From 5861cff0cdee0df06f6b9ea1ad34a73abe4ddd7b Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 25 Apr 2025 04:03:52 +0000 Subject: [PATCH] Auto-Update: 2025-04-25T04:00:19.474157+00:00 --- CVE-2025/CVE-2025-03xx/CVE-2025-0395.json | 6 +- CVE-2025/CVE-2025-35xx/CVE-2025-3512.json | 6 +- CVE-2025/CVE-2025-39xx/CVE-2025-3900.json | 10 ++- CVE-2025/CVE-2025-465xx/CVE-2025-46544.json | 68 +++++++++++++++++++++ CVE-2025/CVE-2025-465xx/CVE-2025-46545.json | 68 +++++++++++++++++++++ CVE-2025/CVE-2025-465xx/CVE-2025-46546.json | 68 +++++++++++++++++++++ CVE-2025/CVE-2025-465xx/CVE-2025-46547.json | 68 +++++++++++++++++++++ CVE-2025/CVE-2025-465xx/CVE-2025-46595.json | 56 +++++++++++++++++ README.md | 22 ++++--- _state.csv | 19 +++--- 10 files changed, 372 insertions(+), 19 deletions(-) create mode 100644 CVE-2025/CVE-2025-465xx/CVE-2025-46544.json create mode 100644 CVE-2025/CVE-2025-465xx/CVE-2025-46545.json create mode 100644 CVE-2025/CVE-2025-465xx/CVE-2025-46546.json create mode 100644 CVE-2025/CVE-2025-465xx/CVE-2025-46547.json create mode 100644 CVE-2025/CVE-2025-465xx/CVE-2025-46595.json diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0395.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0395.json index 02f21d41bf5..9e0cff809a5 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0395.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0395.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0395", "sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18", "published": "2025-01-22T13:15:20.933", - "lastModified": "2025-04-13T04:15:15.777", + "lastModified": "2025-04-25T02:15:13.740", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,6 +80,10 @@ "url": "http://www.openwall.com/lists/oss-security/2025/04/13/1", "source": "af854a3a-2127-422b-91ae-364da2661108" }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/04/24/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://security.netapp.com/advisory/ntap-20250228-0006/", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3512.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3512.json index b7f8bc64b96..f9c2215af4a 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3512.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3512.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3512", "sourceIdentifier": "a59d8014-47c4-4630-ab43-e1b13cbe58e3", "published": "2025-04-11T08:15:15.797", - "lastModified": "2025-04-24T21:15:24.193", + "lastModified": "2025-04-25T02:15:14.603", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -89,6 +89,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/04/24/6", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/04/25/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3900.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3900.json index 34d3f567060..97d1c5fecef 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3900.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3900.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3900", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-04-23T17:16:55.760", - "lastModified": "2025-04-23T19:16:25.423", + "lastModified": "2025-04-25T03:15:19.000", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Colorbox allows Cross-Site Scripting (XSS).This issue affects Colorbox: from 0.0.0 before 2.1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Colorbox permite Cross-Site Scripting (XSS). Este problema afecta a Colorbox: desde la versi\u00f3n 0.0.0 hasta la 2.1.3." } ], "metrics": { @@ -51,6 +55,10 @@ { "url": "https://www.drupal.org/sa-contrib-2025-041", "source": "mlhess@drupal.org" + }, + { + "url": "https://backdropcms.org/security/backdrop-sa-contrib-2025-012", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46544.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46544.json new file mode 100644 index 00000000000..3d3f19a68c8 --- /dev/null +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46544.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-46544", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-25T03:15:19.953", + "lastModified": "2025-04-25T03:15:19.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Sherpa Orchestrator 141851, a low-privileged user can elevate their privileges by creating new users and roles." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://deiteriy.com", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/ArtemBrylev/a258f920a6556470951c9a483fcf194a", + "source": "cve@mitre.org" + }, + { + "url": "https://sherparpa.com", + "source": "cve@mitre.org" + }, + { + "url": "https://twitter.com/ArtyomBrylev", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46545.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46545.json new file mode 100644 index 00000000000..f5e1ef0dbfa --- /dev/null +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46545.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-46545", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-25T03:15:20.110", + "lastModified": "2025-04-25T03:15:20.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Sherpa Orchestrator 141851, the functionality for adding or updating licenses allows for stored XSS attacks by an administrator through the name parameter. The XSS payload can execute when the license expires." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://deiteriy.com", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/ArtemBrylev/5a0c76285d5fa9daf4ec753034185de7", + "source": "cve@mitre.org" + }, + { + "url": "https://sherparpa.com", + "source": "cve@mitre.org" + }, + { + "url": "https://twitter.com/ArtyomBrylev", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46546.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46546.json new file mode 100644 index 00000000000..eaeeafec1ee --- /dev/null +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46546.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-46546", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-25T03:15:20.270", + "lastModified": "2025-04-25T03:15:20.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Sherpa Orchestrator 141851, multiple time-based blind SQL injections can be performed by an authenticated user. This affects api/gui/asset/list, /api/gui/files/export/csv/, /api/gui/files/list, /api/gui/process/export/csv, /api/gui/process/export/xlsx, /api/gui/process/listAll, /api/gui/processVersion/export/csv/, /api/gui/processVersion/export/xlsx/, /api/gui/processVersion/list/, /api/gui/robot/list/, /api/gui/task/export/csv/, /api/gui/task/export/xlsx/, and /api/gui/task/list/." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://deiteriy.com", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/ArtemBrylev/59b4c0825a988f39a58b79e4e8d2f378", + "source": "cve@mitre.org" + }, + { + "url": "https://sherparpa.com", + "source": "cve@mitre.org" + }, + { + "url": "https://twitter.com/ArtyomBrylev", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46547.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46547.json new file mode 100644 index 00000000000..892fbddd93a --- /dev/null +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46547.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-46547", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-25T03:15:20.430", + "lastModified": "2025-04-25T03:15:20.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Sherpa Orchestrator 141851, the web application lacks protection against CSRF attacks, with resultant effects of an attacker conducting XSS attacks, adding a new user or role, or exploiting a SQL injection issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://deiteriy.com", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/ArtemBrylev/9af206c46d7505db03ad6fcd9fc46f7f", + "source": "cve@mitre.org" + }, + { + "url": "https://sherparpa.com", + "source": "cve@mitre.org" + }, + { + "url": "https://twitter.com/ArtyomBrylev", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46595.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46595.json new file mode 100644 index 00000000000..115b3a74602 --- /dev/null +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46595.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-46595", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-25T03:15:20.583", + "lastModified": "2025-04-25T03:15:20.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An XSS issue was discovered in the Flag module before 1.x-3.6.2 for Backdrop CMS. Flag is a module that allows flags to be added to nodes, comments, users, and any other type of entity. It doesn't verify flag links before performing the flag action, or verify that the response returned was provided by the flag module. This can allow crafted HTML to result in Cross Site Scripting. This is mitigated by the fact that an attacker must have a role with permission to create links on the website, for example: create or edit comments or content with a filtered text format." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://backdropcms.org/security/backdrop-sa-contrib-2025-011", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9820ad38d9e..856d62b5bca 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-25T02:00:19.369081+00:00 +2025-04-25T04:00:19.474157+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-25T01:15:43.270000+00:00 +2025-04-25T03:15:20.583000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -291389 +291394 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `5` -- [CVE-2025-2185](CVE-2025/CVE-2025-21xx/CVE-2025-2185.json) (`2025-04-25T00:15:15.340`) -- [CVE-2025-3606](CVE-2025/CVE-2025-36xx/CVE-2025-3606.json) (`2025-04-25T00:15:15.807`) -- [CVE-2025-43864](CVE-2025/CVE-2025-438xx/CVE-2025-43864.json) (`2025-04-25T01:15:43.117`) -- [CVE-2025-43865](CVE-2025/CVE-2025-438xx/CVE-2025-43865.json) (`2025-04-25T01:15:43.270`) +- [CVE-2025-46544](CVE-2025/CVE-2025-465xx/CVE-2025-46544.json) (`2025-04-25T03:15:19.953`) +- [CVE-2025-46545](CVE-2025/CVE-2025-465xx/CVE-2025-46545.json) (`2025-04-25T03:15:20.110`) +- [CVE-2025-46546](CVE-2025/CVE-2025-465xx/CVE-2025-46546.json) (`2025-04-25T03:15:20.270`) +- [CVE-2025-46547](CVE-2025/CVE-2025-465xx/CVE-2025-46547.json) (`2025-04-25T03:15:20.430`) +- [CVE-2025-46595](CVE-2025/CVE-2025-465xx/CVE-2025-46595.json) (`2025-04-25T03:15:20.583`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `3` +- [CVE-2025-0395](CVE-2025/CVE-2025-03xx/CVE-2025-0395.json) (`2025-04-25T02:15:13.740`) +- [CVE-2025-3512](CVE-2025/CVE-2025-35xx/CVE-2025-3512.json) (`2025-04-25T02:15:14.603`) +- [CVE-2025-3900](CVE-2025/CVE-2025-39xx/CVE-2025-3900.json) (`2025-04-25T03:15:19.000`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7e06883c724..4f933de7967 100644 --- a/_state.csv +++ b/_state.csv @@ -281584,7 +281584,7 @@ CVE-2025-0391,0,0,0467368bada2df94a15908d4f5a949241716a78292a611cf2ebdc384e88dff CVE-2025-0392,0,0,6d776f15a1615409f95c7590d77895411eaef103ad79522fbedabde2ae1bcf6e,2025-01-11T11:15:06.657000 CVE-2025-0393,0,0,74b1491fc9d1d332b7cea13756d765de036ad1e5aabef642cce253224abebfeb,2025-03-03T18:44:25.393000 CVE-2025-0394,0,0,8af05602da319139a083fa2a7a4d905dc508d9028abbcf98db5f09623dbab6ca,2025-01-14T09:15:21.430000 -CVE-2025-0395,0,0,39c6a72a092ae914c8d2ca06f4f0a91a249fc0dd2653680f2d523c990003db7e,2025-04-13T04:15:15.777000 +CVE-2025-0395,0,1,a9555a365d4d25282aa82abdae80a6aaf177f9281458c9e79851b2cbc94b07b7,2025-04-25T02:15:13.740000 CVE-2025-0396,0,0,b1ad63be952ebb25b29036632d23a5d199acb4c2189238a997d4a9d9ed4a3a46,2025-01-12T12:15:17.963000 CVE-2025-0397,0,0,fc2836035f8f0734fbc89dbf3d5d6ca5a6d8f9324d4d87855a3361cc69455d9f,2025-01-12T13:15:07.333000 CVE-2025-0398,0,0,7635a06cfc090a7002e0ac0d2d6a644dce64169ca946e1fb581e4d24bb6a960c,2025-01-12T14:15:08.993000 @@ -283787,7 +283787,7 @@ CVE-2025-21846,0,0,a8c4aafa56e990c981f46d27e4cf31dd17e18aba3aa6774e9c80e1469260b CVE-2025-21847,0,0,c5290d0f707550329c963c7bedefc01553b2c58a7ce20e595561857ab1243c53,2025-03-13T16:28:39.640000 CVE-2025-21848,0,0,90ecc1a25d7c22d7cc542aa7c0a64a482d87451bb9e957dfbeae5637fb708f88,2025-03-13T16:28:48.737000 CVE-2025-21849,0,0,2b4770f02f0a18d2a4722cf2279be3d213e0608407324d6df5d299d0295e6bb1,2025-03-13T16:29:00.400000 -CVE-2025-2185,1,1,91b412b1d296ace687d40a6783e92d40fc865c9d24522642b0a45c94519a33e3,2025-04-25T00:15:15.340000 +CVE-2025-2185,0,0,91b412b1d296ace687d40a6783e92d40fc865c9d24522642b0a45c94519a33e3,2025-04-25T00:15:15.340000 CVE-2025-21850,0,0,5a64ab06a2b6f581200ce1660927997cede0a2eabc44b30e9f55d39dacccfe4f,2025-03-13T16:29:12.770000 CVE-2025-21851,0,0,7bdca895fa921f203a0d87c612234a5ad7017395a8665ed600f55d38ca809496,2025-03-13T16:29:50.380000 CVE-2025-21852,0,0,c4adf7ded1a0df944edbc23a29fae37f72674fd1d9b49cefe98286acd387c332,2025-03-13T16:30:07.307000 @@ -290803,7 +290803,7 @@ CVE-2025-3487,0,0,9c4c75d6c0091c713978e1c59f9a7e572df4b06cf7511bf975fb971e572b54 CVE-2025-3489,0,0,59309d25f9f42981fc918bf9e175fc55c67d2cd139e3967ead123a01110b7abd,2025-04-11T15:40:10.277000 CVE-2025-3495,0,0,fe640c81a3ed6a86c53f35442fa10e181d645418d808dffc6fff69a3880ca71e,2025-04-16T13:25:37.340000 CVE-2025-3509,0,0,578735ff0d7174d4283b552c1ccab9d92c1a2ab0ec5ddb56de1fee20129f4e8b,2025-04-21T14:23:45.950000 -CVE-2025-3512,0,0,c5e99f917c66f55c4a943948cbd04d15673aad0431f9a775023d93a3039f3e0c,2025-04-24T21:15:24.193000 +CVE-2025-3512,0,1,df2cae04492d89c4b84e5a0fd1025055cbf21071217fd4f876d8ac094356d51d,2025-04-25T02:15:14.603000 CVE-2025-3518,0,0,7497563947f75b629887a4413d991889fb74f762947f73f77cc72069a35bed4e,2025-04-24T15:15:58.393000 CVE-2025-3519,0,0,7a1e772e7e1a4f83fd384db353598690580e540b87458701710d69fa7ae08b1c,2025-04-23T14:08:13.383000 CVE-2025-3520,0,0,be35fd038c4a5e22088fd0e9352f3a187df9abda8d0ecfa9c4571aec785dc913,2025-04-21T14:23:45.950000 @@ -290872,7 +290872,7 @@ CVE-2025-35965,0,0,5032599512a77bd51cf02842d0854bae70c3e0a5ffd87935d76910ac7a556 CVE-2025-3598,0,0,edf26968210ce22617ec678e5e822a9b5bd12eb64af0b7486db98454fc1aebda,2025-04-21T14:23:45.950000 CVE-2025-3603,0,0,528b682d4291a1224b42893433697d22b911f371a51927b820eacad6e22b750e,2025-04-24T09:15:31.367000 CVE-2025-3604,0,0,baf31b0791e80504b193fa7013e2e38c60ac45c1991419d39d318c8f5b9465a1,2025-04-24T09:15:31.537000 -CVE-2025-3606,1,1,4958770339244fe85adbb15a01e4f9e2cab95f3b848d93236024fef264765e4a,2025-04-25T00:15:15.807000 +CVE-2025-3606,0,0,4958770339244fe85adbb15a01e4f9e2cab95f3b848d93236024fef264765e4a,2025-04-25T00:15:15.807000 CVE-2025-3607,0,0,ecdbe72dea167374582b7a0b21b2763d55a028fec03c0df7dca0ae6a22873e5d,2025-04-24T09:15:31.730000 CVE-2025-3608,0,0,39b182f4ebb2561066bac4e2df270fac3ea79c341f6f5d3809c1d21f023dee46,2025-04-18T15:15:59.183000 CVE-2025-3612,0,0,b3e7e1fd46c9147c27f3feb15d1a5ba8eabce3f8bab41f1f78e6d74dff7b1b50,2025-04-15T18:39:27.967000 @@ -291014,7 +291014,7 @@ CVE-2025-3857,0,0,fdc00eaf569a8a97d8e857e27cf6b16e8647aa3722913fb3d0d4f9a9d2c1d8 CVE-2025-38575,0,0,37c6694d45ef25fd4c01ad5e4e3652528a6a4314cc0f5e821de7a1e34897732a,2025-04-21T14:23:45.950000 CVE-2025-38637,0,0,3408ca2942640f2c4ef381f50af306ea1306e1fe1017c8487acb41cc78bd4e79,2025-04-21T14:23:45.950000 CVE-2025-3872,0,0,5cb765ed7fef3b9f0d12bd3c4ff8f72750101d19c091b2b604bfbe228a3a9ed1,2025-04-24T10:15:17.093000 -CVE-2025-3900,0,0,eec55b9f35dd5a9d95b8f99ee98eb86c99b6f52b024fc66284593a5e225d395e,2025-04-23T19:16:25.423000 +CVE-2025-3900,0,1,3ae8ab21535f6098026790386548c684adf5dd99b2200771b193d30b1b4f72e4,2025-04-25T03:15:19 CVE-2025-3901,0,0,b90cd5a2e3fca1a445ce3d576dc238240ffa769b1c9f5dc33a753d8742417be6,2025-04-23T19:16:25.567000 CVE-2025-3902,0,0,676970333097082de40f6f58233872070947df9bef43bb3df9e412f6058936f6,2025-04-23T19:16:25.700000 CVE-2025-3903,0,0,c819a464552e9e27e8ed2bfdd866426360d2fc34658c9fc1c82fb0c8ffcfc0a1,2025-04-23T19:16:25.843000 @@ -291199,8 +291199,8 @@ CVE-2025-43855,0,0,4d028e3310f63e7b38c21bf23731ae08e632de948592957426a9b77ab2fde CVE-2025-43858,0,0,be917ba81d6a4d272a488bb23a25073002401f8c107bf400145b77cd525a018b,2025-04-24T19:15:46.947000 CVE-2025-43859,0,0,7a013095b013ce1413e569741ba7a3ea7943a5c2c3b80bb4c5fde50bae191b7b,2025-04-24T19:15:47.060000 CVE-2025-43861,0,0,ababfbf43410d468d3b1cf5988fc1b1169850e57998f458994c591d91a5d40a5,2025-04-24T21:15:24.310000 -CVE-2025-43864,1,1,d35200039b663ce38e5be44c2d98b816373656933116778671f27ce1e5e5fb63,2025-04-25T01:15:43.117000 -CVE-2025-43865,1,1,fe3b7d3e8117adbc9d9fe73a5b54d5c41ecdb20fcc9aa86eb767a47e7d2934d0,2025-04-25T01:15:43.270000 +CVE-2025-43864,0,0,d35200039b663ce38e5be44c2d98b816373656933116778671f27ce1e5e5fb63,2025-04-25T01:15:43.117000 +CVE-2025-43865,0,0,fe3b7d3e8117adbc9d9fe73a5b54d5c41ecdb20fcc9aa86eb767a47e7d2934d0,2025-04-25T01:15:43.270000 CVE-2025-43893,0,0,ce2184c9570a27f32b1c53e1a7eb084bc072ba61bfa0569a85000898bdc56f02,2025-04-19T03:15:14.017000 CVE-2025-43894,0,0,38ad6fd8c7d98bd63b2db2d688fe0af16a117e87d6d33ebfcd5ac8fe03cfe13b,2025-04-19T03:15:14.087000 CVE-2025-43895,0,0,25a6bc942a38867782955bcdd3844f6ecfae393455eeebbf2d597ac091c02f6e,2025-04-19T03:15:14.147000 @@ -291388,3 +291388,8 @@ CVE-2025-46538,0,0,977cff64c75e75ea9be4367a405f0c3465b4d8608c499fcb7b62bf0de1865 CVE-2025-46540,0,0,88cf03a006efb1c817ee5a2226b85fbc2b322a79ac2ec6615e73412343f21120,2025-04-24T16:15:45.237000 CVE-2025-46541,0,0,da52d58c1b4849bfdfde57a65e944d3915faed192efb9356d751433caba8d23f,2025-04-24T16:15:45.370000 CVE-2025-46542,0,0,b5220d8e0e0cfbe9593e410404b10271f074f95f490334ce02d81a704d75dae1,2025-04-24T16:15:45.513000 +CVE-2025-46544,1,1,6639e708475eb6c40279fa84df28c8763cfff16abdbe0c44ad5b1a5501652919,2025-04-25T03:15:19.953000 +CVE-2025-46545,1,1,ebb9a7223534e7aeca5ec9aaafba26c01977ad0d16e6ada11825b9508dafa9ea,2025-04-25T03:15:20.110000 +CVE-2025-46546,1,1,bbe2291a6389d510a4f24bcc2b2a30cce7ecf6d5819b248a0fea92455b2729b7,2025-04-25T03:15:20.270000 +CVE-2025-46547,1,1,270bfdcef95d1f4939142f366013a872d9c79c5f84d9ac0d0f2531729a9409b4,2025-04-25T03:15:20.430000 +CVE-2025-46595,1,1,3d64797336ab3d29ebb48d9b6595869fa146266b8e3098cce58e2b6e11a6c3ac,2025-04-25T03:15:20.583000