mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2025-04-27T08:00:19.723584+00:00
This commit is contained in:
parent
0c6e8b60f9
commit
66cba31246
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24054",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-03-11T17:16:27.660",
|
||||
"lastModified": "2025-04-18T14:15:17.677",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-04-27T07:15:14.857",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -66,7 +66,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -247,6 +247,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2025/Apr/28",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
148
CVE-2025/CVE-2025-39xx/CVE-2025-3960.json
Normal file
148
CVE-2025/CVE-2025-39xx/CVE-2025-3960.json
Normal file
@ -0,0 +1,148 @@
|
||||
{
|
||||
"id": "CVE-2025-3960",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T06:15:14.870",
|
||||
"lastModified": "2025-04-27T06:15:14.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in withstars Books-Management-System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /allreaders.html of the component Background Interface. The manipulation leads to missing authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/Books-Management-System/%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.306296",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.306296",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.557230",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
148
CVE-2025/CVE-2025-39xx/CVE-2025-3961.json
Normal file
148
CVE-2025/CVE-2025-39xx/CVE-2025-3961.json
Normal file
@ -0,0 +1,148 @@
|
||||
{
|
||||
"id": "CVE-2025-3961",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T07:15:15.307",
|
||||
"lastModified": "2025-04-27T07:15:15.307",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in withstars Books-Management-System 1.0. This affects an unknown part of the file /admin/article/add/do. The manipulation of the argument Title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.306297",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.306297",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.557231",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
148
CVE-2025/CVE-2025-39xx/CVE-2025-3962.json
Normal file
148
CVE-2025/CVE-2025-39xx/CVE-2025-3962.json
Normal file
@ -0,0 +1,148 @@
|
||||
{
|
||||
"id": "CVE-2025-3962",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T07:15:15.580",
|
||||
"lastModified": "2025-04-27T07:15:15.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in withstars Books-Management-System 1.0. This vulnerability affects unknown code of the file /api/comment/add of the component Comment Handler. The manipulation of the argument content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.306298",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.306298",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.557236",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
18
README.md
18
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-27T06:00:20.529607+00:00
|
||||
2025-04-27T08:00:19.723584+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-27T05:15:14.913000+00:00
|
||||
2025-04-27T07:15:15.580000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,23 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
291504
|
||||
291507
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2025-3956](CVE-2025/CVE-2025-39xx/CVE-2025-3956.json) (`2025-04-27T04:15:19.820`)
|
||||
- [CVE-2025-3957](CVE-2025/CVE-2025-39xx/CVE-2025-3957.json) (`2025-04-27T04:15:21.303`)
|
||||
- [CVE-2025-3958](CVE-2025/CVE-2025-39xx/CVE-2025-3958.json) (`2025-04-27T04:15:22.183`)
|
||||
- [CVE-2025-3959](CVE-2025/CVE-2025-39xx/CVE-2025-3959.json) (`2025-04-27T05:15:14.913`)
|
||||
- [CVE-2025-3960](CVE-2025/CVE-2025-39xx/CVE-2025-3960.json) (`2025-04-27T06:15:14.870`)
|
||||
- [CVE-2025-3961](CVE-2025/CVE-2025-39xx/CVE-2025-3961.json) (`2025-04-27T07:15:15.307`)
|
||||
- [CVE-2025-3962](CVE-2025/CVE-2025-39xx/CVE-2025-3962.json) (`2025-04-27T07:15:15.580`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2025-24054](CVE-2025/CVE-2025-240xx/CVE-2025-24054.json) (`2025-04-27T07:15:14.857`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
13
_state.csv
13
_state.csv
@ -285636,7 +285636,7 @@ CVE-2025-24049,0,0,c96a830ec0f18d79a5db8a9190cb42a90f71219e9f2b1730e8fadf97f4ebe
|
||||
CVE-2025-24050,0,0,96b0d6d2d7280b137bb6b32fee5f429bee61ce1818c850d79656322dd5861855,2025-03-11T17:16:27.273000
|
||||
CVE-2025-24051,0,0,62e4c6d776991955eddf8f9fa84956d92911f7357d924edcbd1e9b911107f978,2025-03-11T17:16:27.467000
|
||||
CVE-2025-24053,0,0,2c998e5eb6f912e01c89bb52688ba2a8dd4218fded0639925effa402db8e971e,2025-03-13T18:15:47.597000
|
||||
CVE-2025-24054,0,0,ac20251ebe8496eaaf0c95a4c46422df5c703bb56169ff36d632835a03e9a833,2025-04-18T14:15:17.677000
|
||||
CVE-2025-24054,0,1,232579a58f7c3e073a24d7bc043f3137e9839fc41e844484b11f3c599e406494,2025-04-27T07:15:14.857000
|
||||
CVE-2025-24055,0,0,a8b8e4cdf1af85735e51c417e608db31da64b217ea9a84bbe3faa9ab9f183fac,2025-03-31T02:15:18.163000
|
||||
CVE-2025-24056,0,0,5c04f556316dbd8033fde99ee6b7a7436c924957f8339e64eeff70189003a64b,2025-03-11T17:16:28.130000
|
||||
CVE-2025-24057,0,0,e93c1320ebadbbf28092c6fd0ce7c31e79b375949df78d42f385ee860a69efb1,2025-03-11T17:16:28.390000
|
||||
@ -291199,7 +291199,7 @@ CVE-2025-39556,0,0,d68e9daa1c3faf2971d81baac3100d35c7f22607e7ec3dd48a6a61dad3fcc
|
||||
CVE-2025-39557,0,0,ab798f74104e4ea6a62d1741144fecbded0c6e6a35299650562afb62fcd68b64,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39558,0,0,67a2a860cfbc0ea088c90bb02f84d72dc8a481fb30d037d0aef53a535f1a6d24,2025-04-17T20:21:05.203000
|
||||
CVE-2025-39559,0,0,c1ad53e856c4f768703a54f48cc513afd8e437d825b78af7c6346c9c763439ca,2025-04-17T20:21:05.203000
|
||||
CVE-2025-3956,1,1,014f908f4d0e10bec4482507afe09f2ffb74d46ac7de278573210da64d93dec3,2025-04-27T04:15:19.820000
|
||||
CVE-2025-3956,0,0,014f908f4d0e10bec4482507afe09f2ffb74d46ac7de278573210da64d93dec3,2025-04-27T04:15:19.820000
|
||||
CVE-2025-39560,0,0,42e2ca75c726dff6d99ee282e4af806d0fe49793ad81863f016666bfac2f4d89,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39562,0,0,d4d4487b38eb46ba5421d3523a3d0b7819a9efcedbaa8ee370d835f2cb48dc83,2025-04-17T20:21:05.203000
|
||||
CVE-2025-39563,0,0,b0f0bb1bf2f780ed510466be812b57e730b9164ecf6ec630c83329e9f8d451f9,2025-04-16T13:25:37.340000
|
||||
@ -291209,7 +291209,7 @@ CVE-2025-39566,0,0,b44bf7ee79269356d146a5ba7f17bde177e33d9e54e2e2271a81c83e0ca0d
|
||||
CVE-2025-39567,0,0,8edd9105a6a6b1c9b6e38ff0e7a08628e7a440d0e563784bd8c32c8c570c8b84,2025-04-17T20:21:05.203000
|
||||
CVE-2025-39568,0,0,82d2b43234ceda3a6c917e821eb93c294ae610746b1e2d35e954f4d031019ea8,2025-04-17T20:21:05.203000
|
||||
CVE-2025-39569,0,0,bbd3885bb273d8540d768161ed8b0a66f400ca218afebf274483cb20cc58eb9a,2025-04-17T20:21:05.203000
|
||||
CVE-2025-3957,1,1,22aaf54b9dadd008568ea19b33708a84c2b61627fbde18394415d8c8758d3d71,2025-04-27T04:15:21.303000
|
||||
CVE-2025-3957,0,0,22aaf54b9dadd008568ea19b33708a84c2b61627fbde18394415d8c8758d3d71,2025-04-27T04:15:21.303000
|
||||
CVE-2025-39570,0,0,bcbcc3a610b6380b6d25206f15e28075545f9fa9fe69af87e9ff2f3b2eab8461,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39571,0,0,f1943abf030c7c593c49f4592f830cc61d4a0028491b1b7c16dc062caebd1580,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39572,0,0,04d8b4cab5c52be01224a9e1e92feedbba712b9e8124769dd248bad97451c8cb,2025-04-16T13:25:37.340000
|
||||
@ -291220,7 +291220,7 @@ CVE-2025-39576,0,0,d4badf7bc91022baca59bc9f19a8c58ba65235e4e22fed18a3b809f41a409
|
||||
CVE-2025-39577,0,0,3177e0444a2b26293a4453b1bce883e7c655bb415c657c03d5ca6b58d18acdc2,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39578,0,0,a1079a80b92eb97a4e9f7eef52d34afde11a50b87b51d67d47a76652671f0467,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39579,0,0,21384c15a899fd4b363a0177befed383262734d257c01f4137f1b18c7c060156,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3958,1,1,b93086a7e004e6a6b4689a756198e01a2cf88637d8dbd4d19008b4d866488a68,2025-04-27T04:15:22.183000
|
||||
CVE-2025-3958,0,0,b93086a7e004e6a6b4689a756198e01a2cf88637d8dbd4d19008b4d866488a68,2025-04-27T04:15:22.183000
|
||||
CVE-2025-39580,0,0,17507b32926f9769a24b6ff0d4db96a2f9ac34595dad828839eb8469b133b674,2025-04-17T20:21:05.203000
|
||||
CVE-2025-39581,0,0,a9cf9144b2768c6db90b8d19758d7d9dd55ebe6ec2f998597a728f8c8cb750ae,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39582,0,0,c48811629ddaa60afe46494894898a8fc914f0f9ed52c2f9358d9b57f7ea0df8,2025-04-16T13:25:37.340000
|
||||
@ -291231,7 +291231,7 @@ CVE-2025-39586,0,0,52bb59767bbab516240eeb25d98c85fb9c17cc7c0a7291a452e44c2d2d8fd
|
||||
CVE-2025-39587,0,0,33b50d289bef4c6cf8e1d438372ef1b7294ade35fdd035c52b9205ffa75f7054,2025-04-17T20:21:05.203000
|
||||
CVE-2025-39588,0,0,11c774fc5ce2f3ca664860ee721c9f2e869880e366a587e3ea483924c9217fef,2025-04-17T20:21:05.203000
|
||||
CVE-2025-39589,0,0,b29715a124e04614d12bf3ec3760b977199c44ae1ab61b48901af87bf741aa31,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3959,1,1,28c0f258cc0c12bce38df7670a8c07c3b0305490344aa8266596fffec0492b36,2025-04-27T05:15:14.913000
|
||||
CVE-2025-3959,0,0,28c0f258cc0c12bce38df7670a8c07c3b0305490344aa8266596fffec0492b36,2025-04-27T05:15:14.913000
|
||||
CVE-2025-39590,0,0,cbdd893bfedbcc5d8fb6519f3f308a6d352d7fa479853807ae3480a0edfcba1b,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39591,0,0,e700c0dfaa8a5bae80ad0a0b7ed51d5cdc4aea4794301d82136f242a1a8957b1,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39592,0,0,e8ceb434cbf9e8e6650a1ba72155a574a58e7aa1902306fcf199521eadc1fdb4,2025-04-16T13:25:37.340000
|
||||
@ -291242,9 +291242,12 @@ CVE-2025-39596,0,0,e173976a1c0999b01b788ac1a4c5ae24f6505527b92ae9fe5f45ca8a72d79
|
||||
CVE-2025-39597,0,0,b362997db93d9bfea0d7af44af4fd221eb0b25a2a82395ff55df61546df84055,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39598,0,0,73d622048aeed09278774e13f22cb598b1a5cb08b2f1dd7ec3313a376059ffea,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39599,0,0,091138247dcd1675bb93a1a469c4c7e89efe9b80c6a9739e4d163c5f536db88d,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3960,1,1,0a205fc71590454f80109f0a1ee8ee5a9fa54132db4db7c45917814b38948f8d,2025-04-27T06:15:14.870000
|
||||
CVE-2025-39600,0,0,71f55bfcced2bb7d7f35d4ab207853635aec1cc4573a3ee9f10ef122db1f0de7,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39601,0,0,4f2eb6f0c2c624c12002346e13c479a2ea3b462ff0c42b3b14b9783c236c648a,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39602,0,0,372857ab0b3fa589d5d3849a523521babea3aee49aea0f2c09c05c2852655522,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3961,1,1,45a7ac44f384c30e3fbb9f668e36f375f4d1331a1daa19419d9d2a8c22592190,2025-04-27T07:15:15.307000
|
||||
CVE-2025-3962,1,1,346464949fea6dd25a02f68fe26d10089c971b819db5bc3379dd490e49dc640e,2025-04-27T07:15:15.580000
|
||||
CVE-2025-39688,0,0,98c7c61fe32c2ce6358a9d7ef0df54915bb47bee498593264d8ad933fcce6211,2025-04-21T14:23:45.950000
|
||||
CVE-2025-39728,0,0,1aabeb48c74961651a085e70675ac1fbb7850a26c8e3690479606fce3eed8d57,2025-04-21T14:23:45.950000
|
||||
CVE-2025-39735,0,0,685f7725750b068bcf70f45c9b43584f95555d2cf42375499465209022c1892a,2025-04-21T14:23:45.950000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user