Auto-Update: 2025-04-16T23:55:19.741186+00:00

This commit is contained in:
cad-safe-bot 2025-04-16 23:58:52 +00:00
parent bd48cfe7d8
commit 1aef2801ee
25 changed files with 1212 additions and 112 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2021-21353",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-03-03T02:15:13.143",
"lastModified": "2024-11-21T05:48:11.043",
"lastModified": "2025-04-16T23:15:44.197",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend. This is fixed in version 3.0.1. This advisory applies to multiple pug packages including \"pug\", \"pug-code-gen\". pug-code-gen has a backported fix at version 2.0.3. This advisory is not exploitable if there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade."
"value": "Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend. This is fixed in version 3.0.1. This advisory applies to multiple pug packages including \"pug\", \"pug-code-gen\". pug-code-gen has a backported fix at version 2.0.3. This advisory is not exploitable if there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade."
},
{
"lang": "es",
@ -87,7 +87,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0756",
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
"published": "2025-04-16T23:15:44.400",
"lastModified": "2025-04-16T23:15:44.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Overview \n\n\n\n\u00a0\n\n\n\nThe product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not restrict JNDI identifiers during the creation of platform data sources. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nAn attacker could gain access to or modify sensitive data or system resources. This could allow access to protected files or directories including configuration files and files containing sensitive information, which can lead to remote code execution by unauthorized users."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-99"
}
]
}
],
"references": [
{
"url": "https://https://support.pentaho.com/hc/en-us/articles/35771876077709--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Improper-Control-of-Resource-Identifiers-Resource-Injection-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0756",
"source": "security.vulnerabilities@hitachivantara.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0757",
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
"published": "2025-04-16T23:15:44.530",
"lastModified": "2025-04-16T23:15:44.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Overview\n\n\n\n\u00a0\n\n\n\nThe software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, allow a malicious URL to inject content into the Analyzer plugin interface. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nOnce the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim's machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://support.pentaho.com/hc/en-us/articles/35781038882445--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0757",
"source": "security.vulnerabilities@hitachivantara.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0758",
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
"published": "2025-04-16T23:15:44.647",
"lastModified": "2025-04-16T23:15:44.647",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Overview\u00a0\n\n\n\nThe product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. (CWE-732)\u00a0\n\n\n\nDescription\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, is installed with Karaf JMX beans enabled and accessible by default.\u00a0\n\n\n\nImpact\u00a0\n\n\n\nWhen the vulnerability is leveraged, a user with local execution privileges can access functionality exposed by Karaf beans contained in the product."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"references": [
{
"url": "https://support.pentaho.com/hc/en-us/articles/35781318194061--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Incorrect-Permission-Assignment-for-Critical-Resource-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0758",
"source": "security.vulnerabilities@hitachivantara.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-1566",
"sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f",
"published": "2025-04-16T23:15:44.767",
"lastModified": "2025-04-16T23:15:44.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DNS Leak in Native System VPN in Google ChromeOS Dev Channel on ChromeOS 129.0.6668.36 allows network observers to expose plaintext DNS queries via failure to properly tunnel DNS traffic during VPN state transitions."
}
],
"metrics": {},
"references": [
{
"url": "https://issues.chromium.org/issues/b/342802975",
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
},
{
"url": "https://issuetracker.google.com/issues/342802975",
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-1568",
"sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f",
"published": "2025-04-16T23:15:44.853",
"lastModified": "2025-04-16T23:15:44.853",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Access Control Vulnerability in Gerrit chromiumos project configuration in Google ChromeOS 131.0.6778.268 allows an attacker with a registered Gerrit account to inject malicious code into ChromeOS projects and potentially achieve Remote Code Execution and Denial of Service via editing trusted pipelines by insufficient access controls and misconfigurations in Gerrit's project.config."
}
],
"metrics": {},
"references": [
{
"url": "https://issues.chromium.org/issues/b/374279912",
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
},
{
"url": "https://issuetracker.google.com/issues/374279912",
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-1704",
"sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f",
"published": "2025-04-16T23:15:44.937",
"lastModified": "2025-04-16T23:15:44.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ComponentInstaller Modification in ComponentInstaller in Google ChromeOS 124.0.6367.34 on Chromebooks allows enrolled users with local access to unenroll devices \nand intercept device management requests via loading components from the unencrypted stateful partition."
}
],
"metrics": {},
"references": [
{
"url": "https://issues.chromium.org/issues/b/359915523",
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
},
{
"url": "https://issuetracker.google.com/issues/359915523",
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-2073",
"sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f",
"published": "2025-04-16T23:15:45.610",
"lastModified": "2025-04-16T23:15:45.610",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-Bounds Read in ip_set_bitmap_ip.c in Google ChromeOS Kernel Versions 6.1, 5.15, 5.10, 5.4, 4.19. on All devices where Termina is used allows an attacker with CAP_NET_ADMIN privileges to cause memory corruption and potentially escalate privileges via crafted ipset commands."
}
],
"metrics": {},
"references": [
{
"url": "https://issues.chromium.org/issues/b/380043638",
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
},
{
"url": "https://issuetracker.google.com/issues/380043638",
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24907",
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
"published": "2025-04-16T23:15:45.027",
"lastModified": "2025-04-16T23:15:45.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Overview \n\n\n\n\u00a0\n\n\n\nThe product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nThis allows attackers to traverse the file system to access files or directories that are outside of the restricted directory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-35"
}
]
}
],
"references": [
{
"url": "https://support.pentaho.com/hc/en-us/articles/35781624069005--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Path-Traversal-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24907",
"source": "security.vulnerabilities@hitachivantara.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24908",
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
"published": "2025-04-16T23:15:45.147",
"lastModified": "2025-04-16T23:15:45.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Overview \n\n\n\n\u00a0\n\n\n\nThe product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the UploadFile service. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nThis allows attackers to traverse the file system to access files or directories that are outside of the restricted directory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-35"
}
]
}
],
"references": [
{
"url": "https://support.pentaho.com/hc/en-us/articles/35783399569421--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Path-Traversal-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24908",
"source": "security.vulnerabilities@hitachivantara.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24909",
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
"published": "2025-04-16T23:15:45.263",
"lastModified": "2025-04-16T23:15:45.263",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Overview \n\n\n\n\u00a0\n\n\n\nThe software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, allow a malicious URL to inject content into the Analyzer plugin interface. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nOnce the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim's machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://support.pentaho.com/hc/en-us/articles/35782541484045--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24909",
"source": "security.vulnerabilities@hitachivantara.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24910",
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
"published": "2025-04-16T23:15:45.373",
"lastModified": "2025-04-16T23:15:45.373",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Overview \n\n\n\n\u00a0\n\n\n\nXML documents optionally contain a Document Type Definition (DTD), which, among other features, enables the definition of XML entities. It is possible to define an entity by providing a substitution string in the form of a URI. Once the content of the URI is read, it is fed back into the application that is processing the XML. This application may echo back the data (e.g. in an error message), thereby exposing the file contents. (CWE-611) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.2, including 9.3.x and 8.3.x, do not correctly protect Pentaho Data Integration MessageSourceCrawler against out-of-band XML External Entity Reference. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nBy submitting an XML file that defines an external entity with a file:// URI, an attacker can cause the processing application to read the contents of a local file. Using URIs with other schemes such as http://, the attacker can force the application to make outgoing requests to servers that the attacker cannot reach directly, which can be used to bypass firewall restrictions or hide the source of attacks such as port scanning."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://support.pentaho.com/hc/en-us/articles/35782683750541--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Restriction-of-XML-External-Entity-Reference-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24910",
"source": "security.vulnerabilities@hitachivantara.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24911",
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
"published": "2025-04-16T23:15:45.490",
"lastModified": "2025-04-16T23:15:45.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Overview \n\n\n\n\u00a0\n\n\n\nXML documents optionally contain a Document Type Definition (DTD), which, among other features, enables the definition of XML entities. It is possible to define an entity by providing a substitution string in the form of a URI. Once the content of the URI is read, it is fed back into the application that is processing the XML. This application may echo back the data (e.g. in an error message), thereby exposing the file contents. (CWE-611) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.2, including 9.3.x and 8.3.x, do not correctly protect Data Access XMLParserFactoryProducer against out-of-band XML External Entity Reference. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nBy submitting an XML file that defines an external entity with a file:// URI, an attacker can cause the processing application to read the contents of a local file. Using URIs with other schemes such as http://, the attacker can force the application to make outgoing requests to servers that the attacker cannot reach directly, which can be used to bypass firewall restrictions or hide the source of attacks such as port scanning."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://support.pentaho.com/hc/en-us/articles/35783689016589--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Restriction-of-XML-External-Entity-Reference-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24911",
"source": "security.vulnerabilities@hitachivantara.com"
}
]
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-2400",
"sourceIdentifier": "cve@gitlab.com",
"published": "2025-04-16T23:15:45.697",
"lastModified": "2025-04-16T23:15:45.697",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2025-25230",
"sourceIdentifier": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
"published": "2025-04-16T22:15:14.073",
"lastModified": "2025-04-16T22:15:14.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Omnissa Horizon Client for Windows contains an LPE Vulnerability.\u00a0A malicious actor with local access where Horizon Client for Windows is installed may be able to elevate privileges."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://static.omnissa.com/sites/default/files/OMSA-2025-0001.pdf",
"source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52"
},
{
"url": "https://www.omnissa.com/omnissa-security-response/",
"source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-31478",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-16T22:15:14.233",
"lastModified": "2025-04-16T22:15:14.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zulip is an open-source team collaboration tool. Zulip supports a configuration where account creation is limited solely by being able to authenticate with a single-sign on authentication backend, meaning the organization places no restrictions on email address domains or invitations being required to join, but has disabled the EmailAuthBackend that is used for email/password authentication. A bug in the Zulip server means that it is possible to create an account in such organizations, without having an account with the configured SSO authentication backend. This issue is patched in version 10.2. A workaround includes requiring invitations to join the organization prevents the vulnerability from being accessed."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/zulip/zulip/security/advisories/GHSA-qxfv-j6vg-5rqc",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2025-32433",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-16T22:15:14.373",
"lastModified": "2025-04-16T22:15:14.373",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://github.com/erlang/otp/commit/0fcd9c56524b28615e8ece65fc0c3f66ef6e4c12",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/erlang/otp/commit/6eef04130afc8b0ccb63c9a0d8650209cf54892f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/erlang/otp/commit/b1924d37fd83c070055beb115d5d6a6a9490b891",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2",
"source": "security-advisories@github.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/04/16/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-32783",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-16T22:15:14.523",
"lastModified": "2025-04-16T22:15:14.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "XWiki Platform is a generic wiki platform. A vulnerability in versions from 5.0 to 16.7.1 affects users with Message Stream enabled and a wiki configured as closed from selecting \"Prevent unregistered users to view pages\" in the Administrations Rights. The vulnerability is that any message sent in a subwiki to \"everyone\" is actually sent to the farm: any visitor of the main wiki will be able to see that message through the Dashboard, even if the subwiki is configured to be private. This issue will not be patched as Message Stream has been deprecated in XWiki 16.8.0RC1 and is not maintained anymore. A workaround for this issue involves keeping Message Stream disabled by default. It's advised to keep it disabled from Administration > Social > Message Stream."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-668"
}
]
}
],
"references": [
{
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-42fh-pvvh-999x",
"source": "security-advisories@github.com"
},
{
"url": "https://jira.xwiki.org/browse/XWIKI-17154",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-32787",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-16T22:15:14.667",
"lastModified": "2025-04-16T22:15:14.667",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. Versions 5.02.5184 to 5.02.5187 are vulnerable to NULL dereference in `DeleteIPv6DefaultRouterInRA` called by `StorePacket`. Before dereferencing, `DeleteIPv6DefaultRouterInRA` does not account for `ParsePacket` returning NULL, resulting in the program crashing. A patched version does not exist at this time."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://github.com/SoftEtherVPN/SoftEtherVPN/blob/7006539732c0231d7723623cc8732f94ba2b8c54/src/Cedar/Hub.c#L5112C1-L5116C29",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/SoftEtherVPN/SoftEtherVPN/blob/master/src/Mayaqua/TcpIp.c#L1633",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/SoftEtherVPN/SoftEtherVPN/security/advisories/GHSA-xw53-587j-mqh6",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-32789",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-16T22:15:14.800",
"lastModified": "2025-04-16T22:15:14.800",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of the user table, based on the results of the sorted list of users. Although unlikely, if an attacker knows the hash value of their password, they can change the password and repeat the sorting until the other user's password hash is fully revealed. This issue is patched in version 9.0.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"references": [
{
"url": "https://github.com/espocrm/espocrm/commit/91740192d2e2c575c6a04534c079baf9f3af0a7f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/espocrm/espocrm/commit/bd900d0b48fe37a98def4c0e094e39e7e385e9ea",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/espocrm/espocrm/security/advisories/GHSA-3ph3-jcfx-fq53",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-32791",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-16T22:15:14.943",
"lastModified": "2025-04-16T22:15:14.943",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Backstage Scaffolder plugin houses types and utilities for building scaffolder-related modules. A vulnerability in the Backstage permission plugin backend allows callers to extract some information about the conditional decisions returned by the permission policy installed in the permission backend. If the permission system is not in use or if the installed permission policy does not use conditional decisions, there is no impact. This issue has been patched in version 0.6.0 of the permissions backend. A workaround includes having administrators of the permission policies ensure that they are crafted in such a way that conditional decisions do not contain any sensitive information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-213"
}
]
}
],
"references": [
{
"url": "https://github.com/backstage/backstage/security/advisories/GHSA-f8j4-p5cr-p777",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-43703",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-16T22:15:15.083",
"lastModified": "2025-04-16T22:15:15.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Ankitects Anki through 25.02. A crafted shared deck can result in attacker-controlled access to the internal API (even though the attacker has no knowledge of an API key) through approaches such as scripts or the SRC attribute of an IMG element. NOTE: this issue exists because of an incomplete fix for CVE-2024-32484."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-830"
}
]
}
],
"references": [
{
"url": "https://github.com/ankitects/anki/pull/3925",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ankitects/anki/pull/3925/commits/24bca15fd3d9dc386916509eb2d4862d1184e709",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43704",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-16T23:15:45.770",
"lastModified": "2025-04-16T23:15:45.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Arctera/Veritas Data Insight before 7.1.2 can send cleartext credentials when configured to use HTTP Basic Authentication to a Dell Isilon OneFS server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"references": [
{
"url": "https://www.veritas.com/support/en_US/security/ARC25-006",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-16T22:00:19.809240+00:00
2025-04-16T23:55:19.741186+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-16T21:15:48.873000+00:00
2025-04-16T23:15:45.770000+00:00
```
### Last Data Feed Release
@ -33,68 +33,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
290454
290476
```
### CVEs added in the last Commit
Recently added CVEs: `24`
Recently added CVEs: `22`
- [CVE-2024-55371](CVE-2024/CVE-2024-553xx/CVE-2024-55371.json) (`2025-04-16T21:15:45.790`)
- [CVE-2024-55372](CVE-2024/CVE-2024-553xx/CVE-2024-55372.json) (`2025-04-16T21:15:45.897`)
- [CVE-2025-26153](CVE-2025/CVE-2025-261xx/CVE-2025-26153.json) (`2025-04-16T21:15:46.770`)
- [CVE-2025-28072](CVE-2025/CVE-2025-280xx/CVE-2025-28072.json) (`2025-04-16T21:15:46.883`)
- [CVE-2025-29648](CVE-2025/CVE-2025-296xx/CVE-2025-29648.json) (`2025-04-16T20:15:17.460`)
- [CVE-2025-29649](CVE-2025/CVE-2025-296xx/CVE-2025-29649.json) (`2025-04-16T20:15:17.563`)
- [CVE-2025-29650](CVE-2025/CVE-2025-296xx/CVE-2025-29650.json) (`2025-04-16T20:15:17.663`)
- [CVE-2025-29651](CVE-2025/CVE-2025-296xx/CVE-2025-29651.json) (`2025-04-16T20:15:17.760`)
- [CVE-2025-29652](CVE-2025/CVE-2025-296xx/CVE-2025-29652.json) (`2025-04-16T20:15:17.860`)
- [CVE-2025-29653](CVE-2025/CVE-2025-296xx/CVE-2025-29653.json) (`2025-04-16T20:15:17.963`)
- [CVE-2025-29708](CVE-2025/CVE-2025-297xx/CVE-2025-29708.json) (`2025-04-16T21:15:47.460`)
- [CVE-2025-29709](CVE-2025/CVE-2025-297xx/CVE-2025-29709.json) (`2025-04-16T21:15:47.570`)
- [CVE-2025-29710](CVE-2025/CVE-2025-297xx/CVE-2025-29710.json) (`2025-04-16T21:15:47.673`)
- [CVE-2025-32817](CVE-2025/CVE-2025-328xx/CVE-2025-32817.json) (`2025-04-16T20:15:19.077`)
- [CVE-2025-3619](CVE-2025/CVE-2025-36xx/CVE-2025-3619.json) (`2025-04-16T21:15:47.920`)
- [CVE-2025-3620](CVE-2025/CVE-2025-36xx/CVE-2025-3620.json) (`2025-04-16T21:15:48.027`)
- [CVE-2025-3723](CVE-2025/CVE-2025-37xx/CVE-2025-3723.json) (`2025-04-16T20:15:19.777`)
- [CVE-2025-3724](CVE-2025/CVE-2025-37xx/CVE-2025-3724.json) (`2025-04-16T20:15:19.960`)
- [CVE-2025-3725](CVE-2025/CVE-2025-37xx/CVE-2025-3725.json) (`2025-04-16T20:15:20.123`)
- [CVE-2025-3726](CVE-2025/CVE-2025-37xx/CVE-2025-3726.json) (`2025-04-16T20:15:20.283`)
- [CVE-2025-3727](CVE-2025/CVE-2025-37xx/CVE-2025-3727.json) (`2025-04-16T21:15:48.203`)
- [CVE-2025-3728](CVE-2025/CVE-2025-37xx/CVE-2025-3728.json) (`2025-04-16T21:15:48.363`)
- [CVE-2025-3729](CVE-2025/CVE-2025-37xx/CVE-2025-3729.json) (`2025-04-16T21:15:48.537`)
- [CVE-2025-3730](CVE-2025/CVE-2025-37xx/CVE-2025-3730.json) (`2025-04-16T21:15:48.700`)
- [CVE-2025-0756](CVE-2025/CVE-2025-07xx/CVE-2025-0756.json) (`2025-04-16T23:15:44.400`)
- [CVE-2025-0757](CVE-2025/CVE-2025-07xx/CVE-2025-0757.json) (`2025-04-16T23:15:44.530`)
- [CVE-2025-0758](CVE-2025/CVE-2025-07xx/CVE-2025-0758.json) (`2025-04-16T23:15:44.647`)
- [CVE-2025-1566](CVE-2025/CVE-2025-15xx/CVE-2025-1566.json) (`2025-04-16T23:15:44.767`)
- [CVE-2025-1568](CVE-2025/CVE-2025-15xx/CVE-2025-1568.json) (`2025-04-16T23:15:44.853`)
- [CVE-2025-1704](CVE-2025/CVE-2025-17xx/CVE-2025-1704.json) (`2025-04-16T23:15:44.937`)
- [CVE-2025-2073](CVE-2025/CVE-2025-20xx/CVE-2025-2073.json) (`2025-04-16T23:15:45.610`)
- [CVE-2025-2400](CVE-2025/CVE-2025-24xx/CVE-2025-2400.json) (`2025-04-16T23:15:45.697`)
- [CVE-2025-24907](CVE-2025/CVE-2025-249xx/CVE-2025-24907.json) (`2025-04-16T23:15:45.027`)
- [CVE-2025-24908](CVE-2025/CVE-2025-249xx/CVE-2025-24908.json) (`2025-04-16T23:15:45.147`)
- [CVE-2025-24909](CVE-2025/CVE-2025-249xx/CVE-2025-24909.json) (`2025-04-16T23:15:45.263`)
- [CVE-2025-24910](CVE-2025/CVE-2025-249xx/CVE-2025-24910.json) (`2025-04-16T23:15:45.373`)
- [CVE-2025-24911](CVE-2025/CVE-2025-249xx/CVE-2025-24911.json) (`2025-04-16T23:15:45.490`)
- [CVE-2025-25230](CVE-2025/CVE-2025-252xx/CVE-2025-25230.json) (`2025-04-16T22:15:14.073`)
- [CVE-2025-31478](CVE-2025/CVE-2025-314xx/CVE-2025-31478.json) (`2025-04-16T22:15:14.233`)
- [CVE-2025-32433](CVE-2025/CVE-2025-324xx/CVE-2025-32433.json) (`2025-04-16T22:15:14.373`)
- [CVE-2025-32783](CVE-2025/CVE-2025-327xx/CVE-2025-32783.json) (`2025-04-16T22:15:14.523`)
- [CVE-2025-32787](CVE-2025/CVE-2025-327xx/CVE-2025-32787.json) (`2025-04-16T22:15:14.667`)
- [CVE-2025-32789](CVE-2025/CVE-2025-327xx/CVE-2025-32789.json) (`2025-04-16T22:15:14.800`)
- [CVE-2025-32791](CVE-2025/CVE-2025-327xx/CVE-2025-32791.json) (`2025-04-16T22:15:14.943`)
- [CVE-2025-43703](CVE-2025/CVE-2025-437xx/CVE-2025-43703.json) (`2025-04-16T22:15:15.083`)
- [CVE-2025-43704](CVE-2025/CVE-2025-437xx/CVE-2025-43704.json) (`2025-04-16T23:15:45.770`)
### CVEs modified in the last Commit
Recently modified CVEs: `30`
Recently modified CVEs: `1`
- [CVE-2025-21578](CVE-2025/CVE-2025-215xx/CVE-2025-21578.json) (`2025-04-16T21:15:46.080`)
- [CVE-2025-21579](CVE-2025/CVE-2025-215xx/CVE-2025-21579.json) (`2025-04-16T21:15:46.193`)
- [CVE-2025-21580](CVE-2025/CVE-2025-215xx/CVE-2025-21580.json) (`2025-04-16T21:15:46.303`)
- [CVE-2025-21581](CVE-2025/CVE-2025-215xx/CVE-2025-21581.json) (`2025-04-16T21:15:46.413`)
- [CVE-2025-21582](CVE-2025/CVE-2025-215xx/CVE-2025-21582.json) (`2025-04-16T21:15:46.527`)
- [CVE-2025-21584](CVE-2025/CVE-2025-215xx/CVE-2025-21584.json) (`2025-04-16T20:15:16.947`)
- [CVE-2025-21585](CVE-2025/CVE-2025-215xx/CVE-2025-21585.json) (`2025-04-16T20:15:17.057`)
- [CVE-2025-22872](CVE-2025/CVE-2025-228xx/CVE-2025-22872.json) (`2025-04-16T21:15:46.640`)
- [CVE-2025-24421](CVE-2025/CVE-2025-244xx/CVE-2025-24421.json) (`2025-04-16T20:15:17.170`)
- [CVE-2025-24427](CVE-2025/CVE-2025-244xx/CVE-2025-24427.json) (`2025-04-16T20:15:17.313`)
- [CVE-2025-30682](CVE-2025/CVE-2025-306xx/CVE-2025-30682.json) (`2025-04-16T20:15:18.057`)
- [CVE-2025-30694](CVE-2025/CVE-2025-306xx/CVE-2025-30694.json) (`2025-04-16T20:15:18.170`)
- [CVE-2025-30695](CVE-2025/CVE-2025-306xx/CVE-2025-30695.json) (`2025-04-16T20:15:18.283`)
- [CVE-2025-30697](CVE-2025/CVE-2025-306xx/CVE-2025-30697.json) (`2025-04-16T20:15:18.393`)
- [CVE-2025-30699](CVE-2025/CVE-2025-306xx/CVE-2025-30699.json) (`2025-04-16T20:15:18.507`)
- [CVE-2025-30700](CVE-2025/CVE-2025-307xx/CVE-2025-30700.json) (`2025-04-16T20:15:18.620`)
- [CVE-2025-30707](CVE-2025/CVE-2025-307xx/CVE-2025-30707.json) (`2025-04-16T20:15:18.743`)
- [CVE-2025-30709](CVE-2025/CVE-2025-307xx/CVE-2025-30709.json) (`2025-04-16T20:15:18.853`)
- [CVE-2025-30710](CVE-2025/CVE-2025-307xx/CVE-2025-30710.json) (`2025-04-16T20:15:18.967`)
- [CVE-2025-3679](CVE-2025/CVE-2025-36xx/CVE-2025-3679.json) (`2025-04-16T20:15:19.250`)
- [CVE-2025-3680](CVE-2025/CVE-2025-36xx/CVE-2025-3680.json) (`2025-04-16T20:15:19.350`)
- [CVE-2025-3681](CVE-2025/CVE-2025-36xx/CVE-2025-3681.json) (`2025-04-16T20:15:19.460`)
- [CVE-2025-3682](CVE-2025/CVE-2025-36xx/CVE-2025-3682.json) (`2025-04-16T20:15:19.570`)
- [CVE-2025-3683](CVE-2025/CVE-2025-36xx/CVE-2025-3683.json) (`2025-04-16T20:15:19.670`)
- [CVE-2025-3733](CVE-2025/CVE-2025-37xx/CVE-2025-3733.json) (`2025-04-16T21:15:48.873`)
- [CVE-2021-21353](CVE-2021/CVE-2021-213xx/CVE-2021-21353.json) (`2025-04-16T23:15:44.197`)
## Download and Usage

View File

@ -167938,7 +167938,7 @@ CVE-2021-2135,0,0,7abf799ace0e002ab446f4ffc90bb93e36260b42bd780bd6a3cd5d6fc4f881
CVE-2021-21350,0,0,2d752306279e47f018b7b7456b20a9159b8fef278e22b10b422aa6508fb277bd,2024-11-21T05:48:05.500000
CVE-2021-21351,0,0,cca6f3591b36a4a91511361a99fef683a76ebac410b607a5bd73bbeda38ba55c,2024-11-21T05:48:05.683000
CVE-2021-21352,0,0,d897e99eed94a134ed818d0dfb2b60db2d1cd351c05aaae51c7fc380ba195ca2,2024-11-21T05:48:05.900000
CVE-2021-21353,0,0,0e6837eff702473fe08f80985ac9027232740af114a21122aa89a27c5222cbe2,2024-11-21T05:48:11.043000
CVE-2021-21353,0,1,1e2ae93aee333dd878492c0b5d123533e3af61f4c0a6cff1a3c5dfecc2c75dc9,2025-04-16T23:15:44.197000
CVE-2021-21354,0,0,f993fd5b853f008cce79671cdaa2a0b6524c7cb7428ac2f8157119da3a54f691,2024-11-21T05:48:11.173000
CVE-2021-21355,0,0,766714b5a85de61a8624916bf3317120f0bd177745e800c46ab1f6314f11cfb6,2024-11-21T05:48:11.300000
CVE-2021-21357,0,0,cfde189c634372a6f9c54d0222eaf04097982502302c0f7454f68d1116b098ba,2024-11-21T05:48:11.420000
@ -211378,7 +211378,7 @@ CVE-2022-46532,0,0,432e2fb1ac9231e3900f9510862b24af15ae515bd54591843ed70bfaf1950
CVE-2022-46533,0,0,8259a0c1ab3ecd9953d24addef698c0ca14bb7528598e2c54b5d0a9b00dabe1c,2025-04-16T18:15:59.713000
CVE-2022-46534,0,0,a37476b1e6f06d14f368b3fc9ddc52cb95b0509dedbd61b6254912927b0057d6,2025-04-16T18:15:59.920000
CVE-2022-46535,0,0,c76309a3efb3efd5614d89e6b487a45aa8e68a24c50e5069b532281cf9b9227f,2025-04-16T18:16:00.133000
CVE-2022-46536,0,1,b556198d86819cc2bec371c26c7a2ca6d052dbf876dbdcacad7e4eed2e04888a,2025-04-16T20:15:16.333000
CVE-2022-46536,0,0,b556198d86819cc2bec371c26c7a2ca6d052dbf876dbdcacad7e4eed2e04888a,2025-04-16T20:15:16.333000
CVE-2022-46537,0,0,013f85ed6bb69b0029944b116199f9a8482e23f09916132b7a8cd2c7df28d85f,2025-04-16T19:15:48.727000
CVE-2022-46538,0,0,36652f5ef9c355e7316e9b4baa42eeaf57af30487e172ad8a6aef006d837e7f1,2025-04-16T19:15:48.897000
CVE-2022-46539,0,0,7bd0d189716cc6a288447f1ac7d27e593a51000734a97e9ce222348df64dca77,2025-04-16T19:15:49.060000
@ -264731,10 +264731,10 @@ CVE-2024-4005,0,0,10ce0801262283a3acf259593f5122037af4b3f2afe41d97e0d5130b74a0b3
CVE-2024-40051,0,0,96ab2490faf9bea7ad7fee897981a553b31642380963c6ce4281331d73ca69b1,2024-11-21T09:30:54.030000
CVE-2024-4006,0,0,46335001e821792447cd234ad2269b9ef6e390364b1771cf570ddd60ee4264a5,2024-12-12T17:10:26.743000
CVE-2024-40060,0,0,b3cb7a9288615fb07001800266f7abee43787412ebc5c9317e72dcb8a61aa5b3,2024-11-21T09:30:54.260000
CVE-2024-40068,0,1,cbad6e65e7e84cf1a55ffb7fafdd118a328d0ef7e468aebf956e79c0738fba3f,2025-04-16T21:15:44.650000
CVE-2024-40068,0,0,cbad6e65e7e84cf1a55ffb7fafdd118a328d0ef7e468aebf956e79c0738fba3f,2025-04-16T21:15:44.650000
CVE-2024-40069,0,0,4d4b8c6a2f5f96f0b37c4a56d683d18e89f62558ef2d1c08df758ed0b00fc247,2025-04-16T17:15:48.743000
CVE-2024-4007,0,0,3dd9d5c3a9450c96ea7d10f2bffa2679fd00a403615d465b187f095d51be54f6,2024-11-21T09:42:01.227000
CVE-2024-40070,0,1,09992ee1a07721f0f0021dadbbee2f2783f08833bce7da18d07c6b519df78a8b,2025-04-16T21:15:45.217000
CVE-2024-40070,0,0,09992ee1a07721f0f0021dadbbee2f2783f08833bce7da18d07c6b519df78a8b,2025-04-16T21:15:45.217000
CVE-2024-40071,0,0,06f6058bf63a114e512ac64f5c17a3c7972a90e514728670ddc9103275b0a94f,2025-04-16T17:15:48.957000
CVE-2024-40072,0,0,547d27cfdcf73bc395fc3d20ea203da147c8ed111ec3e549f9fec5bff422e11d,2025-04-16T17:15:49.063000
CVE-2024-40073,0,0,d4ef2dc78d57409da30467abb2994b8710871ceac838e3f8ece14dd70977ebd3,2025-04-16T17:15:49.170000
@ -274521,8 +274521,8 @@ CVE-2024-53296,0,0,be682d3eb2a02cb859d07bb38fd2cdf79c5c9c446624f27b1fefa1f7d7732
CVE-2024-53299,0,0,2311d06f0f8179bedcf518ce1bde420954fcc87b5db6c467bb518cf92e75888f,2025-02-04T19:15:31.877000
CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000
CVE-2024-53303,0,0,70a56d8ec2b4b4d3548967b98471444d054ad16016e0845cf1ac32051d07a296,2025-04-16T18:16:03.417000
CVE-2024-53304,0,1,2318bd92e15e2309c0bc84c12f501093b2199420a9844e4905b82191a8dd877a,2025-04-16T21:15:45.497000
CVE-2024-53305,0,1,b764fd9aa197b516e0394c3a3a3a9ee4af1cfff7c69a2a0fea095f72e6f16c4c,2025-04-16T21:15:45.643000
CVE-2024-53304,0,0,2318bd92e15e2309c0bc84c12f501093b2199420a9844e4905b82191a8dd877a,2025-04-16T21:15:45.497000
CVE-2024-53305,0,0,b764fd9aa197b516e0394c3a3a3a9ee4af1cfff7c69a2a0fea095f72e6f16c4c,2025-04-16T21:15:45.643000
CVE-2024-53307,0,0,137df246312787bed916a2ce1770dc53fefd470e50062bf21518e03aff4776e9,2025-03-10T18:15:29.373000
CVE-2024-53309,0,0,ae139265b7a1692dfab5ae0e494b54a85093b1cd41c51bb0baefd5e1bf71e5bf,2025-03-17T19:15:23.447000
CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000
@ -275724,8 +275724,8 @@ CVE-2024-55355,0,0,2bb36a027cfc17a18c27f2dfa7ccd1dd7e44d92fe7cc55df027cf0c874369
CVE-2024-55356,0,0,24a1f90c25942035af99f5d3d7ecc4294dd5cf67c67caa2d1d5b1544ce44efca,2025-01-08T01:15:07.370000
CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c0e,2024-11-21T09:47:53.307000
CVE-2024-5537,0,0,dc964262ed4087ff313c4be3be100753a858d893c6319a531383572e591004b1,2024-05-30T17:15:34.583000
CVE-2024-55371,1,1,82d309900eb7e9fe5761e0756844ce79b2aa2451b6aeadb49306bc093f1286e8,2025-04-16T21:15:45.790000
CVE-2024-55372,1,1,7d37afe313187fc2bd94eccc6b6bee9da2384213efd9c427f98958b2e41c4376,2025-04-16T21:15:45.897000
CVE-2024-55371,0,0,82d309900eb7e9fe5761e0756844ce79b2aa2451b6aeadb49306bc093f1286e8,2025-04-16T21:15:45.790000
CVE-2024-55372,0,0,7d37afe313187fc2bd94eccc6b6bee9da2384213efd9c427f98958b2e41c4376,2025-04-16T21:15:45.897000
CVE-2024-5538,0,0,349018b8a831720930f224f86428ace57b32dfb3177832784fb8b5e53a9e5993,2024-05-31T11:15:09.923000
CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402acd89,2025-01-07T16:15:36.480000
CVE-2024-55408,0,0,8039c7c557373745154d588f7a6e9302bbcff3813cc276ec09ae1bbee5edf7a3,2025-02-11T01:15:09.410000
@ -281792,6 +281792,9 @@ CVE-2025-0752,0,0,de749aab58e2326cecf2e69cd47cb06af87bcedce5e0f5e8b795ca284455a6
CVE-2025-0753,0,0,c31e8dbd9d781b37db4d790b1206c27db098e661945670b7848cba0c8afd301c,2025-02-28T22:22:35.957000
CVE-2025-0754,0,0,01e22cbc27c23b2a20fc22b4b38925f42f70aba0e3cf26d239fd3f71faae49ca,2025-01-28T10:15:09.697000
CVE-2025-0755,0,0,a756693274b211f936030a1b123d06fc9f09b8085a54bd20383a0ef5f5b87d9f,2025-03-18T09:15:11.487000
CVE-2025-0756,1,1,b19b4ad9d0999c3ee0d17438ec3beaaf755e4c5eaecf851e90a5d1f4d6b3fa4b,2025-04-16T23:15:44.400000
CVE-2025-0757,1,1,1333d61ae224eaaf8e897706699c441f1693dbdc5d606c5b6188a854512eae13,2025-04-16T23:15:44.530000
CVE-2025-0758,1,1,bebe0b9a3b3c746d022bfd86d3c6e96f9d0fd9a767f835083182a59be9f52ff0,2025-04-16T23:15:44.647000
CVE-2025-0759,0,0,09d991e76c287398c2be16cd3769fbff0d891df9fa18a6f52ed6c200cb01eaf9,2025-02-27T15:15:40.603000
CVE-2025-0760,0,0,00193022d9afa63eab6ac5d740a3221452c3267e0ba03667c14e8712364e5b04,2025-02-26T00:15:10.890000
CVE-2025-0762,0,0,845f3b7f9b4ef02b7a17ddce8a2e2034554a76aa91491302fad198d6d89d5ee0,2025-01-29T15:15:17.687000
@ -282346,6 +282349,8 @@ CVE-2025-1559,0,0,709a243835f3c6ce0779a28711cc25be41f0a8c4f301b124730fe9903567f9
CVE-2025-1560,0,0,5806fdd5d9f8e8a09704d33fd8caadc121e4fbb048f372fad8d43065a1e4a103,2025-03-06T16:15:42.753000
CVE-2025-1561,0,0,c0dd475a880b302ad58d5da65215c03a4b2329b9f43fd50459164bc801594e00,2025-03-13T05:15:27.890000
CVE-2025-1564,0,0,9d62e5431da133f133499b29bcb96aa13e41c1b673396891299a0b15aab9c828,2025-03-01T08:15:34.007000
CVE-2025-1566,1,1,131deec3f77b04f991ebb90ff9acb0b1a12b81048eced026f09c31fc85d18cc5,2025-04-16T23:15:44.767000
CVE-2025-1568,1,1,95c2aba9b91258ec79c0076f946e6906f21b07bb4f34ec498c00ad4c163baa4a,2025-04-16T23:15:44.853000
CVE-2025-1570,0,0,e2c8a697fd328cfac1cb14bcdda0501641702037da6bc6d3e9d43d7d6e474d73,2025-03-06T15:35:59.507000
CVE-2025-1571,0,0,4a5ce435e807c5b239e456baa952536949a7ac8152f73e9932b99f88f9a0505f,2025-03-07T17:29:48.903000
CVE-2025-1572,0,0,d28a5728a56447e48ca8ae17f33703e0f0c8651ed23960a40cc6c85b9a58b7d9,2025-03-06T17:52:25.813000
@ -282451,6 +282456,7 @@ CVE-2025-1695,0,0,ebd84bb280e3b0fb2974535e719ca217464c50c1c49a0c471a25d6dd4b8516
CVE-2025-1696,0,0,a4ebe2093d6db003a81772653e3b8096038d292b86e17d8021513423bef33f12,2025-03-06T12:15:36.293000
CVE-2025-1702,0,0,8350c512bb427a18e75fe369e7c514680d305e4b55cc00b262ae74877fe4e9d9,2025-03-05T12:15:35.420000
CVE-2025-1703,0,0,50c927778c00387d209f1db495acb3fcdf772388903cfdf917baab839124a719,2025-03-27T16:45:27.850000
CVE-2025-1704,1,1,c9af1f14e1b0017d573058ecb6c2d538a9b3b02de19ff2ede03e92e5eeb4a9b6,2025-04-16T23:15:44.937000
CVE-2025-1705,0,0,269e355c7cfca537a526c588669165c0e79ec506469175122c59352a58fa4621,2025-03-28T18:11:40.180000
CVE-2025-1707,0,0,eb806af042366277371dce5ba4e4d20eb3821597874c2eb4040b48171f171ef9,2025-03-11T22:15:12.583000
CVE-2025-1714,0,0,6e67e5fe1ad7d1f8ea60e413f9fa7e7e2f63bd8d4c4369040436660c144fa80c,2025-03-07T05:15:16.233000
@ -282857,6 +282863,7 @@ CVE-2025-20664,0,0,4219106895903f3d40c45e3fe22a99bb379c7467ce7ddab134c6f372463f3
CVE-2025-2067,0,0,e336b7e791e3fd3cb322ecbc1c5f69ca2b6e5c18fb1ce058eaa6d863ecf3dcd2,2025-03-07T05:15:17.527000
CVE-2025-2071,0,0,f72741a6a8cd10ef9b626183eff7ab8b6e66837ba6759a6a57e284a984d113e1,2025-04-01T20:26:30.593000
CVE-2025-2072,0,0,8e644488e83c18f58cc5036e9fa9ebc749bbf6017963c3bc2cbe7baae1385ee2,2025-04-01T20:26:30.593000
CVE-2025-2073,1,1,f733f36fd03c449e68412edf747220800eb0e3fcf083c2c2f10adab9b8a4f9ec,2025-04-16T23:15:45.610000
CVE-2025-2074,0,0,ca58bf592b5066d06227c815801f5f95341e4e9e4e43bd9476138e9763d951e8,2025-03-28T18:11:40.180000
CVE-2025-2075,0,0,ab55a51247ee2850d4e2152336537ca54db9312a277429beb604e88703e48472,2025-04-07T14:18:15.560000
CVE-2025-2076,0,0,97b36f1e6f07a313a2c81becc36dc64919123b61205ecb45483897067337e6f1,2025-04-07T20:51:08.497000
@ -283384,14 +283391,14 @@ CVE-2025-21574,0,0,a9e09396da256a71c873f1d7603036dea8ca5b199b826133353b177c18c3b
CVE-2025-21575,0,0,b5cea0349cd74a802b56d0c43ed156083e814e7611b9efd28a8942850f7d3df3,2025-04-16T15:15:54.663000
CVE-2025-21576,0,0,8469978b0c3364fc3a7da135c14871569eb91d65a303c0738bfb0493932f55fc,2025-04-16T15:15:54.790000
CVE-2025-21577,0,0,12696179ed4cb03d433f4d52d6702fbc03d5adc396c5a5d666da65646043693d,2025-04-16T15:15:54.913000
CVE-2025-21578,0,1,cc55bc7568035bc69e2870069584c89382dcaff2bc5a0d10d727bca3cce74819,2025-04-16T21:15:46.080000
CVE-2025-21579,0,1,d3388049f250b9ffa15b3f3059f6fe1844bad7dae13d6039e83ed04f10fcc7d7,2025-04-16T21:15:46.193000
CVE-2025-21580,0,1,56dfa4e85b58b4ee478c33fb7a0d1d0c920d73518bf1e631d074de98000794f0,2025-04-16T21:15:46.303000
CVE-2025-21581,0,1,9c149b66e3275e4f9574a1b5e234f7f21ff0536cfccb7a9b9ff196ddea4a2a36,2025-04-16T21:15:46.413000
CVE-2025-21582,0,1,73b486e07da32152d0796ff19ab6f451b6bd6889bb5d27f60ead23e8e5584ce9,2025-04-16T21:15:46.527000
CVE-2025-21578,0,0,cc55bc7568035bc69e2870069584c89382dcaff2bc5a0d10d727bca3cce74819,2025-04-16T21:15:46.080000
CVE-2025-21579,0,0,d3388049f250b9ffa15b3f3059f6fe1844bad7dae13d6039e83ed04f10fcc7d7,2025-04-16T21:15:46.193000
CVE-2025-21580,0,0,56dfa4e85b58b4ee478c33fb7a0d1d0c920d73518bf1e631d074de98000794f0,2025-04-16T21:15:46.303000
CVE-2025-21581,0,0,9c149b66e3275e4f9574a1b5e234f7f21ff0536cfccb7a9b9ff196ddea4a2a36,2025-04-16T21:15:46.413000
CVE-2025-21582,0,0,73b486e07da32152d0796ff19ab6f451b6bd6889bb5d27f60ead23e8e5584ce9,2025-04-16T21:15:46.527000
CVE-2025-21583,0,0,fc5e501e698193a967bccf982877e2bf49fdd82bf5233cb505b16543178cca76,2025-04-16T13:25:59.640000
CVE-2025-21584,0,1,1bb5fd3228da83e15506d762334b7eb6e25eb3738beea4c15962e81bfaf0e2f8,2025-04-16T20:15:16.947000
CVE-2025-21585,0,1,bdb1a1bce2cc87b668ceb99c423d8aad8935f5b10c1d981ae6ae23e79f6c7ba6,2025-04-16T20:15:17.057000
CVE-2025-21584,0,0,1bb5fd3228da83e15506d762334b7eb6e25eb3738beea4c15962e81bfaf0e2f8,2025-04-16T20:15:16.947000
CVE-2025-21585,0,0,bdb1a1bce2cc87b668ceb99c423d8aad8935f5b10c1d981ae6ae23e79f6c7ba6,2025-04-16T20:15:17.057000
CVE-2025-21586,0,0,bc1b0dbbae635786848486bd27d63ee575b048d119ff6891efb83f4a54063275,2025-04-16T16:15:29.603000
CVE-2025-21587,0,0,eedad467194fde544fab5917243d8c2a1c7fd2b88079264f6486607d67044c95,2025-04-16T16:15:29.730000
CVE-2025-21588,0,0,f4b970b6c82c586314a19772bb43ae24f77ca27154b8cc695b2ced30e5d02b28,2025-04-16T16:15:29.840000
@ -284542,7 +284549,7 @@ CVE-2025-22869,0,0,79719125726880f26bc2b13b7ff722f5a8e85ca88bf5332b957a80e592d67
CVE-2025-2287,0,0,8813dfc8049edc90f8c2884aee49dcafb730530912f5261432ad51214abb5088,2025-04-08T18:13:53.347000
CVE-2025-22870,0,0,5e2155600788a6616ffe365d219c4b2615228a685c5d4bcb3d43989a57212eec,2025-03-18T17:15:45.467000
CVE-2025-22871,0,0,5e0c07a56f9d9b1e220de2ed08857b9f0fb1c1919df08a2562023c832dbb7098,2025-04-09T20:02:41.860000
CVE-2025-22872,0,1,a5255faca646b559f4db0dd5178fef5d605c56546ae2d47b8c518b2c5e94f879,2025-04-16T21:15:46.640000
CVE-2025-22872,0,0,a5255faca646b559f4db0dd5178fef5d605c56546ae2d47b8c518b2c5e94f879,2025-04-16T21:15:46.640000
CVE-2025-2288,0,0,ea5cf9eb4e5e7d5beb8e92f7104073ba5d1adc8fc07f8a97145fc23482c0367a,2025-04-08T18:13:53.347000
CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000
CVE-2025-22881,0,0,bac764bb844fd45fc50560c993c0edd1d8ed2c5159276215579d0cda943f98d6,2025-02-26T08:14:25.137000
@ -285428,6 +285435,7 @@ CVE-2025-23995,0,0,fc33427766934e6ec798a3acad36041ca77888d3bd75447ef8556d65238e1
CVE-2025-23996,0,0,044a631ccc7b953428bed6ca4f1e78634642ba7fb893e1284d5301e8ce6e28fa,2025-01-21T18:15:17.503000
CVE-2025-23997,0,0,77e65675aa34b148df76ab43b9568b71cc7208d39621afbe6f65c277717cb0b4,2025-01-21T14:15:13.230000
CVE-2025-23998,0,0,4ced4b8f68a6d09d5a1c825ec6107a84dbbb418c96e80844463996fce823e3ed,2025-01-21T14:15:13.413000
CVE-2025-2400,1,1,cb277ee1e8117318fb6e147a1b2b1e1371201876775172b424ebe4df769d43b5,2025-04-16T23:15:45.697000
CVE-2025-24001,0,0,2c753840ec158b2e8c5040a7ed2631e45b8667250a806707291f782ebc7cf4aa,2025-01-21T14:15:13.600000
CVE-2025-2401,0,0,180afd0114e466b052cbb68cdf002b3c7d20a7d9b28a41a0f1ffe2ed37af9438,2025-03-17T13:15:39.803000
CVE-2025-24010,0,0,755be8be1475b71408bd0286ec94084c98023c6a02427820a8766e3be39154b8,2025-01-20T16:15:28.730000
@ -285728,13 +285736,13 @@ CVE-2025-24418,0,0,0b9e05d200d3572fa40b73de6ce7cb0a74c0ccc71a55a2519fc8f76ce03aa
CVE-2025-24419,0,0,0dff8daac36e461e8338325349b5de4746cdbc5f9cbaad6fc9787efbaaff8022,2025-04-16T17:17:01.200000
CVE-2025-2442,0,0,4190cd9f490d0cbc14aa7b27b97f63f4216090124f0a62ddf28f2664d24ac2c5,2025-04-09T20:02:41.860000
CVE-2025-24420,0,0,b7284458a856bbe258fa5ccb45ddb789ad78b44c296ba6e8a8c672c9a7711993,2025-04-16T17:16:51.277000
CVE-2025-24421,0,1,374ccb79614972a85b750ce079529bcc02ec96f30176bc9fbff45f11a13133b3,2025-04-16T20:15:17.170000
CVE-2025-24421,0,0,374ccb79614972a85b750ce079529bcc02ec96f30176bc9fbff45f11a13133b3,2025-04-16T20:15:17.170000
CVE-2025-24422,0,0,6b8096e72f934f64c5925e489b4e3f03640c514d9fe890dff8b87672bc735ade,2025-04-16T17:16:43.853000
CVE-2025-24423,0,0,bfd9d82bede896d4cb5f22dc83da35beda5e880014994c0510a23aa20fba7396,2025-04-16T17:16:37.320000
CVE-2025-24424,0,0,e55cb3328000bae616509b5a3ca2e3ab08ceda2c9fb430a2bf6e9fa851cfdde3,2025-04-16T17:16:10.380000
CVE-2025-24425,0,0,544e24fb5861c08f50241c0900b75732f7ace8ae9fb499ef3f2243360578a7fd,2025-03-05T18:32:12.530000
CVE-2025-24426,0,0,03bec720441a3a673238f11ac31be6c9efb917575e7a75f14c8f68935f723c76,2025-04-16T17:16:04
CVE-2025-24427,0,1,4de9d57a157e58e4e2aa891bfde852ec31ccca3f06080766557ca7d9ff39d663,2025-04-16T20:15:17.313000
CVE-2025-24427,0,0,4de9d57a157e58e4e2aa891bfde852ec31ccca3f06080766557ca7d9ff39d663,2025-04-16T20:15:17.313000
CVE-2025-24428,0,0,d362fd3d6b3216dc8e7bd86c697cdb90a903d9c76b342cb6299162b6ab48e211,2025-03-03T15:51:40.090000
CVE-2025-24429,0,0,3890fb9af95ea402a42f76d7522e17fb69a860e6735ccd8adf88141b140813e6,2025-04-16T14:27:27.770000
CVE-2025-24430,0,0,2d690f4c808e65333c8d6be4dc029f0fb527153402d8560e01c5c3848f8480f7,2025-04-16T14:25:10.510000
@ -286106,7 +286114,12 @@ CVE-2025-24903,0,0,f94c50d2f0574a93b5b48805712360c1af6392fea087d65c2ed61830aedff
CVE-2025-24904,0,0,922b25d3a9b426b643b71230fe8a3d6600552e09598c6cd6bc1bcb32f760c1d1,2025-02-13T16:16:49.053000
CVE-2025-24905,0,0,a12cf1d4a84b7dfc2fc6ddf401dddb1af801de5f0e459b8125fad6e258d821aa,2025-02-13T19:00:37.593000
CVE-2025-24906,0,0,c4750456c80f4de3a8d1ced568cbceb00ad477041c107087bb6724cafda48816,2025-02-13T18:59:59.940000
CVE-2025-24907,1,1,9e413b69d33bff2ec85f496f439c5e8098d9d4edee10103b2bfdeb1e62457033,2025-04-16T23:15:45.027000
CVE-2025-24908,1,1,bf4977fdee0b84761f61038bf9e67b8ed9ff407b4a6c9a63105e162dec8c6842,2025-04-16T23:15:45.147000
CVE-2025-24909,1,1,83597d5e92615d8f839fa2b1324216a6d4c31a7b2c98f79df25daed836296754,2025-04-16T23:15:45.263000
CVE-2025-2491,0,0,a0733df35b55730cd2b5dbe4143a0c5c885964cd78e8115aea22f767407fa474,2025-03-18T15:16:01.707000
CVE-2025-24910,1,1,aea5315d6f9ea58ab4df3c550695318661f5efb240546e707ff4d04dea9d573d,2025-04-16T23:15:45.373000
CVE-2025-24911,1,1,af0824fa76e4a0ae20e6cfaa00aa9282068832b4deb84412b81b5535baed6d30,2025-04-16T23:15:45.490000
CVE-2025-24912,0,0,d10f05928f11c7a00e2a62c8635f9af5917fec081444b4d22020eb25a54c0654,2025-03-12T05:15:37.430000
CVE-2025-24915,0,0,24c26ca53ef1e2928a50350b0dbd455453bdc6581f1752ca8926cd09252dcb45,2025-03-21T15:15:42.020000
CVE-2025-24920,0,0,f7f8f763bf4982c0df509bbeae99871e92e5c9a0b38af941d8b9c06be0af01ab,2025-03-27T14:10:53.500000
@ -286334,6 +286347,7 @@ CVE-2025-25224,0,0,a4f44e8389415111624e6d3b431cded203f069a8e58de6c5b5f4eb5c08d09
CVE-2025-25225,0,0,50e1db0214d749384eee9692d10836c10107d4550447d640f020938a4553ed14,2025-03-18T17:15:45.920000
CVE-2025-25226,0,0,c1d011e8e7ba6b6c9f469aa960fb7064e4361a6d4416d3477e347671e561cfd3,2025-04-09T15:16:01.923000
CVE-2025-25227,0,0,14dde9d48b40850eb1a2d705436b8ead1fc46d2a4e1905b71e2c6de779c3c0c1,2025-04-08T19:15:47.290000
CVE-2025-25230,1,1,8a2ad333af0aca7a154e89624242b3f795e091cda3ab656868bad784eeea0af0,2025-04-16T22:15:14.073000
CVE-2025-25241,0,0,f70d628c4466ad6abe844cd65a2579f5c9e5af240d0c56eadc1f05ff31a52618,2025-02-18T18:15:34.967000
CVE-2025-25242,0,0,9434714e72888d1a52e5bad48430408baa107619f6e4dcba8f508d71d8cfd58f,2025-03-11T01:15:34.777000
CVE-2025-25243,0,0,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72aa0,2025-02-18T18:15:35.160000
@ -286692,7 +286706,7 @@ CVE-2025-26127,0,0,ff848518068745ae246227c687011816436068efa4d4914700821387766f6
CVE-2025-26136,0,0,2adb34c79a3ec7fe584c4e7725e79c104805fdaa01d3b24e5975e14259ccd144,2025-03-05T17:15:16.017000
CVE-2025-26137,0,0,004205e5376adff96c010e010531e03852f5eb4905a1a3c73ed331cf2f44f325,2025-04-01T20:37:44.117000
CVE-2025-26138,0,0,4c83b447574a31d9857c309d7f5649f5104ee78c2e6617a4327eaace6a44e40b,2025-04-01T20:37:28.490000
CVE-2025-26153,1,1,99e4c74aa7b3148191d29e10b48d2751daf5f248d0cc62d9d1636ff13c76d613,2025-04-16T21:15:46.770000
CVE-2025-26153,0,0,99e4c74aa7b3148191d29e10b48d2751daf5f248d0cc62d9d1636ff13c76d613,2025-04-16T21:15:46.770000
CVE-2025-26156,0,0,962eae3fa0ac2ee7ef9345ac9060a4193d262807409fdde8171c1e14753b4430,2025-04-02T18:49:33.170000
CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000
CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000
@ -287800,7 +287814,7 @@ CVE-2025-2803,0,0,e47ecd50bab8435762f20a0360685d74e0ceaca5cc3e5df3e0509ccc4da5c5
CVE-2025-2804,0,0,05befb6a988325f06e55dd5b0c814f5549862889b3223abfcf82e08eebaa0244,2025-03-28T18:11:40.180000
CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d084,2025-04-11T15:39:52.920000
CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000
CVE-2025-28072,1,1,d19de959c1a426b8392743735e0bc8eb43cb6f87a1dfb27d8c072076f3f51fae,2025-04-16T21:15:46.883000
CVE-2025-28072,0,0,d19de959c1a426b8392743735e0bc8eb43cb6f87a1dfb27d8c072076f3f51fae,2025-04-16T21:15:46.883000
CVE-2025-2808,0,0,2d9ef6fcbe323df90c90b4e91a51bb82e8f5ef9746894b9f5e9c32273a3c6988,2025-04-08T18:13:53.347000
CVE-2025-28087,0,0,1a24fc8fa031815998ab3cec95d83c4ceea417049d18cb4b484e469d0233d5a6,2025-04-07T14:22:33.160000
CVE-2025-28089,0,0,67dcb00b253159ea36147dba2ae48f5f5632d8f7c0e820c0f6cd1525d263b4dd,2025-04-07T14:20:46.543000
@ -288133,23 +288147,23 @@ CVE-2025-2964,0,0,ec69ae3f38e343756ba814c2e5955dca4ab2cdb43321644a6a3ca4d2fda05b
CVE-2025-29640,0,0,10d69d5153affdfdd1cfbbf32b1c82cf02889c3684c0ecfe28cc371bbe51cc15,2025-04-01T20:23:29.113000
CVE-2025-29641,0,0,07728e025c7edec0a6c57cfca48077e7931db6a66e70d6357266b91cead71f8a,2025-04-01T20:23:16.657000
CVE-2025-29647,0,0,b2c68859973ff17d99e38be6964fb50b00d742d76463efee1e3f756976e68d06,2025-04-08T20:15:30.700000
CVE-2025-29648,1,1,3da34d143cb76b9e6cdc7f07c5a45cdfc6673e59bed4a387a91eee3a985ae63f,2025-04-16T21:15:46.993000
CVE-2025-29649,1,1,7ee42729c8da140fc26bbe04aabbcdc7696a5ad9859c7d032fbea5ba895dc252,2025-04-16T21:15:47.147000
CVE-2025-29648,0,0,3da34d143cb76b9e6cdc7f07c5a45cdfc6673e59bed4a387a91eee3a985ae63f,2025-04-16T21:15:46.993000
CVE-2025-29649,0,0,7ee42729c8da140fc26bbe04aabbcdc7696a5ad9859c7d032fbea5ba895dc252,2025-04-16T21:15:47.147000
CVE-2025-2965,0,0,b1d83303c83fa5c453f89d281c2631e556dad3281735af3c32f95354d255295b,2025-04-04T01:15:39.727000
CVE-2025-29650,1,1,12ba4c5d3b709b2e4a7aaf3779615fbf88a7cfa9742f4a27b3b6f2ad14e3f87c,2025-04-16T21:15:47.307000
CVE-2025-29651,1,1,67dc7a89b2f19fb8a612f38cc8faf3aa56e8f01962388e71b22c5d8fd741a29b,2025-04-16T20:15:17.760000
CVE-2025-29652,1,1,27d24f9ef4f73977fc01d99610d4bf3cf156bc77f94e9ebc2b03f3164d7ee36d,2025-04-16T20:15:17.860000
CVE-2025-29653,1,1,b81026b785a38e3f2f8169b6323d723309a175ed17bd463588a943999d00ffb0,2025-04-16T20:15:17.963000
CVE-2025-29650,0,0,12ba4c5d3b709b2e4a7aaf3779615fbf88a7cfa9742f4a27b3b6f2ad14e3f87c,2025-04-16T21:15:47.307000
CVE-2025-29651,0,0,67dc7a89b2f19fb8a612f38cc8faf3aa56e8f01962388e71b22c5d8fd741a29b,2025-04-16T20:15:17.760000
CVE-2025-29652,0,0,27d24f9ef4f73977fc01d99610d4bf3cf156bc77f94e9ebc2b03f3164d7ee36d,2025-04-16T20:15:17.860000
CVE-2025-29653,0,0,b81026b785a38e3f2f8169b6323d723309a175ed17bd463588a943999d00ffb0,2025-04-16T20:15:17.963000
CVE-2025-2966,0,0,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000
CVE-2025-2967,0,0,14b33c1f634d82e0ee8f6eba9d8900eb26f8e5ef6b28fe9846307dc0432895cc,2025-04-04T01:15:39.857000
CVE-2025-2968,0,0,2f5310773b41e32a0609f9013ca63505bab1761feb2b83c508abd214cd1156b1,2025-04-04T01:15:39.930000
CVE-2025-2969,0,0,2c92f9aaf929a695828188a9354c9039b1da27ec28571736050e209bd0423cad,2025-04-04T01:15:40
CVE-2025-2970,0,0,67c007e67877a94fb703f9d730b81129ea1f6387e2e40954ff831fd4807254f0,2025-04-04T01:15:40.067000
CVE-2025-29705,0,0,d50bc7403680eaf9635e360140860dd9bb945ed47cbe680766215a624ae6d64d,2025-04-15T19:16:07.783000
CVE-2025-29708,1,1,1b936c2bef687442f32dab496c57f1d66f2e2d3c0a38db41b624c108c02dde0b,2025-04-16T21:15:47.460000
CVE-2025-29709,1,1,932dae08215d3f213c20e372aa7f6bae05253d357dc51ffe3dc2d9daa73c3892,2025-04-16T21:15:47.570000
CVE-2025-29708,0,0,1b936c2bef687442f32dab496c57f1d66f2e2d3c0a38db41b624c108c02dde0b,2025-04-16T21:15:47.460000
CVE-2025-29709,0,0,932dae08215d3f213c20e372aa7f6bae05253d357dc51ffe3dc2d9daa73c3892,2025-04-16T21:15:47.570000
CVE-2025-2971,0,0,2706995c55a7dbc3fec5708d9b29d92444bde85b5e349db5ecc56094ac7bd4d7,2025-04-07T23:15:43.050000
CVE-2025-29710,1,1,dee2aeeefd0cbcfd27cec824c1f69b3a17aead5c60c2a7ae2f11b184679dbfa4,2025-04-16T21:15:47.673000
CVE-2025-29710,0,0,dee2aeeefd0cbcfd27cec824c1f69b3a17aead5c60c2a7ae2f11b184679dbfa4,2025-04-16T21:15:47.673000
CVE-2025-29719,0,0,8e7057a22540e0bc6e719ee80087d1e3317b2b2e7c0e51bfcdcdafe3f5440328,2025-04-10T14:27:50.553000
CVE-2025-2972,0,0,9bd90eb57737eba9afab46fcd8061576d92129d2495ebdef7228d08af4388952,2025-04-04T01:15:40.127000
CVE-2025-29720,0,0,5ec932914a7d81da0b10599d75c12821d0c2e8eb7f364340baae17593b19712a,2025-04-15T18:39:27.967000
@ -288665,7 +288679,7 @@ CVE-2025-30676,0,0,708f03a86f4c884ecda3f7ec1e5552de291778e3e25b801a6e5af963ebcc8
CVE-2025-30677,0,0,ac691303aa13f8ca9aabebde82f77f60d124e3f5ca096d5288780405b88472c8,2025-04-09T20:02:41.860000
CVE-2025-3068,0,0,de66f3afaa7fd4a67fa9d3ab57331fb0ab9491ba6c44d88f9dc6104a16396311,2025-04-07T13:30:02.277000
CVE-2025-30681,0,0,4df1a0ccddde5b4d4b0622c7fe532b814342d38bcc00203e31b1f646e89182ca,2025-04-16T15:16:10.170000
CVE-2025-30682,0,1,fe35e0394f10a4326a81f1b241655702139d45ca0593a3de705be42a73d1d5b9,2025-04-16T20:15:18.057000
CVE-2025-30682,0,0,fe35e0394f10a4326a81f1b241655702139d45ca0593a3de705be42a73d1d5b9,2025-04-16T20:15:18.057000
CVE-2025-30683,0,0,dfb46681e1e59b565bc83c636f71466021abac81c31b453250c455b92d603736,2025-04-16T19:15:54.427000
CVE-2025-30684,0,0,15008d8313d4203976158462220def7dc846c59d125fdc600532d4a20c98fe92,2025-04-16T18:16:05.883000
CVE-2025-30685,0,0,b11ad9fe469b2e477ef6f442fb9ad983947cfbc2eea7daf5b8990f68288fdb15,2025-04-16T16:15:32.263000
@ -288678,25 +288692,25 @@ CVE-2025-30690,0,0,917158df2f0cd108363ac9d8cc3bade204129e43a71903793648e3489f357
CVE-2025-30691,0,0,dda84764d10c0d6f81fbaef02ece4df64b6294b34df1ae31a78a50c2c099b84f,2025-04-16T16:15:32.937000
CVE-2025-30692,0,0,3161b1f45cecc0a3afa599c1e2826c52f9889c53e2e1e051bcda24c2c2b8b347,2025-04-16T16:15:33.047000
CVE-2025-30693,0,0,75f314d64704b70bf300b7ed3580bcd4d63da3c4e153b93bab0afaa3cf1d9920,2025-04-16T16:15:33.170000
CVE-2025-30694,0,1,3270f0d1f242541086999443784f1cd2ae7e6e36bd12ded2ce33f68713f1412d,2025-04-16T20:15:18.170000
CVE-2025-30695,0,1,2259babac90148ca0f8ef98c77c3d74f76871fb763868abadc6c539961445241,2025-04-16T20:15:18.283000
CVE-2025-30694,0,0,3270f0d1f242541086999443784f1cd2ae7e6e36bd12ded2ce33f68713f1412d,2025-04-16T20:15:18.170000
CVE-2025-30695,0,0,2259babac90148ca0f8ef98c77c3d74f76871fb763868abadc6c539961445241,2025-04-16T20:15:18.283000
CVE-2025-30696,0,0,2f823080fbe70fb899d8f476b24ec728b0cc68b2de13d0cea5269a793f1e80e3,2025-04-16T16:15:33.283000
CVE-2025-30697,0,1,86ddb528e2c1a9a055b5089342128d39381f5a1c9cc6693f91ae347d629e6342,2025-04-16T20:15:18.393000
CVE-2025-30697,0,0,86ddb528e2c1a9a055b5089342128d39381f5a1c9cc6693f91ae347d629e6342,2025-04-16T20:15:18.393000
CVE-2025-30698,0,0,2e0b4ef6a51249a61f937633b8ef9af318b928a4049f1fa2c2faad62ebe3457e,2025-04-16T16:15:33.397000
CVE-2025-30699,0,1,1b3bb43705540e565eb0b82cb732e4633d529358091e103d547ad7fe3f656513,2025-04-16T20:15:18.507000
CVE-2025-30699,0,0,1b3bb43705540e565eb0b82cb732e4633d529358091e103d547ad7fe3f656513,2025-04-16T20:15:18.507000
CVE-2025-3070,0,0,389eca2715a25e0502dfee20fa689abffda48144e371016d21a2980b0deeba8c,2025-04-07T13:28:06.423000
CVE-2025-30700,0,1,6df59879402b5165b4d6b565ee0d1d6d0889572749e13acadb2451d22731ed25,2025-04-16T20:15:18.620000
CVE-2025-30700,0,0,6df59879402b5165b4d6b565ee0d1d6d0889572749e13acadb2451d22731ed25,2025-04-16T20:15:18.620000
CVE-2025-30701,0,0,9a22cceb291a84409cb4437a523f205f65c6a58cdcb79e514955aa3eee0cd30c,2025-04-16T15:16:10.393000
CVE-2025-30702,0,0,5da8d5ca5c5c79a758df420f71d9d826caea9751a114f91b5b9edc6917be1cf2,2025-04-16T13:25:59.640000
CVE-2025-30703,0,0,ac760d0ffb27e2362ca52455f2f6be4e2b15aaabab9becab9ba5568298facdcc,2025-04-16T15:16:10.507000
CVE-2025-30704,0,0,3dadef73d41fba2c7391c893a130d13093bdcfbdccc65f3e41b2e688cc13531c,2025-04-16T15:16:10.613000
CVE-2025-30705,0,0,fce181c4d0f09d4cca66173f8d721e43a514d20bb8ffb16ff1e55ad80a51f057,2025-04-16T14:15:24.910000
CVE-2025-30706,0,0,e378eba725d84697ff58c04d29694e6a01c8a9a5f40009abeeb03db5c718db01,2025-04-16T14:15:25.037000
CVE-2025-30707,0,1,6a914893ca34bf2dabf74d3bce729b9adf8170abd5fd1a999e2256dd0171cc7a,2025-04-16T20:15:18.743000
CVE-2025-30707,0,0,6a914893ca34bf2dabf74d3bce729b9adf8170abd5fd1a999e2256dd0171cc7a,2025-04-16T20:15:18.743000
CVE-2025-30708,0,0,79986e2b81e871fbc68eefc7bab3eb8146dedadebe143d92f70268194a98022c,2025-04-16T13:25:59.640000
CVE-2025-30709,0,1,ce664d2db63a71790a627ed826cd05280bb2e3736149e236ac0b210115a9a9ca,2025-04-16T20:15:18.853000
CVE-2025-30709,0,0,ce664d2db63a71790a627ed826cd05280bb2e3736149e236ac0b210115a9a9ca,2025-04-16T20:15:18.853000
CVE-2025-3071,0,0,d16bcf87876b69db8889459754164a9a7a5a7660b7bb26af9304dff3429a1889,2025-04-10T21:15:49.347000
CVE-2025-30710,0,1,a5121b4e4191508eb6ce8d319d1d00e60f5016db8c92efd77eaa69ea703dae61,2025-04-16T20:15:18.967000
CVE-2025-30710,0,0,a5121b4e4191508eb6ce8d319d1d00e60f5016db8c92efd77eaa69ea703dae61,2025-04-16T20:15:18.967000
CVE-2025-30711,0,0,1e5465f558efc4782f831dbcabf3c5891d8231c2999b8198eb1d5bb90ab63b46,2025-04-16T16:15:33.523000
CVE-2025-30712,0,0,eac5b0b99e5f8b50cb56cbe2ee1e629963db68c1e9d3f1fc4db92b2affc433d4,2025-04-16T16:15:33.633000
CVE-2025-30713,0,0,1b9f9946ae908a48170d2a70a15ad8fb04aa712960921de2c1d56c95c39b0df1,2025-04-16T16:15:33.747000
@ -289186,6 +289200,7 @@ CVE-2025-31474,0,0,5e7d6600ce1174be36633aec5902c9252df21c2f48f1552b8554d9d1218e3
CVE-2025-31475,0,0,d054ab98458109d671d2e3362598fabc0f69079fd0804798837af9591fe8f8e4,2025-04-08T18:14:17.307000
CVE-2025-31476,0,0,2278ecebe988f2494770aa5bcdde199a741030c5fdfef8bf4f1b7a701a4a759f,2025-04-08T18:14:17.307000
CVE-2025-31477,0,0,54285781555488a3668d04893deec45a9e20dfdee4ab1c462d402e7283dfccb5,2025-04-07T14:18:34.453000
CVE-2025-31478,1,1,b6da6719d326840f501df7f1408ff1de3712392cf9832b5493957c7da4075620,2025-04-16T22:15:14.233000
CVE-2025-31479,0,0,2697cc1817114968aab8eafa22f3d26b926cb32529ad7873759be5d99c686601,2025-04-07T14:18:34.453000
CVE-2025-3148,0,0,b333acfda68d66ad1bae1483d9c733fd29bd9303bc53eccbc0d0767f3d1c789f,2025-04-07T14:18:34.453000
CVE-2025-31480,0,0,dfb43594bbbdcf12c97680368525c0c40e65f0938db26f1a8caa293eb7101deb,2025-04-07T14:18:15.560000
@ -289869,6 +289884,7 @@ CVE-2025-32426,0,0,97f7719ef42c67257e2006b52ab9747f51788ff83c926fc892139743aec5a
CVE-2025-32427,0,0,0416426b54022f69535fafb066a105f3453a61c3cc047d8982deab84a0710a9d,2025-04-11T15:39:52.920000
CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b345a,2025-04-15T18:39:27.967000
CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000
CVE-2025-32433,1,1,6df07494c15d475f1de4e347159ef40acf96f28d5ebdbbd82bad602c3cb04a2c,2025-04-16T22:15:14.373000
CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000
CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000
CVE-2025-32439,0,0,bc2ffe14216b9cfe29b31e6fc5be13f4870b9bbc8f43f42b1dd5fa85872b2005,2025-04-16T13:25:59.640000
@ -290056,12 +290072,16 @@ CVE-2025-32778,0,0,93333c106bade1942d189295a57ca8b886e6e79a18429247cda3fa2e156f8
CVE-2025-32779,0,0,9b0c0f3e1679aa6a29c07a0230230eddd75bcf03028ff914fcc18fd0552bd825,2025-04-15T18:39:27.967000
CVE-2025-32780,0,0,66c032871841ee8f1135c9a708f1264f3edee13154b2ee90fcea8f285386936f,2025-04-15T18:39:27.967000
CVE-2025-32782,0,0,ea3e82903e807a520de4c91c10f7d08fd70839175e235aa475d1b12f4a8b1338,2025-04-16T13:25:37.340000
CVE-2025-32783,1,1,9698e9ba7093dbb73e35c4e21de6279231499f6c0dd02d871a6cc5ae64c5a62f,2025-04-16T22:15:14.523000
CVE-2025-32784,0,0,f07e1bae891c8076c2e74beba24dfa0a792bdc8c6b542f23984d9697f06bd191,2025-04-16T13:25:37.340000
CVE-2025-32787,1,1,585e3d1455b8a84e795030e7b0dc4099402e56b99d1c15594a4fd6dc0fe73b3d,2025-04-16T22:15:14.667000
CVE-2025-32789,1,1,1db70b23989b905b2aba1aa6683b57fe707a22cfe3f1f5347c6f92571a95f8a6,2025-04-16T22:15:14.800000
CVE-2025-32791,1,1,cce811760929409bbc0164cd7083266c1ecce2c2b4b86cf82e6643b37c8fea15,2025-04-16T22:15:14.943000
CVE-2025-32807,0,0,791ea9650394de4a3c6a4bce28448af084ce5e8fb834d69b1769b35b955fdca4,2025-04-11T15:39:52.920000
CVE-2025-32808,0,0,4460b802a312298836218e51f145ee69f847802ae0b680f0631fd4c9d767af72,2025-04-11T16:15:20.673000
CVE-2025-32809,0,0,ca90ff3ced06efa4e939486b48b76783f1482c86186847921ab08cd5bd99e3d5,2025-04-11T16:15:20.807000
CVE-2025-32816,0,0,7146ab229fea4de6245a9faadeb60513e017f27b734755baaf195d3f55011510,2025-04-11T15:39:52.920000
CVE-2025-32817,1,1,2ce554c565fb4e62b3c662311b1ce451f78c307581785975384122d9afebc7f3,2025-04-16T21:15:47.780000
CVE-2025-32817,0,0,2ce554c565fb4e62b3c662311b1ce451f78c307581785975384122d9afebc7f3,2025-04-16T21:15:47.780000
CVE-2025-3282,0,0,4f7d1b48e17ccd00afeee2e7a595ed2b28190fc5a8aec67b855d00f5d80e0bc2,2025-04-15T18:39:27.967000
CVE-2025-32822,0,0,367ecfacf3c74140480293afb0501d7a53327500a3de5132d335460df99583f3,2025-04-16T18:16:07.973000
CVE-2025-32823,0,0,d69c9859ee28ca28e054ef2b051867a5f7aaf3609eea5ca6dfa5f7794f4d36be,2025-04-16T18:16:08.120000
@ -290346,8 +290366,8 @@ CVE-2025-3612,0,0,b3e7e1fd46c9147c27f3feb15d1a5ba8eabce3f8bab41f1f78e6d74dff7b1b
CVE-2025-3613,0,0,9c314abbc6473987a4462c7f86d0ede7026d1a1d89f3e10127913343b31eedd8,2025-04-15T18:39:27.967000
CVE-2025-3617,0,0,8b166380afe19241854c65e4319a7a4bf7fa4a3b21b435fec16e6239c6e67cc8,2025-04-15T18:39:27.967000
CVE-2025-3618,0,0,eda45473138c6808735db2df162e6171a422dd9195142056b67b3d52202066c7,2025-04-15T18:39:27.967000
CVE-2025-3619,1,1,53be325581dce300b9e806b9d83ff7fe2c4e86a07254b58c0415f8bff201f32e,2025-04-16T21:15:47.920000
CVE-2025-3620,1,1,5027351bfa6940e7b37854be13f32b3ecf3f384d9c50497367f237f03836a78e,2025-04-16T21:15:48.027000
CVE-2025-3619,0,0,53be325581dce300b9e806b9d83ff7fe2c4e86a07254b58c0415f8bff201f32e,2025-04-16T21:15:47.920000
CVE-2025-3620,0,0,5027351bfa6940e7b37854be13f32b3ecf3f384d9c50497367f237f03836a78e,2025-04-16T21:15:48.027000
CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac885,2025-04-15T18:39:27.967000
CVE-2025-3663,0,0,1ce80bfc94e480b50f27d0432deca8fffb2ad8de6b84f90469934d90488bc703,2025-04-16T13:25:37.340000
CVE-2025-3664,0,0,1768dbec432a631292ab0792b91b23e446ed218ac7ee245b57fd6eb101bb8145,2025-04-16T14:15:27.827000
@ -290360,11 +290380,11 @@ CVE-2025-3675,0,0,8fc64576d9408584769dca7b251b2811cba19ed1b29b0a5e250c895856174a
CVE-2025-3676,0,0,8b3fc538dc5f1e3498af0923d848cb34d8a7c1143698b7acb611e22232098068,2025-04-16T13:25:37.340000
CVE-2025-3677,0,0,d0b4158217f3756823f68a8901374ac1abc98276cdc21fdc8b5cbe01ac5c1b87,2025-04-16T13:25:37.340000
CVE-2025-3678,0,0,fe7f9b10b498ab4c4118f8e6f6b85a631558210b3c32871c50930a944540940a,2025-04-16T13:25:37.340000
CVE-2025-3679,0,1,9bcb800b5750e50910dcb692b53ba75fe416d21db6bb5123a1610ed36ae21b8e,2025-04-16T20:15:19.250000
CVE-2025-3680,0,1,7c2e2289a4ab431cadffbfde63d0b9369934e915e62431b56f236c8cff8a93bc,2025-04-16T20:15:19.350000
CVE-2025-3681,0,1,9873c454c08220b0a960b47b4de43158baa86f135fdd0640a80430eb44cb01cf,2025-04-16T20:15:19.460000
CVE-2025-3682,0,1,b2affd3113c936746dbb5cf91e86a34d1e8ebeb7aa65e59a9cf1b600e5c26a70,2025-04-16T20:15:19.570000
CVE-2025-3683,0,1,f37c23cdc7eabdf77512b1e225cee276025d8f967ad5af14a2c8a2cad9f3d57f,2025-04-16T20:15:19.670000
CVE-2025-3679,0,0,9bcb800b5750e50910dcb692b53ba75fe416d21db6bb5123a1610ed36ae21b8e,2025-04-16T20:15:19.250000
CVE-2025-3680,0,0,7c2e2289a4ab431cadffbfde63d0b9369934e915e62431b56f236c8cff8a93bc,2025-04-16T20:15:19.350000
CVE-2025-3681,0,0,9873c454c08220b0a960b47b4de43158baa86f135fdd0640a80430eb44cb01cf,2025-04-16T20:15:19.460000
CVE-2025-3682,0,0,b2affd3113c936746dbb5cf91e86a34d1e8ebeb7aa65e59a9cf1b600e5c26a70,2025-04-16T20:15:19.570000
CVE-2025-3683,0,0,f37c23cdc7eabdf77512b1e225cee276025d8f967ad5af14a2c8a2cad9f3d57f,2025-04-16T20:15:19.670000
CVE-2025-3684,0,0,005ffbd66ba10e6ec962169c35b3b4430afe7279dee228e65b372cdafae7a9a2,2025-04-16T19:15:55
CVE-2025-3685,0,0,a038f7016d9d7aee9eb0536d9d006e5189794d512e4af0149f231284d7782e60,2025-04-16T13:25:37.340000
CVE-2025-3686,0,0,7959444999d939397b75d41bf9d8d3af522c96b7a107cfe0f6ed3f78546dfcf6,2025-04-16T13:25:37.340000
@ -290379,15 +290399,15 @@ CVE-2025-3694,0,0,cbb6dbf67e78d678a0c32ccc77f656ed9d7bcf54631f37150d9885e2b9018d
CVE-2025-3696,0,0,2bf939535fa8806cc4e793051666a9e5b91fe8b6ba8aa52a4170f8f7466c8498,2025-04-16T15:16:14.287000
CVE-2025-3697,0,0,8d41cda9f6cb466619110c3390fbf369e5e587d610bb308b7d6acf4a2a9ce41f,2025-04-16T15:16:14.460000
CVE-2025-3698,0,0,06aad761edbce101a35f9e95ce891a7c8bf2c6f046c74b9a4ac2fd5d41b56e3f,2025-04-16T14:15:29.060000
CVE-2025-3723,1,1,5516734ea7b429349db8183353c9a6cae93c902d21883c623672896a15824d8e,2025-04-16T20:15:19.777000
CVE-2025-3724,1,1,b85ef0c50063e0bc0a94629cd54a3778b9c0b8cb45af733f3dc605edb78eb841,2025-04-16T20:15:19.960000
CVE-2025-3725,1,1,e1421461a06ac674145797f32b0167a7b02acb5d56dcbf6a2e44bcbcd002b389,2025-04-16T20:15:20.123000
CVE-2025-3726,1,1,ba5a7988087a4ee7bf038eaaebf307f105486224e8c1b5abec59c2ac84c52ae8,2025-04-16T20:15:20.283000
CVE-2025-3727,1,1,deaa5654d11615e965237b87eac3fb0356d5fa7e28c50ec7abd875586cde793c,2025-04-16T21:15:48.203000
CVE-2025-3728,1,1,d227904395147b87ad7d649add61aa5661016d64da3169ef547e709d8ac74dd4,2025-04-16T21:15:48.363000
CVE-2025-3729,1,1,e1f3f5695da5391fb19903ebea12f1b012caf6712d19a7605b0164067d14c993,2025-04-16T21:15:48.537000
CVE-2025-3730,1,1,bf8196d9cc10cb8b06b520303adb009d6c422cc02d5140a90b09421a483cdfc5,2025-04-16T21:15:48.700000
CVE-2025-3733,0,1,b7ac17b7c057f630b68a81a505102cdcfef6e13156a11c36cc53f363146b133e,2025-04-16T21:15:48.873000
CVE-2025-3723,0,0,5516734ea7b429349db8183353c9a6cae93c902d21883c623672896a15824d8e,2025-04-16T20:15:19.777000
CVE-2025-3724,0,0,b85ef0c50063e0bc0a94629cd54a3778b9c0b8cb45af733f3dc605edb78eb841,2025-04-16T20:15:19.960000
CVE-2025-3725,0,0,e1421461a06ac674145797f32b0167a7b02acb5d56dcbf6a2e44bcbcd002b389,2025-04-16T20:15:20.123000
CVE-2025-3726,0,0,ba5a7988087a4ee7bf038eaaebf307f105486224e8c1b5abec59c2ac84c52ae8,2025-04-16T20:15:20.283000
CVE-2025-3727,0,0,deaa5654d11615e965237b87eac3fb0356d5fa7e28c50ec7abd875586cde793c,2025-04-16T21:15:48.203000
CVE-2025-3728,0,0,d227904395147b87ad7d649add61aa5661016d64da3169ef547e709d8ac74dd4,2025-04-16T21:15:48.363000
CVE-2025-3729,0,0,e1f3f5695da5391fb19903ebea12f1b012caf6712d19a7605b0164067d14c993,2025-04-16T21:15:48.537000
CVE-2025-3730,0,0,bf8196d9cc10cb8b06b520303adb009d6c422cc02d5140a90b09421a483cdfc5,2025-04-16T21:15:48.700000
CVE-2025-3733,0,0,b7ac17b7c057f630b68a81a505102cdcfef6e13156a11c36cc53f363146b133e,2025-04-16T21:15:48.873000
CVE-2025-3734,0,0,08cd08d68803ebc3e247bc1dda5293ff05ed4a522f0928f26aaf66ccad8a7816,2025-04-16T18:16:19.783000
CVE-2025-3735,0,0,c1ccc9a6fec3403e3777364d2dc3fbbbbb4b443b6d4510a9318f951740e87950,2025-04-16T17:15:50.030000
CVE-2025-3736,0,0,564cad71b1e7fa3df569cf41ca780256dc009f1642d469d423a441d1ee8e0570,2025-04-16T17:15:50.113000
@ -290453,3 +290473,5 @@ CVE-2025-39599,0,0,b32165e9ac35cddc8365b5382966b3cdc907609baee89eedf472d2eeabdae
CVE-2025-39600,0,0,ff53b226229c137b254fd094b41c03f9992afdd195d414242990f0faaac29b77,2025-04-16T13:25:37.340000
CVE-2025-39601,0,0,7f3568c982e2cbdfe236a2b826bbacce5227350e296ed75f61b4bbcedef35537,2025-04-16T13:25:37.340000
CVE-2025-39602,0,0,df27de5ee22e5ec9d9d74c987812c0381cd04ef064c0d9455c3c07c5309a9403,2025-04-16T13:25:37.340000
CVE-2025-43703,1,1,316b9a83c3b6dc513c619095e9530484f6e664a6d636deeaf4e977dce37bdf17,2025-04-16T22:15:15.083000
CVE-2025-43704,1,1,4cfc0104734e3f2a02f1a096d88581f78932e3288ecf4dc711d8c50bc120846e,2025-04-16T23:15:45.770000

Can't render this file because it is too large.