Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-47096 (GCVE-0-2025-47096)
Vulnerability from cvelistv5 – Published: 2025-06-10 22:20 – Updated: 2026-02-26 17:50
VLAI?
EPSS
Title
Adobe Experience Manager | Improper Input Validation (CWE-20)
Summary
Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass, allowing a low impact to the integrity of the component. Exploitation of this issue requires user interaction in that a victim must interact with the malicious content. Low privileges are required.
Severity ?
CWE
- CWE-20 - Improper Input Validation (CWE-20)
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Adobe | Adobe Experience Manager |
Affected:
0 , ≤ 6.5.22
(semver)
|
Date Public ?
2025-06-10 17:00
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-47096",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-12T03:55:12.762450Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T17:50:43.882Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Adobe Experience Manager",
"vendor": "Adobe",
"versions": [
{
"lessThanOrEqual": "6.5.22",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-06-10T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass, allowing a low impact to the integrity of the component. Exploitation of this issue requires user interaction in that a victim must interact with the malicious content. Low privileges are required."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 3.5,
"environmentalSeverity": "LOW",
"exploitCodeMaturity": "NOT_DEFINED",
"integrityImpact": "LOW",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "LOW",
"modifiedAttackVector": "NETWORK",
"modifiedAvailabilityImpact": "NONE",
"modifiedConfidentialityImpact": "NONE",
"modifiedIntegrityImpact": "LOW",
"modifiedPrivilegesRequired": "LOW",
"modifiedScope": "UNCHANGED",
"modifiedUserInteraction": "REQUIRED",
"privilegesRequired": "LOW",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"scope": "UNCHANGED",
"temporalScore": 3.5,
"temporalSeverity": "LOW",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "Improper Input Validation (CWE-20)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-14T20:41:56.281Z",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Adobe Experience Manager | Improper Input Validation (CWE-20)"
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2025-47096",
"datePublished": "2025-06-10T22:20:03.475Z",
"dateReserved": "2025-04-30T20:47:55.000Z",
"dateUpdated": "2026-02-26T17:50:43.882Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-47096\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2025-06-10T23:15:57.247\",\"lastModified\":\"2025-07-15T18:40:31.207\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass, allowing a low impact to the integrity of the component. Exploitation of this issue requires user interaction in that a victim must interact with the malicious content. Low privileges are required.\"},{\"lang\":\"es\",\"value\":\"Las versiones 6.5.22 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso. Se requieren privilegios bajos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N\",\"baseScore\":3.5,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.1,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N\",\"baseScore\":3.5,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.1,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*\",\"versionEndExcluding\":\"6.5.23.0\",\"matchCriteriaId\":\"15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*\",\"versionEndExcluding\":\"2025.5.0\",\"matchCriteriaId\":\"8A395D75-088D-41C2-BCE6-30CB049798FE\"}]}]}],\"references\":[{\"url\":\"https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-47096\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-11T17:03:45.480189Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-11T17:04:01.238Z\"}}], \"cna\": {\"title\": \"Adobe Experience Manager | Improper Input Validation (CWE-20)\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N\", \"modifiedScope\": \"UNCHANGED\", \"temporalScore\": 3.5, \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"remediationLevel\": \"NOT_DEFINED\", \"reportConfidence\": \"NOT_DEFINED\", \"temporalSeverity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"environmentalScore\": 3.5, \"privilegesRequired\": \"LOW\", \"exploitCodeMaturity\": \"NOT_DEFINED\", \"integrityRequirement\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NETWORK\", \"confidentialityImpact\": \"NONE\", \"environmentalSeverity\": \"LOW\", \"availabilityRequirement\": \"NOT_DEFINED\", \"modifiedIntegrityImpact\": \"LOW\", \"modifiedUserInteraction\": \"REQUIRED\", \"modifiedAttackComplexity\": \"LOW\", \"confidentialityRequirement\": \"NOT_DEFINED\", \"modifiedAvailabilityImpact\": \"NONE\", \"modifiedPrivilegesRequired\": \"LOW\", \"modifiedConfidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Adobe\", \"product\": \"Adobe Experience Manager\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.5.22\"}], \"defaultStatus\": \"affected\"}], \"datePublic\": \"2025-06-10T17:00:00.000Z\", \"references\": [{\"url\": \"https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass, allowing a low impact to the integrity of the component. Exploitation of this issue requires user interaction in that a victim must interact with the malicious content. Low privileges are required.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"Improper Input Validation (CWE-20)\"}]}], \"providerMetadata\": {\"orgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"shortName\": \"adobe\", \"dateUpdated\": \"2025-07-14T20:41:56.281Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-47096\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-14T20:41:56.281Z\", \"dateReserved\": \"2025-04-30T20:47:55.000Z\", \"assignerOrgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"datePublished\": \"2025-06-10T22:20:03.475Z\", \"assignerShortName\": \"adobe\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-Q48V-V24M-9P7Q
Vulnerability from github – Published: 2025-06-11 00:30 – Updated: 2025-06-11 00:30
VLAI?
Details
Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Low privileges are required.
Severity ?
{
"affected": [],
"aliases": [
"CVE-2025-47096"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-06-10T23:15:57Z",
"severity": "LOW"
},
"details": "Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Low privileges are required.",
"id": "GHSA-q48v-v24m-9p7q",
"modified": "2025-06-11T00:30:47Z",
"published": "2025-06-11T00:30:47Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47096"
},
{
"type": "WEB",
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2025-1285
Vulnerability from csaf_certbund - Published: 2025-06-10 22:00 - Updated: 2025-08-05 22:00Summary
Adobe Experience Manager: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Adobe Experience Manager (AEM) ist eine Content-Management-Lösung für die Erstellung von Websites, mobilen Anwendungen und Formularen.
Angriff: Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Adobe Experience Manager ausnutzen, Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen oder Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme: - Linux
- Sonstiges
- UNIX
- Windows
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Adobe Experience Manager (AEM) ist eine Content-Management-L\u00f6sung f\u00fcr die Erstellung von Websites, mobilen Anwendungen und Formularen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Adobe Experience Manager ausnutzen, Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1285 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1285.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1285 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1285"
},
{
"category": "external",
"summary": "Adobe Security Bulletin APSB25-48 vom 2025-06-10",
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html"
}
],
"source_lang": "en-US",
"title": "Adobe Experience Manager: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation",
"tracking": {
"current_release_date": "2025-08-05T22:00:00.000+00:00",
"generator": {
"date": "2025-08-06T08:09:24.797+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1285",
"initial_release_date": "2025-06-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "2",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2025-07-24T22:00:00.000+00:00",
"number": "3",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "4",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "5",
"summary": "Referenz(en) aufgenommen: EUVD-2025-23630"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Cloud Service Release \u003c2025.5",
"product": {
"name": "Adobe Experience Manager Cloud Service Release \u003c2025.5",
"product_id": "T044487"
}
},
{
"category": "product_version",
"name": "Cloud Service Release 2025.5",
"product": {
"name": "Adobe Experience Manager Cloud Service Release 2025.5",
"product_id": "T044487-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:experience_manager:cloud_service_release__2025.5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.5.23",
"product": {
"name": "Adobe Experience Manager \u003c6.5.23",
"product_id": "T044488"
}
},
{
"category": "product_version",
"name": "6.5.23",
"product": {
"name": "Adobe Experience Manager 6.5.23",
"product_id": "T044488-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:experience_manager:6.5.23"
}
}
}
],
"category": "product_name",
"name": "Experience Manager"
}
],
"category": "vendor",
"name": "Adobe"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-25690",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2025-46837",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46837"
},
{
"cve": "CVE-2025-46838",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46838"
},
{
"cve": "CVE-2025-46840",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46840"
},
{
"cve": "CVE-2025-46841",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46841"
},
{
"cve": "CVE-2025-46842",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46842"
},
{
"cve": "CVE-2025-46843",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46843"
},
{
"cve": "CVE-2025-46844",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46844"
},
{
"cve": "CVE-2025-46845",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46845"
},
{
"cve": "CVE-2025-46846",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46846"
},
{
"cve": "CVE-2025-46847",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46847"
},
{
"cve": "CVE-2025-46848",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46848"
},
{
"cve": "CVE-2025-46850",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46850"
},
{
"cve": "CVE-2025-46851",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46851"
},
{
"cve": "CVE-2025-46853",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46853"
},
{
"cve": "CVE-2025-46854",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46854"
},
{
"cve": "CVE-2025-46855",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46855"
},
{
"cve": "CVE-2025-46857",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46857"
},
{
"cve": "CVE-2025-46858",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46858"
},
{
"cve": "CVE-2025-46859",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46859"
},
{
"cve": "CVE-2025-46860",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46860"
},
{
"cve": "CVE-2025-46861",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46861"
},
{
"cve": "CVE-2025-46862",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46862"
},
{
"cve": "CVE-2025-46863",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46863"
},
{
"cve": "CVE-2025-46864",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46864"
},
{
"cve": "CVE-2025-46865",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46865"
},
{
"cve": "CVE-2025-46866",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46866"
},
{
"cve": "CVE-2025-46870",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46870"
},
{
"cve": "CVE-2025-46871",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46871"
},
{
"cve": "CVE-2025-46872",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46872"
},
{
"cve": "CVE-2025-46873",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46873"
},
{
"cve": "CVE-2025-46874",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46874"
},
{
"cve": "CVE-2025-46875",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46875"
},
{
"cve": "CVE-2025-46876",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46876"
},
{
"cve": "CVE-2025-46877",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46877"
},
{
"cve": "CVE-2025-46878",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46878"
},
{
"cve": "CVE-2025-46879",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46879"
},
{
"cve": "CVE-2025-46880",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46880"
},
{
"cve": "CVE-2025-46881",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46881"
},
{
"cve": "CVE-2025-46882",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46882"
},
{
"cve": "CVE-2025-46883",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46883"
},
{
"cve": "CVE-2025-46884",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46884"
},
{
"cve": "CVE-2025-46885",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46885"
},
{
"cve": "CVE-2025-46886",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46886"
},
{
"cve": "CVE-2025-46887",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46887"
},
{
"cve": "CVE-2025-46888",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46888"
},
{
"cve": "CVE-2025-46889",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46889"
},
{
"cve": "CVE-2025-46890",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46890"
},
{
"cve": "CVE-2025-46891",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46891"
},
{
"cve": "CVE-2025-46892",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46892"
},
{
"cve": "CVE-2025-46893",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46893"
},
{
"cve": "CVE-2025-46894",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46894"
},
{
"cve": "CVE-2025-46895",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46895"
},
{
"cve": "CVE-2025-46898",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46898"
},
{
"cve": "CVE-2025-46899",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46899"
},
{
"cve": "CVE-2025-46900",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46900"
},
{
"cve": "CVE-2025-46901",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46901"
},
{
"cve": "CVE-2025-46902",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46902"
},
{
"cve": "CVE-2025-46903",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46903"
},
{
"cve": "CVE-2025-46904",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46904"
},
{
"cve": "CVE-2025-46905",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46905"
},
{
"cve": "CVE-2025-46906",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46906"
},
{
"cve": "CVE-2025-46907",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46907"
},
{
"cve": "CVE-2025-46908",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46908"
},
{
"cve": "CVE-2025-46909",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46909"
},
{
"cve": "CVE-2025-46910",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46910"
},
{
"cve": "CVE-2025-46911",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46911"
},
{
"cve": "CVE-2025-46912",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46912"
},
{
"cve": "CVE-2025-46913",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46913"
},
{
"cve": "CVE-2025-46914",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46914"
},
{
"cve": "CVE-2025-46915",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46915"
},
{
"cve": "CVE-2025-46916",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46916"
},
{
"cve": "CVE-2025-46917",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46917"
},
{
"cve": "CVE-2025-46918",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46918"
},
{
"cve": "CVE-2025-46919",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46919"
},
{
"cve": "CVE-2025-46920",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46920"
},
{
"cve": "CVE-2025-46922",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46922"
},
{
"cve": "CVE-2025-46923",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46923"
},
{
"cve": "CVE-2025-46924",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46924"
},
{
"cve": "CVE-2025-46926",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46926"
},
{
"cve": "CVE-2025-46927",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46927"
},
{
"cve": "CVE-2025-46929",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46929"
},
{
"cve": "CVE-2025-46930",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46930"
},
{
"cve": "CVE-2025-46931",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46931"
},
{
"cve": "CVE-2025-46933",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46933"
},
{
"cve": "CVE-2025-46934",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46934"
},
{
"cve": "CVE-2025-46935",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46935"
},
{
"cve": "CVE-2025-46939",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46939"
},
{
"cve": "CVE-2025-46940",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46940"
},
{
"cve": "CVE-2025-46941",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46941"
},
{
"cve": "CVE-2025-46942",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46942"
},
{
"cve": "CVE-2025-46943",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46943"
},
{
"cve": "CVE-2025-46944",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46944"
},
{
"cve": "CVE-2025-46945",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46945"
},
{
"cve": "CVE-2025-46946",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46946"
},
{
"cve": "CVE-2025-46947",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46947"
},
{
"cve": "CVE-2025-46948",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46948"
},
{
"cve": "CVE-2025-46949",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46949"
},
{
"cve": "CVE-2025-46950",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46950"
},
{
"cve": "CVE-2025-46951",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46951"
},
{
"cve": "CVE-2025-46952",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46952"
},
{
"cve": "CVE-2025-46953",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46953"
},
{
"cve": "CVE-2025-46954",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46954"
},
{
"cve": "CVE-2025-46955",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46955"
},
{
"cve": "CVE-2025-46956",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46956"
},
{
"cve": "CVE-2025-46957",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46957"
},
{
"cve": "CVE-2025-46958",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46958"
},
{
"cve": "CVE-2025-46959",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46959"
},
{
"cve": "CVE-2025-46960",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46960"
},
{
"cve": "CVE-2025-46963",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46963"
},
{
"cve": "CVE-2025-46964",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46964"
},
{
"cve": "CVE-2025-46965",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46965"
},
{
"cve": "CVE-2025-46966",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46966"
},
{
"cve": "CVE-2025-46967",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46967"
},
{
"cve": "CVE-2025-46968",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46968"
},
{
"cve": "CVE-2025-46970",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46970"
},
{
"cve": "CVE-2025-46971",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46971"
},
{
"cve": "CVE-2025-46972",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46972"
},
{
"cve": "CVE-2025-46973",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46973"
},
{
"cve": "CVE-2025-46974",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46974"
},
{
"cve": "CVE-2025-46975",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46975"
},
{
"cve": "CVE-2025-46976",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46976"
},
{
"cve": "CVE-2025-46977",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46977"
},
{
"cve": "CVE-2025-46978",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46978"
},
{
"cve": "CVE-2025-46979",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46979"
},
{
"cve": "CVE-2025-46981",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46981"
},
{
"cve": "CVE-2025-46982",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46982"
},
{
"cve": "CVE-2025-46983",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46983"
},
{
"cve": "CVE-2025-46984",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46984"
},
{
"cve": "CVE-2025-46985",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46985"
},
{
"cve": "CVE-2025-46986",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46986"
},
{
"cve": "CVE-2025-46987",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46987"
},
{
"cve": "CVE-2025-46988",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46988"
},
{
"cve": "CVE-2025-46989",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46989"
},
{
"cve": "CVE-2025-46990",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46990"
},
{
"cve": "CVE-2025-46991",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46991"
},
{
"cve": "CVE-2025-46992",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46992"
},
{
"cve": "CVE-2025-46993",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46993"
},
{
"cve": "CVE-2025-46995",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46995"
},
{
"cve": "CVE-2025-46996",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46996"
},
{
"cve": "CVE-2025-46997",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46997"
},
{
"cve": "CVE-2025-46999",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46999"
},
{
"cve": "CVE-2025-47000",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47000"
},
{
"cve": "CVE-2025-47001",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47001"
},
{
"cve": "CVE-2025-47002",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47002"
},
{
"cve": "CVE-2025-47003",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47003"
},
{
"cve": "CVE-2025-47004",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47004"
},
{
"cve": "CVE-2025-47005",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47005"
},
{
"cve": "CVE-2025-47006",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47006"
},
{
"cve": "CVE-2025-47007",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47007"
},
{
"cve": "CVE-2025-47008",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47008"
},
{
"cve": "CVE-2025-47010",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47010"
},
{
"cve": "CVE-2025-47011",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47011"
},
{
"cve": "CVE-2025-47012",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47012"
},
{
"cve": "CVE-2025-47013",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47013"
},
{
"cve": "CVE-2025-47014",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47014"
},
{
"cve": "CVE-2025-47015",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47015"
},
{
"cve": "CVE-2025-47016",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47016"
},
{
"cve": "CVE-2025-47017",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47017"
},
{
"cve": "CVE-2025-47019",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47019"
},
{
"cve": "CVE-2025-47020",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47020"
},
{
"cve": "CVE-2025-47021",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47021"
},
{
"cve": "CVE-2025-47022",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47022"
},
{
"cve": "CVE-2025-47025",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47025"
},
{
"cve": "CVE-2025-47026",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47026"
},
{
"cve": "CVE-2025-47027",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47027"
},
{
"cve": "CVE-2025-47029",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47029"
},
{
"cve": "CVE-2025-47030",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47030"
},
{
"cve": "CVE-2025-47031",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47031"
},
{
"cve": "CVE-2025-47032",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47032"
},
{
"cve": "CVE-2025-47033",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47033"
},
{
"cve": "CVE-2025-47034",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47034"
},
{
"cve": "CVE-2025-47035",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47035"
},
{
"cve": "CVE-2025-47036",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47036"
},
{
"cve": "CVE-2025-47037",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47037"
},
{
"cve": "CVE-2025-47038",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47038"
},
{
"cve": "CVE-2025-47039",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47039"
},
{
"cve": "CVE-2025-47040",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47040"
},
{
"cve": "CVE-2025-47041",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47041"
},
{
"cve": "CVE-2025-47042",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47042"
},
{
"cve": "CVE-2025-47044",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47044"
},
{
"cve": "CVE-2025-47045",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47045"
},
{
"cve": "CVE-2025-47047",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47047"
},
{
"cve": "CVE-2025-47048",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47048"
},
{
"cve": "CVE-2025-47049",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47049"
},
{
"cve": "CVE-2025-47050",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47050"
},
{
"cve": "CVE-2025-47051",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47051"
},
{
"cve": "CVE-2025-47052",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47052"
},
{
"cve": "CVE-2025-47053",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47053"
},
{
"cve": "CVE-2025-47055",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47055"
},
{
"cve": "CVE-2025-47056",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47056"
},
{
"cve": "CVE-2025-47057",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47057"
},
{
"cve": "CVE-2025-47060",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47060"
},
{
"cve": "CVE-2025-47061",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47061"
},
{
"cve": "CVE-2025-47062",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47062"
},
{
"cve": "CVE-2025-47063",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47063"
},
{
"cve": "CVE-2025-47065",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47065"
},
{
"cve": "CVE-2025-47066",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47066"
},
{
"cve": "CVE-2025-47067",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47067"
},
{
"cve": "CVE-2025-47068",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47068"
},
{
"cve": "CVE-2025-47069",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47069"
},
{
"cve": "CVE-2025-47070",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47070"
},
{
"cve": "CVE-2025-47071",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47071"
},
{
"cve": "CVE-2025-47072",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47072"
},
{
"cve": "CVE-2025-47073",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47073"
},
{
"cve": "CVE-2025-47074",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47074"
},
{
"cve": "CVE-2025-47075",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47075"
},
{
"cve": "CVE-2025-47076",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47076"
},
{
"cve": "CVE-2025-47077",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47077"
},
{
"cve": "CVE-2025-47078",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47078"
},
{
"cve": "CVE-2025-47079",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47079"
},
{
"cve": "CVE-2025-47080",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47080"
},
{
"cve": "CVE-2025-47081",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47081"
},
{
"cve": "CVE-2025-47082",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47082"
},
{
"cve": "CVE-2025-47083",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47083"
},
{
"cve": "CVE-2025-47084",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47084"
},
{
"cve": "CVE-2025-47085",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47085"
},
{
"cve": "CVE-2025-47086",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47086"
},
{
"cve": "CVE-2025-47087",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47087"
},
{
"cve": "CVE-2025-47088",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47088"
},
{
"cve": "CVE-2025-47089",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47089"
},
{
"cve": "CVE-2025-47090",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47090"
},
{
"cve": "CVE-2025-47091",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47091"
},
{
"cve": "CVE-2025-47092",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47092"
},
{
"cve": "CVE-2025-47093",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47093"
},
{
"cve": "CVE-2025-47094",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47094"
},
{
"cve": "CVE-2025-47095",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47095"
},
{
"cve": "CVE-2025-47096",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47096"
},
{
"cve": "CVE-2025-47100",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47100"
},
{
"cve": "CVE-2025-47102",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47102"
},
{
"cve": "CVE-2025-47113",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47113"
},
{
"cve": "CVE-2025-47114",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47114"
},
{
"cve": "CVE-2025-47115",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47115"
},
{
"cve": "CVE-2025-47116",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47116"
},
{
"cve": "CVE-2025-47117",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47117"
}
]
}
CNVD-2025-15852
Vulnerability from cnvd - Published: 2025-07-16
VLAI Severity ?
Title
Adobe Experience Manager输入验证错误漏洞(CNVD-2025-15852)
Description
Adobe Experience Manager(AEM)是美国奥多比(Adobe)公司的一套可用于构建网站、移动应用程序和表单的内容管理解决方案。该方案支持移动内容管理、营销销售活动管理和多站点管理等。
Adobe Experience Manager存在输入验证错误漏洞,攻击者可利用该漏洞导致任意代码执行。
Severity
中
Patch Name
Adobe Experience Manager输入验证错误漏洞(CNVD-2025-15852)的补丁
Patch Description
Adobe Experience Manager(AEM)是美国奥多比(Adobe)公司的一套可用于构建网站、移动应用程序和表单的内容管理解决方案。该方案支持移动内容管理、营销销售活动管理和多站点管理等。
Adobe Experience Manager存在输入验证错误漏洞,攻击者可利用该漏洞导致任意代码执行。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html
Reference
https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html
Impacted products
| Name | ['Adobe Adobe Experience Manager AEM Cloud Service (CS)', 'Adobe Adobe Experience Manager <=6.5.22'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-47096",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-47096"
}
},
"description": "Adobe Experience Manager\uff08AEM\uff09\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4e00\u5957\u53ef\u7528\u4e8e\u6784\u5efa\u7f51\u7ad9\u3001\u79fb\u52a8\u5e94\u7528\u7a0b\u5e8f\u548c\u8868\u5355\u7684\u5185\u5bb9\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\u3002\u8be5\u65b9\u6848\u652f\u6301\u79fb\u52a8\u5185\u5bb9\u7ba1\u7406\u3001\u8425\u9500\u9500\u552e\u6d3b\u52a8\u7ba1\u7406\u548c\u591a\u7ad9\u70b9\u7ba1\u7406\u7b49\u3002\n\nAdobe Experience Manager\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u4efb\u610f\u4ee3\u7801\u6267\u884c\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://helpx.adobe.com/security/products/experience-manager/apsb25-48.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-15852",
"openTime": "2025-07-16",
"patchDescription": "Adobe Experience Manager\uff08AEM\uff09\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4e00\u5957\u53ef\u7528\u4e8e\u6784\u5efa\u7f51\u7ad9\u3001\u79fb\u52a8\u5e94\u7528\u7a0b\u5e8f\u548c\u8868\u5355\u7684\u5185\u5bb9\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\u3002\u8be5\u65b9\u6848\u652f\u6301\u79fb\u52a8\u5185\u5bb9\u7ba1\u7406\u3001\u8425\u9500\u9500\u552e\u6d3b\u52a8\u7ba1\u7406\u548c\u591a\u7ad9\u70b9\u7ba1\u7406\u7b49\u3002\r\n\r\nAdobe Experience Manager\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u4efb\u610f\u4ee3\u7801\u6267\u884c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Adobe Experience Manager\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2025-15852\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Adobe Adobe Experience Manager AEM Cloud Service (CS)",
"Adobe Adobe Experience Manager \u003c=6.5.22"
]
},
"referenceLink": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html",
"serverity": "\u4e2d",
"submitTime": "2025-06-13",
"title": "Adobe Experience Manager\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2025-15852\uff09"
}
FKIE_CVE-2025-47096
Vulnerability from fkie_nvd - Published: 2025-06-10 23:15 - Updated: 2025-07-15 18:40
Severity ?
3.5 (Low) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
3.5 (Low) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
3.5 (Low) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
Summary
Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass, allowing a low impact to the integrity of the component. Exploitation of this issue requires user interaction in that a victim must interact with the malicious content. Low privileges are required.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@adobe.com | https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | experience_manager | * | |
| adobe | experience_manager | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"matchCriteriaId": "15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5",
"versionEndExcluding": "6.5.23.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"matchCriteriaId": "8A395D75-088D-41C2-BCE6-30CB049798FE",
"versionEndExcluding": "2025.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass, allowing a low impact to the integrity of the component. Exploitation of this issue requires user interaction in that a victim must interact with the malicious content. Low privileges are required."
},
{
"lang": "es",
"value": "Las versiones 6.5.22 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso. Se requieren privilegios bajos."
}
],
"id": "CVE-2025-47096",
"lastModified": "2025-07-15T18:40:31.207",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "psirt@adobe.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-06-10T23:15:57.247",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "psirt@adobe.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…