Auto-Update: 2025-04-10T04:00:19.534441+00:00

This commit is contained in:
cad-safe-bot 2025-04-10 04:04:52 +00:00
parent b00d136630
commit 474cc5d6b8
11 changed files with 562 additions and 11 deletions

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-58136",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-10T03:15:17.767",
"lastModified": "2025-04-10T03:15:17.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-424"
}
]
}
],
"references": [
{
"url": "https://github.com/yiisoft/yii2/commit/40fe496eda529fd1d933b56a1022ec32d3cd0b12",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yiisoft/yii2/compare/2.0.51...2.0.52",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yiisoft/yii2/pull/20232",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yiisoft/yii2/pull/20232#issuecomment-2252459709",
"source": "cve@mitre.org"
},
{
"url": "https://www.yiiframework.com/news/709/please-upgrade-to-yii-2-0-52",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-22471",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-10T03:15:18.430",
"lastModified": "2025-04-10T03:15:18.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.1, contains an integer overflow or wraparound vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23378",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-10T03:15:18.577",
"lastModified": "2025-04-10T03:15:18.577",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.0, contains an exposure of information through directory listing vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-548"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26330",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-10T03:15:18.727",
"lastModified": "2025-04-10T03:15:18.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.1, contains an incorrect authorization vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability to access the cluster with previous privileges of a disabled user account."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26479",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-10T03:15:18.893",
"lastModified": "2025-04-10T03:15:18.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.0, contains an out-of-bounds write vulnerability. An attacker could potentially exploit this vulnerability in NFS workflows, leading to data integrity issues."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26480",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-10T03:15:19.060",
"lastModified": "2025-04-10T03:15:19.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.0.0, contains an uncontrolled resource consumption vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27690",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-10T03:15:19.210",
"lastModified": "2025-04-10T03:15:19.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1393"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-29989",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-10T02:15:30.680",
"lastModified": "2025-04-10T02:15:30.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Client Platform BIOS contains a Security Version Number Mutable to Older Versions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to BIOS upgrade denial."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.6,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1328"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000250131/dsa-2025-016",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2025-32728",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-10T02:15:30.873",
"lastModified": "2025-04-10T02:15:30.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-440"
}
]
}
],
"references": [
{
"url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/013_ssh.patch.sig",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/openssh/openssh-portable/commit/fc86875e6acb36401dfc1dfb6b628a9d1460f367",
"source": "cve@mitre.org"
},
{
"url": "https://lists.mindrot.org/pipermail/openssh-unix-dev/2025-April/041879.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.openssh.com/txt/release-10.0",
"source": "cve@mitre.org"
},
{
"url": "https://www.openssh.com/txt/release-7.4",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-10T02:00:19.468177+00:00
2025-04-10T04:00:19.534441+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-10T01:00:02.327000+00:00
2025-04-10T03:15:19.210000+00:00
```
### Last Data Feed Release
@ -33,22 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
289450
289459
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `9`
- [CVE-2024-58136](CVE-2024/CVE-2024-581xx/CVE-2024-58136.json) (`2025-04-10T03:15:17.767`)
- [CVE-2025-22471](CVE-2025/CVE-2025-224xx/CVE-2025-22471.json) (`2025-04-10T03:15:18.430`)
- [CVE-2025-23378](CVE-2025/CVE-2025-233xx/CVE-2025-23378.json) (`2025-04-10T03:15:18.577`)
- [CVE-2025-26330](CVE-2025/CVE-2025-263xx/CVE-2025-26330.json) (`2025-04-10T03:15:18.727`)
- [CVE-2025-26479](CVE-2025/CVE-2025-264xx/CVE-2025-26479.json) (`2025-04-10T03:15:18.893`)
- [CVE-2025-26480](CVE-2025/CVE-2025-264xx/CVE-2025-26480.json) (`2025-04-10T03:15:19.060`)
- [CVE-2025-27690](CVE-2025/CVE-2025-276xx/CVE-2025-27690.json) (`2025-04-10T03:15:19.210`)
- [CVE-2025-29989](CVE-2025/CVE-2025-299xx/CVE-2025-29989.json) (`2025-04-10T02:15:30.680`)
- [CVE-2025-32728](CVE-2025/CVE-2025-327xx/CVE-2025-32728.json) (`2025-04-10T02:15:30.873`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `0`
- [CVE-2024-53150](CVE-2024/CVE-2024-531xx/CVE-2024-53150.json) (`2025-04-10T01:00:02.327`)
- [CVE-2024-53197](CVE-2024/CVE-2024-531xx/CVE-2024-53197.json) (`2025-04-10T01:00:02.327`)
- [CVE-2024-55354](CVE-2024/CVE-2024-553xx/CVE-2024-55354.json) (`2025-04-10T00:15:17.633`)
## Download and Usage

View File

@ -274297,7 +274297,7 @@ CVE-2024-53147,0,0,a5545dbb75e1ea0355592ea9c5cbed6b78973df74296885178a65e66e3108
CVE-2024-53148,0,0,4b9d4dc07b7bfc2792b42b5f67199b390604698146ea12cfd91f1c4f238361d1,2024-12-24T12:15:22.887000
CVE-2024-53149,0,0,871a7de0af2c5f9581bb879b9201e108fc0359e1ac44fcd43474c16daa7bbc52,2025-01-09T16:16:21.097000
CVE-2024-5315,0,0,de62440cce89ad88de968ec49c9b880f18005db9db6b2251d35eda1462970f6b,2025-03-04T17:03:49.377000
CVE-2024-53150,0,1,a7b310b02490acfbae4d1e03befa9b7b1d499ca30746693cac9ae9505e9b7011,2025-04-10T01:00:02.327000
CVE-2024-53150,0,0,a7b310b02490acfbae4d1e03befa9b7b1d499ca30746693cac9ae9505e9b7011,2025-04-10T01:00:02.327000
CVE-2024-53151,0,0,9bcf302f86c516b6c3a19dba6dc2acf65ba01a50be814d57fdb94bd0b36b3601,2025-01-07T16:41:42.637000
CVE-2024-53152,0,0,8c8f4f476264eba0a73ea6d3f2f2e87f1734a052b6ac9dc8cfbd62726a584cb9,2024-12-24T12:15:23.353000
CVE-2024-53153,0,0,9da752cadb1a825f791ff9d8397e2b649ec7c58eaee650a673532728edacefc9,2024-12-24T12:15:23.467000
@ -274346,7 +274346,7 @@ CVE-2024-53193,0,0,b333bf0a1ebcc5426b07d57cfd07b6541896ac5e32b864e7f63c26ca6841d
CVE-2024-53194,0,0,537420a5dcc7a25d910b889c787ee26598d9e64505c29a9583444df6539bb260,2025-03-24T17:34:24.853000
CVE-2024-53195,0,0,40822fada027fbaf05987cc9ce8f2e124b2f2431fd5b4c0d0b70ffbb4d2daafa,2024-12-27T14:15:27.137000
CVE-2024-53196,0,0,669eac4dafb6edf221cee20cd1683d2b1f89e85f60c1d2407e34dd687651f534,2024-12-27T14:15:27.267000
CVE-2024-53197,0,1,25a8015c8050f443250ca1592e4c7ea8e6ed77a4cd093343684eda943cac630e,2025-04-10T01:00:02.327000
CVE-2024-53197,0,0,25a8015c8050f443250ca1592e4c7ea8e6ed77a4cd093343684eda943cac630e,2025-04-10T01:00:02.327000
CVE-2024-53198,0,0,f76e0b82729683820652f1234ba21a690c649007ef042099a42d2c297481fc8c,2024-12-27T14:15:27.497000
CVE-2024-53199,0,0,b7d164e48aa05e3c01fb8207aa331e220207154288cf87cf44ac3ccbb8685b3a,2025-01-08T21:29:46.280000
CVE-2024-53200,0,0,382e2ed7c91ff816c9972e95788547d617ab94e25d45361504cd38a28e7c4e1f,2025-01-08T21:29:35.877000
@ -275641,7 +275641,7 @@ CVE-2024-5533,0,0,6ea3c0edbbc0effb3cedc69539f40670649944720fc318b090494d3e8d8cf1
CVE-2024-55341,0,0,32b88ffcace04987952e76982ddb2fabb1fdef0b8350ead9c1b3cbef3f8f04c7,2024-12-20T20:15:23.343000
CVE-2024-55342,0,0,c1006192a9d35507b8ad981a4c836150dcbcd1afe702b76f0696b97fbea16a5c,2024-12-20T20:15:23.660000
CVE-2024-5535,0,0,b70b433a28b7d7ab0e1d2beceba590e517cc88af55d524db84cbd7ff3afa5ee3,2024-11-21T09:47:53.090000
CVE-2024-55354,0,1,24b1f2429bda7247ef87d74efe9fac09085c98cbd5de35fd2c7f2d75de2b93c9,2025-04-10T00:15:17.633000
CVE-2024-55354,0,0,24b1f2429bda7247ef87d74efe9fac09085c98cbd5de35fd2c7f2d75de2b93c9,2025-04-10T00:15:17.633000
CVE-2024-55355,0,0,2bb36a027cfc17a18c27f2dfa7ccd1dd7e44d92fe7cc55df027cf0c874369fc4,2025-01-08T01:15:07.297000
CVE-2024-55356,0,0,24a1f90c25942035af99f5d3d7ecc4294dd5cf67c67caa2d1d5b1544ce44efca,2025-01-08T01:15:07.370000
CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c0e,2024-11-21T09:47:53.307000
@ -277339,6 +277339,7 @@ CVE-2024-58130,0,0,b1da61426890522f6374bed5d854c2d8adfdac7556fa6282fde3bf2122dc7
CVE-2024-58131,0,0,bc4908e979254be0dc1e1176cc36e7e2691904c3630b2abae16ce8f2a4516d81,2025-04-08T16:45:17.107000
CVE-2024-58132,0,0,87fc99e96492ae47f7ae88aebc39cca10a37119d96d5c66e6cef7cf588ab7762,2025-04-07T14:17:50.220000
CVE-2024-58133,0,0,4511afb6f4930bee53375abc516811f9928c158d8decf5ac029097e07f67929b,2025-04-07T14:17:50.220000
CVE-2024-58136,1,1,c97d56961f170ef3b207f1eed51f0a2eff16c6f6e9a0a2d40f87ae30d7cd8370,2025-04-10T03:15:17.767000
CVE-2024-5814,0,0,409f119643711fe465e9fd028af3caf838fd31e85495ee2ac73938edab3d7b3e,2024-08-28T12:57:39.090000
CVE-2024-5815,0,0,aa6c60bd870ff05880c843bf9053a612a42ac0af7385b9bf8cbbf1b2da2f2182,2024-11-21T09:48:23.203000
CVE-2024-5816,0,0,c490583764d2ee04b708da0ed821af6513ea115f0c316a2acec1e6bc5b69b75a,2024-11-21T09:48:23.347000
@ -283914,6 +283915,7 @@ CVE-2025-22464,0,0,c7424f72b2f96418913aad9be4d15eb4eede55a90794f0ba18faa47df393f
CVE-2025-22465,0,0,59af6a83f339492193c42e44605376f3bda5aed7d0edfb5b53dc78af273645e2,2025-04-08T18:13:53.347000
CVE-2025-22466,0,0,022f7c654cc1d5121d6b3bf4597e41fb8ac9a9cb85997e032207daf34545cade,2025-04-08T18:13:53.347000
CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000
CVE-2025-22471,1,1,cbdd9e2556e650901b89f8a74ac4268eb176ef2406afa5af4a26d60b290ae954,2025-04-10T03:15:18.430000
CVE-2025-22472,0,0,da7c2c2731a1940c60b4ae6c1edcbbf175ca5a2d3964a03701282be7a86cbe41,2025-03-17T18:15:20.930000
CVE-2025-22473,0,0,24aeaee52dbfb2b3f71ea7cd4512b20455b60139bbfda5acf051e65598986ddc,2025-03-17T18:15:21.077000
CVE-2025-22474,0,0,7b533493bb2abc45b140007b331f8e070e0d340fb26cfdfa2e4140f3e95b0dc2,2025-03-17T17:15:39.170000
@ -284500,6 +284502,7 @@ CVE-2025-23368,0,0,3fba7751170fbf245919938130180b8631c2c01153566e23c5e60aa4599df
CVE-2025-23369,0,0,74f04427c8261f575e3b46a10e2c572c85dddb2e090b01cedc0f322610f8f68b,2025-02-05T19:15:45.747000
CVE-2025-2337,0,0,7d9e5607ad2b02dfc242a3305f849e66226e5392d822e3a7a605b0e9bacb542e,2025-03-17T15:15:44.983000
CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000
CVE-2025-23378,1,1,5792f1ed2441aba568a302b90913d64cf5452b36c951fa66dbe78656b90e7794,2025-04-10T03:15:18.577000
CVE-2025-2338,0,0,d6a145ee9d99f0b331d4e327057f954207c4362f81df3d1dbf4d76a1b480aa57,2025-03-17T15:15:45.113000
CVE-2025-23382,0,0,607dd91845211bbafd299e41a03d19f4efc365f4aee35f49c34ca976065bd66b,2025-03-19T16:15:30.787000
CVE-2025-23383,0,0,05837481956a127d4906ec34da8ec9db5e9ce66a3b24e855c1d9d4962621e69f,2025-03-28T18:11:40.180000
@ -286417,6 +286420,7 @@ CVE-2025-2632,0,0,96f0f9f4f7f851eba1c0fd78ad82e450d139d9699664c69c5779555eb96604
CVE-2025-26320,0,0,2c7c4543047844dc51d38a0e0844ae377a705f600f7e38264bf4c89a9fa42fbb,2025-03-05T19:15:39.173000
CVE-2025-26325,0,0,f233a1914d47e95e53a6a85e3edce01b96b7b4e30f0938bdbc0790a0c40f83bd,2025-02-28T22:15:39.927000
CVE-2025-26326,0,0,a7b5315d9a8f318981baa1be6e3a967fc5e7b504545fab3a9d502474f652f3cd,2025-03-13T16:15:27.473000
CVE-2025-26330,1,1,0f0c686d329d13961ef4d11ecbc9556ff0dd325101729167e4bd7d1e784ead5a,2025-04-10T03:15:18.727000
CVE-2025-26331,0,0,40fd15c24d286e6245c507cb84784a759d8af1e37d77f53bdfddd636b05ec98b,2025-03-07T16:15:38.650000
CVE-2025-26336,0,0,5827fed404bc6787282cb8dcdbd40edc21c9efeeca08da01ad215ced87cfa2ee,2025-03-27T16:08:17.900000
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
@ -286481,7 +286485,9 @@ CVE-2025-26466,0,0,7e41d5cb0f04df9b23d47e085939285815b80db61162a3634dbd18c39c71e
CVE-2025-2647,0,0,31fe515a44f11cf9569f888e0a91d0a688196caf010a5ad274bf1696fe7f4f4e,2025-03-27T16:26:36.977000
CVE-2025-26473,0,0,41b0bd46f32c6729eefb29a2666cce546dde395dd2362800539aebed7d4bc19a,2025-03-19T10:34:55.550000
CVE-2025-26475,0,0,4c11595a9f53aaa25545570dfec450fa96951cf66b685488bd2989725dd8947f,2025-03-19T16:15:31.030000
CVE-2025-26479,1,1,ce0bb1ef8fd890af2b3e0482a59c4605e2d57c8a9e041c3cfdff4d3dcbfd9c16,2025-04-10T03:15:18.893000
CVE-2025-2648,0,0,1e0b04231e02c958d1daf764427fee60f2d862b5e2a1ea0533e27d2313cf49b2,2025-03-27T16:27:24.183000
CVE-2025-26480,1,1,1b8ab2bfc1b880b8f03e164af03a1426065e1de2480afd0142d1cc9eb4eedae8,2025-04-10T03:15:19.060000
CVE-2025-26485,0,0,1606c27211335fac5bd91d62ee9c69aaf84877e83ad554d60c27495ea9c75e60,2025-03-19T16:15:31.257000
CVE-2025-26486,0,0,840914b82b00c0f3670423b9968b421b887ef974d79fc9288bc628a5718ff5ce,2025-03-19T16:15:31.457000
CVE-2025-2649,0,0,191c49bce019fb615b89082bea79c0c05d302c1656bab7bb247fafa5eff783a5,2025-03-27T16:28:22.013000
@ -287288,6 +287294,7 @@ CVE-2025-27684,0,0,240682932b2a460f603a664c7d08c6697d3ad68db39d84d7af33037bb7ea9
CVE-2025-27685,0,0,f1cd2113ab987f8aa8854222629b62161d79f2c62b06433ec39fa30503650db2,2025-04-01T20:44:56.343000
CVE-2025-27686,0,0,635054223b0053353c230dc9d9e43223ab0f82ff6e550632be15716e5de0310b,2025-04-07T14:17:50.220000
CVE-2025-27688,0,0,37bfd097838352d3a2c81f7e24a7a0eef1d098aec6c34d136894861caf071b8f,2025-03-18T16:15:27.980000
CVE-2025-27690,1,1,754e9d8b5230add83b48ff3510b8cdf34bd2749d8533b8460f427ab2ffa4abec,2025-04-10T03:15:19.210000
CVE-2025-27692,0,0,1dbf11e4211dccb6352d5d29bb123fafd55385761259fd27d49ab92a879f0c91,2025-04-02T14:58:07.527000
CVE-2025-27693,0,0,16d105cbb32fb801d6cf5e5dfc90ae8e01c7128a7f6a55fef4f354062bf75d26,2025-04-02T14:58:07.527000
CVE-2025-27694,0,0,869d06c60976454eaafaca8c8a4d8339219d8edd8cae5f4fb37b5a87fc50e33e,2025-04-02T14:58:07.527000
@ -287826,6 +287833,7 @@ CVE-2025-29985,0,0,2aeb5a8f8ec35aa18845c0d4af21956a36a7c943d3b098b90b6c6bf8f695e
CVE-2025-29986,0,0,99c178153f6bbbad7e209292a65a7c4e43cf8706f8ea6bc3168202624c16c250,2025-04-08T18:13:53.347000
CVE-2025-29987,0,0,962644397d15823d289c2ad8de7be5eae2dfe8787c0957eaa9f9d8409e9ed1a4,2025-04-07T14:18:34.453000
CVE-2025-29988,0,0,fffff8af5716bb267ee4d5abcd24a0f0916ef33883d34ffbf12f21ae885514a4,2025-04-09T20:02:41.860000
CVE-2025-29989,1,1,8dade0cc16afcfb65953bed646d1846d7a2490ba7c8d34ed699c8021955c56f0,2025-04-10T02:15:30.680000
CVE-2025-2999,0,0,81444588dd7906e6c8cac51c6c8e57e7e231b44db369bc45695ecb3a2d560ed4,2025-04-01T20:26:22.890000
CVE-2025-29991,0,0,40bf08e0cf4babdcbf62be0cd1c52dbd14323391ac7d7ab9cf689de3abb126a1,2025-04-07T14:18:34.453000
CVE-2025-29993,0,0,5a3aa3d216416e2fe2b892d0a3793dacda985a3191a3f3e25b8b0846fab45986,2025-03-27T16:45:27.850000
@ -289330,6 +289338,7 @@ CVE-2025-32692,0,0,c5377d751270c75bb15d28fe8902897bceed087aac59fc72b43d33627d156
CVE-2025-32693,0,0,8b4c3ca6e5f78d8e905f61115dad2c0f8bfcead7073e277a4dfe0246c8f181ec,2025-04-09T20:02:41.860000
CVE-2025-32694,0,0,c5323b32f99e8c9fc8ccc9989da14785a02c4cec59717fdc95787034e559d1d1,2025-04-09T20:02:41.860000
CVE-2025-32695,0,0,d37a7a3802052ba2b179b04e772474f69fbfbf6cedd0f20f3383706ffa54c144,2025-04-09T20:02:41.860000
CVE-2025-32728,1,1,9923765068f28ee8d641fe9ebffdc724554e8390950f0688a8c20af34af4f682,2025-04-10T02:15:30.873000
CVE-2025-3285,0,0,e28a4e88da7ffb77ad01de08bcfd2b4a71d41180820a080f587b6350c35f9e48,2025-04-08T18:13:53.347000
CVE-2025-3286,0,0,c247e4e94cc04e66afe391d63c6254a128435a66f18dde665fe78a6cdb0ab317,2025-04-08T18:13:53.347000
CVE-2025-3287,0,0,bff258a343cd08a61757791ae0246a98daa5f12cd52be7d2e4f1314c24254af2,2025-04-08T18:13:53.347000

Can't render this file because it is too large.