mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-04-16T23:55:19.741186+00:00
This commit is contained in:
parent
bd48cfe7d8
commit
1aef2801ee
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2021-21353",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2021-03-03T02:15:13.143",
|
||||
"lastModified": "2024-11-21T05:48:11.043",
|
||||
"lastModified": "2025-04-16T23:15:44.197",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend. This is fixed in version 3.0.1. This advisory applies to multiple pug packages including \"pug\", \"pug-code-gen\". pug-code-gen has a backported fix at version 2.0.3. This advisory is not exploitable if there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade."
|
||||
"value": "Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend. This is fixed in version 3.0.1. This advisory applies to multiple pug packages including \"pug\", \"pug-code-gen\". pug-code-gen has a backported fix at version 2.0.3. This advisory is not exploitable if there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -87,7 +87,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
56
CVE-2025/CVE-2025-07xx/CVE-2025-0756.json
Normal file
56
CVE-2025/CVE-2025-07xx/CVE-2025-0756.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-0756",
|
||||
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||
"published": "2025-04-16T23:15:44.400",
|
||||
"lastModified": "2025-04-16T23:15:44.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Overview \n\n\n\n\u00a0\n\n\n\nThe product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not restrict JNDI identifiers during the creation of platform data sources. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nAn attacker could gain access to or modify sensitive data or system resources. This could allow access to protected files or directories including configuration files and files containing sensitive information, which can lead to remote code execution by unauthorized users."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-99"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://https://support.pentaho.com/hc/en-us/articles/35771876077709--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Improper-Control-of-Resource-Identifiers-Resource-Injection-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0756",
|
||||
"source": "security.vulnerabilities@hitachivantara.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-07xx/CVE-2025-0757.json
Normal file
56
CVE-2025/CVE-2025-07xx/CVE-2025-0757.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-0757",
|
||||
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||
"published": "2025-04-16T23:15:44.530",
|
||||
"lastModified": "2025-04-16T23:15:44.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Overview\n\n\n\n\u00a0\n\n\n\nThe software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, allow a malicious URL to inject content into the Analyzer plugin interface. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nOnce the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim's machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.pentaho.com/hc/en-us/articles/35781038882445--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0757",
|
||||
"source": "security.vulnerabilities@hitachivantara.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-07xx/CVE-2025-0758.json
Normal file
56
CVE-2025/CVE-2025-07xx/CVE-2025-0758.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-0758",
|
||||
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||
"published": "2025-04-16T23:15:44.647",
|
||||
"lastModified": "2025-04-16T23:15:44.647",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Overview\u00a0\n\n\n\nThe product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. (CWE-732)\u00a0\n\n\n\nDescription\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, is installed with Karaf JMX beans enabled and accessible by default.\u00a0\n\n\n\nImpact\u00a0\n\n\n\nWhen the vulnerability is leveraged, a user with local execution privileges can access functionality exposed by Karaf beans contained in the product."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.pentaho.com/hc/en-us/articles/35781318194061--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Incorrect-Permission-Assignment-for-Critical-Resource-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0758",
|
||||
"source": "security.vulnerabilities@hitachivantara.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-15xx/CVE-2025-1566.json
Normal file
25
CVE-2025/CVE-2025-15xx/CVE-2025-1566.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-1566",
|
||||
"sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f",
|
||||
"published": "2025-04-16T23:15:44.767",
|
||||
"lastModified": "2025-04-16T23:15:44.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DNS Leak in Native System VPN in Google ChromeOS Dev Channel on ChromeOS 129.0.6668.36 allows network observers to expose plaintext DNS queries via failure to properly tunnel DNS traffic during VPN state transitions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/b/342802975",
|
||||
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||
},
|
||||
{
|
||||
"url": "https://issuetracker.google.com/issues/342802975",
|
||||
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-15xx/CVE-2025-1568.json
Normal file
25
CVE-2025/CVE-2025-15xx/CVE-2025-1568.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-1568",
|
||||
"sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f",
|
||||
"published": "2025-04-16T23:15:44.853",
|
||||
"lastModified": "2025-04-16T23:15:44.853",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Access Control Vulnerability in Gerrit chromiumos project configuration in Google ChromeOS 131.0.6778.268 allows an attacker with a registered Gerrit account to inject malicious code into ChromeOS projects and potentially achieve Remote Code Execution and Denial of Service via editing trusted pipelines by insufficient access controls and misconfigurations in Gerrit's project.config."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/b/374279912",
|
||||
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||
},
|
||||
{
|
||||
"url": "https://issuetracker.google.com/issues/374279912",
|
||||
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-17xx/CVE-2025-1704.json
Normal file
25
CVE-2025/CVE-2025-17xx/CVE-2025-1704.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-1704",
|
||||
"sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f",
|
||||
"published": "2025-04-16T23:15:44.937",
|
||||
"lastModified": "2025-04-16T23:15:44.937",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ComponentInstaller Modification in ComponentInstaller in Google ChromeOS 124.0.6367.34 on Chromebooks allows enrolled users with local access to unenroll devices \nand intercept device management requests via loading components from the unencrypted stateful partition."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/b/359915523",
|
||||
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||
},
|
||||
{
|
||||
"url": "https://issuetracker.google.com/issues/359915523",
|
||||
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-20xx/CVE-2025-2073.json
Normal file
25
CVE-2025/CVE-2025-20xx/CVE-2025-2073.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-2073",
|
||||
"sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f",
|
||||
"published": "2025-04-16T23:15:45.610",
|
||||
"lastModified": "2025-04-16T23:15:45.610",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out-of-Bounds Read in ip_set_bitmap_ip.c in Google ChromeOS Kernel Versions 6.1, 5.15, 5.10, 5.4, 4.19. on All devices where Termina is used allows an attacker with CAP_NET_ADMIN privileges to cause memory corruption and potentially escalate privileges via crafted ipset commands."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/b/380043638",
|
||||
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||
},
|
||||
{
|
||||
"url": "https://issuetracker.google.com/issues/380043638",
|
||||
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-249xx/CVE-2025-24907.json
Normal file
56
CVE-2025/CVE-2025-249xx/CVE-2025-24907.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24907",
|
||||
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||
"published": "2025-04-16T23:15:45.027",
|
||||
"lastModified": "2025-04-16T23:15:45.027",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Overview \n\n\n\n\u00a0\n\n\n\nThe product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nThis allows attackers to traverse the file system to access files or directories that are outside of the restricted directory."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-35"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.pentaho.com/hc/en-us/articles/35781624069005--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Path-Traversal-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24907",
|
||||
"source": "security.vulnerabilities@hitachivantara.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-249xx/CVE-2025-24908.json
Normal file
56
CVE-2025/CVE-2025-249xx/CVE-2025-24908.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24908",
|
||||
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||
"published": "2025-04-16T23:15:45.147",
|
||||
"lastModified": "2025-04-16T23:15:45.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Overview \n\n\n\n\u00a0\n\n\n\nThe product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the UploadFile service. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nThis allows attackers to traverse the file system to access files or directories that are outside of the restricted directory."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-35"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.pentaho.com/hc/en-us/articles/35783399569421--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Path-Traversal-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24908",
|
||||
"source": "security.vulnerabilities@hitachivantara.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-249xx/CVE-2025-24909.json
Normal file
56
CVE-2025/CVE-2025-249xx/CVE-2025-24909.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24909",
|
||||
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||
"published": "2025-04-16T23:15:45.263",
|
||||
"lastModified": "2025-04-16T23:15:45.263",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Overview \n\n\n\n\u00a0\n\n\n\nThe software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, allow a malicious URL to inject content into the Analyzer plugin interface. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nOnce the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim's machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.pentaho.com/hc/en-us/articles/35782541484045--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24909",
|
||||
"source": "security.vulnerabilities@hitachivantara.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-249xx/CVE-2025-24910.json
Normal file
56
CVE-2025/CVE-2025-249xx/CVE-2025-24910.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24910",
|
||||
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||
"published": "2025-04-16T23:15:45.373",
|
||||
"lastModified": "2025-04-16T23:15:45.373",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Overview \n\n\n\n\u00a0\n\n\n\nXML documents optionally contain a Document Type Definition (DTD), which, among other features, enables the definition of XML entities. It is possible to define an entity by providing a substitution string in the form of a URI. Once the content of the URI is read, it is fed back into the application that is processing the XML. This application may echo back the data (e.g. in an error message), thereby exposing the file contents. (CWE-611) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.2, including 9.3.x and 8.3.x, do not correctly protect Pentaho Data Integration MessageSourceCrawler against out-of-band XML External Entity Reference. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nBy submitting an XML file that defines an external entity with a file:// URI, an attacker can cause the processing application to read the contents of a local file. Using URIs with other schemes such as http://, the attacker can force the application to make outgoing requests to servers that the attacker cannot reach directly, which can be used to bypass firewall restrictions or hide the source of attacks such as port scanning."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.pentaho.com/hc/en-us/articles/35782683750541--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Restriction-of-XML-External-Entity-Reference-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24910",
|
||||
"source": "security.vulnerabilities@hitachivantara.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-249xx/CVE-2025-24911.json
Normal file
56
CVE-2025/CVE-2025-249xx/CVE-2025-24911.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24911",
|
||||
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
|
||||
"published": "2025-04-16T23:15:45.490",
|
||||
"lastModified": "2025-04-16T23:15:45.490",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Overview \n\n\n\n\u00a0\n\n\n\nXML documents optionally contain a Document Type Definition (DTD), which, among other features, enables the definition of XML entities. It is possible to define an entity by providing a substitution string in the form of a URI. Once the content of the URI is read, it is fed back into the application that is processing the XML. This application may echo back the data (e.g. in an error message), thereby exposing the file contents. (CWE-611) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.2, including 9.3.x and 8.3.x, do not correctly protect Data Access XMLParserFactoryProducer against out-of-band XML External Entity Reference. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nBy submitting an XML file that defines an external entity with a file:// URI, an attacker can cause the processing application to read the contents of a local file. Using URIs with other schemes such as http://, the attacker can force the application to make outgoing requests to servers that the attacker cannot reach directly, which can be used to bypass firewall restrictions or hide the source of attacks such as port scanning."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security.vulnerabilities@hitachivantara.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.pentaho.com/hc/en-us/articles/35783689016589--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Restriction-of-XML-External-Entity-Reference-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24911",
|
||||
"source": "security.vulnerabilities@hitachivantara.com"
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2025/CVE-2025-24xx/CVE-2025-2400.json
Normal file
16
CVE-2025/CVE-2025-24xx/CVE-2025-2400.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-2400",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2025-04-16T23:15:45.697",
|
||||
"lastModified": "2025-04-16T23:15:45.697",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
48
CVE-2025/CVE-2025-252xx/CVE-2025-25230.json
Normal file
48
CVE-2025/CVE-2025-252xx/CVE-2025-25230.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2025-25230",
|
||||
"sourceIdentifier": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
|
||||
"published": "2025-04-16T22:15:14.073",
|
||||
"lastModified": "2025-04-16T22:15:14.073",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Omnissa Horizon Client for Windows contains an LPE Vulnerability.\u00a0A malicious actor with local access where Horizon Client for Windows is installed may be able to elevate privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://static.omnissa.com/sites/default/files/OMSA-2025-0001.pdf",
|
||||
"source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52"
|
||||
},
|
||||
{
|
||||
"url": "https://www.omnissa.com/omnissa-security-response/",
|
||||
"source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-314xx/CVE-2025-31478.json
Normal file
56
CVE-2025/CVE-2025-314xx/CVE-2025-31478.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-31478",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-04-16T22:15:14.233",
|
||||
"lastModified": "2025-04-16T22:15:14.233",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Zulip is an open-source team collaboration tool. Zulip supports a configuration where account creation is limited solely by being able to authenticate with a single-sign on authentication backend, meaning the organization places no restrictions on email address domains or invitations being required to join, but has disabled the EmailAuthBackend that is used for email/password authentication. A bug in the Zulip server means that it is possible to create an account in such organizations, without having an account with the configured SSO authentication backend. This issue is patched in version 10.2. A workaround includes requiring invitations to join the organization prevents the vulnerability from being accessed."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zulip/zulip/security/advisories/GHSA-qxfv-j6vg-5rqc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2025/CVE-2025-324xx/CVE-2025-32433.json
Normal file
72
CVE-2025/CVE-2025-324xx/CVE-2025-32433.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2025-32433",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-04-16T22:15:14.373",
|
||||
"lastModified": "2025-04-16T22:15:14.373",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/erlang/otp/commit/0fcd9c56524b28615e8ece65fc0c3f66ef6e4c12",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/erlang/otp/commit/6eef04130afc8b0ccb63c9a0d8650209cf54892f",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/erlang/otp/commit/b1924d37fd83c070055beb115d5d6a6a9490b891",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/04/16/2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-327xx/CVE-2025-32783.json
Normal file
60
CVE-2025/CVE-2025-327xx/CVE-2025-32783.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-32783",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-04-16T22:15:14.523",
|
||||
"lastModified": "2025-04-16T22:15:14.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "XWiki Platform is a generic wiki platform. A vulnerability in versions from 5.0 to 16.7.1 affects users with Message Stream enabled and a wiki configured as closed from selecting \"Prevent unregistered users to view pages\" in the Administrations Rights. The vulnerability is that any message sent in a subwiki to \"everyone\" is actually sent to the farm: any visitor of the main wiki will be able to see that message through the Dashboard, even if the subwiki is configured to be private. This issue will not be patched as Message Stream has been deprecated in XWiki 16.8.0RC1 and is not maintained anymore. A workaround for this issue involves keeping Message Stream disabled by default. It's advised to keep it disabled from Administration > Social > Message Stream."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-42fh-pvvh-999x",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-17154",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-327xx/CVE-2025-32787.json
Normal file
64
CVE-2025/CVE-2025-327xx/CVE-2025-32787.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-32787",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-04-16T22:15:14.667",
|
||||
"lastModified": "2025-04-16T22:15:14.667",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. Versions 5.02.5184 to 5.02.5187 are vulnerable to NULL dereference in `DeleteIPv6DefaultRouterInRA` called by `StorePacket`. Before dereferencing, `DeleteIPv6DefaultRouterInRA` does not account for `ParsePacket` returning NULL, resulting in the program crashing. A patched version does not exist at this time."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/SoftEtherVPN/SoftEtherVPN/blob/7006539732c0231d7723623cc8732f94ba2b8c54/src/Cedar/Hub.c#L5112C1-L5116C29",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/SoftEtherVPN/SoftEtherVPN/blob/master/src/Mayaqua/TcpIp.c#L1633",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/SoftEtherVPN/SoftEtherVPN/security/advisories/GHSA-xw53-587j-mqh6",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-327xx/CVE-2025-32789.json
Normal file
68
CVE-2025/CVE-2025-327xx/CVE-2025-32789.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-32789",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-04-16T22:15:14.800",
|
||||
"lastModified": "2025-04-16T22:15:14.800",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of the user table, based on the results of the sorted list of users. Although unlikely, if an attacker knows the hash value of their password, they can change the password and repeat the sorting until the other user's password hash is fully revealed. This issue is patched in version 9.0.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/espocrm/espocrm/commit/91740192d2e2c575c6a04534c079baf9f3af0a7f",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/espocrm/espocrm/commit/bd900d0b48fe37a98def4c0e094e39e7e385e9ea",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/espocrm/espocrm/security/advisories/GHSA-3ph3-jcfx-fq53",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-327xx/CVE-2025-32791.json
Normal file
56
CVE-2025/CVE-2025-327xx/CVE-2025-32791.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-32791",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-04-16T22:15:14.943",
|
||||
"lastModified": "2025-04-16T22:15:14.943",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Backstage Scaffolder plugin houses types and utilities for building scaffolder-related modules. A vulnerability in the Backstage permission plugin backend allows callers to extract some information about the conditional decisions returned by the permission policy installed in the permission backend. If the permission system is not in use or if the installed permission policy does not use conditional decisions, there is no impact. This issue has been patched in version 0.6.0 of the permissions backend. A workaround includes having administrators of the permission policies ensure that they are crafted in such a way that conditional decisions do not contain any sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-213"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/backstage/backstage/security/advisories/GHSA-f8j4-p5cr-p777",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-437xx/CVE-2025-43703.json
Normal file
60
CVE-2025/CVE-2025-437xx/CVE-2025-43703.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-43703",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-16T22:15:15.083",
|
||||
"lastModified": "2025-04-16T22:15:15.083",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Ankitects Anki through 25.02. A crafted shared deck can result in attacker-controlled access to the internal API (even though the attacker has no knowledge of an API key) through approaches such as scripts or the SRC attribute of an IMG element. NOTE: this issue exists because of an incomplete fix for CVE-2024-32484."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-830"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ankitects/anki/pull/3925",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ankitects/anki/pull/3925/commits/24bca15fd3d9dc386916509eb2d4862d1184e709",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-437xx/CVE-2025-43704.json
Normal file
56
CVE-2025/CVE-2025-437xx/CVE-2025-43704.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-43704",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-16T23:15:45.770",
|
||||
"lastModified": "2025-04-16T23:15:45.770",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Arctera/Veritas Data Insight before 7.1.2 can send cleartext credentials when configured to use HTTP Basic Authentication to a Dell Isilon OneFS server."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.veritas.com/support/en_US/security/ARC25-006",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
82
README.md
82
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-16T22:00:19.809240+00:00
|
||||
2025-04-16T23:55:19.741186+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-16T21:15:48.873000+00:00
|
||||
2025-04-16T23:15:45.770000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,68 +33,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
290454
|
||||
290476
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `24`
|
||||
Recently added CVEs: `22`
|
||||
|
||||
- [CVE-2024-55371](CVE-2024/CVE-2024-553xx/CVE-2024-55371.json) (`2025-04-16T21:15:45.790`)
|
||||
- [CVE-2024-55372](CVE-2024/CVE-2024-553xx/CVE-2024-55372.json) (`2025-04-16T21:15:45.897`)
|
||||
- [CVE-2025-26153](CVE-2025/CVE-2025-261xx/CVE-2025-26153.json) (`2025-04-16T21:15:46.770`)
|
||||
- [CVE-2025-28072](CVE-2025/CVE-2025-280xx/CVE-2025-28072.json) (`2025-04-16T21:15:46.883`)
|
||||
- [CVE-2025-29648](CVE-2025/CVE-2025-296xx/CVE-2025-29648.json) (`2025-04-16T20:15:17.460`)
|
||||
- [CVE-2025-29649](CVE-2025/CVE-2025-296xx/CVE-2025-29649.json) (`2025-04-16T20:15:17.563`)
|
||||
- [CVE-2025-29650](CVE-2025/CVE-2025-296xx/CVE-2025-29650.json) (`2025-04-16T20:15:17.663`)
|
||||
- [CVE-2025-29651](CVE-2025/CVE-2025-296xx/CVE-2025-29651.json) (`2025-04-16T20:15:17.760`)
|
||||
- [CVE-2025-29652](CVE-2025/CVE-2025-296xx/CVE-2025-29652.json) (`2025-04-16T20:15:17.860`)
|
||||
- [CVE-2025-29653](CVE-2025/CVE-2025-296xx/CVE-2025-29653.json) (`2025-04-16T20:15:17.963`)
|
||||
- [CVE-2025-29708](CVE-2025/CVE-2025-297xx/CVE-2025-29708.json) (`2025-04-16T21:15:47.460`)
|
||||
- [CVE-2025-29709](CVE-2025/CVE-2025-297xx/CVE-2025-29709.json) (`2025-04-16T21:15:47.570`)
|
||||
- [CVE-2025-29710](CVE-2025/CVE-2025-297xx/CVE-2025-29710.json) (`2025-04-16T21:15:47.673`)
|
||||
- [CVE-2025-32817](CVE-2025/CVE-2025-328xx/CVE-2025-32817.json) (`2025-04-16T20:15:19.077`)
|
||||
- [CVE-2025-3619](CVE-2025/CVE-2025-36xx/CVE-2025-3619.json) (`2025-04-16T21:15:47.920`)
|
||||
- [CVE-2025-3620](CVE-2025/CVE-2025-36xx/CVE-2025-3620.json) (`2025-04-16T21:15:48.027`)
|
||||
- [CVE-2025-3723](CVE-2025/CVE-2025-37xx/CVE-2025-3723.json) (`2025-04-16T20:15:19.777`)
|
||||
- [CVE-2025-3724](CVE-2025/CVE-2025-37xx/CVE-2025-3724.json) (`2025-04-16T20:15:19.960`)
|
||||
- [CVE-2025-3725](CVE-2025/CVE-2025-37xx/CVE-2025-3725.json) (`2025-04-16T20:15:20.123`)
|
||||
- [CVE-2025-3726](CVE-2025/CVE-2025-37xx/CVE-2025-3726.json) (`2025-04-16T20:15:20.283`)
|
||||
- [CVE-2025-3727](CVE-2025/CVE-2025-37xx/CVE-2025-3727.json) (`2025-04-16T21:15:48.203`)
|
||||
- [CVE-2025-3728](CVE-2025/CVE-2025-37xx/CVE-2025-3728.json) (`2025-04-16T21:15:48.363`)
|
||||
- [CVE-2025-3729](CVE-2025/CVE-2025-37xx/CVE-2025-3729.json) (`2025-04-16T21:15:48.537`)
|
||||
- [CVE-2025-3730](CVE-2025/CVE-2025-37xx/CVE-2025-3730.json) (`2025-04-16T21:15:48.700`)
|
||||
- [CVE-2025-0756](CVE-2025/CVE-2025-07xx/CVE-2025-0756.json) (`2025-04-16T23:15:44.400`)
|
||||
- [CVE-2025-0757](CVE-2025/CVE-2025-07xx/CVE-2025-0757.json) (`2025-04-16T23:15:44.530`)
|
||||
- [CVE-2025-0758](CVE-2025/CVE-2025-07xx/CVE-2025-0758.json) (`2025-04-16T23:15:44.647`)
|
||||
- [CVE-2025-1566](CVE-2025/CVE-2025-15xx/CVE-2025-1566.json) (`2025-04-16T23:15:44.767`)
|
||||
- [CVE-2025-1568](CVE-2025/CVE-2025-15xx/CVE-2025-1568.json) (`2025-04-16T23:15:44.853`)
|
||||
- [CVE-2025-1704](CVE-2025/CVE-2025-17xx/CVE-2025-1704.json) (`2025-04-16T23:15:44.937`)
|
||||
- [CVE-2025-2073](CVE-2025/CVE-2025-20xx/CVE-2025-2073.json) (`2025-04-16T23:15:45.610`)
|
||||
- [CVE-2025-2400](CVE-2025/CVE-2025-24xx/CVE-2025-2400.json) (`2025-04-16T23:15:45.697`)
|
||||
- [CVE-2025-24907](CVE-2025/CVE-2025-249xx/CVE-2025-24907.json) (`2025-04-16T23:15:45.027`)
|
||||
- [CVE-2025-24908](CVE-2025/CVE-2025-249xx/CVE-2025-24908.json) (`2025-04-16T23:15:45.147`)
|
||||
- [CVE-2025-24909](CVE-2025/CVE-2025-249xx/CVE-2025-24909.json) (`2025-04-16T23:15:45.263`)
|
||||
- [CVE-2025-24910](CVE-2025/CVE-2025-249xx/CVE-2025-24910.json) (`2025-04-16T23:15:45.373`)
|
||||
- [CVE-2025-24911](CVE-2025/CVE-2025-249xx/CVE-2025-24911.json) (`2025-04-16T23:15:45.490`)
|
||||
- [CVE-2025-25230](CVE-2025/CVE-2025-252xx/CVE-2025-25230.json) (`2025-04-16T22:15:14.073`)
|
||||
- [CVE-2025-31478](CVE-2025/CVE-2025-314xx/CVE-2025-31478.json) (`2025-04-16T22:15:14.233`)
|
||||
- [CVE-2025-32433](CVE-2025/CVE-2025-324xx/CVE-2025-32433.json) (`2025-04-16T22:15:14.373`)
|
||||
- [CVE-2025-32783](CVE-2025/CVE-2025-327xx/CVE-2025-32783.json) (`2025-04-16T22:15:14.523`)
|
||||
- [CVE-2025-32787](CVE-2025/CVE-2025-327xx/CVE-2025-32787.json) (`2025-04-16T22:15:14.667`)
|
||||
- [CVE-2025-32789](CVE-2025/CVE-2025-327xx/CVE-2025-32789.json) (`2025-04-16T22:15:14.800`)
|
||||
- [CVE-2025-32791](CVE-2025/CVE-2025-327xx/CVE-2025-32791.json) (`2025-04-16T22:15:14.943`)
|
||||
- [CVE-2025-43703](CVE-2025/CVE-2025-437xx/CVE-2025-43703.json) (`2025-04-16T22:15:15.083`)
|
||||
- [CVE-2025-43704](CVE-2025/CVE-2025-437xx/CVE-2025-43704.json) (`2025-04-16T23:15:45.770`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `30`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2025-21578](CVE-2025/CVE-2025-215xx/CVE-2025-21578.json) (`2025-04-16T21:15:46.080`)
|
||||
- [CVE-2025-21579](CVE-2025/CVE-2025-215xx/CVE-2025-21579.json) (`2025-04-16T21:15:46.193`)
|
||||
- [CVE-2025-21580](CVE-2025/CVE-2025-215xx/CVE-2025-21580.json) (`2025-04-16T21:15:46.303`)
|
||||
- [CVE-2025-21581](CVE-2025/CVE-2025-215xx/CVE-2025-21581.json) (`2025-04-16T21:15:46.413`)
|
||||
- [CVE-2025-21582](CVE-2025/CVE-2025-215xx/CVE-2025-21582.json) (`2025-04-16T21:15:46.527`)
|
||||
- [CVE-2025-21584](CVE-2025/CVE-2025-215xx/CVE-2025-21584.json) (`2025-04-16T20:15:16.947`)
|
||||
- [CVE-2025-21585](CVE-2025/CVE-2025-215xx/CVE-2025-21585.json) (`2025-04-16T20:15:17.057`)
|
||||
- [CVE-2025-22872](CVE-2025/CVE-2025-228xx/CVE-2025-22872.json) (`2025-04-16T21:15:46.640`)
|
||||
- [CVE-2025-24421](CVE-2025/CVE-2025-244xx/CVE-2025-24421.json) (`2025-04-16T20:15:17.170`)
|
||||
- [CVE-2025-24427](CVE-2025/CVE-2025-244xx/CVE-2025-24427.json) (`2025-04-16T20:15:17.313`)
|
||||
- [CVE-2025-30682](CVE-2025/CVE-2025-306xx/CVE-2025-30682.json) (`2025-04-16T20:15:18.057`)
|
||||
- [CVE-2025-30694](CVE-2025/CVE-2025-306xx/CVE-2025-30694.json) (`2025-04-16T20:15:18.170`)
|
||||
- [CVE-2025-30695](CVE-2025/CVE-2025-306xx/CVE-2025-30695.json) (`2025-04-16T20:15:18.283`)
|
||||
- [CVE-2025-30697](CVE-2025/CVE-2025-306xx/CVE-2025-30697.json) (`2025-04-16T20:15:18.393`)
|
||||
- [CVE-2025-30699](CVE-2025/CVE-2025-306xx/CVE-2025-30699.json) (`2025-04-16T20:15:18.507`)
|
||||
- [CVE-2025-30700](CVE-2025/CVE-2025-307xx/CVE-2025-30700.json) (`2025-04-16T20:15:18.620`)
|
||||
- [CVE-2025-30707](CVE-2025/CVE-2025-307xx/CVE-2025-30707.json) (`2025-04-16T20:15:18.743`)
|
||||
- [CVE-2025-30709](CVE-2025/CVE-2025-307xx/CVE-2025-30709.json) (`2025-04-16T20:15:18.853`)
|
||||
- [CVE-2025-30710](CVE-2025/CVE-2025-307xx/CVE-2025-30710.json) (`2025-04-16T20:15:18.967`)
|
||||
- [CVE-2025-3679](CVE-2025/CVE-2025-36xx/CVE-2025-3679.json) (`2025-04-16T20:15:19.250`)
|
||||
- [CVE-2025-3680](CVE-2025/CVE-2025-36xx/CVE-2025-3680.json) (`2025-04-16T20:15:19.350`)
|
||||
- [CVE-2025-3681](CVE-2025/CVE-2025-36xx/CVE-2025-3681.json) (`2025-04-16T20:15:19.460`)
|
||||
- [CVE-2025-3682](CVE-2025/CVE-2025-36xx/CVE-2025-3682.json) (`2025-04-16T20:15:19.570`)
|
||||
- [CVE-2025-3683](CVE-2025/CVE-2025-36xx/CVE-2025-3683.json) (`2025-04-16T20:15:19.670`)
|
||||
- [CVE-2025-3733](CVE-2025/CVE-2025-37xx/CVE-2025-3733.json) (`2025-04-16T21:15:48.873`)
|
||||
- [CVE-2021-21353](CVE-2021/CVE-2021-213xx/CVE-2021-21353.json) (`2025-04-16T23:15:44.197`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
132
_state.csv
132
_state.csv
@ -167938,7 +167938,7 @@ CVE-2021-2135,0,0,7abf799ace0e002ab446f4ffc90bb93e36260b42bd780bd6a3cd5d6fc4f881
|
||||
CVE-2021-21350,0,0,2d752306279e47f018b7b7456b20a9159b8fef278e22b10b422aa6508fb277bd,2024-11-21T05:48:05.500000
|
||||
CVE-2021-21351,0,0,cca6f3591b36a4a91511361a99fef683a76ebac410b607a5bd73bbeda38ba55c,2024-11-21T05:48:05.683000
|
||||
CVE-2021-21352,0,0,d897e99eed94a134ed818d0dfb2b60db2d1cd351c05aaae51c7fc380ba195ca2,2024-11-21T05:48:05.900000
|
||||
CVE-2021-21353,0,0,0e6837eff702473fe08f80985ac9027232740af114a21122aa89a27c5222cbe2,2024-11-21T05:48:11.043000
|
||||
CVE-2021-21353,0,1,1e2ae93aee333dd878492c0b5d123533e3af61f4c0a6cff1a3c5dfecc2c75dc9,2025-04-16T23:15:44.197000
|
||||
CVE-2021-21354,0,0,f993fd5b853f008cce79671cdaa2a0b6524c7cb7428ac2f8157119da3a54f691,2024-11-21T05:48:11.173000
|
||||
CVE-2021-21355,0,0,766714b5a85de61a8624916bf3317120f0bd177745e800c46ab1f6314f11cfb6,2024-11-21T05:48:11.300000
|
||||
CVE-2021-21357,0,0,cfde189c634372a6f9c54d0222eaf04097982502302c0f7454f68d1116b098ba,2024-11-21T05:48:11.420000
|
||||
@ -211378,7 +211378,7 @@ CVE-2022-46532,0,0,432e2fb1ac9231e3900f9510862b24af15ae515bd54591843ed70bfaf1950
|
||||
CVE-2022-46533,0,0,8259a0c1ab3ecd9953d24addef698c0ca14bb7528598e2c54b5d0a9b00dabe1c,2025-04-16T18:15:59.713000
|
||||
CVE-2022-46534,0,0,a37476b1e6f06d14f368b3fc9ddc52cb95b0509dedbd61b6254912927b0057d6,2025-04-16T18:15:59.920000
|
||||
CVE-2022-46535,0,0,c76309a3efb3efd5614d89e6b487a45aa8e68a24c50e5069b532281cf9b9227f,2025-04-16T18:16:00.133000
|
||||
CVE-2022-46536,0,1,b556198d86819cc2bec371c26c7a2ca6d052dbf876dbdcacad7e4eed2e04888a,2025-04-16T20:15:16.333000
|
||||
CVE-2022-46536,0,0,b556198d86819cc2bec371c26c7a2ca6d052dbf876dbdcacad7e4eed2e04888a,2025-04-16T20:15:16.333000
|
||||
CVE-2022-46537,0,0,013f85ed6bb69b0029944b116199f9a8482e23f09916132b7a8cd2c7df28d85f,2025-04-16T19:15:48.727000
|
||||
CVE-2022-46538,0,0,36652f5ef9c355e7316e9b4baa42eeaf57af30487e172ad8a6aef006d837e7f1,2025-04-16T19:15:48.897000
|
||||
CVE-2022-46539,0,0,7bd0d189716cc6a288447f1ac7d27e593a51000734a97e9ce222348df64dca77,2025-04-16T19:15:49.060000
|
||||
@ -264731,10 +264731,10 @@ CVE-2024-4005,0,0,10ce0801262283a3acf259593f5122037af4b3f2afe41d97e0d5130b74a0b3
|
||||
CVE-2024-40051,0,0,96ab2490faf9bea7ad7fee897981a553b31642380963c6ce4281331d73ca69b1,2024-11-21T09:30:54.030000
|
||||
CVE-2024-4006,0,0,46335001e821792447cd234ad2269b9ef6e390364b1771cf570ddd60ee4264a5,2024-12-12T17:10:26.743000
|
||||
CVE-2024-40060,0,0,b3cb7a9288615fb07001800266f7abee43787412ebc5c9317e72dcb8a61aa5b3,2024-11-21T09:30:54.260000
|
||||
CVE-2024-40068,0,1,cbad6e65e7e84cf1a55ffb7fafdd118a328d0ef7e468aebf956e79c0738fba3f,2025-04-16T21:15:44.650000
|
||||
CVE-2024-40068,0,0,cbad6e65e7e84cf1a55ffb7fafdd118a328d0ef7e468aebf956e79c0738fba3f,2025-04-16T21:15:44.650000
|
||||
CVE-2024-40069,0,0,4d4b8c6a2f5f96f0b37c4a56d683d18e89f62558ef2d1c08df758ed0b00fc247,2025-04-16T17:15:48.743000
|
||||
CVE-2024-4007,0,0,3dd9d5c3a9450c96ea7d10f2bffa2679fd00a403615d465b187f095d51be54f6,2024-11-21T09:42:01.227000
|
||||
CVE-2024-40070,0,1,09992ee1a07721f0f0021dadbbee2f2783f08833bce7da18d07c6b519df78a8b,2025-04-16T21:15:45.217000
|
||||
CVE-2024-40070,0,0,09992ee1a07721f0f0021dadbbee2f2783f08833bce7da18d07c6b519df78a8b,2025-04-16T21:15:45.217000
|
||||
CVE-2024-40071,0,0,06f6058bf63a114e512ac64f5c17a3c7972a90e514728670ddc9103275b0a94f,2025-04-16T17:15:48.957000
|
||||
CVE-2024-40072,0,0,547d27cfdcf73bc395fc3d20ea203da147c8ed111ec3e549f9fec5bff422e11d,2025-04-16T17:15:49.063000
|
||||
CVE-2024-40073,0,0,d4ef2dc78d57409da30467abb2994b8710871ceac838e3f8ece14dd70977ebd3,2025-04-16T17:15:49.170000
|
||||
@ -274521,8 +274521,8 @@ CVE-2024-53296,0,0,be682d3eb2a02cb859d07bb38fd2cdf79c5c9c446624f27b1fefa1f7d7732
|
||||
CVE-2024-53299,0,0,2311d06f0f8179bedcf518ce1bde420954fcc87b5db6c467bb518cf92e75888f,2025-02-04T19:15:31.877000
|
||||
CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000
|
||||
CVE-2024-53303,0,0,70a56d8ec2b4b4d3548967b98471444d054ad16016e0845cf1ac32051d07a296,2025-04-16T18:16:03.417000
|
||||
CVE-2024-53304,0,1,2318bd92e15e2309c0bc84c12f501093b2199420a9844e4905b82191a8dd877a,2025-04-16T21:15:45.497000
|
||||
CVE-2024-53305,0,1,b764fd9aa197b516e0394c3a3a3a9ee4af1cfff7c69a2a0fea095f72e6f16c4c,2025-04-16T21:15:45.643000
|
||||
CVE-2024-53304,0,0,2318bd92e15e2309c0bc84c12f501093b2199420a9844e4905b82191a8dd877a,2025-04-16T21:15:45.497000
|
||||
CVE-2024-53305,0,0,b764fd9aa197b516e0394c3a3a3a9ee4af1cfff7c69a2a0fea095f72e6f16c4c,2025-04-16T21:15:45.643000
|
||||
CVE-2024-53307,0,0,137df246312787bed916a2ce1770dc53fefd470e50062bf21518e03aff4776e9,2025-03-10T18:15:29.373000
|
||||
CVE-2024-53309,0,0,ae139265b7a1692dfab5ae0e494b54a85093b1cd41c51bb0baefd5e1bf71e5bf,2025-03-17T19:15:23.447000
|
||||
CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000
|
||||
@ -275724,8 +275724,8 @@ CVE-2024-55355,0,0,2bb36a027cfc17a18c27f2dfa7ccd1dd7e44d92fe7cc55df027cf0c874369
|
||||
CVE-2024-55356,0,0,24a1f90c25942035af99f5d3d7ecc4294dd5cf67c67caa2d1d5b1544ce44efca,2025-01-08T01:15:07.370000
|
||||
CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c0e,2024-11-21T09:47:53.307000
|
||||
CVE-2024-5537,0,0,dc964262ed4087ff313c4be3be100753a858d893c6319a531383572e591004b1,2024-05-30T17:15:34.583000
|
||||
CVE-2024-55371,1,1,82d309900eb7e9fe5761e0756844ce79b2aa2451b6aeadb49306bc093f1286e8,2025-04-16T21:15:45.790000
|
||||
CVE-2024-55372,1,1,7d37afe313187fc2bd94eccc6b6bee9da2384213efd9c427f98958b2e41c4376,2025-04-16T21:15:45.897000
|
||||
CVE-2024-55371,0,0,82d309900eb7e9fe5761e0756844ce79b2aa2451b6aeadb49306bc093f1286e8,2025-04-16T21:15:45.790000
|
||||
CVE-2024-55372,0,0,7d37afe313187fc2bd94eccc6b6bee9da2384213efd9c427f98958b2e41c4376,2025-04-16T21:15:45.897000
|
||||
CVE-2024-5538,0,0,349018b8a831720930f224f86428ace57b32dfb3177832784fb8b5e53a9e5993,2024-05-31T11:15:09.923000
|
||||
CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402acd89,2025-01-07T16:15:36.480000
|
||||
CVE-2024-55408,0,0,8039c7c557373745154d588f7a6e9302bbcff3813cc276ec09ae1bbee5edf7a3,2025-02-11T01:15:09.410000
|
||||
@ -281792,6 +281792,9 @@ CVE-2025-0752,0,0,de749aab58e2326cecf2e69cd47cb06af87bcedce5e0f5e8b795ca284455a6
|
||||
CVE-2025-0753,0,0,c31e8dbd9d781b37db4d790b1206c27db098e661945670b7848cba0c8afd301c,2025-02-28T22:22:35.957000
|
||||
CVE-2025-0754,0,0,01e22cbc27c23b2a20fc22b4b38925f42f70aba0e3cf26d239fd3f71faae49ca,2025-01-28T10:15:09.697000
|
||||
CVE-2025-0755,0,0,a756693274b211f936030a1b123d06fc9f09b8085a54bd20383a0ef5f5b87d9f,2025-03-18T09:15:11.487000
|
||||
CVE-2025-0756,1,1,b19b4ad9d0999c3ee0d17438ec3beaaf755e4c5eaecf851e90a5d1f4d6b3fa4b,2025-04-16T23:15:44.400000
|
||||
CVE-2025-0757,1,1,1333d61ae224eaaf8e897706699c441f1693dbdc5d606c5b6188a854512eae13,2025-04-16T23:15:44.530000
|
||||
CVE-2025-0758,1,1,bebe0b9a3b3c746d022bfd86d3c6e96f9d0fd9a767f835083182a59be9f52ff0,2025-04-16T23:15:44.647000
|
||||
CVE-2025-0759,0,0,09d991e76c287398c2be16cd3769fbff0d891df9fa18a6f52ed6c200cb01eaf9,2025-02-27T15:15:40.603000
|
||||
CVE-2025-0760,0,0,00193022d9afa63eab6ac5d740a3221452c3267e0ba03667c14e8712364e5b04,2025-02-26T00:15:10.890000
|
||||
CVE-2025-0762,0,0,845f3b7f9b4ef02b7a17ddce8a2e2034554a76aa91491302fad198d6d89d5ee0,2025-01-29T15:15:17.687000
|
||||
@ -282346,6 +282349,8 @@ CVE-2025-1559,0,0,709a243835f3c6ce0779a28711cc25be41f0a8c4f301b124730fe9903567f9
|
||||
CVE-2025-1560,0,0,5806fdd5d9f8e8a09704d33fd8caadc121e4fbb048f372fad8d43065a1e4a103,2025-03-06T16:15:42.753000
|
||||
CVE-2025-1561,0,0,c0dd475a880b302ad58d5da65215c03a4b2329b9f43fd50459164bc801594e00,2025-03-13T05:15:27.890000
|
||||
CVE-2025-1564,0,0,9d62e5431da133f133499b29bcb96aa13e41c1b673396891299a0b15aab9c828,2025-03-01T08:15:34.007000
|
||||
CVE-2025-1566,1,1,131deec3f77b04f991ebb90ff9acb0b1a12b81048eced026f09c31fc85d18cc5,2025-04-16T23:15:44.767000
|
||||
CVE-2025-1568,1,1,95c2aba9b91258ec79c0076f946e6906f21b07bb4f34ec498c00ad4c163baa4a,2025-04-16T23:15:44.853000
|
||||
CVE-2025-1570,0,0,e2c8a697fd328cfac1cb14bcdda0501641702037da6bc6d3e9d43d7d6e474d73,2025-03-06T15:35:59.507000
|
||||
CVE-2025-1571,0,0,4a5ce435e807c5b239e456baa952536949a7ac8152f73e9932b99f88f9a0505f,2025-03-07T17:29:48.903000
|
||||
CVE-2025-1572,0,0,d28a5728a56447e48ca8ae17f33703e0f0c8651ed23960a40cc6c85b9a58b7d9,2025-03-06T17:52:25.813000
|
||||
@ -282451,6 +282456,7 @@ CVE-2025-1695,0,0,ebd84bb280e3b0fb2974535e719ca217464c50c1c49a0c471a25d6dd4b8516
|
||||
CVE-2025-1696,0,0,a4ebe2093d6db003a81772653e3b8096038d292b86e17d8021513423bef33f12,2025-03-06T12:15:36.293000
|
||||
CVE-2025-1702,0,0,8350c512bb427a18e75fe369e7c514680d305e4b55cc00b262ae74877fe4e9d9,2025-03-05T12:15:35.420000
|
||||
CVE-2025-1703,0,0,50c927778c00387d209f1db495acb3fcdf772388903cfdf917baab839124a719,2025-03-27T16:45:27.850000
|
||||
CVE-2025-1704,1,1,c9af1f14e1b0017d573058ecb6c2d538a9b3b02de19ff2ede03e92e5eeb4a9b6,2025-04-16T23:15:44.937000
|
||||
CVE-2025-1705,0,0,269e355c7cfca537a526c588669165c0e79ec506469175122c59352a58fa4621,2025-03-28T18:11:40.180000
|
||||
CVE-2025-1707,0,0,eb806af042366277371dce5ba4e4d20eb3821597874c2eb4040b48171f171ef9,2025-03-11T22:15:12.583000
|
||||
CVE-2025-1714,0,0,6e67e5fe1ad7d1f8ea60e413f9fa7e7e2f63bd8d4c4369040436660c144fa80c,2025-03-07T05:15:16.233000
|
||||
@ -282857,6 +282863,7 @@ CVE-2025-20664,0,0,4219106895903f3d40c45e3fe22a99bb379c7467ce7ddab134c6f372463f3
|
||||
CVE-2025-2067,0,0,e336b7e791e3fd3cb322ecbc1c5f69ca2b6e5c18fb1ce058eaa6d863ecf3dcd2,2025-03-07T05:15:17.527000
|
||||
CVE-2025-2071,0,0,f72741a6a8cd10ef9b626183eff7ab8b6e66837ba6759a6a57e284a984d113e1,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2072,0,0,8e644488e83c18f58cc5036e9fa9ebc749bbf6017963c3bc2cbe7baae1385ee2,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2073,1,1,f733f36fd03c449e68412edf747220800eb0e3fcf083c2c2f10adab9b8a4f9ec,2025-04-16T23:15:45.610000
|
||||
CVE-2025-2074,0,0,ca58bf592b5066d06227c815801f5f95341e4e9e4e43bd9476138e9763d951e8,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2075,0,0,ab55a51247ee2850d4e2152336537ca54db9312a277429beb604e88703e48472,2025-04-07T14:18:15.560000
|
||||
CVE-2025-2076,0,0,97b36f1e6f07a313a2c81becc36dc64919123b61205ecb45483897067337e6f1,2025-04-07T20:51:08.497000
|
||||
@ -283384,14 +283391,14 @@ CVE-2025-21574,0,0,a9e09396da256a71c873f1d7603036dea8ca5b199b826133353b177c18c3b
|
||||
CVE-2025-21575,0,0,b5cea0349cd74a802b56d0c43ed156083e814e7611b9efd28a8942850f7d3df3,2025-04-16T15:15:54.663000
|
||||
CVE-2025-21576,0,0,8469978b0c3364fc3a7da135c14871569eb91d65a303c0738bfb0493932f55fc,2025-04-16T15:15:54.790000
|
||||
CVE-2025-21577,0,0,12696179ed4cb03d433f4d52d6702fbc03d5adc396c5a5d666da65646043693d,2025-04-16T15:15:54.913000
|
||||
CVE-2025-21578,0,1,cc55bc7568035bc69e2870069584c89382dcaff2bc5a0d10d727bca3cce74819,2025-04-16T21:15:46.080000
|
||||
CVE-2025-21579,0,1,d3388049f250b9ffa15b3f3059f6fe1844bad7dae13d6039e83ed04f10fcc7d7,2025-04-16T21:15:46.193000
|
||||
CVE-2025-21580,0,1,56dfa4e85b58b4ee478c33fb7a0d1d0c920d73518bf1e631d074de98000794f0,2025-04-16T21:15:46.303000
|
||||
CVE-2025-21581,0,1,9c149b66e3275e4f9574a1b5e234f7f21ff0536cfccb7a9b9ff196ddea4a2a36,2025-04-16T21:15:46.413000
|
||||
CVE-2025-21582,0,1,73b486e07da32152d0796ff19ab6f451b6bd6889bb5d27f60ead23e8e5584ce9,2025-04-16T21:15:46.527000
|
||||
CVE-2025-21578,0,0,cc55bc7568035bc69e2870069584c89382dcaff2bc5a0d10d727bca3cce74819,2025-04-16T21:15:46.080000
|
||||
CVE-2025-21579,0,0,d3388049f250b9ffa15b3f3059f6fe1844bad7dae13d6039e83ed04f10fcc7d7,2025-04-16T21:15:46.193000
|
||||
CVE-2025-21580,0,0,56dfa4e85b58b4ee478c33fb7a0d1d0c920d73518bf1e631d074de98000794f0,2025-04-16T21:15:46.303000
|
||||
CVE-2025-21581,0,0,9c149b66e3275e4f9574a1b5e234f7f21ff0536cfccb7a9b9ff196ddea4a2a36,2025-04-16T21:15:46.413000
|
||||
CVE-2025-21582,0,0,73b486e07da32152d0796ff19ab6f451b6bd6889bb5d27f60ead23e8e5584ce9,2025-04-16T21:15:46.527000
|
||||
CVE-2025-21583,0,0,fc5e501e698193a967bccf982877e2bf49fdd82bf5233cb505b16543178cca76,2025-04-16T13:25:59.640000
|
||||
CVE-2025-21584,0,1,1bb5fd3228da83e15506d762334b7eb6e25eb3738beea4c15962e81bfaf0e2f8,2025-04-16T20:15:16.947000
|
||||
CVE-2025-21585,0,1,bdb1a1bce2cc87b668ceb99c423d8aad8935f5b10c1d981ae6ae23e79f6c7ba6,2025-04-16T20:15:17.057000
|
||||
CVE-2025-21584,0,0,1bb5fd3228da83e15506d762334b7eb6e25eb3738beea4c15962e81bfaf0e2f8,2025-04-16T20:15:16.947000
|
||||
CVE-2025-21585,0,0,bdb1a1bce2cc87b668ceb99c423d8aad8935f5b10c1d981ae6ae23e79f6c7ba6,2025-04-16T20:15:17.057000
|
||||
CVE-2025-21586,0,0,bc1b0dbbae635786848486bd27d63ee575b048d119ff6891efb83f4a54063275,2025-04-16T16:15:29.603000
|
||||
CVE-2025-21587,0,0,eedad467194fde544fab5917243d8c2a1c7fd2b88079264f6486607d67044c95,2025-04-16T16:15:29.730000
|
||||
CVE-2025-21588,0,0,f4b970b6c82c586314a19772bb43ae24f77ca27154b8cc695b2ced30e5d02b28,2025-04-16T16:15:29.840000
|
||||
@ -284542,7 +284549,7 @@ CVE-2025-22869,0,0,79719125726880f26bc2b13b7ff722f5a8e85ca88bf5332b957a80e592d67
|
||||
CVE-2025-2287,0,0,8813dfc8049edc90f8c2884aee49dcafb730530912f5261432ad51214abb5088,2025-04-08T18:13:53.347000
|
||||
CVE-2025-22870,0,0,5e2155600788a6616ffe365d219c4b2615228a685c5d4bcb3d43989a57212eec,2025-03-18T17:15:45.467000
|
||||
CVE-2025-22871,0,0,5e0c07a56f9d9b1e220de2ed08857b9f0fb1c1919df08a2562023c832dbb7098,2025-04-09T20:02:41.860000
|
||||
CVE-2025-22872,0,1,a5255faca646b559f4db0dd5178fef5d605c56546ae2d47b8c518b2c5e94f879,2025-04-16T21:15:46.640000
|
||||
CVE-2025-22872,0,0,a5255faca646b559f4db0dd5178fef5d605c56546ae2d47b8c518b2c5e94f879,2025-04-16T21:15:46.640000
|
||||
CVE-2025-2288,0,0,ea5cf9eb4e5e7d5beb8e92f7104073ba5d1adc8fc07f8a97145fc23482c0367a,2025-04-08T18:13:53.347000
|
||||
CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000
|
||||
CVE-2025-22881,0,0,bac764bb844fd45fc50560c993c0edd1d8ed2c5159276215579d0cda943f98d6,2025-02-26T08:14:25.137000
|
||||
@ -285428,6 +285435,7 @@ CVE-2025-23995,0,0,fc33427766934e6ec798a3acad36041ca77888d3bd75447ef8556d65238e1
|
||||
CVE-2025-23996,0,0,044a631ccc7b953428bed6ca4f1e78634642ba7fb893e1284d5301e8ce6e28fa,2025-01-21T18:15:17.503000
|
||||
CVE-2025-23997,0,0,77e65675aa34b148df76ab43b9568b71cc7208d39621afbe6f65c277717cb0b4,2025-01-21T14:15:13.230000
|
||||
CVE-2025-23998,0,0,4ced4b8f68a6d09d5a1c825ec6107a84dbbb418c96e80844463996fce823e3ed,2025-01-21T14:15:13.413000
|
||||
CVE-2025-2400,1,1,cb277ee1e8117318fb6e147a1b2b1e1371201876775172b424ebe4df769d43b5,2025-04-16T23:15:45.697000
|
||||
CVE-2025-24001,0,0,2c753840ec158b2e8c5040a7ed2631e45b8667250a806707291f782ebc7cf4aa,2025-01-21T14:15:13.600000
|
||||
CVE-2025-2401,0,0,180afd0114e466b052cbb68cdf002b3c7d20a7d9b28a41a0f1ffe2ed37af9438,2025-03-17T13:15:39.803000
|
||||
CVE-2025-24010,0,0,755be8be1475b71408bd0286ec94084c98023c6a02427820a8766e3be39154b8,2025-01-20T16:15:28.730000
|
||||
@ -285728,13 +285736,13 @@ CVE-2025-24418,0,0,0b9e05d200d3572fa40b73de6ce7cb0a74c0ccc71a55a2519fc8f76ce03aa
|
||||
CVE-2025-24419,0,0,0dff8daac36e461e8338325349b5de4746cdbc5f9cbaad6fc9787efbaaff8022,2025-04-16T17:17:01.200000
|
||||
CVE-2025-2442,0,0,4190cd9f490d0cbc14aa7b27b97f63f4216090124f0a62ddf28f2664d24ac2c5,2025-04-09T20:02:41.860000
|
||||
CVE-2025-24420,0,0,b7284458a856bbe258fa5ccb45ddb789ad78b44c296ba6e8a8c672c9a7711993,2025-04-16T17:16:51.277000
|
||||
CVE-2025-24421,0,1,374ccb79614972a85b750ce079529bcc02ec96f30176bc9fbff45f11a13133b3,2025-04-16T20:15:17.170000
|
||||
CVE-2025-24421,0,0,374ccb79614972a85b750ce079529bcc02ec96f30176bc9fbff45f11a13133b3,2025-04-16T20:15:17.170000
|
||||
CVE-2025-24422,0,0,6b8096e72f934f64c5925e489b4e3f03640c514d9fe890dff8b87672bc735ade,2025-04-16T17:16:43.853000
|
||||
CVE-2025-24423,0,0,bfd9d82bede896d4cb5f22dc83da35beda5e880014994c0510a23aa20fba7396,2025-04-16T17:16:37.320000
|
||||
CVE-2025-24424,0,0,e55cb3328000bae616509b5a3ca2e3ab08ceda2c9fb430a2bf6e9fa851cfdde3,2025-04-16T17:16:10.380000
|
||||
CVE-2025-24425,0,0,544e24fb5861c08f50241c0900b75732f7ace8ae9fb499ef3f2243360578a7fd,2025-03-05T18:32:12.530000
|
||||
CVE-2025-24426,0,0,03bec720441a3a673238f11ac31be6c9efb917575e7a75f14c8f68935f723c76,2025-04-16T17:16:04
|
||||
CVE-2025-24427,0,1,4de9d57a157e58e4e2aa891bfde852ec31ccca3f06080766557ca7d9ff39d663,2025-04-16T20:15:17.313000
|
||||
CVE-2025-24427,0,0,4de9d57a157e58e4e2aa891bfde852ec31ccca3f06080766557ca7d9ff39d663,2025-04-16T20:15:17.313000
|
||||
CVE-2025-24428,0,0,d362fd3d6b3216dc8e7bd86c697cdb90a903d9c76b342cb6299162b6ab48e211,2025-03-03T15:51:40.090000
|
||||
CVE-2025-24429,0,0,3890fb9af95ea402a42f76d7522e17fb69a860e6735ccd8adf88141b140813e6,2025-04-16T14:27:27.770000
|
||||
CVE-2025-24430,0,0,2d690f4c808e65333c8d6be4dc029f0fb527153402d8560e01c5c3848f8480f7,2025-04-16T14:25:10.510000
|
||||
@ -286106,7 +286114,12 @@ CVE-2025-24903,0,0,f94c50d2f0574a93b5b48805712360c1af6392fea087d65c2ed61830aedff
|
||||
CVE-2025-24904,0,0,922b25d3a9b426b643b71230fe8a3d6600552e09598c6cd6bc1bcb32f760c1d1,2025-02-13T16:16:49.053000
|
||||
CVE-2025-24905,0,0,a12cf1d4a84b7dfc2fc6ddf401dddb1af801de5f0e459b8125fad6e258d821aa,2025-02-13T19:00:37.593000
|
||||
CVE-2025-24906,0,0,c4750456c80f4de3a8d1ced568cbceb00ad477041c107087bb6724cafda48816,2025-02-13T18:59:59.940000
|
||||
CVE-2025-24907,1,1,9e413b69d33bff2ec85f496f439c5e8098d9d4edee10103b2bfdeb1e62457033,2025-04-16T23:15:45.027000
|
||||
CVE-2025-24908,1,1,bf4977fdee0b84761f61038bf9e67b8ed9ff407b4a6c9a63105e162dec8c6842,2025-04-16T23:15:45.147000
|
||||
CVE-2025-24909,1,1,83597d5e92615d8f839fa2b1324216a6d4c31a7b2c98f79df25daed836296754,2025-04-16T23:15:45.263000
|
||||
CVE-2025-2491,0,0,a0733df35b55730cd2b5dbe4143a0c5c885964cd78e8115aea22f767407fa474,2025-03-18T15:16:01.707000
|
||||
CVE-2025-24910,1,1,aea5315d6f9ea58ab4df3c550695318661f5efb240546e707ff4d04dea9d573d,2025-04-16T23:15:45.373000
|
||||
CVE-2025-24911,1,1,af0824fa76e4a0ae20e6cfaa00aa9282068832b4deb84412b81b5535baed6d30,2025-04-16T23:15:45.490000
|
||||
CVE-2025-24912,0,0,d10f05928f11c7a00e2a62c8635f9af5917fec081444b4d22020eb25a54c0654,2025-03-12T05:15:37.430000
|
||||
CVE-2025-24915,0,0,24c26ca53ef1e2928a50350b0dbd455453bdc6581f1752ca8926cd09252dcb45,2025-03-21T15:15:42.020000
|
||||
CVE-2025-24920,0,0,f7f8f763bf4982c0df509bbeae99871e92e5c9a0b38af941d8b9c06be0af01ab,2025-03-27T14:10:53.500000
|
||||
@ -286334,6 +286347,7 @@ CVE-2025-25224,0,0,a4f44e8389415111624e6d3b431cded203f069a8e58de6c5b5f4eb5c08d09
|
||||
CVE-2025-25225,0,0,50e1db0214d749384eee9692d10836c10107d4550447d640f020938a4553ed14,2025-03-18T17:15:45.920000
|
||||
CVE-2025-25226,0,0,c1d011e8e7ba6b6c9f469aa960fb7064e4361a6d4416d3477e347671e561cfd3,2025-04-09T15:16:01.923000
|
||||
CVE-2025-25227,0,0,14dde9d48b40850eb1a2d705436b8ead1fc46d2a4e1905b71e2c6de779c3c0c1,2025-04-08T19:15:47.290000
|
||||
CVE-2025-25230,1,1,8a2ad333af0aca7a154e89624242b3f795e091cda3ab656868bad784eeea0af0,2025-04-16T22:15:14.073000
|
||||
CVE-2025-25241,0,0,f70d628c4466ad6abe844cd65a2579f5c9e5af240d0c56eadc1f05ff31a52618,2025-02-18T18:15:34.967000
|
||||
CVE-2025-25242,0,0,9434714e72888d1a52e5bad48430408baa107619f6e4dcba8f508d71d8cfd58f,2025-03-11T01:15:34.777000
|
||||
CVE-2025-25243,0,0,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72aa0,2025-02-18T18:15:35.160000
|
||||
@ -286692,7 +286706,7 @@ CVE-2025-26127,0,0,ff848518068745ae246227c687011816436068efa4d4914700821387766f6
|
||||
CVE-2025-26136,0,0,2adb34c79a3ec7fe584c4e7725e79c104805fdaa01d3b24e5975e14259ccd144,2025-03-05T17:15:16.017000
|
||||
CVE-2025-26137,0,0,004205e5376adff96c010e010531e03852f5eb4905a1a3c73ed331cf2f44f325,2025-04-01T20:37:44.117000
|
||||
CVE-2025-26138,0,0,4c83b447574a31d9857c309d7f5649f5104ee78c2e6617a4327eaace6a44e40b,2025-04-01T20:37:28.490000
|
||||
CVE-2025-26153,1,1,99e4c74aa7b3148191d29e10b48d2751daf5f248d0cc62d9d1636ff13c76d613,2025-04-16T21:15:46.770000
|
||||
CVE-2025-26153,0,0,99e4c74aa7b3148191d29e10b48d2751daf5f248d0cc62d9d1636ff13c76d613,2025-04-16T21:15:46.770000
|
||||
CVE-2025-26156,0,0,962eae3fa0ac2ee7ef9345ac9060a4193d262807409fdde8171c1e14753b4430,2025-04-02T18:49:33.170000
|
||||
CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000
|
||||
CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000
|
||||
@ -287800,7 +287814,7 @@ CVE-2025-2803,0,0,e47ecd50bab8435762f20a0360685d74e0ceaca5cc3e5df3e0509ccc4da5c5
|
||||
CVE-2025-2804,0,0,05befb6a988325f06e55dd5b0c814f5549862889b3223abfcf82e08eebaa0244,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d084,2025-04-11T15:39:52.920000
|
||||
CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000
|
||||
CVE-2025-28072,1,1,d19de959c1a426b8392743735e0bc8eb43cb6f87a1dfb27d8c072076f3f51fae,2025-04-16T21:15:46.883000
|
||||
CVE-2025-28072,0,0,d19de959c1a426b8392743735e0bc8eb43cb6f87a1dfb27d8c072076f3f51fae,2025-04-16T21:15:46.883000
|
||||
CVE-2025-2808,0,0,2d9ef6fcbe323df90c90b4e91a51bb82e8f5ef9746894b9f5e9c32273a3c6988,2025-04-08T18:13:53.347000
|
||||
CVE-2025-28087,0,0,1a24fc8fa031815998ab3cec95d83c4ceea417049d18cb4b484e469d0233d5a6,2025-04-07T14:22:33.160000
|
||||
CVE-2025-28089,0,0,67dcb00b253159ea36147dba2ae48f5f5632d8f7c0e820c0f6cd1525d263b4dd,2025-04-07T14:20:46.543000
|
||||
@ -288133,23 +288147,23 @@ CVE-2025-2964,0,0,ec69ae3f38e343756ba814c2e5955dca4ab2cdb43321644a6a3ca4d2fda05b
|
||||
CVE-2025-29640,0,0,10d69d5153affdfdd1cfbbf32b1c82cf02889c3684c0ecfe28cc371bbe51cc15,2025-04-01T20:23:29.113000
|
||||
CVE-2025-29641,0,0,07728e025c7edec0a6c57cfca48077e7931db6a66e70d6357266b91cead71f8a,2025-04-01T20:23:16.657000
|
||||
CVE-2025-29647,0,0,b2c68859973ff17d99e38be6964fb50b00d742d76463efee1e3f756976e68d06,2025-04-08T20:15:30.700000
|
||||
CVE-2025-29648,1,1,3da34d143cb76b9e6cdc7f07c5a45cdfc6673e59bed4a387a91eee3a985ae63f,2025-04-16T21:15:46.993000
|
||||
CVE-2025-29649,1,1,7ee42729c8da140fc26bbe04aabbcdc7696a5ad9859c7d032fbea5ba895dc252,2025-04-16T21:15:47.147000
|
||||
CVE-2025-29648,0,0,3da34d143cb76b9e6cdc7f07c5a45cdfc6673e59bed4a387a91eee3a985ae63f,2025-04-16T21:15:46.993000
|
||||
CVE-2025-29649,0,0,7ee42729c8da140fc26bbe04aabbcdc7696a5ad9859c7d032fbea5ba895dc252,2025-04-16T21:15:47.147000
|
||||
CVE-2025-2965,0,0,b1d83303c83fa5c453f89d281c2631e556dad3281735af3c32f95354d255295b,2025-04-04T01:15:39.727000
|
||||
CVE-2025-29650,1,1,12ba4c5d3b709b2e4a7aaf3779615fbf88a7cfa9742f4a27b3b6f2ad14e3f87c,2025-04-16T21:15:47.307000
|
||||
CVE-2025-29651,1,1,67dc7a89b2f19fb8a612f38cc8faf3aa56e8f01962388e71b22c5d8fd741a29b,2025-04-16T20:15:17.760000
|
||||
CVE-2025-29652,1,1,27d24f9ef4f73977fc01d99610d4bf3cf156bc77f94e9ebc2b03f3164d7ee36d,2025-04-16T20:15:17.860000
|
||||
CVE-2025-29653,1,1,b81026b785a38e3f2f8169b6323d723309a175ed17bd463588a943999d00ffb0,2025-04-16T20:15:17.963000
|
||||
CVE-2025-29650,0,0,12ba4c5d3b709b2e4a7aaf3779615fbf88a7cfa9742f4a27b3b6f2ad14e3f87c,2025-04-16T21:15:47.307000
|
||||
CVE-2025-29651,0,0,67dc7a89b2f19fb8a612f38cc8faf3aa56e8f01962388e71b22c5d8fd741a29b,2025-04-16T20:15:17.760000
|
||||
CVE-2025-29652,0,0,27d24f9ef4f73977fc01d99610d4bf3cf156bc77f94e9ebc2b03f3164d7ee36d,2025-04-16T20:15:17.860000
|
||||
CVE-2025-29653,0,0,b81026b785a38e3f2f8169b6323d723309a175ed17bd463588a943999d00ffb0,2025-04-16T20:15:17.963000
|
||||
CVE-2025-2966,0,0,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000
|
||||
CVE-2025-2967,0,0,14b33c1f634d82e0ee8f6eba9d8900eb26f8e5ef6b28fe9846307dc0432895cc,2025-04-04T01:15:39.857000
|
||||
CVE-2025-2968,0,0,2f5310773b41e32a0609f9013ca63505bab1761feb2b83c508abd214cd1156b1,2025-04-04T01:15:39.930000
|
||||
CVE-2025-2969,0,0,2c92f9aaf929a695828188a9354c9039b1da27ec28571736050e209bd0423cad,2025-04-04T01:15:40
|
||||
CVE-2025-2970,0,0,67c007e67877a94fb703f9d730b81129ea1f6387e2e40954ff831fd4807254f0,2025-04-04T01:15:40.067000
|
||||
CVE-2025-29705,0,0,d50bc7403680eaf9635e360140860dd9bb945ed47cbe680766215a624ae6d64d,2025-04-15T19:16:07.783000
|
||||
CVE-2025-29708,1,1,1b936c2bef687442f32dab496c57f1d66f2e2d3c0a38db41b624c108c02dde0b,2025-04-16T21:15:47.460000
|
||||
CVE-2025-29709,1,1,932dae08215d3f213c20e372aa7f6bae05253d357dc51ffe3dc2d9daa73c3892,2025-04-16T21:15:47.570000
|
||||
CVE-2025-29708,0,0,1b936c2bef687442f32dab496c57f1d66f2e2d3c0a38db41b624c108c02dde0b,2025-04-16T21:15:47.460000
|
||||
CVE-2025-29709,0,0,932dae08215d3f213c20e372aa7f6bae05253d357dc51ffe3dc2d9daa73c3892,2025-04-16T21:15:47.570000
|
||||
CVE-2025-2971,0,0,2706995c55a7dbc3fec5708d9b29d92444bde85b5e349db5ecc56094ac7bd4d7,2025-04-07T23:15:43.050000
|
||||
CVE-2025-29710,1,1,dee2aeeefd0cbcfd27cec824c1f69b3a17aead5c60c2a7ae2f11b184679dbfa4,2025-04-16T21:15:47.673000
|
||||
CVE-2025-29710,0,0,dee2aeeefd0cbcfd27cec824c1f69b3a17aead5c60c2a7ae2f11b184679dbfa4,2025-04-16T21:15:47.673000
|
||||
CVE-2025-29719,0,0,8e7057a22540e0bc6e719ee80087d1e3317b2b2e7c0e51bfcdcdafe3f5440328,2025-04-10T14:27:50.553000
|
||||
CVE-2025-2972,0,0,9bd90eb57737eba9afab46fcd8061576d92129d2495ebdef7228d08af4388952,2025-04-04T01:15:40.127000
|
||||
CVE-2025-29720,0,0,5ec932914a7d81da0b10599d75c12821d0c2e8eb7f364340baae17593b19712a,2025-04-15T18:39:27.967000
|
||||
@ -288665,7 +288679,7 @@ CVE-2025-30676,0,0,708f03a86f4c884ecda3f7ec1e5552de291778e3e25b801a6e5af963ebcc8
|
||||
CVE-2025-30677,0,0,ac691303aa13f8ca9aabebde82f77f60d124e3f5ca096d5288780405b88472c8,2025-04-09T20:02:41.860000
|
||||
CVE-2025-3068,0,0,de66f3afaa7fd4a67fa9d3ab57331fb0ab9491ba6c44d88f9dc6104a16396311,2025-04-07T13:30:02.277000
|
||||
CVE-2025-30681,0,0,4df1a0ccddde5b4d4b0622c7fe532b814342d38bcc00203e31b1f646e89182ca,2025-04-16T15:16:10.170000
|
||||
CVE-2025-30682,0,1,fe35e0394f10a4326a81f1b241655702139d45ca0593a3de705be42a73d1d5b9,2025-04-16T20:15:18.057000
|
||||
CVE-2025-30682,0,0,fe35e0394f10a4326a81f1b241655702139d45ca0593a3de705be42a73d1d5b9,2025-04-16T20:15:18.057000
|
||||
CVE-2025-30683,0,0,dfb46681e1e59b565bc83c636f71466021abac81c31b453250c455b92d603736,2025-04-16T19:15:54.427000
|
||||
CVE-2025-30684,0,0,15008d8313d4203976158462220def7dc846c59d125fdc600532d4a20c98fe92,2025-04-16T18:16:05.883000
|
||||
CVE-2025-30685,0,0,b11ad9fe469b2e477ef6f442fb9ad983947cfbc2eea7daf5b8990f68288fdb15,2025-04-16T16:15:32.263000
|
||||
@ -288678,25 +288692,25 @@ CVE-2025-30690,0,0,917158df2f0cd108363ac9d8cc3bade204129e43a71903793648e3489f357
|
||||
CVE-2025-30691,0,0,dda84764d10c0d6f81fbaef02ece4df64b6294b34df1ae31a78a50c2c099b84f,2025-04-16T16:15:32.937000
|
||||
CVE-2025-30692,0,0,3161b1f45cecc0a3afa599c1e2826c52f9889c53e2e1e051bcda24c2c2b8b347,2025-04-16T16:15:33.047000
|
||||
CVE-2025-30693,0,0,75f314d64704b70bf300b7ed3580bcd4d63da3c4e153b93bab0afaa3cf1d9920,2025-04-16T16:15:33.170000
|
||||
CVE-2025-30694,0,1,3270f0d1f242541086999443784f1cd2ae7e6e36bd12ded2ce33f68713f1412d,2025-04-16T20:15:18.170000
|
||||
CVE-2025-30695,0,1,2259babac90148ca0f8ef98c77c3d74f76871fb763868abadc6c539961445241,2025-04-16T20:15:18.283000
|
||||
CVE-2025-30694,0,0,3270f0d1f242541086999443784f1cd2ae7e6e36bd12ded2ce33f68713f1412d,2025-04-16T20:15:18.170000
|
||||
CVE-2025-30695,0,0,2259babac90148ca0f8ef98c77c3d74f76871fb763868abadc6c539961445241,2025-04-16T20:15:18.283000
|
||||
CVE-2025-30696,0,0,2f823080fbe70fb899d8f476b24ec728b0cc68b2de13d0cea5269a793f1e80e3,2025-04-16T16:15:33.283000
|
||||
CVE-2025-30697,0,1,86ddb528e2c1a9a055b5089342128d39381f5a1c9cc6693f91ae347d629e6342,2025-04-16T20:15:18.393000
|
||||
CVE-2025-30697,0,0,86ddb528e2c1a9a055b5089342128d39381f5a1c9cc6693f91ae347d629e6342,2025-04-16T20:15:18.393000
|
||||
CVE-2025-30698,0,0,2e0b4ef6a51249a61f937633b8ef9af318b928a4049f1fa2c2faad62ebe3457e,2025-04-16T16:15:33.397000
|
||||
CVE-2025-30699,0,1,1b3bb43705540e565eb0b82cb732e4633d529358091e103d547ad7fe3f656513,2025-04-16T20:15:18.507000
|
||||
CVE-2025-30699,0,0,1b3bb43705540e565eb0b82cb732e4633d529358091e103d547ad7fe3f656513,2025-04-16T20:15:18.507000
|
||||
CVE-2025-3070,0,0,389eca2715a25e0502dfee20fa689abffda48144e371016d21a2980b0deeba8c,2025-04-07T13:28:06.423000
|
||||
CVE-2025-30700,0,1,6df59879402b5165b4d6b565ee0d1d6d0889572749e13acadb2451d22731ed25,2025-04-16T20:15:18.620000
|
||||
CVE-2025-30700,0,0,6df59879402b5165b4d6b565ee0d1d6d0889572749e13acadb2451d22731ed25,2025-04-16T20:15:18.620000
|
||||
CVE-2025-30701,0,0,9a22cceb291a84409cb4437a523f205f65c6a58cdcb79e514955aa3eee0cd30c,2025-04-16T15:16:10.393000
|
||||
CVE-2025-30702,0,0,5da8d5ca5c5c79a758df420f71d9d826caea9751a114f91b5b9edc6917be1cf2,2025-04-16T13:25:59.640000
|
||||
CVE-2025-30703,0,0,ac760d0ffb27e2362ca52455f2f6be4e2b15aaabab9becab9ba5568298facdcc,2025-04-16T15:16:10.507000
|
||||
CVE-2025-30704,0,0,3dadef73d41fba2c7391c893a130d13093bdcfbdccc65f3e41b2e688cc13531c,2025-04-16T15:16:10.613000
|
||||
CVE-2025-30705,0,0,fce181c4d0f09d4cca66173f8d721e43a514d20bb8ffb16ff1e55ad80a51f057,2025-04-16T14:15:24.910000
|
||||
CVE-2025-30706,0,0,e378eba725d84697ff58c04d29694e6a01c8a9a5f40009abeeb03db5c718db01,2025-04-16T14:15:25.037000
|
||||
CVE-2025-30707,0,1,6a914893ca34bf2dabf74d3bce729b9adf8170abd5fd1a999e2256dd0171cc7a,2025-04-16T20:15:18.743000
|
||||
CVE-2025-30707,0,0,6a914893ca34bf2dabf74d3bce729b9adf8170abd5fd1a999e2256dd0171cc7a,2025-04-16T20:15:18.743000
|
||||
CVE-2025-30708,0,0,79986e2b81e871fbc68eefc7bab3eb8146dedadebe143d92f70268194a98022c,2025-04-16T13:25:59.640000
|
||||
CVE-2025-30709,0,1,ce664d2db63a71790a627ed826cd05280bb2e3736149e236ac0b210115a9a9ca,2025-04-16T20:15:18.853000
|
||||
CVE-2025-30709,0,0,ce664d2db63a71790a627ed826cd05280bb2e3736149e236ac0b210115a9a9ca,2025-04-16T20:15:18.853000
|
||||
CVE-2025-3071,0,0,d16bcf87876b69db8889459754164a9a7a5a7660b7bb26af9304dff3429a1889,2025-04-10T21:15:49.347000
|
||||
CVE-2025-30710,0,1,a5121b4e4191508eb6ce8d319d1d00e60f5016db8c92efd77eaa69ea703dae61,2025-04-16T20:15:18.967000
|
||||
CVE-2025-30710,0,0,a5121b4e4191508eb6ce8d319d1d00e60f5016db8c92efd77eaa69ea703dae61,2025-04-16T20:15:18.967000
|
||||
CVE-2025-30711,0,0,1e5465f558efc4782f831dbcabf3c5891d8231c2999b8198eb1d5bb90ab63b46,2025-04-16T16:15:33.523000
|
||||
CVE-2025-30712,0,0,eac5b0b99e5f8b50cb56cbe2ee1e629963db68c1e9d3f1fc4db92b2affc433d4,2025-04-16T16:15:33.633000
|
||||
CVE-2025-30713,0,0,1b9f9946ae908a48170d2a70a15ad8fb04aa712960921de2c1d56c95c39b0df1,2025-04-16T16:15:33.747000
|
||||
@ -289186,6 +289200,7 @@ CVE-2025-31474,0,0,5e7d6600ce1174be36633aec5902c9252df21c2f48f1552b8554d9d1218e3
|
||||
CVE-2025-31475,0,0,d054ab98458109d671d2e3362598fabc0f69079fd0804798837af9591fe8f8e4,2025-04-08T18:14:17.307000
|
||||
CVE-2025-31476,0,0,2278ecebe988f2494770aa5bcdde199a741030c5fdfef8bf4f1b7a701a4a759f,2025-04-08T18:14:17.307000
|
||||
CVE-2025-31477,0,0,54285781555488a3668d04893deec45a9e20dfdee4ab1c462d402e7283dfccb5,2025-04-07T14:18:34.453000
|
||||
CVE-2025-31478,1,1,b6da6719d326840f501df7f1408ff1de3712392cf9832b5493957c7da4075620,2025-04-16T22:15:14.233000
|
||||
CVE-2025-31479,0,0,2697cc1817114968aab8eafa22f3d26b926cb32529ad7873759be5d99c686601,2025-04-07T14:18:34.453000
|
||||
CVE-2025-3148,0,0,b333acfda68d66ad1bae1483d9c733fd29bd9303bc53eccbc0d0767f3d1c789f,2025-04-07T14:18:34.453000
|
||||
CVE-2025-31480,0,0,dfb43594bbbdcf12c97680368525c0c40e65f0938db26f1a8caa293eb7101deb,2025-04-07T14:18:15.560000
|
||||
@ -289869,6 +289884,7 @@ CVE-2025-32426,0,0,97f7719ef42c67257e2006b52ab9747f51788ff83c926fc892139743aec5a
|
||||
CVE-2025-32427,0,0,0416426b54022f69535fafb066a105f3453a61c3cc047d8982deab84a0710a9d,2025-04-11T15:39:52.920000
|
||||
CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b345a,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000
|
||||
CVE-2025-32433,1,1,6df07494c15d475f1de4e347159ef40acf96f28d5ebdbbd82bad602c3cb04a2c,2025-04-16T22:15:14.373000
|
||||
CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000
|
||||
CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000
|
||||
CVE-2025-32439,0,0,bc2ffe14216b9cfe29b31e6fc5be13f4870b9bbc8f43f42b1dd5fa85872b2005,2025-04-16T13:25:59.640000
|
||||
@ -290056,12 +290072,16 @@ CVE-2025-32778,0,0,93333c106bade1942d189295a57ca8b886e6e79a18429247cda3fa2e156f8
|
||||
CVE-2025-32779,0,0,9b0c0f3e1679aa6a29c07a0230230eddd75bcf03028ff914fcc18fd0552bd825,2025-04-15T18:39:27.967000
|
||||
CVE-2025-32780,0,0,66c032871841ee8f1135c9a708f1264f3edee13154b2ee90fcea8f285386936f,2025-04-15T18:39:27.967000
|
||||
CVE-2025-32782,0,0,ea3e82903e807a520de4c91c10f7d08fd70839175e235aa475d1b12f4a8b1338,2025-04-16T13:25:37.340000
|
||||
CVE-2025-32783,1,1,9698e9ba7093dbb73e35c4e21de6279231499f6c0dd02d871a6cc5ae64c5a62f,2025-04-16T22:15:14.523000
|
||||
CVE-2025-32784,0,0,f07e1bae891c8076c2e74beba24dfa0a792bdc8c6b542f23984d9697f06bd191,2025-04-16T13:25:37.340000
|
||||
CVE-2025-32787,1,1,585e3d1455b8a84e795030e7b0dc4099402e56b99d1c15594a4fd6dc0fe73b3d,2025-04-16T22:15:14.667000
|
||||
CVE-2025-32789,1,1,1db70b23989b905b2aba1aa6683b57fe707a22cfe3f1f5347c6f92571a95f8a6,2025-04-16T22:15:14.800000
|
||||
CVE-2025-32791,1,1,cce811760929409bbc0164cd7083266c1ecce2c2b4b86cf82e6643b37c8fea15,2025-04-16T22:15:14.943000
|
||||
CVE-2025-32807,0,0,791ea9650394de4a3c6a4bce28448af084ce5e8fb834d69b1769b35b955fdca4,2025-04-11T15:39:52.920000
|
||||
CVE-2025-32808,0,0,4460b802a312298836218e51f145ee69f847802ae0b680f0631fd4c9d767af72,2025-04-11T16:15:20.673000
|
||||
CVE-2025-32809,0,0,ca90ff3ced06efa4e939486b48b76783f1482c86186847921ab08cd5bd99e3d5,2025-04-11T16:15:20.807000
|
||||
CVE-2025-32816,0,0,7146ab229fea4de6245a9faadeb60513e017f27b734755baaf195d3f55011510,2025-04-11T15:39:52.920000
|
||||
CVE-2025-32817,1,1,2ce554c565fb4e62b3c662311b1ce451f78c307581785975384122d9afebc7f3,2025-04-16T21:15:47.780000
|
||||
CVE-2025-32817,0,0,2ce554c565fb4e62b3c662311b1ce451f78c307581785975384122d9afebc7f3,2025-04-16T21:15:47.780000
|
||||
CVE-2025-3282,0,0,4f7d1b48e17ccd00afeee2e7a595ed2b28190fc5a8aec67b855d00f5d80e0bc2,2025-04-15T18:39:27.967000
|
||||
CVE-2025-32822,0,0,367ecfacf3c74140480293afb0501d7a53327500a3de5132d335460df99583f3,2025-04-16T18:16:07.973000
|
||||
CVE-2025-32823,0,0,d69c9859ee28ca28e054ef2b051867a5f7aaf3609eea5ca6dfa5f7794f4d36be,2025-04-16T18:16:08.120000
|
||||
@ -290346,8 +290366,8 @@ CVE-2025-3612,0,0,b3e7e1fd46c9147c27f3feb15d1a5ba8eabce3f8bab41f1f78e6d74dff7b1b
|
||||
CVE-2025-3613,0,0,9c314abbc6473987a4462c7f86d0ede7026d1a1d89f3e10127913343b31eedd8,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3617,0,0,8b166380afe19241854c65e4319a7a4bf7fa4a3b21b435fec16e6239c6e67cc8,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3618,0,0,eda45473138c6808735db2df162e6171a422dd9195142056b67b3d52202066c7,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3619,1,1,53be325581dce300b9e806b9d83ff7fe2c4e86a07254b58c0415f8bff201f32e,2025-04-16T21:15:47.920000
|
||||
CVE-2025-3620,1,1,5027351bfa6940e7b37854be13f32b3ecf3f384d9c50497367f237f03836a78e,2025-04-16T21:15:48.027000
|
||||
CVE-2025-3619,0,0,53be325581dce300b9e806b9d83ff7fe2c4e86a07254b58c0415f8bff201f32e,2025-04-16T21:15:47.920000
|
||||
CVE-2025-3620,0,0,5027351bfa6940e7b37854be13f32b3ecf3f384d9c50497367f237f03836a78e,2025-04-16T21:15:48.027000
|
||||
CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac885,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3663,0,0,1ce80bfc94e480b50f27d0432deca8fffb2ad8de6b84f90469934d90488bc703,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3664,0,0,1768dbec432a631292ab0792b91b23e446ed218ac7ee245b57fd6eb101bb8145,2025-04-16T14:15:27.827000
|
||||
@ -290360,11 +290380,11 @@ CVE-2025-3675,0,0,8fc64576d9408584769dca7b251b2811cba19ed1b29b0a5e250c895856174a
|
||||
CVE-2025-3676,0,0,8b3fc538dc5f1e3498af0923d848cb34d8a7c1143698b7acb611e22232098068,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3677,0,0,d0b4158217f3756823f68a8901374ac1abc98276cdc21fdc8b5cbe01ac5c1b87,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3678,0,0,fe7f9b10b498ab4c4118f8e6f6b85a631558210b3c32871c50930a944540940a,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3679,0,1,9bcb800b5750e50910dcb692b53ba75fe416d21db6bb5123a1610ed36ae21b8e,2025-04-16T20:15:19.250000
|
||||
CVE-2025-3680,0,1,7c2e2289a4ab431cadffbfde63d0b9369934e915e62431b56f236c8cff8a93bc,2025-04-16T20:15:19.350000
|
||||
CVE-2025-3681,0,1,9873c454c08220b0a960b47b4de43158baa86f135fdd0640a80430eb44cb01cf,2025-04-16T20:15:19.460000
|
||||
CVE-2025-3682,0,1,b2affd3113c936746dbb5cf91e86a34d1e8ebeb7aa65e59a9cf1b600e5c26a70,2025-04-16T20:15:19.570000
|
||||
CVE-2025-3683,0,1,f37c23cdc7eabdf77512b1e225cee276025d8f967ad5af14a2c8a2cad9f3d57f,2025-04-16T20:15:19.670000
|
||||
CVE-2025-3679,0,0,9bcb800b5750e50910dcb692b53ba75fe416d21db6bb5123a1610ed36ae21b8e,2025-04-16T20:15:19.250000
|
||||
CVE-2025-3680,0,0,7c2e2289a4ab431cadffbfde63d0b9369934e915e62431b56f236c8cff8a93bc,2025-04-16T20:15:19.350000
|
||||
CVE-2025-3681,0,0,9873c454c08220b0a960b47b4de43158baa86f135fdd0640a80430eb44cb01cf,2025-04-16T20:15:19.460000
|
||||
CVE-2025-3682,0,0,b2affd3113c936746dbb5cf91e86a34d1e8ebeb7aa65e59a9cf1b600e5c26a70,2025-04-16T20:15:19.570000
|
||||
CVE-2025-3683,0,0,f37c23cdc7eabdf77512b1e225cee276025d8f967ad5af14a2c8a2cad9f3d57f,2025-04-16T20:15:19.670000
|
||||
CVE-2025-3684,0,0,005ffbd66ba10e6ec962169c35b3b4430afe7279dee228e65b372cdafae7a9a2,2025-04-16T19:15:55
|
||||
CVE-2025-3685,0,0,a038f7016d9d7aee9eb0536d9d006e5189794d512e4af0149f231284d7782e60,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3686,0,0,7959444999d939397b75d41bf9d8d3af522c96b7a107cfe0f6ed3f78546dfcf6,2025-04-16T13:25:37.340000
|
||||
@ -290379,15 +290399,15 @@ CVE-2025-3694,0,0,cbb6dbf67e78d678a0c32ccc77f656ed9d7bcf54631f37150d9885e2b9018d
|
||||
CVE-2025-3696,0,0,2bf939535fa8806cc4e793051666a9e5b91fe8b6ba8aa52a4170f8f7466c8498,2025-04-16T15:16:14.287000
|
||||
CVE-2025-3697,0,0,8d41cda9f6cb466619110c3390fbf369e5e587d610bb308b7d6acf4a2a9ce41f,2025-04-16T15:16:14.460000
|
||||
CVE-2025-3698,0,0,06aad761edbce101a35f9e95ce891a7c8bf2c6f046c74b9a4ac2fd5d41b56e3f,2025-04-16T14:15:29.060000
|
||||
CVE-2025-3723,1,1,5516734ea7b429349db8183353c9a6cae93c902d21883c623672896a15824d8e,2025-04-16T20:15:19.777000
|
||||
CVE-2025-3724,1,1,b85ef0c50063e0bc0a94629cd54a3778b9c0b8cb45af733f3dc605edb78eb841,2025-04-16T20:15:19.960000
|
||||
CVE-2025-3725,1,1,e1421461a06ac674145797f32b0167a7b02acb5d56dcbf6a2e44bcbcd002b389,2025-04-16T20:15:20.123000
|
||||
CVE-2025-3726,1,1,ba5a7988087a4ee7bf038eaaebf307f105486224e8c1b5abec59c2ac84c52ae8,2025-04-16T20:15:20.283000
|
||||
CVE-2025-3727,1,1,deaa5654d11615e965237b87eac3fb0356d5fa7e28c50ec7abd875586cde793c,2025-04-16T21:15:48.203000
|
||||
CVE-2025-3728,1,1,d227904395147b87ad7d649add61aa5661016d64da3169ef547e709d8ac74dd4,2025-04-16T21:15:48.363000
|
||||
CVE-2025-3729,1,1,e1f3f5695da5391fb19903ebea12f1b012caf6712d19a7605b0164067d14c993,2025-04-16T21:15:48.537000
|
||||
CVE-2025-3730,1,1,bf8196d9cc10cb8b06b520303adb009d6c422cc02d5140a90b09421a483cdfc5,2025-04-16T21:15:48.700000
|
||||
CVE-2025-3733,0,1,b7ac17b7c057f630b68a81a505102cdcfef6e13156a11c36cc53f363146b133e,2025-04-16T21:15:48.873000
|
||||
CVE-2025-3723,0,0,5516734ea7b429349db8183353c9a6cae93c902d21883c623672896a15824d8e,2025-04-16T20:15:19.777000
|
||||
CVE-2025-3724,0,0,b85ef0c50063e0bc0a94629cd54a3778b9c0b8cb45af733f3dc605edb78eb841,2025-04-16T20:15:19.960000
|
||||
CVE-2025-3725,0,0,e1421461a06ac674145797f32b0167a7b02acb5d56dcbf6a2e44bcbcd002b389,2025-04-16T20:15:20.123000
|
||||
CVE-2025-3726,0,0,ba5a7988087a4ee7bf038eaaebf307f105486224e8c1b5abec59c2ac84c52ae8,2025-04-16T20:15:20.283000
|
||||
CVE-2025-3727,0,0,deaa5654d11615e965237b87eac3fb0356d5fa7e28c50ec7abd875586cde793c,2025-04-16T21:15:48.203000
|
||||
CVE-2025-3728,0,0,d227904395147b87ad7d649add61aa5661016d64da3169ef547e709d8ac74dd4,2025-04-16T21:15:48.363000
|
||||
CVE-2025-3729,0,0,e1f3f5695da5391fb19903ebea12f1b012caf6712d19a7605b0164067d14c993,2025-04-16T21:15:48.537000
|
||||
CVE-2025-3730,0,0,bf8196d9cc10cb8b06b520303adb009d6c422cc02d5140a90b09421a483cdfc5,2025-04-16T21:15:48.700000
|
||||
CVE-2025-3733,0,0,b7ac17b7c057f630b68a81a505102cdcfef6e13156a11c36cc53f363146b133e,2025-04-16T21:15:48.873000
|
||||
CVE-2025-3734,0,0,08cd08d68803ebc3e247bc1dda5293ff05ed4a522f0928f26aaf66ccad8a7816,2025-04-16T18:16:19.783000
|
||||
CVE-2025-3735,0,0,c1ccc9a6fec3403e3777364d2dc3fbbbbb4b443b6d4510a9318f951740e87950,2025-04-16T17:15:50.030000
|
||||
CVE-2025-3736,0,0,564cad71b1e7fa3df569cf41ca780256dc009f1642d469d423a441d1ee8e0570,2025-04-16T17:15:50.113000
|
||||
@ -290453,3 +290473,5 @@ CVE-2025-39599,0,0,b32165e9ac35cddc8365b5382966b3cdc907609baee89eedf472d2eeabdae
|
||||
CVE-2025-39600,0,0,ff53b226229c137b254fd094b41c03f9992afdd195d414242990f0faaac29b77,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39601,0,0,7f3568c982e2cbdfe236a2b826bbacce5227350e296ed75f61b4bbcedef35537,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39602,0,0,df27de5ee22e5ec9d9d74c987812c0381cd04ef064c0d9455c3c07c5309a9403,2025-04-16T13:25:37.340000
|
||||
CVE-2025-43703,1,1,316b9a83c3b6dc513c619095e9530484f6e664a6d636deeaf4e977dce37bdf17,2025-04-16T22:15:15.083000
|
||||
CVE-2025-43704,1,1,4cfc0104734e3f2a02f1a096d88581f78932e3288ecf4dc711d8c50bc120846e,2025-04-16T23:15:45.770000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user