This is not the latest report. Click
here to view the latest report.
CVSS v3.1 Statistics for VulDB as of 08/22/2025
9506
320
40
195
Reference
0-69.9%
|
Provider |
60.9
Contributor
70-94.9%
Provider
95-100%
CVE | CNA Value | Alignment | NIST Value | Reason |
---|---|---|---|---|
CVE-2024-2825 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-2826 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-2827 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-2828 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-3736 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) None | Confidentiality (C) None | |||
Integrity (I) None | Integrity (I) None | |||
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-3737 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-3738 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-4501 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-4502 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-4503 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-4504 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-4505 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-4506 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-4507 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-4508 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-4509 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-4510 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-4813 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-4814 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-4815 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-4816 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-5336 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-5337 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-5338 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-5339 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-5340 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-6184 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-6186 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-6187 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-6269 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-13022 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2024-13029 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) None | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) None | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2025-1113 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2025-8708 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) High | Attack Complexity (AC) High | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2025-9091 (4 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) None | User Interaction (UI) None | |||
Scope (S) Unchanged | Scope (S) Unchanged | |||
Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
Integrity (I) None | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
Availability (A) None | ≠ | Availability (A) High | No limiting factors for availability listed | |
CVE-2025-9167 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) None | Availability (A) None | |||
CVE-2025-9168 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) None | Availability (A) None | |||
CVE-2025-9169 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) None | Availability (A) None | |||
CVE-2025-9170 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) None | Availability (A) None | |||
CVE-2025-9171 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) None | Availability (A) None |