mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-04-16T23:55:19.741186+00:00
This commit is contained in:
parent
bd48cfe7d8
commit
1aef2801ee
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2021-21353",
|
"id": "CVE-2021-21353",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2021-03-03T02:15:13.143",
|
"published": "2021-03-03T02:15:13.143",
|
||||||
"lastModified": "2024-11-21T05:48:11.043",
|
"lastModified": "2025-04-16T23:15:44.197",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -87,7 +87,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
56
CVE-2025/CVE-2025-07xx/CVE-2025-0756.json
Normal file
56
CVE-2025/CVE-2025-07xx/CVE-2025-0756.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0756",
|
||||||
|
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"published": "2025-04-16T23:15:44.400",
|
||||||
|
"lastModified": "2025-04-16T23:15:44.400",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Overview \n\n\n\n\u00a0\n\n\n\nThe product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not restrict JNDI identifiers during the creation of platform data sources. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nAn attacker could gain access to or modify sensitive data or system resources. This could allow access to protected files or directories including configuration files and files containing sensitive information, which can lead to remote code execution by unauthorized users."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.1,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-99"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://https://support.pentaho.com/hc/en-us/articles/35771876077709--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Improper-Control-of-Resource-Identifiers-Resource-Injection-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0756",
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-07xx/CVE-2025-0757.json
Normal file
56
CVE-2025/CVE-2025-07xx/CVE-2025-0757.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0757",
|
||||||
|
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"published": "2025-04-16T23:15:44.530",
|
||||||
|
"lastModified": "2025-04-16T23:15:44.530",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Overview\n\n\n\n\u00a0\n\n\n\nThe software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, allow a malicious URL to inject content into the Analyzer plugin interface. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nOnce the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim's machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||||
|
"baseScore": 4.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.7,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.pentaho.com/hc/en-us/articles/35781038882445--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0757",
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-07xx/CVE-2025-0758.json
Normal file
56
CVE-2025/CVE-2025-07xx/CVE-2025-0758.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0758",
|
||||||
|
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"published": "2025-04-16T23:15:44.647",
|
||||||
|
"lastModified": "2025-04-16T23:15:44.647",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Overview\u00a0\n\n\n\nThe product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. (CWE-732)\u00a0\n\n\n\nDescription\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, is installed with Karaf JMX beans enabled and accessible by default.\u00a0\n\n\n\nImpact\u00a0\n\n\n\nWhen the vulnerability is leveraged, a user with local execution privileges can access functionality exposed by Karaf beans contained in the product."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 4.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-732"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.pentaho.com/hc/en-us/articles/35781318194061--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Incorrect-Permission-Assignment-for-Critical-Resource-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0758",
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2025/CVE-2025-15xx/CVE-2025-1566.json
Normal file
25
CVE-2025/CVE-2025-15xx/CVE-2025-1566.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-1566",
|
||||||
|
"sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f",
|
||||||
|
"published": "2025-04-16T23:15:44.767",
|
||||||
|
"lastModified": "2025-04-16T23:15:44.767",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "DNS Leak in Native System VPN in Google ChromeOS Dev Channel on ChromeOS 129.0.6668.36 allows network observers to expose plaintext DNS queries via failure to properly tunnel DNS traffic during VPN state transitions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://issues.chromium.org/issues/b/342802975",
|
||||||
|
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://issuetracker.google.com/issues/342802975",
|
||||||
|
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2025/CVE-2025-15xx/CVE-2025-1568.json
Normal file
25
CVE-2025/CVE-2025-15xx/CVE-2025-1568.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-1568",
|
||||||
|
"sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f",
|
||||||
|
"published": "2025-04-16T23:15:44.853",
|
||||||
|
"lastModified": "2025-04-16T23:15:44.853",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Access Control Vulnerability in Gerrit chromiumos project configuration in Google ChromeOS 131.0.6778.268 allows an attacker with a registered Gerrit account to inject malicious code into ChromeOS projects and potentially achieve Remote Code Execution and Denial of Service via editing trusted pipelines by insufficient access controls and misconfigurations in Gerrit's project.config."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://issues.chromium.org/issues/b/374279912",
|
||||||
|
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://issuetracker.google.com/issues/374279912",
|
||||||
|
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2025/CVE-2025-17xx/CVE-2025-1704.json
Normal file
25
CVE-2025/CVE-2025-17xx/CVE-2025-1704.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-1704",
|
||||||
|
"sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f",
|
||||||
|
"published": "2025-04-16T23:15:44.937",
|
||||||
|
"lastModified": "2025-04-16T23:15:44.937",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "ComponentInstaller Modification in ComponentInstaller in Google ChromeOS 124.0.6367.34 on Chromebooks allows enrolled users with local access to unenroll devices \nand intercept device management requests via loading components from the unencrypted stateful partition."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://issues.chromium.org/issues/b/359915523",
|
||||||
|
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://issuetracker.google.com/issues/359915523",
|
||||||
|
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2025/CVE-2025-20xx/CVE-2025-2073.json
Normal file
25
CVE-2025/CVE-2025-20xx/CVE-2025-2073.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2073",
|
||||||
|
"sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f",
|
||||||
|
"published": "2025-04-16T23:15:45.610",
|
||||||
|
"lastModified": "2025-04-16T23:15:45.610",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Out-of-Bounds Read in ip_set_bitmap_ip.c in Google ChromeOS Kernel Versions 6.1, 5.15, 5.10, 5.4, 4.19. on All devices where Termina is used allows an attacker with CAP_NET_ADMIN privileges to cause memory corruption and potentially escalate privileges via crafted ipset commands."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://issues.chromium.org/issues/b/380043638",
|
||||||
|
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://issuetracker.google.com/issues/380043638",
|
||||||
|
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-249xx/CVE-2025-24907.json
Normal file
56
CVE-2025/CVE-2025-249xx/CVE-2025-24907.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-24907",
|
||||||
|
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"published": "2025-04-16T23:15:45.027",
|
||||||
|
"lastModified": "2025-04-16T23:15:45.027",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Overview \n\n\n\n\u00a0\n\n\n\nThe product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nThis allows attackers to traverse the file system to access files or directories that are outside of the restricted directory."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
|
||||||
|
"baseScore": 6.8,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-35"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.pentaho.com/hc/en-us/articles/35781624069005--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Path-Traversal-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24907",
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-249xx/CVE-2025-24908.json
Normal file
56
CVE-2025/CVE-2025-249xx/CVE-2025-24908.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-24908",
|
||||||
|
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"published": "2025-04-16T23:15:45.147",
|
||||||
|
"lastModified": "2025-04-16T23:15:45.147",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Overview \n\n\n\n\u00a0\n\n\n\nThe product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the UploadFile service. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nThis allows attackers to traverse the file system to access files or directories that are outside of the restricted directory."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
|
||||||
|
"baseScore": 6.8,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-35"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.pentaho.com/hc/en-us/articles/35783399569421--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Path-Traversal-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24908",
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-249xx/CVE-2025-24909.json
Normal file
56
CVE-2025/CVE-2025-249xx/CVE-2025-24909.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-24909",
|
||||||
|
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"published": "2025-04-16T23:15:45.263",
|
||||||
|
"lastModified": "2025-04-16T23:15:45.263",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Overview \n\n\n\n\u00a0\n\n\n\nThe software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, allow a malicious URL to inject content into the Analyzer plugin interface. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nOnce the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim's machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||||
|
"baseScore": 4.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.7,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.pentaho.com/hc/en-us/articles/35782541484045--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24909",
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-249xx/CVE-2025-24910.json
Normal file
56
CVE-2025/CVE-2025-249xx/CVE-2025-24910.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-24910",
|
||||||
|
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"published": "2025-04-16T23:15:45.373",
|
||||||
|
"lastModified": "2025-04-16T23:15:45.373",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Overview \n\n\n\n\u00a0\n\n\n\nXML documents optionally contain a Document Type Definition (DTD), which, among other features, enables the definition of XML entities. It is possible to define an entity by providing a substitution string in the form of a URI. Once the content of the URI is read, it is fed back into the application that is processing the XML. This application may echo back the data (e.g. in an error message), thereby exposing the file contents. (CWE-611) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.2, including 9.3.x and 8.3.x, do not correctly protect Pentaho Data Integration MessageSourceCrawler against out-of-band XML External Entity Reference. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nBy submitting an XML file that defines an external entity with a file:// URI, an attacker can cause the processing application to read the contents of a local file. Using URIs with other schemes such as http://, the attacker can force the application to make outgoing requests to servers that the attacker cannot reach directly, which can be used to bypass firewall restrictions or hide the source of attacks such as port scanning."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-611"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.pentaho.com/hc/en-us/articles/35782683750541--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Restriction-of-XML-External-Entity-Reference-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24910",
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-249xx/CVE-2025-24911.json
Normal file
56
CVE-2025/CVE-2025-249xx/CVE-2025-24911.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-24911",
|
||||||
|
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"published": "2025-04-16T23:15:45.490",
|
||||||
|
"lastModified": "2025-04-16T23:15:45.490",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Overview \n\n\n\n\u00a0\n\n\n\nXML documents optionally contain a Document Type Definition (DTD), which, among other features, enables the definition of XML entities. It is possible to define an entity by providing a substitution string in the form of a URI. Once the content of the URI is read, it is fed back into the application that is processing the XML. This application may echo back the data (e.g. in an error message), thereby exposing the file contents. (CWE-611) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.2, including 9.3.x and 8.3.x, do not correctly protect Data Access XMLParserFactoryProducer against out-of-band XML External Entity Reference. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nBy submitting an XML file that defines an external entity with a file:// URI, an attacker can cause the processing application to read the contents of a local file. Using URIs with other schemes such as http://, the attacker can force the application to make outgoing requests to servers that the attacker cannot reach directly, which can be used to bypass firewall restrictions or hide the source of attacks such as port scanning."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-611"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.pentaho.com/hc/en-us/articles/35783689016589--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Restriction-of-XML-External-Entity-Reference-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24911",
|
||||||
|
"source": "security.vulnerabilities@hitachivantara.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
16
CVE-2025/CVE-2025-24xx/CVE-2025-2400.json
Normal file
16
CVE-2025/CVE-2025-24xx/CVE-2025-2400.json
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2400",
|
||||||
|
"sourceIdentifier": "cve@gitlab.com",
|
||||||
|
"published": "2025-04-16T23:15:45.697",
|
||||||
|
"lastModified": "2025-04-16T23:15:45.697",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
48
CVE-2025/CVE-2025-252xx/CVE-2025-25230.json
Normal file
48
CVE-2025/CVE-2025-252xx/CVE-2025-25230.json
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-25230",
|
||||||
|
"sourceIdentifier": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
|
||||||
|
"published": "2025-04-16T22:15:14.073",
|
||||||
|
"lastModified": "2025-04-16T22:15:14.073",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Omnissa Horizon Client for Windows contains an LPE Vulnerability.\u00a0A malicious actor with local access where Horizon Client for Windows is installed may be able to elevate privileges."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://static.omnissa.com/sites/default/files/OMSA-2025-0001.pdf",
|
||||||
|
"source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.omnissa.com/omnissa-security-response/",
|
||||||
|
"source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-314xx/CVE-2025-31478.json
Normal file
56
CVE-2025/CVE-2025-314xx/CVE-2025-31478.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-31478",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-04-16T22:15:14.233",
|
||||||
|
"lastModified": "2025-04-16T22:15:14.233",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Zulip is an open-source team collaboration tool. Zulip supports a configuration where account creation is limited solely by being able to authenticate with a single-sign on authentication backend, meaning the organization places no restrictions on email address domains or invitations being required to join, but has disabled the EmailAuthBackend that is used for email/password authentication. A bug in the Zulip server means that it is possible to create an account in such organizations, without having an account with the configured SSO authentication backend. This issue is patched in version 10.2. A workaround includes requiring invitations to join the organization prevents the vulnerability from being accessed."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||||
|
"baseScore": 8.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 4.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-287"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zulip/zulip/security/advisories/GHSA-qxfv-j6vg-5rqc",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
72
CVE-2025/CVE-2025-324xx/CVE-2025-32433.json
Normal file
72
CVE-2025/CVE-2025-324xx/CVE-2025-32433.json
Normal file
@ -0,0 +1,72 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-32433",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-04-16T22:15:14.373",
|
||||||
|
"lastModified": "2025-04-16T22:15:14.373",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||||
|
"baseScore": 10.0,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-306"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/erlang/otp/commit/0fcd9c56524b28615e8ece65fc0c3f66ef6e4c12",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/erlang/otp/commit/6eef04130afc8b0ccb63c9a0d8650209cf54892f",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/erlang/otp/commit/b1924d37fd83c070055beb115d5d6a6a9490b891",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2025/04/16/2",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-327xx/CVE-2025-32783.json
Normal file
60
CVE-2025/CVE-2025-327xx/CVE-2025-32783.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-32783",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-04-16T22:15:14.523",
|
||||||
|
"lastModified": "2025-04-16T22:15:14.523",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "XWiki Platform is a generic wiki platform. A vulnerability in versions from 5.0 to 16.7.1 affects users with Message Stream enabled and a wiki configured as closed from selecting \"Prevent unregistered users to view pages\" in the Administrations Rights. The vulnerability is that any message sent in a subwiki to \"everyone\" is actually sent to the farm: any visitor of the main wiki will be able to see that message through the Dashboard, even if the subwiki is configured to be private. This issue will not be patched as Message Stream has been deprecated in XWiki 16.8.0RC1 and is not maintained anymore. A workaround for this issue involves keeping Message Stream disabled by default. It's advised to keep it disabled from Administration > Social > Message Stream."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-668"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-42fh-pvvh-999x",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://jira.xwiki.org/browse/XWIKI-17154",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
64
CVE-2025/CVE-2025-327xx/CVE-2025-32787.json
Normal file
64
CVE-2025/CVE-2025-327xx/CVE-2025-32787.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-32787",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-04-16T22:15:14.667",
|
||||||
|
"lastModified": "2025-04-16T22:15:14.667",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. Versions 5.02.5184 to 5.02.5187 are vulnerable to NULL dereference in `DeleteIPv6DefaultRouterInRA` called by `StorePacket`. Before dereferencing, `DeleteIPv6DefaultRouterInRA` does not account for `ParsePacket` returning NULL, resulting in the program crashing. A patched version does not exist at this time."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"baseScore": 3.1,
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/SoftEtherVPN/SoftEtherVPN/blob/7006539732c0231d7723623cc8732f94ba2b8c54/src/Cedar/Hub.c#L5112C1-L5116C29",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/SoftEtherVPN/SoftEtherVPN/blob/master/src/Mayaqua/TcpIp.c#L1633",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/SoftEtherVPN/SoftEtherVPN/security/advisories/GHSA-xw53-587j-mqh6",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
68
CVE-2025/CVE-2025-327xx/CVE-2025-32789.json
Normal file
68
CVE-2025/CVE-2025-327xx/CVE-2025-32789.json
Normal file
@ -0,0 +1,68 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-32789",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-04-16T22:15:14.800",
|
||||||
|
"lastModified": "2025-04-16T22:15:14.800",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of the user table, based on the results of the sorted list of users. Although unlikely, if an attacker knows the hash value of their password, they can change the password and repeat the sorting until the other user's password hash is fully revealed. This issue is patched in version 9.0.7."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"baseScore": 3.1,
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-203"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/espocrm/espocrm/commit/91740192d2e2c575c6a04534c079baf9f3af0a7f",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/espocrm/espocrm/commit/bd900d0b48fe37a98def4c0e094e39e7e385e9ea",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/espocrm/espocrm/security/advisories/GHSA-3ph3-jcfx-fq53",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-327xx/CVE-2025-32791.json
Normal file
56
CVE-2025/CVE-2025-327xx/CVE-2025-32791.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-32791",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-04-16T22:15:14.943",
|
||||||
|
"lastModified": "2025-04-16T22:15:14.943",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Backstage Scaffolder plugin houses types and utilities for building scaffolder-related modules. A vulnerability in the Backstage permission plugin backend allows callers to extract some information about the conditional decisions returned by the permission policy installed in the permission backend. If the permission system is not in use or if the installed permission policy does not use conditional decisions, there is no impact. This issue has been patched in version 0.6.0 of the permissions backend. A workaround includes having administrators of the permission policies ensure that they are crafted in such a way that conditional decisions do not contain any sensitive information."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-213"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/backstage/backstage/security/advisories/GHSA-f8j4-p5cr-p777",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-437xx/CVE-2025-43703.json
Normal file
60
CVE-2025/CVE-2025-437xx/CVE-2025-43703.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-43703",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-04-16T22:15:15.083",
|
||||||
|
"lastModified": "2025-04-16T22:15:15.083",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue was discovered in Ankitects Anki through 25.02. A crafted shared deck can result in attacker-controlled access to the internal API (even though the attacker has no knowledge of an API key) through approaches such as scripts or the SRC attribute of an IMG element. NOTE: this issue exists because of an incomplete fix for CVE-2024-32484."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-830"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ankitects/anki/pull/3925",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ankitects/anki/pull/3925/commits/24bca15fd3d9dc386916509eb2d4862d1184e709",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-437xx/CVE-2025-43704.json
Normal file
56
CVE-2025/CVE-2025-437xx/CVE-2025-43704.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-43704",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-04-16T23:15:45.770",
|
||||||
|
"lastModified": "2025-04-16T23:15:45.770",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Arctera/Veritas Data Insight before 7.1.2 can send cleartext credentials when configured to use HTTP Basic Authentication to a Dell Isilon OneFS server."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-319"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.veritas.com/support/en_US/security/ARC25-006",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
82
README.md
82
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-04-16T22:00:19.809240+00:00
|
2025-04-16T23:55:19.741186+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-04-16T21:15:48.873000+00:00
|
2025-04-16T23:15:45.770000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,68 +33,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
290454
|
290476
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `24`
|
Recently added CVEs: `22`
|
||||||
|
|
||||||
- [CVE-2024-55371](CVE-2024/CVE-2024-553xx/CVE-2024-55371.json) (`2025-04-16T21:15:45.790`)
|
- [CVE-2025-0756](CVE-2025/CVE-2025-07xx/CVE-2025-0756.json) (`2025-04-16T23:15:44.400`)
|
||||||
- [CVE-2024-55372](CVE-2024/CVE-2024-553xx/CVE-2024-55372.json) (`2025-04-16T21:15:45.897`)
|
- [CVE-2025-0757](CVE-2025/CVE-2025-07xx/CVE-2025-0757.json) (`2025-04-16T23:15:44.530`)
|
||||||
- [CVE-2025-26153](CVE-2025/CVE-2025-261xx/CVE-2025-26153.json) (`2025-04-16T21:15:46.770`)
|
- [CVE-2025-0758](CVE-2025/CVE-2025-07xx/CVE-2025-0758.json) (`2025-04-16T23:15:44.647`)
|
||||||
- [CVE-2025-28072](CVE-2025/CVE-2025-280xx/CVE-2025-28072.json) (`2025-04-16T21:15:46.883`)
|
- [CVE-2025-1566](CVE-2025/CVE-2025-15xx/CVE-2025-1566.json) (`2025-04-16T23:15:44.767`)
|
||||||
- [CVE-2025-29648](CVE-2025/CVE-2025-296xx/CVE-2025-29648.json) (`2025-04-16T20:15:17.460`)
|
- [CVE-2025-1568](CVE-2025/CVE-2025-15xx/CVE-2025-1568.json) (`2025-04-16T23:15:44.853`)
|
||||||
- [CVE-2025-29649](CVE-2025/CVE-2025-296xx/CVE-2025-29649.json) (`2025-04-16T20:15:17.563`)
|
- [CVE-2025-1704](CVE-2025/CVE-2025-17xx/CVE-2025-1704.json) (`2025-04-16T23:15:44.937`)
|
||||||
- [CVE-2025-29650](CVE-2025/CVE-2025-296xx/CVE-2025-29650.json) (`2025-04-16T20:15:17.663`)
|
- [CVE-2025-2073](CVE-2025/CVE-2025-20xx/CVE-2025-2073.json) (`2025-04-16T23:15:45.610`)
|
||||||
- [CVE-2025-29651](CVE-2025/CVE-2025-296xx/CVE-2025-29651.json) (`2025-04-16T20:15:17.760`)
|
- [CVE-2025-2400](CVE-2025/CVE-2025-24xx/CVE-2025-2400.json) (`2025-04-16T23:15:45.697`)
|
||||||
- [CVE-2025-29652](CVE-2025/CVE-2025-296xx/CVE-2025-29652.json) (`2025-04-16T20:15:17.860`)
|
- [CVE-2025-24907](CVE-2025/CVE-2025-249xx/CVE-2025-24907.json) (`2025-04-16T23:15:45.027`)
|
||||||
- [CVE-2025-29653](CVE-2025/CVE-2025-296xx/CVE-2025-29653.json) (`2025-04-16T20:15:17.963`)
|
- [CVE-2025-24908](CVE-2025/CVE-2025-249xx/CVE-2025-24908.json) (`2025-04-16T23:15:45.147`)
|
||||||
- [CVE-2025-29708](CVE-2025/CVE-2025-297xx/CVE-2025-29708.json) (`2025-04-16T21:15:47.460`)
|
- [CVE-2025-24909](CVE-2025/CVE-2025-249xx/CVE-2025-24909.json) (`2025-04-16T23:15:45.263`)
|
||||||
- [CVE-2025-29709](CVE-2025/CVE-2025-297xx/CVE-2025-29709.json) (`2025-04-16T21:15:47.570`)
|
- [CVE-2025-24910](CVE-2025/CVE-2025-249xx/CVE-2025-24910.json) (`2025-04-16T23:15:45.373`)
|
||||||
- [CVE-2025-29710](CVE-2025/CVE-2025-297xx/CVE-2025-29710.json) (`2025-04-16T21:15:47.673`)
|
- [CVE-2025-24911](CVE-2025/CVE-2025-249xx/CVE-2025-24911.json) (`2025-04-16T23:15:45.490`)
|
||||||
- [CVE-2025-32817](CVE-2025/CVE-2025-328xx/CVE-2025-32817.json) (`2025-04-16T20:15:19.077`)
|
- [CVE-2025-25230](CVE-2025/CVE-2025-252xx/CVE-2025-25230.json) (`2025-04-16T22:15:14.073`)
|
||||||
- [CVE-2025-3619](CVE-2025/CVE-2025-36xx/CVE-2025-3619.json) (`2025-04-16T21:15:47.920`)
|
- [CVE-2025-31478](CVE-2025/CVE-2025-314xx/CVE-2025-31478.json) (`2025-04-16T22:15:14.233`)
|
||||||
- [CVE-2025-3620](CVE-2025/CVE-2025-36xx/CVE-2025-3620.json) (`2025-04-16T21:15:48.027`)
|
- [CVE-2025-32433](CVE-2025/CVE-2025-324xx/CVE-2025-32433.json) (`2025-04-16T22:15:14.373`)
|
||||||
- [CVE-2025-3723](CVE-2025/CVE-2025-37xx/CVE-2025-3723.json) (`2025-04-16T20:15:19.777`)
|
- [CVE-2025-32783](CVE-2025/CVE-2025-327xx/CVE-2025-32783.json) (`2025-04-16T22:15:14.523`)
|
||||||
- [CVE-2025-3724](CVE-2025/CVE-2025-37xx/CVE-2025-3724.json) (`2025-04-16T20:15:19.960`)
|
- [CVE-2025-32787](CVE-2025/CVE-2025-327xx/CVE-2025-32787.json) (`2025-04-16T22:15:14.667`)
|
||||||
- [CVE-2025-3725](CVE-2025/CVE-2025-37xx/CVE-2025-3725.json) (`2025-04-16T20:15:20.123`)
|
- [CVE-2025-32789](CVE-2025/CVE-2025-327xx/CVE-2025-32789.json) (`2025-04-16T22:15:14.800`)
|
||||||
- [CVE-2025-3726](CVE-2025/CVE-2025-37xx/CVE-2025-3726.json) (`2025-04-16T20:15:20.283`)
|
- [CVE-2025-32791](CVE-2025/CVE-2025-327xx/CVE-2025-32791.json) (`2025-04-16T22:15:14.943`)
|
||||||
- [CVE-2025-3727](CVE-2025/CVE-2025-37xx/CVE-2025-3727.json) (`2025-04-16T21:15:48.203`)
|
- [CVE-2025-43703](CVE-2025/CVE-2025-437xx/CVE-2025-43703.json) (`2025-04-16T22:15:15.083`)
|
||||||
- [CVE-2025-3728](CVE-2025/CVE-2025-37xx/CVE-2025-3728.json) (`2025-04-16T21:15:48.363`)
|
- [CVE-2025-43704](CVE-2025/CVE-2025-437xx/CVE-2025-43704.json) (`2025-04-16T23:15:45.770`)
|
||||||
- [CVE-2025-3729](CVE-2025/CVE-2025-37xx/CVE-2025-3729.json) (`2025-04-16T21:15:48.537`)
|
|
||||||
- [CVE-2025-3730](CVE-2025/CVE-2025-37xx/CVE-2025-3730.json) (`2025-04-16T21:15:48.700`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `30`
|
Recently modified CVEs: `1`
|
||||||
|
|
||||||
- [CVE-2025-21578](CVE-2025/CVE-2025-215xx/CVE-2025-21578.json) (`2025-04-16T21:15:46.080`)
|
- [CVE-2021-21353](CVE-2021/CVE-2021-213xx/CVE-2021-21353.json) (`2025-04-16T23:15:44.197`)
|
||||||
- [CVE-2025-21579](CVE-2025/CVE-2025-215xx/CVE-2025-21579.json) (`2025-04-16T21:15:46.193`)
|
|
||||||
- [CVE-2025-21580](CVE-2025/CVE-2025-215xx/CVE-2025-21580.json) (`2025-04-16T21:15:46.303`)
|
|
||||||
- [CVE-2025-21581](CVE-2025/CVE-2025-215xx/CVE-2025-21581.json) (`2025-04-16T21:15:46.413`)
|
|
||||||
- [CVE-2025-21582](CVE-2025/CVE-2025-215xx/CVE-2025-21582.json) (`2025-04-16T21:15:46.527`)
|
|
||||||
- [CVE-2025-21584](CVE-2025/CVE-2025-215xx/CVE-2025-21584.json) (`2025-04-16T20:15:16.947`)
|
|
||||||
- [CVE-2025-21585](CVE-2025/CVE-2025-215xx/CVE-2025-21585.json) (`2025-04-16T20:15:17.057`)
|
|
||||||
- [CVE-2025-22872](CVE-2025/CVE-2025-228xx/CVE-2025-22872.json) (`2025-04-16T21:15:46.640`)
|
|
||||||
- [CVE-2025-24421](CVE-2025/CVE-2025-244xx/CVE-2025-24421.json) (`2025-04-16T20:15:17.170`)
|
|
||||||
- [CVE-2025-24427](CVE-2025/CVE-2025-244xx/CVE-2025-24427.json) (`2025-04-16T20:15:17.313`)
|
|
||||||
- [CVE-2025-30682](CVE-2025/CVE-2025-306xx/CVE-2025-30682.json) (`2025-04-16T20:15:18.057`)
|
|
||||||
- [CVE-2025-30694](CVE-2025/CVE-2025-306xx/CVE-2025-30694.json) (`2025-04-16T20:15:18.170`)
|
|
||||||
- [CVE-2025-30695](CVE-2025/CVE-2025-306xx/CVE-2025-30695.json) (`2025-04-16T20:15:18.283`)
|
|
||||||
- [CVE-2025-30697](CVE-2025/CVE-2025-306xx/CVE-2025-30697.json) (`2025-04-16T20:15:18.393`)
|
|
||||||
- [CVE-2025-30699](CVE-2025/CVE-2025-306xx/CVE-2025-30699.json) (`2025-04-16T20:15:18.507`)
|
|
||||||
- [CVE-2025-30700](CVE-2025/CVE-2025-307xx/CVE-2025-30700.json) (`2025-04-16T20:15:18.620`)
|
|
||||||
- [CVE-2025-30707](CVE-2025/CVE-2025-307xx/CVE-2025-30707.json) (`2025-04-16T20:15:18.743`)
|
|
||||||
- [CVE-2025-30709](CVE-2025/CVE-2025-307xx/CVE-2025-30709.json) (`2025-04-16T20:15:18.853`)
|
|
||||||
- [CVE-2025-30710](CVE-2025/CVE-2025-307xx/CVE-2025-30710.json) (`2025-04-16T20:15:18.967`)
|
|
||||||
- [CVE-2025-3679](CVE-2025/CVE-2025-36xx/CVE-2025-3679.json) (`2025-04-16T20:15:19.250`)
|
|
||||||
- [CVE-2025-3680](CVE-2025/CVE-2025-36xx/CVE-2025-3680.json) (`2025-04-16T20:15:19.350`)
|
|
||||||
- [CVE-2025-3681](CVE-2025/CVE-2025-36xx/CVE-2025-3681.json) (`2025-04-16T20:15:19.460`)
|
|
||||||
- [CVE-2025-3682](CVE-2025/CVE-2025-36xx/CVE-2025-3682.json) (`2025-04-16T20:15:19.570`)
|
|
||||||
- [CVE-2025-3683](CVE-2025/CVE-2025-36xx/CVE-2025-3683.json) (`2025-04-16T20:15:19.670`)
|
|
||||||
- [CVE-2025-3733](CVE-2025/CVE-2025-37xx/CVE-2025-3733.json) (`2025-04-16T21:15:48.873`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
132
_state.csv
132
_state.csv
@ -167938,7 +167938,7 @@ CVE-2021-2135,0,0,7abf799ace0e002ab446f4ffc90bb93e36260b42bd780bd6a3cd5d6fc4f881
|
|||||||
CVE-2021-21350,0,0,2d752306279e47f018b7b7456b20a9159b8fef278e22b10b422aa6508fb277bd,2024-11-21T05:48:05.500000
|
CVE-2021-21350,0,0,2d752306279e47f018b7b7456b20a9159b8fef278e22b10b422aa6508fb277bd,2024-11-21T05:48:05.500000
|
||||||
CVE-2021-21351,0,0,cca6f3591b36a4a91511361a99fef683a76ebac410b607a5bd73bbeda38ba55c,2024-11-21T05:48:05.683000
|
CVE-2021-21351,0,0,cca6f3591b36a4a91511361a99fef683a76ebac410b607a5bd73bbeda38ba55c,2024-11-21T05:48:05.683000
|
||||||
CVE-2021-21352,0,0,d897e99eed94a134ed818d0dfb2b60db2d1cd351c05aaae51c7fc380ba195ca2,2024-11-21T05:48:05.900000
|
CVE-2021-21352,0,0,d897e99eed94a134ed818d0dfb2b60db2d1cd351c05aaae51c7fc380ba195ca2,2024-11-21T05:48:05.900000
|
||||||
CVE-2021-21353,0,0,0e6837eff702473fe08f80985ac9027232740af114a21122aa89a27c5222cbe2,2024-11-21T05:48:11.043000
|
CVE-2021-21353,0,1,1e2ae93aee333dd878492c0b5d123533e3af61f4c0a6cff1a3c5dfecc2c75dc9,2025-04-16T23:15:44.197000
|
||||||
CVE-2021-21354,0,0,f993fd5b853f008cce79671cdaa2a0b6524c7cb7428ac2f8157119da3a54f691,2024-11-21T05:48:11.173000
|
CVE-2021-21354,0,0,f993fd5b853f008cce79671cdaa2a0b6524c7cb7428ac2f8157119da3a54f691,2024-11-21T05:48:11.173000
|
||||||
CVE-2021-21355,0,0,766714b5a85de61a8624916bf3317120f0bd177745e800c46ab1f6314f11cfb6,2024-11-21T05:48:11.300000
|
CVE-2021-21355,0,0,766714b5a85de61a8624916bf3317120f0bd177745e800c46ab1f6314f11cfb6,2024-11-21T05:48:11.300000
|
||||||
CVE-2021-21357,0,0,cfde189c634372a6f9c54d0222eaf04097982502302c0f7454f68d1116b098ba,2024-11-21T05:48:11.420000
|
CVE-2021-21357,0,0,cfde189c634372a6f9c54d0222eaf04097982502302c0f7454f68d1116b098ba,2024-11-21T05:48:11.420000
|
||||||
@ -211378,7 +211378,7 @@ CVE-2022-46532,0,0,432e2fb1ac9231e3900f9510862b24af15ae515bd54591843ed70bfaf1950
|
|||||||
CVE-2022-46533,0,0,8259a0c1ab3ecd9953d24addef698c0ca14bb7528598e2c54b5d0a9b00dabe1c,2025-04-16T18:15:59.713000
|
CVE-2022-46533,0,0,8259a0c1ab3ecd9953d24addef698c0ca14bb7528598e2c54b5d0a9b00dabe1c,2025-04-16T18:15:59.713000
|
||||||
CVE-2022-46534,0,0,a37476b1e6f06d14f368b3fc9ddc52cb95b0509dedbd61b6254912927b0057d6,2025-04-16T18:15:59.920000
|
CVE-2022-46534,0,0,a37476b1e6f06d14f368b3fc9ddc52cb95b0509dedbd61b6254912927b0057d6,2025-04-16T18:15:59.920000
|
||||||
CVE-2022-46535,0,0,c76309a3efb3efd5614d89e6b487a45aa8e68a24c50e5069b532281cf9b9227f,2025-04-16T18:16:00.133000
|
CVE-2022-46535,0,0,c76309a3efb3efd5614d89e6b487a45aa8e68a24c50e5069b532281cf9b9227f,2025-04-16T18:16:00.133000
|
||||||
CVE-2022-46536,0,1,b556198d86819cc2bec371c26c7a2ca6d052dbf876dbdcacad7e4eed2e04888a,2025-04-16T20:15:16.333000
|
CVE-2022-46536,0,0,b556198d86819cc2bec371c26c7a2ca6d052dbf876dbdcacad7e4eed2e04888a,2025-04-16T20:15:16.333000
|
||||||
CVE-2022-46537,0,0,013f85ed6bb69b0029944b116199f9a8482e23f09916132b7a8cd2c7df28d85f,2025-04-16T19:15:48.727000
|
CVE-2022-46537,0,0,013f85ed6bb69b0029944b116199f9a8482e23f09916132b7a8cd2c7df28d85f,2025-04-16T19:15:48.727000
|
||||||
CVE-2022-46538,0,0,36652f5ef9c355e7316e9b4baa42eeaf57af30487e172ad8a6aef006d837e7f1,2025-04-16T19:15:48.897000
|
CVE-2022-46538,0,0,36652f5ef9c355e7316e9b4baa42eeaf57af30487e172ad8a6aef006d837e7f1,2025-04-16T19:15:48.897000
|
||||||
CVE-2022-46539,0,0,7bd0d189716cc6a288447f1ac7d27e593a51000734a97e9ce222348df64dca77,2025-04-16T19:15:49.060000
|
CVE-2022-46539,0,0,7bd0d189716cc6a288447f1ac7d27e593a51000734a97e9ce222348df64dca77,2025-04-16T19:15:49.060000
|
||||||
@ -264731,10 +264731,10 @@ CVE-2024-4005,0,0,10ce0801262283a3acf259593f5122037af4b3f2afe41d97e0d5130b74a0b3
|
|||||||
CVE-2024-40051,0,0,96ab2490faf9bea7ad7fee897981a553b31642380963c6ce4281331d73ca69b1,2024-11-21T09:30:54.030000
|
CVE-2024-40051,0,0,96ab2490faf9bea7ad7fee897981a553b31642380963c6ce4281331d73ca69b1,2024-11-21T09:30:54.030000
|
||||||
CVE-2024-4006,0,0,46335001e821792447cd234ad2269b9ef6e390364b1771cf570ddd60ee4264a5,2024-12-12T17:10:26.743000
|
CVE-2024-4006,0,0,46335001e821792447cd234ad2269b9ef6e390364b1771cf570ddd60ee4264a5,2024-12-12T17:10:26.743000
|
||||||
CVE-2024-40060,0,0,b3cb7a9288615fb07001800266f7abee43787412ebc5c9317e72dcb8a61aa5b3,2024-11-21T09:30:54.260000
|
CVE-2024-40060,0,0,b3cb7a9288615fb07001800266f7abee43787412ebc5c9317e72dcb8a61aa5b3,2024-11-21T09:30:54.260000
|
||||||
CVE-2024-40068,0,1,cbad6e65e7e84cf1a55ffb7fafdd118a328d0ef7e468aebf956e79c0738fba3f,2025-04-16T21:15:44.650000
|
CVE-2024-40068,0,0,cbad6e65e7e84cf1a55ffb7fafdd118a328d0ef7e468aebf956e79c0738fba3f,2025-04-16T21:15:44.650000
|
||||||
CVE-2024-40069,0,0,4d4b8c6a2f5f96f0b37c4a56d683d18e89f62558ef2d1c08df758ed0b00fc247,2025-04-16T17:15:48.743000
|
CVE-2024-40069,0,0,4d4b8c6a2f5f96f0b37c4a56d683d18e89f62558ef2d1c08df758ed0b00fc247,2025-04-16T17:15:48.743000
|
||||||
CVE-2024-4007,0,0,3dd9d5c3a9450c96ea7d10f2bffa2679fd00a403615d465b187f095d51be54f6,2024-11-21T09:42:01.227000
|
CVE-2024-4007,0,0,3dd9d5c3a9450c96ea7d10f2bffa2679fd00a403615d465b187f095d51be54f6,2024-11-21T09:42:01.227000
|
||||||
CVE-2024-40070,0,1,09992ee1a07721f0f0021dadbbee2f2783f08833bce7da18d07c6b519df78a8b,2025-04-16T21:15:45.217000
|
CVE-2024-40070,0,0,09992ee1a07721f0f0021dadbbee2f2783f08833bce7da18d07c6b519df78a8b,2025-04-16T21:15:45.217000
|
||||||
CVE-2024-40071,0,0,06f6058bf63a114e512ac64f5c17a3c7972a90e514728670ddc9103275b0a94f,2025-04-16T17:15:48.957000
|
CVE-2024-40071,0,0,06f6058bf63a114e512ac64f5c17a3c7972a90e514728670ddc9103275b0a94f,2025-04-16T17:15:48.957000
|
||||||
CVE-2024-40072,0,0,547d27cfdcf73bc395fc3d20ea203da147c8ed111ec3e549f9fec5bff422e11d,2025-04-16T17:15:49.063000
|
CVE-2024-40072,0,0,547d27cfdcf73bc395fc3d20ea203da147c8ed111ec3e549f9fec5bff422e11d,2025-04-16T17:15:49.063000
|
||||||
CVE-2024-40073,0,0,d4ef2dc78d57409da30467abb2994b8710871ceac838e3f8ece14dd70977ebd3,2025-04-16T17:15:49.170000
|
CVE-2024-40073,0,0,d4ef2dc78d57409da30467abb2994b8710871ceac838e3f8ece14dd70977ebd3,2025-04-16T17:15:49.170000
|
||||||
@ -274521,8 +274521,8 @@ CVE-2024-53296,0,0,be682d3eb2a02cb859d07bb38fd2cdf79c5c9c446624f27b1fefa1f7d7732
|
|||||||
CVE-2024-53299,0,0,2311d06f0f8179bedcf518ce1bde420954fcc87b5db6c467bb518cf92e75888f,2025-02-04T19:15:31.877000
|
CVE-2024-53299,0,0,2311d06f0f8179bedcf518ce1bde420954fcc87b5db6c467bb518cf92e75888f,2025-02-04T19:15:31.877000
|
||||||
CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000
|
CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000
|
||||||
CVE-2024-53303,0,0,70a56d8ec2b4b4d3548967b98471444d054ad16016e0845cf1ac32051d07a296,2025-04-16T18:16:03.417000
|
CVE-2024-53303,0,0,70a56d8ec2b4b4d3548967b98471444d054ad16016e0845cf1ac32051d07a296,2025-04-16T18:16:03.417000
|
||||||
CVE-2024-53304,0,1,2318bd92e15e2309c0bc84c12f501093b2199420a9844e4905b82191a8dd877a,2025-04-16T21:15:45.497000
|
CVE-2024-53304,0,0,2318bd92e15e2309c0bc84c12f501093b2199420a9844e4905b82191a8dd877a,2025-04-16T21:15:45.497000
|
||||||
CVE-2024-53305,0,1,b764fd9aa197b516e0394c3a3a3a9ee4af1cfff7c69a2a0fea095f72e6f16c4c,2025-04-16T21:15:45.643000
|
CVE-2024-53305,0,0,b764fd9aa197b516e0394c3a3a3a9ee4af1cfff7c69a2a0fea095f72e6f16c4c,2025-04-16T21:15:45.643000
|
||||||
CVE-2024-53307,0,0,137df246312787bed916a2ce1770dc53fefd470e50062bf21518e03aff4776e9,2025-03-10T18:15:29.373000
|
CVE-2024-53307,0,0,137df246312787bed916a2ce1770dc53fefd470e50062bf21518e03aff4776e9,2025-03-10T18:15:29.373000
|
||||||
CVE-2024-53309,0,0,ae139265b7a1692dfab5ae0e494b54a85093b1cd41c51bb0baefd5e1bf71e5bf,2025-03-17T19:15:23.447000
|
CVE-2024-53309,0,0,ae139265b7a1692dfab5ae0e494b54a85093b1cd41c51bb0baefd5e1bf71e5bf,2025-03-17T19:15:23.447000
|
||||||
CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000
|
CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000
|
||||||
@ -275724,8 +275724,8 @@ CVE-2024-55355,0,0,2bb36a027cfc17a18c27f2dfa7ccd1dd7e44d92fe7cc55df027cf0c874369
|
|||||||
CVE-2024-55356,0,0,24a1f90c25942035af99f5d3d7ecc4294dd5cf67c67caa2d1d5b1544ce44efca,2025-01-08T01:15:07.370000
|
CVE-2024-55356,0,0,24a1f90c25942035af99f5d3d7ecc4294dd5cf67c67caa2d1d5b1544ce44efca,2025-01-08T01:15:07.370000
|
||||||
CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c0e,2024-11-21T09:47:53.307000
|
CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c0e,2024-11-21T09:47:53.307000
|
||||||
CVE-2024-5537,0,0,dc964262ed4087ff313c4be3be100753a858d893c6319a531383572e591004b1,2024-05-30T17:15:34.583000
|
CVE-2024-5537,0,0,dc964262ed4087ff313c4be3be100753a858d893c6319a531383572e591004b1,2024-05-30T17:15:34.583000
|
||||||
CVE-2024-55371,1,1,82d309900eb7e9fe5761e0756844ce79b2aa2451b6aeadb49306bc093f1286e8,2025-04-16T21:15:45.790000
|
CVE-2024-55371,0,0,82d309900eb7e9fe5761e0756844ce79b2aa2451b6aeadb49306bc093f1286e8,2025-04-16T21:15:45.790000
|
||||||
CVE-2024-55372,1,1,7d37afe313187fc2bd94eccc6b6bee9da2384213efd9c427f98958b2e41c4376,2025-04-16T21:15:45.897000
|
CVE-2024-55372,0,0,7d37afe313187fc2bd94eccc6b6bee9da2384213efd9c427f98958b2e41c4376,2025-04-16T21:15:45.897000
|
||||||
CVE-2024-5538,0,0,349018b8a831720930f224f86428ace57b32dfb3177832784fb8b5e53a9e5993,2024-05-31T11:15:09.923000
|
CVE-2024-5538,0,0,349018b8a831720930f224f86428ace57b32dfb3177832784fb8b5e53a9e5993,2024-05-31T11:15:09.923000
|
||||||
CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402acd89,2025-01-07T16:15:36.480000
|
CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402acd89,2025-01-07T16:15:36.480000
|
||||||
CVE-2024-55408,0,0,8039c7c557373745154d588f7a6e9302bbcff3813cc276ec09ae1bbee5edf7a3,2025-02-11T01:15:09.410000
|
CVE-2024-55408,0,0,8039c7c557373745154d588f7a6e9302bbcff3813cc276ec09ae1bbee5edf7a3,2025-02-11T01:15:09.410000
|
||||||
@ -281792,6 +281792,9 @@ CVE-2025-0752,0,0,de749aab58e2326cecf2e69cd47cb06af87bcedce5e0f5e8b795ca284455a6
|
|||||||
CVE-2025-0753,0,0,c31e8dbd9d781b37db4d790b1206c27db098e661945670b7848cba0c8afd301c,2025-02-28T22:22:35.957000
|
CVE-2025-0753,0,0,c31e8dbd9d781b37db4d790b1206c27db098e661945670b7848cba0c8afd301c,2025-02-28T22:22:35.957000
|
||||||
CVE-2025-0754,0,0,01e22cbc27c23b2a20fc22b4b38925f42f70aba0e3cf26d239fd3f71faae49ca,2025-01-28T10:15:09.697000
|
CVE-2025-0754,0,0,01e22cbc27c23b2a20fc22b4b38925f42f70aba0e3cf26d239fd3f71faae49ca,2025-01-28T10:15:09.697000
|
||||||
CVE-2025-0755,0,0,a756693274b211f936030a1b123d06fc9f09b8085a54bd20383a0ef5f5b87d9f,2025-03-18T09:15:11.487000
|
CVE-2025-0755,0,0,a756693274b211f936030a1b123d06fc9f09b8085a54bd20383a0ef5f5b87d9f,2025-03-18T09:15:11.487000
|
||||||
|
CVE-2025-0756,1,1,b19b4ad9d0999c3ee0d17438ec3beaaf755e4c5eaecf851e90a5d1f4d6b3fa4b,2025-04-16T23:15:44.400000
|
||||||
|
CVE-2025-0757,1,1,1333d61ae224eaaf8e897706699c441f1693dbdc5d606c5b6188a854512eae13,2025-04-16T23:15:44.530000
|
||||||
|
CVE-2025-0758,1,1,bebe0b9a3b3c746d022bfd86d3c6e96f9d0fd9a767f835083182a59be9f52ff0,2025-04-16T23:15:44.647000
|
||||||
CVE-2025-0759,0,0,09d991e76c287398c2be16cd3769fbff0d891df9fa18a6f52ed6c200cb01eaf9,2025-02-27T15:15:40.603000
|
CVE-2025-0759,0,0,09d991e76c287398c2be16cd3769fbff0d891df9fa18a6f52ed6c200cb01eaf9,2025-02-27T15:15:40.603000
|
||||||
CVE-2025-0760,0,0,00193022d9afa63eab6ac5d740a3221452c3267e0ba03667c14e8712364e5b04,2025-02-26T00:15:10.890000
|
CVE-2025-0760,0,0,00193022d9afa63eab6ac5d740a3221452c3267e0ba03667c14e8712364e5b04,2025-02-26T00:15:10.890000
|
||||||
CVE-2025-0762,0,0,845f3b7f9b4ef02b7a17ddce8a2e2034554a76aa91491302fad198d6d89d5ee0,2025-01-29T15:15:17.687000
|
CVE-2025-0762,0,0,845f3b7f9b4ef02b7a17ddce8a2e2034554a76aa91491302fad198d6d89d5ee0,2025-01-29T15:15:17.687000
|
||||||
@ -282346,6 +282349,8 @@ CVE-2025-1559,0,0,709a243835f3c6ce0779a28711cc25be41f0a8c4f301b124730fe9903567f9
|
|||||||
CVE-2025-1560,0,0,5806fdd5d9f8e8a09704d33fd8caadc121e4fbb048f372fad8d43065a1e4a103,2025-03-06T16:15:42.753000
|
CVE-2025-1560,0,0,5806fdd5d9f8e8a09704d33fd8caadc121e4fbb048f372fad8d43065a1e4a103,2025-03-06T16:15:42.753000
|
||||||
CVE-2025-1561,0,0,c0dd475a880b302ad58d5da65215c03a4b2329b9f43fd50459164bc801594e00,2025-03-13T05:15:27.890000
|
CVE-2025-1561,0,0,c0dd475a880b302ad58d5da65215c03a4b2329b9f43fd50459164bc801594e00,2025-03-13T05:15:27.890000
|
||||||
CVE-2025-1564,0,0,9d62e5431da133f133499b29bcb96aa13e41c1b673396891299a0b15aab9c828,2025-03-01T08:15:34.007000
|
CVE-2025-1564,0,0,9d62e5431da133f133499b29bcb96aa13e41c1b673396891299a0b15aab9c828,2025-03-01T08:15:34.007000
|
||||||
|
CVE-2025-1566,1,1,131deec3f77b04f991ebb90ff9acb0b1a12b81048eced026f09c31fc85d18cc5,2025-04-16T23:15:44.767000
|
||||||
|
CVE-2025-1568,1,1,95c2aba9b91258ec79c0076f946e6906f21b07bb4f34ec498c00ad4c163baa4a,2025-04-16T23:15:44.853000
|
||||||
CVE-2025-1570,0,0,e2c8a697fd328cfac1cb14bcdda0501641702037da6bc6d3e9d43d7d6e474d73,2025-03-06T15:35:59.507000
|
CVE-2025-1570,0,0,e2c8a697fd328cfac1cb14bcdda0501641702037da6bc6d3e9d43d7d6e474d73,2025-03-06T15:35:59.507000
|
||||||
CVE-2025-1571,0,0,4a5ce435e807c5b239e456baa952536949a7ac8152f73e9932b99f88f9a0505f,2025-03-07T17:29:48.903000
|
CVE-2025-1571,0,0,4a5ce435e807c5b239e456baa952536949a7ac8152f73e9932b99f88f9a0505f,2025-03-07T17:29:48.903000
|
||||||
CVE-2025-1572,0,0,d28a5728a56447e48ca8ae17f33703e0f0c8651ed23960a40cc6c85b9a58b7d9,2025-03-06T17:52:25.813000
|
CVE-2025-1572,0,0,d28a5728a56447e48ca8ae17f33703e0f0c8651ed23960a40cc6c85b9a58b7d9,2025-03-06T17:52:25.813000
|
||||||
@ -282451,6 +282456,7 @@ CVE-2025-1695,0,0,ebd84bb280e3b0fb2974535e719ca217464c50c1c49a0c471a25d6dd4b8516
|
|||||||
CVE-2025-1696,0,0,a4ebe2093d6db003a81772653e3b8096038d292b86e17d8021513423bef33f12,2025-03-06T12:15:36.293000
|
CVE-2025-1696,0,0,a4ebe2093d6db003a81772653e3b8096038d292b86e17d8021513423bef33f12,2025-03-06T12:15:36.293000
|
||||||
CVE-2025-1702,0,0,8350c512bb427a18e75fe369e7c514680d305e4b55cc00b262ae74877fe4e9d9,2025-03-05T12:15:35.420000
|
CVE-2025-1702,0,0,8350c512bb427a18e75fe369e7c514680d305e4b55cc00b262ae74877fe4e9d9,2025-03-05T12:15:35.420000
|
||||||
CVE-2025-1703,0,0,50c927778c00387d209f1db495acb3fcdf772388903cfdf917baab839124a719,2025-03-27T16:45:27.850000
|
CVE-2025-1703,0,0,50c927778c00387d209f1db495acb3fcdf772388903cfdf917baab839124a719,2025-03-27T16:45:27.850000
|
||||||
|
CVE-2025-1704,1,1,c9af1f14e1b0017d573058ecb6c2d538a9b3b02de19ff2ede03e92e5eeb4a9b6,2025-04-16T23:15:44.937000
|
||||||
CVE-2025-1705,0,0,269e355c7cfca537a526c588669165c0e79ec506469175122c59352a58fa4621,2025-03-28T18:11:40.180000
|
CVE-2025-1705,0,0,269e355c7cfca537a526c588669165c0e79ec506469175122c59352a58fa4621,2025-03-28T18:11:40.180000
|
||||||
CVE-2025-1707,0,0,eb806af042366277371dce5ba4e4d20eb3821597874c2eb4040b48171f171ef9,2025-03-11T22:15:12.583000
|
CVE-2025-1707,0,0,eb806af042366277371dce5ba4e4d20eb3821597874c2eb4040b48171f171ef9,2025-03-11T22:15:12.583000
|
||||||
CVE-2025-1714,0,0,6e67e5fe1ad7d1f8ea60e413f9fa7e7e2f63bd8d4c4369040436660c144fa80c,2025-03-07T05:15:16.233000
|
CVE-2025-1714,0,0,6e67e5fe1ad7d1f8ea60e413f9fa7e7e2f63bd8d4c4369040436660c144fa80c,2025-03-07T05:15:16.233000
|
||||||
@ -282857,6 +282863,7 @@ CVE-2025-20664,0,0,4219106895903f3d40c45e3fe22a99bb379c7467ce7ddab134c6f372463f3
|
|||||||
CVE-2025-2067,0,0,e336b7e791e3fd3cb322ecbc1c5f69ca2b6e5c18fb1ce058eaa6d863ecf3dcd2,2025-03-07T05:15:17.527000
|
CVE-2025-2067,0,0,e336b7e791e3fd3cb322ecbc1c5f69ca2b6e5c18fb1ce058eaa6d863ecf3dcd2,2025-03-07T05:15:17.527000
|
||||||
CVE-2025-2071,0,0,f72741a6a8cd10ef9b626183eff7ab8b6e66837ba6759a6a57e284a984d113e1,2025-04-01T20:26:30.593000
|
CVE-2025-2071,0,0,f72741a6a8cd10ef9b626183eff7ab8b6e66837ba6759a6a57e284a984d113e1,2025-04-01T20:26:30.593000
|
||||||
CVE-2025-2072,0,0,8e644488e83c18f58cc5036e9fa9ebc749bbf6017963c3bc2cbe7baae1385ee2,2025-04-01T20:26:30.593000
|
CVE-2025-2072,0,0,8e644488e83c18f58cc5036e9fa9ebc749bbf6017963c3bc2cbe7baae1385ee2,2025-04-01T20:26:30.593000
|
||||||
|
CVE-2025-2073,1,1,f733f36fd03c449e68412edf747220800eb0e3fcf083c2c2f10adab9b8a4f9ec,2025-04-16T23:15:45.610000
|
||||||
CVE-2025-2074,0,0,ca58bf592b5066d06227c815801f5f95341e4e9e4e43bd9476138e9763d951e8,2025-03-28T18:11:40.180000
|
CVE-2025-2074,0,0,ca58bf592b5066d06227c815801f5f95341e4e9e4e43bd9476138e9763d951e8,2025-03-28T18:11:40.180000
|
||||||
CVE-2025-2075,0,0,ab55a51247ee2850d4e2152336537ca54db9312a277429beb604e88703e48472,2025-04-07T14:18:15.560000
|
CVE-2025-2075,0,0,ab55a51247ee2850d4e2152336537ca54db9312a277429beb604e88703e48472,2025-04-07T14:18:15.560000
|
||||||
CVE-2025-2076,0,0,97b36f1e6f07a313a2c81becc36dc64919123b61205ecb45483897067337e6f1,2025-04-07T20:51:08.497000
|
CVE-2025-2076,0,0,97b36f1e6f07a313a2c81becc36dc64919123b61205ecb45483897067337e6f1,2025-04-07T20:51:08.497000
|
||||||
@ -283384,14 +283391,14 @@ CVE-2025-21574,0,0,a9e09396da256a71c873f1d7603036dea8ca5b199b826133353b177c18c3b
|
|||||||
CVE-2025-21575,0,0,b5cea0349cd74a802b56d0c43ed156083e814e7611b9efd28a8942850f7d3df3,2025-04-16T15:15:54.663000
|
CVE-2025-21575,0,0,b5cea0349cd74a802b56d0c43ed156083e814e7611b9efd28a8942850f7d3df3,2025-04-16T15:15:54.663000
|
||||||
CVE-2025-21576,0,0,8469978b0c3364fc3a7da135c14871569eb91d65a303c0738bfb0493932f55fc,2025-04-16T15:15:54.790000
|
CVE-2025-21576,0,0,8469978b0c3364fc3a7da135c14871569eb91d65a303c0738bfb0493932f55fc,2025-04-16T15:15:54.790000
|
||||||
CVE-2025-21577,0,0,12696179ed4cb03d433f4d52d6702fbc03d5adc396c5a5d666da65646043693d,2025-04-16T15:15:54.913000
|
CVE-2025-21577,0,0,12696179ed4cb03d433f4d52d6702fbc03d5adc396c5a5d666da65646043693d,2025-04-16T15:15:54.913000
|
||||||
CVE-2025-21578,0,1,cc55bc7568035bc69e2870069584c89382dcaff2bc5a0d10d727bca3cce74819,2025-04-16T21:15:46.080000
|
CVE-2025-21578,0,0,cc55bc7568035bc69e2870069584c89382dcaff2bc5a0d10d727bca3cce74819,2025-04-16T21:15:46.080000
|
||||||
CVE-2025-21579,0,1,d3388049f250b9ffa15b3f3059f6fe1844bad7dae13d6039e83ed04f10fcc7d7,2025-04-16T21:15:46.193000
|
CVE-2025-21579,0,0,d3388049f250b9ffa15b3f3059f6fe1844bad7dae13d6039e83ed04f10fcc7d7,2025-04-16T21:15:46.193000
|
||||||
CVE-2025-21580,0,1,56dfa4e85b58b4ee478c33fb7a0d1d0c920d73518bf1e631d074de98000794f0,2025-04-16T21:15:46.303000
|
CVE-2025-21580,0,0,56dfa4e85b58b4ee478c33fb7a0d1d0c920d73518bf1e631d074de98000794f0,2025-04-16T21:15:46.303000
|
||||||
CVE-2025-21581,0,1,9c149b66e3275e4f9574a1b5e234f7f21ff0536cfccb7a9b9ff196ddea4a2a36,2025-04-16T21:15:46.413000
|
CVE-2025-21581,0,0,9c149b66e3275e4f9574a1b5e234f7f21ff0536cfccb7a9b9ff196ddea4a2a36,2025-04-16T21:15:46.413000
|
||||||
CVE-2025-21582,0,1,73b486e07da32152d0796ff19ab6f451b6bd6889bb5d27f60ead23e8e5584ce9,2025-04-16T21:15:46.527000
|
CVE-2025-21582,0,0,73b486e07da32152d0796ff19ab6f451b6bd6889bb5d27f60ead23e8e5584ce9,2025-04-16T21:15:46.527000
|
||||||
CVE-2025-21583,0,0,fc5e501e698193a967bccf982877e2bf49fdd82bf5233cb505b16543178cca76,2025-04-16T13:25:59.640000
|
CVE-2025-21583,0,0,fc5e501e698193a967bccf982877e2bf49fdd82bf5233cb505b16543178cca76,2025-04-16T13:25:59.640000
|
||||||
CVE-2025-21584,0,1,1bb5fd3228da83e15506d762334b7eb6e25eb3738beea4c15962e81bfaf0e2f8,2025-04-16T20:15:16.947000
|
CVE-2025-21584,0,0,1bb5fd3228da83e15506d762334b7eb6e25eb3738beea4c15962e81bfaf0e2f8,2025-04-16T20:15:16.947000
|
||||||
CVE-2025-21585,0,1,bdb1a1bce2cc87b668ceb99c423d8aad8935f5b10c1d981ae6ae23e79f6c7ba6,2025-04-16T20:15:17.057000
|
CVE-2025-21585,0,0,bdb1a1bce2cc87b668ceb99c423d8aad8935f5b10c1d981ae6ae23e79f6c7ba6,2025-04-16T20:15:17.057000
|
||||||
CVE-2025-21586,0,0,bc1b0dbbae635786848486bd27d63ee575b048d119ff6891efb83f4a54063275,2025-04-16T16:15:29.603000
|
CVE-2025-21586,0,0,bc1b0dbbae635786848486bd27d63ee575b048d119ff6891efb83f4a54063275,2025-04-16T16:15:29.603000
|
||||||
CVE-2025-21587,0,0,eedad467194fde544fab5917243d8c2a1c7fd2b88079264f6486607d67044c95,2025-04-16T16:15:29.730000
|
CVE-2025-21587,0,0,eedad467194fde544fab5917243d8c2a1c7fd2b88079264f6486607d67044c95,2025-04-16T16:15:29.730000
|
||||||
CVE-2025-21588,0,0,f4b970b6c82c586314a19772bb43ae24f77ca27154b8cc695b2ced30e5d02b28,2025-04-16T16:15:29.840000
|
CVE-2025-21588,0,0,f4b970b6c82c586314a19772bb43ae24f77ca27154b8cc695b2ced30e5d02b28,2025-04-16T16:15:29.840000
|
||||||
@ -284542,7 +284549,7 @@ CVE-2025-22869,0,0,79719125726880f26bc2b13b7ff722f5a8e85ca88bf5332b957a80e592d67
|
|||||||
CVE-2025-2287,0,0,8813dfc8049edc90f8c2884aee49dcafb730530912f5261432ad51214abb5088,2025-04-08T18:13:53.347000
|
CVE-2025-2287,0,0,8813dfc8049edc90f8c2884aee49dcafb730530912f5261432ad51214abb5088,2025-04-08T18:13:53.347000
|
||||||
CVE-2025-22870,0,0,5e2155600788a6616ffe365d219c4b2615228a685c5d4bcb3d43989a57212eec,2025-03-18T17:15:45.467000
|
CVE-2025-22870,0,0,5e2155600788a6616ffe365d219c4b2615228a685c5d4bcb3d43989a57212eec,2025-03-18T17:15:45.467000
|
||||||
CVE-2025-22871,0,0,5e0c07a56f9d9b1e220de2ed08857b9f0fb1c1919df08a2562023c832dbb7098,2025-04-09T20:02:41.860000
|
CVE-2025-22871,0,0,5e0c07a56f9d9b1e220de2ed08857b9f0fb1c1919df08a2562023c832dbb7098,2025-04-09T20:02:41.860000
|
||||||
CVE-2025-22872,0,1,a5255faca646b559f4db0dd5178fef5d605c56546ae2d47b8c518b2c5e94f879,2025-04-16T21:15:46.640000
|
CVE-2025-22872,0,0,a5255faca646b559f4db0dd5178fef5d605c56546ae2d47b8c518b2c5e94f879,2025-04-16T21:15:46.640000
|
||||||
CVE-2025-2288,0,0,ea5cf9eb4e5e7d5beb8e92f7104073ba5d1adc8fc07f8a97145fc23482c0367a,2025-04-08T18:13:53.347000
|
CVE-2025-2288,0,0,ea5cf9eb4e5e7d5beb8e92f7104073ba5d1adc8fc07f8a97145fc23482c0367a,2025-04-08T18:13:53.347000
|
||||||
CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000
|
CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000
|
||||||
CVE-2025-22881,0,0,bac764bb844fd45fc50560c993c0edd1d8ed2c5159276215579d0cda943f98d6,2025-02-26T08:14:25.137000
|
CVE-2025-22881,0,0,bac764bb844fd45fc50560c993c0edd1d8ed2c5159276215579d0cda943f98d6,2025-02-26T08:14:25.137000
|
||||||
@ -285428,6 +285435,7 @@ CVE-2025-23995,0,0,fc33427766934e6ec798a3acad36041ca77888d3bd75447ef8556d65238e1
|
|||||||
CVE-2025-23996,0,0,044a631ccc7b953428bed6ca4f1e78634642ba7fb893e1284d5301e8ce6e28fa,2025-01-21T18:15:17.503000
|
CVE-2025-23996,0,0,044a631ccc7b953428bed6ca4f1e78634642ba7fb893e1284d5301e8ce6e28fa,2025-01-21T18:15:17.503000
|
||||||
CVE-2025-23997,0,0,77e65675aa34b148df76ab43b9568b71cc7208d39621afbe6f65c277717cb0b4,2025-01-21T14:15:13.230000
|
CVE-2025-23997,0,0,77e65675aa34b148df76ab43b9568b71cc7208d39621afbe6f65c277717cb0b4,2025-01-21T14:15:13.230000
|
||||||
CVE-2025-23998,0,0,4ced4b8f68a6d09d5a1c825ec6107a84dbbb418c96e80844463996fce823e3ed,2025-01-21T14:15:13.413000
|
CVE-2025-23998,0,0,4ced4b8f68a6d09d5a1c825ec6107a84dbbb418c96e80844463996fce823e3ed,2025-01-21T14:15:13.413000
|
||||||
|
CVE-2025-2400,1,1,cb277ee1e8117318fb6e147a1b2b1e1371201876775172b424ebe4df769d43b5,2025-04-16T23:15:45.697000
|
||||||
CVE-2025-24001,0,0,2c753840ec158b2e8c5040a7ed2631e45b8667250a806707291f782ebc7cf4aa,2025-01-21T14:15:13.600000
|
CVE-2025-24001,0,0,2c753840ec158b2e8c5040a7ed2631e45b8667250a806707291f782ebc7cf4aa,2025-01-21T14:15:13.600000
|
||||||
CVE-2025-2401,0,0,180afd0114e466b052cbb68cdf002b3c7d20a7d9b28a41a0f1ffe2ed37af9438,2025-03-17T13:15:39.803000
|
CVE-2025-2401,0,0,180afd0114e466b052cbb68cdf002b3c7d20a7d9b28a41a0f1ffe2ed37af9438,2025-03-17T13:15:39.803000
|
||||||
CVE-2025-24010,0,0,755be8be1475b71408bd0286ec94084c98023c6a02427820a8766e3be39154b8,2025-01-20T16:15:28.730000
|
CVE-2025-24010,0,0,755be8be1475b71408bd0286ec94084c98023c6a02427820a8766e3be39154b8,2025-01-20T16:15:28.730000
|
||||||
@ -285728,13 +285736,13 @@ CVE-2025-24418,0,0,0b9e05d200d3572fa40b73de6ce7cb0a74c0ccc71a55a2519fc8f76ce03aa
|
|||||||
CVE-2025-24419,0,0,0dff8daac36e461e8338325349b5de4746cdbc5f9cbaad6fc9787efbaaff8022,2025-04-16T17:17:01.200000
|
CVE-2025-24419,0,0,0dff8daac36e461e8338325349b5de4746cdbc5f9cbaad6fc9787efbaaff8022,2025-04-16T17:17:01.200000
|
||||||
CVE-2025-2442,0,0,4190cd9f490d0cbc14aa7b27b97f63f4216090124f0a62ddf28f2664d24ac2c5,2025-04-09T20:02:41.860000
|
CVE-2025-2442,0,0,4190cd9f490d0cbc14aa7b27b97f63f4216090124f0a62ddf28f2664d24ac2c5,2025-04-09T20:02:41.860000
|
||||||
CVE-2025-24420,0,0,b7284458a856bbe258fa5ccb45ddb789ad78b44c296ba6e8a8c672c9a7711993,2025-04-16T17:16:51.277000
|
CVE-2025-24420,0,0,b7284458a856bbe258fa5ccb45ddb789ad78b44c296ba6e8a8c672c9a7711993,2025-04-16T17:16:51.277000
|
||||||
CVE-2025-24421,0,1,374ccb79614972a85b750ce079529bcc02ec96f30176bc9fbff45f11a13133b3,2025-04-16T20:15:17.170000
|
CVE-2025-24421,0,0,374ccb79614972a85b750ce079529bcc02ec96f30176bc9fbff45f11a13133b3,2025-04-16T20:15:17.170000
|
||||||
CVE-2025-24422,0,0,6b8096e72f934f64c5925e489b4e3f03640c514d9fe890dff8b87672bc735ade,2025-04-16T17:16:43.853000
|
CVE-2025-24422,0,0,6b8096e72f934f64c5925e489b4e3f03640c514d9fe890dff8b87672bc735ade,2025-04-16T17:16:43.853000
|
||||||
CVE-2025-24423,0,0,bfd9d82bede896d4cb5f22dc83da35beda5e880014994c0510a23aa20fba7396,2025-04-16T17:16:37.320000
|
CVE-2025-24423,0,0,bfd9d82bede896d4cb5f22dc83da35beda5e880014994c0510a23aa20fba7396,2025-04-16T17:16:37.320000
|
||||||
CVE-2025-24424,0,0,e55cb3328000bae616509b5a3ca2e3ab08ceda2c9fb430a2bf6e9fa851cfdde3,2025-04-16T17:16:10.380000
|
CVE-2025-24424,0,0,e55cb3328000bae616509b5a3ca2e3ab08ceda2c9fb430a2bf6e9fa851cfdde3,2025-04-16T17:16:10.380000
|
||||||
CVE-2025-24425,0,0,544e24fb5861c08f50241c0900b75732f7ace8ae9fb499ef3f2243360578a7fd,2025-03-05T18:32:12.530000
|
CVE-2025-24425,0,0,544e24fb5861c08f50241c0900b75732f7ace8ae9fb499ef3f2243360578a7fd,2025-03-05T18:32:12.530000
|
||||||
CVE-2025-24426,0,0,03bec720441a3a673238f11ac31be6c9efb917575e7a75f14c8f68935f723c76,2025-04-16T17:16:04
|
CVE-2025-24426,0,0,03bec720441a3a673238f11ac31be6c9efb917575e7a75f14c8f68935f723c76,2025-04-16T17:16:04
|
||||||
CVE-2025-24427,0,1,4de9d57a157e58e4e2aa891bfde852ec31ccca3f06080766557ca7d9ff39d663,2025-04-16T20:15:17.313000
|
CVE-2025-24427,0,0,4de9d57a157e58e4e2aa891bfde852ec31ccca3f06080766557ca7d9ff39d663,2025-04-16T20:15:17.313000
|
||||||
CVE-2025-24428,0,0,d362fd3d6b3216dc8e7bd86c697cdb90a903d9c76b342cb6299162b6ab48e211,2025-03-03T15:51:40.090000
|
CVE-2025-24428,0,0,d362fd3d6b3216dc8e7bd86c697cdb90a903d9c76b342cb6299162b6ab48e211,2025-03-03T15:51:40.090000
|
||||||
CVE-2025-24429,0,0,3890fb9af95ea402a42f76d7522e17fb69a860e6735ccd8adf88141b140813e6,2025-04-16T14:27:27.770000
|
CVE-2025-24429,0,0,3890fb9af95ea402a42f76d7522e17fb69a860e6735ccd8adf88141b140813e6,2025-04-16T14:27:27.770000
|
||||||
CVE-2025-24430,0,0,2d690f4c808e65333c8d6be4dc029f0fb527153402d8560e01c5c3848f8480f7,2025-04-16T14:25:10.510000
|
CVE-2025-24430,0,0,2d690f4c808e65333c8d6be4dc029f0fb527153402d8560e01c5c3848f8480f7,2025-04-16T14:25:10.510000
|
||||||
@ -286106,7 +286114,12 @@ CVE-2025-24903,0,0,f94c50d2f0574a93b5b48805712360c1af6392fea087d65c2ed61830aedff
|
|||||||
CVE-2025-24904,0,0,922b25d3a9b426b643b71230fe8a3d6600552e09598c6cd6bc1bcb32f760c1d1,2025-02-13T16:16:49.053000
|
CVE-2025-24904,0,0,922b25d3a9b426b643b71230fe8a3d6600552e09598c6cd6bc1bcb32f760c1d1,2025-02-13T16:16:49.053000
|
||||||
CVE-2025-24905,0,0,a12cf1d4a84b7dfc2fc6ddf401dddb1af801de5f0e459b8125fad6e258d821aa,2025-02-13T19:00:37.593000
|
CVE-2025-24905,0,0,a12cf1d4a84b7dfc2fc6ddf401dddb1af801de5f0e459b8125fad6e258d821aa,2025-02-13T19:00:37.593000
|
||||||
CVE-2025-24906,0,0,c4750456c80f4de3a8d1ced568cbceb00ad477041c107087bb6724cafda48816,2025-02-13T18:59:59.940000
|
CVE-2025-24906,0,0,c4750456c80f4de3a8d1ced568cbceb00ad477041c107087bb6724cafda48816,2025-02-13T18:59:59.940000
|
||||||
|
CVE-2025-24907,1,1,9e413b69d33bff2ec85f496f439c5e8098d9d4edee10103b2bfdeb1e62457033,2025-04-16T23:15:45.027000
|
||||||
|
CVE-2025-24908,1,1,bf4977fdee0b84761f61038bf9e67b8ed9ff407b4a6c9a63105e162dec8c6842,2025-04-16T23:15:45.147000
|
||||||
|
CVE-2025-24909,1,1,83597d5e92615d8f839fa2b1324216a6d4c31a7b2c98f79df25daed836296754,2025-04-16T23:15:45.263000
|
||||||
CVE-2025-2491,0,0,a0733df35b55730cd2b5dbe4143a0c5c885964cd78e8115aea22f767407fa474,2025-03-18T15:16:01.707000
|
CVE-2025-2491,0,0,a0733df35b55730cd2b5dbe4143a0c5c885964cd78e8115aea22f767407fa474,2025-03-18T15:16:01.707000
|
||||||
|
CVE-2025-24910,1,1,aea5315d6f9ea58ab4df3c550695318661f5efb240546e707ff4d04dea9d573d,2025-04-16T23:15:45.373000
|
||||||
|
CVE-2025-24911,1,1,af0824fa76e4a0ae20e6cfaa00aa9282068832b4deb84412b81b5535baed6d30,2025-04-16T23:15:45.490000
|
||||||
CVE-2025-24912,0,0,d10f05928f11c7a00e2a62c8635f9af5917fec081444b4d22020eb25a54c0654,2025-03-12T05:15:37.430000
|
CVE-2025-24912,0,0,d10f05928f11c7a00e2a62c8635f9af5917fec081444b4d22020eb25a54c0654,2025-03-12T05:15:37.430000
|
||||||
CVE-2025-24915,0,0,24c26ca53ef1e2928a50350b0dbd455453bdc6581f1752ca8926cd09252dcb45,2025-03-21T15:15:42.020000
|
CVE-2025-24915,0,0,24c26ca53ef1e2928a50350b0dbd455453bdc6581f1752ca8926cd09252dcb45,2025-03-21T15:15:42.020000
|
||||||
CVE-2025-24920,0,0,f7f8f763bf4982c0df509bbeae99871e92e5c9a0b38af941d8b9c06be0af01ab,2025-03-27T14:10:53.500000
|
CVE-2025-24920,0,0,f7f8f763bf4982c0df509bbeae99871e92e5c9a0b38af941d8b9c06be0af01ab,2025-03-27T14:10:53.500000
|
||||||
@ -286334,6 +286347,7 @@ CVE-2025-25224,0,0,a4f44e8389415111624e6d3b431cded203f069a8e58de6c5b5f4eb5c08d09
|
|||||||
CVE-2025-25225,0,0,50e1db0214d749384eee9692d10836c10107d4550447d640f020938a4553ed14,2025-03-18T17:15:45.920000
|
CVE-2025-25225,0,0,50e1db0214d749384eee9692d10836c10107d4550447d640f020938a4553ed14,2025-03-18T17:15:45.920000
|
||||||
CVE-2025-25226,0,0,c1d011e8e7ba6b6c9f469aa960fb7064e4361a6d4416d3477e347671e561cfd3,2025-04-09T15:16:01.923000
|
CVE-2025-25226,0,0,c1d011e8e7ba6b6c9f469aa960fb7064e4361a6d4416d3477e347671e561cfd3,2025-04-09T15:16:01.923000
|
||||||
CVE-2025-25227,0,0,14dde9d48b40850eb1a2d705436b8ead1fc46d2a4e1905b71e2c6de779c3c0c1,2025-04-08T19:15:47.290000
|
CVE-2025-25227,0,0,14dde9d48b40850eb1a2d705436b8ead1fc46d2a4e1905b71e2c6de779c3c0c1,2025-04-08T19:15:47.290000
|
||||||
|
CVE-2025-25230,1,1,8a2ad333af0aca7a154e89624242b3f795e091cda3ab656868bad784eeea0af0,2025-04-16T22:15:14.073000
|
||||||
CVE-2025-25241,0,0,f70d628c4466ad6abe844cd65a2579f5c9e5af240d0c56eadc1f05ff31a52618,2025-02-18T18:15:34.967000
|
CVE-2025-25241,0,0,f70d628c4466ad6abe844cd65a2579f5c9e5af240d0c56eadc1f05ff31a52618,2025-02-18T18:15:34.967000
|
||||||
CVE-2025-25242,0,0,9434714e72888d1a52e5bad48430408baa107619f6e4dcba8f508d71d8cfd58f,2025-03-11T01:15:34.777000
|
CVE-2025-25242,0,0,9434714e72888d1a52e5bad48430408baa107619f6e4dcba8f508d71d8cfd58f,2025-03-11T01:15:34.777000
|
||||||
CVE-2025-25243,0,0,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72aa0,2025-02-18T18:15:35.160000
|
CVE-2025-25243,0,0,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72aa0,2025-02-18T18:15:35.160000
|
||||||
@ -286692,7 +286706,7 @@ CVE-2025-26127,0,0,ff848518068745ae246227c687011816436068efa4d4914700821387766f6
|
|||||||
CVE-2025-26136,0,0,2adb34c79a3ec7fe584c4e7725e79c104805fdaa01d3b24e5975e14259ccd144,2025-03-05T17:15:16.017000
|
CVE-2025-26136,0,0,2adb34c79a3ec7fe584c4e7725e79c104805fdaa01d3b24e5975e14259ccd144,2025-03-05T17:15:16.017000
|
||||||
CVE-2025-26137,0,0,004205e5376adff96c010e010531e03852f5eb4905a1a3c73ed331cf2f44f325,2025-04-01T20:37:44.117000
|
CVE-2025-26137,0,0,004205e5376adff96c010e010531e03852f5eb4905a1a3c73ed331cf2f44f325,2025-04-01T20:37:44.117000
|
||||||
CVE-2025-26138,0,0,4c83b447574a31d9857c309d7f5649f5104ee78c2e6617a4327eaace6a44e40b,2025-04-01T20:37:28.490000
|
CVE-2025-26138,0,0,4c83b447574a31d9857c309d7f5649f5104ee78c2e6617a4327eaace6a44e40b,2025-04-01T20:37:28.490000
|
||||||
CVE-2025-26153,1,1,99e4c74aa7b3148191d29e10b48d2751daf5f248d0cc62d9d1636ff13c76d613,2025-04-16T21:15:46.770000
|
CVE-2025-26153,0,0,99e4c74aa7b3148191d29e10b48d2751daf5f248d0cc62d9d1636ff13c76d613,2025-04-16T21:15:46.770000
|
||||||
CVE-2025-26156,0,0,962eae3fa0ac2ee7ef9345ac9060a4193d262807409fdde8171c1e14753b4430,2025-04-02T18:49:33.170000
|
CVE-2025-26156,0,0,962eae3fa0ac2ee7ef9345ac9060a4193d262807409fdde8171c1e14753b4430,2025-04-02T18:49:33.170000
|
||||||
CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000
|
CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000
|
||||||
CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000
|
CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000
|
||||||
@ -287800,7 +287814,7 @@ CVE-2025-2803,0,0,e47ecd50bab8435762f20a0360685d74e0ceaca5cc3e5df3e0509ccc4da5c5
|
|||||||
CVE-2025-2804,0,0,05befb6a988325f06e55dd5b0c814f5549862889b3223abfcf82e08eebaa0244,2025-03-28T18:11:40.180000
|
CVE-2025-2804,0,0,05befb6a988325f06e55dd5b0c814f5549862889b3223abfcf82e08eebaa0244,2025-03-28T18:11:40.180000
|
||||||
CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d084,2025-04-11T15:39:52.920000
|
CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d084,2025-04-11T15:39:52.920000
|
||||||
CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000
|
CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000
|
||||||
CVE-2025-28072,1,1,d19de959c1a426b8392743735e0bc8eb43cb6f87a1dfb27d8c072076f3f51fae,2025-04-16T21:15:46.883000
|
CVE-2025-28072,0,0,d19de959c1a426b8392743735e0bc8eb43cb6f87a1dfb27d8c072076f3f51fae,2025-04-16T21:15:46.883000
|
||||||
CVE-2025-2808,0,0,2d9ef6fcbe323df90c90b4e91a51bb82e8f5ef9746894b9f5e9c32273a3c6988,2025-04-08T18:13:53.347000
|
CVE-2025-2808,0,0,2d9ef6fcbe323df90c90b4e91a51bb82e8f5ef9746894b9f5e9c32273a3c6988,2025-04-08T18:13:53.347000
|
||||||
CVE-2025-28087,0,0,1a24fc8fa031815998ab3cec95d83c4ceea417049d18cb4b484e469d0233d5a6,2025-04-07T14:22:33.160000
|
CVE-2025-28087,0,0,1a24fc8fa031815998ab3cec95d83c4ceea417049d18cb4b484e469d0233d5a6,2025-04-07T14:22:33.160000
|
||||||
CVE-2025-28089,0,0,67dcb00b253159ea36147dba2ae48f5f5632d8f7c0e820c0f6cd1525d263b4dd,2025-04-07T14:20:46.543000
|
CVE-2025-28089,0,0,67dcb00b253159ea36147dba2ae48f5f5632d8f7c0e820c0f6cd1525d263b4dd,2025-04-07T14:20:46.543000
|
||||||
@ -288133,23 +288147,23 @@ CVE-2025-2964,0,0,ec69ae3f38e343756ba814c2e5955dca4ab2cdb43321644a6a3ca4d2fda05b
|
|||||||
CVE-2025-29640,0,0,10d69d5153affdfdd1cfbbf32b1c82cf02889c3684c0ecfe28cc371bbe51cc15,2025-04-01T20:23:29.113000
|
CVE-2025-29640,0,0,10d69d5153affdfdd1cfbbf32b1c82cf02889c3684c0ecfe28cc371bbe51cc15,2025-04-01T20:23:29.113000
|
||||||
CVE-2025-29641,0,0,07728e025c7edec0a6c57cfca48077e7931db6a66e70d6357266b91cead71f8a,2025-04-01T20:23:16.657000
|
CVE-2025-29641,0,0,07728e025c7edec0a6c57cfca48077e7931db6a66e70d6357266b91cead71f8a,2025-04-01T20:23:16.657000
|
||||||
CVE-2025-29647,0,0,b2c68859973ff17d99e38be6964fb50b00d742d76463efee1e3f756976e68d06,2025-04-08T20:15:30.700000
|
CVE-2025-29647,0,0,b2c68859973ff17d99e38be6964fb50b00d742d76463efee1e3f756976e68d06,2025-04-08T20:15:30.700000
|
||||||
CVE-2025-29648,1,1,3da34d143cb76b9e6cdc7f07c5a45cdfc6673e59bed4a387a91eee3a985ae63f,2025-04-16T21:15:46.993000
|
CVE-2025-29648,0,0,3da34d143cb76b9e6cdc7f07c5a45cdfc6673e59bed4a387a91eee3a985ae63f,2025-04-16T21:15:46.993000
|
||||||
CVE-2025-29649,1,1,7ee42729c8da140fc26bbe04aabbcdc7696a5ad9859c7d032fbea5ba895dc252,2025-04-16T21:15:47.147000
|
CVE-2025-29649,0,0,7ee42729c8da140fc26bbe04aabbcdc7696a5ad9859c7d032fbea5ba895dc252,2025-04-16T21:15:47.147000
|
||||||
CVE-2025-2965,0,0,b1d83303c83fa5c453f89d281c2631e556dad3281735af3c32f95354d255295b,2025-04-04T01:15:39.727000
|
CVE-2025-2965,0,0,b1d83303c83fa5c453f89d281c2631e556dad3281735af3c32f95354d255295b,2025-04-04T01:15:39.727000
|
||||||
CVE-2025-29650,1,1,12ba4c5d3b709b2e4a7aaf3779615fbf88a7cfa9742f4a27b3b6f2ad14e3f87c,2025-04-16T21:15:47.307000
|
CVE-2025-29650,0,0,12ba4c5d3b709b2e4a7aaf3779615fbf88a7cfa9742f4a27b3b6f2ad14e3f87c,2025-04-16T21:15:47.307000
|
||||||
CVE-2025-29651,1,1,67dc7a89b2f19fb8a612f38cc8faf3aa56e8f01962388e71b22c5d8fd741a29b,2025-04-16T20:15:17.760000
|
CVE-2025-29651,0,0,67dc7a89b2f19fb8a612f38cc8faf3aa56e8f01962388e71b22c5d8fd741a29b,2025-04-16T20:15:17.760000
|
||||||
CVE-2025-29652,1,1,27d24f9ef4f73977fc01d99610d4bf3cf156bc77f94e9ebc2b03f3164d7ee36d,2025-04-16T20:15:17.860000
|
CVE-2025-29652,0,0,27d24f9ef4f73977fc01d99610d4bf3cf156bc77f94e9ebc2b03f3164d7ee36d,2025-04-16T20:15:17.860000
|
||||||
CVE-2025-29653,1,1,b81026b785a38e3f2f8169b6323d723309a175ed17bd463588a943999d00ffb0,2025-04-16T20:15:17.963000
|
CVE-2025-29653,0,0,b81026b785a38e3f2f8169b6323d723309a175ed17bd463588a943999d00ffb0,2025-04-16T20:15:17.963000
|
||||||
CVE-2025-2966,0,0,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000
|
CVE-2025-2966,0,0,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000
|
||||||
CVE-2025-2967,0,0,14b33c1f634d82e0ee8f6eba9d8900eb26f8e5ef6b28fe9846307dc0432895cc,2025-04-04T01:15:39.857000
|
CVE-2025-2967,0,0,14b33c1f634d82e0ee8f6eba9d8900eb26f8e5ef6b28fe9846307dc0432895cc,2025-04-04T01:15:39.857000
|
||||||
CVE-2025-2968,0,0,2f5310773b41e32a0609f9013ca63505bab1761feb2b83c508abd214cd1156b1,2025-04-04T01:15:39.930000
|
CVE-2025-2968,0,0,2f5310773b41e32a0609f9013ca63505bab1761feb2b83c508abd214cd1156b1,2025-04-04T01:15:39.930000
|
||||||
CVE-2025-2969,0,0,2c92f9aaf929a695828188a9354c9039b1da27ec28571736050e209bd0423cad,2025-04-04T01:15:40
|
CVE-2025-2969,0,0,2c92f9aaf929a695828188a9354c9039b1da27ec28571736050e209bd0423cad,2025-04-04T01:15:40
|
||||||
CVE-2025-2970,0,0,67c007e67877a94fb703f9d730b81129ea1f6387e2e40954ff831fd4807254f0,2025-04-04T01:15:40.067000
|
CVE-2025-2970,0,0,67c007e67877a94fb703f9d730b81129ea1f6387e2e40954ff831fd4807254f0,2025-04-04T01:15:40.067000
|
||||||
CVE-2025-29705,0,0,d50bc7403680eaf9635e360140860dd9bb945ed47cbe680766215a624ae6d64d,2025-04-15T19:16:07.783000
|
CVE-2025-29705,0,0,d50bc7403680eaf9635e360140860dd9bb945ed47cbe680766215a624ae6d64d,2025-04-15T19:16:07.783000
|
||||||
CVE-2025-29708,1,1,1b936c2bef687442f32dab496c57f1d66f2e2d3c0a38db41b624c108c02dde0b,2025-04-16T21:15:47.460000
|
CVE-2025-29708,0,0,1b936c2bef687442f32dab496c57f1d66f2e2d3c0a38db41b624c108c02dde0b,2025-04-16T21:15:47.460000
|
||||||
CVE-2025-29709,1,1,932dae08215d3f213c20e372aa7f6bae05253d357dc51ffe3dc2d9daa73c3892,2025-04-16T21:15:47.570000
|
CVE-2025-29709,0,0,932dae08215d3f213c20e372aa7f6bae05253d357dc51ffe3dc2d9daa73c3892,2025-04-16T21:15:47.570000
|
||||||
CVE-2025-2971,0,0,2706995c55a7dbc3fec5708d9b29d92444bde85b5e349db5ecc56094ac7bd4d7,2025-04-07T23:15:43.050000
|
CVE-2025-2971,0,0,2706995c55a7dbc3fec5708d9b29d92444bde85b5e349db5ecc56094ac7bd4d7,2025-04-07T23:15:43.050000
|
||||||
CVE-2025-29710,1,1,dee2aeeefd0cbcfd27cec824c1f69b3a17aead5c60c2a7ae2f11b184679dbfa4,2025-04-16T21:15:47.673000
|
CVE-2025-29710,0,0,dee2aeeefd0cbcfd27cec824c1f69b3a17aead5c60c2a7ae2f11b184679dbfa4,2025-04-16T21:15:47.673000
|
||||||
CVE-2025-29719,0,0,8e7057a22540e0bc6e719ee80087d1e3317b2b2e7c0e51bfcdcdafe3f5440328,2025-04-10T14:27:50.553000
|
CVE-2025-29719,0,0,8e7057a22540e0bc6e719ee80087d1e3317b2b2e7c0e51bfcdcdafe3f5440328,2025-04-10T14:27:50.553000
|
||||||
CVE-2025-2972,0,0,9bd90eb57737eba9afab46fcd8061576d92129d2495ebdef7228d08af4388952,2025-04-04T01:15:40.127000
|
CVE-2025-2972,0,0,9bd90eb57737eba9afab46fcd8061576d92129d2495ebdef7228d08af4388952,2025-04-04T01:15:40.127000
|
||||||
CVE-2025-29720,0,0,5ec932914a7d81da0b10599d75c12821d0c2e8eb7f364340baae17593b19712a,2025-04-15T18:39:27.967000
|
CVE-2025-29720,0,0,5ec932914a7d81da0b10599d75c12821d0c2e8eb7f364340baae17593b19712a,2025-04-15T18:39:27.967000
|
||||||
@ -288665,7 +288679,7 @@ CVE-2025-30676,0,0,708f03a86f4c884ecda3f7ec1e5552de291778e3e25b801a6e5af963ebcc8
|
|||||||
CVE-2025-30677,0,0,ac691303aa13f8ca9aabebde82f77f60d124e3f5ca096d5288780405b88472c8,2025-04-09T20:02:41.860000
|
CVE-2025-30677,0,0,ac691303aa13f8ca9aabebde82f77f60d124e3f5ca096d5288780405b88472c8,2025-04-09T20:02:41.860000
|
||||||
CVE-2025-3068,0,0,de66f3afaa7fd4a67fa9d3ab57331fb0ab9491ba6c44d88f9dc6104a16396311,2025-04-07T13:30:02.277000
|
CVE-2025-3068,0,0,de66f3afaa7fd4a67fa9d3ab57331fb0ab9491ba6c44d88f9dc6104a16396311,2025-04-07T13:30:02.277000
|
||||||
CVE-2025-30681,0,0,4df1a0ccddde5b4d4b0622c7fe532b814342d38bcc00203e31b1f646e89182ca,2025-04-16T15:16:10.170000
|
CVE-2025-30681,0,0,4df1a0ccddde5b4d4b0622c7fe532b814342d38bcc00203e31b1f646e89182ca,2025-04-16T15:16:10.170000
|
||||||
CVE-2025-30682,0,1,fe35e0394f10a4326a81f1b241655702139d45ca0593a3de705be42a73d1d5b9,2025-04-16T20:15:18.057000
|
CVE-2025-30682,0,0,fe35e0394f10a4326a81f1b241655702139d45ca0593a3de705be42a73d1d5b9,2025-04-16T20:15:18.057000
|
||||||
CVE-2025-30683,0,0,dfb46681e1e59b565bc83c636f71466021abac81c31b453250c455b92d603736,2025-04-16T19:15:54.427000
|
CVE-2025-30683,0,0,dfb46681e1e59b565bc83c636f71466021abac81c31b453250c455b92d603736,2025-04-16T19:15:54.427000
|
||||||
CVE-2025-30684,0,0,15008d8313d4203976158462220def7dc846c59d125fdc600532d4a20c98fe92,2025-04-16T18:16:05.883000
|
CVE-2025-30684,0,0,15008d8313d4203976158462220def7dc846c59d125fdc600532d4a20c98fe92,2025-04-16T18:16:05.883000
|
||||||
CVE-2025-30685,0,0,b11ad9fe469b2e477ef6f442fb9ad983947cfbc2eea7daf5b8990f68288fdb15,2025-04-16T16:15:32.263000
|
CVE-2025-30685,0,0,b11ad9fe469b2e477ef6f442fb9ad983947cfbc2eea7daf5b8990f68288fdb15,2025-04-16T16:15:32.263000
|
||||||
@ -288678,25 +288692,25 @@ CVE-2025-30690,0,0,917158df2f0cd108363ac9d8cc3bade204129e43a71903793648e3489f357
|
|||||||
CVE-2025-30691,0,0,dda84764d10c0d6f81fbaef02ece4df64b6294b34df1ae31a78a50c2c099b84f,2025-04-16T16:15:32.937000
|
CVE-2025-30691,0,0,dda84764d10c0d6f81fbaef02ece4df64b6294b34df1ae31a78a50c2c099b84f,2025-04-16T16:15:32.937000
|
||||||
CVE-2025-30692,0,0,3161b1f45cecc0a3afa599c1e2826c52f9889c53e2e1e051bcda24c2c2b8b347,2025-04-16T16:15:33.047000
|
CVE-2025-30692,0,0,3161b1f45cecc0a3afa599c1e2826c52f9889c53e2e1e051bcda24c2c2b8b347,2025-04-16T16:15:33.047000
|
||||||
CVE-2025-30693,0,0,75f314d64704b70bf300b7ed3580bcd4d63da3c4e153b93bab0afaa3cf1d9920,2025-04-16T16:15:33.170000
|
CVE-2025-30693,0,0,75f314d64704b70bf300b7ed3580bcd4d63da3c4e153b93bab0afaa3cf1d9920,2025-04-16T16:15:33.170000
|
||||||
CVE-2025-30694,0,1,3270f0d1f242541086999443784f1cd2ae7e6e36bd12ded2ce33f68713f1412d,2025-04-16T20:15:18.170000
|
CVE-2025-30694,0,0,3270f0d1f242541086999443784f1cd2ae7e6e36bd12ded2ce33f68713f1412d,2025-04-16T20:15:18.170000
|
||||||
CVE-2025-30695,0,1,2259babac90148ca0f8ef98c77c3d74f76871fb763868abadc6c539961445241,2025-04-16T20:15:18.283000
|
CVE-2025-30695,0,0,2259babac90148ca0f8ef98c77c3d74f76871fb763868abadc6c539961445241,2025-04-16T20:15:18.283000
|
||||||
CVE-2025-30696,0,0,2f823080fbe70fb899d8f476b24ec728b0cc68b2de13d0cea5269a793f1e80e3,2025-04-16T16:15:33.283000
|
CVE-2025-30696,0,0,2f823080fbe70fb899d8f476b24ec728b0cc68b2de13d0cea5269a793f1e80e3,2025-04-16T16:15:33.283000
|
||||||
CVE-2025-30697,0,1,86ddb528e2c1a9a055b5089342128d39381f5a1c9cc6693f91ae347d629e6342,2025-04-16T20:15:18.393000
|
CVE-2025-30697,0,0,86ddb528e2c1a9a055b5089342128d39381f5a1c9cc6693f91ae347d629e6342,2025-04-16T20:15:18.393000
|
||||||
CVE-2025-30698,0,0,2e0b4ef6a51249a61f937633b8ef9af318b928a4049f1fa2c2faad62ebe3457e,2025-04-16T16:15:33.397000
|
CVE-2025-30698,0,0,2e0b4ef6a51249a61f937633b8ef9af318b928a4049f1fa2c2faad62ebe3457e,2025-04-16T16:15:33.397000
|
||||||
CVE-2025-30699,0,1,1b3bb43705540e565eb0b82cb732e4633d529358091e103d547ad7fe3f656513,2025-04-16T20:15:18.507000
|
CVE-2025-30699,0,0,1b3bb43705540e565eb0b82cb732e4633d529358091e103d547ad7fe3f656513,2025-04-16T20:15:18.507000
|
||||||
CVE-2025-3070,0,0,389eca2715a25e0502dfee20fa689abffda48144e371016d21a2980b0deeba8c,2025-04-07T13:28:06.423000
|
CVE-2025-3070,0,0,389eca2715a25e0502dfee20fa689abffda48144e371016d21a2980b0deeba8c,2025-04-07T13:28:06.423000
|
||||||
CVE-2025-30700,0,1,6df59879402b5165b4d6b565ee0d1d6d0889572749e13acadb2451d22731ed25,2025-04-16T20:15:18.620000
|
CVE-2025-30700,0,0,6df59879402b5165b4d6b565ee0d1d6d0889572749e13acadb2451d22731ed25,2025-04-16T20:15:18.620000
|
||||||
CVE-2025-30701,0,0,9a22cceb291a84409cb4437a523f205f65c6a58cdcb79e514955aa3eee0cd30c,2025-04-16T15:16:10.393000
|
CVE-2025-30701,0,0,9a22cceb291a84409cb4437a523f205f65c6a58cdcb79e514955aa3eee0cd30c,2025-04-16T15:16:10.393000
|
||||||
CVE-2025-30702,0,0,5da8d5ca5c5c79a758df420f71d9d826caea9751a114f91b5b9edc6917be1cf2,2025-04-16T13:25:59.640000
|
CVE-2025-30702,0,0,5da8d5ca5c5c79a758df420f71d9d826caea9751a114f91b5b9edc6917be1cf2,2025-04-16T13:25:59.640000
|
||||||
CVE-2025-30703,0,0,ac760d0ffb27e2362ca52455f2f6be4e2b15aaabab9becab9ba5568298facdcc,2025-04-16T15:16:10.507000
|
CVE-2025-30703,0,0,ac760d0ffb27e2362ca52455f2f6be4e2b15aaabab9becab9ba5568298facdcc,2025-04-16T15:16:10.507000
|
||||||
CVE-2025-30704,0,0,3dadef73d41fba2c7391c893a130d13093bdcfbdccc65f3e41b2e688cc13531c,2025-04-16T15:16:10.613000
|
CVE-2025-30704,0,0,3dadef73d41fba2c7391c893a130d13093bdcfbdccc65f3e41b2e688cc13531c,2025-04-16T15:16:10.613000
|
||||||
CVE-2025-30705,0,0,fce181c4d0f09d4cca66173f8d721e43a514d20bb8ffb16ff1e55ad80a51f057,2025-04-16T14:15:24.910000
|
CVE-2025-30705,0,0,fce181c4d0f09d4cca66173f8d721e43a514d20bb8ffb16ff1e55ad80a51f057,2025-04-16T14:15:24.910000
|
||||||
CVE-2025-30706,0,0,e378eba725d84697ff58c04d29694e6a01c8a9a5f40009abeeb03db5c718db01,2025-04-16T14:15:25.037000
|
CVE-2025-30706,0,0,e378eba725d84697ff58c04d29694e6a01c8a9a5f40009abeeb03db5c718db01,2025-04-16T14:15:25.037000
|
||||||
CVE-2025-30707,0,1,6a914893ca34bf2dabf74d3bce729b9adf8170abd5fd1a999e2256dd0171cc7a,2025-04-16T20:15:18.743000
|
CVE-2025-30707,0,0,6a914893ca34bf2dabf74d3bce729b9adf8170abd5fd1a999e2256dd0171cc7a,2025-04-16T20:15:18.743000
|
||||||
CVE-2025-30708,0,0,79986e2b81e871fbc68eefc7bab3eb8146dedadebe143d92f70268194a98022c,2025-04-16T13:25:59.640000
|
CVE-2025-30708,0,0,79986e2b81e871fbc68eefc7bab3eb8146dedadebe143d92f70268194a98022c,2025-04-16T13:25:59.640000
|
||||||
CVE-2025-30709,0,1,ce664d2db63a71790a627ed826cd05280bb2e3736149e236ac0b210115a9a9ca,2025-04-16T20:15:18.853000
|
CVE-2025-30709,0,0,ce664d2db63a71790a627ed826cd05280bb2e3736149e236ac0b210115a9a9ca,2025-04-16T20:15:18.853000
|
||||||
CVE-2025-3071,0,0,d16bcf87876b69db8889459754164a9a7a5a7660b7bb26af9304dff3429a1889,2025-04-10T21:15:49.347000
|
CVE-2025-3071,0,0,d16bcf87876b69db8889459754164a9a7a5a7660b7bb26af9304dff3429a1889,2025-04-10T21:15:49.347000
|
||||||
CVE-2025-30710,0,1,a5121b4e4191508eb6ce8d319d1d00e60f5016db8c92efd77eaa69ea703dae61,2025-04-16T20:15:18.967000
|
CVE-2025-30710,0,0,a5121b4e4191508eb6ce8d319d1d00e60f5016db8c92efd77eaa69ea703dae61,2025-04-16T20:15:18.967000
|
||||||
CVE-2025-30711,0,0,1e5465f558efc4782f831dbcabf3c5891d8231c2999b8198eb1d5bb90ab63b46,2025-04-16T16:15:33.523000
|
CVE-2025-30711,0,0,1e5465f558efc4782f831dbcabf3c5891d8231c2999b8198eb1d5bb90ab63b46,2025-04-16T16:15:33.523000
|
||||||
CVE-2025-30712,0,0,eac5b0b99e5f8b50cb56cbe2ee1e629963db68c1e9d3f1fc4db92b2affc433d4,2025-04-16T16:15:33.633000
|
CVE-2025-30712,0,0,eac5b0b99e5f8b50cb56cbe2ee1e629963db68c1e9d3f1fc4db92b2affc433d4,2025-04-16T16:15:33.633000
|
||||||
CVE-2025-30713,0,0,1b9f9946ae908a48170d2a70a15ad8fb04aa712960921de2c1d56c95c39b0df1,2025-04-16T16:15:33.747000
|
CVE-2025-30713,0,0,1b9f9946ae908a48170d2a70a15ad8fb04aa712960921de2c1d56c95c39b0df1,2025-04-16T16:15:33.747000
|
||||||
@ -289186,6 +289200,7 @@ CVE-2025-31474,0,0,5e7d6600ce1174be36633aec5902c9252df21c2f48f1552b8554d9d1218e3
|
|||||||
CVE-2025-31475,0,0,d054ab98458109d671d2e3362598fabc0f69079fd0804798837af9591fe8f8e4,2025-04-08T18:14:17.307000
|
CVE-2025-31475,0,0,d054ab98458109d671d2e3362598fabc0f69079fd0804798837af9591fe8f8e4,2025-04-08T18:14:17.307000
|
||||||
CVE-2025-31476,0,0,2278ecebe988f2494770aa5bcdde199a741030c5fdfef8bf4f1b7a701a4a759f,2025-04-08T18:14:17.307000
|
CVE-2025-31476,0,0,2278ecebe988f2494770aa5bcdde199a741030c5fdfef8bf4f1b7a701a4a759f,2025-04-08T18:14:17.307000
|
||||||
CVE-2025-31477,0,0,54285781555488a3668d04893deec45a9e20dfdee4ab1c462d402e7283dfccb5,2025-04-07T14:18:34.453000
|
CVE-2025-31477,0,0,54285781555488a3668d04893deec45a9e20dfdee4ab1c462d402e7283dfccb5,2025-04-07T14:18:34.453000
|
||||||
|
CVE-2025-31478,1,1,b6da6719d326840f501df7f1408ff1de3712392cf9832b5493957c7da4075620,2025-04-16T22:15:14.233000
|
||||||
CVE-2025-31479,0,0,2697cc1817114968aab8eafa22f3d26b926cb32529ad7873759be5d99c686601,2025-04-07T14:18:34.453000
|
CVE-2025-31479,0,0,2697cc1817114968aab8eafa22f3d26b926cb32529ad7873759be5d99c686601,2025-04-07T14:18:34.453000
|
||||||
CVE-2025-3148,0,0,b333acfda68d66ad1bae1483d9c733fd29bd9303bc53eccbc0d0767f3d1c789f,2025-04-07T14:18:34.453000
|
CVE-2025-3148,0,0,b333acfda68d66ad1bae1483d9c733fd29bd9303bc53eccbc0d0767f3d1c789f,2025-04-07T14:18:34.453000
|
||||||
CVE-2025-31480,0,0,dfb43594bbbdcf12c97680368525c0c40e65f0938db26f1a8caa293eb7101deb,2025-04-07T14:18:15.560000
|
CVE-2025-31480,0,0,dfb43594bbbdcf12c97680368525c0c40e65f0938db26f1a8caa293eb7101deb,2025-04-07T14:18:15.560000
|
||||||
@ -289869,6 +289884,7 @@ CVE-2025-32426,0,0,97f7719ef42c67257e2006b52ab9747f51788ff83c926fc892139743aec5a
|
|||||||
CVE-2025-32427,0,0,0416426b54022f69535fafb066a105f3453a61c3cc047d8982deab84a0710a9d,2025-04-11T15:39:52.920000
|
CVE-2025-32427,0,0,0416426b54022f69535fafb066a105f3453a61c3cc047d8982deab84a0710a9d,2025-04-11T15:39:52.920000
|
||||||
CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b345a,2025-04-15T18:39:27.967000
|
CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b345a,2025-04-15T18:39:27.967000
|
||||||
CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000
|
CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000
|
||||||
|
CVE-2025-32433,1,1,6df07494c15d475f1de4e347159ef40acf96f28d5ebdbbd82bad602c3cb04a2c,2025-04-16T22:15:14.373000
|
||||||
CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000
|
CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000
|
||||||
CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000
|
CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000
|
||||||
CVE-2025-32439,0,0,bc2ffe14216b9cfe29b31e6fc5be13f4870b9bbc8f43f42b1dd5fa85872b2005,2025-04-16T13:25:59.640000
|
CVE-2025-32439,0,0,bc2ffe14216b9cfe29b31e6fc5be13f4870b9bbc8f43f42b1dd5fa85872b2005,2025-04-16T13:25:59.640000
|
||||||
@ -290056,12 +290072,16 @@ CVE-2025-32778,0,0,93333c106bade1942d189295a57ca8b886e6e79a18429247cda3fa2e156f8
|
|||||||
CVE-2025-32779,0,0,9b0c0f3e1679aa6a29c07a0230230eddd75bcf03028ff914fcc18fd0552bd825,2025-04-15T18:39:27.967000
|
CVE-2025-32779,0,0,9b0c0f3e1679aa6a29c07a0230230eddd75bcf03028ff914fcc18fd0552bd825,2025-04-15T18:39:27.967000
|
||||||
CVE-2025-32780,0,0,66c032871841ee8f1135c9a708f1264f3edee13154b2ee90fcea8f285386936f,2025-04-15T18:39:27.967000
|
CVE-2025-32780,0,0,66c032871841ee8f1135c9a708f1264f3edee13154b2ee90fcea8f285386936f,2025-04-15T18:39:27.967000
|
||||||
CVE-2025-32782,0,0,ea3e82903e807a520de4c91c10f7d08fd70839175e235aa475d1b12f4a8b1338,2025-04-16T13:25:37.340000
|
CVE-2025-32782,0,0,ea3e82903e807a520de4c91c10f7d08fd70839175e235aa475d1b12f4a8b1338,2025-04-16T13:25:37.340000
|
||||||
|
CVE-2025-32783,1,1,9698e9ba7093dbb73e35c4e21de6279231499f6c0dd02d871a6cc5ae64c5a62f,2025-04-16T22:15:14.523000
|
||||||
CVE-2025-32784,0,0,f07e1bae891c8076c2e74beba24dfa0a792bdc8c6b542f23984d9697f06bd191,2025-04-16T13:25:37.340000
|
CVE-2025-32784,0,0,f07e1bae891c8076c2e74beba24dfa0a792bdc8c6b542f23984d9697f06bd191,2025-04-16T13:25:37.340000
|
||||||
|
CVE-2025-32787,1,1,585e3d1455b8a84e795030e7b0dc4099402e56b99d1c15594a4fd6dc0fe73b3d,2025-04-16T22:15:14.667000
|
||||||
|
CVE-2025-32789,1,1,1db70b23989b905b2aba1aa6683b57fe707a22cfe3f1f5347c6f92571a95f8a6,2025-04-16T22:15:14.800000
|
||||||
|
CVE-2025-32791,1,1,cce811760929409bbc0164cd7083266c1ecce2c2b4b86cf82e6643b37c8fea15,2025-04-16T22:15:14.943000
|
||||||
CVE-2025-32807,0,0,791ea9650394de4a3c6a4bce28448af084ce5e8fb834d69b1769b35b955fdca4,2025-04-11T15:39:52.920000
|
CVE-2025-32807,0,0,791ea9650394de4a3c6a4bce28448af084ce5e8fb834d69b1769b35b955fdca4,2025-04-11T15:39:52.920000
|
||||||
CVE-2025-32808,0,0,4460b802a312298836218e51f145ee69f847802ae0b680f0631fd4c9d767af72,2025-04-11T16:15:20.673000
|
CVE-2025-32808,0,0,4460b802a312298836218e51f145ee69f847802ae0b680f0631fd4c9d767af72,2025-04-11T16:15:20.673000
|
||||||
CVE-2025-32809,0,0,ca90ff3ced06efa4e939486b48b76783f1482c86186847921ab08cd5bd99e3d5,2025-04-11T16:15:20.807000
|
CVE-2025-32809,0,0,ca90ff3ced06efa4e939486b48b76783f1482c86186847921ab08cd5bd99e3d5,2025-04-11T16:15:20.807000
|
||||||
CVE-2025-32816,0,0,7146ab229fea4de6245a9faadeb60513e017f27b734755baaf195d3f55011510,2025-04-11T15:39:52.920000
|
CVE-2025-32816,0,0,7146ab229fea4de6245a9faadeb60513e017f27b734755baaf195d3f55011510,2025-04-11T15:39:52.920000
|
||||||
CVE-2025-32817,1,1,2ce554c565fb4e62b3c662311b1ce451f78c307581785975384122d9afebc7f3,2025-04-16T21:15:47.780000
|
CVE-2025-32817,0,0,2ce554c565fb4e62b3c662311b1ce451f78c307581785975384122d9afebc7f3,2025-04-16T21:15:47.780000
|
||||||
CVE-2025-3282,0,0,4f7d1b48e17ccd00afeee2e7a595ed2b28190fc5a8aec67b855d00f5d80e0bc2,2025-04-15T18:39:27.967000
|
CVE-2025-3282,0,0,4f7d1b48e17ccd00afeee2e7a595ed2b28190fc5a8aec67b855d00f5d80e0bc2,2025-04-15T18:39:27.967000
|
||||||
CVE-2025-32822,0,0,367ecfacf3c74140480293afb0501d7a53327500a3de5132d335460df99583f3,2025-04-16T18:16:07.973000
|
CVE-2025-32822,0,0,367ecfacf3c74140480293afb0501d7a53327500a3de5132d335460df99583f3,2025-04-16T18:16:07.973000
|
||||||
CVE-2025-32823,0,0,d69c9859ee28ca28e054ef2b051867a5f7aaf3609eea5ca6dfa5f7794f4d36be,2025-04-16T18:16:08.120000
|
CVE-2025-32823,0,0,d69c9859ee28ca28e054ef2b051867a5f7aaf3609eea5ca6dfa5f7794f4d36be,2025-04-16T18:16:08.120000
|
||||||
@ -290346,8 +290366,8 @@ CVE-2025-3612,0,0,b3e7e1fd46c9147c27f3feb15d1a5ba8eabce3f8bab41f1f78e6d74dff7b1b
|
|||||||
CVE-2025-3613,0,0,9c314abbc6473987a4462c7f86d0ede7026d1a1d89f3e10127913343b31eedd8,2025-04-15T18:39:27.967000
|
CVE-2025-3613,0,0,9c314abbc6473987a4462c7f86d0ede7026d1a1d89f3e10127913343b31eedd8,2025-04-15T18:39:27.967000
|
||||||
CVE-2025-3617,0,0,8b166380afe19241854c65e4319a7a4bf7fa4a3b21b435fec16e6239c6e67cc8,2025-04-15T18:39:27.967000
|
CVE-2025-3617,0,0,8b166380afe19241854c65e4319a7a4bf7fa4a3b21b435fec16e6239c6e67cc8,2025-04-15T18:39:27.967000
|
||||||
CVE-2025-3618,0,0,eda45473138c6808735db2df162e6171a422dd9195142056b67b3d52202066c7,2025-04-15T18:39:27.967000
|
CVE-2025-3618,0,0,eda45473138c6808735db2df162e6171a422dd9195142056b67b3d52202066c7,2025-04-15T18:39:27.967000
|
||||||
CVE-2025-3619,1,1,53be325581dce300b9e806b9d83ff7fe2c4e86a07254b58c0415f8bff201f32e,2025-04-16T21:15:47.920000
|
CVE-2025-3619,0,0,53be325581dce300b9e806b9d83ff7fe2c4e86a07254b58c0415f8bff201f32e,2025-04-16T21:15:47.920000
|
||||||
CVE-2025-3620,1,1,5027351bfa6940e7b37854be13f32b3ecf3f384d9c50497367f237f03836a78e,2025-04-16T21:15:48.027000
|
CVE-2025-3620,0,0,5027351bfa6940e7b37854be13f32b3ecf3f384d9c50497367f237f03836a78e,2025-04-16T21:15:48.027000
|
||||||
CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac885,2025-04-15T18:39:27.967000
|
CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac885,2025-04-15T18:39:27.967000
|
||||||
CVE-2025-3663,0,0,1ce80bfc94e480b50f27d0432deca8fffb2ad8de6b84f90469934d90488bc703,2025-04-16T13:25:37.340000
|
CVE-2025-3663,0,0,1ce80bfc94e480b50f27d0432deca8fffb2ad8de6b84f90469934d90488bc703,2025-04-16T13:25:37.340000
|
||||||
CVE-2025-3664,0,0,1768dbec432a631292ab0792b91b23e446ed218ac7ee245b57fd6eb101bb8145,2025-04-16T14:15:27.827000
|
CVE-2025-3664,0,0,1768dbec432a631292ab0792b91b23e446ed218ac7ee245b57fd6eb101bb8145,2025-04-16T14:15:27.827000
|
||||||
@ -290360,11 +290380,11 @@ CVE-2025-3675,0,0,8fc64576d9408584769dca7b251b2811cba19ed1b29b0a5e250c895856174a
|
|||||||
CVE-2025-3676,0,0,8b3fc538dc5f1e3498af0923d848cb34d8a7c1143698b7acb611e22232098068,2025-04-16T13:25:37.340000
|
CVE-2025-3676,0,0,8b3fc538dc5f1e3498af0923d848cb34d8a7c1143698b7acb611e22232098068,2025-04-16T13:25:37.340000
|
||||||
CVE-2025-3677,0,0,d0b4158217f3756823f68a8901374ac1abc98276cdc21fdc8b5cbe01ac5c1b87,2025-04-16T13:25:37.340000
|
CVE-2025-3677,0,0,d0b4158217f3756823f68a8901374ac1abc98276cdc21fdc8b5cbe01ac5c1b87,2025-04-16T13:25:37.340000
|
||||||
CVE-2025-3678,0,0,fe7f9b10b498ab4c4118f8e6f6b85a631558210b3c32871c50930a944540940a,2025-04-16T13:25:37.340000
|
CVE-2025-3678,0,0,fe7f9b10b498ab4c4118f8e6f6b85a631558210b3c32871c50930a944540940a,2025-04-16T13:25:37.340000
|
||||||
CVE-2025-3679,0,1,9bcb800b5750e50910dcb692b53ba75fe416d21db6bb5123a1610ed36ae21b8e,2025-04-16T20:15:19.250000
|
CVE-2025-3679,0,0,9bcb800b5750e50910dcb692b53ba75fe416d21db6bb5123a1610ed36ae21b8e,2025-04-16T20:15:19.250000
|
||||||
CVE-2025-3680,0,1,7c2e2289a4ab431cadffbfde63d0b9369934e915e62431b56f236c8cff8a93bc,2025-04-16T20:15:19.350000
|
CVE-2025-3680,0,0,7c2e2289a4ab431cadffbfde63d0b9369934e915e62431b56f236c8cff8a93bc,2025-04-16T20:15:19.350000
|
||||||
CVE-2025-3681,0,1,9873c454c08220b0a960b47b4de43158baa86f135fdd0640a80430eb44cb01cf,2025-04-16T20:15:19.460000
|
CVE-2025-3681,0,0,9873c454c08220b0a960b47b4de43158baa86f135fdd0640a80430eb44cb01cf,2025-04-16T20:15:19.460000
|
||||||
CVE-2025-3682,0,1,b2affd3113c936746dbb5cf91e86a34d1e8ebeb7aa65e59a9cf1b600e5c26a70,2025-04-16T20:15:19.570000
|
CVE-2025-3682,0,0,b2affd3113c936746dbb5cf91e86a34d1e8ebeb7aa65e59a9cf1b600e5c26a70,2025-04-16T20:15:19.570000
|
||||||
CVE-2025-3683,0,1,f37c23cdc7eabdf77512b1e225cee276025d8f967ad5af14a2c8a2cad9f3d57f,2025-04-16T20:15:19.670000
|
CVE-2025-3683,0,0,f37c23cdc7eabdf77512b1e225cee276025d8f967ad5af14a2c8a2cad9f3d57f,2025-04-16T20:15:19.670000
|
||||||
CVE-2025-3684,0,0,005ffbd66ba10e6ec962169c35b3b4430afe7279dee228e65b372cdafae7a9a2,2025-04-16T19:15:55
|
CVE-2025-3684,0,0,005ffbd66ba10e6ec962169c35b3b4430afe7279dee228e65b372cdafae7a9a2,2025-04-16T19:15:55
|
||||||
CVE-2025-3685,0,0,a038f7016d9d7aee9eb0536d9d006e5189794d512e4af0149f231284d7782e60,2025-04-16T13:25:37.340000
|
CVE-2025-3685,0,0,a038f7016d9d7aee9eb0536d9d006e5189794d512e4af0149f231284d7782e60,2025-04-16T13:25:37.340000
|
||||||
CVE-2025-3686,0,0,7959444999d939397b75d41bf9d8d3af522c96b7a107cfe0f6ed3f78546dfcf6,2025-04-16T13:25:37.340000
|
CVE-2025-3686,0,0,7959444999d939397b75d41bf9d8d3af522c96b7a107cfe0f6ed3f78546dfcf6,2025-04-16T13:25:37.340000
|
||||||
@ -290379,15 +290399,15 @@ CVE-2025-3694,0,0,cbb6dbf67e78d678a0c32ccc77f656ed9d7bcf54631f37150d9885e2b9018d
|
|||||||
CVE-2025-3696,0,0,2bf939535fa8806cc4e793051666a9e5b91fe8b6ba8aa52a4170f8f7466c8498,2025-04-16T15:16:14.287000
|
CVE-2025-3696,0,0,2bf939535fa8806cc4e793051666a9e5b91fe8b6ba8aa52a4170f8f7466c8498,2025-04-16T15:16:14.287000
|
||||||
CVE-2025-3697,0,0,8d41cda9f6cb466619110c3390fbf369e5e587d610bb308b7d6acf4a2a9ce41f,2025-04-16T15:16:14.460000
|
CVE-2025-3697,0,0,8d41cda9f6cb466619110c3390fbf369e5e587d610bb308b7d6acf4a2a9ce41f,2025-04-16T15:16:14.460000
|
||||||
CVE-2025-3698,0,0,06aad761edbce101a35f9e95ce891a7c8bf2c6f046c74b9a4ac2fd5d41b56e3f,2025-04-16T14:15:29.060000
|
CVE-2025-3698,0,0,06aad761edbce101a35f9e95ce891a7c8bf2c6f046c74b9a4ac2fd5d41b56e3f,2025-04-16T14:15:29.060000
|
||||||
CVE-2025-3723,1,1,5516734ea7b429349db8183353c9a6cae93c902d21883c623672896a15824d8e,2025-04-16T20:15:19.777000
|
CVE-2025-3723,0,0,5516734ea7b429349db8183353c9a6cae93c902d21883c623672896a15824d8e,2025-04-16T20:15:19.777000
|
||||||
CVE-2025-3724,1,1,b85ef0c50063e0bc0a94629cd54a3778b9c0b8cb45af733f3dc605edb78eb841,2025-04-16T20:15:19.960000
|
CVE-2025-3724,0,0,b85ef0c50063e0bc0a94629cd54a3778b9c0b8cb45af733f3dc605edb78eb841,2025-04-16T20:15:19.960000
|
||||||
CVE-2025-3725,1,1,e1421461a06ac674145797f32b0167a7b02acb5d56dcbf6a2e44bcbcd002b389,2025-04-16T20:15:20.123000
|
CVE-2025-3725,0,0,e1421461a06ac674145797f32b0167a7b02acb5d56dcbf6a2e44bcbcd002b389,2025-04-16T20:15:20.123000
|
||||||
CVE-2025-3726,1,1,ba5a7988087a4ee7bf038eaaebf307f105486224e8c1b5abec59c2ac84c52ae8,2025-04-16T20:15:20.283000
|
CVE-2025-3726,0,0,ba5a7988087a4ee7bf038eaaebf307f105486224e8c1b5abec59c2ac84c52ae8,2025-04-16T20:15:20.283000
|
||||||
CVE-2025-3727,1,1,deaa5654d11615e965237b87eac3fb0356d5fa7e28c50ec7abd875586cde793c,2025-04-16T21:15:48.203000
|
CVE-2025-3727,0,0,deaa5654d11615e965237b87eac3fb0356d5fa7e28c50ec7abd875586cde793c,2025-04-16T21:15:48.203000
|
||||||
CVE-2025-3728,1,1,d227904395147b87ad7d649add61aa5661016d64da3169ef547e709d8ac74dd4,2025-04-16T21:15:48.363000
|
CVE-2025-3728,0,0,d227904395147b87ad7d649add61aa5661016d64da3169ef547e709d8ac74dd4,2025-04-16T21:15:48.363000
|
||||||
CVE-2025-3729,1,1,e1f3f5695da5391fb19903ebea12f1b012caf6712d19a7605b0164067d14c993,2025-04-16T21:15:48.537000
|
CVE-2025-3729,0,0,e1f3f5695da5391fb19903ebea12f1b012caf6712d19a7605b0164067d14c993,2025-04-16T21:15:48.537000
|
||||||
CVE-2025-3730,1,1,bf8196d9cc10cb8b06b520303adb009d6c422cc02d5140a90b09421a483cdfc5,2025-04-16T21:15:48.700000
|
CVE-2025-3730,0,0,bf8196d9cc10cb8b06b520303adb009d6c422cc02d5140a90b09421a483cdfc5,2025-04-16T21:15:48.700000
|
||||||
CVE-2025-3733,0,1,b7ac17b7c057f630b68a81a505102cdcfef6e13156a11c36cc53f363146b133e,2025-04-16T21:15:48.873000
|
CVE-2025-3733,0,0,b7ac17b7c057f630b68a81a505102cdcfef6e13156a11c36cc53f363146b133e,2025-04-16T21:15:48.873000
|
||||||
CVE-2025-3734,0,0,08cd08d68803ebc3e247bc1dda5293ff05ed4a522f0928f26aaf66ccad8a7816,2025-04-16T18:16:19.783000
|
CVE-2025-3734,0,0,08cd08d68803ebc3e247bc1dda5293ff05ed4a522f0928f26aaf66ccad8a7816,2025-04-16T18:16:19.783000
|
||||||
CVE-2025-3735,0,0,c1ccc9a6fec3403e3777364d2dc3fbbbbb4b443b6d4510a9318f951740e87950,2025-04-16T17:15:50.030000
|
CVE-2025-3735,0,0,c1ccc9a6fec3403e3777364d2dc3fbbbbb4b443b6d4510a9318f951740e87950,2025-04-16T17:15:50.030000
|
||||||
CVE-2025-3736,0,0,564cad71b1e7fa3df569cf41ca780256dc009f1642d469d423a441d1ee8e0570,2025-04-16T17:15:50.113000
|
CVE-2025-3736,0,0,564cad71b1e7fa3df569cf41ca780256dc009f1642d469d423a441d1ee8e0570,2025-04-16T17:15:50.113000
|
||||||
@ -290453,3 +290473,5 @@ CVE-2025-39599,0,0,b32165e9ac35cddc8365b5382966b3cdc907609baee89eedf472d2eeabdae
|
|||||||
CVE-2025-39600,0,0,ff53b226229c137b254fd094b41c03f9992afdd195d414242990f0faaac29b77,2025-04-16T13:25:37.340000
|
CVE-2025-39600,0,0,ff53b226229c137b254fd094b41c03f9992afdd195d414242990f0faaac29b77,2025-04-16T13:25:37.340000
|
||||||
CVE-2025-39601,0,0,7f3568c982e2cbdfe236a2b826bbacce5227350e296ed75f61b4bbcedef35537,2025-04-16T13:25:37.340000
|
CVE-2025-39601,0,0,7f3568c982e2cbdfe236a2b826bbacce5227350e296ed75f61b4bbcedef35537,2025-04-16T13:25:37.340000
|
||||||
CVE-2025-39602,0,0,df27de5ee22e5ec9d9d74c987812c0381cd04ef064c0d9455c3c07c5309a9403,2025-04-16T13:25:37.340000
|
CVE-2025-39602,0,0,df27de5ee22e5ec9d9d74c987812c0381cd04ef064c0d9455c3c07c5309a9403,2025-04-16T13:25:37.340000
|
||||||
|
CVE-2025-43703,1,1,316b9a83c3b6dc513c619095e9530484f6e664a6d636deeaf4e977dce37bdf17,2025-04-16T22:15:15.083000
|
||||||
|
CVE-2025-43704,1,1,4cfc0104734e3f2a02f1a096d88581f78932e3288ecf4dc711d8c50bc120846e,2025-04-16T23:15:45.770000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user