Auto-Update: 2025-04-15T12:00:23.122165+00:00

This commit is contained in:
cad-safe-bot 2025-04-15 12:04:14 +00:00
parent eb9da2406f
commit 08b7ca5f20
10 changed files with 281 additions and 27 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-12094",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-12-05T13:15:05.923",
"lastModified": "2024-12-05T13:15:05.923",
"lastModified": "2025-04-15T10:15:13.780",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This vulnerability exists in the Tinxy mobile app due to storage of logged-in user information in plaintext on the device database. An attacker with physical access to the rooted device could exploit this vulnerability by accessing its database leading to unauthorized access of user information such as username, email address and mobile number."
"value": "This vulnerability exists in the Tinxy mobile app due to storage of logged-in user information in plaintext on the device database. An attacker with physical access to the rooted device could exploit this vulnerability by accessing its database leading to unauthorized access of user information such as username, email address and mobile number.\nNote:\nTo exploit this vulnerability, the device must be rooted/jailbroken."
},
{
"lang": "es",

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2025-1688",
"sourceIdentifier": "cf45122d-9d50-442a-9b23-e05cde9943d8",
"published": "2025-04-15T11:15:44.140",
"lastModified": "2025-04-15T11:15:44.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Milestone Systems has discovered a\nsecurity vulnerability in Milestone XProtect installer that resets system\nconfiguration password after the upgrading from older versions using specific\ninstallers.\n\n\n\nThe system configuration\npassword is an additional, optional protection that is enabled on the\nManagement Server.\n\n\nTo mitigate the issue, we highly recommend updating system configuration password via GUI with a standard procedure.\n\n\n\nAny system upgraded with\n2024 R1 or 2024 R2 release installer is vulnerable to this issue.\n\n\n\nSystems upgraded from 2023\nR3 or older with version 2025 R1 and newer are not affected."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cf45122d-9d50-442a-9b23-e05cde9943d8",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cf45122d-9d50-442a-9b23-e05cde9943d8",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cf45122d-9d50-442a-9b23-e05cde9943d8",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-311"
}
]
}
],
"references": [
{
"url": "https://supportcommunity.milestonesys.com/KBRedir?art=000069835&lang=en_US",
"source": "cf45122d-9d50-442a-9b23-e05cde9943d8"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2025-2083",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-04-15T10:15:14.680",
"lastModified": "2025-04-15T10:15:14.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Logo Carousel Gutenberg Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018sliderId\u2019 parameter in all versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Logo Carousel Gutenberg Block para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro \u00absliderId\u00bb en todas las versiones hasta la 2.1.6 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/awesome-logo-carousel-block/tags/2.1.3/inc/classes/style.php#L86",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3271660/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/awesome-logo-carousel-block/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/604123f4-9247-489a-8fc8-478bfc697c7f?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-22371",
"sourceIdentifier": "csirt@divd.nl",
"published": "2025-04-14T16:15:21.450",
"lastModified": "2025-04-14T16:15:21.450",
"lastModified": "2025-04-15T11:15:45.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SicommNet BASEC (SaaS Service) login page allows an unauthenticated remote attacker to Bypass Authentication and execute arbitrary SQL commands. This issue at least affects BASEC for the date of 14 Dec 2021 onwards. It is very likely that this vulnerability has been present in the solution before that.\n\nAs of the date of this CVE record, there has been no patch"
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en SicommNet BASEC (SaaS Service) login page, permite a un atacante remoto no autenticado omitir la autenticaci\u00f3n y ejecutar comandos SQL arbitrarios. Este problema afecta a BASEC al menos desde el 14 de diciembre de 2021. Es muy probable que esta vulnerabilidad ya estuviera presente en la soluci\u00f3n. A la fecha de este registro CVE, no se ha publicado ning\u00fan parche."
}
],
"metrics": {
@ -75,7 +79,7 @@
"source": "csirt@divd.nl"
},
{
"url": "https://cisrt.divd.nl/CVE-2025-22371",
"url": "https://csirt.divd.nl/CVE-2025-22371",
"source": "csirt@divd.nl"
},
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-22372",
"sourceIdentifier": "csirt@divd.nl",
"published": "2025-04-14T16:15:21.630",
"lastModified": "2025-04-14T16:15:21.630",
"lastModified": "2025-04-15T11:15:45.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficiently Protected Credentials vulnerability in SicommNet BASEC on SaaS allows Password Recovery.\nPasswords are either stored in plain text using reversible encryption, allowing an attacker with sufficient privileges to extract plain text passwords easily.\n\nThis issue affects BASEC: from 14 Dec 2021."
},
{
"lang": "es",
"value": "La vulnerabilidad de credenciales insuficientemente protegidas en SicommNet BASEC en SaaS permite la recuperaci\u00f3n de contrase\u00f1as. Las contrase\u00f1as se almacenan en texto plano mediante cifrado reversible, lo que permite a un atacante con privilegios suficientes extraerlas f\u00e1cilmente. Este problema afecta a BASEC desde el 14 de diciembre de 2021."
}
],
"metrics": {
@ -75,7 +79,7 @@
"source": "csirt@divd.nl"
},
{
"url": "https://cisrt.divd.nl/CVE-2025-22372",
"url": "https://csirt.divd.nl/CVE-2025-22372",
"source": "csirt@divd.nl"
},
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-22373",
"sourceIdentifier": "csirt@divd.nl",
"published": "2025-04-14T16:15:21.767",
"lastModified": "2025-04-14T16:15:21.767",
"lastModified": "2025-04-15T11:15:45.533",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SicommNet BASEC on SaaS allows Reflected XSS, XSS Through HTTP Query Strings, Rendering of Arbitrary HTML and alternation of CSS Styles\nThis issue affects BASEC: from 14 Dec 2021."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en SicommNet BASEC en SaaS permite XSS reflejado, XSS a trav\u00e9s de cadenas de consulta HTTP, representaci\u00f3n de HTML arbitrario y alternancia de estilos CSS. Este problema afecta a BASEC: desde el 14 de diciembre de 2021."
}
],
"metrics": {
@ -75,7 +79,7 @@
"source": "csirt@divd.nl"
},
{
"url": "https://cisrt.divd.nl/CVE-2025-22373",
"url": "https://csirt.divd.nl/CVE-2025-22373",
"source": "csirt@divd.nl"
},
{

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-32943",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2025-04-15T11:15:45.690",
"lastModified": "2025-04-15T11:15:45.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The vulnerability allows any authenticated user to leak the contents of arbitrary \u201c.m3u8\u201d files from the PeerTube server due to a path traversal in the HLS endpoint."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "reefs@jfrog.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "reefs@jfrog.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/Chocobozzz/PeerTube/releases/tag/v7.1.1",
"source": "reefs@jfrog.com"
},
{
"url": "https://research.jfrog.com/vulnerabilities/peertube-hls-path-traversal/",
"source": "reefs@jfrog.com"
}
]
}

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "In versions prior to Aidex 1.7, an authenticated malicious user, taking advantage of an open registry, could execute unauthorised commands within the system. This includes executing operating system (Unix) commands, interacting with internal services such as PHP or MySQL, and even invoking native functions of the framework used, such as Laravel or Symfony. This execution is achieved by Prompt Injection attacks through the /api/<string-chat>/message endpoint, manipulating the content of the \u2018content\u2019 parameter."
},
{
"lang": "es",
"value": "En versiones anteriores a Aidex 1.7, un usuario malicioso autenticado, aprovechando un registro abierto, pod\u00eda ejecutar comandos no autorizados dentro del sistema. Esto inclu\u00eda ejecutar comandos del sistema operativo (Unix), interactuar con servicios internos como PHP o MySQL, e incluso invocar funciones nativas del framework utilizado, como Laravel o Symfony. Esta ejecuci\u00f3n se logra mediante ataques de inyecci\u00f3n de mensajes a trav\u00e9s del endpoint /api//message, manipulando el contenido del par\u00e1metro 'content'."
}
],
"metrics": {

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-15T10:00:19.969184+00:00
2025-04-15T12:00:23.122165+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-15T09:15:13.950000+00:00
2025-04-15T11:15:45.690000+00:00
```
### Last Data Feed Release
@ -33,24 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
289852
289855
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `3`
- [CVE-2024-45712](CVE-2024/CVE-2024-457xx/CVE-2024-45712.json) (`2025-04-15T09:15:13.293`)
- [CVE-2025-3574](CVE-2025/CVE-2025-35xx/CVE-2025-3574.json) (`2025-04-15T09:15:13.500`)
- [CVE-2025-3575](CVE-2025/CVE-2025-35xx/CVE-2025-3575.json) (`2025-04-15T09:15:13.670`)
- [CVE-2025-3578](CVE-2025/CVE-2025-35xx/CVE-2025-3578.json) (`2025-04-15T09:15:13.810`)
- [CVE-2025-3579](CVE-2025/CVE-2025-35xx/CVE-2025-3579.json) (`2025-04-15T09:15:13.950`)
- [CVE-2025-1688](CVE-2025/CVE-2025-16xx/CVE-2025-1688.json) (`2025-04-15T11:15:44.140`)
- [CVE-2025-2083](CVE-2025/CVE-2025-20xx/CVE-2025-2083.json) (`2025-04-15T10:15:14.680`)
- [CVE-2025-32943](CVE-2025/CVE-2025-329xx/CVE-2025-32943.json) (`2025-04-15T11:15:45.690`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `5`
- [CVE-2024-12094](CVE-2024/CVE-2024-120xx/CVE-2024-12094.json) (`2025-04-15T10:15:13.780`)
- [CVE-2025-22371](CVE-2025/CVE-2025-223xx/CVE-2025-22371.json) (`2025-04-15T11:15:45.217`)
- [CVE-2025-22372](CVE-2025/CVE-2025-223xx/CVE-2025-22372.json) (`2025-04-15T11:15:45.380`)
- [CVE-2025-22373](CVE-2025/CVE-2025-223xx/CVE-2025-22373.json) (`2025-04-15T11:15:45.533`)
- [CVE-2025-3579](CVE-2025/CVE-2025-35xx/CVE-2025-3579.json) (`2025-04-15T09:15:13.950`)
## Download and Usage

View File

@ -246594,7 +246594,7 @@ CVE-2024-1209,0,0,0c11632b4f799f8334de1fe031a18ed75abc1306137789706f83e79036cdbf
CVE-2024-12090,0,0,3ae49935c044b86a3444ecb09701dd060f603a46c2ce1e27c4f8226f9377436d,2024-12-16T15:15:06.393000
CVE-2024-12091,0,0,35c9100407a2a2f03cc09233dbdc35208e548ffdd088d484bb9b374c740b5bc0,2024-12-16T15:15:06.540000
CVE-2024-12092,0,0,6cedbb52bdc4fd872b35781acb98ac9a9b54d520c5d29f314ba42350997260f9,2024-12-16T15:15:06.677000
CVE-2024-12094,0,0,6dd85a9b2557f08ee364682e83ba2b4a96df650121716b26f85951e9de06f6f5,2024-12-05T13:15:05.923000
CVE-2024-12094,0,1,12c81bd6e44afba106aa5b9c1f1003a5bf1fbf3bef13df97a3697ccb2bca6566,2025-04-15T10:15:13.780000
CVE-2024-12095,0,0,266981a4f802a4e630b12ac2741c69386abcb730aae3bae3718e0ed36165b300,2025-02-11T02:15:33.547000
CVE-2024-12096,0,0,a0b37dcc639d983cbff8481184c987ae3b7851e6c867f94b52bee5fdf38bc784,2024-12-24T17:15:07.497000
CVE-2024-12097,0,0,080558aa7b3ac1febe350d71d1f75d062875ebd1cc067888fb9586ec0ac95026,2025-03-05T14:15:35.280000
@ -268927,7 +268927,7 @@ CVE-2024-45709,0,0,a0d4e56bb263bc9e47877f3006692003a99a930acd527517129f8ee5e89f2
CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000
CVE-2024-45710,0,0,d5d20bd0fdb7865f82e5f4b909a4d875dc5f3d77d52392f9ffe78a5294c66c14,2024-10-17T20:18:04.277000
CVE-2024-45711,0,0,22c1ac5b6f0da26129aa7e9e3ba97f2e8dcb4bd8ce735f9d8d4ba8f17c970de0,2024-10-17T20:17:29.207000
CVE-2024-45712,1,1,425d3ffbbdb368bb3f24cdc34c642716ef37128e2d988a83381a8c3f305f60a4,2025-04-15T09:15:13.293000
CVE-2024-45712,0,0,425d3ffbbdb368bb3f24cdc34c642716ef37128e2d988a83381a8c3f305f60a4,2025-04-15T09:15:13.293000
CVE-2024-45713,0,0,32ed7424619f61f0e03fc9972f78fa1c726821d98390dabdc73054fbc284d4f3,2025-02-25T17:15:36.083000
CVE-2024-45714,0,0,c21a61c96d9ad07289ac1311a92c3e561bfa126cb238bbc3e6ffd66427ef24a4,2024-10-30T20:33:59.393000
CVE-2024-45715,0,0,b59b14b28dcb4298df8d6640386a10aa143d80809296166ad7bdf16d746d8447,2025-02-26T18:47:19.923000
@ -282391,6 +282391,7 @@ CVE-2025-1682,0,0,cc794daa0dbacddc54b0e89e0bf9a4796b5672845d169d6dbf1869b7f592f7
CVE-2025-1683,0,0,bd65547481d5838793e5ad335f0bed73820ac4e81083a338100991ba4dbdb8f6,2025-03-13T10:15:19.687000
CVE-2025-1686,0,0,d1ef42202e7d4a5987e7a7fded4c55f6d574235579a6aece0e74834a9611412f,2025-04-07T18:29:22.970000
CVE-2025-1687,0,0,553889bbf1832e8d0246ba505a729ffeb25a6379aca1ca1f8f3f4851031d21de,2025-02-28T00:15:36.240000
CVE-2025-1688,1,1,5c6a06bac422adb33706be8471e71dc0fb7c545a86012640310ae7a34b701c10,2025-04-15T11:15:44.140000
CVE-2025-1689,0,0,ab0c739015e868491c3393a9dbae0818d17aadfd3d893b02587a47ce8b53dda1,2025-03-11T16:19:41.870000
CVE-2025-1690,0,0,8515e3753c09328c692a367a40f4a48932e87850b11ca7360289773890aa45cb,2025-03-11T15:59:35.800000
CVE-2025-1691,0,0,5eec1cea57e35f579c692b6064aead03fa43885ba22ff953ac9e969443e43853,2025-02-27T16:15:38.610000
@ -282807,6 +282808,7 @@ CVE-2025-2078,0,0,9de7f9d36f257c6e4ade1283dce5bdc5d09f9fe37ce0133e41f71eebe0b83d
CVE-2025-2079,0,0,1df99b44115761c768e37334a26d3048ad67e1a5d7d245b0266a3de82699255e,2025-03-13T17:15:38.080000
CVE-2025-2080,0,0,8997dd07180b59c809f3df794229cdf89e46a6b355c2dafb103afdfc1a28dd39,2025-03-13T17:15:38.253000
CVE-2025-2081,0,0,4bcbb760543adfc2793fb421232d69f0d37c0297321a5cb193e8d3ca3a30e752,2025-03-13T17:15:38.420000
CVE-2025-2083,1,1,b56ebbfb64e690ba283af5695296a4a84125b08da3edddfa6c1f4a6e681671a4,2025-04-15T10:15:14.680000
CVE-2025-2084,0,0,9186874e9417709e91bfbc0560be14cc85e2d2f24397f030f63236f2d997e78b,2025-03-12T17:20:12.987000
CVE-2025-2085,0,0,cdc776ce557f1f5be020949a2de79ef2cb25d7baf89cebb5bb3d5d1806b66fad,2025-03-13T15:23:29.823000
CVE-2025-2086,0,0,4e4362d5771bd0746a87b792e272a1c98aa3e837b1c239bf63f7ebc27efa4148,2025-03-13T16:05:15.390000
@ -283954,9 +283956,9 @@ CVE-2025-22368,0,0,15868b6e5746df64ac40f74359090d3c138a5fc4277e3491f8b4d3153bda9
CVE-2025-22369,0,0,914da155da04583b64bbcd7efb69cdb65cf9b4fa1a7a93f57111b5e36bed452e,2025-03-11T14:15:24.767000
CVE-2025-2237,0,0,6c579bdd62bb8bda18ad2566fa6cb9554676ec322606aaab27d5422395dc3d2a,2025-04-01T20:26:11.547000
CVE-2025-22370,0,0,e3b9834ee83fce05ff2df07009571f711e0033889d2c52add2c8f53db29092f5,2025-03-11T14:15:24.917000
CVE-2025-22371,0,0,c82830eff61f786f4a41d520ced8b7d97f0fc968b9dca6d64ac8c8f5a8062949,2025-04-14T16:15:21.450000
CVE-2025-22372,0,0,62059b0e6f5e800c7b741753fa399f925400e0a9d52baf43c329020697384563,2025-04-14T16:15:21.630000
CVE-2025-22373,0,0,f58fa4b3cb6c5107efeaee8c66737066f251b2bcb6143590f5a88cee310c3f63,2025-04-14T16:15:21.767000
CVE-2025-22371,0,1,0fd515925b08583f66cf085b616128c74a1f3ca917aaf620b57021f2d4ed8aeb,2025-04-15T11:15:45.217000
CVE-2025-22372,0,1,75369389960d3f21f4b6bbb162c3c9c860956b812ae91586aca01dac2b81e9e1,2025-04-15T11:15:45.380000
CVE-2025-22373,0,1,b4963d7ab520a3ca5c3658c16dccdae3f07c2db90137181fcb67a712fe2c95e6,2025-04-15T11:15:45.533000
CVE-2025-22374,0,0,3c76c0c310d0a27c4ffac60f4f224c77b792b9b62909428eaeef4914314662fa,2025-04-11T15:39:52.920000
CVE-2025-22375,0,0,ad41e29f59774e7ec2e9cb8e8af4d844651a9cedc9ff6f6b9f174f11c786065a,2025-04-11T15:39:52.920000
CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000
@ -289662,6 +289664,7 @@ CVE-2025-32938,0,0,d97032ba2fb62d85b0fd781b1a847fc87e2cde9e5de8598412a81c2f7b235
CVE-2025-32939,0,0,6d0ae9200a7976c683c740ee0295d246f733a1e3dbef51e2eacbe3ae7efb8a4d,2025-04-15T03:15:17.957000
CVE-2025-32940,0,0,ef492180fd67c205ba6c2e08604b15b7b05288970e18fade437210606e359428,2025-04-15T03:15:18.013000
CVE-2025-32941,0,0,7b47b38d71f23645464b8e8efcb34f5cd92a1b50b5494bf228368f472d5e5710,2025-04-15T03:15:18.077000
CVE-2025-32943,1,1,23e64df0fd35a825759aae24d8798ec09a333f7b3609395a3902498ee98d825b,2025-04-15T11:15:45.690000
CVE-2025-3296,0,0,604544c60030717a0b7298a4216c2cee6c0b09dc746101c73c6d715c2da17326,2025-04-08T16:49:21.037000
CVE-2025-3297,0,0,450f027df383ac012c0d670b8246ab459ec83da0d22f33695d8eb8051ee5200e,2025-04-08T16:49:12.910000
CVE-2025-3298,0,0,289613560130dabe199eea55128a1bdfe9eecd882e62238f3674c43e858ef0bc,2025-04-08T16:49:00.290000
@ -289835,11 +289838,11 @@ CVE-2025-3570,0,0,cf9fb78e19d7bef088f008e110fad665be6507ce3e02644cb83c14c976813f
CVE-2025-3571,0,0,7d08bea3ed82387da792d57f13b758e450a18d2640f2f9feafe1f3cbbdc5d106,2025-04-14T16:15:22.713000
CVE-2025-3572,0,0,ce93ec390a9611703e154796a1c8b29e4cb3ba90d0f017a2ea9b391560345b34,2025-04-14T03:15:17
CVE-2025-3573,0,0,52403cdc0d4d4fd5df289c287693d2c1bcd3dbc2441d5342f1cf42b619f826c7,2025-04-15T05:15:31.007000
CVE-2025-3574,1,1,f996911954026f2b9520c1e3b9e7bc2c127ad4cd73d0acb10a428900f0672f69,2025-04-15T09:15:13.500000
CVE-2025-3575,1,1,3b859cdcc75d19b0bd222446e0df21a3c805929d044033ae64d5f00e6acaf9a6,2025-04-15T09:15:13.670000
CVE-2025-3574,0,0,f996911954026f2b9520c1e3b9e7bc2c127ad4cd73d0acb10a428900f0672f69,2025-04-15T09:15:13.500000
CVE-2025-3575,0,0,3b859cdcc75d19b0bd222446e0df21a3c805929d044033ae64d5f00e6acaf9a6,2025-04-15T09:15:13.670000
CVE-2025-3576,0,0,b0049c6025d64b2929e211c65d145d94da2ded08e6e9fc81bae0b76f324cbdc5,2025-04-15T06:15:44.047000
CVE-2025-3578,1,1,87d1e0551317c254c64c797e6713254af47bbba82a0ddab4b2b90342d2423840,2025-04-15T09:15:13.810000
CVE-2025-3579,1,1,72de94005a72ea4c7cd49f354d14e37d3c80cc3c42f74a93bd35e14111fe98bf,2025-04-15T09:15:13.950000
CVE-2025-3578,0,0,87d1e0551317c254c64c797e6713254af47bbba82a0ddab4b2b90342d2423840,2025-04-15T09:15:13.810000
CVE-2025-3579,0,1,14a4df7542b5c70b893d9914691e4b28106064c1cc523e6fc5e4c2a44d170fa3,2025-04-15T09:15:13.950000
CVE-2025-3585,0,0,3f56099df0d5cbe2a28c49e0084d09a46fec0a860dece5bd91eb4466f785fbfe,2025-04-14T19:15:36.990000
CVE-2025-3587,0,0,0b5d7c64b9281d67b2da75b50cd511d58c4d6400c863ce33e2f51939e792bcae,2025-04-14T21:15:18.220000
CVE-2025-3588,0,0,325725e21d51ea302750035b03dc4eb21568d3831b2e5a943f3da0a80eb56df1,2025-04-14T21:15:18.343000

Can't render this file because it is too large.