Auto-Update: 2025-04-25T16:00:20.371169+00:00

This commit is contained in:
cad-safe-bot 2025-04-25 16:03:53 +00:00
parent b6c7adad22
commit 5772164555
71 changed files with 2943 additions and 180 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-21219",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-15T19:15:15.510",
"lastModified": "2024-11-21T05:12:29.127",
"lastModified": "2025-04-25T15:15:29.040",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-25059",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-11-28T14:15:10.663",
"lastModified": "2024-11-21T05:54:16.363",
"lastModified": "2025-04-25T15:15:29.763",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-31740",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-30T15:15:10.290",
"lastModified": "2024-11-21T06:06:10.357",
"lastModified": "2025-04-25T15:15:29.940",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-22984",
"sourceIdentifier": "report@snyk.io",
"published": "2022-11-30T13:15:10.517",
"lastModified": "2024-11-21T06:47:44.417",
"lastModified": "2025-04-25T15:15:30.193",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-23746",
"sourceIdentifier": "cve@checkpoint.com",
"published": "2022-11-30T19:15:10.310",
"lastModified": "2024-11-21T06:49:13.710",
"lastModified": "2025-04-25T15:15:30.380",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36136",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T04:15:10.503",
"lastModified": "2024-11-21T07:12:28.140",
"lastModified": "2025-04-25T15:15:30.587",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36137",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T04:15:10.567",
"lastModified": "2024-11-21T07:12:28.283",
"lastModified": "2025-04-25T15:15:30.760",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36433",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T13:15:10.420",
"lastModified": "2024-11-21T07:12:59.967",
"lastModified": "2025-04-25T15:15:30.917",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3689",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-11-28T14:15:13.530",
"lastModified": "2024-11-21T07:20:02.247",
"lastModified": "2025-04-25T15:15:31.303",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3751",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-11-29T21:15:11.217",
"lastModified": "2024-11-21T07:20:10.583",
"lastModified": "2025-04-25T15:15:31.460",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -133,6 +133,10 @@
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://huntr.com/bounties/a04cff99-5d53-45e5-a882-771b0fad62c9",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3769",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-11-28T14:15:14.103",
"lastModified": "2024-11-21T07:20:12.690",
"lastModified": "2025-04-25T15:15:31.620",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3823",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-11-28T14:15:14.677",
"lastModified": "2024-11-21T07:20:18.497",
"lastModified": "2025-04-25T15:15:31.783",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -71,6 +91,10 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/a072b091-5e5f-4e88-bd3d-2f4582e6564e/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3831",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-11-28T14:15:15.573",
"lastModified": "2024-11-21T07:20:19.523",
"lastModified": "2025-04-25T15:15:31.947",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3850",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-11-28T14:15:18.280",
"lastModified": "2024-11-21T07:20:21.940",
"lastModified": "2025-04-25T15:15:32.100",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3865",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-11-28T14:15:18.593",
"lastModified": "2024-11-21T07:20:23.707",
"lastModified": "2025-04-25T15:15:32.253",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-40799",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T05:15:11.310",
"lastModified": "2024-11-21T07:22:03.697",
"lastModified": "2025-04-25T15:15:32.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-494"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-494"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42445",
"sourceIdentifier": "psirt@hcl.com",
"published": "2022-12-12T13:15:14.737",
"lastModified": "2024-11-21T07:24:58.893",
"lastModified": "2025-04-25T15:15:32.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-44096",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-30T05:15:11.187",
"lastModified": "2024-11-21T07:27:38.020",
"lastModified": "2025-04-25T15:15:32.820",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-798"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-44355",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T17:15:11.257",
"lastModified": "2024-11-21T07:27:54.787",
"lastModified": "2025-04-25T15:15:32.987",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-44356",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T17:15:11.313",
"lastModified": "2024-11-21T07:27:54.923",
"lastModified": "2025-04-25T15:15:33.157",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-552"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-552"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-44635",
"sourceIdentifier": "security@apache.org",
"published": "2022-11-29T15:15:10.897",
"lastModified": "2024-11-21T07:28:14.380",
"lastModified": "2025-04-25T15:15:33.310",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,13 +36,33 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-45202",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T04:15:11.207",
"lastModified": "2024-11-21T07:28:57.310",
"lastModified": "2025-04-25T15:15:33.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-45204",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T04:15:11.253",
"lastModified": "2024-11-21T07:28:57.453",
"lastModified": "2025-04-25T15:15:33.810",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-401"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-45301",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T02:15:08.893",
"lastModified": "2024-11-21T07:29:01.920",
"lastModified": "2025-04-25T15:15:33.970",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-732"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-45304",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T02:15:09.000",
"lastModified": "2024-11-21T07:29:02.067",
"lastModified": "2025-04-25T15:15:34.133",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-732"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-45305",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T02:15:09.067",
"lastModified": "2024-11-21T07:29:02.210",
"lastModified": "2025-04-25T15:15:34.287",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-732"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-45306",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T02:15:09.117",
"lastModified": "2024-11-21T07:29:02.360",
"lastModified": "2025-04-25T15:15:34.437",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-732"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-45307",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T02:15:09.167",
"lastModified": "2024-11-21T07:29:02.500",
"lastModified": "2025-04-25T15:15:34.593",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-732"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0406",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-06T17:15:07.127",
"lastModified": "2025-03-11T04:15:22.860",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-25T15:02:44.233",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -51,26 +71,82 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mholt:archiver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "4.0.0",
"matchCriteriaId": "A9611164-4F5F-4D75-8E6B-40C77B622481"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FD736A-8730-446A-BA3A-7B608DB62B0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.18",
"versionEndExcluding": "4.18.4",
"matchCriteriaId": "9865460D-A462-4F64-BD67-434E59AF36AF"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:2449",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-0406",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257749",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-0406",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257749",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3203",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-02T22:15:10.320",
"lastModified": "2024-11-21T09:29:08.600",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-25T14:45:29.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,46 +96,100 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:blosc:c-blosc2:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.13.2",
"matchCriteriaId": "3560FC02-24C1-498F-AA85-9EEF17F86841"
}
]
}
]
}
],
"references": [
{
"url": "https://drive.google.com/drive/folders/1T1k3UeS09m65LjVXExUuZfedNQPWQWCo?usp=sharing",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Blosc/c-blosc2/releases/tag/v2.14.3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.259050",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.259050",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304556",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"VDB Entry"
]
},
{
"url": "https://drive.google.com/drive/folders/1T1k3UeS09m65LjVXExUuZfedNQPWQWCo?usp=sharing",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Blosc/c-blosc2/releases/tag/v2.14.3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.259050",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.259050",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304556",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3204",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-02T22:15:11.040",
"lastModified": "2024-11-21T09:29:08.737",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-25T14:45:32.610",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,46 +96,102 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:blosc:c-blosc2:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.13.2",
"matchCriteriaId": "3560FC02-24C1-498F-AA85-9EEF17F86841"
}
]
}
]
}
],
"references": [
{
"url": "https://drive.google.com/drive/folders/1T1k3UeS09m65LjVXExUuZfedNQPWQWCo?usp=sharing",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Blosc/c-blosc2/releases/tag/v2.14.3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.259051",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.259051",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304557",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://drive.google.com/drive/folders/1T1k3UeS09m65LjVXExUuZfedNQPWQWCo?usp=sharing",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Blosc/c-blosc2/releases/tag/v2.14.3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.259051",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.259051",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304557",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3207",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-02T23:15:54.853",
"lastModified": "2024-11-21T09:29:08.997",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-25T14:38:36.010",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,38 +96,86 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ermig1979:simd:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.0.134",
"matchCriteriaId": "572340A7-7144-4B19-9E20-26A458BE41A7"
}
]
}
]
}
],
"references": [
{
"url": "https://drive.google.com/drive/folders/1z0JBsZ-QR3RsuAf-uyit_ZGXCh0rEvFq?usp=sharing",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.259054",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.259054",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304572",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Exploit"
]
},
{
"url": "https://drive.google.com/drive/folders/1z0JBsZ-QR3RsuAf-uyit_ZGXCh0rEvFq?usp=sharing",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.259054",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.259054",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304572",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"VDB Entry",
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3209",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-02T23:15:55.083",
"lastModified": "2024-11-21T09:29:09.260",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-25T14:33:54.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,62 +96,161 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:upx:upx:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.2.2",
"matchCriteriaId": "FA0C3D96-C5B7-4783-B8F5-895E304ECA7C"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://drive.google.com/drive/folders/1qlUXvycOzGJygfkdQB9dGO6VwNRRZoih?usp=sharing",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AE5OZ7YUEVLXVVS6PFP5RELVICQ4K6QK/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4DNK3AFPT4KIPTBKGCJ6FC3L7AWI2TN/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHWZN2NX5W3WYA6ACJ746PAZXXNZETKD/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.259055",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.259055",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304575",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry",
"Exploit"
]
},
{
"url": "https://drive.google.com/drive/folders/1qlUXvycOzGJygfkdQB9dGO6VwNRRZoih?usp=sharing",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AE5OZ7YUEVLXVVS6PFP5RELVICQ4K6QK/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4DNK3AFPT4KIPTBKGCJ6FC3L7AWI2TN/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHWZN2NX5W3WYA6ACJ746PAZXXNZETKD/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.259055",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.259055",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304575",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry",
"Exploit"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3227",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-03T03:15:11.457",
"lastModified": "2025-04-25T13:52:04.237",
"lastModified": "2025-04-25T14:23:04.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -115,9 +115,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:weaver:e-office_oa:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.5",
"matchCriteriaId": "5BC57384-9952-4FD7-9E44-66307841C357"
"matchCriteriaId": "76FD9B2D-EEEE-4C55-9C33-237C662202F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-49672",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-29T11:15:04.223",
"lastModified": "2024-11-08T15:16:00.327",
"lastModified": "2025-04-25T14:02:39.477",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -80,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google_docs_rsvp_project:google_docs_rsvp:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:gief:google_docs_rsvp:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.0.1",
"matchCriteriaId": "E98DC42A-2BE2-4029-A27A-1ECE5C82A1E3"
"matchCriteriaId": "B96653A9-2F50-4203-8058-EDFD5F141C43"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50086",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-29T01:15:05.487",
"lastModified": "2024-11-08T16:15:46.247",
"lastModified": "2025-04-25T15:15:34.760",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-57375",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-25T14:15:20.567",
"lastModified": "2025-04-25T14:15:20.567",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Andamiro Pump It Up 20th Anniversary (aka Double X or XX/2019) 1.00.0-2.08.3 allows a physically proximate attacker to cause a denial of service (application crash) via certain deselect actions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 2.4,
"baseSeverity": "LOW",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://www.youtube.com/watch?v=DXrnQpTlQs0",
"source": "cve@mitre.org"
},
{
"url": "https://xx.piugame.com/bbs/board.php?bo_table=global_notice&wr_id=368",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-22097",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-16T15:16:04.080",
"lastModified": "2025-04-17T20:22:16.240",
"lastModified": "2025-04-25T15:15:35.647",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vkms: Fix use after free and double free on init error\n\nIf the driver initialization fails, the vkms_exit() function might\naccess an uninitialized or freed default_config pointer and it might\ndouble free it.\n\nFix both possible errors by initializing default_config only when the\ndriver initialization succeeded."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vkms: Se corrige el error \"use after free\" y \"double free on init\". Si falla la inicializaci\u00f3n del controlador, la funci\u00f3n \"vkms_exit()\" podr\u00eda acceder a un puntero \"default_config\" no inicializado o liberado y liberarlo dos veces. Se corrigen ambos posibles errores inicializando \"default_config\" solo cuando la inicializaci\u00f3n del controlador se haya realizado correctamente."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/1f68f1cf09d06061eb549726ff8339e064eddebd",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27370",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-03T18:15:40.650",
"lastModified": "2025-03-07T17:15:22.083",
"lastModified": "2025-04-25T15:15:35.820",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://eprint.iacr.org/2025/629",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/OWASP/ASVS/issues/2678",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27371",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-03T18:15:40.850",
"lastModified": "2025-03-07T17:15:22.190",
"lastModified": "2025-04-25T15:15:35.937",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://eprint.iacr.org/2025/629",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/OWASP/ASVS/issues/2678",
"source": "cve@mitre.org"

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-28076",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-25T15:15:36.057",
"lastModified": "2025-04-25T15:15:36.057",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in EasyVirt DCScope <= 8.6.4 and CO2Scope <= 1.3.4 allows remote authenticated attackers to execute arbitrary SQL commands via the (1) timeago, (2) user, (3) filter, (4) target, (5) p1, (6) p2, (7) p3, (8) p4, (9) p5, (10) p6, (11) p7, (12) p8, (13) p9, (14) p10, (15) p11, (16) p12, (17) p13, (18) p14, (19) p15, (20) p16, (21) p17, (22) p18, (23) p19, or (24) p20 parameter to /api/management/updateihmsettings; the (25) ID, (26) NAME, (27) CPUTHREADNB, (28) RAMCAP, or (29) DISKCAP parameter to /api/capaplan/savetemplates."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Elymaro/CVE/blob/main/EasyVirt/CVE-2025-28076.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.easyvirt.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-28354",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-25T14:15:21.560",
"lastModified": "2025-04-25T14:15:21.560",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the Printer Manager Systm of Entrust Corp Printer Manager D3.18.4-3 and below allows attackers to execute a directory traversal via a crafted POST request."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/VAMorales/ef13d4edc14750f689e16c9e4922becb",
"source": "cve@mitre.org"
},
{
"url": "https://www.entrust.com/sites/default/files/documentation/productsupport/entrust-security-bulletin-e25-002.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-32044",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:36.170",
"lastModified": "2025-04-25T15:15:36.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw has been identified in Moodle where, on certain sites, unauthenticated users could retrieve sensitive user data\u2014including names, contact information, and hashed passwords\u2014via stack traces returned by specific API calls. Sites with PHP configured with zend.exception_ignore_args = 1 in the php.ini file are not affected by this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-32044",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356829",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-32045",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:36.307",
"lastModified": "2025-04-25T15:15:36.307",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw has been identified in Moodle where insufficient capability checks in certain grade reports allowed users without the necessary permissions to access hidden grades."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-32045",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356835",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2025-32432",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-25T15:15:36.440",
"lastModified": "2025-04-25T15:15:36.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/craftcms/cms/blob/3.x/CHANGELOG.md#3915---2025-04-10-critical",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/craftcms/cms/blob/4.x/CHANGELOG.md#41415---2025-04-10-critical",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/craftcms/cms/blob/5.x/CHANGELOG.md#5617---2025-04-10-critical",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/craftcms/cms/commit/e1c85441fa47eeb7c688c2053f25419bc0547b47",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-f3gw-9ww9-jmc3",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,13 +2,20 @@
"id": "CVE-2025-3551",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-14T05:15:15.330",
"lastModified": "2025-04-15T18:39:27.967",
"lastModified": "2025-04-25T14:15:22.650",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Lingxing ERP 2 and classified as critical. Affected by this issue is the function DoUpload of the file /Api/FileUpload.ashx?method=DoUpload. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
"value": "A vulnerability was found in Lingxing ERP 2 and classified as critical. Affected by this issue is the function DoUpload of the file /Api/FileUpload.ashx?method=DoUpload. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment."
},
{
"lang": "es",
@ -63,7 +70,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -111,7 +118,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,13 +2,20 @@
"id": "CVE-2025-3552",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-14T06:15:16.440",
"lastModified": "2025-04-15T18:39:27.967",
"lastModified": "2025-04-25T14:15:22.790",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Lingxing ERP 2. It has been classified as critical. This affects an unknown part of the file /Api/TinyMce/UploadAjax.ashx. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
"value": "A vulnerability was found in Lingxing ERP 2. It has been classified as critical. This affects an unknown part of the file /Api/TinyMce/UploadAjax.ashx. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment."
},
{
"lang": "es",
@ -63,7 +70,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -111,7 +118,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3625",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:36.753",
"lastModified": "2025-04-25T15:15:36.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability was discovered in Moodle that can allow hackers to gain access to sensitive information about students and prevent them from logging into their accounts, even after they had completed two-factor authentication (2FA)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3625",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359690",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3627",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:36.927",
"lastModified": "2025-04-25T15:15:36.927",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability was discovered in Moodle that allows some users to access sensitive information about other students before they finish verifying their identities using two-factor authentication (2FA)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3627",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359692",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3628",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:37.057",
"lastModified": "2025-04-25T15:15:37.057",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw has was found in Moodle where anonymous assignment submissions can be de-anonymized via search, revealing student identities."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3628",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359706",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3634",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T14:15:22.917",
"lastModified": "2025-04-25T14:15:22.917",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability was discovered in Moodle that allows students to enroll themselves in courses without completing all the necessary safety checks. Specifically, users can sign up for courses prematurely, even if they haven't finished two-step verification processes."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3634",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359707",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3635",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:37.230",
"lastModified": "2025-04-25T15:15:37.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability was discovered in Moodle that allows anyone to duplicate existing tours without needing to log in due to a lack of protection against cross-site request forgery (CSRF) attacks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3635",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359709",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-3636",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:37.363",
"lastModified": "2025-04-25T15:15:37.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Moodle. This vulnerability allows unauthorized users to access and view RSS feeds due to insufficient capability checks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84499",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3636",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359726",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-3637",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:37.510",
"lastModified": "2025-04-25T15:15:37.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability was found in Moodle where confidential information that prevents cross-site request forgery (CSRF) attacks was shared publicly through the site's URL. This vulnerability occurred specifically on two types of pages within the mod_data module: edit and delete pages."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-598"
}
]
}
],
"references": [
{
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-65356",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3637",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359727",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2025-3638",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:37.640",
"lastModified": "2025-04-25T15:15:37.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Moodle. The analysis request action in the Brickfield tool did not include the necessary token to prevent a Cross-site request forgery (CSRF) risk."
}
],
"metrics": {},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3638",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359732",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=467600",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-3640",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:37.757",
"lastModified": "2025-04-25T15:15:37.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Moodle. Insufficient capability checks made it possible for a user enrolled in a course to access some details, such as the full name and profile image URL, of other users they did not have permission to access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3640",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359734",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=467601",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-3641",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:37.887",
"lastModified": "2025-04-25T15:15:37.887",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Moodle. A remote code execution risk was identified in the Moodle LMS Dropbox repository. By default, this was only available to teachers and managers on sites with the Dropbox repository enabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3641",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359735",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=467602",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-3642",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:38.013",
"lastModified": "2025-04-25T15:15:38.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Moodle. A remote code execution risk was identified in the Moodle LMS EQUELLA repository. By default, this was only available to teachers and managers on sites with the EQUELLA repository enabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3642",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359738",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=467603",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-3643",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:38.147",
"lastModified": "2025-04-25T15:15:38.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Moodle. The return URL in the policy tool required additional sanitizing to prevent a reflected Cross-site scripting (XSS) risk."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3643",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359742",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=467604",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-3644",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:38.280",
"lastModified": "2025-04-25T15:15:38.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Moodle. Additional checks were required to prevent users from deleting course sections they did not have permission to modify."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3644",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359745",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=467605",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-3645",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:38.410",
"lastModified": "2025-04-25T15:15:38.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Moodle. Insufficient capability checks in a messaging web service allowed users to view other users' names and online statuses."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3645",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359761",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=467606",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-3647",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-04-25T15:15:38.550",
"lastModified": "2025-04-25T15:15:38.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was discovered in Moodle. Additional checks were required to ensure that users can only access cohort data they are authorized to retrieve."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-3647",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359762",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=467607",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-37088",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-04-22T22:15:17.450",
"lastModified": "2025-04-23T14:15:29.307",
"lastModified": "2025-04-25T15:15:36.593",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-862"
"value": "CWE-362"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43016",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2025-04-25T15:15:39.260",
"lastModified": "2025-04-25T15:15:39.260",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains Rider before 2025.1.2 custom archive unpacker allowed arbitrary file overwrite during remote debug session"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-23"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-43862",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-25T15:15:39.920",
"lastModified": "2025-04-25T15:15:39.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dify is an open-source LLM app development platform. Prior to version 0.6.12, a normal user is able to access and modify APP orchestration, even though the web UI of APP orchestration is not presented for a normal user. This access control flaw allows non-admin users to make unauthorized access and changes on the APPSs. This issue has been patched in version 0.6.12. A workaround for this vulnerability involves updating the the access control mechanisms to enforce stricter user role permissions and implementing role-based access controls (RBAC) to ensure that only users with admin privileges can access Orchestration of the APPs."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://github.com/langgenius/dify/pull/5266",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/langgenius/dify/security/advisories/GHSA-6pw4-jqhv-3626",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-43946",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-22T18:16:01.047",
"lastModified": "2025-04-23T14:15:29.630",
"lastModified": "2025-04-25T15:15:40.050",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "CWE-434"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-46432",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2025-04-25T15:15:40.347",
"lastModified": "2025-04-25T15:15:40.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2025.03.1 base64-encoded credentials could be exposed in build logs"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-46433",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2025-04-25T15:15:40.480",
"lastModified": "2025-04-25T15:15:40.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2025.03.1 improper path validation in loggingPreset parameter was possible"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-23"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-46618",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2025-04-25T15:15:40.957",
"lastModified": "2025-04-25T15:15:40.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2025.03.1 stored XSS was possible on Data Directory tab"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-25T14:00:19.709220+00:00
2025-04-25T16:00:20.371169+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-25T13:52:04.237000+00:00
2025-04-25T15:15:40.957000+00:00
```
### Last Data Feed Release
@ -33,26 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
291421
291447
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `26`
- [CVE-2024-11917](CVE-2024/CVE-2024-119xx/CVE-2024-11917.json) (`2025-04-25T12:15:16.013`)
- [CVE-2024-6198](CVE-2024/CVE-2024-61xx/CVE-2024-6198.json) (`2025-04-25T13:15:42.370`)
- [CVE-2024-6199](CVE-2024/CVE-2024-61xx/CVE-2024-6199.json) (`2025-04-25T13:15:43.510`)
- [CVE-2025-2470](CVE-2025/CVE-2025-24xx/CVE-2025-2470.json) (`2025-04-25T12:15:16.903`)
- [CVE-2025-2986](CVE-2025/CVE-2025-29xx/CVE-2025-2986.json) (`2025-04-25T12:15:17.083`)
- [CVE-2025-3912](CVE-2025/CVE-2025-39xx/CVE-2025-3912.json) (`2025-04-25T12:15:17.243`)
- [CVE-2025-28076](CVE-2025/CVE-2025-280xx/CVE-2025-28076.json) (`2025-04-25T15:15:36.057`)
- [CVE-2025-28354](CVE-2025/CVE-2025-283xx/CVE-2025-28354.json) (`2025-04-25T14:15:21.560`)
- [CVE-2025-32044](CVE-2025/CVE-2025-320xx/CVE-2025-32044.json) (`2025-04-25T15:15:36.170`)
- [CVE-2025-32045](CVE-2025/CVE-2025-320xx/CVE-2025-32045.json) (`2025-04-25T15:15:36.307`)
- [CVE-2025-32432](CVE-2025/CVE-2025-324xx/CVE-2025-32432.json) (`2025-04-25T15:15:36.440`)
- [CVE-2025-3625](CVE-2025/CVE-2025-36xx/CVE-2025-3625.json) (`2025-04-25T15:15:36.753`)
- [CVE-2025-3627](CVE-2025/CVE-2025-36xx/CVE-2025-3627.json) (`2025-04-25T15:15:36.927`)
- [CVE-2025-3628](CVE-2025/CVE-2025-36xx/CVE-2025-3628.json) (`2025-04-25T15:15:37.057`)
- [CVE-2025-3634](CVE-2025/CVE-2025-36xx/CVE-2025-3634.json) (`2025-04-25T14:15:22.917`)
- [CVE-2025-3635](CVE-2025/CVE-2025-36xx/CVE-2025-3635.json) (`2025-04-25T15:15:37.230`)
- [CVE-2025-3636](CVE-2025/CVE-2025-36xx/CVE-2025-3636.json) (`2025-04-25T15:15:37.363`)
- [CVE-2025-3637](CVE-2025/CVE-2025-36xx/CVE-2025-3637.json) (`2025-04-25T15:15:37.510`)
- [CVE-2025-3638](CVE-2025/CVE-2025-36xx/CVE-2025-3638.json) (`2025-04-25T15:15:37.640`)
- [CVE-2025-3640](CVE-2025/CVE-2025-36xx/CVE-2025-3640.json) (`2025-04-25T15:15:37.757`)
- [CVE-2025-3641](CVE-2025/CVE-2025-36xx/CVE-2025-3641.json) (`2025-04-25T15:15:37.887`)
- [CVE-2025-3642](CVE-2025/CVE-2025-36xx/CVE-2025-3642.json) (`2025-04-25T15:15:38.013`)
- [CVE-2025-3643](CVE-2025/CVE-2025-36xx/CVE-2025-3643.json) (`2025-04-25T15:15:38.147`)
- [CVE-2025-3644](CVE-2025/CVE-2025-36xx/CVE-2025-3644.json) (`2025-04-25T15:15:38.280`)
- [CVE-2025-3645](CVE-2025/CVE-2025-36xx/CVE-2025-3645.json) (`2025-04-25T15:15:38.410`)
- [CVE-2025-3647](CVE-2025/CVE-2025-36xx/CVE-2025-3647.json) (`2025-04-25T15:15:38.550`)
- [CVE-2025-43016](CVE-2025/CVE-2025-430xx/CVE-2025-43016.json) (`2025-04-25T15:15:39.260`)
- [CVE-2025-43862](CVE-2025/CVE-2025-438xx/CVE-2025-43862.json) (`2025-04-25T15:15:39.920`)
- [CVE-2025-46432](CVE-2025/CVE-2025-464xx/CVE-2025-46432.json) (`2025-04-25T15:15:40.347`)
- [CVE-2025-46433](CVE-2025/CVE-2025-464xx/CVE-2025-46433.json) (`2025-04-25T15:15:40.480`)
- [CVE-2025-46618](CVE-2025/CVE-2025-466xx/CVE-2025-46618.json) (`2025-04-25T15:15:40.957`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `43`
- [CVE-2024-3227](CVE-2024/CVE-2024-32xx/CVE-2024-3227.json) (`2025-04-25T13:52:04.237`)
- [CVE-2022-44355](CVE-2022/CVE-2022-443xx/CVE-2022-44355.json) (`2025-04-25T15:15:32.987`)
- [CVE-2022-44356](CVE-2022/CVE-2022-443xx/CVE-2022-44356.json) (`2025-04-25T15:15:33.157`)
- [CVE-2022-44635](CVE-2022/CVE-2022-446xx/CVE-2022-44635.json) (`2025-04-25T15:15:33.310`)
- [CVE-2022-45202](CVE-2022/CVE-2022-452xx/CVE-2022-45202.json) (`2025-04-25T15:15:33.627`)
- [CVE-2022-45204](CVE-2022/CVE-2022-452xx/CVE-2022-45204.json) (`2025-04-25T15:15:33.810`)
- [CVE-2022-45301](CVE-2022/CVE-2022-453xx/CVE-2022-45301.json) (`2025-04-25T15:15:33.970`)
- [CVE-2022-45304](CVE-2022/CVE-2022-453xx/CVE-2022-45304.json) (`2025-04-25T15:15:34.133`)
- [CVE-2022-45305](CVE-2022/CVE-2022-453xx/CVE-2022-45305.json) (`2025-04-25T15:15:34.287`)
- [CVE-2022-45306](CVE-2022/CVE-2022-453xx/CVE-2022-45306.json) (`2025-04-25T15:15:34.437`)
- [CVE-2022-45307](CVE-2022/CVE-2022-453xx/CVE-2022-45307.json) (`2025-04-25T15:15:34.593`)
- [CVE-2024-0406](CVE-2024/CVE-2024-04xx/CVE-2024-0406.json) (`2025-04-25T15:02:44.233`)
- [CVE-2024-3203](CVE-2024/CVE-2024-32xx/CVE-2024-3203.json) (`2025-04-25T14:45:29.780`)
- [CVE-2024-3204](CVE-2024/CVE-2024-32xx/CVE-2024-3204.json) (`2025-04-25T14:45:32.610`)
- [CVE-2024-3207](CVE-2024/CVE-2024-32xx/CVE-2024-3207.json) (`2025-04-25T14:38:36.010`)
- [CVE-2024-3209](CVE-2024/CVE-2024-32xx/CVE-2024-3209.json) (`2025-04-25T14:33:54.060`)
- [CVE-2024-3227](CVE-2024/CVE-2024-32xx/CVE-2024-3227.json) (`2025-04-25T14:23:04.283`)
- [CVE-2024-49672](CVE-2024/CVE-2024-496xx/CVE-2024-49672.json) (`2025-04-25T14:02:39.477`)
- [CVE-2024-50086](CVE-2024/CVE-2024-500xx/CVE-2024-50086.json) (`2025-04-25T15:15:34.760`)
- [CVE-2025-22097](CVE-2025/CVE-2025-220xx/CVE-2025-22097.json) (`2025-04-25T15:15:35.647`)
- [CVE-2025-27370](CVE-2025/CVE-2025-273xx/CVE-2025-27370.json) (`2025-04-25T15:15:35.820`)
- [CVE-2025-27371](CVE-2025/CVE-2025-273xx/CVE-2025-27371.json) (`2025-04-25T15:15:35.937`)
- [CVE-2025-3551](CVE-2025/CVE-2025-35xx/CVE-2025-3551.json) (`2025-04-25T14:15:22.650`)
- [CVE-2025-3552](CVE-2025/CVE-2025-35xx/CVE-2025-3552.json) (`2025-04-25T14:15:22.790`)
- [CVE-2025-37088](CVE-2025/CVE-2025-370xx/CVE-2025-37088.json) (`2025-04-25T15:15:36.593`)
- [CVE-2025-43946](CVE-2025/CVE-2025-439xx/CVE-2025-43946.json) (`2025-04-25T15:15:40.050`)
## Download and Usage

View File

@ -153082,7 +153082,7 @@ CVE-2020-21180,0,0,303ba4cbecfd577c8675128e37d8369c2ef084f2e95b4f38c917bf9577050
CVE-2020-2119,0,0,ab060a15a5ea329e5da59d88d50505d7abca6bf7da2c7711a7b026b4ca2cf16a,2024-11-21T05:24:42.170000
CVE-2020-2120,0,0,0ed3332ba34424a03d6bf0bd23243d91d417fe01d3e7aa0e73b8fc1f6fec9721,2024-11-21T05:24:42.327000
CVE-2020-2121,0,0,5b52e309153039b54df2681a5d68ace094c0ecb4930523dc6c2c5375c4bfd739,2024-11-21T05:24:42.507000
CVE-2020-21219,0,0,b1db0c5c350ba9e0b88f93000750d5787fafa84c443ce763436ac6e8eafd17e6,2024-11-21T05:12:29.127000
CVE-2020-21219,0,1,c26edcbc610785b5c7d2f7827e3af5d01ec065e2c0dea271ba950cc2a12f9494,2025-04-25T15:15:29.040000
CVE-2020-2122,0,0,20fd5a5dd80fc14c6a66e78b31887aa53c5353426d77663c697f5ac93e0e7305,2024-11-21T05:24:42.673000
CVE-2020-21224,0,0,b89d14e5bc81a9de9b42af1aa7ba12da43c5794dd5026ccdf20368f17b6b3b9f,2024-11-21T05:12:29.270000
CVE-2020-21228,0,0,8f37cb9765b2a69b500100a069a506a05cb5e33a7271b47955f712502f1c7a42,2024-11-21T05:12:29.417000
@ -171260,7 +171260,7 @@ CVE-2021-25055,0,0,7236064c94889148c41f806496f068d537c251ade137c74cd47e25f2e0f59
CVE-2021-25056,0,0,8ad03739eec0a143e533f36240327d2cf23d6c15360a725dded330c41efe38d9,2024-11-21T05:54:16.047000
CVE-2021-25057,0,0,2f295c3d84349c3531c30c01f3294ee6299f127457871f1d2f4ac91888a0d97d,2024-11-21T05:54:16.153000
CVE-2021-25058,0,0,a66b2e60f36a18044d483775c5e6e4538c5824d490ab11bcb6b35853656294c7,2024-11-21T05:54:16.260000
CVE-2021-25059,0,0,bd4349a3c42f8814e760f2ca208a3169b2a07a3813c738bb9f001d2413ad6604,2024-11-21T05:54:16.363000
CVE-2021-25059,0,1,b7f20c28d7a99aab7de9377815c4827d27691bec552bb4df740537b835ffd0c8,2025-04-25T15:15:29.763000
CVE-2021-25060,0,0,1139c273a9f2053f20d9f39643e00a266f5fafb7e0d9c382d9a15a74cbe20cdd,2024-11-21T05:54:16.490000
CVE-2021-25061,0,0,ea167eb147c4ab2edf7a9cf81474e723d481bf2edadbf7d639057aaa127b2325,2024-11-21T05:54:16.603000
CVE-2021-25062,0,0,c2de70bf7522f29e404269e2e3e7ef40a96ab54e22b01a873b08c11fcb52ff2e,2024-11-21T05:54:16.717000
@ -176028,7 +176028,7 @@ CVE-2021-31731,0,0,2f09d3b0d20e294ef90277d66e935d0af27787f253ac13262c3ed4c0069c6
CVE-2021-31737,0,0,9d6a00a25dcfc223ba92bc36cc2e636c5f5ff5f625e5e56a5563622b736c4f08,2024-11-21T06:06:09.910000
CVE-2021-31738,0,0,cd05c4eef13cc84abd8ec7d9e3f7add5c58901b74366c55cf683354f951a37b4,2024-11-21T06:06:10.057000
CVE-2021-31739,0,0,fd5957d55dee3e4c4277a1fbd302efdfe6452802cd60ce5d19dde82d7ba3e619,2024-11-21T06:06:10.203000
CVE-2021-31740,0,0,748309ac83594d96604284429d30e1da0c13096e8f09b18e3897344882a2edd6,2024-11-21T06:06:10.357000
CVE-2021-31740,0,1,9fdf572984911e8ea7863ec8e2243a58805bf91fcdce3ed8758fff7b2fe46e21,2025-04-25T15:15:29.940000
CVE-2021-31745,0,0,ccd6bf0b8dc2c7292fa396fdab7855ad739ad2accf80a627909d4b5fc7efdd3e,2024-11-21T06:06:10.513000
CVE-2021-31746,0,0,13539c2f305ff92a6fbe864dae208d7192ec64f2a701b4b440f10140e2dc8536,2024-11-21T06:06:10.660000
CVE-2021-31747,0,0,8d589c7b437eea27faf0f53fedca0207bf4f7e05e6676735177b93d37debf9c1,2024-11-21T06:06:10.800000
@ -192720,7 +192720,7 @@ CVE-2022-2298,0,0,a95805a0a13658fd0a16985348f5c1a2403dbffca9a2a7d0263cf2cb18be2d
CVE-2022-22980,0,0,a994ec342d04ccad8dc633e7800d805763ac26bc27074e2f7248cc3ebd2e9509,2024-11-21T06:47:44.063000
CVE-2022-22982,0,0,7eb2b4877890c6c001a50bc755814c842ccf4384bed6f4821a32240102fd7eb7,2024-11-21T06:47:44.170000
CVE-2022-22983,0,0,8f4ede69b42a51b80c795d220aebdc7113cd7125c2950869e3be07023cdc09f4,2024-11-21T06:47:44.300000
CVE-2022-22984,0,0,f799ce061ca9e74509ab3a0e212c5d194added7b3a3f7fae2182ddad3b17deb4,2024-11-21T06:47:44.417000
CVE-2022-22984,0,1,12b0c25f41a810867b000d1817b01a50255dbab1b0d6b1e35f53986799a4e331,2025-04-25T15:15:30.193000
CVE-2022-22985,0,0,79b2a9552a1b10ada46de8bd02db3a2ac5448a48e907872622945aa108e887ad,2024-11-21T06:47:44.610000
CVE-2022-22986,0,0,e199ccc7a922f6597ce6bef579b86e7a6df5673dab1b56f0b18124cb0347cd97,2024-11-21T06:47:44.747000
CVE-2022-22987,0,0,a3b22d0acd975ce36f8cae233a28b115c9a2a48ed94fd9b6fa4f660c0865ea5a,2024-11-21T06:47:44.890000
@ -193432,7 +193432,7 @@ CVE-2022-23742,0,0,7dea878edb5ad2cbdb3abc4beeb51490a987e35f3a4f8363cd49f2a2e7c04
CVE-2022-23743,0,0,a7454e6467ca11378287d0671c5f75d14fde2b38947403f7a5ca829d4c6db62b,2024-11-21T06:49:13.347000
CVE-2022-23744,0,0,a2ebd65c39528abca9283ad46d8bfd6d49ae5c18a6bf025a4f562f424489dc77,2024-11-21T06:49:13.467000
CVE-2022-23745,0,0,453ea33812425fe4b8f24565e26d1911a52b7d4f61e5e4da7cd895e3d55225e1,2024-11-21T06:49:13.593000
CVE-2022-23746,0,0,9eeee461b71877b53dcf609958a8cd6693503b71bf2647c3cd27aeced1d79c82,2024-11-21T06:49:13.710000
CVE-2022-23746,0,1,abeae22cedfc59943315fd8d98f40ee6da86840f7109994f9a1d789f1d393586,2025-04-25T15:15:30.380000
CVE-2022-23747,0,0,a0881c90aac8272e7d82e497d0d70466fe33c6cea5dcab3d5fb6d0f61cf3e774,2024-11-21T06:49:13.857000
CVE-2022-23748,0,0,136335102b55350a23691b297d0f9f026269bdc861292d10215f8958c85f2cf7,2025-04-02T20:30:42.237000
CVE-2022-2375,0,0,b665472ccd967b72e1975f37ea8ece177bf82a1796072289556fd815fa9e1b0d,2024-11-21T07:00:51.963000
@ -203636,8 +203636,8 @@ CVE-2022-3613,0,0,df8f8f98c56bf9fe01bec37941a8c2d4b227ea26f2ec007e657ec3e6f1019f
CVE-2022-36130,0,0,f4e11023ff6a59b7cde6ab523f5c204ef615371979da1e9523a1e3d3d7a3850c,2024-11-21T07:12:27.663000
CVE-2022-36131,0,0,50572ab64b8cc42fad6645c745005ae7986f76bb701e85c25648d9e83b3e8e5b,2024-11-21T07:12:27.817000
CVE-2022-36133,0,0,e9859aad9ae4062117d37ddeb7823ed57b9e94b6e7bcae929874b58e61d8ef09,2024-11-21T07:12:27.977000
CVE-2022-36136,0,0,bea1d08b00f9d495d289bbc32ddd3ec67aec1abc43898f282ef0f88692e4b1ba,2024-11-21T07:12:28.140000
CVE-2022-36137,0,0,51d55d42d2055f8c8e091ff8a3c5a2f7a1efbed7a6334df55e7213db0f514b1d,2024-11-21T07:12:28.283000
CVE-2022-36136,0,1,f2da00eeb95619dc82935888d31d7dc5e37800676e71e79bf569e55982f884b8,2025-04-25T15:15:30.587000
CVE-2022-36137,0,1,3e19c276bc61d87eb33c9bac15601459f55477ff8a0f6ead4ac974fe498a88e6,2025-04-25T15:15:30.760000
CVE-2022-36139,0,0,22bdb15852dd30b8f2f5ab5bf1ec8c83d48d99445394ee7e973fc0c1815e8ebe,2024-11-21T07:12:28.437000
CVE-2022-3614,0,0,2d4003694539ee1d96ff0bd346ad4bd73a386dbd4c8a7acf8f95bc49397d72c3,2025-04-10T15:15:50.037000
CVE-2022-36140,0,0,9edc335f53d8382d70a6c1d040e3e4f6a52e1f4cd9fa0bf1552cf48609873c37,2024-11-21T07:12:28.590000
@ -203870,7 +203870,7 @@ CVE-2022-36429,0,0,20fb49e56c6f1adf794f2232cd360d3fc8e2dada5eda76f7ff2b356dd55c2
CVE-2022-3643,0,0,7aaaf9084bb84ab92fa70840701773c2dfe43e0ea77f112347b533a9f79656a6,2024-11-21T07:19:56.600000
CVE-2022-36431,0,0,ee12d34e458b3a3de33896b6afaca59da233821f7619d0c729cbab04e054dfd4,2025-04-24T18:15:17.247000
CVE-2022-36432,0,0,40f0f1ce1fba46db4fc49c3ddcc8785372b185cbc0738759f144e2ddbd897174,2024-11-21T07:12:59.810000
CVE-2022-36433,0,0,ebed4a98af717246592113c07ecf5f2a10c8e7de56660e43fc24aa17f62df3d7,2024-11-21T07:12:59.967000
CVE-2022-36433,0,1,72b9b679a2a29f3c1783e5801f15c3bcbd338983499be1ab0f4ef57ccf612fb3,2025-04-25T15:15:30.917000
CVE-2022-36436,0,0,9434892c0b256e55b1874516de3b5aa1348074c0cf8597a6066c5a94f012bba9,2024-11-21T07:13:00.140000
CVE-2022-36437,0,0,3153b59c88a0f5f7aa8f3a5a6e4669887b4635cb5dfc156c694a9b92b4f26c6a,2025-04-11T23:15:26.833000
CVE-2022-36438,0,0,17e2723b39644a785f394ac4f44f0529f418f4f06444889e2f0173c1f8e43f98,2024-11-21T07:13:00.573000
@ -204260,7 +204260,7 @@ CVE-2022-36886,0,0,1f3c0b8ade645de1e53e62d0e685396150118cb50ddd97877baaa84eebbd9
CVE-2022-36887,0,0,1f8d37d9592aa8f752a6dfad7f0ce43cee71c57c5a7f9bca38989e58989cc896,2024-11-21T07:13:59.637000
CVE-2022-36888,0,0,4921fcf5afdb4f912155db3cc8a53583b6d70e9ad5dc7e9b72daba4003d9e202,2024-11-21T07:13:59.797000
CVE-2022-36889,0,0,e7119c14a6b4b2c9eae6a07158559f2d49d2efaa06f0159c8de8f68cd7303f9e,2024-11-21T07:13:59.973000
CVE-2022-3689,0,0,f6a4246d825497f545ab8bc7f4b7c91830b45d6f0b12c1a4cda832ec25a4be33,2024-11-21T07:20:02.247000
CVE-2022-3689,0,1,12892bde85d5c55fa294bf9aeaaaf8a9c87ae2f0a0d06b86dc60a19f05430394,2025-04-25T15:15:31.303000
CVE-2022-36890,0,0,0e9eee4f1955f88ffd0bac660ce61321cdfaa39e35c779981ce210b557e77f54,2024-11-21T07:14:00.163000
CVE-2022-36891,0,0,4a375726c9a8eb97602c989e40327ca8ec8b6e38a5041fd403d3855f98ebeb79,2024-11-21T07:14:00.370000
CVE-2022-36892,0,0,5cec0a9fe25eb7348db333bf5e44ba8fa525e6e8058963b1577f5c512f2554cf,2024-11-21T07:14:00.550000
@ -204740,7 +204740,7 @@ CVE-2022-37462,0,0,f7e6351a908b88ab930dfb1c7c8a57aca70bc1cb2cde8b81941b2fb3342ee
CVE-2022-3747,0,0,d33f321a72534df6c0f7d538ee493355ff4335736b80981cb6ab4e9e464bee7d,2024-11-21T07:20:10.190000
CVE-2022-3748,0,0,4c6a3ebc0d4e325cde97e2f8775aa85a033e1c82aa843579db77939eede30f50,2024-11-21T07:20:10.317000
CVE-2022-3750,0,0,a609e7c347b21edbf6d2fbc09521b9cdf9fb2b630cd9faec5d3705e6ee360cd1,2024-11-21T07:20:10.460000
CVE-2022-3751,0,0,fff8c897554b0f53372618a3b0d50007127ee1748bd06c89d77850ab21b874f9,2024-11-21T07:20:10.583000
CVE-2022-3751,0,1,5902e1d7d59b388c4665e28899787faf568a47db85afc7f0eabe9fde36273f50,2025-04-25T15:15:31.460000
CVE-2022-3752,0,0,3149b8e2599081f392146ab58580b459802c848a160578a945146e01e0055e9b,2024-11-21T07:20:10.707000
CVE-2022-3753,0,0,1348f0543d70a87d80ecd231c0b9c1275f07bb41a33410a33f3de4178cde9a44,2024-11-21T07:20:10.870000
CVE-2022-3754,0,0,b78f2c6a6570a5ccf68675c30f4630d6746362394da9b62db4f4ed358e5b7306,2024-11-21T07:20:10.990000
@ -204776,7 +204776,7 @@ CVE-2022-37679,0,0,30163e65f6c85937f7e28a683176b09d9eb146c2cfb64fbb7a583e8bbaaa6
CVE-2022-3768,0,0,857736c58330b0e35ff7a3d6b161358f07f0524bacac925a9a494e5203d72703,2024-11-21T07:20:12.563000
CVE-2022-37680,0,0,0f45f78801f17e1f85d2fa1a73ca26a0150735d21b0b3cb11777a8712f135f61,2024-11-21T07:15:04.530000
CVE-2022-37681,0,0,2f948e8907ff83dd1c5c3e251826bb44fd66955ca1bfca3c33a0e188cac5cc5b,2024-11-21T07:15:04.670000
CVE-2022-3769,0,0,c4bf34e87f9ae2f42ed28397fd098e05c35c9f6843e9690bca79f799658840f6,2024-11-21T07:20:12.690000
CVE-2022-3769,0,1,9c39e37e60db84f67819b6edf308680304c897cf262f2b53a87c71447f65e161,2025-04-25T15:15:31.620000
CVE-2022-3770,0,0,056267d0dbc6d7110f2e71c1310d09e5ea740c482729425241ad1b06c3d3f156,2024-11-21T07:20:12.817000
CVE-2022-37700,0,0,f7b01506e331ff7bf29f91a017c4d6fb8e7444b7a067afb9e3bedcd9b55e6819,2024-11-21T07:15:04.807000
CVE-2022-37703,0,0,0bb1464f62e9d2b8293baf8a4f430c80898e274bb42ad3de2913a88b18041405,2024-11-21T07:15:04.973000
@ -205224,7 +205224,7 @@ CVE-2022-38223,0,0,3f4fdfd7d100044b3e1d89b5c5e1369323d373ddf13b6ac76b34892021546
CVE-2022-38227,0,0,3d7c4cc08173e8054ebad46518e9009e437f57325ea046e61d56e17b23a82926,2024-11-21T07:16:05.410000
CVE-2022-38228,0,0,816dcccbed7337a6bc402c0b007938a378861f7a4c8bd2395f7fd9fc5e2192b3,2024-11-21T07:16:05.570000
CVE-2022-38229,0,0,efca8cc82294683fd7989d5ec5ca81f04a19e3cc06b9dc425201b9fb2fc4ca6f,2024-11-21T07:16:05.720000
CVE-2022-3823,0,0,416d416a5d223d4b4148000b870380c243934fa56106cc17a904a983e359a8a5,2024-11-21T07:20:18.497000
CVE-2022-3823,0,1,e4994fb00f4255d2d57d6299bf759b738f57be40c640d7f78e08222afdcd1424,2025-04-25T15:15:31.783000
CVE-2022-38230,0,0,40dbf13e9bc7dcf1737de4449055ecef320d52169e1f01fe6164196329150047,2024-11-21T07:16:05.870000
CVE-2022-38231,0,0,bbf269a5bcf23cb22529664df424f85a1beb36774d508ded664c20d1752aec6e,2024-11-21T07:16:06.020000
CVE-2022-38233,0,0,2194e76e0e0c73afb69bb1db25d94538133968d692172c945ea97a952ac195ff,2024-11-21T07:16:06.173000
@ -205288,7 +205288,7 @@ CVE-2022-38306,0,0,e8f5dcacba0e6c57d5692e006a164302af90d57b35821879006d2771aeaa7
CVE-2022-38307,0,0,d59af72afb91538c9ba5dacd9d51feeec853f4a1aa943dc9263bbf2d3184c39f,2024-11-21T07:16:14.057000
CVE-2022-38308,0,0,de3db09742419c58c819e857898b3db9e083868d11e666551cc708fb4d23367c,2024-11-21T07:16:14.273000
CVE-2022-38309,0,0,b087dae21818f7ec2b648f3a011ca6feb2e8308912689a0646bb11dad5bcb10b,2024-11-21T07:16:14.500000
CVE-2022-3831,0,0,1be0ab256767eb54a63e2b092ec2de5d32e4e9e9175cc6f453b686a595a555dc,2024-11-21T07:20:19.523000
CVE-2022-3831,0,1,ec982fa2758fc6aeb988af44ec9a6ac5bcc54ce8127db7f6604e5b9ac8631efa,2025-04-25T15:15:31.947000
CVE-2022-38310,0,0,fa5b818aaf804e23f62859a12d0186a0b9342b29971f718afa3564aaca390001,2024-11-21T07:16:14.727000
CVE-2022-38311,0,0,edf4c524f4b3b4766fab2dfe3272c54df888ee510433242ad7f7363ef49b030c,2024-11-21T07:16:14.950000
CVE-2022-38312,0,0,9180aedab589aba05e0f781706ff46b1357d18f29131316cac546e53c50d9d83,2024-11-21T07:16:15.160000
@ -205455,7 +205455,7 @@ CVE-2022-38493,0,0,7d3c8d07800e0868ab922c04f43dd51b3e3dfd753d464df9f9589698120f7
CVE-2022-38495,0,0,3e1a8f8c7c51ce189934578edb1fc3f7dd0c26a69fce6983a4a1960e697e49cf,2024-11-21T07:16:35.640000
CVE-2022-38496,0,0,7d9e593e4af025081f36a9df085d3bee0fa4f84231618397d1d2b795f464956d,2024-11-21T07:16:35.783000
CVE-2022-38497,0,0,dfbbbf1c39e278335512d6218a9cd7619081c2b5b6b8d6861ef6274e963e506d,2024-11-21T07:16:35.923000
CVE-2022-3850,0,0,014e0ec67729dcc395e4b36cc6d4ac0ff44bc10411b9a768650029a06fa289ca,2024-11-21T07:20:21.940000
CVE-2022-3850,0,1,962431257cffa4a4ce5c31a6a0ef1215c8c5c1231cf7badb8a316a768693786f,2025-04-25T15:15:32.100000
CVE-2022-38509,0,0,2515391f4274cbaba327f1239393d87b27324e2e58230c39be800f6b96a3439c,2024-11-21T07:16:36.063000
CVE-2022-38510,0,0,550a2d9c5447748e6ff45d4a073a7702db3ac0c93727f34f4c70abc8b1cc4e1f,2024-11-21T07:16:36.203000
CVE-2022-38511,0,0,64815cf128522467bbbaf91709d503ebd921fbd5d0fa281360677358f094f243,2024-11-21T07:16:36.347000
@ -205539,7 +205539,7 @@ CVE-2022-38639,0,0,ef089ad0f4192a0b91a834c710a9e1249290b33bdea64a670a5be676a5df0
CVE-2022-3864,0,0,ba3f96f4fa174b2b0d3e24e5d89f4099f8b9a0efca79a024de32073ae52f8091,2024-11-21T07:20:23.540000
CVE-2022-38648,0,0,c2b1a29675da0a06063ce7783922e07647a6f9eda636aacd2cfe7f8e1285a431,2024-11-21T07:16:51.377000
CVE-2022-38649,0,0,a3802596c0711adcc83dec072ae19e2654143e26907bdcd6efadc138cdbfce22,2024-11-21T07:16:51.500000
CVE-2022-3865,0,0,fc5ab6cd758d465b91ccd42c2d606b0f28bc38f5e9cff538c36a35eb7bbdef4b,2024-11-21T07:20:23.707000
CVE-2022-3865,0,1,eafea4860b94094a04f93818db78ca2471cd5d51a5635518322434b3c5dbb455,2025-04-25T15:15:32.253000
CVE-2022-38650,0,0,35198c28f8bd005d0cf171fdd338c61f386fc95b192885d90ba28985791abb94,2024-11-21T07:16:51.633000
CVE-2022-38651,0,0,186d3608a285044d41c3697db2bd941bdcd2a0b5c1e7a4ec401f9bdee9564b5c,2024-11-21T07:16:51.790000
CVE-2022-38652,0,0,e88070e710abc56b7eb3502232d6b83b110e9bdef918cc83c89511310da790fe,2024-11-21T07:16:51.947000
@ -207093,7 +207093,7 @@ CVE-2022-40785,0,0,0d06251319951eeee7bdaa71a82f05bc32e5db2e85812a7b72ff8b1fd2f15
CVE-2022-4079,0,0,2e195e8ce7a96c52db6e6cd391e2c7b115c697f82f9f0e227cf3888e325014f3,2023-11-07T03:56:52.547000
CVE-2022-40797,0,0,06ab9253b92b162b27ca724cded416d99846b7cad236227b0526d64762bf89a7,2024-11-21T07:22:03.370000
CVE-2022-40798,0,0,fecd6a87495b3d94a1ee8a4f130e75d739496a7d84e215b87e3e46923fabbb0c,2024-11-21T07:22:03.537000
CVE-2022-40799,0,0,ff4dffc477176d9f3a228c3b8c6a0931048d674d30aca151eb12c57d210194d4,2024-11-21T07:22:03.697000
CVE-2022-40799,0,1,4f1d0eb456c4ec35b634a0682ae51351f47548eed2262a6a39b29e3ce70c906e,2025-04-25T15:15:32.410000
CVE-2022-4080,0,0,2451c9d571d733037b09750056090b671d4a0e95bf3e35212e4bb5caad0e79e2,2023-11-07T03:56:52.670000
CVE-2022-40805,0,0,4f20b037a16c5670b8159350ab27545846f70f42558e52fea1d755619dafdd45,2024-11-21T07:22:03.853000
CVE-2022-40806,0,0,ac30ad36d7e7544ea0df57eac1ad635687001be1171a09eae0ad7de26adc7a9c,2024-11-21T07:22:04.007000
@ -208509,7 +208509,7 @@ CVE-2022-4244,0,0,16ae99c985e7b36dcab810e8ccfc14c9fa257b27663d0c72059c2a5842fdc1
CVE-2022-42442,0,0,9f02592b0effba1bc336659f8f416a172ce8eaf02f19e1c1af2a6cd21863ff89,2024-11-21T07:24:58.523000
CVE-2022-42443,0,0,fc50246ac900a4083ccdedef27e62d7e1413964daee1a320fba3c5aaf67e1007,2025-01-22T17:11:53.350000
CVE-2022-42444,0,0,5329124ad7f1068195d555d1d0ed53c482283f2a11b45a18466b4858bf7aa527,2025-03-25T16:15:15.877000
CVE-2022-42445,0,0,7135c0c8f5d54c81855dcfdaf053678518868309e600df07d7c8780aecf75dba,2024-11-21T07:24:58.893000
CVE-2022-42445,0,1,dd54132cc2f25eab96c69020699c91a5ef1b4c28818402ec2478af2c03e2dd29,2025-04-25T15:15:32.680000
CVE-2022-42446,0,0,1738bdecf80dcb6a90c5b09b1f71384b9db6ee08c4f2ff62b40ca5fca1c34840,2025-04-24T15:15:49.730000
CVE-2022-42447,0,0,aba9a1675e23e43716c7f0e4b39304b4f640b1d80afcf5e6a33292e368a33983,2025-02-19T16:15:35.533000
CVE-2022-4245,0,0,7305d9be07f9487c1c925b80efa0a1de65c9ce2ebf2d82dff49a350744824522,2024-11-21T07:34:51.700000
@ -209766,7 +209766,7 @@ CVE-2022-44087,0,0,282f1059bd270ea7016e45a4ee9d36ca0f82d50f15358bbc9f785309e63a7
CVE-2022-44088,0,0,f8bdae4051b8ba0544a5a6d5b9d3f3508b358614a633782f5bbd383d6f8ed0b9,2024-11-21T07:27:37.703000
CVE-2022-44089,0,0,387d01deaabf402eacb8c950b9248183b79f74b6de65418acb62c814dbfdab8a,2024-11-21T07:27:37.867000
CVE-2022-4409,0,0,d0bc837111287072a7c07728723929cf9c354b7b41a96199e43fbb9c53250d82,2024-11-21T07:35:12.927000
CVE-2022-44096,0,0,4dcd9982dd6ab15a1ac4c3a92611415280558b01bb4c3738c24970129b86c490,2024-11-21T07:27:38.020000
CVE-2022-44096,0,1,5d8ac3ead81d2e9c7fb42bc4a45638e4d6c92558bf3fdc1a787d9c2dbbb35657,2025-04-25T15:15:32.820000
CVE-2022-44097,0,0,7e314715626013de2719f26fb004226ae821e79dba7252b9d2792b6c9536fc69,2025-04-24T21:15:19.677000
CVE-2022-4410,0,0,ac37b87ecb818b8ad9950dbba076719aaaa7e0dca0e40a43f3b4ad06e732d8fc,2024-11-21T07:35:13.063000
CVE-2022-44108,0,0,facd5ad5f95c1b33da6f692999d7562212d2983fa0084da573d9aa142d066d2e,2025-04-17T15:15:49.053000
@ -209897,8 +209897,8 @@ CVE-2022-44349,0,0,77e0ac1ea0d2dc430605d8413f12a35713a9f95944443f1b60acb50d80e1a
CVE-2022-4435,0,0,09fcbc545d95dda0e23a80b812d81848513369bf47210635c1dfeb4dfb7f0751,2024-11-21T07:35:15.420000
CVE-2022-44351,0,0,c10897244d37a1ea917124caf93e5b932f852accad76e4264bb7d568b60b590d,2025-04-23T16:15:26.583000
CVE-2022-44354,0,0,a640ccf93174beb06eeb361e348e70ec7afe52c1df49c4aee6c99d1af743a995,2024-11-21T07:27:54.647000
CVE-2022-44355,0,0,941aa03f1e5fca7681650ba950b69ef8af2a6aa076740015342da670daa7a53c,2024-11-21T07:27:54.787000
CVE-2022-44356,0,0,314bf8cbae666cba63ae9d02ceb0420682d7eb1cf35b03e4d11bba6780c14c62,2024-11-21T07:27:54.923000
CVE-2022-44355,0,1,46f52b6e90b4ac9041764e7a3e48635cd10698155a1fe005a7d739567fc5f74e,2025-04-25T15:15:32.987000
CVE-2022-44356,0,1,7678667c0a4b5e6b43389a64f9a9efa65bbdfbd023ebb596082024943d137780,2025-04-25T15:15:33.157000
CVE-2022-4436,0,0,054096d3f3721387e7dc56a27e838b284f4344ca986c9ea87b6f33dddc4e2e72,2024-11-21T07:35:15.543000
CVE-2022-44361,0,0,158ecd08bcc8c992b334e8c57664261b8f7baf3f04b2be7d9265673963783b57,2025-04-23T16:15:26.770000
CVE-2022-44362,0,0,5de74f0423cb0832b158fc7782276089054534a3cae5a467753066b2e8fe9ab3,2025-04-24T20:15:27.430000
@ -210096,7 +210096,7 @@ CVE-2022-44631,0,0,904a5299fff9f1e42831dd9fc3355acf63552007983f7ea10077d27a7a35f
CVE-2022-44632,0,0,2189346ebe03fd6a8a3377bf04091ee79ee7a7b61743753d2b08063c09ad712d,2024-11-21T07:28:14.030000
CVE-2022-44633,0,0,0bfaac3c672191c188b3f4444616f3b5b039dbdbbe7f7dea28d72fe5e677910a,2024-11-21T07:28:14.150000
CVE-2022-44634,0,0,4e993b4b2d7eb3f52420143b74ffe66d7781b97d58c7e36ac1f9cf5ae2377e02,2025-02-20T20:15:43.653000
CVE-2022-44635,0,0,1d4e9827860f1d893d17ced644b360aca4a9f601c13d078d5690c46725557645,2024-11-21T07:28:14.380000
CVE-2022-44635,0,1,0d9c2c65e766980a30cb1546a922370a17062f5c3380ba54aaa4f361707fe5de,2025-04-25T15:15:33.310000
CVE-2022-44636,0,0,e665458aad0f0d22671191865ac84b2be1559efb5003d90593cf542d7bfcf6de,2025-04-22T04:15:22.493000
CVE-2022-44637,0,0,da7a53295a19af466bc4ca27b53eda2bd51c45808487aea816d1ed7230628a92,2025-04-23T14:15:24.383000
CVE-2022-44638,0,0,cd4dfe11fbb405feccdca7af9c78159d06c16ecbe89ded61e0cc6f9a854d2a6b,2024-11-21T07:28:14.783000
@ -210462,8 +210462,8 @@ CVE-2022-45197,0,0,e2797594facab33eb8a64e894f3d80227e2c3fb6b001db583f81a9c4f5277
CVE-2022-45198,0,0,2f83eca86b413074047ae0108c6feb23d1202b02e6f4005aad94fb4653e9740e,2024-11-21T07:28:56.987000
CVE-2022-45199,0,0,d1c1175a0ef080fdf9a7cc241c1ae7cb7fccb388690911059d96e4fbe19a95c0,2024-11-21T07:28:57.157000
CVE-2022-4520,0,0,59776d2d88f47898fb2ed20a9d8341b4b24af397bef01454feef5b302af26bef,2024-11-21T07:35:25.283000
CVE-2022-45202,0,0,7ead26bcfbbf435d52e99b1465af1cf5b95d4b9c03ad6c45cc041d150297c878,2024-11-21T07:28:57.310000
CVE-2022-45204,0,0,092d58ecc48d5286aa2021f14afa88ee40c26a5c33306ab8571e9b59896fd0f9,2024-11-21T07:28:57.453000
CVE-2022-45202,0,1,6d810646cf9e046103e1ed7e39a7ac83759b3cd3ca90520431debb7d12c60d93,2025-04-25T15:15:33.627000
CVE-2022-45204,0,1,d2d39768e026bfb3b62a3942046fda292b5b6936c6060f38eb00666b832b7655,2025-04-25T15:15:33.810000
CVE-2022-45205,0,0,e6fa24785e02d2437657ce26199e180fe86db56ec5d79b8f1910e6ab0189a808,2024-11-21T07:28:57.597000
CVE-2022-45206,0,0,929abf60432f0b5a312a8a73c0c203d7ecdbfba21a1c6a3e48590e9aff8ef12e,2024-11-21T07:28:57.747000
CVE-2022-45207,0,0,228696c2311bc6d2e1e96776b82219e109666fce16b81004358914bf00bee35e,2024-11-21T07:28:57.890000
@ -210503,11 +210503,11 @@ CVE-2022-45292,0,0,b6751d2b25f768435678970f6173efb33bf49946476133da8f80186049d39
CVE-2022-45297,0,0,c3d40692f2eb008a64501f776ffefb318506ed5f4f8f6afcf25ee9a4b43f6c16,2025-03-27T19:15:45.603000
CVE-2022-45299,0,0,c3cdec51ad489e268fa0adba84e426154f37216284280ee0f5cd064bdca33ade,2025-04-07T20:15:18.080000
CVE-2022-4530,0,0,cf8765ea8602d8dec88060a36fdc1b0bde04159fab852625f65a01f5454769e4,2024-08-30T20:15:06.780000
CVE-2022-45301,0,0,7f21a6a89058d69c22a2f6146a515a15fceca6c3b69b098486015a26d4dab81a,2024-11-21T07:29:01.920000
CVE-2022-45304,0,0,80a65f6816d77386d34521e9d264fe35e29c557a576795fd8e54012d6ad6ecc7,2024-11-21T07:29:02.067000
CVE-2022-45305,0,0,b1619789a0822c2d8f5b37753cd4bc64870c87283b035efbfb171573e11f33af,2024-11-21T07:29:02.210000
CVE-2022-45306,0,0,d70e566b4a0d5dcaee18467d88435622533217aae3bf891ab2975136f81e5ba0,2024-11-21T07:29:02.360000
CVE-2022-45307,0,0,efec774b802115486fa6f52b3ea251aef6304f75603caf5dd11138d8348915e1,2024-11-21T07:29:02.500000
CVE-2022-45301,0,1,480d6e2ee94f475b4c05c28a3766005e335ccfbd76428dc5d82107cc027d0e33,2025-04-25T15:15:33.970000
CVE-2022-45304,0,1,41d8df1f88e99f9138aba36e5fc33e614fac6d772d4c583d996527518c3f5287,2025-04-25T15:15:34.133000
CVE-2022-45305,0,1,78feafa2372a19987621527382d7262a6231c879403e921e624443a313369917,2025-04-25T15:15:34.287000
CVE-2022-45306,0,1,86b3f5d6df5c52ae52718e7f104d9816f0c1c58c1c5d3fcf3525eea3a3ceba00,2025-04-25T15:15:34.437000
CVE-2022-45307,0,1,43708ed18c5f7f3db58dbb06cfe9d22255608c044aa65e187e28a715d54b551e,2025-04-25T15:15:34.593000
CVE-2022-4531,0,0,83c9dea44857e2b3d5707eadb09615962b28f3408f88a3269d03262a57cdbf59,2023-11-07T03:58:05.790000
CVE-2022-45313,0,0,7df76c36ff95f039b19b9a5010d37f7d1c54257ed685c022114fa169cdb3ec28,2025-04-24T14:15:40.890000
CVE-2022-45315,0,0,f8ad030613b7695cdf72a7a1f7b384686f9a9303d0ca9f0fbca7b3b72fb6b0df,2025-04-24T14:15:41.063000
@ -243966,7 +243966,7 @@ CVE-2024-0402,0,0,c949b5bd8222e6e23b4e7ba309ff59582bbc865f49ff9c531f74ebc2c33ecd
CVE-2024-0403,0,0,c9b6ae724b586a946619c8ef0c81865180cac480da67df518481991ba669f2a4,2024-12-31T17:35:53.340000
CVE-2024-0404,0,0,e68675852fdad4a719b11b1ba5421da84ab893dbe21118b0c4ff6ad8acdc2b36,2024-11-21T08:46:30.660000
CVE-2024-0405,0,0,e66adb1ef6baed40b92ad2708a2a7f7801896af39f78da834867100b8b40a4a0,2024-11-21T08:46:30.777000
CVE-2024-0406,0,0,9f2b6dbfc4bb6fd60151e853679215a73049311f45bbb54e1ce15eac5966bf97,2025-03-11T04:15:22.860000
CVE-2024-0406,0,1,624b2b319e3e58430af78d1cf5b29e249f2f4fa81ef5368a490d7607f60ace06,2025-04-25T15:02:44.233000
CVE-2024-0407,0,0,bf7446b50e0f1a0b381fa6716fb89f82f79db67f0ab4fa78f751b5ca6c555100,2024-11-21T08:46:31.027000
CVE-2024-0408,0,0,e030a2f701c930b593d7d8ff457fa175da0a5c43fe41606146dc8b73cdf52f60,2024-11-21T08:46:31.200000
CVE-2024-0409,0,0,9ef4dd3ff45e8aeeb4d2ab9d9226ad37168b774e60bec3b6e361da09f5c22590,2024-11-21T08:46:31.373000
@ -246458,7 +246458,7 @@ CVE-2024-11913,0,0,dd7d1aef6bd9b33c5cbc226bd6c46c9362be3e1f9ee0d5457fc9f3944230b
CVE-2024-11914,0,0,fa4ae25ac8caf18cb116501f16c4447bae56afeb864dc904882202ad6cc9632f,2024-12-12T04:15:06.983000
CVE-2024-11915,0,0,28ea0a161b7eefe74ada087940b67270e2ec51b6fcf1def4945f57e6c8ae681f,2025-01-11T08:15:24.680000
CVE-2024-11916,0,0,772212fec6b655643f1c957d90058c2fa42ec3e452d3898107b79ded42b35191,2025-04-14T12:27:30.293000
CVE-2024-11917,1,1,031167b73343774ee40ea835a42c4eab1f9c685cc3097d68bcac659311c4c55d,2025-04-25T12:15:16.013000
CVE-2024-11917,0,0,031167b73343774ee40ea835a42c4eab1f9c685cc3097d68bcac659311c4c55d,2025-04-25T12:15:16.013000
CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc06b,2024-11-28T06:15:08.347000
CVE-2024-1192,0,0,5063d16699b3db058d0f99170ded601d82fcfc6f39ec66d01e8a7cebfd42903d,2025-01-08T14:35:22.633000
CVE-2024-11921,0,0,8d14fd5ac89466ae906ad741ca0367246b772d6837be889940ee25bf6694b61d,2024-12-27T19:15:07.850000
@ -258385,7 +258385,7 @@ CVE-2024-32026,0,0,4773c1e06d48d931c50925611674b98234951891d140d0343af0eb572b751
CVE-2024-32027,0,0,6ce23269e48b4377ce344209985d7aeb11dc4ec2bf2a00a704c1d82f0ed8340b,2024-11-21T09:14:21.480000
CVE-2024-32028,0,0,22e622c774c542e7be36c4f7d635ed93a3762d447ae249c728e3841b0fb820a3,2024-11-21T09:14:21.583000
CVE-2024-32029,0,0,ec00582208fdbdbc31ad232b1ff8828b057f2b25e4f7f9338f4ce73ccf6c8240,2024-05-30T16:15:10.050000
CVE-2024-3203,0,0,b9bd43409050d98289f0520141839a5b27219a64af11671f292622a563cd36d4,2024-11-21T09:29:08.600000
CVE-2024-3203,0,1,1e2303c3547909eb91a5135ac853ec048bf0b4a7e25985e7e1f09b52bec09df0,2025-04-25T14:45:29.780000
CVE-2024-32030,0,0,7ab346951e5746ec7b6e6b83b5d2265e2532974224b95f7d8430a7ce3990347b,2024-11-21T09:14:21.720000
CVE-2024-32034,0,0,f9fc59a803fb9008f0d41053bab6a9b99be261b72e8c5e005adea690eeecf65a,2024-09-29T00:14:35.067000
CVE-2024-32035,0,0,6aeed2ead32f8adfb0b64fd6ab5bcc5fc1dd7fc2e6fffe8e5f59626195350f6b,2025-01-09T18:35:14.097000
@ -258393,7 +258393,7 @@ CVE-2024-32036,0,0,b7bb0a68606be3a71619970156645c1c4a4fce8cd747e622f28c6010c1597
CVE-2024-32037,0,0,949387a92a73eceb7807931e568a1355c21b628d8d44a2415cefd9b4784da648,2025-02-11T22:15:27.930000
CVE-2024-32038,0,0,34cde6bba7f174368a97eb36a04d03123d5b022d383c07dafde4c8aa5c18b781,2025-01-09T17:38:55.253000
CVE-2024-32039,0,0,e75d836ac2de29a0c0b50581e5d6dc6ab8a2307f840547494c81dc65cfcfdadd,2025-02-04T18:03:30.070000
CVE-2024-3204,0,0,b1166a23098fea3c82611f1499c0d6fe5df471feadfbca64f6a4601fdb9a6e74,2024-11-21T09:29:08.737000
CVE-2024-3204,0,1,e41fa60a24fec2ed23a74802bb999150b30e9aecfea81ee0f33bc35c59482c9d,2025-04-25T14:45:32.610000
CVE-2024-32040,0,0,e8f90104a90da8610737c992d81a09858ef163c3a23ec8b9e39f3c7946394fbf,2025-02-04T17:54:59.780000
CVE-2024-32041,0,0,e9bed5c3651e2c0893124b7eacf46217be524e42bf05cd50c4a7df68e0e4d7bc,2025-02-04T17:56:13.770000
CVE-2024-32042,0,0,d0fd67f1ac88090ecbce5619555ebbbc8e6cafaf16de5009d4624dfe7a912cca,2024-11-21T09:14:22.697000
@ -258419,7 +258419,7 @@ CVE-2024-32063,0,0,29f2a1892e1bdbc51f377e16f8f2040d6017a1d65a3f945cee689a886d42e
CVE-2024-32064,0,0,dbd54301038cc21ecfd959ae6b4c22d3f3371dcb1f683d2492a8558fb73b537e,2024-11-21T09:14:25.020000
CVE-2024-32065,0,0,4e269c3b4617b51abbf7fad0fb189e864f793651d042c42c0e6c76cdaab0ff9f,2024-11-21T09:14:25.143000
CVE-2024-32066,0,0,e2d564a6fee7a9e5f3fdab2d0b49dd5d8b58b3bad6120a98104b2feb5f2112fa,2024-11-21T09:14:25.267000
CVE-2024-3207,0,0,02d8ec17fdfdc3fcf46708a9320e4db12160865848100afd95416d6fbb5d38fa,2024-11-21T09:29:08.997000
CVE-2024-3207,0,1,8fa2f3a0513bff3278c8dcece3222e4d4d6cebf4f86fa253a454a12dcf8d9ec9,2025-04-25T14:38:36.010000
CVE-2024-32077,0,0,393ddbdf68ebdbb785c0675192e8c78c93a985173eff509b5f298da2241d687d,2025-03-27T20:15:26.090000
CVE-2024-32078,0,0,82ba60cc46e9aa4228ce6f631a63a9303f5be477f0d9a2dc16c6651d36d28708,2024-11-21T09:14:25.543000
CVE-2024-32079,0,0,1bc3c03f2b5772f3aa8b52ceeb2e0251532ab71b12d3b25db239c0f26b173c66,2024-11-21T09:14:25.670000
@ -258434,7 +258434,7 @@ CVE-2024-32086,0,0,72c9870173bce8d88a34ed70f3c12ae4d8f5b964aaf1ba4378ac5c2cb3f12
CVE-2024-32087,0,0,35a7c92bfe089a0106ac1cf4fcc6939a2d286d022cb6e3fe5479d3a1c8ad52aa,2025-04-02T15:07:31.400000
CVE-2024-32088,0,0,09b51e56a6b4f889b0e1b07b3f1d01c2b9169677a6b4526ef3345bb6696f4f00,2024-11-21T09:14:26.787000
CVE-2024-32089,0,0,ef8adcb2491e9d4f8796a216454a00d3605e19ebfa3a9b9e4d48da5c5d235765,2024-11-21T09:14:26.910000
CVE-2024-3209,0,0,5228f92463fd9d1e4264aaefa77852711b145714e3e6ef47ceb920905bbab29e,2024-11-21T09:29:09.260000
CVE-2024-3209,0,1,5ff619df9db84dcdbf6f9ad995f12b5d6411fa1a20893e41e9b88a1843ae185c,2025-04-25T14:33:54.060000
CVE-2024-32090,0,0,75926a377885047463452d5a3bf9253f75177f2255621a9473d19e9546b9034d,2024-11-21T09:14:27.043000
CVE-2024-32091,0,0,8b927b36c6473a1dd9b971a4882da7440d5c3a4627233401d44d0b45f1fc4b05,2024-11-21T09:14:27.170000
CVE-2024-32092,0,0,626f7d6fbf6c177cf8867b6f471f5c96daa6af3eec23f87f6edabf0d4ce72181,2024-11-21T09:14:27.290000
@ -258530,7 +258530,7 @@ CVE-2024-32258,0,0,6307eaacd8410373f8e4971a56af08ef21a11ce548d7dc244e05c1cbd8242
CVE-2024-3226,0,0,d62a9b3627d473bf4da79a5994599afd5c9f26e2657570b8d6caf53a5569c149,2025-02-27T18:07:16.257000
CVE-2024-32268,0,0,4220b068189651923e7c03eaebbdaa1016b5566433d5df81372417a7a35be918,2025-02-10T23:15:13.667000
CVE-2024-32269,0,0,946bbdfbb629e9015a5d3fff72eb7016b39f3bb020c4b6fcea1e2b24974b3684,2024-11-21T09:14:38.380000
CVE-2024-3227,0,1,9e1d1fdbd4e1a4c34f6443452404f929d05306c6519fd21de6a244492ebf2163,2025-04-25T13:52:04.237000
CVE-2024-3227,0,1,9f9078b2d11d9d3abdbf01c873581dda3999b4080c3d4878841b1d9262d74bf9,2025-04-25T14:23:04.283000
CVE-2024-3228,0,0,08ccf2d9f01838c2ec15add697673a4972e6918a8d27a226bfa96edaba6deef9,2024-11-21T09:29:11.610000
CVE-2024-32281,0,0,7a66376ebdecf29b4444f8dc1c8f2ff04e98ba785ec70376a9c15ff0e2aacc79,2025-03-17T14:35:04.940000
CVE-2024-32282,0,0,46f9031bc243af75396d20ca183c4cf0747f94988e54cae7dc9de7135eba9c12,2025-04-09T14:20:58.563000
@ -271764,7 +271764,7 @@ CVE-2024-49669,0,0,f5af1df54e8b7d7f9667dcdd7a6962c4e16f9b133913097ee0daebd53c256
CVE-2024-4967,0,0,4fec59b0c38110a60cb49f88104ba4994971df287b36df28c54db2c2b507f465,2025-02-10T13:42:20.800000
CVE-2024-49670,0,0,e6e2ea1c6b1aefc6292e9a4fc9f11356fc42c84627f1848e8c50c0236524cfd7,2024-11-08T14:57:58.190000
CVE-2024-49671,0,0,ca8113d74fabe4e2a65c834fdb9dd061048f4f7679635eb0241bc77cd321748d,2024-10-25T12:56:36.827000
CVE-2024-49672,0,0,9b42148224eabbb4ba442eca72c86ebfe871626b37b9700a4cf0e41a21e29e63,2024-11-08T15:16:00.327000
CVE-2024-49672,0,1,80432de28b0621ee15e36079d608bf1300b6798f2e500190929dd2a0c56def48,2025-04-25T14:02:39.477000
CVE-2024-49673,0,0,5cfbaeb230b289604e6a9a17a0e3169a5fd351a546e39f0d9f8cdbcaef1b223d,2024-11-08T14:57:27.190000
CVE-2024-49674,0,0,485cc36f092613aa15cc1bf9c84e4863b887e4a287065a305bbaf4e37c253850,2024-11-01T12:57:03.417000
CVE-2024-49675,0,0,b7fbdd38c92d79ba1d7bcc6ed0be95e3d48c155f778ae6bd0a0ba79a52dcf7e9,2024-11-06T22:24:22.907000
@ -272154,7 +272154,7 @@ CVE-2024-50082,0,0,8e85b94985a472359e7ad0617254fd31b64c77f2f36289cb4bbc5af5d6a75
CVE-2024-50083,0,0,de1d51f865c94ab365e97cd039ee3870a1a30b178e746690742c8e78aca3de82,2024-10-30T15:07:02.577000
CVE-2024-50084,0,0,b5257c57e10aeb1b0e84c4712b2b356a0ca0c40710c5a3dd9a3145007b3bef22,2024-12-11T15:15:11.340000
CVE-2024-50085,0,0,b3ef415259af94dfaf8bcfe0bcff2c51beb7119bdbd5c2e18d18d67b492b8793,2024-12-11T15:15:11.520000
CVE-2024-50086,0,0,c6f33f3609f366d17ec962500a85ec8a163f627e45c9fc88fa1d938f52063985,2024-11-08T16:15:46.247000
CVE-2024-50086,0,1,0471e85c6b36e1c59b81acd3fcdc1f4238e2c471db3732bf92aa389e342c197d,2025-04-25T15:15:34.760000
CVE-2024-50087,0,0,95d447f6a3e5e9775f53a0aac1fc1d8bc3fd599edf42d3ca061af2094ebd2cf0,2024-10-30T14:40:16.377000
CVE-2024-50088,0,0,83a7a5adff7f3483f34508e6fe25dee9016d86cd5e803da2007d8e3925e20cd7,2024-11-01T16:05:44.403000
CVE-2024-50089,0,0,5a88dd8feee0f8dc71f033c863dd49e2c59b663323260d047a7a9dacd5a71d02,2024-12-12T16:15:43.107000
@ -276975,6 +276975,7 @@ CVE-2024-5737,0,0,cd5c6423a27e90a610242cf52e502989ca1429c1507f238a032817178b3a04
CVE-2024-57370,0,0,dba61003ac0742f925ea5ff1cc95bfbaed4369615ca108aeba895cf60279fedb,2025-01-23T21:15:14.663000
CVE-2024-57372,0,0,359f6085d50456f0eac4043a58ce1cc9b440df64af0e5401b40a68976c846ffa,2025-01-17T22:15:28.957000
CVE-2024-57373,0,0,55b5a66e1a93744a164d63416378de309c1b9a5faab6102e8edbf1875b843e8d,2025-02-06T17:15:20.213000
CVE-2024-57375,1,1,82696e9ab6d80cf47263dffbeff460400b01b8eafd4708f416d81909b7716fa8,2025-04-25T14:15:20.567000
CVE-2024-57376,0,0,1b43a3e4a8037a8c708d6024b6d292337bbf71fefc30954ed4f4a8b250f57ff1,2025-01-29T16:15:43.367000
CVE-2024-57378,0,0,cc86489a14332f4fb3581ace2a871cae306512c21437ab59547843f810ccce83,2025-03-17T19:15:24.463000
CVE-2024-5738,0,0,ed407989160bc277c57b88c071485c42bcb76c7891fe4c3b678e4f981038b562,2025-02-11T02:15:35.480000
@ -277867,8 +277868,8 @@ CVE-2024-6194,0,0,edbd6241b7f987aa3a81863460dff0ff43067716b0eb6760c0d7999432f960
CVE-2024-6195,0,0,b4caf70d1edba8ea49e05884b1f80490b69a86c6f542eb35b84fa4578f274f1c,2024-11-21T09:49:10.187000
CVE-2024-6196,0,0,b1f39cc423aa2f573c963bfda2e2954c189faa3c6a65007de94824a0fe67c7b5,2024-11-21T09:49:10.340000
CVE-2024-6197,0,0,341d9f6df4ae3e4e99279c2cfac2e321c8271a012cdb7cb8f491cac94878c7fc,2024-11-29T12:15:08.430000
CVE-2024-6198,1,1,e2cdff1cf80ababece59ab0490c507d33c33b635c59ba8e50b012afe62fe25be,2025-04-25T13:15:42.370000
CVE-2024-6199,1,1,15389f1e61eaf87a77f28615f893dcedcf409e67ecf18f2698fddddd6250ddba,2025-04-25T13:15:43.510000
CVE-2024-6198,0,0,e2cdff1cf80ababece59ab0490c507d33c33b635c59ba8e50b012afe62fe25be,2025-04-25T13:15:42.370000
CVE-2024-6199,0,0,15389f1e61eaf87a77f28615f893dcedcf409e67ecf18f2698fddddd6250ddba,2025-04-25T13:15:43.510000
CVE-2024-6200,0,0,9ea80a7e2b2604a341d4266c7e6316677c4c7b3562bbab6c326247f642929732,2024-08-29T17:53:40.483000
CVE-2024-6201,0,0,d7508e5c68d1c9f58af9fd9a0f0c496f8219bfb780e580739e4f5ce4075f9531,2024-08-29T17:52:07.493000
CVE-2024-6202,0,0,6ede66ad5d88af3e4e7acd719dab516e45d0d130ab973638092e6c9d7ab6930d,2024-08-29T17:48:43.723000
@ -284062,7 +284063,7 @@ CVE-2025-22093,0,0,b24898d0dc107f2346d4f833c1e67c8777d58976698fba06e76ef65fa2245
CVE-2025-22094,0,0,09059d5b58fbce3fad4eec10c69cc254c1648cdfac3dad0ef08bac2421a9be35,2025-04-17T20:22:16.240000
CVE-2025-22095,0,0,4fe140e98f99be6f92b616d06388d067b7260a8e9d2fa1df5fc4a895c33e6785,2025-04-17T20:22:16.240000
CVE-2025-22096,0,0,15b45f8823c1996770a96b120ba092f00becf4bccf2d6c3fffa128e5e78bf9e9,2025-04-17T20:22:16.240000
CVE-2025-22097,0,0,587655f74ecb9818a87daf42a5d4bb3f061499c9760d94d56f399edc1aabccc1,2025-04-17T20:22:16.240000
CVE-2025-22097,0,1,97a4a0d6b56c0154f972186cd420d43ebf62d6e5f01e1cca44d8ecc0935f4b19,2025-04-25T15:15:35.647000
CVE-2025-22098,0,0,6c4fdc85168785cf9bc2888afe555bae93a6aae32137479fb1d6e685ac07fbc0,2025-04-17T20:22:16.240000
CVE-2025-22099,0,0,34c86007a0246898343f27ac5d47b808a7794c7beb1126406566dff2e90f041f,2025-04-17T20:22:16.240000
CVE-2025-2210,0,0,86475c50184989786e182feb1184f7a2855d2c84538b322933b89181189cad61,2025-03-12T14:15:20.017000
@ -286124,7 +286125,7 @@ CVE-2025-24696,0,0,3f05e52259d3b900a80613c5b1e8b568819cf706464f6128c6614eb8c2149
CVE-2025-24697,0,0,524ece83a68382cbbf9bfb8b326769c1433565110882c970ecb2d390f56fd66b,2025-02-03T15:15:30.090000
CVE-2025-24698,0,0,ee9ed28bb6a4d45cbe5d6914ce763041875739a745cdfb0d75cc00a562396221,2025-01-24T18:15:43.050000
CVE-2025-24699,0,0,393e254dc7ad1cd4683fc4d4519da575204d2336c4593392a7c99d9a332989ca,2025-02-14T13:15:50.193000
CVE-2025-2470,1,1,4488c07429fb0f638a2bcf5f18f1c8dcca11fa0873f3deecc47a9e2553b57a37,2025-04-25T12:15:16.903000
CVE-2025-2470,0,0,4488c07429fb0f638a2bcf5f18f1c8dcca11fa0873f3deecc47a9e2553b57a37,2025-04-25T12:15:16.903000
CVE-2025-24700,0,0,751d45a0c372daf25447afad51791e39d3a984cf49ee5476e94da07a79832cbd,2025-02-14T13:15:50.330000
CVE-2025-24701,0,0,3286a9d08a955762787b23c92470d2629e626a4bb3688501e99db53a7da2cb4d,2025-01-24T18:15:43.207000
CVE-2025-24702,0,0,7c38f7de4d5427e8c69c77b42285f55828f36aa11705bf9605c2b3dfb09c1912,2025-01-24T18:15:43.360000
@ -287696,8 +287697,8 @@ CVE-2025-2736,0,0,e7cf98020d21878cb789676050f2b64482f392b9f6e63f08f76876bbe2073f
CVE-2025-27363,0,0,eacfc55a70741273922ea22dff488f5249055c44f792def36c729ba640204fe8,2025-04-02T22:15:18.963000
CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000
CVE-2025-2737,0,0,9d40414dcab50f45f0c2fa5c2a682879f8d578b9615da1fd43e795859731e769,2025-03-27T16:45:46.410000
CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000
CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000
CVE-2025-27370,0,1,0e4b7966e83d8d55e2eb5b8a991cbcb244993a6e600774bc55d7606305b3dc3b,2025-04-25T15:15:35.820000
CVE-2025-27371,0,1,45275223bafac4474512200e04f0e5f05b6e9358eb7647331e7f7cea3c7d0d4c,2025-04-25T15:15:35.937000
CVE-2025-2738,0,0,e698101b4b8baa5b6d74722f9a5a2fd56a7a9ed4b926613e8c3fa693afa80c00,2025-03-27T16:45:46.410000
CVE-2025-2739,0,0,f4fbf6446ec2451df539fdc2165d89cda075d9eb4f1c2bfad7a40ecffa8d5b9b,2025-03-27T16:45:46.410000
CVE-2025-27391,0,0,c782f9b884022f97c5a60c69190305dd5a13fa0bd9d3036dcc826fa9cec725bc,2025-04-09T20:02:41.860000
@ -288090,6 +288091,7 @@ CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d0
CVE-2025-28059,0,0,0b528bcd391ca7d8898ab4bd4553bb61f607c8c85b3fa32f1b18963847081036,2025-04-22T15:16:10.627000
CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000
CVE-2025-28072,0,0,321583596f07ee7a11b5edcf4c985e43a00852706ec6a22ba926fc63543c9b04,2025-04-17T20:21:48.243000
CVE-2025-28076,1,1,db70c8fef1d0820af94d47420f9b4ac9d92041297fcdd83fede7c3a5f63dbbf3,2025-04-25T15:15:36.057000
CVE-2025-2808,0,0,2d9ef6fcbe323df90c90b4e91a51bb82e8f5ef9746894b9f5e9c32273a3c6988,2025-04-08T18:13:53.347000
CVE-2025-28087,0,0,1a24fc8fa031815998ab3cec95d83c4ceea417049d18cb4b484e469d0233d5a6,2025-04-07T14:22:33.160000
CVE-2025-28089,0,0,67dcb00b253159ea36147dba2ae48f5f5632d8f7c0e820c0f6cd1525d263b4dd,2025-04-07T14:20:46.543000
@ -288150,6 +288152,7 @@ CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed8583
CVE-2025-2832,0,0,cb7d7ad79effe9b806885a95f2ec7289cdd7a0d7d71df2be39be5f751b3cbeb5,2025-04-11T16:25:55.093000
CVE-2025-2833,0,0,9a52ee089c5cfe9509a1e8871d17816b70a7313c16002967d895358fd72885f7,2025-04-01T15:43:23.657000
CVE-2025-2835,0,0,f8c0fd9595480681bd283ae5c205524a5787cd2cba5ce2f877a12280939c81a6,2025-04-01T15:43:38.550000
CVE-2025-28354,1,1,b7ca52ed378f87fd5c1ed9b145cf5fcb9eeb626e59116335650caa6a5f0fa671,2025-04-25T14:15:21.560000
CVE-2025-28355,0,0,bd8de930b23f6184ab39d0c81e4ee9cdd924adbcf0d121098e5d134a3a60799c,2025-04-21T14:23:45.950000
CVE-2025-2836,0,0,fc5be678cb97345ef6d68aed15f5462ba8f4f63b5b10c6ab5fab3a18f127610b,2025-04-07T14:18:15.560000
CVE-2025-28361,0,0,012842a41606e730430b254a67bbb658386b3833897674145b51c035a48415eb,2025-04-01T15:43:05.143000
@ -288577,7 +288580,7 @@ CVE-2025-2983,0,0,d31f69cd4a503a465c90bfed858cd3831ad229c0ecb657ddc75c62172e5f91
CVE-2025-29834,0,0,4578a3b9050d36f7b5d401ef2cff9bd2a539c6ae9a0546aae8bc67b2af1fdb40,2025-04-15T18:39:43.697000
CVE-2025-2984,0,0,1ca7c36096a1944da99408d66ce040b5e7a8b1b551935cef4ecf4b2025e27c21,2025-04-01T20:26:30.593000
CVE-2025-2985,0,0,687fc2820bd43d778eaf02f10df92a92091bdb50597369a30af5a9476cdae1b0,2025-04-01T20:26:30.593000
CVE-2025-2986,1,1,971cb370a2208d6ff8e7ca861d70c22c3f320da3a2730619b33177fbeacbd69c,2025-04-25T12:15:17.083000
CVE-2025-2986,0,0,971cb370a2208d6ff8e7ca861d70c22c3f320da3a2730619b33177fbeacbd69c,2025-04-25T12:15:17.083000
CVE-2025-29868,0,0,3cdd5d5bc9e5c1cb38e652f74faead4f53d8e8683a37455baaae14fba635a1fa,2025-04-15T13:07:54.393000
CVE-2025-2987,0,0,c5ae0e320f83eaa0b28afb3c153f6c745fec2a59a31f1b5ca52889e16590e49b,2025-04-23T14:08:13.383000
CVE-2025-29870,0,0,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000
@ -290008,6 +290011,8 @@ CVE-2025-32034,0,0,39b72df89785b876c4ffe3d85c99f5c70d32cc05dfbbbe1938fd282aa04eb
CVE-2025-32035,0,0,70a6888bf34d8ab81fb00f2d46e41bf70535bbafb3937f8df2bfd461f8a5aab1,2025-04-09T20:03:01.577000
CVE-2025-32036,0,0,392ced4a7ceffb3860fa36c03a132228e0c351b485f1983727787214d9a82a67,2025-04-09T20:03:01.577000
CVE-2025-3204,0,0,640564153dde48d17342c52eff358ea56840605e43f6aab84cda78f222b9e0c5,2025-04-15T18:48:43.403000
CVE-2025-32044,1,1,82488ff51414fffca606c9feb6d2238106d8fe543bd8d88e42ffdf646c55ce7c,2025-04-25T15:15:36.170000
CVE-2025-32045,1,1,104efd8363c05c967ca4a14dfeae9d2f3d006cbfe9ec0bf2e4f766d5a3449f24,2025-04-25T15:15:36.307000
CVE-2025-32049,0,0,4a492d3e48b4caa699bbe628c5401d02fd93365e9cd0841713ed46afaee15215,2025-04-07T14:18:34.453000
CVE-2025-3205,0,0,0c26d77384caecfacdebfbce05973b001403188f1a4dd9f2048d6f99e8de6522,2025-04-07T14:18:15.560000
CVE-2025-32050,0,0,0a47cfad52d7f8e56c261b87c53507ae6a7f0c5195729ce7a2f5bf37484c4b9d,2025-04-07T14:18:34.453000
@ -290263,6 +290268,7 @@ CVE-2025-32427,0,0,0416426b54022f69535fafb066a105f3453a61c3cc047d8982deab84a0710
CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b345a,2025-04-15T18:39:27.967000
CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000
CVE-2025-32431,0,0,c841c5dc407677a5965f2a37065aa8f465f93e2d2ebac9e51959dc5b7aa3e0fc,2025-04-23T14:08:13.383000
CVE-2025-32432,1,1,bb9c6d246a629688898cb376f2801e83dc1b55b2499826cfb239f3d739157757,2025-04-25T15:15:36.440000
CVE-2025-32433,0,0,b09c31f6643195b4a1d992889b32cafe0f931f328c07138c1e538f5f63253f0e,2025-04-21T17:15:24.330000
CVE-2025-32434,0,0,3d3061039e555845c648c2cd4ddde07ee66a966a450d5d2a63cf7163cec950d6,2025-04-21T14:23:45.950000
CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000
@ -290842,8 +290848,8 @@ CVE-2025-3547,0,0,b8a8bcfd16382c6f669ee8b0e767a9b348387ef570b4ccac540ec0ccce46c6
CVE-2025-3548,0,0,6144ed5d0d918b47e0b3455f4989275371cbf6245da9570b52c077e637e4dc46,2025-04-15T18:39:27.967000
CVE-2025-3549,0,0,fd480975e611b3aa329471ac846d61053e320de544cf16373b88df2f23530e93,2025-04-15T18:39:27.967000
CVE-2025-3550,0,0,f579947c5b178a817932c0b6fcead0a074c3d6bb705e7020a43daf576a1fe1fe,2025-04-15T18:39:27.967000
CVE-2025-3551,0,0,0af495328e32fa4289c7f25e609803a47f9639c2693a9cf28fe39eba4f6a3f0f,2025-04-15T18:39:27.967000
CVE-2025-3552,0,0,2eee97925b40dc2eacf4ba01e66d0bdb8d286a517e59cfd6a72f8d18568a8faf,2025-04-15T18:39:27.967000
CVE-2025-3551,0,1,7ed5829e5d026f1c03262321afe4b2fcc0af60af369c627605818f04ad27b702,2025-04-25T14:15:22.650000
CVE-2025-3552,0,1,10bc72b296492c08f732779e187dfffb8db758900c33748a57d9854aae10efc4,2025-04-25T14:15:22.790000
CVE-2025-3553,0,0,8c1f5e14061a66a48b1706566e256d4f8488eab0bb5ab64ca443be3751b0a454,2025-04-15T18:39:27.967000
CVE-2025-3554,0,0,c0abfdbdf90c0e224f35d24ce51fd8768d7addfcdcc1d013eb7c63964315f5b4,2025-04-15T18:39:27.967000
CVE-2025-3555,0,0,b7c360be3db59a3fe1c48e7f971bfcde48092d0da4916799343add506c814c87,2025-04-16T12:15:16.760000
@ -290895,6 +290901,21 @@ CVE-2025-3618,0,0,304b127c053921d914e116b0c3d51c4ee5b2fd33efb8ce7a0d299de12188b5
CVE-2025-3619,0,0,d6505a8fbe042bc57caae6de787bee69f36be813ff60b26db9609f14022d6c10,2025-04-23T18:12:45.323000
CVE-2025-3620,0,0,fac1ac0d011a3ca6c7407b0f1dd2c7aa4f0d27161282923069a13fa36620f271,2025-04-23T18:11:43.153000
CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac885,2025-04-15T18:39:27.967000
CVE-2025-3625,1,1,3bdf52e9169bfb6678a00932a78a0f452d8e65112fc777501b1fd7239568c811,2025-04-25T15:15:36.753000
CVE-2025-3627,1,1,dabf06095078b9860f1769392c38fe36fec3b9ecc6c420da3f4d7317cdc01872,2025-04-25T15:15:36.927000
CVE-2025-3628,1,1,423998b402f85d4296c3f8db6c0725e827a10a7ba3b3fe671c0f66abe5fe7a86,2025-04-25T15:15:37.057000
CVE-2025-3634,1,1,c249616fcd5306954c7d56d551e8b0519a46a3d77d022c90495e60ea868758db,2025-04-25T14:15:22.917000
CVE-2025-3635,1,1,82bb269846d3df9accc7f03b877a95650ed9373767a5bc824156d089abecb1cd,2025-04-25T15:15:37.230000
CVE-2025-3636,1,1,baa88194ce5460ba4031b3c76f0ad7b59d61d93b8db26be41142300f1e981740,2025-04-25T15:15:37.363000
CVE-2025-3637,1,1,3c38d23c601d6f8f06e183f269a947596b2ff8a03965e630670af08150139833,2025-04-25T15:15:37.510000
CVE-2025-3638,1,1,591e988ecde7e9276bf9aa4b0cf755a560e73138187eb5b71e2d87dd843cbe25,2025-04-25T15:15:37.640000
CVE-2025-3640,1,1,859eeb5ca538cc9609daa0f57bfb173c4c062bf5438e109a0572e4e175e312d2,2025-04-25T15:15:37.757000
CVE-2025-3641,1,1,d7ced09d557988f3d03673d6158a9cba4ba2b4c8f6b5a36fd90c7068e9f39b3e,2025-04-25T15:15:37.887000
CVE-2025-3642,1,1,b58524ae75fb0c1ea52ebe6efecec46a031660351cd24908bae81c30facc81be,2025-04-25T15:15:38.013000
CVE-2025-3643,1,1,29d31905ca4d8a47767b92c8379d23bffddbb1ce482f5cfaeb6b6f4a96cd0115,2025-04-25T15:15:38.147000
CVE-2025-3644,1,1,c0d7f6ccc2417c81e8f33db9f457bd8cc05a229dc602a014b4ccf8b31aeca770,2025-04-25T15:15:38.280000
CVE-2025-3645,1,1,745f62b481d4218b210f1e051781b94d0f85c5bddeb53cfe92daa0d1c221718f,2025-04-25T15:15:38.410000
CVE-2025-3647,1,1,bdf3593bc1009ac99e7220911651b086757fc39b97ca18d69fba0420972903c7,2025-04-25T15:15:38.550000
CVE-2025-3651,0,0,0d88deff7ea7df5b2f76479933db1e164c52ae4da2ee01153c4c1f7101550c92,2025-04-17T20:21:48.243000
CVE-2025-3661,0,0,57a3cd623ae52b068097bac07587daee7447c5e10d2129379d83b4265c5b02fd,2025-04-21T14:23:45.950000
CVE-2025-36625,0,0,45de53deee0dce100ce8c109fcd29d898f18f9e0ae3fd1f38ff75bfff7ae47fe,2025-04-21T14:23:45.950000
@ -290930,7 +290951,7 @@ CVE-2025-3696,0,0,32f2de58ed96b74775e2c60a486478c10d70019522c35cc3e9b072109db54b
CVE-2025-3697,0,0,efc24626d60f226a7c8893f741d68acfce7ef4171b33da45528fa7fe06636210,2025-04-17T20:22:16.240000
CVE-2025-3698,0,0,3410d174ae31c43abb68f418121b89dca3911c4e48575a9281b05507afa201de,2025-04-23T16:25:56.830000
CVE-2025-37087,0,0,a32cfc93639cde0565b8ba96aa9e37c7b9002ed2bfbea62267aca86b19c1b098,2025-04-23T14:15:29.167000
CVE-2025-37088,0,0,71e133b695e1add0e8b8869552c8d0cfe6f0ddc03af2e189826b44ff9e058128,2025-04-23T14:15:29.307000
CVE-2025-37088,0,1,71633ca0bded0afe76b62e0125774b335261cca8d10e4cf7c2e40c7ecc23dc6b,2025-04-25T15:15:36.593000
CVE-2025-3723,0,0,b4760de84ab5ad290fe476e11df508c34a5e1ece7a524dc9b4dda1f2e95b557b,2025-04-17T20:21:48.243000
CVE-2025-3724,0,0,3604e5f95b0ccc5cf202d1d68d9ef517bcacb52e6bf4b156e6577be4c7c5f23e,2025-04-17T20:21:48.243000
CVE-2025-3725,0,0,8ec71cb32939874b59fcf524cd8a7503311a419a9177764ff9a7d08a2f806b20,2025-04-17T20:21:48.243000
@ -291039,7 +291060,7 @@ CVE-2025-3902,0,0,676970333097082de40f6f58233872070947df9bef43bb3df9e412f6058936
CVE-2025-3903,0,0,c819a464552e9e27e8ed2bfdd866426360d2fc34658c9fc1c82fb0c8ffcfc0a1,2025-04-23T19:16:25.843000
CVE-2025-3904,0,0,0d6553172301a91027b8c3c2558169e5d5696a7e7eb460e09b39ca21f58cb939,2025-04-23T19:16:25.977000
CVE-2025-3907,0,0,f81e129f5f652610151f5866cb425f616cfd83cdc084a2f30c48e0083539d88e,2025-04-23T18:16:03.620000
CVE-2025-3912,1,1,901e67c14b99b1df95fb427fedf0205e55435551b230eb40d3ab7b801534a4de,2025-04-25T12:15:17.243000
CVE-2025-3912,0,0,901e67c14b99b1df95fb427fedf0205e55435551b230eb40d3ab7b801534a4de,2025-04-25T12:15:17.243000
CVE-2025-3923,0,0,182118b3a4f54e107b68d12918f8a2e69019afc473ce8aee5e35db6077d81a3b,2025-04-25T06:15:46.117000
CVE-2025-39359,0,0,fe1620cebe6a3577f2510d166c3a64f56c7e8a35f76d5fc351e9b3c2125fe136,2025-04-24T16:15:30.737000
CVE-2025-39360,0,0,415da8a72d7f8b017363e845eb01588faa06aeb0917d4cea44c42e1c474de6f5,2025-04-24T16:15:30.877000
@ -291210,6 +291231,7 @@ CVE-2025-43012,0,0,18e1af789e53f96a6c881eae07096e79716556b48ee757b9a80a5d7ad315f
CVE-2025-43013,0,0,cea29fefbb7874147d20ca0439a948894c9ed92ca59da3ffe37724562ec07c4b,2025-04-23T15:29:33.910000
CVE-2025-43014,0,0,8c8e187893b05115834c1fe60888f6689d95da1f55e6603f1b98a0a40089dd30,2025-04-23T16:11:35.837000
CVE-2025-43015,0,0,2a48e113361cb9a0483ab563a6b6e0e9918b5505e9e0f6b69858ea7bf2701b9d,2025-04-17T20:21:05.203000
CVE-2025-43016,1,1,d4e5ad3758c737aa4cd5c4bfda5a881ca8580212e69ffa040608a171f6d0e29c,2025-04-25T15:15:39.260000
CVE-2025-43703,0,0,9ffdd9596bfa1e88ec9059e0286523ec84cddbc80b74fbe08d9a126526684bcf,2025-04-17T20:21:48.243000
CVE-2025-43704,0,0,93215b502ded5b759f01e8bfd4bceefdbd3e881e2349bfb7d79f62333fd912ac,2025-04-17T20:21:48.243000
CVE-2025-43708,0,0,dcc5cc9a4e3747e1ffafbd764dd9d656ce28ca0c166ce05480007b6731988175,2025-04-17T20:21:48.243000
@ -291220,6 +291242,7 @@ CVE-2025-43855,0,0,4d028e3310f63e7b38c21bf23731ae08e632de948592957426a9b77ab2fde
CVE-2025-43858,0,0,be917ba81d6a4d272a488bb23a25073002401f8c107bf400145b77cd525a018b,2025-04-24T19:15:46.947000
CVE-2025-43859,0,0,7a013095b013ce1413e569741ba7a3ea7943a5c2c3b80bb4c5fde50bae191b7b,2025-04-24T19:15:47.060000
CVE-2025-43861,0,0,ababfbf43410d468d3b1cf5988fc1b1169850e57998f458994c591d91a5d40a5,2025-04-24T21:15:24.310000
CVE-2025-43862,1,1,d337541dda278a63b48e56dbf2722874cf10bdc8cbe8b3446906dd70a2f92f14,2025-04-25T15:15:39.920000
CVE-2025-43864,0,0,d35200039b663ce38e5be44c2d98b816373656933116778671f27ce1e5e5fb63,2025-04-25T01:15:43.117000
CVE-2025-43865,0,0,fe3b7d3e8117adbc9d9fe73a5b54d5c41ecdb20fcc9aa86eb767a47e7d2934d0,2025-04-25T01:15:43.270000
CVE-2025-43893,0,0,ce2184c9570a27f32b1c53e1a7eb084bc072ba61bfa0569a85000898bdc56f02,2025-04-19T03:15:14.017000
@ -291241,7 +291264,7 @@ CVE-2025-43921,0,0,860aba6699eab477405736f86cb620ec9a60d3be813cd4186e40b0b2a1086
CVE-2025-43922,0,0,78ba59a603bfb99812991a8e1a7955ce6faa943c6ec5cbadbdfa1e2ab9c91614,2025-04-23T14:08:13.383000
CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000
CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000
CVE-2025-43946,0,0,6b506e54a200df802ce1259ba4eaebc57f351718014e173df406945d407ec7f6,2025-04-23T14:15:29.630000
CVE-2025-43946,0,1,30b1b66631e81e9cea6f13a15d14a3693a662f0512102eed75d0a09582b31af1,2025-04-25T15:15:40.050000
CVE-2025-43947,0,0,45dc55ef8d0feb1382386c26465395b874bd89f0f1e3ab24423e3a96653b3c87,2025-04-23T14:08:13.383000
CVE-2025-43948,0,0,efd3931cdaeca2d3b1dbf5f3f44aee732afa37b700ca8822c69f897fc0f80984,2025-04-23T14:08:13.383000
CVE-2025-43949,0,0,c8d8666427b910512729fd59d7334c67c298b545b1a137043425731a8a0336b5,2025-04-23T14:15:29.783000
@ -291331,6 +291354,8 @@ CVE-2025-46417,0,0,90720a97861fe0edf996810e9f8b24cf965d682b200404a75f2856619f814
CVE-2025-46419,0,0,1a34f5342e64579d123a08cc24aef78b0d6763ffebef4f99c528ca3f0aa12df1,2025-04-24T01:15:51.360000
CVE-2025-46420,0,0,abc71b52b849f726ff8be64ef3abd516b554526457a7cbece372d17d3340fe09,2025-04-24T13:15:45.553000
CVE-2025-46421,0,0,5cbb299ad045c28edb58aa77219a50cf2d13612c6ce8ead13af817b802d58002,2025-04-24T13:15:45.703000
CVE-2025-46432,1,1,aecf65fba42e2dbb1bf1a1ee12de0d9f753c6cf20c38d0c95ae6a6c2293b6b2b,2025-04-25T15:15:40.347000
CVE-2025-46433,1,1,ee6c70859808495f920cc4802ce386ae1292288f3eb3ec4c12efa1fd6aaec717,2025-04-25T15:15:40.480000
CVE-2025-46435,0,0,d48bb27c598239c885ff66faff400a31ddacfc2e77f794e65e2deb46d7af7cd2,2025-04-24T16:15:34.613000
CVE-2025-46436,0,0,8e2edf5d6c15d988e2c57e12c5b455814b906ca6ebe9a781e03fd35cc0e8207c,2025-04-24T16:15:34.770000
CVE-2025-46438,0,0,7e9dd8bb37207b4aaedd1211fdc8230dca9a2429529669a208734dc2ddfe6eb0,2025-04-24T16:15:34.910000
@ -291420,3 +291445,4 @@ CVE-2025-46599,0,0,507c3921a2341d2bbda9e73d2f3cef8c521c3ee588d0088efd73881d2da1d
CVE-2025-46613,0,0,fb63aa932416287c8229af8ca941c8fc1e3cc17d68277bca805056b66b2de1ef,2025-04-25T06:15:46.273000
CVE-2025-46616,0,0,6f77a3deea80513a0e444e82f1b969313a83fb972c392a9b077d9c4200172c06,2025-04-25T07:15:48.643000
CVE-2025-46617,0,0,8264fe3c72bbb8b882b06aaed5126806c5af44dc16714e5ba80c3b2cd476f946,2025-04-25T07:15:48.837000
CVE-2025-46618,1,1,4e5b2699bfdedc6ad58a2dd050f1132b14684461f25e6c5475feda78ee59e7e9,2025-04-25T15:15:40.957000

Can't render this file because it is too large.