Auto-Update: 2025-04-24T14:00:20.179751+00:00

This commit is contained in:
cad-safe-bot 2025-04-24 14:03:53 +00:00
parent a00b1ba19d
commit 021f3c8903
22 changed files with 966 additions and 97 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-11916", "id": "CVE-2020-11916",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-07T18:15:15.310", "published": "2024-11-07T18:15:15.310",
"lastModified": "2024-11-08T19:01:03.880", "lastModified": "2025-04-24T13:41:33.143",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,44 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:svakom:svakom_siime_eye_firmware:14.1.00000001.3.330.0.0.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D510DDF7-9FAF-427A-A5F7-8B0DA1253AEF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:svakom:svakom_siime_eye:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC39279C-49EA-4BA6-BA54-D12373D91C37"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://seclists.org/fulldisclosure/2024/Jul/14", "url": "https://seclists.org/fulldisclosure/2024/Jul/14",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory",
"Exploit"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-11917", "id": "CVE-2020-11917",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-07T18:15:15.370", "published": "2024-11-07T18:15:15.370",
"lastModified": "2024-11-08T19:01:03.880", "lastModified": "2025-04-24T13:42:09.087",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,44 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:svakom:svakom_siime_eye_firmware:14.1.00000001.3.330.0.0.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D510DDF7-9FAF-427A-A5F7-8B0DA1253AEF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:svakom:svakom_siime_eye:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC39279C-49EA-4BA6-BA54-D12373D91C37"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://seclists.org/fulldisclosure/2024/Jul/14", "url": "https://seclists.org/fulldisclosure/2024/Jul/14",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory",
"Exploit"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-11918", "id": "CVE-2020-11918",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-07T18:15:15.450", "published": "2024-11-07T18:15:15.450",
"lastModified": "2024-11-08T19:01:03.880", "lastModified": "2025-04-24T13:42:14.090",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,44 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:svakom:svakom_siime_eye_firmware:14.1.00000001.3.330.0.0.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D510DDF7-9FAF-427A-A5F7-8B0DA1253AEF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:svakom:svakom_siime_eye:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC39279C-49EA-4BA6-BA54-D12373D91C37"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://seclists.org/fulldisclosure/2024/Jul/14", "url": "https://seclists.org/fulldisclosure/2024/Jul/14",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory",
"Exploit"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-11919", "id": "CVE-2020-11919",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-07T18:15:15.517", "published": "2024-11-07T18:15:15.517",
"lastModified": "2024-11-08T19:01:03.880", "lastModified": "2025-04-24T13:42:19.443",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,44 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:svakom:svakom_siime_eye_firmware:14.1.00000001.3.330.0.0.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D510DDF7-9FAF-427A-A5F7-8B0DA1253AEF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:svakom:svakom_siime_eye:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC39279C-49EA-4BA6-BA54-D12373D91C37"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://seclists.org/fulldisclosure/2024/Jul/14", "url": "https://seclists.org/fulldisclosure/2024/Jul/14",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory",
"Exploit"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-36028", "id": "CVE-2022-36028",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-25T21:15:46.327", "published": "2024-04-25T21:15:46.327",
"lastModified": "2024-11-21T07:12:13.090", "lastModified": "2025-04-24T13:45:40.137",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.2 "impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
} }
] ]
}, },
@ -49,24 +69,66 @@
"value": "CWE-601" "value": "CWE-601"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bigbluebutton:greenlight:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.13.0",
"matchCriteriaId": "3E509C75-FFE6-44A8-B387-E21B8C07C3F9"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/bigbluebutton/greenlight/commit/20fe1ee71b5703fcc4ed698a959ad224fed19623", "url": "https://github.com/bigbluebutton/greenlight/commit/20fe1ee71b5703fcc4ed698a959ad224fed19623",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://huntr.com/bounties/ba5834bd-1f04-4936-8e93-2442d45403bahttps://", "url": "https://huntr.com/bounties/ba5834bd-1f04-4936-8e93-2442d45403bahttps://",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Third Party Advisory",
"Broken Link"
]
}, },
{ {
"url": "https://github.com/bigbluebutton/greenlight/commit/20fe1ee71b5703fcc4ed698a959ad224fed19623", "url": "https://github.com/bigbluebutton/greenlight/commit/20fe1ee71b5703fcc4ed698a959ad224fed19623",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://huntr.com/bounties/ba5834bd-1f04-4936-8e93-2442d45403bahttps://", "url": "https://huntr.com/bounties/ba5834bd-1f04-4936-8e93-2442d45403bahttps://",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"Broken Link"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-36029", "id": "CVE-2022-36029",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-25T21:15:46.523", "published": "2024-04-25T21:15:46.523",
"lastModified": "2024-11-21T07:12:13.233", "lastModified": "2025-04-24T13:46:39.490",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.2 "impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
} }
] ]
}, },
@ -49,24 +69,66 @@
"value": "CWE-601" "value": "CWE-601"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bigbluebutton:greenlight:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.13.0",
"matchCriteriaId": "3E509C75-FFE6-44A8-B387-E21B8C07C3F9"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/bigbluebutton/greenlight/commit/20fe1ee71b5703fcc4ed698a959ad224fed19623", "url": "https://github.com/bigbluebutton/greenlight/commit/20fe1ee71b5703fcc4ed698a959ad224fed19623",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://huntr.com/bounties/ba5834bd-1f04-4936-8e93-2442d45403bahttps://", "url": "https://huntr.com/bounties/ba5834bd-1f04-4936-8e93-2442d45403bahttps://",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Third Party Advisory",
"Broken Link"
]
}, },
{ {
"url": "https://github.com/bigbluebutton/greenlight/commit/20fe1ee71b5703fcc4ed698a959ad224fed19623", "url": "https://github.com/bigbluebutton/greenlight/commit/20fe1ee71b5703fcc4ed698a959ad224fed19623",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://huntr.com/bounties/ba5834bd-1f04-4936-8e93-2442d45403bahttps://", "url": "https://huntr.com/bounties/ba5834bd-1f04-4936-8e93-2442d45403bahttps://",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"Broken Link"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11831", "id": "CVE-2024-11831",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2025-02-10T16:15:37.080", "published": "2025-02-10T16:15:37.080",
"lastModified": "2025-02-13T19:15:13.713", "lastModified": "2025-04-24T13:15:44.573",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -52,6 +52,10 @@
} }
], ],
"references": [ "references": [
{
"url": "https://access.redhat.com/errata/RHBA-2025:0304",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/errata/RHSA-2025:1334", "url": "https://access.redhat.com/errata/RHSA-2025:1334",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-55238", "id": "CVE-2024-55238",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-04-17T16:15:27.780", "published": "2025-04-17T16:15:27.780",
"lastModified": "2025-04-17T20:21:48.243", "lastModified": "2025-04-24T12:47:25.673",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "OpenMetadata <=1.4.1 is vulnerable to SQL Injection. An attacker can extract information from the database in function listCount in the WorkflowDAO interface. The workflowtype and status parameters can be used to build a SQL query." "value": "OpenMetadata <=1.4.1 is vulnerable to SQL Injection. An attacker can extract information from the database in function listCount in the WorkflowDAO interface. The workflowtype and status parameters can be used to build a SQL query."
},
{
"lang": "es",
"value": "OpenMetadata &lt;=1.4.1 es vulnerable a la inyecci\u00f3n SQL. Un atacante puede extraer informaci\u00f3n de la base de datos en la funci\u00f3n listCount de la interfaz WorkflowDAO. Los par\u00e1metros workflowtype y status pueden usarse para crear una consulta SQL."
} }
], ],
"metrics": { "metrics": {
@ -32,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 4.2 "impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
] ]
}, },
@ -47,22 +71,54 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-metadata:openmetadata:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.4.1",
"matchCriteriaId": "445B82A3-F87C-4342-A769-3DB7E73D4371"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gist.github.com/javadk/68c597cdb94768dab31a3219c2ad9904", "url": "https://gist.github.com/javadk/68c597cdb94768dab31a3219c2ad9904",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/open-metadata/OpenMetadata/blob/98945cb2db87ebb325d3a72131f049abffcba345/openmetadata-service/src/main/java/org/openmetadata/service/jdbi3/CollectionDAO.java#L4243", "url": "https://github.com/open-metadata/OpenMetadata/blob/98945cb2db87ebb325d3a72131f049abffcba345/openmetadata-service/src/main/java/org/openmetadata/service/jdbi3/CollectionDAO.java#L4243",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/open-metadata/OpenMetadata/blob/98945cb2db87ebb325d3a72131f049abffcba345/openmetadata-service/src/main/java/org/openmetadata/service/jdbi3/CollectionDAO.java#L4247", "url": "https://github.com/open-metadata/OpenMetadata/blob/98945cb2db87ebb325d3a72131f049abffcba345/openmetadata-service/src/main/java/org/openmetadata/service/jdbi3/CollectionDAO.java#L4247",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Product"
]
}, },
{ {
"url": "https://gist.github.com/javadk/68c597cdb94768dab31a3219c2ad9904", "url": "https://gist.github.com/javadk/68c597cdb94768dab31a3219c2ad9904",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-27820",
"sourceIdentifier": "security@apache.org",
"published": "2025-04-24T12:15:16.723",
"lastModified": "2025-04-24T12:15:16.723",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A bug in PSL validation logic in Apache HttpClient 5.4.x disables domain checks, affecting cookie management and host name verification. Discovered by the Apache HttpClient team. Fixed in the 5.4.3 release"
},
{
"lang": "es",
"value": "Un error en la l\u00f3gica de validaci\u00f3n de PSL en Apache HttpClient 5.4.x deshabilita las comprobaciones de dominio, lo que afecta la gesti\u00f3n de cookies y la verificaci\u00f3n del nombre de host. Descubierto por el equipo de Apache HttpClient. Corregido en la versi\u00f3n 5.4.3."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/apache/httpcomponents-client/pull/574",
"source": "security@apache.org"
},
{
"url": "https://github.com/apache/httpcomponents-client/pull/621",
"source": "security@apache.org"
},
{
"url": "https://hc.apache.org/httpcomponents-client-5.4.x/index.html",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/55xhs40ncqv97qvoocok44995xp5kqn8",
"source": "security@apache.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29648", "id": "CVE-2025-29648",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-04-16T20:15:17.460", "published": "2025-04-16T20:15:17.460",
"lastModified": "2025-04-24T00:15:16.607", "lastModified": "2025-04-24T12:52:00.727",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [ "cveTags": [
{ {
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
@ -58,10 +58,42 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:eap120_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07561227-B7ED-4931-A792-DC5F3EFC60BC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:eap120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "117B617D-360F-4FF9-8785-1A2CDE1B0EB6"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29648", "url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29648",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29649", "id": "CVE-2025-29649",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-04-16T20:15:17.563", "published": "2025-04-16T20:15:17.563",
"lastModified": "2025-04-24T00:15:16.830", "lastModified": "2025-04-24T12:51:37.493",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [ "cveTags": [
{ {
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
@ -58,10 +58,42 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:tl-wr840n_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F2E1762-B468-46CA-A3E9-44B4A21EC437"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:tl-wr840n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3078F3-4CD5-4157-9A2D-7E338B6C7058"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29649", "url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29649",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29650", "id": "CVE-2025-29650",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-04-16T20:15:17.663", "published": "2025-04-16T20:15:17.663",
"lastModified": "2025-04-24T00:15:17.053", "lastModified": "2025-04-24T13:44:23.137",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [ "cveTags": [
{ {
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
@ -58,10 +58,42 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:m7200_firmware:1.0.7:build_180127_rel.55998n:*:*:*:*:*:*",
"matchCriteriaId": "00D5463C-58B7-400E-9B73-37C7036FE252"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:m7200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41438D26-F2D6-4DFC-B13C-A7458CE8F22C"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29650", "url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29650",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29652", "id": "CVE-2025-29652",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-04-16T20:15:17.860", "published": "2025-04-16T20:15:17.860",
"lastModified": "2025-04-24T00:15:17.493", "lastModified": "2025-04-24T13:56:26.960",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [ "cveTags": [
{ {
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
@ -58,10 +58,42 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:m7000_firmware:1.0.7:build_180127_rel.55998n:*:*:*:*:*:*",
"matchCriteriaId": "AC7C3EA6-A860-4814-A424-7332FDE625F5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:m7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F661A5EA-62E0-4073-946F-D279BC385453"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29652", "url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29652",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29653", "id": "CVE-2025-29653",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-04-16T20:15:17.963", "published": "2025-04-16T20:15:17.963",
"lastModified": "2025-04-17T20:21:48.243", "lastModified": "2025-04-24T13:54:34.550",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "SQL Injection vulnerability exists in the TP-Link M7450 4G LTE Mobile Wi-Fi Router Firmware Version: 1.0.2 Build 170306 Rel.1015n, allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields." "value": "SQL Injection vulnerability exists in the TP-Link M7450 4G LTE Mobile Wi-Fi Router Firmware Version: 1.0.2 Build 170306 Rel.1015n, allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link M7450 4G LTE Mobile Wi-Fi Router Firmware versi\u00f3n: 1.0.2 Build 170306 Rel.1015n, lo que permite que un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a."
} }
], ],
"metrics": { "metrics": {
@ -47,10 +51,42 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:m7450_firmware:1.0.2:build_170306_rel.1015n:*:*:*:*:*:*",
"matchCriteriaId": "FC5FA2EA-3A0C-4E80-B499-1E97DEA3B955"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:m7450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F6BAE4-33F8-44D7-8FCF-C7D9AA436BCE"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29653", "url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29653",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3684", "id": "CVE-2025-3684",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-16T11:15:43.557", "published": "2025-04-16T11:15:43.557",
"lastModified": "2025-04-16T19:15:55.000", "lastModified": "2025-04-24T12:58:54.257",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability was found in Xianqi Kindergarten Management System 2.0 Bulid 20190808. It has been rated as critical. This issue affects some unknown processing of the file stu_list.php of the component Child Management. The manipulation of the argument sex leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." "value": "A vulnerability was found in Xianqi Kindergarten Management System 2.0 Bulid 20190808. It has been rated as critical. This issue affects some unknown processing of the file stu_list.php of the component Child Management. The manipulation of the argument sex leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Xianqi Kindergarten Management System 2.0 Bulid 20190808. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo stu_list.php del componente Child Management. La manipulaci\u00f3n del argumento \"sex\" provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados."
} }
], ],
"metrics": { "metrics": {
@ -76,6 +80,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -118,28 +142,73 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xianqi:kindergarten_management_system:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D0D1B41-4BDE-42FB-9328-EB89204B283B"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/Upgradeextension/xianqi/blob/main/README.md", "url": "https://github.com/Upgradeextension/xianqi/blob/main/README.md",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.304973", "url": "https://vuldb.com/?ctiid.304973",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.304973", "url": "https://vuldb.com/?id.304973",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.553239", "url": "https://vuldb.com/?submit.553239",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/Upgradeextension/xianqi/blob/main/README.md", "url": "https://github.com/Upgradeextension/xianqi/blob/main/README.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3690", "id": "CVE-2025-3690",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-16T13:15:53.217", "published": "2025-04-16T13:15:53.217",
"lastModified": "2025-04-16T14:15:28.337", "lastModified": "2025-04-24T13:09:56.753",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability was found in PHPGurukul Men Salon Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/edit-services.php. The manipulation of the argument cost leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." "value": "A vulnerability was found in PHPGurukul Men Salon Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/edit-services.php. The manipulation of the argument cost leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Men Salon Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /admin/edit-services.php. La manipulaci\u00f3n del argumento \"cost\" provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
} }
], ],
"metrics": { "metrics": {
@ -76,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -118,32 +142,82 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:men_salon_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "06009EBA-F4B6-4CC8-8366-72B4A1552FA3"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/Xiaoyao-i03i/CVE/issues/2", "url": "https://github.com/Xiaoyao-i03i/CVE/issues/2",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://phpgurukul.com/", "url": "https://phpgurukul.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.304979", "url": "https://vuldb.com/?ctiid.304979",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.304979", "url": "https://vuldb.com/?id.304979",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.553501", "url": "https://vuldb.com/?submit.553501",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/Xiaoyao-i03i/CVE/issues/2", "url": "https://github.com/Xiaoyao-i03i/CVE/issues/2",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3691", "id": "CVE-2025-3691",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-16T13:15:53.380", "published": "2025-04-16T13:15:53.380",
"lastModified": "2025-04-16T14:15:28.457", "lastModified": "2025-04-24T13:43:43.503",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability was found in mirweiye Seven Bears Library CMS 2023. It has been classified as problematic. Affected is an unknown function of the component Add Link Handler. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." "value": "A vulnerability was found in mirweiye Seven Bears Library CMS 2023. It has been classified as problematic. Affected is an unknown function of the component Add Link Handler. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en mirweiye Seven Bears Library CMS 2023. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del componente Add Link Handler. La manipulaci\u00f3n provoca server-side request forgery. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
} }
], ],
"metrics": { "metrics": {
@ -76,6 +80,26 @@
}, },
"exploitabilityScore": 1.2, "exploitabilityScore": 1.2,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -116,26 +140,64 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mirweiye:seven_bears_library_cms:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023",
"matchCriteriaId": "B36E38B2-A950-4670-939D-2296338ABAA1"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/KKDT12138/CVE/blob/main/cve2.pdf", "url": "https://github.com/KKDT12138/CVE/blob/main/cve2.pdf",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.304980", "url": "https://vuldb.com/?ctiid.304980",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.304980", "url": "https://vuldb.com/?id.304980",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.553507", "url": "https://vuldb.com/?submit.553507",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/KKDT12138/CVE/blob/main/cve2.pdf", "url": "https://github.com/KKDT12138/CVE/blob/main/cve2.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -9,6 +9,10 @@
{ {
"lang": "en", "lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Centreon centreon-web (User configuration form modules) allows SQL Injection.\n\n\nA user with high privileges is able to become administrator by intercepting the contact form request and altering its payload.\n\n\n\nThis issue affects Centreon: from 22.10.0 before 22.10.28, from 23.04.0 before 23.04.25, from 23.10.0 before 23.10.20, from 24.04.0 before 24.04.10, from 24.10.0 before 24.10.4." "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Centreon centreon-web (User configuration form modules) allows SQL Injection.\n\n\nA user with high privileges is able to become administrator by intercepting the contact form request and altering its payload.\n\n\n\nThis issue affects Centreon: from 22.10.0 before 22.10.28, from 23.04.0 before 23.04.25, from 23.10.0 before 23.10.20, from 24.04.0 before 24.04.10, from 24.10.0 before 24.10.4."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Centreon centreon-web (m\u00f3dulos del formulario de configuraci\u00f3n de usuario) permite la inyecci\u00f3n SQL. Un usuario con privilegios elevados puede convertirse en administrador interceptando la solicitud del formulario de contacto y modificando su payload. Este problema afecta a Centreon: de la versi\u00f3n 22.10.0 a la 22.10.28, de la versi\u00f3n 23.04.0 a la 23.04.25, de la versi\u00f3n 23.10.0 a la 23.10.20, de la versi\u00f3n 24.04.0 a la 24.04.10, de la versi\u00f3n 24.10.0 a la 24.10.4."
} }
], ],
"metrics": { "metrics": {

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-46420",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-04-24T13:15:45.553",
"lastModified": "2025-04-24T13:15:45.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in libsoup. It is vulnerable to memory leaks in the soup_header_parse_quality_list() function when parsing a quality list that contains elements with all zeroes."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-46420",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2361963",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-46421",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-04-24T13:15:45.703",
"lastModified": "2025-04-24T13:15:45.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-497"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-46421",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2361962",
"source": "secalert@redhat.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-04-24T12:00:20.281069+00:00 2025-04-24T14:00:20.179751+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-04-24T10:15:17.093000+00:00 2025-04-24T13:56:26.960000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,23 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
291249 291252
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `4` Recently added CVEs: `3`
- [CVE-2021-47662](CVE-2021/CVE-2021-476xx/CVE-2021-47662.json) (`2025-04-24T10:15:14.970`) - [CVE-2025-27820](CVE-2025/CVE-2025-278xx/CVE-2025-27820.json) (`2025-04-24T12:15:16.723`)
- [CVE-2021-47663](CVE-2021/CVE-2021-476xx/CVE-2021-47663.json) (`2025-04-24T10:15:16.703`) - [CVE-2025-46420](CVE-2025/CVE-2025-464xx/CVE-2025-46420.json) (`2025-04-24T13:15:45.553`)
- [CVE-2021-47664](CVE-2021/CVE-2021-476xx/CVE-2021-47664.json) (`2025-04-24T10:15:16.880`) - [CVE-2025-46421](CVE-2025/CVE-2025-464xx/CVE-2025-46421.json) (`2025-04-24T13:15:45.703`)
- [CVE-2025-3872](CVE-2025/CVE-2025-38xx/CVE-2025-3872.json) (`2025-04-24T10:15:17.093`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `17`
- [CVE-2020-11916](CVE-2020/CVE-2020-119xx/CVE-2020-11916.json) (`2025-04-24T13:41:33.143`)
- [CVE-2020-11917](CVE-2020/CVE-2020-119xx/CVE-2020-11917.json) (`2025-04-24T13:42:09.087`)
- [CVE-2020-11918](CVE-2020/CVE-2020-119xx/CVE-2020-11918.json) (`2025-04-24T13:42:14.090`)
- [CVE-2020-11919](CVE-2020/CVE-2020-119xx/CVE-2020-11919.json) (`2025-04-24T13:42:19.443`)
- [CVE-2022-36028](CVE-2022/CVE-2022-360xx/CVE-2022-36028.json) (`2025-04-24T13:45:40.137`)
- [CVE-2022-36029](CVE-2022/CVE-2022-360xx/CVE-2022-36029.json) (`2025-04-24T13:46:39.490`)
- [CVE-2024-11831](CVE-2024/CVE-2024-118xx/CVE-2024-11831.json) (`2025-04-24T13:15:44.573`)
- [CVE-2024-55238](CVE-2024/CVE-2024-552xx/CVE-2024-55238.json) (`2025-04-24T12:47:25.673`)
- [CVE-2025-29648](CVE-2025/CVE-2025-296xx/CVE-2025-29648.json) (`2025-04-24T12:52:00.727`)
- [CVE-2025-29649](CVE-2025/CVE-2025-296xx/CVE-2025-29649.json) (`2025-04-24T12:51:37.493`)
- [CVE-2025-29650](CVE-2025/CVE-2025-296xx/CVE-2025-29650.json) (`2025-04-24T13:44:23.137`)
- [CVE-2025-29652](CVE-2025/CVE-2025-296xx/CVE-2025-29652.json) (`2025-04-24T13:56:26.960`)
- [CVE-2025-29653](CVE-2025/CVE-2025-296xx/CVE-2025-29653.json) (`2025-04-24T13:54:34.550`)
- [CVE-2025-3684](CVE-2025/CVE-2025-36xx/CVE-2025-3684.json) (`2025-04-24T12:58:54.257`)
- [CVE-2025-3690](CVE-2025/CVE-2025-36xx/CVE-2025-3690.json) (`2025-04-24T13:09:56.753`)
- [CVE-2025-3691](CVE-2025/CVE-2025-36xx/CVE-2025-3691.json) (`2025-04-24T13:43:43.503`)
- [CVE-2025-3872](CVE-2025/CVE-2025-38xx/CVE-2025-3872.json) (`2025-04-24T10:15:17.093`)
## Download and Usage ## Download and Usage

View File

@ -147113,10 +147113,10 @@ CVE-2020-11912,0,0,b0f48ca40d08603797d455c338262182d552e02d60831639208fa5187a0c5
CVE-2020-11913,0,0,ace353de064497dd798e35f344b08cb9236f6b60550c136a8f69aff0c455fd77,2024-11-21T04:58:53.403000 CVE-2020-11913,0,0,ace353de064497dd798e35f344b08cb9236f6b60550c136a8f69aff0c455fd77,2024-11-21T04:58:53.403000
CVE-2020-11914,0,0,7a5e64cec9e1b04c9fd221b46b265a58ec94401785ef944caa901fe079c4ff18,2024-11-21T04:58:53.547000 CVE-2020-11914,0,0,7a5e64cec9e1b04c9fd221b46b265a58ec94401785ef944caa901fe079c4ff18,2024-11-21T04:58:53.547000
CVE-2020-11915,0,0,56c89180a044ce68c88f8c628b97ff244747571358c62d613e63cd980b2bf93d,2024-11-21T04:58:53.687000 CVE-2020-11915,0,0,56c89180a044ce68c88f8c628b97ff244747571358c62d613e63cd980b2bf93d,2024-11-21T04:58:53.687000
CVE-2020-11916,0,0,4f42780ff06fff9cf67896b7093e6f09793ee81c0b88821dcba6bda5cb2a73f2,2024-11-08T19:01:03.880000 CVE-2020-11916,0,1,b030395624f14d3ddfb34e8361472323e30df1a28f655a305ea4e251b2e59c46,2025-04-24T13:41:33.143000
CVE-2020-11917,0,0,ee12f1acdefa8f4af63d58410aba155496bca27422ee0e63577898f95f124d96,2024-11-08T19:01:03.880000 CVE-2020-11917,0,1,361631f362d68b1327f6ae97965cb78c31dc980e19423c04bf2133098762a588,2025-04-24T13:42:09.087000
CVE-2020-11918,0,0,c99ec246996e38a1ab4b2ae5244e14dcf69cb1fa163aa6571e766618c044d50d,2024-11-08T19:01:03.880000 CVE-2020-11918,0,1,ad61eeacd0c09e2e34ff7eb9fd5948a77d2c6632c01c9683c0aacb298d0c0a33,2025-04-24T13:42:14.090000
CVE-2020-11919,0,0,b94797525e9d54893ab1f4a7ee6c2a4eb2d714b79e56044e250ed8d8abe4cb53,2024-11-08T19:01:03.880000 CVE-2020-11919,0,1,3e028743febf7e998688c904c500f4cadacf5153d3e236d340bfc0008532a36b,2025-04-24T13:42:19.443000
CVE-2020-1192,0,0,24850cbc9d9cf9d1258047a4152f3fa8f0b8e40d19399e611eacb0158a5ca382,2024-11-21T05:09:56.730000 CVE-2020-1192,0,0,24850cbc9d9cf9d1258047a4152f3fa8f0b8e40d19399e611eacb0158a5ca382,2024-11-21T05:09:56.730000
CVE-2020-11920,0,0,41a7c64babbfbc6eb1b671f40089d2f0fdd449cd6b55bdbf3f79c9e369f9da41,2024-11-21T04:58:54.423000 CVE-2020-11920,0,0,41a7c64babbfbc6eb1b671f40089d2f0fdd449cd6b55bdbf3f79c9e369f9da41,2024-11-21T04:58:54.423000
CVE-2020-11921,0,0,315b667529a9ff7f4c7afe17d5124be593ef5e060992adbd5bb6c18de7ee327d,2024-11-08T19:01:03.880000 CVE-2020-11921,0,0,315b667529a9ff7f4c7afe17d5124be593ef5e060992adbd5bb6c18de7ee327d,2024-11-08T19:01:03.880000
@ -187963,9 +187963,9 @@ CVE-2021-47657,0,0,e7b773ff5c57ebd68c588a4b48c0e5eb233dc82beaa2f144ae46a979b8e0e
CVE-2021-47658,0,0,40cee62fe59cbcad55bfa583a2a783321bfe2aa50e6ba27a98aa5e5272260471,2025-02-26T06:37:07.557000 CVE-2021-47658,0,0,40cee62fe59cbcad55bfa583a2a783321bfe2aa50e6ba27a98aa5e5272260471,2025-02-26T06:37:07.557000
CVE-2021-47659,0,0,5aa899f756953f035092f7b1fe4153c0d3304e0ff38c8b4cdec0e8f319d19fd3,2025-02-26T06:37:07.640000 CVE-2021-47659,0,0,5aa899f756953f035092f7b1fe4153c0d3304e0ff38c8b4cdec0e8f319d19fd3,2025-02-26T06:37:07.640000
CVE-2021-47660,0,0,e59321e11599e4443f5093be84e3c1ac718be1209a0746e320294c82fef27666,2025-03-18T18:50:52.930000 CVE-2021-47660,0,0,e59321e11599e4443f5093be84e3c1ac718be1209a0746e320294c82fef27666,2025-03-18T18:50:52.930000
CVE-2021-47662,1,1,6607cbecdb82c859c05e2f99b97ea4c5216b24fda3312a61cc2d584fc4d34da5,2025-04-24T10:15:14.970000 CVE-2021-47662,0,0,6607cbecdb82c859c05e2f99b97ea4c5216b24fda3312a61cc2d584fc4d34da5,2025-04-24T10:15:14.970000
CVE-2021-47663,1,1,aca5b67e28094eed47edd40345dd79519d4d5087f1a80224428a8dc51ef34658,2025-04-24T10:15:16.703000 CVE-2021-47663,0,0,aca5b67e28094eed47edd40345dd79519d4d5087f1a80224428a8dc51ef34658,2025-04-24T10:15:16.703000
CVE-2021-47664,1,1,58976b7d3e949f7d6a3064812663d1256e0f237e9fb05b2864d06a5abd9d49f4,2025-04-24T10:15:16.880000 CVE-2021-47664,0,0,58976b7d3e949f7d6a3064812663d1256e0f237e9fb05b2864d06a5abd9d49f4,2025-04-24T10:15:16.880000
CVE-2021-47667,0,0,ab7ee7ce106aad31615be0e1d295240a98943ba26d00c5d1a1ab07e7a99ad66f,2025-04-07T17:15:32.873000 CVE-2021-47667,0,0,ab7ee7ce106aad31615be0e1d295240a98943ba26d00c5d1a1ab07e7a99ad66f,2025-04-07T17:15:32.873000
CVE-2021-47668,0,0,71ad95bb6049d6590adac2b19370d9b39463f424f971fb5ac24ddfb8fceae0e0,2025-04-21T18:41:27.987000 CVE-2021-47668,0,0,71ad95bb6049d6590adac2b19370d9b39463f424f971fb5ac24ddfb8fceae0e0,2025-04-21T18:41:27.987000
CVE-2021-47669,0,0,ae001276e0c286503806b09a6f182e58c1c94e4f23d321d103a9b4b9b9702013,2025-04-21T18:41:22.637000 CVE-2021-47669,0,0,ae001276e0c286503806b09a6f182e58c1c94e4f23d321d103a9b4b9b9702013,2025-04-21T18:41:22.637000
@ -203524,8 +203524,8 @@ CVE-2022-36024,0,0,559e95737894fc2be05eda2e8dbedec0be48f220ac4f29dba3da071b69850
CVE-2022-36025,0,0,8d45ae9380bf17ec6cffb64e2901ea7dbbf609b9f0e9e2e43077df6608fb7d48,2024-11-21T07:12:12.667000 CVE-2022-36025,0,0,8d45ae9380bf17ec6cffb64e2901ea7dbbf609b9f0e9e2e43077df6608fb7d48,2024-11-21T07:12:12.667000
CVE-2022-36026,0,0,b49cb2ae6ea68c19a74d02ec0231fc1a6a51ae0a7062f7bc022569fedd857943,2024-11-21T07:12:12.807000 CVE-2022-36026,0,0,b49cb2ae6ea68c19a74d02ec0231fc1a6a51ae0a7062f7bc022569fedd857943,2024-11-21T07:12:12.807000
CVE-2022-36027,0,0,147240af96ba4b538614d4af110788a1f3d45664b7cac084f13aaf55f647b0b7,2024-11-21T07:12:12.940000 CVE-2022-36027,0,0,147240af96ba4b538614d4af110788a1f3d45664b7cac084f13aaf55f647b0b7,2024-11-21T07:12:12.940000
CVE-2022-36028,0,0,c398fb1f05c7ef38ef9293a09411ad7392f5172a3417e8be2d09ac6af62099d6,2024-11-21T07:12:13.090000 CVE-2022-36028,0,1,7baafacb9db5ae54518d94c9e430288a17cdd0a531778b16f6e490e991cc5b3e,2025-04-24T13:45:40.137000
CVE-2022-36029,0,0,8750c399778cf9c676b30b6e40523cc6d9cd922668fefa64cfe7953d24613704,2024-11-21T07:12:13.233000 CVE-2022-36029,0,1,c5a08c2b50f7bd1ca424bc2cee6b87e51f84b3ce191aa201be8f615044134d26,2025-04-24T13:46:39.490000
CVE-2022-3603,0,0,e8d3b3740b03777766c38d84db3123c2e786e637d418876aa7ccee9742b6157a,2024-11-21T07:19:51.757000 CVE-2022-3603,0,0,e8d3b3740b03777766c38d84db3123c2e786e637d418876aa7ccee9742b6157a,2024-11-21T07:19:51.757000
CVE-2022-36030,0,0,d0f9fbef19fa480f9b41a0038c713f08fd1903f67c79de8ffc9f466aeff3ed7e,2024-11-21T07:12:13.360000 CVE-2022-36030,0,0,d0f9fbef19fa480f9b41a0038c713f08fd1903f67c79de8ffc9f466aeff3ed7e,2024-11-21T07:12:13.360000
CVE-2022-36031,0,0,1031d7dfde9fba4727316736cd415009712808e033f20c483c44fac2879e4649,2024-11-21T07:12:13.493000 CVE-2022-36031,0,0,1031d7dfde9fba4727316736cd415009712808e033f20c483c44fac2879e4649,2024-11-21T07:12:13.493000
@ -246365,7 +246365,7 @@ CVE-2024-11828,0,0,2182fcc94d5c2924b387611eabcc64629aff0d6ea201e85bc92b19a7228cc
CVE-2024-11829,0,0,69c985051f8ba94b9fa4dc84b0c753dff2563e51518549f413112c5cfd5d6732,2025-02-04T17:49:14.273000 CVE-2024-11829,0,0,69c985051f8ba94b9fa4dc84b0c753dff2563e51518549f413112c5cfd5d6732,2025-02-04T17:49:14.273000
CVE-2024-1183,0,0,65ecfa5c3d2b221c19281f6b798c6cc7087d171223e10f3dd191314d09620aec,2024-11-21T08:49:58.950000 CVE-2024-1183,0,0,65ecfa5c3d2b221c19281f6b798c6cc7087d171223e10f3dd191314d09620aec,2024-11-21T08:49:58.950000
CVE-2024-11830,0,0,2b9bcbcc6b8510fbe3715609ebd917cba06af0eebf5118baa1afa85039e0b1f0,2025-01-08T11:15:06.443000 CVE-2024-11830,0,0,2b9bcbcc6b8510fbe3715609ebd917cba06af0eebf5118baa1afa85039e0b1f0,2025-01-08T11:15:06.443000
CVE-2024-11831,0,0,48f26470f9c575eecf09471bbdfa0132338ce65c6c5f75d49e2a88ed97040133,2025-02-13T19:15:13.713000 CVE-2024-11831,0,1,e678e5712c3749fb154de5536c6402118c4394078f720b092c224e2e7f0b11d1,2025-04-24T13:15:44.573000
CVE-2024-11832,0,0,7a6414b8a97e02ea73c05598b642d3e1c0cc9c0557b16b568dca85c729ab2498,2025-01-07T18:12:54.040000 CVE-2024-11832,0,0,7a6414b8a97e02ea73c05598b642d3e1c0cc9c0557b16b568dca85c729ab2498,2025-01-07T18:12:54.040000
CVE-2024-11833,0,0,508bcce82814de0a5ab20d2d4557e0c0ce4c9dd038000fc513cde0b65b845abf,2024-12-13T06:15:25.233000 CVE-2024-11833,0,0,508bcce82814de0a5ab20d2d4557e0c0ce4c9dd038000fc513cde0b65b845abf,2024-12-13T06:15:25.233000
CVE-2024-11834,0,0,3e4bbf7d975d33cb98deb34c5acbe1f3c43954f92e3b7f44576d4d1a8fcd397a,2024-12-16T18:15:08.243000 CVE-2024-11834,0,0,3e4bbf7d975d33cb98deb34c5acbe1f3c43954f92e3b7f44576d4d1a8fcd397a,2024-12-16T18:15:08.243000
@ -275759,7 +275759,7 @@ CVE-2024-55228,0,0,eecb7530d030d8ee385f7f9d91b0f88ebc1f92238de3682fd2d3a79e15c48
CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000 CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000
CVE-2024-55231,0,0,0f2879a830bf65ca740c9104d0f5b7cf06ebbf48cb12754d4e2775c0b62dda8b,2025-03-27T16:30:14.617000 CVE-2024-55231,0,0,0f2879a830bf65ca740c9104d0f5b7cf06ebbf48cb12754d4e2775c0b62dda8b,2025-03-27T16:30:14.617000
CVE-2024-55232,0,0,0ca7947c8f20ab530f6ef9f382dd1a93ea84b85960cc7132226746574ebf3ddb,2025-03-28T16:21:59.560000 CVE-2024-55232,0,0,0ca7947c8f20ab530f6ef9f382dd1a93ea84b85960cc7132226746574ebf3ddb,2025-03-28T16:21:59.560000
CVE-2024-55238,0,0,4773ce55cfc94bd6dff3b47696d63fefe6be055739a86bcbdeffebc8af1284c4,2025-04-17T20:21:48.243000 CVE-2024-55238,0,1,e0c3f3f0edd86cedb7caf4b9cc2895dcae6c0756149f4b2b99bfc5803b2e5317,2025-04-24T12:47:25.673000
CVE-2024-55239,0,0,cbfed4e5dffe1c92f805fb83f4f8a51e197e12f93a7416bc9c5ac9864cc8d243,2024-12-25T03:15:19.813000 CVE-2024-55239,0,0,cbfed4e5dffe1c92f805fb83f4f8a51e197e12f93a7416bc9c5ac9864cc8d243,2024-12-25T03:15:19.813000
CVE-2024-5524,0,0,96c1a4bf81cf964718431dd9c92394b3c99d70800d36b6797c2485b5f853cce6,2024-11-21T09:47:52.060000 CVE-2024-5524,0,0,96c1a4bf81cf964718431dd9c92394b3c99d70800d36b6797c2485b5f853cce6,2024-11-21T09:47:52.060000
CVE-2024-55241,0,0,187ea8b2ce4e3d344bad396027a912baec6f3e2b9e5b42839c08917307b0c3f3,2025-02-11T15:15:18.593000 CVE-2024-55241,0,0,187ea8b2ce4e3d344bad396027a912baec6f3e2b9e5b42839c08917307b0c3f3,2025-02-11T15:15:18.593000
@ -287987,6 +287987,7 @@ CVE-2025-27812,0,0,490eea28d11bf4042efca85e606a63ea8705fbb9895bc0e4fb69498d1dff9
CVE-2025-27813,0,0,810e9a9403b82aebefac61476a9e0011d443081011347b72d18ecc06e7e5914d,2025-04-11T15:39:52.920000 CVE-2025-27813,0,0,810e9a9403b82aebefac61476a9e0011d443081011347b72d18ecc06e7e5914d,2025-04-11T15:39:52.920000
CVE-2025-27816,0,0,9ab27d50becb6f1925043133c65bc558001d86f2d9081231a272e11d17cb2516,2025-03-07T20:15:38.900000 CVE-2025-27816,0,0,9ab27d50becb6f1925043133c65bc558001d86f2d9081231a272e11d17cb2516,2025-03-07T20:15:38.900000
CVE-2025-2782,0,0,f7b2edc498b938674db351470dcc82477b82d7a96a3f89a710e19cd683cf7f7a,2025-04-01T20:26:30.593000 CVE-2025-2782,0,0,f7b2edc498b938674db351470dcc82477b82d7a96a3f89a710e19cd683cf7f7a,2025-04-01T20:26:30.593000
CVE-2025-27820,1,1,e55b60f391dfca72c9f951e6fec21f4ea7322509a4e329e52c966234dbcec108,2025-04-24T12:15:16.723000
CVE-2025-27822,0,0,8db44093401926706a840ce0e19328855573d2443e1e01b57e17b296b11ec387,2025-03-07T22:15:37.927000 CVE-2025-27822,0,0,8db44093401926706a840ce0e19328855573d2443e1e01b57e17b296b11ec387,2025-03-07T22:15:37.927000
CVE-2025-27823,0,0,ae3d83d8b696c6651ddc09be1ef36d15fa5d89a5eeb42b0a2ba26ad0db25fbf7,2025-03-07T22:15:38.073000 CVE-2025-27823,0,0,ae3d83d8b696c6651ddc09be1ef36d15fa5d89a5eeb42b0a2ba26ad0db25fbf7,2025-03-07T22:15:38.073000
CVE-2025-27824,0,0,2d002361cc885b5990daf4c3973db9ef130ec1a7bfde36407db01c4a68cfa628,2025-03-07T22:15:38.220000 CVE-2025-27824,0,0,2d002361cc885b5990daf4c3973db9ef130ec1a7bfde36407db01c4a68cfa628,2025-03-07T22:15:38.220000
@ -288460,13 +288461,13 @@ CVE-2025-2964,0,0,ec69ae3f38e343756ba814c2e5955dca4ab2cdb43321644a6a3ca4d2fda05b
CVE-2025-29640,0,0,10d69d5153affdfdd1cfbbf32b1c82cf02889c3684c0ecfe28cc371bbe51cc15,2025-04-01T20:23:29.113000 CVE-2025-29640,0,0,10d69d5153affdfdd1cfbbf32b1c82cf02889c3684c0ecfe28cc371bbe51cc15,2025-04-01T20:23:29.113000
CVE-2025-29641,0,0,07728e025c7edec0a6c57cfca48077e7931db6a66e70d6357266b91cead71f8a,2025-04-01T20:23:16.657000 CVE-2025-29641,0,0,07728e025c7edec0a6c57cfca48077e7931db6a66e70d6357266b91cead71f8a,2025-04-01T20:23:16.657000
CVE-2025-29647,0,0,b2c68859973ff17d99e38be6964fb50b00d742d76463efee1e3f756976e68d06,2025-04-08T20:15:30.700000 CVE-2025-29647,0,0,b2c68859973ff17d99e38be6964fb50b00d742d76463efee1e3f756976e68d06,2025-04-08T20:15:30.700000
CVE-2025-29648,0,0,4d6a0b2650b3e60b4122956b5d0278b52aa1371c983515b868eb2bfba0f1bcc5,2025-04-24T00:15:16.607000 CVE-2025-29648,0,1,a7eaa771354a705b285f1c3684a3f953432537672eb28b52e912d0d68517ff15,2025-04-24T12:52:00.727000
CVE-2025-29649,0,0,6fdead998049c83b64b356fa12f6ad7d8162b32e1ac7c6bb48f9d034a0b9c199,2025-04-24T00:15:16.830000 CVE-2025-29649,0,1,d9f19c85152376fc41b6043f80b049c59ec4caf7c602a3488f5c6538fbc911b7,2025-04-24T12:51:37.493000
CVE-2025-2965,0,0,b1d83303c83fa5c453f89d281c2631e556dad3281735af3c32f95354d255295b,2025-04-04T01:15:39.727000 CVE-2025-2965,0,0,b1d83303c83fa5c453f89d281c2631e556dad3281735af3c32f95354d255295b,2025-04-04T01:15:39.727000
CVE-2025-29650,0,0,37449704897b829d15c6b7332c946ab0d77b8977c9ae15473bdadf0ad8edf7e6,2025-04-24T00:15:17.053000 CVE-2025-29650,0,1,5f46dc6c7a387a28666637bcf7367f72ffe82767fe1270be661aad1f55cd5e69,2025-04-24T13:44:23.137000
CVE-2025-29651,0,0,4fed918f1dc4181d87373d99a25a3ddf080fde12a9843fce024011cfff63a2af,2025-04-24T00:15:17.290000 CVE-2025-29651,0,0,4fed918f1dc4181d87373d99a25a3ddf080fde12a9843fce024011cfff63a2af,2025-04-24T00:15:17.290000
CVE-2025-29652,0,0,8f1c844f17e169b7764fa5bd3d756a072d344a03488bb1a4ef163bd99e63cc10,2025-04-24T00:15:17.493000 CVE-2025-29652,0,1,725117646d812bd9ba15bdbfca81a3949128b5f16ff0950b6d0bfd05d931b133,2025-04-24T13:56:26.960000
CVE-2025-29653,0,0,ee1b929848835fd030ae6dec207f597e328fab160a2c4345930cd1a6f93abceb,2025-04-17T20:21:48.243000 CVE-2025-29653,0,1,56b2d2a07b99b4d66ca95d61135d9f92c834689e3e3ed529503dfff30cff5718,2025-04-24T13:54:34.550000
CVE-2025-29659,0,0,f9e8d6621163c83dcf8fec3e0aa9d79236f03dcdde01fbd274cbdbc678026bf1,2025-04-23T14:08:13.383000 CVE-2025-29659,0,0,f9e8d6621163c83dcf8fec3e0aa9d79236f03dcdde01fbd274cbdbc678026bf1,2025-04-23T14:08:13.383000
CVE-2025-2966,0,0,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000 CVE-2025-2966,0,0,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000
CVE-2025-29660,0,0,7872b4589e7a281e05a7df2d5b23f35c28a06e32d443bbdd2d26b4ef96f8e1b9,2025-04-23T14:08:13.383000 CVE-2025-29660,0,0,7872b4589e7a281e05a7df2d5b23f35c28a06e32d443bbdd2d26b4ef96f8e1b9,2025-04-23T14:08:13.383000
@ -290882,14 +290883,14 @@ CVE-2025-3680,0,0,b8c6a863389406e8183a02999b9d29d75b1a28342d773f1463f15684386612
CVE-2025-3681,0,0,01d5a99e67bfc7473aff9d0d8884b154699a2637c7a1d4570cdfba6f4cc738ff,2025-04-16T20:15:19.460000 CVE-2025-3681,0,0,01d5a99e67bfc7473aff9d0d8884b154699a2637c7a1d4570cdfba6f4cc738ff,2025-04-16T20:15:19.460000
CVE-2025-3682,0,0,1416d86d6dc7dcfa4203a8d32a4393ad5dbc6db386b7cb7e99578724e2ab02ed,2025-04-16T20:15:19.570000 CVE-2025-3682,0,0,1416d86d6dc7dcfa4203a8d32a4393ad5dbc6db386b7cb7e99578724e2ab02ed,2025-04-16T20:15:19.570000
CVE-2025-3683,0,0,8fdb07840cb13593760dca1b2eec36a3c971046a9417b3eebe254aa619625493,2025-04-16T20:15:19.670000 CVE-2025-3683,0,0,8fdb07840cb13593760dca1b2eec36a3c971046a9417b3eebe254aa619625493,2025-04-16T20:15:19.670000
CVE-2025-3684,0,0,1d6bb00b8818f89e8f80712c5d942163972b497cc4dec703f2e346b0b6e909b1,2025-04-16T19:15:55 CVE-2025-3684,0,1,7836d98df2297c3ae4c00520b5763d5507d37fc0ab3fa0fd3ea28ab66ce84d57,2025-04-24T12:58:54.257000
CVE-2025-3685,0,0,a038f7016d9d7aee9eb0536d9d006e5189794d512e4af0149f231284d7782e60,2025-04-16T13:25:37.340000 CVE-2025-3685,0,0,a038f7016d9d7aee9eb0536d9d006e5189794d512e4af0149f231284d7782e60,2025-04-16T13:25:37.340000
CVE-2025-3686,0,0,7959444999d939397b75d41bf9d8d3af522c96b7a107cfe0f6ed3f78546dfcf6,2025-04-16T13:25:37.340000 CVE-2025-3686,0,0,7959444999d939397b75d41bf9d8d3af522c96b7a107cfe0f6ed3f78546dfcf6,2025-04-16T13:25:37.340000
CVE-2025-3687,0,0,bfcd1105c45ffd01c638f7a0d711bfaafb14b738b574d0e9dc0ee7e35eda29a3,2025-04-16T13:25:37.340000 CVE-2025-3687,0,0,bfcd1105c45ffd01c638f7a0d711bfaafb14b738b574d0e9dc0ee7e35eda29a3,2025-04-16T13:25:37.340000
CVE-2025-3688,0,0,65ef6b8af8a2529dc40f35e01851ec1528f02044364d98884fde7da07256ab2f,2025-04-16T13:25:37.340000 CVE-2025-3688,0,0,65ef6b8af8a2529dc40f35e01851ec1528f02044364d98884fde7da07256ab2f,2025-04-16T13:25:37.340000
CVE-2025-3689,0,0,d998f00726e4bf780ff6ad1b92e16dbb361d85f987bc23a29c424387df62d3b8,2025-04-16T13:25:37.340000 CVE-2025-3689,0,0,d998f00726e4bf780ff6ad1b92e16dbb361d85f987bc23a29c424387df62d3b8,2025-04-16T13:25:37.340000
CVE-2025-3690,0,0,a43473970e5470785bb5020fc7a37d4dabec04d6e7ead5bd0b106a109b02df92,2025-04-16T14:15:28.337000 CVE-2025-3690,0,1,678b4d31fb0614387996de83d07d2450f9bdeabf336ae3aeb82fc680dd708be9,2025-04-24T13:09:56.753000
CVE-2025-3691,0,0,db844a4a32c1dbcb0fb5edcc2966d5a5706a410e4dae464ccc0226e9a99fb2ac,2025-04-16T14:15:28.457000 CVE-2025-3691,0,1,c845fe8f3e06cf48fd0c6fdf8c34e373c785cf4b7855eec8d2b32fc7fff72fdd,2025-04-24T13:43:43.503000
CVE-2025-3692,0,0,d418fdc3283145080b1b2435bd7d16fa854c648ce31b11e5b38434039f0ff5ca,2025-04-17T20:22:16.240000 CVE-2025-3692,0,0,d418fdc3283145080b1b2435bd7d16fa854c648ce31b11e5b38434039f0ff5ca,2025-04-17T20:22:16.240000
CVE-2025-3693,0,0,1ed6a110332de7d87c6b0f3dcfc87fecd838f49308b2109bb737dc9c4d994988,2025-04-17T20:22:16.240000 CVE-2025-3693,0,0,1ed6a110332de7d87c6b0f3dcfc87fecd838f49308b2109bb737dc9c4d994988,2025-04-17T20:22:16.240000
CVE-2025-3694,0,0,1269c09fef48fe02471385032c7206f0a0dd6c5c3c66dd5e4ca39fb34a019723,2025-04-17T20:22:16.240000 CVE-2025-3694,0,0,1269c09fef48fe02471385032c7206f0a0dd6c5c3c66dd5e4ca39fb34a019723,2025-04-17T20:22:16.240000
@ -290990,7 +290991,7 @@ CVE-2025-3856,0,0,76c913e524d5f77983a8dccaf7b11f654e372c9d313b7977efb52d37f25fce
CVE-2025-3857,0,0,fdc00eaf569a8a97d8e857e27cf6b16e8647aa3722913fb3d0d4f9a9d2c1d8ed,2025-04-23T14:08:13.383000 CVE-2025-3857,0,0,fdc00eaf569a8a97d8e857e27cf6b16e8647aa3722913fb3d0d4f9a9d2c1d8ed,2025-04-23T14:08:13.383000
CVE-2025-38575,0,0,37c6694d45ef25fd4c01ad5e4e3652528a6a4314cc0f5e821de7a1e34897732a,2025-04-21T14:23:45.950000 CVE-2025-38575,0,0,37c6694d45ef25fd4c01ad5e4e3652528a6a4314cc0f5e821de7a1e34897732a,2025-04-21T14:23:45.950000
CVE-2025-38637,0,0,3408ca2942640f2c4ef381f50af306ea1306e1fe1017c8487acb41cc78bd4e79,2025-04-21T14:23:45.950000 CVE-2025-38637,0,0,3408ca2942640f2c4ef381f50af306ea1306e1fe1017c8487acb41cc78bd4e79,2025-04-21T14:23:45.950000
CVE-2025-3872,1,1,1df7a0fff14c069cd016a4475316b81e0f6387c06deafc641b0d5be93af22e7d,2025-04-24T10:15:17.093000 CVE-2025-3872,0,1,5cb765ed7fef3b9f0d12bd3c4ff8f72750101d19c091b2b604bfbe228a3a9ed1,2025-04-24T10:15:17.093000
CVE-2025-3900,0,0,eec55b9f35dd5a9d95b8f99ee98eb86c99b6f52b024fc66284593a5e225d395e,2025-04-23T19:16:25.423000 CVE-2025-3900,0,0,eec55b9f35dd5a9d95b8f99ee98eb86c99b6f52b024fc66284593a5e225d395e,2025-04-23T19:16:25.423000
CVE-2025-3901,0,0,b90cd5a2e3fca1a445ce3d576dc238240ffa769b1c9f5dc33a753d8742417be6,2025-04-23T19:16:25.567000 CVE-2025-3901,0,0,b90cd5a2e3fca1a445ce3d576dc238240ffa769b1c9f5dc33a753d8742417be6,2025-04-23T19:16:25.567000
CVE-2025-3902,0,0,676970333097082de40f6f58233872070947df9bef43bb3df9e412f6058936f6,2025-04-23T19:16:25.700000 CVE-2025-3902,0,0,676970333097082de40f6f58233872070947df9bef43bb3df9e412f6058936f6,2025-04-23T19:16:25.700000
@ -291248,3 +291249,5 @@ CVE-2025-46399,0,0,a209a805fb6cd862fdb7e2ce54b04ec04d6c6df92a812b80e46ba0e6d84e3
CVE-2025-46400,0,0,0bd4984a259587dc794a77b573a4bb65a3304d981c8883780eeae3e8b529f35b,2025-04-23T21:15:17.250000 CVE-2025-46400,0,0,0bd4984a259587dc794a77b573a4bb65a3304d981c8883780eeae3e8b529f35b,2025-04-23T21:15:17.250000
CVE-2025-46417,0,0,9375e0e8b5e39df45752186e0bd0b48ae190f0d73d01acaf3d3949f9ef0123f2,2025-04-24T01:15:49.983000 CVE-2025-46417,0,0,9375e0e8b5e39df45752186e0bd0b48ae190f0d73d01acaf3d3949f9ef0123f2,2025-04-24T01:15:49.983000
CVE-2025-46419,0,0,1a34f5342e64579d123a08cc24aef78b0d6763ffebef4f99c528ca3f0aa12df1,2025-04-24T01:15:51.360000 CVE-2025-46419,0,0,1a34f5342e64579d123a08cc24aef78b0d6763ffebef4f99c528ca3f0aa12df1,2025-04-24T01:15:51.360000
CVE-2025-46420,1,1,abc71b52b849f726ff8be64ef3abd516b554526457a7cbece372d17d3340fe09,2025-04-24T13:15:45.553000
CVE-2025-46421,1,1,5cbb299ad045c28edb58aa77219a50cf2d13612c6ce8ead13af817b802d58002,2025-04-24T13:15:45.703000

Can't render this file because it is too large.