This is not the latest report. Click
here to view the latest report.
CVSS v3.1 Statistics for VulDB as of 05/20/2025
7494
320
40
203
Reference
0-69.9%
|
|
Provider |
63.4
Contributor
70-94.9%
Provider
95-100%
| CVE | CNA Value | Alignment | NIST Value | Reason |
|---|---|---|---|---|
| CVE-2024-2015 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2024-2016 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2024-3432 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | ≠ | User Interaction (UI) None | User Interaction not identified | |
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2024-12987 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-0786 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-0787 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
| Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-0788 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-0793 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-0794 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
| Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-1166 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-3198 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-3235 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-3244 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-3250 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-3764 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-3765 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-3998 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4059 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4077 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4118 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) None | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) None | Availability (A) None | |||
| CVE-2025-4163 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4468 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4471 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4472 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4480 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4481 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4482 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4497 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4500 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4502 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4503 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4504 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4508 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4509 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4547 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) High | Privileges Required (PR) High | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
| Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-4913 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4914 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4915 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4916 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-4917 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed |