[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2025-32975":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-22T16:08:08.064Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":660,"aliases":661,"duplicate_of":9,"upstream":662,"downstream":663,"duplicates":664,"related":665,"reserved_at":9,"published_at":666,"modified_at":667,"state":668,"summary":669,"references_raw":680,"kevs":707,"epss":718,"epss_history":721,"metrics":992,"affected":998},"CVE-2025-32975","Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead to complete administrative takeover.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-287","Improper Authentication","When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.","weakness","Draft","Class","High",[20,182,261,265,269,273,292,481,543,627],{"id":21,"name":22,"techniques":23},"CAPEC-114","Authentication Abuse",[24],{"id":25,"name":26,"tactics":27,"countermeasures":34},"T1548","Abuse Elevation Control Mechanism",[28,31],{"id":29,"name":30},"TA0030","Defense Evasion",{"id":32,"name":33},"TA0111","Privilege Escalation",[35,40,44,48,52,57,61,65,69,73,77,81,85,89,94,98,103,108,112,116,120,125,129,133,137,141,146,150,154,158,162,166,170,174,178],{"id":36,"name":37,"tactic":38},"D3-CI","Configuration Inventory",{"name":39},"Model",{"id":41,"name":42,"tactic":43},"D3-AM","Access Modeling",{"name":39},{"id":45,"name":46,"tactic":47},"D3-DI","Data Inventory",{"name":39},{"id":49,"name":50,"tactic":51},"D3-NTPM","Network Traffic Policy Mapping",{"name":39},{"id":53,"name":54,"tactic":55},"D3-AEM","Application Exception Monitoring",{"name":56},"Detect",{"id":58,"name":59,"tactic":60},"D3-SCA","System Call Analysis",{"name":56},{"id":62,"name":63,"tactic":64},"D3-SFA","System File Analysis",{"name":56},{"id":66,"name":67,"tactic":68},"D3-FA","File Analysis",{"name":56},{"id":70,"name":71,"tactic":72},"D3-FIM","File Integrity Monitoring",{"name":56},{"id":74,"name":75,"tactic":76},"D3-OPM","Operational Process Monitoring",{"name":56},{"id":78,"name":79,"tactic":80},"D3-DA","Dynamic Analysis",{"name":56},{"id":82,"name":83,"tactic":84},"D3-EFA","Emulated File Analysis",{"name":56},{"id":86,"name":87,"tactic":88},"D3-PSA","Process Spawn Analysis",{"name":56},{"id":90,"name":91,"tactic":92},"D3-FEV","File Eviction",{"name":93},"Evict",{"id":95,"name":96,"tactic":97},"D3-AL","Account Locking",{"name":93},{"id":99,"name":100,"tactic":101},"D3-DF","Decoy File",{"name":102},"Deceive",{"id":104,"name":105,"tactic":106},"D3-FE","File Encryption",{"name":107},"Harden",{"id":109,"name":110,"tactic":111},"D3-AA","Agent Authentication",{"name":107},{"id":113,"name":114,"tactic":115},"D3-CDP","Change Default Password",{"name":107},{"id":117,"name":118,"tactic":119},"D3-SCP","System Configuration Permissions",{"name":107},{"id":121,"name":122,"tactic":123},"D3-RC","Restore Configuration",{"name":124},"Restore",{"id":126,"name":127,"tactic":128},"D3-RF","Restore File",{"name":124},{"id":130,"name":131,"tactic":132},"D3-ULA","Unlock Account",{"name":124},{"id":134,"name":135,"tactic":136},"D3-RUAA","Restore User Account Access",{"name":124},{"id":138,"name":139,"tactic":140},"D3-RD","Restore Database",{"name":124},{"id":142,"name":143,"tactic":144},"D3-SCF","System Call Filtering",{"name":145},"Isolate",{"id":147,"name":148,"tactic":149},"D3-CF","Content Filtering",{"name":145},{"id":151,"name":152,"tactic":153},"D3-LFP","Local File Permissions",{"name":145},{"id":155,"name":156,"tactic":157},"D3-RFAM","Remote File Access Mediation",{"name":145},{"id":159,"name":160,"tactic":161},"D3-CQ","Content Quarantine",{"name":145},{"id":163,"name":164,"tactic":165},"D3-CM","Content Modification",{"name":145},{"id":167,"name":168,"tactic":169},"D3-UAP","User Account Permissions",{"name":145},{"id":171,"name":172,"tactic":173},"D3-EAL","Executable Allowlisting",{"name":145},{"id":175,"name":176,"tactic":177},"D3-EDL","Executable Denylisting",{"name":145},{"id":179,"name":180,"tactic":181},"D3-HBPI","Hardware-based Process Isolation",{"name":145},{"id":183,"name":184,"techniques":185},"CAPEC-115","Authentication Bypass",[186],{"id":25,"name":26,"tactics":187,"countermeasures":190},[188,189],{"id":29,"name":30},{"id":32,"name":33},[191,193,195,197,199,201,203,205,207,209,211,213,215,217,219,221,223,225,227,229,231,233,235,237,239,241,243,245,247,249,251,253,255,257,259],{"id":36,"name":37,"tactic":192},{"name":39},{"id":41,"name":42,"tactic":194},{"name":39},{"id":45,"name":46,"tactic":196},{"name":39},{"id":49,"name":50,"tactic":198},{"name":39},{"id":53,"name":54,"tactic":200},{"name":56},{"id":58,"name":59,"tactic":202},{"name":56},{"id":62,"name":63,"tactic":204},{"name":56},{"id":66,"name":67,"tactic":206},{"name":56},{"id":70,"name":71,"tactic":208},{"name":56},{"id":74,"name":75,"tactic":210},{"name":56},{"id":78,"name":79,"tactic":212},{"name":56},{"id":82,"name":83,"tactic":214},{"name":56},{"id":86,"name":87,"tactic":216},{"name":56},{"id":90,"name":91,"tactic":218},{"name":93},{"id":95,"name":96,"tactic":220},{"name":93},{"id":99,"name":100,"tactic":222},{"name":102},{"id":104,"name":105,"tactic":224},{"name":107},{"id":109,"name":110,"tactic":226},{"name":107},{"id":113,"name":114,"tactic":228},{"name":107},{"id":117,"name":118,"tactic":230},{"name":107},{"id":121,"name":122,"tactic":232},{"name":124},{"id":126,"name":127,"tactic":234},{"name":124},{"id":130,"name":131,"tactic":236},{"name":124},{"id":134,"name":135,"tactic":238},{"name":124},{"id":138,"name":139,"tactic":240},{"name":124},{"id":142,"name":143,"tactic":242},{"name":145},{"id":147,"name":148,"tactic":244},{"name":145},{"id":151,"name":152,"tactic":246},{"name":145},{"id":155,"name":156,"tactic":248},{"name":145},{"id":159,"name":160,"tactic":250},{"name":145},{"id":163,"name":164,"tactic":252},{"name":145},{"id":167,"name":168,"tactic":254},{"name":145},{"id":171,"name":172,"tactic":256},{"name":145},{"id":175,"name":176,"tactic":258},{"name":145},{"id":179,"name":180,"tactic":260},{"name":145},{"id":262,"name":263,"techniques":264},"CAPEC-151","Identity Spoofing",[],{"id":266,"name":267,"techniques":268},"CAPEC-194","Fake the Source of Data",[],{"id":270,"name":271,"techniques":272},"CAPEC-22","Exploiting Trust in Client",[],{"id":274,"name":275,"techniques":276},"CAPEC-57","Utilizing REST's Trust in the System Resource to Obtain Sensitive Data",[277],{"id":278,"name":279,"tactics":280,"countermeasures":287},"T1040","Network Sniffing",[281,284],{"id":282,"name":283},"TA0031","Credential Access",{"id":285,"name":286},"TA0102","Discovery",[288],{"id":289,"name":290,"tactic":291},"D3-DNSTA","DNS Traffic Analysis",{"name":56},{"id":293,"name":294,"techniques":295},"CAPEC-593","Session Hijacking",[296,340,453],{"id":297,"name":298,"tactics":299,"countermeasures":303},"T1185","Browser Session Hijacking",[300],{"id":301,"name":302},"TA0100","Collection",[304,308,312,316,320,324,328,332,336],{"id":305,"name":306,"tactic":307},"D3-UGLPA","User Geolocation Logon Pattern Analysis",{"name":56},{"id":309,"name":310,"tactic":311},"D3-PMAD","Protocol Metadata Anomaly Detection",{"name":56},{"id":313,"name":314,"tactic":315},"D3-CSPP","Client-server Payload Profiling",{"name":56},{"id":317,"name":318,"tactic":319},"D3-PHDURA","Per Host Download-Upload Ratio Analysis",{"name":56},{"id":321,"name":322,"tactic":323},"D3-NTSA","Network Traffic Signature Analysis",{"name":56},{"id":325,"name":326,"tactic":327},"D3-APCA","Application Protocol Command Analysis",{"name":56},{"id":329,"name":330,"tactic":331},"D3-NTCD","Network Traffic Community Deviation",{"name":56},{"id":333,"name":334,"tactic":335},"D3-RTSD","Remote Terminal Session Detection",{"name":56},{"id":337,"name":338,"tactic":339},"D3-NTF","Network Traffic Filtering",{"name":145},{"id":341,"name":342,"tactics":343,"countermeasures":348},"T1550.001","Application Access Token",[344,345],{"id":29,"name":30},{"id":346,"name":347},"TA0109","Lateral Movement",[349,353,357,359,363,365,367,369,371,373,375,377,379,383,387,391,395,399,403,407,411,415,419,423,427,431,435,437,439,443,447,451],{"id":350,"name":351,"tactic":352},"D3-PLA","Process Lineage Analysis",{"name":56},{"id":354,"name":355,"tactic":356},"D3-PSMD","Process Self-Modification Detection",{"name":56},{"id":86,"name":87,"tactic":358},{"name":56},{"id":360,"name":361,"tactic":362},"D3-CCSA","Credential Compromise Scope Analysis",{"name":56},{"id":305,"name":306,"tactic":364},{"name":56},{"id":309,"name":310,"tactic":366},{"name":56},{"id":313,"name":314,"tactic":368},{"name":56},{"id":317,"name":318,"tactic":370},{"name":56},{"id":321,"name":322,"tactic":372},{"name":56},{"id":325,"name":326,"tactic":374},{"name":56},{"id":329,"name":330,"tactic":376},{"name":56},{"id":333,"name":334,"tactic":378},{"name":56},{"id":380,"name":381,"tactic":382},"D3-PT","Process Termination",{"name":93},{"id":384,"name":385,"tactic":386},"D3-PS","Process Suspension",{"name":93},{"id":388,"name":389,"tactic":390},"D3-HR","Host Reboot",{"name":93},{"id":392,"name":393,"tactic":394},"D3-HS","Host Shutdown",{"name":93},{"id":396,"name":397,"tactic":398},"D3-CR","Credential Revocation",{"name":93},{"id":400,"name":401,"tactic":402},"D3-ANCI","Authentication Cache Invalidation",{"name":93},{"id":404,"name":405,"tactic":406},"D3-DUC","Decoy User Credential",{"name":102},{"id":408,"name":409,"tactic":410},"D3-CH","Credential Hardening",{"name":107},{"id":412,"name":413,"tactic":414},"D3-MFA","Multi-factor Authentication",{"name":107},{"id":416,"name":417,"tactic":418},"D3-CRO","Credential Rotation",{"name":107},{"id":420,"name":421,"tactic":422},"D3-TB","Token Binding",{"name":107},{"id":424,"name":425,"tactic":426},"D3-TBA","Token-based Authentication",{"name":107},{"id":428,"name":429,"tactic":430},"D3-RIC","Reissue Credential",{"name":124},{"id":432,"name":433,"tactic":434},"D3-KBPI","Kernel-based Process Isolation",{"name":145},{"id":142,"name":143,"tactic":436},{"name":145},{"id":179,"name":180,"tactic":438},{"name":145},{"id":440,"name":441,"tactic":442},"D3-ABPI","Application-based Process Isolation",{"name":145},{"id":444,"name":445,"tactic":446},"D3-WSAM","Web Session Access Mediation",{"name":145},{"id":448,"name":449,"tactic":450},"D3-CTS","Credential Transmission Scoping",{"name":145},{"id":337,"name":338,"tactic":452},{"name":145},{"id":454,"name":455,"tactics":456,"countermeasures":458},"T1563","Remote Service Session Hijacking",[457],{"id":346,"name":347},[459,461,463,465,467,469,471,473,475,479],{"id":305,"name":306,"tactic":460},{"name":56},{"id":309,"name":310,"tactic":462},{"name":56},{"id":313,"name":314,"tactic":464},{"name":56},{"id":317,"name":318,"tactic":466},{"name":56},{"id":321,"name":322,"tactic":468},{"name":56},{"id":325,"name":326,"tactic":470},{"name":56},{"id":329,"name":330,"tactic":472},{"name":56},{"id":333,"name":334,"tactic":474},{"name":56},{"id":476,"name":477,"tactic":478},"D3-ST","Session Termination",{"name":93},{"id":337,"name":338,"tactic":480},{"name":145},{"id":482,"name":483,"techniques":484},"CAPEC-633","Token Impersonation",[485],{"id":486,"name":487,"tactics":488,"countermeasures":494},"T1134","Access Token Manipulation",[489,490,493],{"id":29,"name":30},{"id":491,"name":492},"TA0005","Stealth",{"id":32,"name":33},[495,497,499,501,503,505,507,509,511,513,515,517,519,521,523,525,527,529,531,533,535,537,539,541],{"id":36,"name":37,"tactic":496},{"name":39},{"id":49,"name":50,"tactic":498},{"name":39},{"id":41,"name":42,"tactic":500},{"name":39},{"id":53,"name":54,"tactic":502},{"name":56},{"id":58,"name":59,"tactic":504},{"name":56},{"id":360,"name":361,"tactic":506},{"name":56},{"id":74,"name":75,"tactic":508},{"name":56},{"id":86,"name":87,"tactic":510},{"name":56},{"id":476,"name":477,"tactic":512},{"name":93},{"id":396,"name":397,"tactic":514},{"name":93},{"id":400,"name":401,"tactic":516},{"name":93},{"id":404,"name":405,"tactic":518},{"name":102},{"id":408,"name":409,"tactic":520},{"name":107},{"id":412,"name":413,"tactic":522},{"name":107},{"id":416,"name":417,"tactic":524},{"name":107},{"id":420,"name":421,"tactic":526},{"name":107},{"id":424,"name":425,"tactic":528},{"name":107},{"id":121,"name":122,"tactic":530},{"name":124},{"id":428,"name":429,"tactic":532},{"name":124},{"id":142,"name":143,"tactic":534},{"name":145},{"id":448,"name":449,"tactic":536},{"name":145},{"id":171,"name":172,"tactic":538},{"name":145},{"id":175,"name":176,"tactic":540},{"name":145},{"id":179,"name":180,"tactic":542},{"name":145},{"id":544,"name":545,"techniques":546},"CAPEC-650","Upload a Web Shell to a Web Server",[547],{"id":548,"name":549,"tactics":550,"countermeasures":554},"T1505.003","Web Shell",[551],{"id":552,"name":553},"TA0110","Persistence",[555,559,563,567,571,573,575,577,579,581,583,585,587,589,591,593,595,597,599,603,605,607,609,611,613,615,617,619,621,623,625],{"id":556,"name":557,"tactic":558},"D3-NNI","Network Node Inventory",{"name":39},{"id":560,"name":561,"tactic":562},"D3-PLM","Physical Link Mapping",{"name":39},{"id":564,"name":565,"tactic":566},"D3-LLM","Logical Link Mapping",{"name":39},{"id":568,"name":569,"tactic":570},"D3-EHB","Endpoint Health Beacon",{"name":56},{"id":66,"name":67,"tactic":572},{"name":56},{"id":70,"name":71,"tactic":574},{"name":56},{"id":78,"name":79,"tactic":576},{"name":56},{"id":82,"name":83,"tactic":578},{"name":56},{"id":350,"name":351,"tactic":580},{"name":56},{"id":354,"name":355,"tactic":582},{"name":56},{"id":86,"name":87,"tactic":584},{"name":56},{"id":90,"name":91,"tactic":586},{"name":93},{"id":380,"name":381,"tactic":588},{"name":93},{"id":384,"name":385,"tactic":590},{"name":93},{"id":388,"name":389,"tactic":592},{"name":93},{"id":392,"name":393,"tactic":594},{"name":93},{"id":99,"name":100,"tactic":596},{"name":102},{"id":104,"name":105,"tactic":598},{"name":107},{"id":600,"name":601,"tactic":602},"D3-RNA","Restore Network Access",{"name":124},{"id":126,"name":127,"tactic":604},{"name":124},{"id":147,"name":148,"tactic":606},{"name":145},{"id":151,"name":152,"tactic":608},{"name":145},{"id":155,"name":156,"tactic":610},{"name":145},{"id":159,"name":160,"tactic":612},{"name":145},{"id":163,"name":164,"tactic":614},{"name":145},{"id":171,"name":172,"tactic":616},{"name":145},{"id":175,"name":176,"tactic":618},{"name":145},{"id":432,"name":433,"tactic":620},{"name":145},{"id":142,"name":143,"tactic":622},{"name":145},{"id":179,"name":180,"tactic":624},{"name":145},{"id":440,"name":441,"tactic":626},{"name":145},{"id":628,"name":629,"techniques":630},"CAPEC-94","Adversary in the Middle (AiTM)",[631],{"id":632,"name":633,"tactics":634,"countermeasures":637},"T1557","Adversary-in-the-Middle",[635,636],{"id":282,"name":283},{"id":301,"name":302},[638,640,642,644,646,648,650,652,654,658],{"id":305,"name":306,"tactic":639},{"name":56},{"id":309,"name":310,"tactic":641},{"name":56},{"id":313,"name":314,"tactic":643},{"name":56},{"id":317,"name":318,"tactic":645},{"name":56},{"id":321,"name":322,"tactic":647},{"name":56},{"id":325,"name":326,"tactic":649},{"name":56},{"id":329,"name":330,"tactic":651},{"name":56},{"id":333,"name":334,"tactic":653},{"name":56},{"id":655,"name":656,"tactic":657},"D3-CAA","Connection Attempt Analysis",{"name":56},{"id":337,"name":338,"tactic":659},{"name":145},[],[],[],[],[],[],"2025-06-24T00:00:00.000Z","2026-04-21T03:55:39.782Z","Analyzed",{"cisa_kev":670,"cisa_ransomware":671,"cisa_vendor":672,"epss_severity":673,"epss_score":674,"severity":675,"severity_score":676,"severity_version":677,"severity_source":678,"severity_vector":679,"severity_status":668},true,false,"Quest","high",0.35056,"critical",10,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",[681,687,693,697,701],{"url":682,"sources":683,"tags":685},"https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978",[678,684],"nvd",[686],"Vendor Advisory",{"url":688,"sources":689,"tags":690},"https://seclists.org/fulldisclosure/2025/Jun/22",[678,684],[691,692],"Mailing List","Third Party Advisory",{"url":694,"sources":695,"tags":696},"https://seralys.com/research/CVE-2025-32975.txt",[678,684],[692],{"url":698,"sources":699,"tags":700},"http://seclists.org/fulldisclosure/2025/Jun/25",[678,684],[691,692],{"url":702,"sources":703,"tags":704},"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32975",[678,684],[705,706],"Government Resource","US Government Resource",[708],{"source":709,"vendor":672,"product":710,"date_added":711,"vulnerability_name":712,"short_description":713,"required_action":714,"due_date":715,"known_ransomware_campaign_use":716,"notes":717,"exploitation_type":9},"cisa","KACE Systems Management Appliance (SMA)","2026-04-20","Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability","Quest KACE Systems Management Appliance (SMA) contains an improper authentication vulnerability that could allow attackers to impersonate legitimate users without valid credentials.","Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","2026-05-04","Unknown","https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32975",{"date":719,"score":674,"percentile":720},"2026-05-22",0.97096,[722,726,729,732,735,738,741,744,747,750,753,756,758,761,764,767,770,773,777,780,783,786,789,791,794,797,800,803,806,810,813,816,819,822,825,828,831,834,837,840,843,845,848,851,854,857,860,863,866,869,872,875,878,881,884,887,890,893,896,899,902,905,908,911,914,917,919,922,925,927,930,933,936,939,942,945,949,952,955,958,961,964,967,970,973,976,980,983,986,989],{"date":723,"score":724,"percentile":725},"2025-11-04",0.00199,0.42142,{"date":727,"score":724,"percentile":728},"2025-11-05",0.42133,{"date":730,"score":724,"percentile":731},"2025-11-06",0.42145,{"date":733,"score":724,"percentile":734},"2025-11-07",0.42169,{"date":736,"score":724,"percentile":737},"2025-11-08",0.42162,{"date":739,"score":724,"percentile":740},"2025-11-09",0.42138,{"date":742,"score":724,"percentile":743},"2025-11-10",0.42104,{"date":745,"score":724,"percentile":746},"2025-11-11",0.42121,{"date":748,"score":724,"percentile":749},"2025-11-12",0.42154,{"date":751,"score":724,"percentile":752},"2025-11-13",0.42168,{"date":754,"score":724,"percentile":755},"2025-11-14",0.42172,{"date":757,"score":724,"percentile":752},"2025-11-15",{"date":759,"score":724,"percentile":760},"2025-11-16",0.42155,{"date":762,"score":724,"percentile":763},"2025-11-17",0.42126,{"date":765,"score":724,"percentile":766},"2025-11-18",0.37486,{"date":768,"score":724,"percentile":769},"2025-11-19",0.37495,{"date":771,"score":724,"percentile":772},"2025-11-20",0.37489,{"date":774,"score":775,"percentile":776},"2025-11-21",0.00121,0.31945,{"date":778,"score":775,"percentile":779},"2025-11-22",0.31946,{"date":781,"score":775,"percentile":782},"2025-11-23",0.31919,{"date":784,"score":775,"percentile":785},"2025-11-24",0.31893,{"date":787,"score":775,"percentile":788},"2025-11-25",0.31889,{"date":790,"score":775,"percentile":788},"2025-11-26",{"date":792,"score":775,"percentile":793},"2025-11-27",0.31902,{"date":795,"score":775,"percentile":796},"2025-11-28",0.31882,{"date":798,"score":775,"percentile":799},"2025-11-29",0.31865,{"date":801,"score":775,"percentile":802},"2025-11-30",0.31844,{"date":804,"score":775,"percentile":805},"2025-12-01",0.31923,{"date":807,"score":808,"percentile":809},"2025-12-02",0.00167,0.38392,{"date":811,"score":808,"percentile":812},"2025-12-03",0.38391,{"date":814,"score":808,"percentile":815},"2025-12-04",0.38258,{"date":817,"score":808,"percentile":818},"2025-12-05",0.38291,{"date":820,"score":808,"percentile":821},"2025-12-06",0.38287,{"date":823,"score":808,"percentile":824},"2025-12-07",0.38265,{"date":826,"score":808,"percentile":827},"2025-12-08",0.38279,{"date":829,"score":808,"percentile":830},"2025-12-09",0.38321,{"date":832,"score":808,"percentile":833},"2025-12-10",0.3838,{"date":835,"score":808,"percentile":836},"2025-12-11",0.38408,{"date":838,"score":808,"percentile":839},"2025-12-12",0.38441,{"date":841,"score":808,"percentile":842},"2025-12-13",0.38417,{"date":844,"score":808,"percentile":833},"2025-12-14",{"date":846,"score":808,"percentile":847},"2025-12-15",0.38355,{"date":849,"score":808,"percentile":850},"2025-12-16",0.38387,{"date":852,"score":808,"percentile":853},"2025-12-17",0.38432,{"date":855,"score":808,"percentile":856},"2025-12-18",0.38484,{"date":858,"score":808,"percentile":859},"2025-12-19",0.38504,{"date":861,"score":808,"percentile":862},"2025-12-20",0.38486,{"date":864,"score":808,"percentile":865},"2025-12-21",0.38438,{"date":867,"score":808,"percentile":868},"2025-12-22",0.38412,{"date":870,"score":808,"percentile":871},"2025-12-23",0.38416,{"date":873,"score":808,"percentile":874},"2025-12-24",0.38428,{"date":876,"score":808,"percentile":877},"2025-12-25",0.3848,{"date":879,"score":808,"percentile":880},"2025-12-26",0.38462,{"date":882,"score":808,"percentile":883},"2025-12-27",0.38483,{"date":885,"score":808,"percentile":886},"2025-12-28",0.38382,{"date":888,"score":808,"percentile":889},"2025-12-29",0.38354,{"date":891,"score":808,"percentile":892},"2025-12-30",0.38343,{"date":894,"score":808,"percentile":895},"2025-12-31",0.3841,{"date":897,"score":808,"percentile":898},"2026-01-01",0.38563,{"date":900,"score":808,"percentile":901},"2026-01-02",0.38538,{"date":903,"score":808,"percentile":904},"2026-01-03",0.38533,{"date":906,"score":808,"percentile":907},"2026-01-04",0.38365,{"date":909,"score":808,"percentile":910},"2026-01-05",0.38336,{"date":912,"score":808,"percentile":913},"2026-01-06",0.38342,{"date":915,"score":808,"percentile":916},"2026-01-07",0.38366,{"date":918,"score":808,"percentile":812},"2026-01-08",{"date":920,"score":808,"percentile":921},"2026-01-09",0.38385,{"date":923,"score":808,"percentile":924},"2026-01-10",0.38389,{"date":926,"score":808,"percentile":907},"2026-01-11",{"date":928,"score":808,"percentile":929},"2026-01-12",0.38315,{"date":931,"score":808,"percentile":932},"2026-01-13",0.38294,{"date":934,"score":808,"percentile":935},"2026-01-14",0.38347,{"date":937,"score":808,"percentile":938},"2026-01-15",0.38338,{"date":940,"score":808,"percentile":941},"2026-01-16",0.38358,{"date":943,"score":808,"percentile":944},"2026-01-17",0.38328,{"date":946,"score":947,"percentile":948},"2026-01-18",0.00195,0.41558,{"date":950,"score":947,"percentile":951},"2026-01-19",0.41524,{"date":953,"score":947,"percentile":954},"2026-01-20",0.41511,{"date":956,"score":947,"percentile":957},"2026-01-21",0.41513,{"date":959,"score":947,"percentile":960},"2026-01-22",0.41507,{"date":962,"score":947,"percentile":963},"2026-01-23",0.41565,{"date":965,"score":947,"percentile":966},"2026-01-24",0.41577,{"date":968,"score":947,"percentile":969},"2026-01-25",0.41525,{"date":971,"score":947,"percentile":972},"2026-01-26",0.41482,{"date":974,"score":947,"percentile":975},"2026-01-27",0.41479,{"date":977,"score":978,"percentile":979},"2026-01-28",0.00144,0.34951,{"date":981,"score":978,"percentile":982},"2026-01-29",0.34922,{"date":984,"score":978,"percentile":985},"2026-01-30",0.34912,{"date":987,"score":978,"percentile":988},"2026-01-31",0.34921,{"date":990,"score":978,"percentile":991},"2026-02-01",0.35025,[993,996],{"source":678,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":994,"cvss_v4_0":9},{"baseScore":676,"baseSeverity":995,"vectorString":679,"impactScore":676,"exploitabilityScore":676},"CRITICAL",{"source":684,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":997,"cvss_v4_0":9},{"baseScore":676,"baseSeverity":995,"vectorString":679,"impactScore":676,"exploitabilityScore":676},[999],{"ecosystem":9,"name":1000,"vendor":1001,"product":1002,"cpe_part":1003,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":1004},"kace systems management appliance","quest","kace_systems_management_appliance","a",[1005,1012,1016,1020,1024],{"version":1006,"is_range":670,"range_type":1007,"version_start":1008,"version_start_type":1009,"version_end":1010,"version_end_type":1011,"fixed_in":9},"gte13.0_lt13.0.385","cpe","13.0","including","13.0.385","excluding",{"version":1013,"is_range":670,"range_type":1007,"version_start":1014,"version_start_type":1009,"version_end":1015,"version_end_type":1011,"fixed_in":9},"gte13.1_lt13.1.81","13.1","13.1.81",{"version":1017,"is_range":670,"range_type":1007,"version_start":1018,"version_start_type":1009,"version_end":1019,"version_end_type":1011,"fixed_in":9},"gte13.2_lt13.2.183","13.2","13.2.183",{"version":1021,"is_range":670,"range_type":1007,"version_start":1022,"version_start_type":1009,"version_end":1023,"version_end_type":1011,"fixed_in":9},"gte14.0_lt14.0.341","14.0","14.0.341",{"version":1025,"is_range":670,"range_type":1007,"version_start":1026,"version_start_type":1009,"version_end":1027,"version_end_type":1011,"fixed_in":9},"gte14.1_lt14.1.101","14.1","14.1.101"]