This is not the latest report. Click
here to view the latest report.
CVSS v3.1 Statistics for VulDB as of 09/20/2025
10109
320
40
207
Reference
0-69.9%
|
|
Provider |
64.7
Contributor
70-94.9%
Provider
95-100%
| CVE | CNA Value | Alignment | NIST Value | Reason |
|---|---|---|---|---|
| CVE-2024-3689 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) High | Attack Complexity (AC) High | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2024-12138 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-0558 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-5321 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10373 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
| Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-10410 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10426 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10442 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10562 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10603 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10604 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10605 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
| Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-10606 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
| Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-10607 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-10608 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10613 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10614 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
| Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-10615 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10616 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10617 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10618 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10620 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10621 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10623 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10624 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10625 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10626 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10627 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10631 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
| Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-10632 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | ≠ | Scope (S) Changed | Security boundary cross identified | |
| Confidentiality (C) None | ≠ | Confidentiality (C) Low | Information leaked appears non-critical/sensitive | |
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2025-10662 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) High | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10663 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10664 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10666 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | No privileges needed by attacker identified by NVD analyst | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2025-10667 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10668 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10670 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10673 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10687 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2025-10688 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) Low | ≠ | Integrity (I) High | No limiting factors for integrity listed | |
| Availability (A) Low | ≠ | Availability (A) High | No limiting factors for availability listed |