Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-46889 (GCVE-0-2025-46889)
Vulnerability from cvelistv5 – Published: 2025-06-10 22:18 – Updated: 2026-02-26 17:50
VLAI?
EPSS
Title
Adobe Experience Manager | Improper Access Control (CWE-284)
Summary
Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized elevated access. Exploitation of this issue does not require user interaction.
Severity ?
5.4 (Medium)
CWE
- CWE-284 - Improper Access Control (CWE-284)
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Adobe | Adobe Experience Manager |
Affected:
0 , ≤ 6.5.22
(semver)
|
Date Public ?
2025-06-10 17:00
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-46889",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-12T03:55:11.727729Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T17:50:44.190Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Adobe Experience Manager",
"vendor": "Adobe",
"versions": [
{
"lessThanOrEqual": "6.5.22",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-06-10T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized elevated access. Exploitation of this issue does not require user interaction."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 5.4,
"environmentalSeverity": "MEDIUM",
"exploitCodeMaturity": "NOT_DEFINED",
"integrityImpact": "LOW",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "LOW",
"modifiedAttackVector": "NETWORK",
"modifiedAvailabilityImpact": "NONE",
"modifiedConfidentialityImpact": "LOW",
"modifiedIntegrityImpact": "LOW",
"modifiedPrivilegesRequired": "LOW",
"modifiedScope": "UNCHANGED",
"modifiedUserInteraction": "NONE",
"privilegesRequired": "LOW",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"scope": "UNCHANGED",
"temporalScore": 5.4,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "Improper Access Control (CWE-284)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-10T22:18:44.435Z",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Adobe Experience Manager | Improper Access Control (CWE-284)"
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2025-46889",
"datePublished": "2025-06-10T22:18:44.435Z",
"dateReserved": "2025-04-30T20:47:54.953Z",
"dateUpdated": "2026-02-26T17:50:44.190Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-46889\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2025-06-10T23:15:31.080\",\"lastModified\":\"2025-06-16T14:28:58.390\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized elevated access. Exploitation of this issue does not require user interaction.\"},{\"lang\":\"es\",\"value\":\"Las versiones 6.5.22 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar una escalada de privilegios. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso elevado no autorizado limitado. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*\",\"versionEndExcluding\":\"6.5.23.0\",\"matchCriteriaId\":\"15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*\",\"versionEndExcluding\":\"2025.5.0\",\"matchCriteriaId\":\"8A395D75-088D-41C2-BCE6-30CB049798FE\"}]}]}],\"references\":[{\"url\":\"https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-46889\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-12T03:55:11.727729Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-11T14:03:59.356Z\"}}], \"cna\": {\"title\": \"Adobe Experience Manager | Improper Access Control (CWE-284)\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\", \"modifiedScope\": \"UNCHANGED\", \"temporalScore\": 5.4, \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"remediationLevel\": \"NOT_DEFINED\", \"reportConfidence\": \"NOT_DEFINED\", \"temporalSeverity\": \"MEDIUM\", \"availabilityImpact\": \"NONE\", \"environmentalScore\": 5.4, \"privilegesRequired\": \"LOW\", \"exploitCodeMaturity\": \"NOT_DEFINED\", \"integrityRequirement\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NETWORK\", \"confidentialityImpact\": \"LOW\", \"environmentalSeverity\": \"MEDIUM\", \"availabilityRequirement\": \"NOT_DEFINED\", \"modifiedIntegrityImpact\": \"LOW\", \"modifiedUserInteraction\": \"NONE\", \"modifiedAttackComplexity\": \"LOW\", \"confidentialityRequirement\": \"NOT_DEFINED\", \"modifiedAvailabilityImpact\": \"NONE\", \"modifiedPrivilegesRequired\": \"LOW\", \"modifiedConfidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Adobe\", \"product\": \"Adobe Experience Manager\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.5.22\"}], \"defaultStatus\": \"affected\"}], \"datePublic\": \"2025-06-10T17:00:00.000Z\", \"references\": [{\"url\": \"https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized elevated access. Exploitation of this issue does not require user interaction.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-284\", \"description\": \"Improper Access Control (CWE-284)\"}]}], \"providerMetadata\": {\"orgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"shortName\": \"adobe\", \"dateUpdated\": \"2025-06-10T22:18:44.435Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-46889\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-26T17:50:44.190Z\", \"dateReserved\": \"2025-04-30T20:47:54.953Z\", \"assignerOrgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"datePublished\": \"2025-06-10T22:18:44.435Z\", \"assignerShortName\": \"adobe\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2025-46889
Vulnerability from fkie_nvd - Published: 2025-06-10 23:15 - Updated: 2025-06-16 14:28
Severity ?
Summary
Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized elevated access. Exploitation of this issue does not require user interaction.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@adobe.com | https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | experience_manager | * | |
| adobe | experience_manager | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"matchCriteriaId": "15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5",
"versionEndExcluding": "6.5.23.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"matchCriteriaId": "8A395D75-088D-41C2-BCE6-30CB049798FE",
"versionEndExcluding": "2025.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized elevated access. Exploitation of this issue does not require user interaction."
},
{
"lang": "es",
"value": "Las versiones 6.5.22 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar una escalada de privilegios. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso elevado no autorizado limitado. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario."
}
],
"id": "CVE-2025-46889",
"lastModified": "2025-06-16T14:28:58.390",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5,
"source": "psirt@adobe.com",
"type": "Secondary"
}
]
},
"published": "2025-06-10T23:15:31.080",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "psirt@adobe.com",
"type": "Secondary"
}
]
}
WID-SEC-W-2025-1285
Vulnerability from csaf_certbund - Published: 2025-06-10 22:00 - Updated: 2025-08-05 22:00Summary
Adobe Experience Manager: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Adobe Experience Manager (AEM) ist eine Content-Management-Lösung für die Erstellung von Websites, mobilen Anwendungen und Formularen.
Angriff: Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Adobe Experience Manager ausnutzen, Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen oder Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme: - Linux
- Sonstiges
- UNIX
- Windows
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Adobe Experience Manager (AEM) ist eine Content-Management-L\u00f6sung f\u00fcr die Erstellung von Websites, mobilen Anwendungen und Formularen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Adobe Experience Manager ausnutzen, Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1285 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1285.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1285 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1285"
},
{
"category": "external",
"summary": "Adobe Security Bulletin APSB25-48 vom 2025-06-10",
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html"
}
],
"source_lang": "en-US",
"title": "Adobe Experience Manager: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation",
"tracking": {
"current_release_date": "2025-08-05T22:00:00.000+00:00",
"generator": {
"date": "2025-08-06T08:09:24.797+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1285",
"initial_release_date": "2025-06-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "2",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2025-07-24T22:00:00.000+00:00",
"number": "3",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "4",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "5",
"summary": "Referenz(en) aufgenommen: EUVD-2025-23630"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Cloud Service Release \u003c2025.5",
"product": {
"name": "Adobe Experience Manager Cloud Service Release \u003c2025.5",
"product_id": "T044487"
}
},
{
"category": "product_version",
"name": "Cloud Service Release 2025.5",
"product": {
"name": "Adobe Experience Manager Cloud Service Release 2025.5",
"product_id": "T044487-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:experience_manager:cloud_service_release__2025.5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.5.23",
"product": {
"name": "Adobe Experience Manager \u003c6.5.23",
"product_id": "T044488"
}
},
{
"category": "product_version",
"name": "6.5.23",
"product": {
"name": "Adobe Experience Manager 6.5.23",
"product_id": "T044488-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:experience_manager:6.5.23"
}
}
}
],
"category": "product_name",
"name": "Experience Manager"
}
],
"category": "vendor",
"name": "Adobe"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-25690",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2025-46837",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46837"
},
{
"cve": "CVE-2025-46838",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46838"
},
{
"cve": "CVE-2025-46840",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46840"
},
{
"cve": "CVE-2025-46841",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46841"
},
{
"cve": "CVE-2025-46842",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46842"
},
{
"cve": "CVE-2025-46843",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46843"
},
{
"cve": "CVE-2025-46844",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46844"
},
{
"cve": "CVE-2025-46845",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46845"
},
{
"cve": "CVE-2025-46846",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46846"
},
{
"cve": "CVE-2025-46847",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46847"
},
{
"cve": "CVE-2025-46848",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46848"
},
{
"cve": "CVE-2025-46850",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46850"
},
{
"cve": "CVE-2025-46851",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46851"
},
{
"cve": "CVE-2025-46853",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46853"
},
{
"cve": "CVE-2025-46854",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46854"
},
{
"cve": "CVE-2025-46855",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46855"
},
{
"cve": "CVE-2025-46857",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46857"
},
{
"cve": "CVE-2025-46858",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46858"
},
{
"cve": "CVE-2025-46859",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46859"
},
{
"cve": "CVE-2025-46860",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46860"
},
{
"cve": "CVE-2025-46861",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46861"
},
{
"cve": "CVE-2025-46862",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46862"
},
{
"cve": "CVE-2025-46863",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46863"
},
{
"cve": "CVE-2025-46864",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46864"
},
{
"cve": "CVE-2025-46865",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46865"
},
{
"cve": "CVE-2025-46866",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46866"
},
{
"cve": "CVE-2025-46870",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46870"
},
{
"cve": "CVE-2025-46871",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46871"
},
{
"cve": "CVE-2025-46872",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46872"
},
{
"cve": "CVE-2025-46873",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46873"
},
{
"cve": "CVE-2025-46874",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46874"
},
{
"cve": "CVE-2025-46875",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46875"
},
{
"cve": "CVE-2025-46876",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46876"
},
{
"cve": "CVE-2025-46877",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46877"
},
{
"cve": "CVE-2025-46878",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46878"
},
{
"cve": "CVE-2025-46879",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46879"
},
{
"cve": "CVE-2025-46880",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46880"
},
{
"cve": "CVE-2025-46881",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46881"
},
{
"cve": "CVE-2025-46882",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46882"
},
{
"cve": "CVE-2025-46883",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46883"
},
{
"cve": "CVE-2025-46884",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46884"
},
{
"cve": "CVE-2025-46885",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46885"
},
{
"cve": "CVE-2025-46886",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46886"
},
{
"cve": "CVE-2025-46887",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46887"
},
{
"cve": "CVE-2025-46888",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46888"
},
{
"cve": "CVE-2025-46889",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46889"
},
{
"cve": "CVE-2025-46890",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46890"
},
{
"cve": "CVE-2025-46891",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46891"
},
{
"cve": "CVE-2025-46892",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46892"
},
{
"cve": "CVE-2025-46893",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46893"
},
{
"cve": "CVE-2025-46894",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46894"
},
{
"cve": "CVE-2025-46895",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46895"
},
{
"cve": "CVE-2025-46898",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46898"
},
{
"cve": "CVE-2025-46899",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46899"
},
{
"cve": "CVE-2025-46900",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46900"
},
{
"cve": "CVE-2025-46901",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46901"
},
{
"cve": "CVE-2025-46902",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46902"
},
{
"cve": "CVE-2025-46903",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46903"
},
{
"cve": "CVE-2025-46904",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46904"
},
{
"cve": "CVE-2025-46905",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46905"
},
{
"cve": "CVE-2025-46906",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46906"
},
{
"cve": "CVE-2025-46907",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46907"
},
{
"cve": "CVE-2025-46908",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46908"
},
{
"cve": "CVE-2025-46909",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46909"
},
{
"cve": "CVE-2025-46910",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46910"
},
{
"cve": "CVE-2025-46911",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46911"
},
{
"cve": "CVE-2025-46912",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46912"
},
{
"cve": "CVE-2025-46913",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46913"
},
{
"cve": "CVE-2025-46914",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46914"
},
{
"cve": "CVE-2025-46915",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46915"
},
{
"cve": "CVE-2025-46916",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46916"
},
{
"cve": "CVE-2025-46917",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46917"
},
{
"cve": "CVE-2025-46918",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46918"
},
{
"cve": "CVE-2025-46919",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46919"
},
{
"cve": "CVE-2025-46920",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46920"
},
{
"cve": "CVE-2025-46922",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46922"
},
{
"cve": "CVE-2025-46923",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46923"
},
{
"cve": "CVE-2025-46924",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46924"
},
{
"cve": "CVE-2025-46926",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46926"
},
{
"cve": "CVE-2025-46927",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46927"
},
{
"cve": "CVE-2025-46929",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46929"
},
{
"cve": "CVE-2025-46930",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46930"
},
{
"cve": "CVE-2025-46931",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46931"
},
{
"cve": "CVE-2025-46933",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46933"
},
{
"cve": "CVE-2025-46934",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46934"
},
{
"cve": "CVE-2025-46935",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46935"
},
{
"cve": "CVE-2025-46939",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46939"
},
{
"cve": "CVE-2025-46940",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46940"
},
{
"cve": "CVE-2025-46941",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46941"
},
{
"cve": "CVE-2025-46942",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46942"
},
{
"cve": "CVE-2025-46943",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46943"
},
{
"cve": "CVE-2025-46944",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46944"
},
{
"cve": "CVE-2025-46945",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46945"
},
{
"cve": "CVE-2025-46946",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46946"
},
{
"cve": "CVE-2025-46947",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46947"
},
{
"cve": "CVE-2025-46948",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46948"
},
{
"cve": "CVE-2025-46949",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46949"
},
{
"cve": "CVE-2025-46950",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46950"
},
{
"cve": "CVE-2025-46951",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46951"
},
{
"cve": "CVE-2025-46952",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46952"
},
{
"cve": "CVE-2025-46953",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46953"
},
{
"cve": "CVE-2025-46954",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46954"
},
{
"cve": "CVE-2025-46955",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46955"
},
{
"cve": "CVE-2025-46956",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46956"
},
{
"cve": "CVE-2025-46957",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46957"
},
{
"cve": "CVE-2025-46958",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46958"
},
{
"cve": "CVE-2025-46959",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46959"
},
{
"cve": "CVE-2025-46960",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46960"
},
{
"cve": "CVE-2025-46963",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46963"
},
{
"cve": "CVE-2025-46964",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46964"
},
{
"cve": "CVE-2025-46965",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46965"
},
{
"cve": "CVE-2025-46966",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46966"
},
{
"cve": "CVE-2025-46967",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46967"
},
{
"cve": "CVE-2025-46968",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46968"
},
{
"cve": "CVE-2025-46970",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46970"
},
{
"cve": "CVE-2025-46971",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46971"
},
{
"cve": "CVE-2025-46972",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46972"
},
{
"cve": "CVE-2025-46973",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46973"
},
{
"cve": "CVE-2025-46974",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46974"
},
{
"cve": "CVE-2025-46975",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46975"
},
{
"cve": "CVE-2025-46976",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46976"
},
{
"cve": "CVE-2025-46977",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46977"
},
{
"cve": "CVE-2025-46978",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46978"
},
{
"cve": "CVE-2025-46979",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46979"
},
{
"cve": "CVE-2025-46981",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46981"
},
{
"cve": "CVE-2025-46982",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46982"
},
{
"cve": "CVE-2025-46983",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46983"
},
{
"cve": "CVE-2025-46984",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46984"
},
{
"cve": "CVE-2025-46985",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46985"
},
{
"cve": "CVE-2025-46986",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46986"
},
{
"cve": "CVE-2025-46987",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46987"
},
{
"cve": "CVE-2025-46988",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46988"
},
{
"cve": "CVE-2025-46989",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46989"
},
{
"cve": "CVE-2025-46990",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46990"
},
{
"cve": "CVE-2025-46991",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46991"
},
{
"cve": "CVE-2025-46992",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46992"
},
{
"cve": "CVE-2025-46993",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46993"
},
{
"cve": "CVE-2025-46995",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46995"
},
{
"cve": "CVE-2025-46996",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46996"
},
{
"cve": "CVE-2025-46997",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46997"
},
{
"cve": "CVE-2025-46999",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46999"
},
{
"cve": "CVE-2025-47000",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47000"
},
{
"cve": "CVE-2025-47001",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47001"
},
{
"cve": "CVE-2025-47002",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47002"
},
{
"cve": "CVE-2025-47003",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47003"
},
{
"cve": "CVE-2025-47004",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47004"
},
{
"cve": "CVE-2025-47005",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47005"
},
{
"cve": "CVE-2025-47006",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47006"
},
{
"cve": "CVE-2025-47007",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47007"
},
{
"cve": "CVE-2025-47008",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47008"
},
{
"cve": "CVE-2025-47010",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47010"
},
{
"cve": "CVE-2025-47011",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47011"
},
{
"cve": "CVE-2025-47012",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47012"
},
{
"cve": "CVE-2025-47013",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47013"
},
{
"cve": "CVE-2025-47014",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47014"
},
{
"cve": "CVE-2025-47015",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47015"
},
{
"cve": "CVE-2025-47016",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47016"
},
{
"cve": "CVE-2025-47017",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47017"
},
{
"cve": "CVE-2025-47019",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47019"
},
{
"cve": "CVE-2025-47020",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47020"
},
{
"cve": "CVE-2025-47021",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47021"
},
{
"cve": "CVE-2025-47022",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47022"
},
{
"cve": "CVE-2025-47025",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47025"
},
{
"cve": "CVE-2025-47026",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47026"
},
{
"cve": "CVE-2025-47027",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47027"
},
{
"cve": "CVE-2025-47029",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47029"
},
{
"cve": "CVE-2025-47030",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47030"
},
{
"cve": "CVE-2025-47031",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47031"
},
{
"cve": "CVE-2025-47032",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47032"
},
{
"cve": "CVE-2025-47033",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47033"
},
{
"cve": "CVE-2025-47034",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47034"
},
{
"cve": "CVE-2025-47035",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47035"
},
{
"cve": "CVE-2025-47036",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47036"
},
{
"cve": "CVE-2025-47037",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47037"
},
{
"cve": "CVE-2025-47038",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47038"
},
{
"cve": "CVE-2025-47039",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47039"
},
{
"cve": "CVE-2025-47040",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47040"
},
{
"cve": "CVE-2025-47041",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47041"
},
{
"cve": "CVE-2025-47042",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47042"
},
{
"cve": "CVE-2025-47044",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47044"
},
{
"cve": "CVE-2025-47045",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47045"
},
{
"cve": "CVE-2025-47047",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47047"
},
{
"cve": "CVE-2025-47048",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47048"
},
{
"cve": "CVE-2025-47049",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47049"
},
{
"cve": "CVE-2025-47050",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47050"
},
{
"cve": "CVE-2025-47051",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47051"
},
{
"cve": "CVE-2025-47052",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47052"
},
{
"cve": "CVE-2025-47053",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47053"
},
{
"cve": "CVE-2025-47055",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47055"
},
{
"cve": "CVE-2025-47056",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47056"
},
{
"cve": "CVE-2025-47057",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47057"
},
{
"cve": "CVE-2025-47060",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47060"
},
{
"cve": "CVE-2025-47061",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47061"
},
{
"cve": "CVE-2025-47062",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47062"
},
{
"cve": "CVE-2025-47063",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47063"
},
{
"cve": "CVE-2025-47065",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47065"
},
{
"cve": "CVE-2025-47066",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47066"
},
{
"cve": "CVE-2025-47067",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47067"
},
{
"cve": "CVE-2025-47068",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47068"
},
{
"cve": "CVE-2025-47069",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47069"
},
{
"cve": "CVE-2025-47070",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47070"
},
{
"cve": "CVE-2025-47071",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47071"
},
{
"cve": "CVE-2025-47072",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47072"
},
{
"cve": "CVE-2025-47073",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47073"
},
{
"cve": "CVE-2025-47074",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47074"
},
{
"cve": "CVE-2025-47075",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47075"
},
{
"cve": "CVE-2025-47076",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47076"
},
{
"cve": "CVE-2025-47077",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47077"
},
{
"cve": "CVE-2025-47078",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47078"
},
{
"cve": "CVE-2025-47079",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47079"
},
{
"cve": "CVE-2025-47080",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47080"
},
{
"cve": "CVE-2025-47081",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47081"
},
{
"cve": "CVE-2025-47082",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47082"
},
{
"cve": "CVE-2025-47083",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47083"
},
{
"cve": "CVE-2025-47084",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47084"
},
{
"cve": "CVE-2025-47085",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47085"
},
{
"cve": "CVE-2025-47086",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47086"
},
{
"cve": "CVE-2025-47087",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47087"
},
{
"cve": "CVE-2025-47088",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47088"
},
{
"cve": "CVE-2025-47089",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47089"
},
{
"cve": "CVE-2025-47090",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47090"
},
{
"cve": "CVE-2025-47091",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47091"
},
{
"cve": "CVE-2025-47092",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47092"
},
{
"cve": "CVE-2025-47093",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47093"
},
{
"cve": "CVE-2025-47094",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47094"
},
{
"cve": "CVE-2025-47095",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47095"
},
{
"cve": "CVE-2025-47096",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47096"
},
{
"cve": "CVE-2025-47100",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47100"
},
{
"cve": "CVE-2025-47102",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47102"
},
{
"cve": "CVE-2025-47113",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47113"
},
{
"cve": "CVE-2025-47114",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47114"
},
{
"cve": "CVE-2025-47115",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47115"
},
{
"cve": "CVE-2025-47116",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47116"
},
{
"cve": "CVE-2025-47117",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47117"
}
]
}
GHSA-VV2J-8G5J-V96Q
Vulnerability from github – Published: 2025-06-11 00:30 – Updated: 2025-06-11 00:30
VLAI?
Details
Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized elevated access. Exploitation of this issue does not require user interaction.
Severity ?
5.4 (Medium)
{
"affected": [],
"aliases": [
"CVE-2025-46889"
],
"database_specific": {
"cwe_ids": [
"CWE-284"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-06-10T23:15:31Z",
"severity": "MODERATE"
},
"details": "Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized elevated access. Exploitation of this issue does not require user interaction.",
"id": "GHSA-vv2j-8g5j-v96q",
"modified": "2025-06-11T00:30:38Z",
"published": "2025-06-11T00:30:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46889"
},
{
"type": "WEB",
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
CNVD-2025-14832
Vulnerability from cnvd - Published: 2025-07-01
VLAI Severity ?
Title
Adobe Experience Manager访问控制不当漏洞
Description
Adobe Experience Manager是Adobe公司推出的一款综合性内容管理解决方案。
Adobe Experience Manager存在访问控制不当漏洞,目前没有详细的漏洞细节提供。
Severity
中
Patch Name
Adobe Experience Manager访问控制不当漏洞的补丁
Patch Description
Adobe Experience Manager是Adobe公司推出的一款综合性内容管理解决方案。
Adobe Experience Manager存在访问控制不当漏洞,目前没有详细的漏洞细节提供。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已发布升级程序修复该安全问题,详情见厂商官网: https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html
Reference
https://nvd.nist.gov/vuln/detail/CVE-2025-46889
Impacted products
| Name | Adobe Adobe Experience Manager <=6.5.22 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-46889",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-46889"
}
},
"description": "Adobe Experience Manager\u662fAdobe\u516c\u53f8\u63a8\u51fa\u7684\u4e00\u6b3e\u7efc\u5408\u6027\u5185\u5bb9\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\u3002\n\nAdobe Experience Manager\u5b58\u5728\u8bbf\u95ee\u63a7\u5236\u4e0d\u5f53\u6f0f\u6d1e\uff0c\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u7a0b\u5e8f\u4fee\u590d\u8be5\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u89c1\u5382\u5546\u5b98\u7f51\uff1a\r\nhttps://helpx.adobe.com/security/products/experience-manager/apsb25-48.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-14832",
"openTime": "2025-07-01",
"patchDescription": "Adobe Experience Manager\u662fAdobe\u516c\u53f8\u63a8\u51fa\u7684\u4e00\u6b3e\u7efc\u5408\u6027\u5185\u5bb9\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\nAdobe Experience Manager\u5b58\u5728\u8bbf\u95ee\u63a7\u5236\u4e0d\u5f53\u6f0f\u6d1e\uff0c\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Adobe Experience Manager\u8bbf\u95ee\u63a7\u5236\u4e0d\u5f53\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Adobe Adobe Experience Manager \u003c=6.5.22"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2025-46889",
"serverity": "\u4e2d",
"submitTime": "2025-06-13",
"title": "Adobe Experience Manager\u8bbf\u95ee\u63a7\u5236\u4e0d\u5f53\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…