diff --git a/CVE-2021/CVE-2021-213xx/CVE-2021-21353.json b/CVE-2021/CVE-2021-213xx/CVE-2021-21353.json index 99837aecf01..2754f45854c 100644 --- a/CVE-2021/CVE-2021-213xx/CVE-2021-21353.json +++ b/CVE-2021/CVE-2021-213xx/CVE-2021-21353.json @@ -2,13 +2,13 @@ "id": "CVE-2021-21353", "sourceIdentifier": "security-advisories@github.com", "published": "2021-03-03T02:15:13.143", - "lastModified": "2024-11-21T05:48:11.043", + "lastModified": "2025-04-16T23:15:44.197", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend. This is fixed in version 3.0.1. This advisory applies to multiple pug packages including \"pug\", \"pug-code-gen\". pug-code-gen has a backported fix at version 2.0.3. This advisory is not exploitable if there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade." + "value": "Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend. This is fixed in version 3.0.1. This advisory applies to multiple pug packages including \"pug\", \"pug-code-gen\". pug-code-gen has a backported fix at version 2.0.3. This advisory is not exploitable if there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade." }, { "lang": "es", @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0756.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0756.json new file mode 100644 index 00000000000..64711a7c1dc --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0756.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0756", + "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", + "published": "2025-04-16T23:15:44.400", + "lastModified": "2025-04-16T23:15:44.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Overview \n\n\n\n\u00a0\n\n\n\nThe product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not restrict JNDI identifiers during the creation of platform data sources. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nAn attacker could gain access to or modify sensitive data or system resources. This could allow access to protected files or directories including configuration files and files containing sensitive information, which can lead to remote code execution by unauthorized users." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-99" + } + ] + } + ], + "references": [ + { + "url": "https://https://support.pentaho.com/hc/en-us/articles/35771876077709--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Improper-Control-of-Resource-Identifiers-Resource-Injection-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0756", + "source": "security.vulnerabilities@hitachivantara.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0757.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0757.json new file mode 100644 index 00000000000..898d8308f41 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0757.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0757", + "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", + "published": "2025-04-16T23:15:44.530", + "lastModified": "2025-04-16T23:15:44.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Overview\n\n\n\n\u00a0\n\n\n\nThe software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, allow a malicious URL to inject content into the Analyzer plugin interface. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nOnce the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim's machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://support.pentaho.com/hc/en-us/articles/35781038882445--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0757", + "source": "security.vulnerabilities@hitachivantara.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0758.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0758.json new file mode 100644 index 00000000000..bc2e344962f --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0758.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0758", + "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", + "published": "2025-04-16T23:15:44.647", + "lastModified": "2025-04-16T23:15:44.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Overview\u00a0\n\n\n\nThe product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. (CWE-732)\u00a0\n\n\n\nDescription\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, is installed with Karaf JMX beans enabled and accessible by default.\u00a0\n\n\n\nImpact\u00a0\n\n\n\nWhen the vulnerability is leveraged, a user with local execution privileges can access functionality exposed by Karaf beans contained in the product." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://support.pentaho.com/hc/en-us/articles/35781318194061--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Incorrect-Permission-Assignment-for-Critical-Resource-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0758", + "source": "security.vulnerabilities@hitachivantara.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1566.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1566.json new file mode 100644 index 00000000000..0c7051c4b5c --- /dev/null +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1566.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-1566", + "sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", + "published": "2025-04-16T23:15:44.767", + "lastModified": "2025-04-16T23:15:44.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DNS Leak in Native System VPN in Google ChromeOS Dev Channel on ChromeOS 129.0.6668.36 allows network observers to expose plaintext DNS queries via failure to properly tunnel DNS traffic during VPN state transitions." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://issues.chromium.org/issues/b/342802975", + "source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f" + }, + { + "url": "https://issuetracker.google.com/issues/342802975", + "source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1568.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1568.json new file mode 100644 index 00000000000..37d0f548f84 --- /dev/null +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1568.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-1568", + "sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", + "published": "2025-04-16T23:15:44.853", + "lastModified": "2025-04-16T23:15:44.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Access Control Vulnerability in Gerrit chromiumos project configuration in Google ChromeOS 131.0.6778.268 allows an attacker with a registered Gerrit account to inject malicious code into ChromeOS projects and potentially achieve Remote Code Execution and Denial of Service via editing trusted pipelines by insufficient access controls and misconfigurations in Gerrit's project.config." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://issues.chromium.org/issues/b/374279912", + "source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f" + }, + { + "url": "https://issuetracker.google.com/issues/374279912", + "source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1704.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1704.json new file mode 100644 index 00000000000..35481fb965d --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1704.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-1704", + "sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", + "published": "2025-04-16T23:15:44.937", + "lastModified": "2025-04-16T23:15:44.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ComponentInstaller Modification in ComponentInstaller in Google ChromeOS 124.0.6367.34 on Chromebooks allows enrolled users with local access to unenroll devices \nand intercept device management requests via loading components from the unencrypted stateful partition." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://issues.chromium.org/issues/b/359915523", + "source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f" + }, + { + "url": "https://issuetracker.google.com/issues/359915523", + "source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2073.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2073.json new file mode 100644 index 00000000000..101651f8d7f --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2073.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-2073", + "sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", + "published": "2025-04-16T23:15:45.610", + "lastModified": "2025-04-16T23:15:45.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-Bounds Read in ip_set_bitmap_ip.c in Google ChromeOS Kernel Versions 6.1, 5.15, 5.10, 5.4, 4.19. on All devices where Termina is used allows an attacker with CAP_NET_ADMIN privileges to cause memory corruption and potentially escalate privileges via crafted ipset commands." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://issues.chromium.org/issues/b/380043638", + "source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f" + }, + { + "url": "https://issuetracker.google.com/issues/380043638", + "source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24907.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24907.json new file mode 100644 index 00000000000..255c2562fb4 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24907.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24907", + "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", + "published": "2025-04-16T23:15:45.027", + "lastModified": "2025-04-16T23:15:45.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Overview \n\n\n\n\u00a0\n\n\n\nThe product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nThis allows attackers to traverse the file system to access files or directories that are outside of the restricted directory." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-35" + } + ] + } + ], + "references": [ + { + "url": "https://support.pentaho.com/hc/en-us/articles/35781624069005--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Path-Traversal-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24907", + "source": "security.vulnerabilities@hitachivantara.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24908.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24908.json new file mode 100644 index 00000000000..2c405afbace --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24908.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24908", + "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", + "published": "2025-04-16T23:15:45.147", + "lastModified": "2025-04-16T23:15:45.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Overview \n\n\n\n\u00a0\n\n\n\nThe product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the UploadFile service. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nThis allows attackers to traverse the file system to access files or directories that are outside of the restricted directory." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-35" + } + ] + } + ], + "references": [ + { + "url": "https://support.pentaho.com/hc/en-us/articles/35783399569421--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Path-Traversal-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24908", + "source": "security.vulnerabilities@hitachivantara.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24909.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24909.json new file mode 100644 index 00000000000..98d01ff7ba2 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24909.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24909", + "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", + "published": "2025-04-16T23:15:45.263", + "lastModified": "2025-04-16T23:15:45.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Overview \n\n\n\n\u00a0\n\n\n\nThe software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, allow a malicious URL to inject content into the Analyzer plugin interface. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nOnce the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim's machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://support.pentaho.com/hc/en-us/articles/35782541484045--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24909", + "source": "security.vulnerabilities@hitachivantara.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24910.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24910.json new file mode 100644 index 00000000000..8594a9dfc49 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24910.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24910", + "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", + "published": "2025-04-16T23:15:45.373", + "lastModified": "2025-04-16T23:15:45.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Overview \n\n\n\n\u00a0\n\n\n\nXML documents optionally contain a Document Type Definition (DTD), which, among other features, enables the definition of XML entities. It is possible to define an entity by providing a substitution string in the form of a URI. Once the content of the URI is read, it is fed back into the application that is processing the XML. This application may echo back the data (e.g. in an error message), thereby exposing the file contents. (CWE-611) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.2, including 9.3.x and 8.3.x, do not correctly protect Pentaho Data Integration MessageSourceCrawler against out-of-band XML External Entity Reference. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nBy submitting an XML file that defines an external entity with a file:// URI, an attacker can cause the processing application to read the contents of a local file. Using URIs with other schemes such as http://, the attacker can force the application to make outgoing requests to servers that the attacker cannot reach directly, which can be used to bypass firewall restrictions or hide the source of attacks such as port scanning." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://support.pentaho.com/hc/en-us/articles/35782683750541--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Restriction-of-XML-External-Entity-Reference-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24910", + "source": "security.vulnerabilities@hitachivantara.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24911.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24911.json new file mode 100644 index 00000000000..21cab0c8552 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24911.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24911", + "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", + "published": "2025-04-16T23:15:45.490", + "lastModified": "2025-04-16T23:15:45.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Overview \n\n\n\n\u00a0\n\n\n\nXML documents optionally contain a Document Type Definition (DTD), which, among other features, enables the definition of XML entities. It is possible to define an entity by providing a substitution string in the form of a URI. Once the content of the URI is read, it is fed back into the application that is processing the XML. This application may echo back the data (e.g. in an error message), thereby exposing the file contents. (CWE-611) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.2, including 9.3.x and 8.3.x, do not correctly protect Data Access XMLParserFactoryProducer against out-of-band XML External Entity Reference. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nBy submitting an XML file that defines an external entity with a file:// URI, an attacker can cause the processing application to read the contents of a local file. Using URIs with other schemes such as http://, the attacker can force the application to make outgoing requests to servers that the attacker cannot reach directly, which can be used to bypass firewall restrictions or hide the source of attacks such as port scanning." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security.vulnerabilities@hitachivantara.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://support.pentaho.com/hc/en-us/articles/35783689016589--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Restriction-of-XML-External-Entity-Reference-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24911", + "source": "security.vulnerabilities@hitachivantara.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2400.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2400.json new file mode 100644 index 00000000000..cc430d8d32f --- /dev/null +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2400.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-2400", + "sourceIdentifier": "cve@gitlab.com", + "published": "2025-04-16T23:15:45.697", + "lastModified": "2025-04-16T23:15:45.697", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25230.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25230.json new file mode 100644 index 00000000000..1422a684675 --- /dev/null +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25230.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2025-25230", + "sourceIdentifier": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52", + "published": "2025-04-16T22:15:14.073", + "lastModified": "2025-04-16T22:15:14.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Omnissa Horizon Client for Windows contains an LPE Vulnerability.\u00a0A malicious actor with local access where Horizon Client for Windows is installed may be able to elevate privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://static.omnissa.com/sites/default/files/OMSA-2025-0001.pdf", + "source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52" + }, + { + "url": "https://www.omnissa.com/omnissa-security-response/", + "source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31478.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31478.json new file mode 100644 index 00000000000..2ad165e34d8 --- /dev/null +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31478.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31478", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-16T22:15:14.233", + "lastModified": "2025-04-16T22:15:14.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zulip is an open-source team collaboration tool. Zulip supports a configuration where account creation is limited solely by being able to authenticate with a single-sign on authentication backend, meaning the organization places no restrictions on email address domains or invitations being required to join, but has disabled the EmailAuthBackend that is used for email/password authentication. A bug in the Zulip server means that it is possible to create an account in such organizations, without having an account with the configured SSO authentication backend. This issue is patched in version 10.2. A workaround includes requiring invitations to join the organization prevents the vulnerability from being accessed." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zulip/zulip/security/advisories/GHSA-qxfv-j6vg-5rqc", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32433.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32433.json new file mode 100644 index 00000000000..c7742557271 --- /dev/null +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32433.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2025-32433", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-16T22:15:14.373", + "lastModified": "2025-04-16T22:15:14.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/erlang/otp/commit/0fcd9c56524b28615e8ece65fc0c3f66ef6e4c12", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/erlang/otp/commit/6eef04130afc8b0ccb63c9a0d8650209cf54892f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/erlang/otp/commit/b1924d37fd83c070055beb115d5d6a6a9490b891", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2", + "source": "security-advisories@github.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/04/16/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32783.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32783.json new file mode 100644 index 00000000000..52a167e206d --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32783.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32783", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-16T22:15:14.523", + "lastModified": "2025-04-16T22:15:14.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XWiki Platform is a generic wiki platform. A vulnerability in versions from 5.0 to 16.7.1 affects users with Message Stream enabled and a wiki configured as closed from selecting \"Prevent unregistered users to view pages\" in the Administrations Rights. The vulnerability is that any message sent in a subwiki to \"everyone\" is actually sent to the farm: any visitor of the main wiki will be able to see that message through the Dashboard, even if the subwiki is configured to be private. This issue will not be patched as Message Stream has been deprecated in XWiki 16.8.0RC1 and is not maintained anymore. A workaround for this issue involves keeping Message Stream disabled by default. It's advised to keep it disabled from Administration > Social > Message Stream." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-668" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-42fh-pvvh-999x", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-17154", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32787.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32787.json new file mode 100644 index 00000000000..0420114429b --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32787.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-32787", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-16T22:15:14.667", + "lastModified": "2025-04-16T22:15:14.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. Versions 5.02.5184 to 5.02.5187 are vulnerable to NULL dereference in `DeleteIPv6DefaultRouterInRA` called by `StorePacket`. Before dereferencing, `DeleteIPv6DefaultRouterInRA` does not account for `ParsePacket` returning NULL, resulting in the program crashing. A patched version does not exist at this time." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/SoftEtherVPN/SoftEtherVPN/blob/7006539732c0231d7723623cc8732f94ba2b8c54/src/Cedar/Hub.c#L5112C1-L5116C29", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/SoftEtherVPN/SoftEtherVPN/blob/master/src/Mayaqua/TcpIp.c#L1633", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/SoftEtherVPN/SoftEtherVPN/security/advisories/GHSA-xw53-587j-mqh6", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32789.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32789.json new file mode 100644 index 00000000000..1ea51f037a3 --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32789.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-32789", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-16T22:15:14.800", + "lastModified": "2025-04-16T22:15:14.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of the user table, based on the results of the sorted list of users. Although unlikely, if an attacker knows the hash value of their password, they can change the password and repeat the sorting until the other user's password hash is fully revealed. This issue is patched in version 9.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/espocrm/espocrm/commit/91740192d2e2c575c6a04534c079baf9f3af0a7f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/espocrm/espocrm/commit/bd900d0b48fe37a98def4c0e094e39e7e385e9ea", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/espocrm/espocrm/security/advisories/GHSA-3ph3-jcfx-fq53", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32791.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32791.json new file mode 100644 index 00000000000..9c1ca0530b7 --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32791.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32791", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-16T22:15:14.943", + "lastModified": "2025-04-16T22:15:14.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Backstage Scaffolder plugin houses types and utilities for building scaffolder-related modules. A vulnerability in the Backstage permission plugin backend allows callers to extract some information about the conditional decisions returned by the permission policy installed in the permission backend. If the permission system is not in use or if the installed permission policy does not use conditional decisions, there is no impact. This issue has been patched in version 0.6.0 of the permissions backend. A workaround includes having administrators of the permission policies ensure that they are crafted in such a way that conditional decisions do not contain any sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-213" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/backstage/backstage/security/advisories/GHSA-f8j4-p5cr-p777", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-437xx/CVE-2025-43703.json b/CVE-2025/CVE-2025-437xx/CVE-2025-43703.json new file mode 100644 index 00000000000..293300e52d5 --- /dev/null +++ b/CVE-2025/CVE-2025-437xx/CVE-2025-43703.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-43703", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-16T22:15:15.083", + "lastModified": "2025-04-16T22:15:15.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Ankitects Anki through 25.02. A crafted shared deck can result in attacker-controlled access to the internal API (even though the attacker has no knowledge of an API key) through approaches such as scripts or the SRC attribute of an IMG element. NOTE: this issue exists because of an incomplete fix for CVE-2024-32484." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-830" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ankitects/anki/pull/3925", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ankitects/anki/pull/3925/commits/24bca15fd3d9dc386916509eb2d4862d1184e709", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-437xx/CVE-2025-43704.json b/CVE-2025/CVE-2025-437xx/CVE-2025-43704.json new file mode 100644 index 00000000000..c0318840fb7 --- /dev/null +++ b/CVE-2025/CVE-2025-437xx/CVE-2025-43704.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43704", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-16T23:15:45.770", + "lastModified": "2025-04-16T23:15:45.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Arctera/Veritas Data Insight before 7.1.2 can send cleartext credentials when configured to use HTTP Basic Authentication to a Dell Isilon OneFS server." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://www.veritas.com/support/en_US/security/ARC25-006", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d68e4a0b378..776b1e5154f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-16T22:00:19.809240+00:00 +2025-04-16T23:55:19.741186+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-16T21:15:48.873000+00:00 +2025-04-16T23:15:45.770000+00:00 ``` ### Last Data Feed Release @@ -33,68 +33,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -290454 +290476 ``` ### CVEs added in the last Commit -Recently added CVEs: `24` +Recently added CVEs: `22` -- [CVE-2024-55371](CVE-2024/CVE-2024-553xx/CVE-2024-55371.json) (`2025-04-16T21:15:45.790`) -- [CVE-2024-55372](CVE-2024/CVE-2024-553xx/CVE-2024-55372.json) (`2025-04-16T21:15:45.897`) -- [CVE-2025-26153](CVE-2025/CVE-2025-261xx/CVE-2025-26153.json) (`2025-04-16T21:15:46.770`) -- [CVE-2025-28072](CVE-2025/CVE-2025-280xx/CVE-2025-28072.json) (`2025-04-16T21:15:46.883`) -- [CVE-2025-29648](CVE-2025/CVE-2025-296xx/CVE-2025-29648.json) (`2025-04-16T20:15:17.460`) -- [CVE-2025-29649](CVE-2025/CVE-2025-296xx/CVE-2025-29649.json) (`2025-04-16T20:15:17.563`) -- [CVE-2025-29650](CVE-2025/CVE-2025-296xx/CVE-2025-29650.json) (`2025-04-16T20:15:17.663`) -- [CVE-2025-29651](CVE-2025/CVE-2025-296xx/CVE-2025-29651.json) (`2025-04-16T20:15:17.760`) -- [CVE-2025-29652](CVE-2025/CVE-2025-296xx/CVE-2025-29652.json) (`2025-04-16T20:15:17.860`) -- [CVE-2025-29653](CVE-2025/CVE-2025-296xx/CVE-2025-29653.json) (`2025-04-16T20:15:17.963`) -- [CVE-2025-29708](CVE-2025/CVE-2025-297xx/CVE-2025-29708.json) (`2025-04-16T21:15:47.460`) -- [CVE-2025-29709](CVE-2025/CVE-2025-297xx/CVE-2025-29709.json) (`2025-04-16T21:15:47.570`) -- [CVE-2025-29710](CVE-2025/CVE-2025-297xx/CVE-2025-29710.json) (`2025-04-16T21:15:47.673`) -- [CVE-2025-32817](CVE-2025/CVE-2025-328xx/CVE-2025-32817.json) (`2025-04-16T20:15:19.077`) -- [CVE-2025-3619](CVE-2025/CVE-2025-36xx/CVE-2025-3619.json) (`2025-04-16T21:15:47.920`) -- [CVE-2025-3620](CVE-2025/CVE-2025-36xx/CVE-2025-3620.json) (`2025-04-16T21:15:48.027`) -- [CVE-2025-3723](CVE-2025/CVE-2025-37xx/CVE-2025-3723.json) (`2025-04-16T20:15:19.777`) -- [CVE-2025-3724](CVE-2025/CVE-2025-37xx/CVE-2025-3724.json) (`2025-04-16T20:15:19.960`) -- [CVE-2025-3725](CVE-2025/CVE-2025-37xx/CVE-2025-3725.json) (`2025-04-16T20:15:20.123`) -- [CVE-2025-3726](CVE-2025/CVE-2025-37xx/CVE-2025-3726.json) (`2025-04-16T20:15:20.283`) -- [CVE-2025-3727](CVE-2025/CVE-2025-37xx/CVE-2025-3727.json) (`2025-04-16T21:15:48.203`) -- [CVE-2025-3728](CVE-2025/CVE-2025-37xx/CVE-2025-3728.json) (`2025-04-16T21:15:48.363`) -- [CVE-2025-3729](CVE-2025/CVE-2025-37xx/CVE-2025-3729.json) (`2025-04-16T21:15:48.537`) -- [CVE-2025-3730](CVE-2025/CVE-2025-37xx/CVE-2025-3730.json) (`2025-04-16T21:15:48.700`) +- [CVE-2025-0756](CVE-2025/CVE-2025-07xx/CVE-2025-0756.json) (`2025-04-16T23:15:44.400`) +- [CVE-2025-0757](CVE-2025/CVE-2025-07xx/CVE-2025-0757.json) (`2025-04-16T23:15:44.530`) +- [CVE-2025-0758](CVE-2025/CVE-2025-07xx/CVE-2025-0758.json) (`2025-04-16T23:15:44.647`) +- [CVE-2025-1566](CVE-2025/CVE-2025-15xx/CVE-2025-1566.json) (`2025-04-16T23:15:44.767`) +- [CVE-2025-1568](CVE-2025/CVE-2025-15xx/CVE-2025-1568.json) (`2025-04-16T23:15:44.853`) +- [CVE-2025-1704](CVE-2025/CVE-2025-17xx/CVE-2025-1704.json) (`2025-04-16T23:15:44.937`) +- [CVE-2025-2073](CVE-2025/CVE-2025-20xx/CVE-2025-2073.json) (`2025-04-16T23:15:45.610`) +- [CVE-2025-2400](CVE-2025/CVE-2025-24xx/CVE-2025-2400.json) (`2025-04-16T23:15:45.697`) +- [CVE-2025-24907](CVE-2025/CVE-2025-249xx/CVE-2025-24907.json) (`2025-04-16T23:15:45.027`) +- [CVE-2025-24908](CVE-2025/CVE-2025-249xx/CVE-2025-24908.json) (`2025-04-16T23:15:45.147`) +- [CVE-2025-24909](CVE-2025/CVE-2025-249xx/CVE-2025-24909.json) (`2025-04-16T23:15:45.263`) +- [CVE-2025-24910](CVE-2025/CVE-2025-249xx/CVE-2025-24910.json) (`2025-04-16T23:15:45.373`) +- [CVE-2025-24911](CVE-2025/CVE-2025-249xx/CVE-2025-24911.json) (`2025-04-16T23:15:45.490`) +- [CVE-2025-25230](CVE-2025/CVE-2025-252xx/CVE-2025-25230.json) (`2025-04-16T22:15:14.073`) +- [CVE-2025-31478](CVE-2025/CVE-2025-314xx/CVE-2025-31478.json) (`2025-04-16T22:15:14.233`) +- [CVE-2025-32433](CVE-2025/CVE-2025-324xx/CVE-2025-32433.json) (`2025-04-16T22:15:14.373`) +- [CVE-2025-32783](CVE-2025/CVE-2025-327xx/CVE-2025-32783.json) (`2025-04-16T22:15:14.523`) +- [CVE-2025-32787](CVE-2025/CVE-2025-327xx/CVE-2025-32787.json) (`2025-04-16T22:15:14.667`) +- [CVE-2025-32789](CVE-2025/CVE-2025-327xx/CVE-2025-32789.json) (`2025-04-16T22:15:14.800`) +- [CVE-2025-32791](CVE-2025/CVE-2025-327xx/CVE-2025-32791.json) (`2025-04-16T22:15:14.943`) +- [CVE-2025-43703](CVE-2025/CVE-2025-437xx/CVE-2025-43703.json) (`2025-04-16T22:15:15.083`) +- [CVE-2025-43704](CVE-2025/CVE-2025-437xx/CVE-2025-43704.json) (`2025-04-16T23:15:45.770`) ### CVEs modified in the last Commit -Recently modified CVEs: `30` +Recently modified CVEs: `1` -- [CVE-2025-21578](CVE-2025/CVE-2025-215xx/CVE-2025-21578.json) (`2025-04-16T21:15:46.080`) -- [CVE-2025-21579](CVE-2025/CVE-2025-215xx/CVE-2025-21579.json) (`2025-04-16T21:15:46.193`) -- [CVE-2025-21580](CVE-2025/CVE-2025-215xx/CVE-2025-21580.json) (`2025-04-16T21:15:46.303`) -- [CVE-2025-21581](CVE-2025/CVE-2025-215xx/CVE-2025-21581.json) (`2025-04-16T21:15:46.413`) -- [CVE-2025-21582](CVE-2025/CVE-2025-215xx/CVE-2025-21582.json) (`2025-04-16T21:15:46.527`) -- [CVE-2025-21584](CVE-2025/CVE-2025-215xx/CVE-2025-21584.json) (`2025-04-16T20:15:16.947`) -- [CVE-2025-21585](CVE-2025/CVE-2025-215xx/CVE-2025-21585.json) (`2025-04-16T20:15:17.057`) -- [CVE-2025-22872](CVE-2025/CVE-2025-228xx/CVE-2025-22872.json) (`2025-04-16T21:15:46.640`) -- [CVE-2025-24421](CVE-2025/CVE-2025-244xx/CVE-2025-24421.json) (`2025-04-16T20:15:17.170`) -- [CVE-2025-24427](CVE-2025/CVE-2025-244xx/CVE-2025-24427.json) (`2025-04-16T20:15:17.313`) -- [CVE-2025-30682](CVE-2025/CVE-2025-306xx/CVE-2025-30682.json) (`2025-04-16T20:15:18.057`) -- [CVE-2025-30694](CVE-2025/CVE-2025-306xx/CVE-2025-30694.json) (`2025-04-16T20:15:18.170`) -- [CVE-2025-30695](CVE-2025/CVE-2025-306xx/CVE-2025-30695.json) (`2025-04-16T20:15:18.283`) -- [CVE-2025-30697](CVE-2025/CVE-2025-306xx/CVE-2025-30697.json) (`2025-04-16T20:15:18.393`) -- [CVE-2025-30699](CVE-2025/CVE-2025-306xx/CVE-2025-30699.json) (`2025-04-16T20:15:18.507`) -- [CVE-2025-30700](CVE-2025/CVE-2025-307xx/CVE-2025-30700.json) (`2025-04-16T20:15:18.620`) -- [CVE-2025-30707](CVE-2025/CVE-2025-307xx/CVE-2025-30707.json) (`2025-04-16T20:15:18.743`) -- [CVE-2025-30709](CVE-2025/CVE-2025-307xx/CVE-2025-30709.json) (`2025-04-16T20:15:18.853`) -- [CVE-2025-30710](CVE-2025/CVE-2025-307xx/CVE-2025-30710.json) (`2025-04-16T20:15:18.967`) -- [CVE-2025-3679](CVE-2025/CVE-2025-36xx/CVE-2025-3679.json) (`2025-04-16T20:15:19.250`) -- [CVE-2025-3680](CVE-2025/CVE-2025-36xx/CVE-2025-3680.json) (`2025-04-16T20:15:19.350`) -- [CVE-2025-3681](CVE-2025/CVE-2025-36xx/CVE-2025-3681.json) (`2025-04-16T20:15:19.460`) -- [CVE-2025-3682](CVE-2025/CVE-2025-36xx/CVE-2025-3682.json) (`2025-04-16T20:15:19.570`) -- [CVE-2025-3683](CVE-2025/CVE-2025-36xx/CVE-2025-3683.json) (`2025-04-16T20:15:19.670`) -- [CVE-2025-3733](CVE-2025/CVE-2025-37xx/CVE-2025-3733.json) (`2025-04-16T21:15:48.873`) +- [CVE-2021-21353](CVE-2021/CVE-2021-213xx/CVE-2021-21353.json) (`2025-04-16T23:15:44.197`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 31c85abeff7..20840921672 100644 --- a/_state.csv +++ b/_state.csv @@ -167938,7 +167938,7 @@ CVE-2021-2135,0,0,7abf799ace0e002ab446f4ffc90bb93e36260b42bd780bd6a3cd5d6fc4f881 CVE-2021-21350,0,0,2d752306279e47f018b7b7456b20a9159b8fef278e22b10b422aa6508fb277bd,2024-11-21T05:48:05.500000 CVE-2021-21351,0,0,cca6f3591b36a4a91511361a99fef683a76ebac410b607a5bd73bbeda38ba55c,2024-11-21T05:48:05.683000 CVE-2021-21352,0,0,d897e99eed94a134ed818d0dfb2b60db2d1cd351c05aaae51c7fc380ba195ca2,2024-11-21T05:48:05.900000 -CVE-2021-21353,0,0,0e6837eff702473fe08f80985ac9027232740af114a21122aa89a27c5222cbe2,2024-11-21T05:48:11.043000 +CVE-2021-21353,0,1,1e2ae93aee333dd878492c0b5d123533e3af61f4c0a6cff1a3c5dfecc2c75dc9,2025-04-16T23:15:44.197000 CVE-2021-21354,0,0,f993fd5b853f008cce79671cdaa2a0b6524c7cb7428ac2f8157119da3a54f691,2024-11-21T05:48:11.173000 CVE-2021-21355,0,0,766714b5a85de61a8624916bf3317120f0bd177745e800c46ab1f6314f11cfb6,2024-11-21T05:48:11.300000 CVE-2021-21357,0,0,cfde189c634372a6f9c54d0222eaf04097982502302c0f7454f68d1116b098ba,2024-11-21T05:48:11.420000 @@ -211378,7 +211378,7 @@ CVE-2022-46532,0,0,432e2fb1ac9231e3900f9510862b24af15ae515bd54591843ed70bfaf1950 CVE-2022-46533,0,0,8259a0c1ab3ecd9953d24addef698c0ca14bb7528598e2c54b5d0a9b00dabe1c,2025-04-16T18:15:59.713000 CVE-2022-46534,0,0,a37476b1e6f06d14f368b3fc9ddc52cb95b0509dedbd61b6254912927b0057d6,2025-04-16T18:15:59.920000 CVE-2022-46535,0,0,c76309a3efb3efd5614d89e6b487a45aa8e68a24c50e5069b532281cf9b9227f,2025-04-16T18:16:00.133000 -CVE-2022-46536,0,1,b556198d86819cc2bec371c26c7a2ca6d052dbf876dbdcacad7e4eed2e04888a,2025-04-16T20:15:16.333000 +CVE-2022-46536,0,0,b556198d86819cc2bec371c26c7a2ca6d052dbf876dbdcacad7e4eed2e04888a,2025-04-16T20:15:16.333000 CVE-2022-46537,0,0,013f85ed6bb69b0029944b116199f9a8482e23f09916132b7a8cd2c7df28d85f,2025-04-16T19:15:48.727000 CVE-2022-46538,0,0,36652f5ef9c355e7316e9b4baa42eeaf57af30487e172ad8a6aef006d837e7f1,2025-04-16T19:15:48.897000 CVE-2022-46539,0,0,7bd0d189716cc6a288447f1ac7d27e593a51000734a97e9ce222348df64dca77,2025-04-16T19:15:49.060000 @@ -264731,10 +264731,10 @@ CVE-2024-4005,0,0,10ce0801262283a3acf259593f5122037af4b3f2afe41d97e0d5130b74a0b3 CVE-2024-40051,0,0,96ab2490faf9bea7ad7fee897981a553b31642380963c6ce4281331d73ca69b1,2024-11-21T09:30:54.030000 CVE-2024-4006,0,0,46335001e821792447cd234ad2269b9ef6e390364b1771cf570ddd60ee4264a5,2024-12-12T17:10:26.743000 CVE-2024-40060,0,0,b3cb7a9288615fb07001800266f7abee43787412ebc5c9317e72dcb8a61aa5b3,2024-11-21T09:30:54.260000 -CVE-2024-40068,0,1,cbad6e65e7e84cf1a55ffb7fafdd118a328d0ef7e468aebf956e79c0738fba3f,2025-04-16T21:15:44.650000 +CVE-2024-40068,0,0,cbad6e65e7e84cf1a55ffb7fafdd118a328d0ef7e468aebf956e79c0738fba3f,2025-04-16T21:15:44.650000 CVE-2024-40069,0,0,4d4b8c6a2f5f96f0b37c4a56d683d18e89f62558ef2d1c08df758ed0b00fc247,2025-04-16T17:15:48.743000 CVE-2024-4007,0,0,3dd9d5c3a9450c96ea7d10f2bffa2679fd00a403615d465b187f095d51be54f6,2024-11-21T09:42:01.227000 -CVE-2024-40070,0,1,09992ee1a07721f0f0021dadbbee2f2783f08833bce7da18d07c6b519df78a8b,2025-04-16T21:15:45.217000 +CVE-2024-40070,0,0,09992ee1a07721f0f0021dadbbee2f2783f08833bce7da18d07c6b519df78a8b,2025-04-16T21:15:45.217000 CVE-2024-40071,0,0,06f6058bf63a114e512ac64f5c17a3c7972a90e514728670ddc9103275b0a94f,2025-04-16T17:15:48.957000 CVE-2024-40072,0,0,547d27cfdcf73bc395fc3d20ea203da147c8ed111ec3e549f9fec5bff422e11d,2025-04-16T17:15:49.063000 CVE-2024-40073,0,0,d4ef2dc78d57409da30467abb2994b8710871ceac838e3f8ece14dd70977ebd3,2025-04-16T17:15:49.170000 @@ -274521,8 +274521,8 @@ CVE-2024-53296,0,0,be682d3eb2a02cb859d07bb38fd2cdf79c5c9c446624f27b1fefa1f7d7732 CVE-2024-53299,0,0,2311d06f0f8179bedcf518ce1bde420954fcc87b5db6c467bb518cf92e75888f,2025-02-04T19:15:31.877000 CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000 CVE-2024-53303,0,0,70a56d8ec2b4b4d3548967b98471444d054ad16016e0845cf1ac32051d07a296,2025-04-16T18:16:03.417000 -CVE-2024-53304,0,1,2318bd92e15e2309c0bc84c12f501093b2199420a9844e4905b82191a8dd877a,2025-04-16T21:15:45.497000 -CVE-2024-53305,0,1,b764fd9aa197b516e0394c3a3a3a9ee4af1cfff7c69a2a0fea095f72e6f16c4c,2025-04-16T21:15:45.643000 +CVE-2024-53304,0,0,2318bd92e15e2309c0bc84c12f501093b2199420a9844e4905b82191a8dd877a,2025-04-16T21:15:45.497000 +CVE-2024-53305,0,0,b764fd9aa197b516e0394c3a3a3a9ee4af1cfff7c69a2a0fea095f72e6f16c4c,2025-04-16T21:15:45.643000 CVE-2024-53307,0,0,137df246312787bed916a2ce1770dc53fefd470e50062bf21518e03aff4776e9,2025-03-10T18:15:29.373000 CVE-2024-53309,0,0,ae139265b7a1692dfab5ae0e494b54a85093b1cd41c51bb0baefd5e1bf71e5bf,2025-03-17T19:15:23.447000 CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000 @@ -275724,8 +275724,8 @@ CVE-2024-55355,0,0,2bb36a027cfc17a18c27f2dfa7ccd1dd7e44d92fe7cc55df027cf0c874369 CVE-2024-55356,0,0,24a1f90c25942035af99f5d3d7ecc4294dd5cf67c67caa2d1d5b1544ce44efca,2025-01-08T01:15:07.370000 CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c0e,2024-11-21T09:47:53.307000 CVE-2024-5537,0,0,dc964262ed4087ff313c4be3be100753a858d893c6319a531383572e591004b1,2024-05-30T17:15:34.583000 -CVE-2024-55371,1,1,82d309900eb7e9fe5761e0756844ce79b2aa2451b6aeadb49306bc093f1286e8,2025-04-16T21:15:45.790000 -CVE-2024-55372,1,1,7d37afe313187fc2bd94eccc6b6bee9da2384213efd9c427f98958b2e41c4376,2025-04-16T21:15:45.897000 +CVE-2024-55371,0,0,82d309900eb7e9fe5761e0756844ce79b2aa2451b6aeadb49306bc093f1286e8,2025-04-16T21:15:45.790000 +CVE-2024-55372,0,0,7d37afe313187fc2bd94eccc6b6bee9da2384213efd9c427f98958b2e41c4376,2025-04-16T21:15:45.897000 CVE-2024-5538,0,0,349018b8a831720930f224f86428ace57b32dfb3177832784fb8b5e53a9e5993,2024-05-31T11:15:09.923000 CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402acd89,2025-01-07T16:15:36.480000 CVE-2024-55408,0,0,8039c7c557373745154d588f7a6e9302bbcff3813cc276ec09ae1bbee5edf7a3,2025-02-11T01:15:09.410000 @@ -281792,6 +281792,9 @@ CVE-2025-0752,0,0,de749aab58e2326cecf2e69cd47cb06af87bcedce5e0f5e8b795ca284455a6 CVE-2025-0753,0,0,c31e8dbd9d781b37db4d790b1206c27db098e661945670b7848cba0c8afd301c,2025-02-28T22:22:35.957000 CVE-2025-0754,0,0,01e22cbc27c23b2a20fc22b4b38925f42f70aba0e3cf26d239fd3f71faae49ca,2025-01-28T10:15:09.697000 CVE-2025-0755,0,0,a756693274b211f936030a1b123d06fc9f09b8085a54bd20383a0ef5f5b87d9f,2025-03-18T09:15:11.487000 +CVE-2025-0756,1,1,b19b4ad9d0999c3ee0d17438ec3beaaf755e4c5eaecf851e90a5d1f4d6b3fa4b,2025-04-16T23:15:44.400000 +CVE-2025-0757,1,1,1333d61ae224eaaf8e897706699c441f1693dbdc5d606c5b6188a854512eae13,2025-04-16T23:15:44.530000 +CVE-2025-0758,1,1,bebe0b9a3b3c746d022bfd86d3c6e96f9d0fd9a767f835083182a59be9f52ff0,2025-04-16T23:15:44.647000 CVE-2025-0759,0,0,09d991e76c287398c2be16cd3769fbff0d891df9fa18a6f52ed6c200cb01eaf9,2025-02-27T15:15:40.603000 CVE-2025-0760,0,0,00193022d9afa63eab6ac5d740a3221452c3267e0ba03667c14e8712364e5b04,2025-02-26T00:15:10.890000 CVE-2025-0762,0,0,845f3b7f9b4ef02b7a17ddce8a2e2034554a76aa91491302fad198d6d89d5ee0,2025-01-29T15:15:17.687000 @@ -282346,6 +282349,8 @@ CVE-2025-1559,0,0,709a243835f3c6ce0779a28711cc25be41f0a8c4f301b124730fe9903567f9 CVE-2025-1560,0,0,5806fdd5d9f8e8a09704d33fd8caadc121e4fbb048f372fad8d43065a1e4a103,2025-03-06T16:15:42.753000 CVE-2025-1561,0,0,c0dd475a880b302ad58d5da65215c03a4b2329b9f43fd50459164bc801594e00,2025-03-13T05:15:27.890000 CVE-2025-1564,0,0,9d62e5431da133f133499b29bcb96aa13e41c1b673396891299a0b15aab9c828,2025-03-01T08:15:34.007000 +CVE-2025-1566,1,1,131deec3f77b04f991ebb90ff9acb0b1a12b81048eced026f09c31fc85d18cc5,2025-04-16T23:15:44.767000 +CVE-2025-1568,1,1,95c2aba9b91258ec79c0076f946e6906f21b07bb4f34ec498c00ad4c163baa4a,2025-04-16T23:15:44.853000 CVE-2025-1570,0,0,e2c8a697fd328cfac1cb14bcdda0501641702037da6bc6d3e9d43d7d6e474d73,2025-03-06T15:35:59.507000 CVE-2025-1571,0,0,4a5ce435e807c5b239e456baa952536949a7ac8152f73e9932b99f88f9a0505f,2025-03-07T17:29:48.903000 CVE-2025-1572,0,0,d28a5728a56447e48ca8ae17f33703e0f0c8651ed23960a40cc6c85b9a58b7d9,2025-03-06T17:52:25.813000 @@ -282451,6 +282456,7 @@ CVE-2025-1695,0,0,ebd84bb280e3b0fb2974535e719ca217464c50c1c49a0c471a25d6dd4b8516 CVE-2025-1696,0,0,a4ebe2093d6db003a81772653e3b8096038d292b86e17d8021513423bef33f12,2025-03-06T12:15:36.293000 CVE-2025-1702,0,0,8350c512bb427a18e75fe369e7c514680d305e4b55cc00b262ae74877fe4e9d9,2025-03-05T12:15:35.420000 CVE-2025-1703,0,0,50c927778c00387d209f1db495acb3fcdf772388903cfdf917baab839124a719,2025-03-27T16:45:27.850000 +CVE-2025-1704,1,1,c9af1f14e1b0017d573058ecb6c2d538a9b3b02de19ff2ede03e92e5eeb4a9b6,2025-04-16T23:15:44.937000 CVE-2025-1705,0,0,269e355c7cfca537a526c588669165c0e79ec506469175122c59352a58fa4621,2025-03-28T18:11:40.180000 CVE-2025-1707,0,0,eb806af042366277371dce5ba4e4d20eb3821597874c2eb4040b48171f171ef9,2025-03-11T22:15:12.583000 CVE-2025-1714,0,0,6e67e5fe1ad7d1f8ea60e413f9fa7e7e2f63bd8d4c4369040436660c144fa80c,2025-03-07T05:15:16.233000 @@ -282857,6 +282863,7 @@ CVE-2025-20664,0,0,4219106895903f3d40c45e3fe22a99bb379c7467ce7ddab134c6f372463f3 CVE-2025-2067,0,0,e336b7e791e3fd3cb322ecbc1c5f69ca2b6e5c18fb1ce058eaa6d863ecf3dcd2,2025-03-07T05:15:17.527000 CVE-2025-2071,0,0,f72741a6a8cd10ef9b626183eff7ab8b6e66837ba6759a6a57e284a984d113e1,2025-04-01T20:26:30.593000 CVE-2025-2072,0,0,8e644488e83c18f58cc5036e9fa9ebc749bbf6017963c3bc2cbe7baae1385ee2,2025-04-01T20:26:30.593000 +CVE-2025-2073,1,1,f733f36fd03c449e68412edf747220800eb0e3fcf083c2c2f10adab9b8a4f9ec,2025-04-16T23:15:45.610000 CVE-2025-2074,0,0,ca58bf592b5066d06227c815801f5f95341e4e9e4e43bd9476138e9763d951e8,2025-03-28T18:11:40.180000 CVE-2025-2075,0,0,ab55a51247ee2850d4e2152336537ca54db9312a277429beb604e88703e48472,2025-04-07T14:18:15.560000 CVE-2025-2076,0,0,97b36f1e6f07a313a2c81becc36dc64919123b61205ecb45483897067337e6f1,2025-04-07T20:51:08.497000 @@ -283384,14 +283391,14 @@ CVE-2025-21574,0,0,a9e09396da256a71c873f1d7603036dea8ca5b199b826133353b177c18c3b CVE-2025-21575,0,0,b5cea0349cd74a802b56d0c43ed156083e814e7611b9efd28a8942850f7d3df3,2025-04-16T15:15:54.663000 CVE-2025-21576,0,0,8469978b0c3364fc3a7da135c14871569eb91d65a303c0738bfb0493932f55fc,2025-04-16T15:15:54.790000 CVE-2025-21577,0,0,12696179ed4cb03d433f4d52d6702fbc03d5adc396c5a5d666da65646043693d,2025-04-16T15:15:54.913000 -CVE-2025-21578,0,1,cc55bc7568035bc69e2870069584c89382dcaff2bc5a0d10d727bca3cce74819,2025-04-16T21:15:46.080000 -CVE-2025-21579,0,1,d3388049f250b9ffa15b3f3059f6fe1844bad7dae13d6039e83ed04f10fcc7d7,2025-04-16T21:15:46.193000 -CVE-2025-21580,0,1,56dfa4e85b58b4ee478c33fb7a0d1d0c920d73518bf1e631d074de98000794f0,2025-04-16T21:15:46.303000 -CVE-2025-21581,0,1,9c149b66e3275e4f9574a1b5e234f7f21ff0536cfccb7a9b9ff196ddea4a2a36,2025-04-16T21:15:46.413000 -CVE-2025-21582,0,1,73b486e07da32152d0796ff19ab6f451b6bd6889bb5d27f60ead23e8e5584ce9,2025-04-16T21:15:46.527000 +CVE-2025-21578,0,0,cc55bc7568035bc69e2870069584c89382dcaff2bc5a0d10d727bca3cce74819,2025-04-16T21:15:46.080000 +CVE-2025-21579,0,0,d3388049f250b9ffa15b3f3059f6fe1844bad7dae13d6039e83ed04f10fcc7d7,2025-04-16T21:15:46.193000 +CVE-2025-21580,0,0,56dfa4e85b58b4ee478c33fb7a0d1d0c920d73518bf1e631d074de98000794f0,2025-04-16T21:15:46.303000 +CVE-2025-21581,0,0,9c149b66e3275e4f9574a1b5e234f7f21ff0536cfccb7a9b9ff196ddea4a2a36,2025-04-16T21:15:46.413000 +CVE-2025-21582,0,0,73b486e07da32152d0796ff19ab6f451b6bd6889bb5d27f60ead23e8e5584ce9,2025-04-16T21:15:46.527000 CVE-2025-21583,0,0,fc5e501e698193a967bccf982877e2bf49fdd82bf5233cb505b16543178cca76,2025-04-16T13:25:59.640000 -CVE-2025-21584,0,1,1bb5fd3228da83e15506d762334b7eb6e25eb3738beea4c15962e81bfaf0e2f8,2025-04-16T20:15:16.947000 -CVE-2025-21585,0,1,bdb1a1bce2cc87b668ceb99c423d8aad8935f5b10c1d981ae6ae23e79f6c7ba6,2025-04-16T20:15:17.057000 +CVE-2025-21584,0,0,1bb5fd3228da83e15506d762334b7eb6e25eb3738beea4c15962e81bfaf0e2f8,2025-04-16T20:15:16.947000 +CVE-2025-21585,0,0,bdb1a1bce2cc87b668ceb99c423d8aad8935f5b10c1d981ae6ae23e79f6c7ba6,2025-04-16T20:15:17.057000 CVE-2025-21586,0,0,bc1b0dbbae635786848486bd27d63ee575b048d119ff6891efb83f4a54063275,2025-04-16T16:15:29.603000 CVE-2025-21587,0,0,eedad467194fde544fab5917243d8c2a1c7fd2b88079264f6486607d67044c95,2025-04-16T16:15:29.730000 CVE-2025-21588,0,0,f4b970b6c82c586314a19772bb43ae24f77ca27154b8cc695b2ced30e5d02b28,2025-04-16T16:15:29.840000 @@ -284542,7 +284549,7 @@ CVE-2025-22869,0,0,79719125726880f26bc2b13b7ff722f5a8e85ca88bf5332b957a80e592d67 CVE-2025-2287,0,0,8813dfc8049edc90f8c2884aee49dcafb730530912f5261432ad51214abb5088,2025-04-08T18:13:53.347000 CVE-2025-22870,0,0,5e2155600788a6616ffe365d219c4b2615228a685c5d4bcb3d43989a57212eec,2025-03-18T17:15:45.467000 CVE-2025-22871,0,0,5e0c07a56f9d9b1e220de2ed08857b9f0fb1c1919df08a2562023c832dbb7098,2025-04-09T20:02:41.860000 -CVE-2025-22872,0,1,a5255faca646b559f4db0dd5178fef5d605c56546ae2d47b8c518b2c5e94f879,2025-04-16T21:15:46.640000 +CVE-2025-22872,0,0,a5255faca646b559f4db0dd5178fef5d605c56546ae2d47b8c518b2c5e94f879,2025-04-16T21:15:46.640000 CVE-2025-2288,0,0,ea5cf9eb4e5e7d5beb8e92f7104073ba5d1adc8fc07f8a97145fc23482c0367a,2025-04-08T18:13:53.347000 CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000 CVE-2025-22881,0,0,bac764bb844fd45fc50560c993c0edd1d8ed2c5159276215579d0cda943f98d6,2025-02-26T08:14:25.137000 @@ -285428,6 +285435,7 @@ CVE-2025-23995,0,0,fc33427766934e6ec798a3acad36041ca77888d3bd75447ef8556d65238e1 CVE-2025-23996,0,0,044a631ccc7b953428bed6ca4f1e78634642ba7fb893e1284d5301e8ce6e28fa,2025-01-21T18:15:17.503000 CVE-2025-23997,0,0,77e65675aa34b148df76ab43b9568b71cc7208d39621afbe6f65c277717cb0b4,2025-01-21T14:15:13.230000 CVE-2025-23998,0,0,4ced4b8f68a6d09d5a1c825ec6107a84dbbb418c96e80844463996fce823e3ed,2025-01-21T14:15:13.413000 +CVE-2025-2400,1,1,cb277ee1e8117318fb6e147a1b2b1e1371201876775172b424ebe4df769d43b5,2025-04-16T23:15:45.697000 CVE-2025-24001,0,0,2c753840ec158b2e8c5040a7ed2631e45b8667250a806707291f782ebc7cf4aa,2025-01-21T14:15:13.600000 CVE-2025-2401,0,0,180afd0114e466b052cbb68cdf002b3c7d20a7d9b28a41a0f1ffe2ed37af9438,2025-03-17T13:15:39.803000 CVE-2025-24010,0,0,755be8be1475b71408bd0286ec94084c98023c6a02427820a8766e3be39154b8,2025-01-20T16:15:28.730000 @@ -285728,13 +285736,13 @@ CVE-2025-24418,0,0,0b9e05d200d3572fa40b73de6ce7cb0a74c0ccc71a55a2519fc8f76ce03aa CVE-2025-24419,0,0,0dff8daac36e461e8338325349b5de4746cdbc5f9cbaad6fc9787efbaaff8022,2025-04-16T17:17:01.200000 CVE-2025-2442,0,0,4190cd9f490d0cbc14aa7b27b97f63f4216090124f0a62ddf28f2664d24ac2c5,2025-04-09T20:02:41.860000 CVE-2025-24420,0,0,b7284458a856bbe258fa5ccb45ddb789ad78b44c296ba6e8a8c672c9a7711993,2025-04-16T17:16:51.277000 -CVE-2025-24421,0,1,374ccb79614972a85b750ce079529bcc02ec96f30176bc9fbff45f11a13133b3,2025-04-16T20:15:17.170000 +CVE-2025-24421,0,0,374ccb79614972a85b750ce079529bcc02ec96f30176bc9fbff45f11a13133b3,2025-04-16T20:15:17.170000 CVE-2025-24422,0,0,6b8096e72f934f64c5925e489b4e3f03640c514d9fe890dff8b87672bc735ade,2025-04-16T17:16:43.853000 CVE-2025-24423,0,0,bfd9d82bede896d4cb5f22dc83da35beda5e880014994c0510a23aa20fba7396,2025-04-16T17:16:37.320000 CVE-2025-24424,0,0,e55cb3328000bae616509b5a3ca2e3ab08ceda2c9fb430a2bf6e9fa851cfdde3,2025-04-16T17:16:10.380000 CVE-2025-24425,0,0,544e24fb5861c08f50241c0900b75732f7ace8ae9fb499ef3f2243360578a7fd,2025-03-05T18:32:12.530000 CVE-2025-24426,0,0,03bec720441a3a673238f11ac31be6c9efb917575e7a75f14c8f68935f723c76,2025-04-16T17:16:04 -CVE-2025-24427,0,1,4de9d57a157e58e4e2aa891bfde852ec31ccca3f06080766557ca7d9ff39d663,2025-04-16T20:15:17.313000 +CVE-2025-24427,0,0,4de9d57a157e58e4e2aa891bfde852ec31ccca3f06080766557ca7d9ff39d663,2025-04-16T20:15:17.313000 CVE-2025-24428,0,0,d362fd3d6b3216dc8e7bd86c697cdb90a903d9c76b342cb6299162b6ab48e211,2025-03-03T15:51:40.090000 CVE-2025-24429,0,0,3890fb9af95ea402a42f76d7522e17fb69a860e6735ccd8adf88141b140813e6,2025-04-16T14:27:27.770000 CVE-2025-24430,0,0,2d690f4c808e65333c8d6be4dc029f0fb527153402d8560e01c5c3848f8480f7,2025-04-16T14:25:10.510000 @@ -286106,7 +286114,12 @@ CVE-2025-24903,0,0,f94c50d2f0574a93b5b48805712360c1af6392fea087d65c2ed61830aedff CVE-2025-24904,0,0,922b25d3a9b426b643b71230fe8a3d6600552e09598c6cd6bc1bcb32f760c1d1,2025-02-13T16:16:49.053000 CVE-2025-24905,0,0,a12cf1d4a84b7dfc2fc6ddf401dddb1af801de5f0e459b8125fad6e258d821aa,2025-02-13T19:00:37.593000 CVE-2025-24906,0,0,c4750456c80f4de3a8d1ced568cbceb00ad477041c107087bb6724cafda48816,2025-02-13T18:59:59.940000 +CVE-2025-24907,1,1,9e413b69d33bff2ec85f496f439c5e8098d9d4edee10103b2bfdeb1e62457033,2025-04-16T23:15:45.027000 +CVE-2025-24908,1,1,bf4977fdee0b84761f61038bf9e67b8ed9ff407b4a6c9a63105e162dec8c6842,2025-04-16T23:15:45.147000 +CVE-2025-24909,1,1,83597d5e92615d8f839fa2b1324216a6d4c31a7b2c98f79df25daed836296754,2025-04-16T23:15:45.263000 CVE-2025-2491,0,0,a0733df35b55730cd2b5dbe4143a0c5c885964cd78e8115aea22f767407fa474,2025-03-18T15:16:01.707000 +CVE-2025-24910,1,1,aea5315d6f9ea58ab4df3c550695318661f5efb240546e707ff4d04dea9d573d,2025-04-16T23:15:45.373000 +CVE-2025-24911,1,1,af0824fa76e4a0ae20e6cfaa00aa9282068832b4deb84412b81b5535baed6d30,2025-04-16T23:15:45.490000 CVE-2025-24912,0,0,d10f05928f11c7a00e2a62c8635f9af5917fec081444b4d22020eb25a54c0654,2025-03-12T05:15:37.430000 CVE-2025-24915,0,0,24c26ca53ef1e2928a50350b0dbd455453bdc6581f1752ca8926cd09252dcb45,2025-03-21T15:15:42.020000 CVE-2025-24920,0,0,f7f8f763bf4982c0df509bbeae99871e92e5c9a0b38af941d8b9c06be0af01ab,2025-03-27T14:10:53.500000 @@ -286334,6 +286347,7 @@ CVE-2025-25224,0,0,a4f44e8389415111624e6d3b431cded203f069a8e58de6c5b5f4eb5c08d09 CVE-2025-25225,0,0,50e1db0214d749384eee9692d10836c10107d4550447d640f020938a4553ed14,2025-03-18T17:15:45.920000 CVE-2025-25226,0,0,c1d011e8e7ba6b6c9f469aa960fb7064e4361a6d4416d3477e347671e561cfd3,2025-04-09T15:16:01.923000 CVE-2025-25227,0,0,14dde9d48b40850eb1a2d705436b8ead1fc46d2a4e1905b71e2c6de779c3c0c1,2025-04-08T19:15:47.290000 +CVE-2025-25230,1,1,8a2ad333af0aca7a154e89624242b3f795e091cda3ab656868bad784eeea0af0,2025-04-16T22:15:14.073000 CVE-2025-25241,0,0,f70d628c4466ad6abe844cd65a2579f5c9e5af240d0c56eadc1f05ff31a52618,2025-02-18T18:15:34.967000 CVE-2025-25242,0,0,9434714e72888d1a52e5bad48430408baa107619f6e4dcba8f508d71d8cfd58f,2025-03-11T01:15:34.777000 CVE-2025-25243,0,0,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72aa0,2025-02-18T18:15:35.160000 @@ -286692,7 +286706,7 @@ CVE-2025-26127,0,0,ff848518068745ae246227c687011816436068efa4d4914700821387766f6 CVE-2025-26136,0,0,2adb34c79a3ec7fe584c4e7725e79c104805fdaa01d3b24e5975e14259ccd144,2025-03-05T17:15:16.017000 CVE-2025-26137,0,0,004205e5376adff96c010e010531e03852f5eb4905a1a3c73ed331cf2f44f325,2025-04-01T20:37:44.117000 CVE-2025-26138,0,0,4c83b447574a31d9857c309d7f5649f5104ee78c2e6617a4327eaace6a44e40b,2025-04-01T20:37:28.490000 -CVE-2025-26153,1,1,99e4c74aa7b3148191d29e10b48d2751daf5f248d0cc62d9d1636ff13c76d613,2025-04-16T21:15:46.770000 +CVE-2025-26153,0,0,99e4c74aa7b3148191d29e10b48d2751daf5f248d0cc62d9d1636ff13c76d613,2025-04-16T21:15:46.770000 CVE-2025-26156,0,0,962eae3fa0ac2ee7ef9345ac9060a4193d262807409fdde8171c1e14753b4430,2025-04-02T18:49:33.170000 CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000 CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000 @@ -287800,7 +287814,7 @@ CVE-2025-2803,0,0,e47ecd50bab8435762f20a0360685d74e0ceaca5cc3e5df3e0509ccc4da5c5 CVE-2025-2804,0,0,05befb6a988325f06e55dd5b0c814f5549862889b3223abfcf82e08eebaa0244,2025-03-28T18:11:40.180000 CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d084,2025-04-11T15:39:52.920000 CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000 -CVE-2025-28072,1,1,d19de959c1a426b8392743735e0bc8eb43cb6f87a1dfb27d8c072076f3f51fae,2025-04-16T21:15:46.883000 +CVE-2025-28072,0,0,d19de959c1a426b8392743735e0bc8eb43cb6f87a1dfb27d8c072076f3f51fae,2025-04-16T21:15:46.883000 CVE-2025-2808,0,0,2d9ef6fcbe323df90c90b4e91a51bb82e8f5ef9746894b9f5e9c32273a3c6988,2025-04-08T18:13:53.347000 CVE-2025-28087,0,0,1a24fc8fa031815998ab3cec95d83c4ceea417049d18cb4b484e469d0233d5a6,2025-04-07T14:22:33.160000 CVE-2025-28089,0,0,67dcb00b253159ea36147dba2ae48f5f5632d8f7c0e820c0f6cd1525d263b4dd,2025-04-07T14:20:46.543000 @@ -288133,23 +288147,23 @@ CVE-2025-2964,0,0,ec69ae3f38e343756ba814c2e5955dca4ab2cdb43321644a6a3ca4d2fda05b CVE-2025-29640,0,0,10d69d5153affdfdd1cfbbf32b1c82cf02889c3684c0ecfe28cc371bbe51cc15,2025-04-01T20:23:29.113000 CVE-2025-29641,0,0,07728e025c7edec0a6c57cfca48077e7931db6a66e70d6357266b91cead71f8a,2025-04-01T20:23:16.657000 CVE-2025-29647,0,0,b2c68859973ff17d99e38be6964fb50b00d742d76463efee1e3f756976e68d06,2025-04-08T20:15:30.700000 -CVE-2025-29648,1,1,3da34d143cb76b9e6cdc7f07c5a45cdfc6673e59bed4a387a91eee3a985ae63f,2025-04-16T21:15:46.993000 -CVE-2025-29649,1,1,7ee42729c8da140fc26bbe04aabbcdc7696a5ad9859c7d032fbea5ba895dc252,2025-04-16T21:15:47.147000 +CVE-2025-29648,0,0,3da34d143cb76b9e6cdc7f07c5a45cdfc6673e59bed4a387a91eee3a985ae63f,2025-04-16T21:15:46.993000 +CVE-2025-29649,0,0,7ee42729c8da140fc26bbe04aabbcdc7696a5ad9859c7d032fbea5ba895dc252,2025-04-16T21:15:47.147000 CVE-2025-2965,0,0,b1d83303c83fa5c453f89d281c2631e556dad3281735af3c32f95354d255295b,2025-04-04T01:15:39.727000 -CVE-2025-29650,1,1,12ba4c5d3b709b2e4a7aaf3779615fbf88a7cfa9742f4a27b3b6f2ad14e3f87c,2025-04-16T21:15:47.307000 -CVE-2025-29651,1,1,67dc7a89b2f19fb8a612f38cc8faf3aa56e8f01962388e71b22c5d8fd741a29b,2025-04-16T20:15:17.760000 -CVE-2025-29652,1,1,27d24f9ef4f73977fc01d99610d4bf3cf156bc77f94e9ebc2b03f3164d7ee36d,2025-04-16T20:15:17.860000 -CVE-2025-29653,1,1,b81026b785a38e3f2f8169b6323d723309a175ed17bd463588a943999d00ffb0,2025-04-16T20:15:17.963000 +CVE-2025-29650,0,0,12ba4c5d3b709b2e4a7aaf3779615fbf88a7cfa9742f4a27b3b6f2ad14e3f87c,2025-04-16T21:15:47.307000 +CVE-2025-29651,0,0,67dc7a89b2f19fb8a612f38cc8faf3aa56e8f01962388e71b22c5d8fd741a29b,2025-04-16T20:15:17.760000 +CVE-2025-29652,0,0,27d24f9ef4f73977fc01d99610d4bf3cf156bc77f94e9ebc2b03f3164d7ee36d,2025-04-16T20:15:17.860000 +CVE-2025-29653,0,0,b81026b785a38e3f2f8169b6323d723309a175ed17bd463588a943999d00ffb0,2025-04-16T20:15:17.963000 CVE-2025-2966,0,0,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000 CVE-2025-2967,0,0,14b33c1f634d82e0ee8f6eba9d8900eb26f8e5ef6b28fe9846307dc0432895cc,2025-04-04T01:15:39.857000 CVE-2025-2968,0,0,2f5310773b41e32a0609f9013ca63505bab1761feb2b83c508abd214cd1156b1,2025-04-04T01:15:39.930000 CVE-2025-2969,0,0,2c92f9aaf929a695828188a9354c9039b1da27ec28571736050e209bd0423cad,2025-04-04T01:15:40 CVE-2025-2970,0,0,67c007e67877a94fb703f9d730b81129ea1f6387e2e40954ff831fd4807254f0,2025-04-04T01:15:40.067000 CVE-2025-29705,0,0,d50bc7403680eaf9635e360140860dd9bb945ed47cbe680766215a624ae6d64d,2025-04-15T19:16:07.783000 -CVE-2025-29708,1,1,1b936c2bef687442f32dab496c57f1d66f2e2d3c0a38db41b624c108c02dde0b,2025-04-16T21:15:47.460000 -CVE-2025-29709,1,1,932dae08215d3f213c20e372aa7f6bae05253d357dc51ffe3dc2d9daa73c3892,2025-04-16T21:15:47.570000 +CVE-2025-29708,0,0,1b936c2bef687442f32dab496c57f1d66f2e2d3c0a38db41b624c108c02dde0b,2025-04-16T21:15:47.460000 +CVE-2025-29709,0,0,932dae08215d3f213c20e372aa7f6bae05253d357dc51ffe3dc2d9daa73c3892,2025-04-16T21:15:47.570000 CVE-2025-2971,0,0,2706995c55a7dbc3fec5708d9b29d92444bde85b5e349db5ecc56094ac7bd4d7,2025-04-07T23:15:43.050000 -CVE-2025-29710,1,1,dee2aeeefd0cbcfd27cec824c1f69b3a17aead5c60c2a7ae2f11b184679dbfa4,2025-04-16T21:15:47.673000 +CVE-2025-29710,0,0,dee2aeeefd0cbcfd27cec824c1f69b3a17aead5c60c2a7ae2f11b184679dbfa4,2025-04-16T21:15:47.673000 CVE-2025-29719,0,0,8e7057a22540e0bc6e719ee80087d1e3317b2b2e7c0e51bfcdcdafe3f5440328,2025-04-10T14:27:50.553000 CVE-2025-2972,0,0,9bd90eb57737eba9afab46fcd8061576d92129d2495ebdef7228d08af4388952,2025-04-04T01:15:40.127000 CVE-2025-29720,0,0,5ec932914a7d81da0b10599d75c12821d0c2e8eb7f364340baae17593b19712a,2025-04-15T18:39:27.967000 @@ -288665,7 +288679,7 @@ CVE-2025-30676,0,0,708f03a86f4c884ecda3f7ec1e5552de291778e3e25b801a6e5af963ebcc8 CVE-2025-30677,0,0,ac691303aa13f8ca9aabebde82f77f60d124e3f5ca096d5288780405b88472c8,2025-04-09T20:02:41.860000 CVE-2025-3068,0,0,de66f3afaa7fd4a67fa9d3ab57331fb0ab9491ba6c44d88f9dc6104a16396311,2025-04-07T13:30:02.277000 CVE-2025-30681,0,0,4df1a0ccddde5b4d4b0622c7fe532b814342d38bcc00203e31b1f646e89182ca,2025-04-16T15:16:10.170000 -CVE-2025-30682,0,1,fe35e0394f10a4326a81f1b241655702139d45ca0593a3de705be42a73d1d5b9,2025-04-16T20:15:18.057000 +CVE-2025-30682,0,0,fe35e0394f10a4326a81f1b241655702139d45ca0593a3de705be42a73d1d5b9,2025-04-16T20:15:18.057000 CVE-2025-30683,0,0,dfb46681e1e59b565bc83c636f71466021abac81c31b453250c455b92d603736,2025-04-16T19:15:54.427000 CVE-2025-30684,0,0,15008d8313d4203976158462220def7dc846c59d125fdc600532d4a20c98fe92,2025-04-16T18:16:05.883000 CVE-2025-30685,0,0,b11ad9fe469b2e477ef6f442fb9ad983947cfbc2eea7daf5b8990f68288fdb15,2025-04-16T16:15:32.263000 @@ -288678,25 +288692,25 @@ CVE-2025-30690,0,0,917158df2f0cd108363ac9d8cc3bade204129e43a71903793648e3489f357 CVE-2025-30691,0,0,dda84764d10c0d6f81fbaef02ece4df64b6294b34df1ae31a78a50c2c099b84f,2025-04-16T16:15:32.937000 CVE-2025-30692,0,0,3161b1f45cecc0a3afa599c1e2826c52f9889c53e2e1e051bcda24c2c2b8b347,2025-04-16T16:15:33.047000 CVE-2025-30693,0,0,75f314d64704b70bf300b7ed3580bcd4d63da3c4e153b93bab0afaa3cf1d9920,2025-04-16T16:15:33.170000 -CVE-2025-30694,0,1,3270f0d1f242541086999443784f1cd2ae7e6e36bd12ded2ce33f68713f1412d,2025-04-16T20:15:18.170000 -CVE-2025-30695,0,1,2259babac90148ca0f8ef98c77c3d74f76871fb763868abadc6c539961445241,2025-04-16T20:15:18.283000 +CVE-2025-30694,0,0,3270f0d1f242541086999443784f1cd2ae7e6e36bd12ded2ce33f68713f1412d,2025-04-16T20:15:18.170000 +CVE-2025-30695,0,0,2259babac90148ca0f8ef98c77c3d74f76871fb763868abadc6c539961445241,2025-04-16T20:15:18.283000 CVE-2025-30696,0,0,2f823080fbe70fb899d8f476b24ec728b0cc68b2de13d0cea5269a793f1e80e3,2025-04-16T16:15:33.283000 -CVE-2025-30697,0,1,86ddb528e2c1a9a055b5089342128d39381f5a1c9cc6693f91ae347d629e6342,2025-04-16T20:15:18.393000 +CVE-2025-30697,0,0,86ddb528e2c1a9a055b5089342128d39381f5a1c9cc6693f91ae347d629e6342,2025-04-16T20:15:18.393000 CVE-2025-30698,0,0,2e0b4ef6a51249a61f937633b8ef9af318b928a4049f1fa2c2faad62ebe3457e,2025-04-16T16:15:33.397000 -CVE-2025-30699,0,1,1b3bb43705540e565eb0b82cb732e4633d529358091e103d547ad7fe3f656513,2025-04-16T20:15:18.507000 +CVE-2025-30699,0,0,1b3bb43705540e565eb0b82cb732e4633d529358091e103d547ad7fe3f656513,2025-04-16T20:15:18.507000 CVE-2025-3070,0,0,389eca2715a25e0502dfee20fa689abffda48144e371016d21a2980b0deeba8c,2025-04-07T13:28:06.423000 -CVE-2025-30700,0,1,6df59879402b5165b4d6b565ee0d1d6d0889572749e13acadb2451d22731ed25,2025-04-16T20:15:18.620000 +CVE-2025-30700,0,0,6df59879402b5165b4d6b565ee0d1d6d0889572749e13acadb2451d22731ed25,2025-04-16T20:15:18.620000 CVE-2025-30701,0,0,9a22cceb291a84409cb4437a523f205f65c6a58cdcb79e514955aa3eee0cd30c,2025-04-16T15:16:10.393000 CVE-2025-30702,0,0,5da8d5ca5c5c79a758df420f71d9d826caea9751a114f91b5b9edc6917be1cf2,2025-04-16T13:25:59.640000 CVE-2025-30703,0,0,ac760d0ffb27e2362ca52455f2f6be4e2b15aaabab9becab9ba5568298facdcc,2025-04-16T15:16:10.507000 CVE-2025-30704,0,0,3dadef73d41fba2c7391c893a130d13093bdcfbdccc65f3e41b2e688cc13531c,2025-04-16T15:16:10.613000 CVE-2025-30705,0,0,fce181c4d0f09d4cca66173f8d721e43a514d20bb8ffb16ff1e55ad80a51f057,2025-04-16T14:15:24.910000 CVE-2025-30706,0,0,e378eba725d84697ff58c04d29694e6a01c8a9a5f40009abeeb03db5c718db01,2025-04-16T14:15:25.037000 -CVE-2025-30707,0,1,6a914893ca34bf2dabf74d3bce729b9adf8170abd5fd1a999e2256dd0171cc7a,2025-04-16T20:15:18.743000 +CVE-2025-30707,0,0,6a914893ca34bf2dabf74d3bce729b9adf8170abd5fd1a999e2256dd0171cc7a,2025-04-16T20:15:18.743000 CVE-2025-30708,0,0,79986e2b81e871fbc68eefc7bab3eb8146dedadebe143d92f70268194a98022c,2025-04-16T13:25:59.640000 -CVE-2025-30709,0,1,ce664d2db63a71790a627ed826cd05280bb2e3736149e236ac0b210115a9a9ca,2025-04-16T20:15:18.853000 +CVE-2025-30709,0,0,ce664d2db63a71790a627ed826cd05280bb2e3736149e236ac0b210115a9a9ca,2025-04-16T20:15:18.853000 CVE-2025-3071,0,0,d16bcf87876b69db8889459754164a9a7a5a7660b7bb26af9304dff3429a1889,2025-04-10T21:15:49.347000 -CVE-2025-30710,0,1,a5121b4e4191508eb6ce8d319d1d00e60f5016db8c92efd77eaa69ea703dae61,2025-04-16T20:15:18.967000 +CVE-2025-30710,0,0,a5121b4e4191508eb6ce8d319d1d00e60f5016db8c92efd77eaa69ea703dae61,2025-04-16T20:15:18.967000 CVE-2025-30711,0,0,1e5465f558efc4782f831dbcabf3c5891d8231c2999b8198eb1d5bb90ab63b46,2025-04-16T16:15:33.523000 CVE-2025-30712,0,0,eac5b0b99e5f8b50cb56cbe2ee1e629963db68c1e9d3f1fc4db92b2affc433d4,2025-04-16T16:15:33.633000 CVE-2025-30713,0,0,1b9f9946ae908a48170d2a70a15ad8fb04aa712960921de2c1d56c95c39b0df1,2025-04-16T16:15:33.747000 @@ -289186,6 +289200,7 @@ CVE-2025-31474,0,0,5e7d6600ce1174be36633aec5902c9252df21c2f48f1552b8554d9d1218e3 CVE-2025-31475,0,0,d054ab98458109d671d2e3362598fabc0f69079fd0804798837af9591fe8f8e4,2025-04-08T18:14:17.307000 CVE-2025-31476,0,0,2278ecebe988f2494770aa5bcdde199a741030c5fdfef8bf4f1b7a701a4a759f,2025-04-08T18:14:17.307000 CVE-2025-31477,0,0,54285781555488a3668d04893deec45a9e20dfdee4ab1c462d402e7283dfccb5,2025-04-07T14:18:34.453000 +CVE-2025-31478,1,1,b6da6719d326840f501df7f1408ff1de3712392cf9832b5493957c7da4075620,2025-04-16T22:15:14.233000 CVE-2025-31479,0,0,2697cc1817114968aab8eafa22f3d26b926cb32529ad7873759be5d99c686601,2025-04-07T14:18:34.453000 CVE-2025-3148,0,0,b333acfda68d66ad1bae1483d9c733fd29bd9303bc53eccbc0d0767f3d1c789f,2025-04-07T14:18:34.453000 CVE-2025-31480,0,0,dfb43594bbbdcf12c97680368525c0c40e65f0938db26f1a8caa293eb7101deb,2025-04-07T14:18:15.560000 @@ -289869,6 +289884,7 @@ CVE-2025-32426,0,0,97f7719ef42c67257e2006b52ab9747f51788ff83c926fc892139743aec5a CVE-2025-32427,0,0,0416426b54022f69535fafb066a105f3453a61c3cc047d8982deab84a0710a9d,2025-04-11T15:39:52.920000 CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b345a,2025-04-15T18:39:27.967000 CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000 +CVE-2025-32433,1,1,6df07494c15d475f1de4e347159ef40acf96f28d5ebdbbd82bad602c3cb04a2c,2025-04-16T22:15:14.373000 CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000 CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000 CVE-2025-32439,0,0,bc2ffe14216b9cfe29b31e6fc5be13f4870b9bbc8f43f42b1dd5fa85872b2005,2025-04-16T13:25:59.640000 @@ -290056,12 +290072,16 @@ CVE-2025-32778,0,0,93333c106bade1942d189295a57ca8b886e6e79a18429247cda3fa2e156f8 CVE-2025-32779,0,0,9b0c0f3e1679aa6a29c07a0230230eddd75bcf03028ff914fcc18fd0552bd825,2025-04-15T18:39:27.967000 CVE-2025-32780,0,0,66c032871841ee8f1135c9a708f1264f3edee13154b2ee90fcea8f285386936f,2025-04-15T18:39:27.967000 CVE-2025-32782,0,0,ea3e82903e807a520de4c91c10f7d08fd70839175e235aa475d1b12f4a8b1338,2025-04-16T13:25:37.340000 +CVE-2025-32783,1,1,9698e9ba7093dbb73e35c4e21de6279231499f6c0dd02d871a6cc5ae64c5a62f,2025-04-16T22:15:14.523000 CVE-2025-32784,0,0,f07e1bae891c8076c2e74beba24dfa0a792bdc8c6b542f23984d9697f06bd191,2025-04-16T13:25:37.340000 +CVE-2025-32787,1,1,585e3d1455b8a84e795030e7b0dc4099402e56b99d1c15594a4fd6dc0fe73b3d,2025-04-16T22:15:14.667000 +CVE-2025-32789,1,1,1db70b23989b905b2aba1aa6683b57fe707a22cfe3f1f5347c6f92571a95f8a6,2025-04-16T22:15:14.800000 +CVE-2025-32791,1,1,cce811760929409bbc0164cd7083266c1ecce2c2b4b86cf82e6643b37c8fea15,2025-04-16T22:15:14.943000 CVE-2025-32807,0,0,791ea9650394de4a3c6a4bce28448af084ce5e8fb834d69b1769b35b955fdca4,2025-04-11T15:39:52.920000 CVE-2025-32808,0,0,4460b802a312298836218e51f145ee69f847802ae0b680f0631fd4c9d767af72,2025-04-11T16:15:20.673000 CVE-2025-32809,0,0,ca90ff3ced06efa4e939486b48b76783f1482c86186847921ab08cd5bd99e3d5,2025-04-11T16:15:20.807000 CVE-2025-32816,0,0,7146ab229fea4de6245a9faadeb60513e017f27b734755baaf195d3f55011510,2025-04-11T15:39:52.920000 -CVE-2025-32817,1,1,2ce554c565fb4e62b3c662311b1ce451f78c307581785975384122d9afebc7f3,2025-04-16T21:15:47.780000 +CVE-2025-32817,0,0,2ce554c565fb4e62b3c662311b1ce451f78c307581785975384122d9afebc7f3,2025-04-16T21:15:47.780000 CVE-2025-3282,0,0,4f7d1b48e17ccd00afeee2e7a595ed2b28190fc5a8aec67b855d00f5d80e0bc2,2025-04-15T18:39:27.967000 CVE-2025-32822,0,0,367ecfacf3c74140480293afb0501d7a53327500a3de5132d335460df99583f3,2025-04-16T18:16:07.973000 CVE-2025-32823,0,0,d69c9859ee28ca28e054ef2b051867a5f7aaf3609eea5ca6dfa5f7794f4d36be,2025-04-16T18:16:08.120000 @@ -290346,8 +290366,8 @@ CVE-2025-3612,0,0,b3e7e1fd46c9147c27f3feb15d1a5ba8eabce3f8bab41f1f78e6d74dff7b1b CVE-2025-3613,0,0,9c314abbc6473987a4462c7f86d0ede7026d1a1d89f3e10127913343b31eedd8,2025-04-15T18:39:27.967000 CVE-2025-3617,0,0,8b166380afe19241854c65e4319a7a4bf7fa4a3b21b435fec16e6239c6e67cc8,2025-04-15T18:39:27.967000 CVE-2025-3618,0,0,eda45473138c6808735db2df162e6171a422dd9195142056b67b3d52202066c7,2025-04-15T18:39:27.967000 -CVE-2025-3619,1,1,53be325581dce300b9e806b9d83ff7fe2c4e86a07254b58c0415f8bff201f32e,2025-04-16T21:15:47.920000 -CVE-2025-3620,1,1,5027351bfa6940e7b37854be13f32b3ecf3f384d9c50497367f237f03836a78e,2025-04-16T21:15:48.027000 +CVE-2025-3619,0,0,53be325581dce300b9e806b9d83ff7fe2c4e86a07254b58c0415f8bff201f32e,2025-04-16T21:15:47.920000 +CVE-2025-3620,0,0,5027351bfa6940e7b37854be13f32b3ecf3f384d9c50497367f237f03836a78e,2025-04-16T21:15:48.027000 CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac885,2025-04-15T18:39:27.967000 CVE-2025-3663,0,0,1ce80bfc94e480b50f27d0432deca8fffb2ad8de6b84f90469934d90488bc703,2025-04-16T13:25:37.340000 CVE-2025-3664,0,0,1768dbec432a631292ab0792b91b23e446ed218ac7ee245b57fd6eb101bb8145,2025-04-16T14:15:27.827000 @@ -290360,11 +290380,11 @@ CVE-2025-3675,0,0,8fc64576d9408584769dca7b251b2811cba19ed1b29b0a5e250c895856174a CVE-2025-3676,0,0,8b3fc538dc5f1e3498af0923d848cb34d8a7c1143698b7acb611e22232098068,2025-04-16T13:25:37.340000 CVE-2025-3677,0,0,d0b4158217f3756823f68a8901374ac1abc98276cdc21fdc8b5cbe01ac5c1b87,2025-04-16T13:25:37.340000 CVE-2025-3678,0,0,fe7f9b10b498ab4c4118f8e6f6b85a631558210b3c32871c50930a944540940a,2025-04-16T13:25:37.340000 -CVE-2025-3679,0,1,9bcb800b5750e50910dcb692b53ba75fe416d21db6bb5123a1610ed36ae21b8e,2025-04-16T20:15:19.250000 -CVE-2025-3680,0,1,7c2e2289a4ab431cadffbfde63d0b9369934e915e62431b56f236c8cff8a93bc,2025-04-16T20:15:19.350000 -CVE-2025-3681,0,1,9873c454c08220b0a960b47b4de43158baa86f135fdd0640a80430eb44cb01cf,2025-04-16T20:15:19.460000 -CVE-2025-3682,0,1,b2affd3113c936746dbb5cf91e86a34d1e8ebeb7aa65e59a9cf1b600e5c26a70,2025-04-16T20:15:19.570000 -CVE-2025-3683,0,1,f37c23cdc7eabdf77512b1e225cee276025d8f967ad5af14a2c8a2cad9f3d57f,2025-04-16T20:15:19.670000 +CVE-2025-3679,0,0,9bcb800b5750e50910dcb692b53ba75fe416d21db6bb5123a1610ed36ae21b8e,2025-04-16T20:15:19.250000 +CVE-2025-3680,0,0,7c2e2289a4ab431cadffbfde63d0b9369934e915e62431b56f236c8cff8a93bc,2025-04-16T20:15:19.350000 +CVE-2025-3681,0,0,9873c454c08220b0a960b47b4de43158baa86f135fdd0640a80430eb44cb01cf,2025-04-16T20:15:19.460000 +CVE-2025-3682,0,0,b2affd3113c936746dbb5cf91e86a34d1e8ebeb7aa65e59a9cf1b600e5c26a70,2025-04-16T20:15:19.570000 +CVE-2025-3683,0,0,f37c23cdc7eabdf77512b1e225cee276025d8f967ad5af14a2c8a2cad9f3d57f,2025-04-16T20:15:19.670000 CVE-2025-3684,0,0,005ffbd66ba10e6ec962169c35b3b4430afe7279dee228e65b372cdafae7a9a2,2025-04-16T19:15:55 CVE-2025-3685,0,0,a038f7016d9d7aee9eb0536d9d006e5189794d512e4af0149f231284d7782e60,2025-04-16T13:25:37.340000 CVE-2025-3686,0,0,7959444999d939397b75d41bf9d8d3af522c96b7a107cfe0f6ed3f78546dfcf6,2025-04-16T13:25:37.340000 @@ -290379,15 +290399,15 @@ CVE-2025-3694,0,0,cbb6dbf67e78d678a0c32ccc77f656ed9d7bcf54631f37150d9885e2b9018d CVE-2025-3696,0,0,2bf939535fa8806cc4e793051666a9e5b91fe8b6ba8aa52a4170f8f7466c8498,2025-04-16T15:16:14.287000 CVE-2025-3697,0,0,8d41cda9f6cb466619110c3390fbf369e5e587d610bb308b7d6acf4a2a9ce41f,2025-04-16T15:16:14.460000 CVE-2025-3698,0,0,06aad761edbce101a35f9e95ce891a7c8bf2c6f046c74b9a4ac2fd5d41b56e3f,2025-04-16T14:15:29.060000 -CVE-2025-3723,1,1,5516734ea7b429349db8183353c9a6cae93c902d21883c623672896a15824d8e,2025-04-16T20:15:19.777000 -CVE-2025-3724,1,1,b85ef0c50063e0bc0a94629cd54a3778b9c0b8cb45af733f3dc605edb78eb841,2025-04-16T20:15:19.960000 -CVE-2025-3725,1,1,e1421461a06ac674145797f32b0167a7b02acb5d56dcbf6a2e44bcbcd002b389,2025-04-16T20:15:20.123000 -CVE-2025-3726,1,1,ba5a7988087a4ee7bf038eaaebf307f105486224e8c1b5abec59c2ac84c52ae8,2025-04-16T20:15:20.283000 -CVE-2025-3727,1,1,deaa5654d11615e965237b87eac3fb0356d5fa7e28c50ec7abd875586cde793c,2025-04-16T21:15:48.203000 -CVE-2025-3728,1,1,d227904395147b87ad7d649add61aa5661016d64da3169ef547e709d8ac74dd4,2025-04-16T21:15:48.363000 -CVE-2025-3729,1,1,e1f3f5695da5391fb19903ebea12f1b012caf6712d19a7605b0164067d14c993,2025-04-16T21:15:48.537000 -CVE-2025-3730,1,1,bf8196d9cc10cb8b06b520303adb009d6c422cc02d5140a90b09421a483cdfc5,2025-04-16T21:15:48.700000 -CVE-2025-3733,0,1,b7ac17b7c057f630b68a81a505102cdcfef6e13156a11c36cc53f363146b133e,2025-04-16T21:15:48.873000 +CVE-2025-3723,0,0,5516734ea7b429349db8183353c9a6cae93c902d21883c623672896a15824d8e,2025-04-16T20:15:19.777000 +CVE-2025-3724,0,0,b85ef0c50063e0bc0a94629cd54a3778b9c0b8cb45af733f3dc605edb78eb841,2025-04-16T20:15:19.960000 +CVE-2025-3725,0,0,e1421461a06ac674145797f32b0167a7b02acb5d56dcbf6a2e44bcbcd002b389,2025-04-16T20:15:20.123000 +CVE-2025-3726,0,0,ba5a7988087a4ee7bf038eaaebf307f105486224e8c1b5abec59c2ac84c52ae8,2025-04-16T20:15:20.283000 +CVE-2025-3727,0,0,deaa5654d11615e965237b87eac3fb0356d5fa7e28c50ec7abd875586cde793c,2025-04-16T21:15:48.203000 +CVE-2025-3728,0,0,d227904395147b87ad7d649add61aa5661016d64da3169ef547e709d8ac74dd4,2025-04-16T21:15:48.363000 +CVE-2025-3729,0,0,e1f3f5695da5391fb19903ebea12f1b012caf6712d19a7605b0164067d14c993,2025-04-16T21:15:48.537000 +CVE-2025-3730,0,0,bf8196d9cc10cb8b06b520303adb009d6c422cc02d5140a90b09421a483cdfc5,2025-04-16T21:15:48.700000 +CVE-2025-3733,0,0,b7ac17b7c057f630b68a81a505102cdcfef6e13156a11c36cc53f363146b133e,2025-04-16T21:15:48.873000 CVE-2025-3734,0,0,08cd08d68803ebc3e247bc1dda5293ff05ed4a522f0928f26aaf66ccad8a7816,2025-04-16T18:16:19.783000 CVE-2025-3735,0,0,c1ccc9a6fec3403e3777364d2dc3fbbbbb4b443b6d4510a9318f951740e87950,2025-04-16T17:15:50.030000 CVE-2025-3736,0,0,564cad71b1e7fa3df569cf41ca780256dc009f1642d469d423a441d1ee8e0570,2025-04-16T17:15:50.113000 @@ -290453,3 +290473,5 @@ CVE-2025-39599,0,0,b32165e9ac35cddc8365b5382966b3cdc907609baee89eedf472d2eeabdae CVE-2025-39600,0,0,ff53b226229c137b254fd094b41c03f9992afdd195d414242990f0faaac29b77,2025-04-16T13:25:37.340000 CVE-2025-39601,0,0,7f3568c982e2cbdfe236a2b826bbacce5227350e296ed75f61b4bbcedef35537,2025-04-16T13:25:37.340000 CVE-2025-39602,0,0,df27de5ee22e5ec9d9d74c987812c0381cd04ef064c0d9455c3c07c5309a9403,2025-04-16T13:25:37.340000 +CVE-2025-43703,1,1,316b9a83c3b6dc513c619095e9530484f6e664a6d636deeaf4e977dce37bdf17,2025-04-16T22:15:15.083000 +CVE-2025-43704,1,1,4cfc0104734e3f2a02f1a096d88581f78932e3288ecf4dc711d8c50bc120846e,2025-04-16T23:15:45.770000