17T19:15:24.050000
CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000
CVE-2024-56914,0,0,064f87427a8016e13b3b895075549080817f6e33abdd6a0f7fbfa426e2cf3bd7,2025-05-21T16:11:27.750000
CVE-2024-56915,0,0,d8173456d344098b22a75a2e02b37206a45f8c92928962510f8649ef655b139d,2025-06-26T18:57:43.670000
CVE-2024-56916,0,0,1149fd211087d85a318b511ca9b03e86e78c294bf7a379ee7f080a03243aa2ac,2025-06-26T18:58:14.280000
CVE-2024-56917,0,0,35b68b56acb4ef851f62dcce08e7049f3f145c8bf0ee8052af36e74efca6a164,2025-06-26T18:58:14.280000
CVE-2024-56918,0,0,1383b146b909c8e519d91b8742ed0dac68c31bc0f2ade4e0f82fb7d912e8e0a9,2025-06-26T18:58:14.280000
CVE-2024-56915,0,1,d02095b4e7ef9cd6d5d3c682e4221c0860c56eec60906409f87969d037d54746,2025-06-30T14:44:36.367000
CVE-2024-56916,0,1,ddec84feb060c6692542ce83bc1c5b4da97e63b51594ac6bf185c6506a237a90,2025-06-30T14:43:46.500000
CVE-2024-56917,0,1,d3911a29079427aae62ba3f01a645b560a6cabe6fcae02fb5cf21a74b03b8a9c,2025-06-30T14:44:01.510000
CVE-2024-56918,0,1,23c15c540db67d9e62e74b60c2465b2a975ba46a4be607d90a04919eb2501c8b,2025-06-30T14:42:40.747000
CVE-2024-5692,0,0,7a0e93b4132c5556301f236baef387bd61eb187dcc76da3b0d3022ff1bfb1690,2025-03-27T20:07:17.167000
CVE-2024-56921,0,0,65e4ee21eb8e6911078997661eaf48bf52901c948266f74aa9bcc9e4df1037c6,2025-04-22T14:58:46.420000
CVE-2024-56923,0,0,604a6006dae0a3ab9d362a51dab025175b10dba2548343a30a9a7501ead66a17,2025-05-28T20:41:45.083000
@ -284112,7 +284114,7 @@ CVE-2025-1627,0,0,99c85fafaaf67f555bc8893d0604893a5e6a8eb97fbb3c533f270827571aea
CVE-2025-1628,0,0,0981be15b6355fe96e6cf6533415aadaefca54b32ab4ef2345058038a2f7e6bb,2025-03-19T23:15:12.783000
CVE-2025-1629,0,0,98e40b68e5632eb91f4db527ca6594bcd0a0e66070641abd7d2f14eb9bdef0c3,2025-02-24T05:15:11.280000
CVE-2025-1632,0,0,73963594ec349af4ff5563baefa2275473270d101d132ae7dd238c3c85b0ecda,2025-03-25T15:41:41.683000
CVE-2025-1634,0,1,6a8fc3c51127acf913296bfd500d79df66071ea441414746c7b9e30b3cdede8d,2025-06-30T14:15:23.023000
CVE-2025-1634,0,0,6a8fc3c51127acf913296bfd500d79df66071ea441414746c7b9e30b3cdede8d,2025-06-30T14:15:23.023000
CVE-2025-1635,0,0,0499f172f9ad04082d92344ffc1551c65c1ba825d69539bd091607b7115ee757,2025-03-28T16:20:27.283000
CVE-2025-1636,0,0,76209b53ada620ac1db5782040876be75fe1cf6931e7839f2c9a9e46ee35bb38,2025-03-28T16:20:21.163000
CVE-2025-1638,0,0,627220f87bb0a3619d145b1fa74713ce7dfbc18460f28421739180b159028d87,2025-03-01T08:15:34.167000
@ -287854,9 +287856,9 @@ CVE-2025-24286,0,0,034f4735b759c015af5127b9d89110614ed8c3049acfff1bc50c8bca6cd7a
CVE-2025-24287,0,0,e4c9267ee4e2b809f604587bc5eee6cd21e2e71c2e8466a037bfa9610f808d26,2025-06-23T20:16:59.783000
CVE-2025-24288,0,0,8c53ac1108832d48dced15925414d69bc16e0b8a3d66fa9e2b712aa001a0f223,2025-06-23T20:16:59.783000
CVE-2025-24289,0,0,7a9d75f0942936f1135be131979bfd172806164db7cf1822ac832af863c7f8b9,2025-06-29T20:15:24.787000
CVE-2025-24290,0,0,88b6a2977309d56cc1b02c27aaeab5f8bd770adfe3712af6ae24277dec4930c5,2025-06-29T20:15:24.930000
CVE-2025-24290,0,1,bf6c3c61aa6df018e30b8a98c96a46d31c1d96b3b505d27905c5e77ce9602b00,2025-06-30T15:15:23.027000
CVE-2025-24291,0,0,d4490b4985dc9d06931a7bcb82a7ddf2b131bc34df9f31211f4bbc696cfeaab8,2025-06-23T20:16:59.783000
CVE-2025-24292,0,1,7194e00133a0e9d2ad7b055e7c2fa8448de7e10a99772d74caaa371a3c5cb923,2025-06-30T14:15:23.483000
CVE-2025-24292,0,0,7194e00133a0e9d2ad7b055e7c2fa8448de7e10a99772d74caaa371a3c5cb923,2025-06-30T14:15:23.483000
CVE-2025-24297,0,0,5d4a74f3648dba475a9505a338d2107001df4a92611f1e742f9c3b8bc6fc9e4e,2025-04-16T13:25:37.340000
CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000
CVE-2025-24304,0,0,d93e512a7b4aa7125a9d9a3a56f58a274a5675b50a430e59bfee24f84fb92162,2025-04-07T14:17:50.220000
@ -290628,6 +290630,7 @@ CVE-2025-28945,0,0,9f465a176543fd155026fb6120e51b48e6dd14d6da31887b407335eb5292f
CVE-2025-28946,0,0,7886de75db013f5ad0071e06e43615f0345b600df2c97716e8030ef52c835b88,2025-06-27T12:15:31.950000
CVE-2025-28947,0,0,f214098fdabb579993c13bf7b73485ca0269a2d95d30b6a4d629d9a88d98eaac,2025-06-27T12:15:32.120000
CVE-2025-28948,0,0,4d297b75c70e34b4f1f934c39f9e9a15f431eb4dd554bce73695cd2e9278acd1,2025-06-06T14:06:58.193000
CVE-2025-2895,1,1,5d1006d1b004922ab0a0aea0e99595c730a0463456420ebc4f399df63c1756e6,2025-06-30T15:15:23.133000
CVE-2025-28950,0,0,95165f9c1a939415b93ab4b82b6c9d0ac3c413eca61b0efe3dd2ef6e35397ed6,2025-06-06T14:06:58.193000
CVE-2025-28952,0,0,36a2d7e90e0ea02d7a032d500231cfdd2aabec1fc4b51f58a9dcb0a5dc7dfaf2,2025-06-06T14:06:58.193000
CVE-2025-28954,0,0,5e1648f3e4f3b4c2a3d29f98809dccb3c28ca26ee065ae7467a201e3a5a261fd,2025-06-06T14:06:58.193000
@ -293539,7 +293542,7 @@ CVE-2025-32889,0,0,1758151af4b145b593cac5bce0174518afb9f62175456015713f13270f9e4
CVE-2025-3289,0,0,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000
CVE-2025-32890,0,0,f2c41c451f0f9806b1ea692a8d179705ea340cd405232ede792930108ac7f581,2025-06-20T16:28:33.357000
CVE-2025-32896,0,0,dbfbc7924e8ba4745e61a6194439a531988d3ba9592f604f77799bc3cdf2b49d,2025-06-23T20:16:59.783000
CVE-2025-32897,0,0,2cfeadc3208e6055a7882b0e72566da490f7f14c2bfaa9166965d9bbaf9015b6,2025-06-28T19:15:21.917000
CVE-2025-32897,0,1,d396378719ac3ac970d9264626b7c604e05c07c6c6283e08f1e1e8dfac24da97,2025-06-30T15:15:23.310000
CVE-2025-32906,0,0,ed269622d928bd2aa475c3656dbb221e908c6bab45b25018cc828ee7bd119edc,2025-06-17T12:15:24.950000
CVE-2025-32907,0,0,213f7e42abba53cbe091599b6e08ac02e165cca9f4b70fa3a4b5acdea9942c00,2025-05-29T07:15:24.333000
CVE-2025-32908,0,0,d04d5cbb3961125d5a394946a9211c5953b759f1c35584196afe4caf2db9d0fd,2025-05-13T21:16:14.597000
@ -295953,7 +295956,7 @@ CVE-2025-45514,0,0,a0097e631e2f67ebed1594ab343f4868011705c17a9a818d4cf23fb2040b0
CVE-2025-4552,0,0,78d43dd6fb452cd4c88c9ba8880aef53f1ef01b609cdfafec2c65ebbd9c2ca4a,2025-05-12T17:32:32.760000
CVE-2025-45525,0,0,d964bbfa3565b6e3c8c91f8b1ef6cff3eca96639573f7a1a53ee29de90662ea9,2025-06-20T12:15:21.780000
CVE-2025-45526,0,0,7c332e0ac82e00dd31b05e654cf89202b648251ee9903ffd3830e5fdc6c807ef,2025-06-26T16:15:29.013000
CVE-2025-45529,0,0,e167386bb5394c534585ea5a04f1a046eac90f4928a6eeb5d60ef274f5e67c1c,2025-05-28T15:01:30.720000
CVE-2025-45529,0,1,4f83eef46b688bf0e4ec3077ffad2f4980e2128a406603b5b7faf0e79f936e42,2025-06-30T15:24:44.787000
CVE-2025-4553,0,0,cc42244e3fcc3fa0e4735902b7107755da4e8cf945b2a43e81a0e7fb4c007005,2025-05-16T17:08:50.060000
CVE-2025-4554,0,0,689d20479ad000d274d22e94958c98af69dd587a0aebcdb180b3f5df25fbdcf6,2025-05-16T17:05:01.380000
CVE-2025-45542,0,0,8d78c8ce54cce28d25176b8f60395b493e3616afc4cda36b64936d5e7d008d28,2025-06-13T17:45:40.463000
@ -296065,7 +296068,7 @@ CVE-2025-45997,0,0,6427fb401720f5a1ec9f9ddb9a7287b863d0733096e213df5c6d6f0eb039c
CVE-2025-4600,0,0,026383a000ee9b132f9dd97af63a0401be9be3b21241dcdc822424d27f013326,2025-05-16T14:42:18.700000
CVE-2025-4601,0,0,420ee2c846cf84b8070c3dfb7dddc6fbabb1090be5e1b7c4bf957aa0ce301eee,2025-06-12T16:06:39.330000
CVE-2025-46011,0,0,c1776a78cb3800147b82714f56c78717ef81a5a9688b212486314b16953839ea,2025-06-09T21:15:46.517000
CVE-2025-46014,0,0,339242950fa7f5cbde721d1e7f6f5bde04e6158e20cedf68b467b26893584939,2025-06-30T02:15:21.077000
CVE-2025-46014,0,1,9ca42e5fe9fec2ed5f922ded1c49b4824297e6807cabc2a04a6688ce82f30932,2025-06-30T15:15:23.493000
CVE-2025-4602,0,0,409776dd4d3f5aa956641458acdab541ced8aee4cc4b0cac3a447338c59994d1,2025-05-28T14:58:52.920000
CVE-2025-4603,0,0,353abd9188b7471dff5b9b62f88597abbd29f78728037be18e8dafefcd5f4d4e,2025-05-28T14:58:52.920000
CVE-2025-46035,0,0,9f1a3c83a5b792a1c1c188b51250b415f15a289195e306748247efc3597a83c4,2025-06-17T20:32:44.497000
@ -298799,8 +298802,8 @@ CVE-2025-53385,0,0,6919cbbce415f6a7965892da59e02c2851818e452a8966594003b8317f980
CVE-2025-53386,0,0,421cd769cbad85964ce345c4647b4d8effb0b5cc08970d5238cc9cb8e91646c3,2025-06-28T03:15:25.790000
CVE-2025-53387,0,0,e2764bb76f8a0fc53098c27eec0c194d10d953d856450579213a555deedd9d56,2025-06-28T03:15:25.860000
CVE-2025-53388,0,0,a892e721c397f4ad48b104d8840965c60b9650055c4b0c4a9cdb65c7fe578d48,2025-06-28T03:15:25.933000
CVE-2025-53391,0,1,d6a5feadc654770d5eb9044015abe2f0ab8ad12452f05fd29f2c667bb1c299c5,2025-06-30T14:15:24.623000
CVE-2025-53392,0,1,09bcec02e68f7eebeb3ae0f5617e33ea1a55ca6419f82398526d0eb474d72d82,2025-06-30T14:15:24.803000
CVE-2025-53391,0,0,d6a5feadc654770d5eb9044015abe2f0ab8ad12452f05fd29f2c667bb1c299c5,2025-06-30T14:15:24.623000
CVE-2025-53392,0,0,09bcec02e68f7eebeb3ae0f5617e33ea1a55ca6419f82398526d0eb474d72d82,2025-06-30T14:15:24.803000
CVE-2025-53393,0,0,fb13ac251ec592ad13d4a1e4669c330156dada86640bb9801a39334f38a5732a,2025-06-28T23:15:21.760000
CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2ceb,2025-06-04T14:54:33.783000
CVE-2025-5341,0,0,2f7555dddd47395f556aef803e272926d99b2be1a7b798f5f5a29577ec1f1191,2025-06-05T20:12:23.777000
@ -299879,6 +299882,8 @@ CVE-2025-6904,0,0,88be67b36fa096e5a28a99ea4de5a92822a51722117346b92a5bab5430f674
CVE-2025-6905,0,0,556c859ce2d577ad25e48170fe47285a6dc4730fa00d12649c467e72cd498810,2025-06-30T12:15:22.990000
CVE-2025-6906,0,0,cf3e61eb00cd7ce30fdabe692fd71d91aa1ee1b5be1319f6d64ea8501917cc16,2025-06-30T13:15:31.340000
CVE-2025-6907,0,0,4e2e01e9474347117178ce8b5bec3ea2173e0c6ed9ac1f547c616834a1ddaa35,2025-06-30T13:15:31.700000
CVE-2025-6908,0,0,54c99b931e0e2e05ae4b06debe3962b87c4e15f3e24354367dc0f2e66095600b,2025-06-30T13:15:32.133000
CVE-2025-6909,1,1,49330b47ce9f897f194af2ff0920059ad741b10f674236ce7856b388f0fedd82,2025-06-30T14:15:25.083000
CVE-2025-6910,1,1,a5539e4f4f0c5706c78dc2eafdf1b30d64932d84c37773d07a236f34a566ab68,2025-06-30T14:15:25.343000
CVE-2025-6908,0,1,d9e5df3855efea41eb440563e08be77d14554a4b7180832b9e9d71a4df3f94ae,2025-06-30T15:15:23.970000
CVE-2025-6909,0,0,49330b47ce9f897f194af2ff0920059ad741b10f674236ce7856b388f0fedd82,2025-06-30T14:15:25.083000
CVE-2025-6910,0,0,a5539e4f4f0c5706c78dc2eafdf1b30d64932d84c37773d07a236f34a566ab68,2025-06-30T14:15:25.343000
CVE-2025-6911,1,1,d0fafa9a66e085c498b54e4920ef02da4a52979da2579142bcf7efffb454e6c4,2025-06-30T15:15:24.310000
CVE-2025-6912,1,1,0537494aecc4d429c019d76d780b3557d9e85087e7002cf9ff20039149e2ad2c,2025-06-30T15:15:24.510000

Can't render this file because it is too large.