Auto-Update: 2025-04-07T14:00:27.941453+00:00

This commit is contained in:
cad-safe-bot 2025-04-07 14:04:12 +00:00
parent 7e2d548fc5
commit 449b33ff4a
76 changed files with 1139 additions and 196 deletions

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "psirt@cisco.com",
"published": "2023-01-20T07:15:14.490",
"lastModified": "2025-03-12T17:15:38.057",
"vulnStatus": "Modified",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-17T21:15:09.653",
"lastModified": "2024-12-12T21:15:07.420",
"vulnStatus": "Modified",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "security@synology.com",
"published": "2024-06-04T10:15:12.747",
"lastModified": "2025-03-04T18:43:31.607",
"vulnStatus": "Analyzed",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-0050",
"sourceIdentifier": "arm-security@arm.com",
"published": "2025-04-07T12:15:15.360",
"lastModified": "2025-04-07T12:15:15.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to make valid GPU processing operations, including via WebGL or WebGPU, to access a limited amount outside of buffer bounds.This issue affects Bifrost GPU Userspace Driver: from r0p0 through r49p2, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r19p0 through r49p2, from r50p0 through r53p0; Arm 5th Gen GPU Architecture Userspace Driver: from r41p0 through r49p2, from r50p0 through r53p0."
}
],
"metrics": {},
"weaknesses": [
{
"source": "arm-security@arm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://developer.arm.com/documentation/110435/latest/",
"source": "arm-security@arm.com"
}
]
}

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:17.567",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A script imports issue was addressed with improved isolation. This issue is fixed in Safari 18.4, visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Visiting a website may leak sensitive data."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema con la importaci\u00f3n de scripts mejorando el aislamiento. Este problema est\u00e1 corregido en Safari 18.4, visionOS 2.4, iOS 18.4, iPadOS 18.4 y macOS Sequoia 15.4. Visitar un sitio web puede filtrar datos confidenciales."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:17.703",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved authentication. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker with a USB-C connection to an unlocked device may be able to programmatically access photos."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 mejorando la autenticaci\u00f3n. Este problema se solucion\u00f3 en iOS 18.4 y iPadOS 18.4. Un atacante con una conexi\u00f3n USB-C a un dispositivo desbloqueado podr\u00eda acceder a las fotos mediante programaci\u00f3n."
}
],
"metrics": {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:17.807",
"lastModified": "2025-04-02T16:17:41.203",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:17.903",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A user may be able to elevate privileges."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un desbordamiento de enteros mejorando la validaci\u00f3n de entrada. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que un usuario pueda elevar privilegios."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.007",
"lastModified": "2025-04-01T21:15:42.420",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A type confusion issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker with user privileges may be able to read kernel memory."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de confusi\u00f3n de tipos mejorando la gesti\u00f3n de memoria. Este problema se solucion\u00f3 en macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante con privilegios de usuario podr\u00eda leer la memoria del kernel."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.103",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Ventura 13.7.5, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker with physical access may be able to use Siri to access sensitive user data."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 restringiendo las opciones disponibles en un dispositivo bloqueado. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, iOS 18.4 y iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante con acceso f\u00edsico podr\u00eda usar Siri para acceder a datos confidenciales del usuario."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.193",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An uncontrolled format string issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause a denial-of-service."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de formato no controlado con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda causar una denegaci\u00f3n de servicio."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.293",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de registro mejorando la redacci\u00f3n de datos. Este problema se solucion\u00f3 en iOS 18.4, iPadOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.383",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda modificar partes protegidas del sistema de archivos."
}
],
"metrics": {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.580",
"lastModified": "2025-04-02T16:17:41.380",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.680",
"lastModified": "2025-04-01T21:15:42.580",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to enable iCloud storage features without user consent."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n pueda habilitar funciones de almacenamiento de iCloud sin el consentimiento del usuario."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.773",
"lastModified": "2025-04-01T21:15:42.757",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4. Loading a malicious iframe may lead to a cross-site scripting attack."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema est\u00e1 corregido en Safari 18.4, iOS 18.4 y iPadOS 18.4. Cargar un iframe malicioso puede provocar un ataque de cross-site scripting."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.870",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Processing maliciously crafted web content may lead to an unexpected process crash."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de desbordamiento de b\u00fafer mejorando la gesti\u00f3n de memoria. Este problema se solucion\u00f3 en tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, y macOS Sequoia 15.4. El procesamiento de contenido web malintencionado puede provocar un bloqueo inesperado del proceso."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.963",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic error was addressed with improved error handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Parsing an image may lead to disclosure of user information."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un error l\u00f3gico mejorando la gesti\u00f3n de errores. Este problema se solucion\u00f3 en visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. El an\u00e1lisis de una imagen puede provocar la divulgaci\u00f3n de informaci\u00f3n del usuario."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.087",
"lastModified": "2025-04-01T21:15:42.897",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted video file may lead to unexpected app termination or corrupt process memory."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Procesar un archivo de v\u00eddeo manipulado con fines maliciosos puede provocar el cierre inesperado de la aplicaci\u00f3n o la corrupci\u00f3n de la memoria del proceso."
}
],
"metrics": {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.203",
"lastModified": "2025-04-02T14:16:04.270",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.300",
"lastModified": "2025-04-03T18:15:44.770",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.400",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed by not logging contents of text fields. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de privacidad al no registrar el contenido de los campos de texto. Este problema se solucion\u00f3 en visionOS 2.4, iOS 18.4, iPadOS 18.4, tvOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.490",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access private information."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n maliciosa podr\u00eda acceder a informaci\u00f3n privada."
}
],
"metrics": {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.593",
"lastModified": "2025-04-03T21:15:39.373",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.697",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 mejorando la redacci\u00f3n de informaci\u00f3n confidencial. Este problema est\u00e1 corregido en iOS 18.4, iPadOS 18.4, tvOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.793",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.4. An app may be able to access information about a user's contacts."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados en las entradas del registro. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a la informaci\u00f3n de los contactos de un usuario."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.893",
"lastModified": "2025-04-02T14:16:04.507",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved data access restriction. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6. Sensitive keychain data may be accessible from an iOS backup."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 mejorando la restricci\u00f3n de acceso a datos. Este problema se solucion\u00f3 en visionOS 2.4, iOS 18.4, iPadOS 18.4 y iPadOS 17.7.6. Es posible acceder a datos confidenciales del llavero desde una copia de seguridad de iOS."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:20.080",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to execute arbitrary code with kernel privileges."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de desbordamiento de b\u00fafer mejorando la gesti\u00f3n de memoria. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda ejecutar c\u00f3digo arbitrario con privilegios de kernel."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:20.180",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A sandboxed app may be able to access sensitive user data."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema l\u00f3gico mejorando las comprobaciones. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n en un entorno aislado podr\u00eda acceder a datos confidenciales del usuario."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:20.770",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A remote attacker may be able to cause unexpected app termination or heap corruption."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de inicializaci\u00f3n de memoria mejorando su gesti\u00f3n. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante remoto podr\u00eda provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n o la corrupci\u00f3n del mont\u00f3n."
}
],
"metrics": {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:21.620",
"lastModified": "2025-04-02T16:17:41.717",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:21.820",
"lastModified": "2025-04-01T21:15:43.040",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An injection issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de inyecci\u00f3n mejorando la validaci\u00f3n. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:21.917",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker may be able to cause unexpected app termination."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de confusi\u00f3n de tipos mejorando las comprobaciones. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante podr\u00eda provocar el cierre inesperado de la aplicaci\u00f3n."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.090",
"lastModified": "2025-04-01T21:15:43.183",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to check the existence of an arbitrary path on the file system."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de permisos con restricciones de la sandbox adicionales.. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda comprobar la existencia de una ruta arbitraria en el sistema de archivos."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.187",
"lastModified": "2025-04-01T21:15:43.330",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved access restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app acting as a HTTPS proxy could get access to sensitive user data."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 mejorando las restricciones de acceso. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n maliciosa que act\u00fae como proxy HTTPS podr\u00eda acceder a datos confidenciales del usuario."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.283",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n de enlaces simb\u00f3licos. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos protegidos del usuario."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.380",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A user may be able to elevate privileges."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 mejorando la validaci\u00f3n de enlaces simb\u00f3licos. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que un usuario pueda elevar privilegios."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.477",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A file access issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de acceso a archivos mejorando la validaci\u00f3n de entrada. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n pueda salir de su zona de pruebas."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.570",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to disclose kernel memory."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 mejorando las comprobaciones de los l\u00edmites. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda revelar memoria del kernel."
}
],
"metrics": {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.673",
"lastModified": "2025-04-03T14:15:31.043",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.820",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with additional entitlement checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to retrieve Safari bookmarks without an entitlement check."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 con comprobaciones de derechos adicionales. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n pueda recuperar marcadores de Safari sin una comprobaci\u00f3n de derechos."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.960",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker in a privileged position may be able to perform a denial-of-service."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante con privilegios podr\u00eda realizar una denegaci\u00f3n de servicio."
}
],
"metrics": {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:23.060",
"lastModified": "2025-04-02T16:17:41.877",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:23.807",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda modificar partes protegidas del sistema de archivos."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:23.910",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination or corrupt kernel memory."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de escritura fuera de los l\u00edmites mejorando la comprobaci\u00f3n de los l\u00edmites. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda provocar la finalizaci\u00f3n inesperada del sistema o da\u00f1ar la memoria del kernel."
}
],
"metrics": {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:24.003",
"lastModified": "2025-04-02T16:17:42.060",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:25.887",
"lastModified": "2025-04-02T16:17:42.927",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:25.987",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An attacker with physical access to a locked device may be able to view sensitive user information."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema se solucion\u00f3 en visionOS 2.4, iOS 18.4 y iPadOS 18.4, y macOS Sequoia 15.4. Un atacante con acceso f\u00edsico a un dispositivo bloqueado podr\u00eda acceder a informaci\u00f3n confidencial del usuario."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:26.173",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de privacidad eliminando el c\u00f3digo vulnerable. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:26.260",
"lastModified": "2025-04-02T14:16:13.203",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A race condition was addressed with improved locking. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Mounting a maliciously crafted SMB network share may lead to system termination."
},
{
"lang": "es",
"value": "Se solucion\u00f3 una condici\u00f3n de ejecuci\u00f3n mejorando el bloqueo. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Montar un recurso compartido de red SMB manipulado con fines maliciosos puede provocar la interrupci\u00f3n del sistema."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:26.360",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app with root privileges may be able to modify the contents of system files."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n maliciosa con privilegios de root podr\u00eda modificar el contenido de los archivos del sistema."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:26.450",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was resolved by sanitizing logging This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data."
},
{
"lang": "es",
"value": "El problema se resolvi\u00f3 depurando el registro. Este problema est\u00e1 corregido en visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario."
}
],
"metrics": {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:26.553",
"lastModified": "2025-04-03T18:15:45.357",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:26.643",
"lastModified": "2025-04-01T20:26:22.890",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 mejorando la validaci\u00f3n de enlaces simb\u00f3licos. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:26.830",
"lastModified": "2025-04-02T14:16:13.400",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An input validation issue was addressed."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Se solucion\u00f3 un problema de validaci\u00f3n de entrada."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:26.930",
"lastModified": "2025-04-01T20:26:11.547",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. A malicious app may be able to access private information."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de gesti\u00f3n de rutas mejorando la validaci\u00f3n. Este problema se solucion\u00f3 en macOS Sonoma 14.7.5, iOS 18.4 y iPadOS 18.4, tvOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n maliciosa podr\u00eda acceder a informaci\u00f3n privada."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:27.033",
"lastModified": "2025-04-01T20:26:11.547",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access private information."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n maliciosa podr\u00eda acceder a informaci\u00f3n privada."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability affects Firefox < 137, Firefox ESR < 115.22, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9."
},
{
"lang": "es",
"value": "La ejecuci\u00f3n de c\u00f3digo JavaScript al transformar un documento con XSLTProcessor podr\u00eda provocar un use-after-free. Esta vulnerabilidad afecta a Firefox &lt; 137, Firefox ESR &lt; 115.22, Firefox ESR &lt; 128.9, Thunderbird &lt; 137 y Thunderbird &lt; 128.9."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A crafted URL containing specific Unicode characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9."
},
{
"lang": "es",
"value": "Una URL manipulada que contiene caracteres Unicode espec\u00edficos podr\u00eda haber ocultado el verdadero origen de la p\u00e1gina, lo que podr\u00eda dar lugar a un ataque de suplantaci\u00f3n de identidad. Esta vulnerabilidad afecta a Firefox &lt; 137, Firefox ESR &lt; 128.9, Thunderbird &lt; 137 y Thunderbird &lt; 128.9."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9."
},
{
"lang": "es",
"value": "Errores de seguridad de memoria presentes en Firefox 136, Thunderbird 136, Firefox ESR 128.8 y Thunderbird 128.8. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de memoria y presumimos que, con suficiente esfuerzo, algunos de ellos podr\u00edan haberse explotado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox &lt; 137, Firefox ESR &lt; 128.9, Thunderbird &lt; 137 y Thunderbird &lt; 128.9."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "An attacker could read 32 bits of values spilled onto the stack in a JIT compiled function. This vulnerability affects Firefox < 137 and Thunderbird < 137."
},
{
"lang": "es",
"value": "Un atacante podr\u00eda leer 32 bits de valores vertidos en la pila en una funci\u00f3n compilada JIT. Esta vulnerabilidad afecta a Firefox (versi\u00f3n anterior a la 137) y Thunderbird (versi\u00f3n anterior a la 137)."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Leaking of file descriptors from the fork server to web content processes could allow for privilege escalation attacks. This vulnerability affects Firefox < 137 and Thunderbird < 137."
},
{
"lang": "es",
"value": "La filtraci\u00f3n de descriptores de archivos del servidor de bifurcaci\u00f3n a los procesos de contenido web podr\u00eda permitir ataques de escalada de privilegios. Esta vulnerabilidad afecta a Firefox (versi\u00f3n anterior a la 137) y Thunderbird (versi\u00f3n anterior a la 137)."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "After selecting a malicious Windows `.url` shortcut from the local filesystem, an unexpected file could be uploaded. \n*This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 137 and Thunderbird < 137."
},
{
"lang": "es",
"value": "Tras seleccionar un acceso directo malicioso de Windows `.url` desde el sistema de archivos local, podr\u00eda cargarse un archivo inesperado. *Este error solo afecta a Firefox en Windows. Otros sistemas operativos no se ven afectados.* Esta vulnerabilidad afecta a Firefox (versi\u00f3n anterior a la 137) y Thunderbird (versi\u00f3n anterior a la 137)."
}
],
"metrics": {

View File

@ -3,12 +3,16 @@
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:37.873",
"lastModified": "2025-04-02T14:58:07.527",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Navigations in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
},
{
"lang": "es",
"value": "El use-after-free en las navegaciones de Google Chrome anteriores a la versi\u00f3n 135.0.7049.52 permit\u00eda a un atacante remoto explotar la corrupci\u00f3n del mont\u00f3n mediante una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)"
}
],
"metrics": {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:38.093",
"lastModified": "2025-04-03T14:15:44.400",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:38.187",
"lastModified": "2025-04-03T14:15:44.560",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:38.283",
"lastModified": "2025-04-03T18:15:48.053",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:29.230",
"lastModified": "2025-04-03T21:15:40.627",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3350",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-07T12:15:16.100",
"lastModified": "2025-04-07T12:15:16.100",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in PHPGurukul Old Age Home Management System 1.0. Affected is an unknown function of the file /admin/view-enquiry.php. The manipulation of the argument viewid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/n0name-yang/myCVE/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303564",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303564",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.552051",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3351",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-07T12:15:16.380",
"lastModified": "2025-04-07T12:15:16.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/n0name-yang/myCVE/issues/2",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303565",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303565",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.552130",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3352",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-07T13:15:42.643",
"lastModified": "2025-04-07T13:15:42.643",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit-scdetails.php. The manipulation of the argument contnum leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/n0name-yang/myCVE/issues/3",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303566",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303566",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.552171",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3353",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-07T13:15:43.313",
"lastModified": "2025-04-07T13:15:43.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Men Salon Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/add-services.php. The manipulation of the argument cost leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/LaneyYu/cve/issues/3",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303567",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303567",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.552239",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3359",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-04-07T13:15:43.510",
"lastModified": "2025-04-07T13:15:43.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in GNUPlot. A segmentation fault via IO_str_init_static_internal may jeopardize the environment."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3359",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357749",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3360",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-04-07T13:15:43.687",
"lastModified": "2025-04-07T13:15:43.687",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3360",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357754",
"source": "secalert@redhat.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-07T12:00:26.598863+00:00
2025-04-07T14:00:27.941453+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-07T11:15:53.807000+00:00
2025-04-07T13:15:43.687000+00:00
```
### Last Data Feed Release
@ -33,44 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
288831
288838
```
### CVEs added in the last Commit
Recently added CVEs: `38`
Recently added CVEs: `7`
- [CVE-2024-45557](CVE-2024/CVE-2024-455xx/CVE-2024-45557.json) (`2025-04-07T11:15:50.020`)
- [CVE-2024-49848](CVE-2024/CVE-2024-498xx/CVE-2024-49848.json) (`2025-04-07T11:15:50.183`)
- [CVE-2025-21421](CVE-2025/CVE-2025-214xx/CVE-2025-21421.json) (`2025-04-07T11:15:50.360`)
- [CVE-2025-21423](CVE-2025/CVE-2025-214xx/CVE-2025-21423.json) (`2025-04-07T11:15:50.533`)
- [CVE-2025-21425](CVE-2025/CVE-2025-214xx/CVE-2025-21425.json) (`2025-04-07T11:15:50.697`)
- [CVE-2025-21428](CVE-2025/CVE-2025-214xx/CVE-2025-21428.json) (`2025-04-07T11:15:50.870`)
- [CVE-2025-21429](CVE-2025/CVE-2025-214xx/CVE-2025-21429.json) (`2025-04-07T11:15:51.047`)
- [CVE-2025-21430](CVE-2025/CVE-2025-214xx/CVE-2025-21430.json) (`2025-04-07T11:15:51.220`)
- [CVE-2025-21431](CVE-2025/CVE-2025-214xx/CVE-2025-21431.json) (`2025-04-07T11:15:51.440`)
- [CVE-2025-21434](CVE-2025/CVE-2025-214xx/CVE-2025-21434.json) (`2025-04-07T11:15:51.600`)
- [CVE-2025-21435](CVE-2025/CVE-2025-214xx/CVE-2025-21435.json) (`2025-04-07T11:15:51.783`)
- [CVE-2025-21436](CVE-2025/CVE-2025-214xx/CVE-2025-21436.json) (`2025-04-07T11:15:51.970`)
- [CVE-2025-21437](CVE-2025/CVE-2025-214xx/CVE-2025-21437.json) (`2025-04-07T11:15:52.123`)
- [CVE-2025-21438](CVE-2025/CVE-2025-214xx/CVE-2025-21438.json) (`2025-04-07T11:15:52.290`)
- [CVE-2025-21439](CVE-2025/CVE-2025-214xx/CVE-2025-21439.json) (`2025-04-07T11:15:52.457`)
- [CVE-2025-21440](CVE-2025/CVE-2025-214xx/CVE-2025-21440.json) (`2025-04-07T11:15:52.613`)
- [CVE-2025-21441](CVE-2025/CVE-2025-214xx/CVE-2025-21441.json) (`2025-04-07T11:15:52.777`)
- [CVE-2025-21442](CVE-2025/CVE-2025-214xx/CVE-2025-21442.json) (`2025-04-07T11:15:52.933`)
- [CVE-2025-21443](CVE-2025/CVE-2025-214xx/CVE-2025-21443.json) (`2025-04-07T11:15:53.087`)
- [CVE-2025-21447](CVE-2025/CVE-2025-214xx/CVE-2025-21447.json) (`2025-04-07T11:15:53.243`)
- [CVE-2025-21448](CVE-2025/CVE-2025-214xx/CVE-2025-21448.json) (`2025-04-07T11:15:53.397`)
- [CVE-2025-3346](CVE-2025/CVE-2025-33xx/CVE-2025-3346.json) (`2025-04-07T10:15:15.153`)
- [CVE-2025-3347](CVE-2025/CVE-2025-33xx/CVE-2025-3347.json) (`2025-04-07T10:15:16.700`)
- [CVE-2025-3348](CVE-2025/CVE-2025-33xx/CVE-2025-3348.json) (`2025-04-07T11:15:53.607`)
- [CVE-2025-3349](CVE-2025/CVE-2025-33xx/CVE-2025-3349.json) (`2025-04-07T11:15:53.807`)
- [CVE-2025-0050](CVE-2025/CVE-2025-00xx/CVE-2025-0050.json) (`2025-04-07T12:15:15.360`)
- [CVE-2025-3350](CVE-2025/CVE-2025-33xx/CVE-2025-3350.json) (`2025-04-07T12:15:16.100`)
- [CVE-2025-3351](CVE-2025/CVE-2025-33xx/CVE-2025-3351.json) (`2025-04-07T12:15:16.380`)
- [CVE-2025-3352](CVE-2025/CVE-2025-33xx/CVE-2025-3352.json) (`2025-04-07T13:15:42.643`)
- [CVE-2025-3353](CVE-2025/CVE-2025-33xx/CVE-2025-3353.json) (`2025-04-07T13:15:43.313`)
- [CVE-2025-3359](CVE-2025/CVE-2025-33xx/CVE-2025-3359.json) (`2025-04-07T13:15:43.510`)
- [CVE-2025-3360](CVE-2025/CVE-2025-33xx/CVE-2025-3360.json) (`2025-04-07T13:15:43.687`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `67`
- [CVE-2025-24272](CVE-2025/CVE-2025-242xx/CVE-2025-24272.json) (`2025-04-01T20:26:22.890`)
- [CVE-2025-24273](CVE-2025/CVE-2025-242xx/CVE-2025-24273.json) (`2025-04-01T20:26:22.890`)
- [CVE-2025-24276](CVE-2025/CVE-2025-242xx/CVE-2025-24276.json) (`2025-04-02T16:17:42.060`)
- [CVE-2025-3028](CVE-2025/CVE-2025-30xx/CVE-2025-3028.json) (`2025-04-02T07:15:42.047`)
- [CVE-2025-3029](CVE-2025/CVE-2025-30xx/CVE-2025-3029.json) (`2025-04-02T07:15:42.240`)
- [CVE-2025-3030](CVE-2025/CVE-2025-30xx/CVE-2025-3030.json) (`2025-04-02T07:15:42.400`)
- [CVE-2025-3031](CVE-2025/CVE-2025-30xx/CVE-2025-3031.json) (`2025-04-01T20:26:11.547`)
- [CVE-2025-3032](CVE-2025/CVE-2025-30xx/CVE-2025-3032.json) (`2025-04-01T20:26:11.547`)
- [CVE-2025-3033](CVE-2025/CVE-2025-30xx/CVE-2025-3033.json) (`2025-04-01T20:26:11.547`)
- [CVE-2025-30438](CVE-2025/CVE-2025-304xx/CVE-2025-30438.json) (`2025-04-02T16:17:42.927`)
- [CVE-2025-30439](CVE-2025/CVE-2025-304xx/CVE-2025-30439.json) (`2025-04-01T20:26:22.890`)
- [CVE-2025-30443](CVE-2025/CVE-2025-304xx/CVE-2025-30443.json) (`2025-04-01T20:26:22.890`)
- [CVE-2025-30444](CVE-2025/CVE-2025-304xx/CVE-2025-30444.json) (`2025-04-02T14:16:13.203`)
- [CVE-2025-30446](CVE-2025/CVE-2025-304xx/CVE-2025-30446.json) (`2025-04-01T20:26:22.890`)
- [CVE-2025-30447](CVE-2025/CVE-2025-304xx/CVE-2025-30447.json) (`2025-04-01T20:26:22.890`)
- [CVE-2025-30449](CVE-2025/CVE-2025-304xx/CVE-2025-30449.json) (`2025-04-03T18:15:45.357`)
- [CVE-2025-30450](CVE-2025/CVE-2025-304xx/CVE-2025-30450.json) (`2025-04-01T20:26:22.890`)
- [CVE-2025-30452](CVE-2025/CVE-2025-304xx/CVE-2025-30452.json) (`2025-04-02T14:16:13.400`)
- [CVE-2025-30454](CVE-2025/CVE-2025-304xx/CVE-2025-30454.json) (`2025-04-01T20:26:11.547`)
- [CVE-2025-30455](CVE-2025/CVE-2025-304xx/CVE-2025-30455.json) (`2025-04-01T20:26:11.547`)
- [CVE-2025-3066](CVE-2025/CVE-2025-30xx/CVE-2025-3066.json) (`2025-04-02T14:58:07.527`)
- [CVE-2025-3068](CVE-2025/CVE-2025-30xx/CVE-2025-3068.json) (`2025-04-03T14:15:44.400`)
- [CVE-2025-3069](CVE-2025/CVE-2025-30xx/CVE-2025-3069.json) (`2025-04-03T14:15:44.560`)
- [CVE-2025-3070](CVE-2025/CVE-2025-30xx/CVE-2025-3070.json) (`2025-04-03T18:15:48.053`)
- [CVE-2025-31192](CVE-2025/CVE-2025-311xx/CVE-2025-31192.json) (`2025-04-03T21:15:40.627`)
## Download and Usage

View File

@ -215958,7 +215958,7 @@ CVE-2023-20021,0,0,6a2ead76fe3b5fece57fab974d3dca57ab9246b1314eab0aca14a39bca71f
CVE-2023-20022,0,0,d267e0083fa8403d8442c1bf3ac09340316446610d4d9e217c496ffce4b54016,2024-11-21T07:40:22.303000
CVE-2023-20023,0,0,95a83439fbba19b6c21fbdc0ee9b15f3bc03f36ffb8301951be300882be1433a,2024-11-21T07:40:22.423000
CVE-2023-20024,0,0,aa588e3440809485fc0865169fec554102a73a44873c6d779aa0ba291a537e5a,2024-11-21T07:40:22.540000
CVE-2023-20025,0,0,7b708217288967d1f049583a0ad1765fc1005217df4064d5a16a8ec9b6f695b3,2025-03-12T17:15:38.057000
CVE-2023-20025,0,1,4104603099ef1c5aedbec6932919518c007b1230bf8b0c2eac697a6975ce6a23,2025-03-12T17:15:38.057000
CVE-2023-20026,0,0,272df819d8802e4491b01fa5debaff60c45bbda833969382da3ea7ac9da6879a,2025-03-12T17:15:38.390000
CVE-2023-20027,0,0,643e4bd75b063b0079399886a3cd15f103694e59618950e3fd9d839bb6b1e293,2024-11-21T07:40:23.213000
CVE-2023-20028,0,0,8e75e4e2dea98ed8067b7183e305b57df6b136b6188b420e71399619665060df,2024-11-21T07:40:23.390000
@ -229724,7 +229724,7 @@ CVE-2023-37261,0,0,0239f7b5360086a6d5bc0e4bbc33e050f686758daf9d69a5a7063701324cc
CVE-2023-37262,0,0,6d3b52f2eb1b40d52ae791a848feb328ff228ebb60f1fc4a76188e241b5b927c,2024-11-21T08:11:20.197000
CVE-2023-37263,0,0,c815ae44858c527a06287982052d6180bed851f52d34cfd67a6498874f228f57,2024-11-21T08:11:20.737000
CVE-2023-37264,0,0,aaa6fff09681995d412b88925e6417eb3bab56465dfce9dc5a493e556c4c596d,2024-11-21T08:11:20.890000
CVE-2023-37265,0,0,1d3cf2dc629f4d59c7a9fc5db58856dbc5bc762c8a713a96e3c97543e695785f,2024-12-12T21:15:07.420000
CVE-2023-37265,0,1,f9b476d8ebbccff55574c5079322c589fb6466a8f3b2522e58ce544fc738da59,2024-12-12T21:15:07.420000
CVE-2023-37266,0,0,60e1eb97fa2dab45ec4d14f6b5a8d8aa62950dcc6baed85afc6d096e93e94d2f,2024-12-12T21:15:07.550000
CVE-2023-37267,0,0,e8b2b8f21ed54d8265017da786122811bfa578be8da741f117061f9ac2c0c3f6,2024-11-21T08:11:21.350000
CVE-2023-37268,0,0,8251e774de8aa0dd28ebf2412c57bee6323818051c9af992b22ef6110dfa4739,2024-11-21T08:11:21.493000
@ -259155,7 +259155,7 @@ CVE-2024-33054,0,0,eb35959fe5046cee87f0e8375744b9b7bc2ba82e7db4c375d7ced8537946b
CVE-2024-33055,0,0,7c9e78356ea47dcbc89353ee30ccd5e6cfb6bfa32a09ff7878bb6085bcfa6ee7,2025-01-10T17:01:45.937000
CVE-2024-33056,0,0,0b7f547ee3c89f47ebb165988f3996dbfd5d0b368f985cca939e232e93a6befa,2024-12-12T15:25:15.440000
CVE-2024-33057,0,0,1c92c61ecb7a8765b124d1e703614674040ea44a90e7d048beb7b1c44c6de717,2024-09-04T17:06:24.843000
CVE-2024-33058,1,1,71119cf68c85528a945accff14afb3102a2a739e3f9dfc46b23d1bcb9e44a841,2025-04-07T11:15:47.723000
CVE-2024-33058,0,0,71119cf68c85528a945accff14afb3102a2a739e3f9dfc46b23d1bcb9e44a841,2025-04-07T11:15:47.723000
CVE-2024-33059,0,0,b9157366e9b41bb8006e58246e65f5bdeba75ea2269f83b299649471535ea483,2025-01-10T16:53:02.590000
CVE-2024-3306,0,0,b1314b7809f51d374a0b9fae0657d8eb066c2cd2b31a15a930e406526126c0e9,2024-09-19T14:43:51.830000
CVE-2024-33060,0,0,d63fb9907aa3cb0bc7501efbfaa4a069641c9b88fabbf41becf835cca562c14e,2024-09-04T17:06:08.407000
@ -266747,7 +266747,7 @@ CVE-2024-43040,0,0,24c7fc00bcabba765361dc058df000d90f1495a06d1cc7d23caabc1efe8ac
CVE-2024-43042,0,0,7a4652f9042c3f41111ed646c3bc80b0acd0b77a5c21df60dcb23d137df071e0,2025-03-19T21:15:36.690000
CVE-2024-43044,0,0,c4209c28206f9930924ad89b590b0214e2b8c592601a3113522972c0c3512431,2025-03-14T20:15:13.470000
CVE-2024-43045,0,0,e1d9d7cac2404f2fa69e6a0d5951f7e836ae37782e145990d14492651417b2da,2025-03-25T17:16:05.413000
CVE-2024-43046,1,1,59b30c6c64f67b276c4a2380c7f308ef28e8710bde99a9f0bd16d8bc31c6b77c,2025-04-07T11:15:47.930000
CVE-2024-43046,0,0,59b30c6c64f67b276c4a2380c7f308ef28e8710bde99a9f0bd16d8bc31c6b77c,2025-04-07T11:15:47.930000
CVE-2024-43047,0,0,2c5673a0391a31abbf47c1d000c3d121e6564230b66ed0524b815e5850f22723,2024-10-09T14:39:06.540000
CVE-2024-43048,0,0,aa462510e6501f1c68792d4463cb05868dde51c2c7f830d9a1911363c50be659,2024-12-12T15:27:48.080000
CVE-2024-43049,0,0,396d2f1d473f42654eb07e32ffbaf51737e64004525269d29bf446d276b04cfd,2024-12-12T15:28:13.420000
@ -266759,7 +266759,7 @@ CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a
CVE-2024-43055,0,0,7e68211c963d2ff760c24658730a611fc46626d88b11ffcade7ed8bb42df2da0,2025-03-06T21:10:26.277000
CVE-2024-43056,0,0,c709d99a9c57195719219014d58cf5e642c2b7965166d3a5f70846b24eb1e019,2025-03-06T17:45:19.570000
CVE-2024-43057,0,0,5538ac0e54d78c3c5f43cc7d8d3e67e9f64cfefd871834bfb39f91c51faf6afc,2025-03-06T17:45:06.040000
CVE-2024-43058,1,1,735ec971d35e89f052ab970fc6b9410dd77f15f69ff7e74154d75377c7d41085,2025-04-07T11:15:48.127000
CVE-2024-43058,0,0,735ec971d35e89f052ab970fc6b9410dd77f15f69ff7e74154d75377c7d41085,2025-04-07T11:15:48.127000
CVE-2024-43059,0,0,d22b29979bbbb30378d68440ca3150b1ca88ccf70d8d61f49a1a1b7c0bcabc6c,2025-03-06T17:44:58.433000
CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000
CVE-2024-43060,0,0,e41eb30c9c993454ca734a3f293648983ebcd9ebaa7031f549a74814e1ef3eef,2025-03-06T17:44:50.600000
@ -266767,9 +266767,9 @@ CVE-2024-43061,0,0,fb182e78e0995c70b127000883dbbc7ed4ab09a8eb85c1eb852bc4e1d3c9a
CVE-2024-43062,0,0,36f03b47d147510dd25f7b8f8bf05b284295e8006754a49f54a555f3c2ad2fa0,2025-03-06T17:44:32.433000
CVE-2024-43063,0,0,8753ed6cced2789acaf67947f81e20495a0bebb4d20a1a7648ba9c44702bfc30,2025-01-10T15:37:33.340000
CVE-2024-43064,0,0,3bca3804c5d22727d53d3aebc24210f9425875c9c0a366159e62b07b6f538d51,2025-01-13T21:50:35.483000
CVE-2024-43065,1,1,8a8e9a6f5aed60bb35bd1b4708dcbddc60300b20e976adf7717d20edbc33bf5e,2025-04-07T11:15:48.287000
CVE-2024-43066,1,1,5ab52e69593d91b751dde043cd6e5a03f5a70b514c1b17f24fba0a1cc3eda39f,2025-04-07T11:15:48.460000
CVE-2024-43067,1,1,b51e194079dd7f17fb75e6e0c5219b5959b4264ff60415b573e57b69f234f8d6,2025-04-07T11:15:48.637000
CVE-2024-43065,0,0,8a8e9a6f5aed60bb35bd1b4708dcbddc60300b20e976adf7717d20edbc33bf5e,2025-04-07T11:15:48.287000
CVE-2024-43066,0,0,5ab52e69593d91b751dde043cd6e5a03f5a70b514c1b17f24fba0a1cc3eda39f,2025-04-07T11:15:48.460000
CVE-2024-43067,0,0,b51e194079dd7f17fb75e6e0c5219b5959b4264ff60415b573e57b69f234f8d6,2025-04-07T11:15:48.637000
CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000
CVE-2024-43077,0,0,436199c7bc78c426e053544ac533eb5f0842ec0f88a5221b5654c71a46ceb900,2025-01-03T22:15:07.360000
CVE-2024-4308,0,0,0e250664b04e28b54467b76d750ca3dcd8282c1064f64a7674928da95814f098,2024-11-21T09:42:35.590000
@ -268748,23 +268748,23 @@ CVE-2024-45528,0,0,2b62a46ad6721df273bf579b352dfc41d4b63f87803bbdffe8980da05bd0c
CVE-2024-4553,0,0,fb93ea8b9b15d40065d6ae14704246d0707e85e61c82926c0504e92275e39cb7,2025-01-24T14:42:56.390000
CVE-2024-45537,0,0,e4991fccb3abdc03f0d41abc273d14fb886e4c1626430be204dd2dbbe1a63e8d,2025-03-14T15:15:42.430000
CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f98483465,2024-09-19T18:15:10.433000
CVE-2024-45540,1,1,3b439f2cae01051944a5f696ba0864d4b974ea9419a29927960f84dc28dac98f,2025-04-07T11:15:48.793000
CVE-2024-45540,0,0,3b439f2cae01051944a5f696ba0864d4b974ea9419a29927960f84dc28dac98f,2025-04-07T11:15:48.793000
CVE-2024-45541,0,0,7bc24c44f4f9bd7697d862f7d910f24b6bebcc62d1e5328093c22ff5b5ee1516,2025-01-13T21:50:41.947000
CVE-2024-45542,0,0,544927305ba1aba828ea865286fa34c1bb838eb7cbfd7cf386021b4578f770cc,2025-01-13T21:50:54.197000
CVE-2024-45543,1,1,c29c7521755eac6af60510beeb533ba6a2036a2da32296b0560ae29df7bcd769,2025-04-07T11:15:48.967000
CVE-2024-45544,1,1,7b53fc2454d632c88af471d3574c34886813f32f6c5d7fbb04c218143e5c64f7,2025-04-07T11:15:49.127000
CVE-2024-45543,0,0,c29c7521755eac6af60510beeb533ba6a2036a2da32296b0560ae29df7bcd769,2025-04-07T11:15:48.967000
CVE-2024-45544,0,0,7b53fc2454d632c88af471d3574c34886813f32f6c5d7fbb04c218143e5c64f7,2025-04-07T11:15:49.127000
CVE-2024-45546,0,0,45d0e78965279e2527d9fac31d804a2ad5a6404ea1571336157308334b299190,2025-01-13T21:50:47.413000
CVE-2024-45547,0,0,5d512f519ac50af5c2d2303fdbfb1d0aab0102e735aa75e851d06b0043ee4734,2025-01-13T21:51:01.123000
CVE-2024-45548,0,0,1ab6b9cb5f94b9efb2c033a1ed336c76093923588ef73962d79be6376d1d64da,2025-01-13T21:51:07.337000
CVE-2024-45549,1,1,9543b5d3c84677b26e6fb03ce6d4bfd3aa3981c087c588eb5469b3575d86f837,2025-04-07T11:15:49.290000
CVE-2024-45549,0,0,9543b5d3c84677b26e6fb03ce6d4bfd3aa3981c087c588eb5469b3575d86f837,2025-04-07T11:15:49.290000
CVE-2024-4555,0,0,42addb69d2a25e76680bd75ca9680f4458507a72790c92c0c02ea27cb2860a95,2024-09-12T15:13:25.520000
CVE-2024-45550,0,0,a4972bc0de06d20bcb20a737d9e8c081db8380caa2905028e2db10cf8468771f,2025-01-13T21:51:13.887000
CVE-2024-45551,1,1,489aee46175586f4c3c953ec980854a62174a10c0dfeafd975924b9b6e655877,2025-04-07T11:15:49.477000
CVE-2024-45552,1,1,ab21c33debc8771ecc50f95617730e4c42273119d7248351f4a415d045eed3bc,2025-04-07T11:15:49.667000
CVE-2024-45551,0,0,489aee46175586f4c3c953ec980854a62174a10c0dfeafd975924b9b6e655877,2025-04-07T11:15:49.477000
CVE-2024-45552,0,0,ab21c33debc8771ecc50f95617730e4c42273119d7248351f4a415d045eed3bc,2025-04-07T11:15:49.667000
CVE-2024-45553,0,0,7fc1115fcc4cbae9ef381abdf5e17528d41d4f9e9e105e72ca41b105ea39f881,2025-01-13T21:51:19.557000
CVE-2024-45555,0,0,37d9964aa5a5598b86f51c3b20f7264cb39cb234f7fce44f158d3bfa241e58c9,2025-01-13T21:51:26.350000
CVE-2024-45556,1,1,159ebb5ae7d033cfedf9c37f95e869e48a0ebaa761a6000559109fa6fd1dcde0,2025-04-07T11:15:49.850000
CVE-2024-45557,1,1,660ba3f7864485f44611fa0c53c94be6fa35313fdb3bfa34922044ec2431fb96,2025-04-07T11:15:50.020000
CVE-2024-45556,0,0,159ebb5ae7d033cfedf9c37f95e869e48a0ebaa761a6000559109fa6fd1dcde0,2025-04-07T11:15:49.850000
CVE-2024-45557,0,0,660ba3f7864485f44611fa0c53c94be6fa35313fdb3bfa34922044ec2431fb96,2025-04-07T11:15:50.020000
CVE-2024-45558,0,0,b9999ea78a1f11bf4fc1fe70871249484c10ee1e56b900705f3a520779ba736c,2025-01-13T21:26:05.320000
CVE-2024-45559,0,0,cc245f066c5b0f42456e436b7037643fb918a30c87be08fac8ad402ca0ee763c,2025-01-13T21:26:24.027000
CVE-2024-4556,0,0,d3c0d9c7da9d7922d293ea55522a02a915493dd034ff9fc52c8d9c8976cd2d90,2024-09-12T15:09:55.107000
@ -271741,7 +271741,7 @@ CVE-2024-49839,0,0,e4adae2e6a6fd99d4a1ef07f5bb8c358f7fb67c7e6ba84888990afb4dab67
CVE-2024-4984,0,0,40ebe34593a184b2b9329b2374e9578e3a0bebaa278e1231c45c34e446e4dc36,2024-11-21T09:44:00.193000
CVE-2024-49840,0,0,052415f7244c1013f825344c4809807def2c067feeabb1b1cf5faec319fcef68,2025-02-05T16:02:18.927000
CVE-2024-49843,0,0,9b68fa5c3475ce67325f4140b70e30137faf7f9305d06abaad2366991e2a645e,2025-02-05T16:02:11.837000
CVE-2024-49848,1,1,c8ad58059fa2b91169cc99a0c4b77bbe3e2b3d4ddf4fc7c0525d59410b443ea4,2025-04-07T11:15:50.183000
CVE-2024-49848,0,0,c8ad58059fa2b91169cc99a0c4b77bbe3e2b3d4ddf4fc7c0525d59410b443ea4,2025-04-07T11:15:50.183000
CVE-2024-49849,0,0,4c197046e42110980b5301c4c35d8eb0ed58e6313d8c00bfbed7bed4a77a071a,2024-12-10T14:30:44.780000
CVE-2024-4985,0,0,fc8c0365ee2b64c353c64b1a67bd27d7de7a0e1e77bbc681619c3fe31e9edf60,2024-11-21T09:44:00.330000
CVE-2024-49850,0,0,b081475e1ca3af47ff915ab2d360bfee7d39229960d37f8c28496a17f22b8519,2024-10-22T16:12:14.193000
@ -275376,7 +275376,7 @@ CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d73
CVE-2024-5460,0,0,d1df8428a10a618dacc511f1783e341e208a5618919dfcb93f031b38621f5972,2025-02-04T15:24:36.480000
CVE-2024-5461,0,0,0e5c35015ef9c17a01014ad8587e8a058a39ac46cc767abd7817343a80dc0b2e,2025-02-15T00:15:13.513000
CVE-2024-5462,0,0,d4f147823b82222903b9d9bf51249493cafff25daa3597a42629662406d9f68b,2025-02-15T00:15:13.650000
CVE-2024-5463,0,0,113aff91033cb1cb7c353ce7e22b0cbd622856846d0128375c498a441530fd0a,2025-03-04T18:43:31.607000
CVE-2024-5463,0,1,b24b8d78523e42c0a180af4d8a43e8593c6b5e1f71c3c301d74d6192884c071f,2025-03-04T18:43:31.607000
CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce5d,2024-11-21T09:47:43.990000
CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000
CVE-2024-54658,0,0,2ae5e1e473d9853fb3d9a8ce3b95078d5f42520f037bb2207ff10526f7c0240a,2025-03-19T18:15:23.533000
@ -281153,6 +281153,7 @@ CVE-2024-9999,0,0,cad7c92a380ae514b71a1dd06f3b79a139ea65cb773110d32be2b942d72ae5
CVE-2025-0001,0,0,0b53097bff1778de9231713dab9a655e96b466d52a15df3f132fe8a8a77a7f52,2025-02-17T10:15:08.550000
CVE-2025-0014,0,0,5c97a8ddbb8633a344f6dd9b44735740d1415560a2ebca2945d027989fbee2c7,2025-04-02T17:15:41.183000
CVE-2025-0015,0,0,321b388b66a6f24115764aad9373a5b4540cea827bc5f4a9ec4c99c3ab51602a,2025-02-03T16:15:33.770000
CVE-2025-0050,1,1,7f6626770e0950243a41e91e8473e458a114045f56ef7e8dd8b2d6082147a644,2025-04-07T12:15:15.360000
CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000
CVE-2025-0054,0,0,b8bc9804913976424582a72964eb068b4365d1e22607e5b0c46a2e77e3b25525,2025-02-18T18:15:28.260000
CVE-2025-0055,0,0,0e89795bc87c51adbc679d78b37bf974fd01b97679ad0635934ee83322d4b078,2025-01-14T01:15:15.570000
@ -283073,26 +283074,26 @@ CVE-2025-21417,0,0,2747c56c84381d3763059eec5080d6fa07a433b2e87fb1f1180b0a0554555
CVE-2025-21418,0,0,286c461de95fba525ffd95fe19188a97b0613df56bf1afe14ca9be4aa494d718,2025-02-12T18:14:34.870000
CVE-2025-21419,0,0,acdb4d37a32faa1cb0f65f0fbb7358475e2deb811438263e59eb8f6bcbeca8e1,2025-02-14T17:32:53.087000
CVE-2025-21420,0,0,32a7e46f27d290c0e9a5b92e079c0424752a30e3cfa9e5d424062d7af6a66d41,2025-02-14T17:36:09.683000
CVE-2025-21421,1,1,1a46ed7cf07f9de4724f071bb37dbb4e1550f91a3632631fd962b71f25d16ffe,2025-04-07T11:15:50.360000
CVE-2025-21423,1,1,dedf91ac6986422add6113c12c7e5a4d806b88a2a00cca492dcfa56cca368ae2,2025-04-07T11:15:50.533000
CVE-2025-21421,0,0,1a46ed7cf07f9de4724f071bb37dbb4e1550f91a3632631fd962b71f25d16ffe,2025-04-07T11:15:50.360000
CVE-2025-21423,0,0,dedf91ac6986422add6113c12c7e5a4d806b88a2a00cca492dcfa56cca368ae2,2025-04-07T11:15:50.533000
CVE-2025-21424,0,0,3a83225b8d2edd7b934464a21b7f49bd35353b067d8247c64049e806cfc35f96,2025-03-07T14:12:17.933000
CVE-2025-21425,1,1,6f0d5fb1c50cd307365da059dba6aca3d875166dd617d5e7bbb17fd1532dc336,2025-04-07T11:15:50.697000
CVE-2025-21428,1,1,8c26d198e24ea5b609d7bdbc3e4d45b736836578fec0a01cdda276546e5dc31b,2025-04-07T11:15:50.870000
CVE-2025-21429,1,1,8573dff694ea2a4f98448779e43dac41635fbc7720e245dab3282b51d0939754,2025-04-07T11:15:51.047000
CVE-2025-21430,1,1,6a8a047f38812c42d770761b756fafdbe98abe1bf7ecdf71558385df444ed029,2025-04-07T11:15:51.220000
CVE-2025-21431,1,1,648e005d741d450e848b9310483c0ebe1250f9bd8b1fa41de87bbebfbd110c42,2025-04-07T11:15:51.440000
CVE-2025-21434,1,1,635174305db6afcee37cef7fcc7af374cdfb03a0db0e353b457ad392ff531ab9,2025-04-07T11:15:51.600000
CVE-2025-21435,1,1,0ceaaa23e2ab6fc99ed59c3651ea0bd3af26d4472f6e464da9891f1ecde20258,2025-04-07T11:15:51.783000
CVE-2025-21436,1,1,79d419af1611043f95fbcb5adb4ee5127098dd02d8ce40f9ac775d3a9a2d8fb1,2025-04-07T11:15:51.970000
CVE-2025-21437,1,1,b855710238f265a838c007c4e5fb426d6f3579d501d0a7ec413f577ab097922c,2025-04-07T11:15:52.123000
CVE-2025-21438,1,1,9b420b8ad14340f0c0819330dacb4d92d2c77c319bc0ceafff9878463ccf4cbc,2025-04-07T11:15:52.290000
CVE-2025-21439,1,1,6e6203aea263f99523af1c4fcf2019a42bfbabb92f3dced4725180734a958293,2025-04-07T11:15:52.457000
CVE-2025-21440,1,1,bcaaacbf58306a490c300ae3e9c65f4dbcd0505db259126c0f0f42af75a62e20,2025-04-07T11:15:52.613000
CVE-2025-21441,1,1,24004244400868cf299ed4860573968dd367a12d79eaad13ec9dee6c4f9a05be,2025-04-07T11:15:52.777000
CVE-2025-21442,1,1,4035b9edc609f89c255c31e809ab5b219913d53114b2012078d979018db00a68,2025-04-07T11:15:52.933000
CVE-2025-21443,1,1,722d70108e38beaa2973edd82097cd0c9da8ed023d32a9c269a043cee455dd62,2025-04-07T11:15:53.087000
CVE-2025-21447,1,1,5a8882d174d3df5b74061e596133503ed451acb5ad60dc1a3367bf81f45766c3,2025-04-07T11:15:53.243000
CVE-2025-21448,1,1,06c61c0ee17a661d1b5ffb46efd93f30314c79757cc37fc82e2e965a2c203658,2025-04-07T11:15:53.397000
CVE-2025-21425,0,0,6f0d5fb1c50cd307365da059dba6aca3d875166dd617d5e7bbb17fd1532dc336,2025-04-07T11:15:50.697000
CVE-2025-21428,0,0,8c26d198e24ea5b609d7bdbc3e4d45b736836578fec0a01cdda276546e5dc31b,2025-04-07T11:15:50.870000
CVE-2025-21429,0,0,8573dff694ea2a4f98448779e43dac41635fbc7720e245dab3282b51d0939754,2025-04-07T11:15:51.047000
CVE-2025-21430,0,0,6a8a047f38812c42d770761b756fafdbe98abe1bf7ecdf71558385df444ed029,2025-04-07T11:15:51.220000
CVE-2025-21431,0,0,648e005d741d450e848b9310483c0ebe1250f9bd8b1fa41de87bbebfbd110c42,2025-04-07T11:15:51.440000
CVE-2025-21434,0,0,635174305db6afcee37cef7fcc7af374cdfb03a0db0e353b457ad392ff531ab9,2025-04-07T11:15:51.600000
CVE-2025-21435,0,0,0ceaaa23e2ab6fc99ed59c3651ea0bd3af26d4472f6e464da9891f1ecde20258,2025-04-07T11:15:51.783000
CVE-2025-21436,0,0,79d419af1611043f95fbcb5adb4ee5127098dd02d8ce40f9ac775d3a9a2d8fb1,2025-04-07T11:15:51.970000
CVE-2025-21437,0,0,b855710238f265a838c007c4e5fb426d6f3579d501d0a7ec413f577ab097922c,2025-04-07T11:15:52.123000
CVE-2025-21438,0,0,9b420b8ad14340f0c0819330dacb4d92d2c77c319bc0ceafff9878463ccf4cbc,2025-04-07T11:15:52.290000
CVE-2025-21439,0,0,6e6203aea263f99523af1c4fcf2019a42bfbabb92f3dced4725180734a958293,2025-04-07T11:15:52.457000
CVE-2025-21440,0,0,bcaaacbf58306a490c300ae3e9c65f4dbcd0505db259126c0f0f42af75a62e20,2025-04-07T11:15:52.613000
CVE-2025-21441,0,0,24004244400868cf299ed4860573968dd367a12d79eaad13ec9dee6c4f9a05be,2025-04-07T11:15:52.777000
CVE-2025-21442,0,0,4035b9edc609f89c255c31e809ab5b219913d53114b2012078d979018db00a68,2025-04-07T11:15:52.933000
CVE-2025-21443,0,0,722d70108e38beaa2973edd82097cd0c9da8ed023d32a9c269a043cee455dd62,2025-04-07T11:15:53.087000
CVE-2025-21447,0,0,5a8882d174d3df5b74061e596133503ed451acb5ad60dc1a3367bf81f45766c3,2025-04-07T11:15:53.243000
CVE-2025-21448,0,0,06c61c0ee17a661d1b5ffb46efd93f30314c79757cc37fc82e2e965a2c203658,2025-04-07T11:15:53.397000
CVE-2025-2147,0,0,8d64955bcd54c9e90fd3d983c30c955ed78fbb149aa1e8a8da2ca80431331131,2025-03-24T14:30:40.943000
CVE-2025-2148,0,0,d4190a3f054e2420a8d60bda0390077417613c29dc75da593352ca97816f8b9e,2025-03-10T14:15:26.130000
CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000
@ -285172,42 +285173,42 @@ CVE-2025-24185,0,0,4871c0df3d7d219e1401394d7ec6a4eaa7d737d02980f30e101a34eb820fd
CVE-2025-2419,0,0,153707543e9bc32e5fdb338510a7c29ac05b7b4717e1a9871d5ed8414730714f,2025-03-18T14:15:45.067000
CVE-2025-24190,0,0,909fc3fcab3f56a4a6e43129ca56781207bfb76ef21dcaa28ac91490f6b231a6,2025-04-01T20:26:22.890000
CVE-2025-24191,0,0,70b077b59fb6872846684df55d5bb8024ad6bab473a53621155ca2da3a09c8f5,2025-04-04T18:24:52.147000
CVE-2025-24192,0,0,a58f0bd0dcc29dcea121e843f6744c606af12c56b92420490b4424c02e8f81ce,2025-04-01T20:26:22.890000
CVE-2025-24193,0,0,85d86826046c74a3a92df4109acf5fd80a776edd0c5c6152fb7ab85f1ff5ffcc,2025-04-01T20:26:22.890000
CVE-2025-24194,0,0,3d9037f6c65de8bb0f966f71cedc343022bb007d10b1fdc2bf7d155439482ea0,2025-04-02T16:17:41.203000
CVE-2025-24195,0,0,de39b9444b85c0c8de39f44ef1e56980eb68aa475d664a2cefc4170992452043,2025-04-01T20:26:22.890000
CVE-2025-24196,0,0,dd8bfac1a128d80c0de5d6835408224affa1112c8a7ccdb5e2803b6062998d2d,2025-04-01T21:15:42.420000
CVE-2025-24198,0,0,9a8e2c8e559db7901f4b442db0db49d42bc559027854a720df732a16c592ed0b,2025-04-01T20:26:22.890000
CVE-2025-24199,0,0,b7b1539130c664dd05fc859f7b9f82f8e4b4c249803ce983db5205b76b388908,2025-04-01T20:26:22.890000
CVE-2025-24192,0,1,ee1f07d2cba952304df25437faae60feabf9716560146378b8f5618aee1073ec,2025-04-01T20:26:22.890000
CVE-2025-24193,0,1,ba576c453996d0b4d5fde71404eef4705c98b870947ba1c05c65f42287193054,2025-04-01T20:26:22.890000
CVE-2025-24194,0,1,a0b361883e351a53ee4c04c87f642b54d27a5a7a1c2018dc1527e9c80cab1f22,2025-04-02T16:17:41.203000
CVE-2025-24195,0,1,81583b5bf12388481e86c8fd25067312015d41ae1703d6e8bba5d756dfbbd036,2025-04-01T20:26:22.890000
CVE-2025-24196,0,1,34c463723f4a052669a1ac9b40ad43efbfe4fd4e1f6c21db1dd10d588fa6da91,2025-04-01T21:15:42.420000
CVE-2025-24198,0,1,4227721e88630e21162e18a11e5282e19ce032cd386f5ada78c23201dc850161,2025-04-01T20:26:22.890000
CVE-2025-24199,0,1,3f7bb3dd70f62322776c640125327f5e42f891f077dc1d5c3f758b62bef5bcff,2025-04-01T20:26:22.890000
CVE-2025-2420,0,0,759a643dd7e1d79c15a36f7d4a45610b663ab71ad52795fbc850f2e2b83fa384,2025-03-18T13:15:37.770000
CVE-2025-24200,0,0,749aa357d1c7f24174764de48a9dbb69fce15ac4bc539d3a8708e99314c3972a,2025-04-02T20:33:13.233000
CVE-2025-24201,0,0,1cb6d0eda651a05a5a43d80c0ce591daf0b58117cc08a1188cab7f3b5f75f28d,2025-04-02T20:33:42.653000
CVE-2025-24202,0,0,2b7cb2221cdb2ba8dece8d61f82f6424a5b42c3021ee727b637bcd14cdeb7863,2025-04-01T20:26:22.890000
CVE-2025-24203,0,0,da3868a701feefefd8c7741ed5d8fc5d414a41762accf68d3589a32766abfc6b,2025-04-01T20:26:22.890000
CVE-2025-24202,0,1,eb647c5434609802c9e978ec9af9da9889a5d2230d53ebe85671424826242c28,2025-04-01T20:26:22.890000
CVE-2025-24203,0,1,a3f9a09baf0eac88681fdc4a67973b3c8bfd4f9d7ff9ab90f66f1b9dfb2bd4ac,2025-04-01T20:26:22.890000
CVE-2025-24204,0,0,5dcbcc8f0f20f44f386df15e8a1c1dce75589cb456c483a8817eed9932ff4f6e,2025-04-04T18:20:38.460000
CVE-2025-24205,0,0,6fadd3e3676e6553f6aeed265ad38233d9709b8725a61efd3c17bd53e0c0923a,2025-04-02T16:17:41.380000
CVE-2025-24207,0,0,e9d1c8f85e36821a0fb77d6184054c419339063ef36079af9ab74844c3476cd2,2025-04-01T21:15:42.580000
CVE-2025-24208,0,0,3480dece639c840210d6cbb8eb531059de4983c5b4ebef5bbcd8a491c8144454,2025-04-01T21:15:42.757000
CVE-2025-24209,0,0,67b8a01b4412124d49959fe7bb9b12a30ed4c7ba4bb0968a2edd523005eb59cb,2025-04-01T20:26:22.890000
CVE-2025-24210,0,0,04833cd1d2dcdd85f6f46f3728e6c1582ef1098dc19c3a292b137e43fc0bb0c2,2025-04-01T20:26:22.890000
CVE-2025-24211,0,0,0771157bcb8b39267a175858c8148b45b4b1085d576b2f3f713ae339231075a0,2025-04-01T21:15:42.897000
CVE-2025-24212,0,0,26157d0780f0499b511892c79aa4643a37ae73b832a4f3b5c499fa3b3aab941b,2025-04-02T14:16:04.270000
CVE-2025-24213,0,0,1ead9077438f3f1867df4a01fae0cd260fd37df069a38051957fc95e0d1cb6ea,2025-04-03T18:15:44.770000
CVE-2025-24214,0,0,0f1fcc3f4a137f76a1dc58373cfaaedd9071618d2c0daed70f15d43a0f6d1e45,2025-04-01T20:26:22.890000
CVE-2025-24215,0,0,07fb76ffc84035e69bcf83a4df22ac8203df7845a1d736d7e6b232124f0f86e8,2025-04-01T20:26:22.890000
CVE-2025-24216,0,0,44b71cf285f8648b2dd5f9805be94e6eb5bb137559fefdfc87774c1520c0ebb3,2025-04-03T21:15:39.373000
CVE-2025-24217,0,0,5b60946ff61cf2080385fa0b1989e613a251700fbe8f7d875adc4c496ccbe901,2025-04-01T20:26:22.890000
CVE-2025-24218,0,0,1eae9e32ce19500bc6747aae15178826c25f975aae907cf59eb7c346c329b7bd,2025-04-01T20:26:22.890000
CVE-2025-24221,0,0,fe2a7be171b044a18b7aad5da0148fcd4e1fa54fba59f6221bb4404a606c1279,2025-04-02T14:16:04.507000
CVE-2025-24205,0,1,d98bf4fae997b11cb871b381746d059aeb2efd160d26a3cad925c91161b031c5,2025-04-02T16:17:41.380000
CVE-2025-24207,0,1,c7bfaef550d4996315704a0633d0f495d6bd0e0f46b1a1c9a0a393cb650bcadb,2025-04-01T21:15:42.580000
CVE-2025-24208,0,1,7b896dfa2c976de0ffbc003c67f622881a7a33edddbdd68d88aed0f66cc63453,2025-04-01T21:15:42.757000
CVE-2025-24209,0,1,0d590fd9cb7d930fcd886de1ab46db778151cfcfc74035a94b7ed1d030113052,2025-04-01T20:26:22.890000
CVE-2025-24210,0,1,7355814d761e2e75a569b3b8148f037b4e2ff3934e2ee5322b3debee0d554ed2,2025-04-01T20:26:22.890000
CVE-2025-24211,0,1,1299e3955e08a53d45c216c23b8e10e03c0bdc5943eae5fdbd3b4e8404306e46,2025-04-01T21:15:42.897000
CVE-2025-24212,0,1,e1be1010f74290c2f2c6df69604b037971a5976bedbcdfad4f484982883d36e8,2025-04-02T14:16:04.270000
CVE-2025-24213,0,1,886ccb4f1523610698ada21bc020a8ee6b81aedca4511434b560aee099cfe004,2025-04-03T18:15:44.770000
CVE-2025-24214,0,1,c086cc19c98c32370055c38c5134d8f3080e9df5b0418ae88a31783911fb0ab3,2025-04-01T20:26:22.890000
CVE-2025-24215,0,1,65428943713be8a005337b33e5c1309d72acd2346a337b0b42541fcfc77792cf,2025-04-01T20:26:22.890000
CVE-2025-24216,0,1,bd2834e73891ab74bfa09311800e8ebaaa54e1e04e0126eb6a4dd1b019ece5dd,2025-04-03T21:15:39.373000
CVE-2025-24217,0,1,8a0924d07d1f86250963e5000cee22db0390a13bd36a0e6c4a49a06fc26e7f63,2025-04-01T20:26:22.890000
CVE-2025-24218,0,1,9f5704f2f444444c03a7337084f0a271d4c4faf757d7a9254cbfb3d990dcd0ad,2025-04-01T20:26:22.890000
CVE-2025-24221,0,1,a24e74d49d5681e81a91f0aedbb72c222b04d20454153e341951a42ea59e8df8,2025-04-02T14:16:04.507000
CVE-2025-24226,0,0,b30ef21852bbf23b107ad0db09b90bb3e97ca9a52198eebb15d52a72752f0f26,2025-04-04T18:21:46.567000
CVE-2025-24228,0,0,0682ea9cc8d158874891386ed6f236a448b44a58a7432ca800fb49bba4f8ae66,2025-04-01T20:26:22.890000
CVE-2025-24229,0,0,e80f8313d932b2359cc47d30731c55191722d487b8bc17c5824ac86e7e1af040,2025-04-01T20:26:22.890000
CVE-2025-24228,0,1,4b7d66061e7715a52ec6e22041d149d69dfad757964e97ff7a76bc247673181b,2025-04-01T20:26:22.890000
CVE-2025-24229,0,1,4095c1a5305e2509985724ab171d929dc46d25d8e1a858263974f12daddd4ece,2025-04-01T20:26:22.890000
CVE-2025-24230,0,0,c6f238a0a3b7d00915209ed792ddeafea71970bf3b666bc266a73753e585b00c,2025-04-02T14:16:04.680000
CVE-2025-24231,0,0,e812ae93ea0802283d6f151efcce81026a85e391ca5cb344078f9d404ac5936f,2025-04-01T20:26:22.890000
CVE-2025-24232,0,0,c930ff70002faf4f8d8359df165f92ec18b3c6c1c258e6463c792b9bb9b34325,2025-04-01T20:26:22.890000
CVE-2025-24233,0,0,c49a8d10414fb99c6f94c7c63aee6102f698e2c458dcdfe8a93be4bb7447a0ef,2025-04-01T20:26:22.890000
CVE-2025-24234,0,0,00319238de00a6841774394cdb4e95500b63f71cb14160650f343f81875ecbec,2025-04-01T20:26:22.890000
CVE-2025-24235,0,0,6b09348a77477dd81f798405383da8e5e4a0cf914e73d5de207d45c86653a813,2025-04-01T20:26:22.890000
CVE-2025-24235,0,1,5eabd07812f933eef8a1453948e29bf15c3eecaba86449598f61f5b9fa100278,2025-04-01T20:26:22.890000
CVE-2025-24236,0,0,6f35aae8e5b2275b2c69183ab7776a716442e803a5454ae85f2994d6ce98630e,2025-04-04T17:11:53.263000
CVE-2025-24237,0,0,27bd8aec1cacbdda457d4c54321da7772780a885b84dc379b0850dfb4a03a57f,2025-04-04T17:11:50.760000
CVE-2025-24238,0,0,eb385efe8cda4bf9f1c35756a77fb4af48f89427c693cc6ce5f1501ae0be4d28,2025-04-04T17:12:14.453000
@ -285216,21 +285217,21 @@ CVE-2025-24240,0,0,31e1fbc4a9906522b59d5426cc41c13b0cc9baa11bbcd68e50f13950436aa
CVE-2025-24241,0,0,a279cf4c641bb9c3ca243836a9cfff64caa6f150180c868bc752ebe35d2580ea,2025-04-04T17:12:47.040000
CVE-2025-24242,0,0,7198a4ff47a69ba0a9fd45b2c507b49c3ac18f25e906b0f7d0919752e8bf374f,2025-04-04T17:13:00.923000
CVE-2025-24243,0,0,5bf36f24ae0ea02424f9ce04bcb14c5dbe8f60f4ca7ebf1e755395b0487a5c5e,2025-04-04T17:13:15.023000
CVE-2025-24244,0,0,aa8216b7c526d909646287a678f19eb0a4c74f63dbedb6e3f9816bce9375d8e0,2025-04-02T16:17:41.717000
CVE-2025-24244,0,1,35fdd1fc29044bec0e234744d0b34f378e5fa7ec39165412d9a4e2e05b72bbbd,2025-04-02T16:17:41.717000
CVE-2025-24245,0,0,726bb616fd36c53c5e8e1d9a6405098822a15a2e9f18cf06a92a2b835cd77581,2025-04-04T18:24:35.563000
CVE-2025-24246,0,0,4c1c877540723e60e5944458a5aa9e39161e712e8a3a8067e2a1e5e25957ec64,2025-04-01T21:15:43.040000
CVE-2025-24247,0,0,59555ba19abf57fce5ae14db87534c22e381c032a8ea5b1a4f5b2e84c6d6b721,2025-04-01T20:26:22.890000
CVE-2025-24246,0,1,843a424cd1888295fe208cbd1ad01be127a6ba8f27dfab2f9a1af5142677e146,2025-04-01T21:15:43.040000
CVE-2025-24247,0,1,cd43def14d19ddb3c6d3c9d05bc5cbfdc51f8131002a95fdc01db942bd421e6f,2025-04-01T20:26:22.890000
CVE-2025-24248,0,0,2888532025229541b660a3aeb97018da3b2d5f4bd38a2cee849343873235a5dc,2025-04-04T18:24:20.717000
CVE-2025-24249,0,0,ef5a9945cb5f5987170c3c49a5b54d37f318974a0224d422b7f0b9154ecd3027,2025-04-01T21:15:43.183000
CVE-2025-24250,0,0,c28f0f56c48215e5b6b839bd92835127561679d27bd6236d3986a54a4fd03d0e,2025-04-01T21:15:43.330000
CVE-2025-24253,0,0,78470b1727e3850c13a71f527dcdf5a48a8655399b205341b702ac31f4ac8e9c,2025-04-01T20:26:22.890000
CVE-2025-24254,0,0,1c4f96c6f6d7d4db098d580e58b9ac31a68428ff32af6a8b3c66753efb7f7dfd,2025-04-01T20:26:22.890000
CVE-2025-24255,0,0,1d1807c301eb4918f313c995b93c1e89af4b7f820beff779c931323107b52d99,2025-04-01T20:26:22.890000
CVE-2025-24256,0,0,0696ca57a40bd0a1f0928e4113c998421f4baa2c2e5bb33f2b58b0c9d96decd9,2025-04-01T20:26:22.890000
CVE-2025-24257,0,0,822a2912608e4be54fc31d8140f141172378fcf97c0b590e45b75ba4cf4c850b,2025-04-03T14:15:31.043000
CVE-2025-24259,0,0,e9e8ae34c0f6727f275f333ca2e4d4790f4b758b0b79515495a7bd7071b86a0b,2025-04-01T20:26:22.890000
CVE-2025-24260,0,0,fc9cd5cbfdc0102679c8bb8134a8ae9e4c7e485c0efafc726e6182386e7de118,2025-04-01T20:26:22.890000
CVE-2025-24261,0,0,afa9c10ebbdee1cca43489bd0f5b742d2cf9b184fd96737bc0185a2d69682a16,2025-04-02T16:17:41.877000
CVE-2025-24249,0,1,3dd1f2c2d36235f90a5b011ad0ed2127e4a4b2555eabaa586d558edfc966694e,2025-04-01T21:15:43.183000
CVE-2025-24250,0,1,d7efbec8af4c0ad0a81bc8e24058ec435454a01ad4909974edffa1197a9199dd,2025-04-01T21:15:43.330000
CVE-2025-24253,0,1,1687cffcaca9e116d2e250affba56fb788a0cc6108b0cd333405c621460018df,2025-04-01T20:26:22.890000
CVE-2025-24254,0,1,3e956fa57fc33eee1b8249561afff1a505c12d0fb65e680ad09e9ce18b950642,2025-04-01T20:26:22.890000
CVE-2025-24255,0,1,c769c760b71db36aa4a16720f8a976775c8a1e54d16149d69d38bafbf1249861,2025-04-01T20:26:22.890000
CVE-2025-24256,0,1,6f4ca649299f5569759801053203dd6e1a2c0f53e6774df6fbda137455042e43,2025-04-01T20:26:22.890000
CVE-2025-24257,0,1,be67cdf99ec630632db172354940607fd65cdda4926bb5432c1c771b5eab02b6,2025-04-03T14:15:31.043000
CVE-2025-24259,0,1,cc006e3941dfe709a11fc1faebf6ece5087f0389ccf9801cc14c4eea2aa96d4a,2025-04-01T20:26:22.890000
CVE-2025-24260,0,1,934a7a9b01ba2e0ac8a59aa2ba9aecd5c2ff58057ea62198a81bba5c4ef18ef1,2025-04-01T20:26:22.890000
CVE-2025-24261,0,1,51d607cc95611ecfba003ac720c144da943978caa3ae3b2f71763652cfa3aa5d,2025-04-02T16:17:41.877000
CVE-2025-24262,0,0,3d76917582097604a5e634bf4f71c6df69377b602f1a36e0845ed48fc225e030,2025-04-04T18:24:08.693000
CVE-2025-24263,0,0,b22d00ad9123f8055683c07743d9bd481ce65ffc5d5b226b870bbaf0cb77b38d,2025-04-04T18:23:52.100000
CVE-2025-24264,0,0,48a4bb0d460b0ba3e4c4820397b4c8b4813fe0b28dd3f3b1daa4c999448c1e0d,2025-04-04T19:00:46.457000
@ -285238,9 +285239,9 @@ CVE-2025-24265,0,0,69e5233604d5626850611ee64abbaaf7e43306a91789780d2aab9e6168a4a
CVE-2025-24266,0,0,d850a68869d3e8c7d48709e8220153768350f47108844d206efa6027d68e51c9,2025-04-04T18:55:25.553000
CVE-2025-24267,0,0,f3504fb660b96f886533b6b2e39b198d92d097550e50f76d44bfd982b4c91cd8,2025-04-04T18:53:03.830000
CVE-2025-24269,0,0,8938854dd4ab200eefc4b8f05d044fb8e4cd629a1cddad03c13bb26be51b09ca,2025-04-04T18:23:37.283000
CVE-2025-24272,0,0,6e7e1dd0d722c49b12d24c4853bcf8efc9355e71ae39e60c1ddb1f46d2df215d,2025-04-01T20:26:22.890000
CVE-2025-24273,0,0,099ac16a257666b591c09313cf9602fd4bfbc2418df4164aeda80445197c05d9,2025-04-01T20:26:22.890000
CVE-2025-24276,0,0,a6ab3f5ffdac6bf043bc3904fce8c7221c117d06f2a4b22ec361b6029ce1190e,2025-04-02T16:17:42.060000
CVE-2025-24272,0,1,99c4e0b6977542546981b29d4b215aa567e1b559e40b70534e81a738969733ce,2025-04-01T20:26:22.890000
CVE-2025-24273,0,1,8c725f6a9b36d4445a267be45be33c2d56efeb22a0aa54cfc6635d79e5e674d7,2025-04-01T20:26:22.890000
CVE-2025-24276,0,1,70f5e8b091e809ba0b19011470f784595d949b4947979d2823a1ebc36fac3ffa,2025-04-02T16:17:42.060000
CVE-2025-24277,0,0,7689e916ab1daf1bd3b71f7ef5284681f9c9f49bd75eaa1a34b5098f93a9668a,2025-04-04T19:49:08.933000
CVE-2025-24278,0,0,6e2eacf3052e7cbc2055495d37c9c6d7068989be97cae8da3a79685df107e734,2025-04-04T19:47:33.687000
CVE-2025-24279,0,0,cad0432a42d451ad48511ef95f7a14eb3e143fa7dc7f59c67bedf18885f1ce98,2025-04-01T20:26:22.890000
@ -287623,12 +287624,12 @@ CVE-2025-30258,0,0,cc431d0d4fe6a8b6881434ff2ad3ef316269606a3845b529c54a958324c9a
CVE-2025-30259,0,0,e7ad748a07d97a3ed7d8fd479d0bd66cf98f38cbfee97910d52cd90aa0d3bed9,2025-03-20T00:15:13.780000
CVE-2025-3026,0,0,1ccfc3db3fa998e9ff1cdb0d3328ce5e8b50ad41edf4870aec75e9db46dbd3f7,2025-04-01T20:26:30.593000
CVE-2025-3027,0,0,9355f1632bf438848aed82af6cf484da7a1ad46dac5db96331cc9a677136537c,2025-04-01T20:26:30.593000
CVE-2025-3028,0,0,2836ef929d4821633b0ea2bb7d61c3adc81a27d4c1f1d06ba6fb1f8ba0c8b2ad,2025-04-02T07:15:42.047000
CVE-2025-3029,0,0,6a8bed066885dbede7cebe7b38c5f85e4b07028eb69f4d86e67d8073a57fe4dd,2025-04-02T07:15:42.240000
CVE-2025-3030,0,0,99eaef6196b742210bdb375cd8045db0258b795aa60511a40f19649c201270d5,2025-04-02T07:15:42.400000
CVE-2025-3031,0,0,913d2091a71730e7191c7b914490dbb44547e01007c2aa0204514225f9840ca6,2025-04-01T20:26:11.547000
CVE-2025-3032,0,0,45018c0e8539d05ecbf4f536c0883c5aa5339f46f07ebf0a4e6b283b2be56925,2025-04-01T20:26:11.547000
CVE-2025-3033,0,0,f974a5cb11a299558b6f070e0d59ac1bbdced04ddcb4e0bd404cb65a1dfbacd9,2025-04-01T20:26:11.547000
CVE-2025-3028,0,1,4fa719e2ecab3ec0a17d5dab7733cc44842b5a90a53bb60beaa490223042a9fb,2025-04-02T07:15:42.047000
CVE-2025-3029,0,1,18abc968db62f00f40022bf813ceca55e3dc01aee6e85385d247612be2fb51b5,2025-04-02T07:15:42.240000
CVE-2025-3030,0,1,11cb8886f3602275f86bba62db4e84a08fa34829bc5640ac507014c78b38df68,2025-04-02T07:15:42.400000
CVE-2025-3031,0,1,e031b00d61b98a574554177de72dbe5455ec4cca96a2b5c9ce56307fe9205938,2025-04-01T20:26:11.547000
CVE-2025-3032,0,1,a5506c914af4be63643a889c84f960832c1c89a3a908aad1c72be0345666d7e2,2025-04-01T20:26:11.547000
CVE-2025-3033,0,1,3c01d2b3c979e86b4f438d6a9f2fbeef7453125a07046469079cd3c15c5e1201,2025-04-01T20:26:11.547000
CVE-2025-30334,0,0,caf534fd1627734422d4cc985cab7fc3cb378766099fee597920edabdedb5eb9,2025-03-20T22:15:14.453000
CVE-2025-3034,0,0,164cc1c1ef87ef60f97d94cfd24d9b02daad52a01dfca2eb60d64c35646670eb,2025-04-02T15:16:00.490000
CVE-2025-30342,0,0,a82c09d47a90d84f34fb1e813a5c0fac2da3bb3c52e4eebc7be6b04000e23625,2025-03-27T13:35:33.940000
@ -287683,20 +287684,20 @@ CVE-2025-30433,0,0,6f71c17f77a95a33ebb1e94d3dfef9c6f08286c2d2c9237283ca7fab79b9e
CVE-2025-30434,0,0,ebc68e7f01445dc8310b399489dc90a6f8fac5463d58eec28218ed8f44833277,2025-04-01T20:26:22.890000
CVE-2025-30435,0,0,a819fd3bc536b06d31e66f2dba46f170a8a82060c4083d1602e4468ee70f613f,2025-04-04T19:28:07.327000
CVE-2025-30437,0,0,0c24503326977574ab0f815363d5d51518a36fd46250ca4580863efffe2ff229,2025-04-04T19:33:46.400000
CVE-2025-30438,0,0,5e37b091eda5acd779838ef05fdda74196e7142c912dcdf0eb307fc4f5de6b74,2025-04-02T16:17:42.927000
CVE-2025-30439,0,0,73a82254afce220f4c6d9661a5990bcbdde677704ab0cf77b47fd1c6511d584c,2025-04-01T20:26:22.890000
CVE-2025-30438,0,1,81b2609c87d7967d6e60e6f5472d1d0fc467392bdf52a7b3d8413a194c75226f,2025-04-02T16:17:42.927000
CVE-2025-30439,0,1,fcdb88b54a0cf3f64699998998ea8cf5cf2ccaefc5de2c6c4f34db6617ff682c,2025-04-01T20:26:22.890000
CVE-2025-30441,0,0,0c04a93a6f174bf42d94b9b28150654c6cdebea87baad1c1bed2a17317c45cac,2025-04-04T19:40:24.640000
CVE-2025-30443,0,0,932b3b18ec745c2b2a792c286f1e8af256bc23e89d29fbb215bd590e88ff171d,2025-04-01T20:26:22.890000
CVE-2025-30444,0,0,d34d2c46b7cc42bfd15ee553b3d0a274cd034241b6bbc862e4e516372cd13022,2025-04-02T14:16:13.203000
CVE-2025-30446,0,0,8790b6eb4e57b8db9f3d86b2b6b7d83a1a5104f925a43c9ec939c8c6995882a4,2025-04-01T20:26:22.890000
CVE-2025-30447,0,0,237dbe9402f62a7486f16b1d09b7e4786ec6fdf28414a466fde6c687314bb0e5,2025-04-01T20:26:22.890000
CVE-2025-30449,0,0,9508fcfb3134f072500474d4eb13734d9ef2b119129d96bcac9b8fac5ebf5a05,2025-04-03T18:15:45.357000
CVE-2025-30443,0,1,b83ff3b6d97b7b26e8e596dd682b1363434bb839dbce2f4738ba273bcf3c8e50,2025-04-01T20:26:22.890000
CVE-2025-30444,0,1,5fb147016e236cabb48b47cbbfd70a9e8b05c504934db59775ee819b48949b5d,2025-04-02T14:16:13.203000
CVE-2025-30446,0,1,fad4d26b5d4ae94812fd466886b763c48fd7e22c60b658669925c241ad6d69a5,2025-04-01T20:26:22.890000
CVE-2025-30447,0,1,224c249cbee75db0bac000ce6316b7cbc430caf4f96b51dbc25b7e0331e9d8ab,2025-04-01T20:26:22.890000
CVE-2025-30449,0,1,210ffa9dedb9127f4cf06550241e08b952ffb40a1ffaccfd71d274287b32fd7e,2025-04-03T18:15:45.357000
CVE-2025-3045,0,0,d1bb69c29a142292c5068648f022094677578a135ca579006924bfb19a4ea68a,2025-04-01T20:26:11.547000
CVE-2025-30450,0,0,eb6ccf232b67c24883a0d3a839bee58ad5ab048c533d6cb6cd99c6f9851e4aca,2025-04-01T20:26:22.890000
CVE-2025-30450,0,1,a82e950626eebfd524755275e586bbd396e85abae8fbd3bec837ff9127bfcfb8,2025-04-01T20:26:22.890000
CVE-2025-30451,0,0,a58165541c3f501bbc882a86fac75fc8ba8f191c9a6326ff9e9bcbfeb1b29f2f,2025-04-04T19:41:29.893000
CVE-2025-30452,0,0,1efd239c821d515f19f352abde330ebff233606e55b12bb9ebf573ccfdc85938,2025-04-02T14:16:13.400000
CVE-2025-30454,0,0,47c09e5bc46b9edf4e1f5c1c4e1e4a1d9da94a40ad41215b663ab07539d05720,2025-04-01T20:26:11.547000
CVE-2025-30455,0,0,c047560985dc14264d844d7220e69242357f952dfe9c411f36f032f55b9ad4be,2025-04-01T20:26:11.547000
CVE-2025-30452,0,1,77fbe4ced45b46f4111689abf8ae3fb93c1d49a0898dc167a84391fd4453a149,2025-04-02T14:16:13.400000
CVE-2025-30454,0,1,08b3e2921685bedea4ac7b893176a1b5006b2e346683c09cd6faaacf38a4ac51,2025-04-01T20:26:11.547000
CVE-2025-30455,0,1,5ac415298edc3bac9e768212f8345cfefeebbf0333fc9470055a8cc811912842,2025-04-01T20:26:11.547000
CVE-2025-30456,0,0,a4adbf3fb3bfda6c1ff7ac3e59f722d6890d88837b4dfbbcb9888cc15a9a477a,2025-04-04T18:13:02.067000
CVE-2025-30457,0,0,9931b57801603e5171d9b9131e7fbe4120bea818d45e3d4b53b5782cd0d5fd9e,2025-04-04T18:12:47.103000
CVE-2025-30458,0,0,d44cd0a8f35468ff3b2dcecdff85e9434b31c8f37fa6b8dfb1a82259a2d7a917,2025-04-04T18:12:42.757000
@ -287824,14 +287825,14 @@ CVE-2025-30621,0,0,8c6a6eedc9f943375208fa96aeb0d151078d5fa54598208cfb233511cfe9b
CVE-2025-30622,0,0,797c397d49f77f00a276d4088c4e3466e59efa0b6ce4fa17d94546d3a32ca074,2025-04-01T20:26:11.547000
CVE-2025-30623,0,0,a8e0620fa0eff69e53f34c91bac6562d90d04f91188fb9d1c9bfa47d4c96dabd,2025-03-27T16:44:44.143000
CVE-2025-3063,0,0,2e45f7e85b76c34e4c90c66b657feb85dadfe8fb2002194cf56059b20b804015,2025-04-02T14:58:07.527000
CVE-2025-3066,0,0,fd31618ea0039bc1c76fc5f0ad8ea6fffdb369063d756e38fca0aff4a40ff1d6,2025-04-02T14:58:07.527000
CVE-2025-3066,0,1,03f9a1bb2c29153c0948aa39cce060627d444aaf0a825fca34c07c32a4c6319c,2025-04-02T14:58:07.527000
CVE-2025-3067,0,0,137654232245c02adb3b6bc4a9fe4453e793714623555640c944c49ca758c0bb,2025-04-02T14:58:07.527000
CVE-2025-30672,0,0,3ded266990ba9009f55577f3f5d04302a5c6b8450014b92c80b83398ad23d15e,2025-04-01T20:26:11.547000
CVE-2025-30673,0,0,1cf76211fcfa10ad4c1393e8c6dafbf3bed92def83ca793b34e5eea95c528365,2025-04-01T20:26:11.547000
CVE-2025-30676,0,0,708f03a86f4c884ecda3f7ec1e5552de291778e3e25b801a6e5af963ebcc884a,2025-04-02T22:15:20.260000
CVE-2025-3068,0,0,f9a39222b61453a29b2f1a4069016bca54bcc8b63aad375ae49396e14d902dd4,2025-04-03T14:15:44.400000
CVE-2025-3069,0,0,4e389991d0ef74c06433469fc9e023b9359cbeab2c1e7d5be193ba6024cb2402,2025-04-03T14:15:44.560000
CVE-2025-3070,0,0,a4ab7f6eaf5d1ec4cd8c416cae299fae525aeec5fa932d5ba990523b9e8fa991,2025-04-03T18:15:48.053000
CVE-2025-3068,0,1,4267c1d7610ab6ed7b6514ce611c17809d366e0f57c5db370b8001fd5d0cc4bd,2025-04-03T14:15:44.400000
CVE-2025-3069,0,1,f0cdb34667db22fe3443f98ac92e43d019c02ffd04c5a9caf026e3efa3db1654,2025-04-03T14:15:44.560000
CVE-2025-3070,0,1,e9fb90d1e66be86869705d3447aa52711dbdd16a7f9894abe14e212149c50d01,2025-04-03T18:15:48.053000
CVE-2025-3071,0,0,0a9205c6ee6066c46b5ec0edfa27f1d3973a7cf68687532cc9e9610b04e77b91,2025-04-02T14:58:07.527000
CVE-2025-3072,0,0,ddcbaf040f317e06ba30451dfe0d6f628f558eec148a6cd6a3694b67994c1b8f,2025-04-02T14:58:07.527000
CVE-2025-3073,0,0,5b3691858a5f3f8c9fda3b40e4cc2efc5d5a3f5c797da0dcb3d227256f0347ec,2025-04-02T14:58:07.527000
@ -288105,7 +288106,7 @@ CVE-2025-31187,0,0,a6105b8146b15b371ec11e675e56d0f333e59f34cafc14af70a8938c57646
CVE-2025-31188,0,0,2fb0e110c15582ab5d864f4ce86dbfdd024f43772415d4f0943e5f687dee52d2,2025-04-01T20:26:11.547000
CVE-2025-3119,0,0,c1a8882c407babd47aa6ac07c5d341bee78441b1227c61448a35af71afb68fda,2025-04-03T14:15:44.840000
CVE-2025-31191,0,0,5c887fe6f1a981b5941578aba17f50355dc847fd896dda368980895a9fb92d49,2025-04-04T18:14:34.590000
CVE-2025-31192,0,0,3e73dd7a26b33015ce76fd174b2a3346c3d188eb35507b4e68c2ae4f7c78b869,2025-04-03T21:15:40.627000
CVE-2025-31192,0,1,b1f1b9e68e803aec075d3f9471c96040f99aa3ea79cd4218735ae19baeff3193,2025-04-03T21:15:40.627000
CVE-2025-31194,0,0,03f4d110302543c66a4fd7a7b9480fc20da220403b3309cb642a2155d37d36c6,2025-04-04T18:14:27.780000
CVE-2025-3120,0,0,e50a4b8e9f4394c1a251e1a65f13e688519ceb35f1a621650ebad35571a5f10d,2025-04-02T22:15:21.047000
CVE-2025-3121,0,0,94fccc916e2dadc05e6605b448acb94c41bf58e0b31c3affc5840a6a10c4cb07,2025-04-02T22:15:21.220000
@ -288826,7 +288827,13 @@ CVE-2025-3342,0,0,deace936bd60dab082139939254e85c98ae9e697787a0f1baa37e9158485a6
CVE-2025-3343,0,0,eec621cc7fe6a834a2f443ec38ca943ffb9f3e3f01ffec434c2062a598b3969b,2025-04-07T08:15:14.120000
CVE-2025-3344,0,0,a58b3ce2e11b8f4240a7e00280e9001b2c4df020b273799feb5c2d07e9000bd9,2025-04-07T09:15:16.850000
CVE-2025-3345,0,0,41b232ef3d896e76634b3ffd0199594e52e88bc75d9bb547cb22c6d0c760ff8c,2025-04-07T09:15:17.047000
CVE-2025-3346,1,1,91b87c156c3acc53e3d2e97a2510549b5bdcb338bcff8ae02b0d33c710dbacfe,2025-04-07T10:15:15.153000
CVE-2025-3347,1,1,362ac1f703b7d41342bb62308cd1097739438db98e2245f8c9a1492ed28b769b,2025-04-07T10:15:16.700000
CVE-2025-3348,1,1,b3a2aa9a4be182400caa9dc164d393014997f1a700768c39263c961ccfc43328,2025-04-07T11:15:53.607000
CVE-2025-3349,1,1,f8424661986fedd880e8b841d16614e03a25147f7bd69d554f7ac4698ce6d44b,2025-04-07T11:15:53.807000
CVE-2025-3346,0,0,91b87c156c3acc53e3d2e97a2510549b5bdcb338bcff8ae02b0d33c710dbacfe,2025-04-07T10:15:15.153000
CVE-2025-3347,0,0,362ac1f703b7d41342bb62308cd1097739438db98e2245f8c9a1492ed28b769b,2025-04-07T10:15:16.700000
CVE-2025-3348,0,0,b3a2aa9a4be182400caa9dc164d393014997f1a700768c39263c961ccfc43328,2025-04-07T11:15:53.607000
CVE-2025-3349,0,0,f8424661986fedd880e8b841d16614e03a25147f7bd69d554f7ac4698ce6d44b,2025-04-07T11:15:53.807000
CVE-2025-3350,1,1,af2523ec11c224fe7346105c887be7c9fa5c7ae52c770622f8bdfc3aed10d7d3,2025-04-07T12:15:16.100000
CVE-2025-3351,1,1,51f855cf0c07ae294f7361db699fe786559140b507918edea926b7204ea6cc22,2025-04-07T12:15:16.380000
CVE-2025-3352,1,1,ab19b1179b0591a0016ba0efd218ec53fb3572f4b619b32135d67b25a30c507c,2025-04-07T13:15:42.643000
CVE-2025-3353,1,1,4ace4eeb1ef063d06d60a9773d3100c62384c517ba90d14208bb351f0ea1ff5d,2025-04-07T13:15:43.313000
CVE-2025-3359,1,1,b3521ddf5292c867465e30bfbc36644565520aebd912672a9af17753cb6fe59b,2025-04-07T13:15:43.510000
CVE-2025-3360,1,1,5cc0539618dcb78f13c0ebba8f54f038b422ef247232ef2be9eaa6c12b8ea0d7,2025-04-07T13:15:43.687000

Can't render this file because it is too large.