From 66cba312461be029350e4a0b870b77a3ca8ce422 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 27 Apr 2025 08:03:57 +0000 Subject: [PATCH] Auto-Update: 2025-04-27T08:00:19.723584+00:00 --- CVE-2025/CVE-2025-240xx/CVE-2025-24054.json | 10 +- CVE-2025/CVE-2025-39xx/CVE-2025-3960.json | 148 ++++++++++++++++++++ CVE-2025/CVE-2025-39xx/CVE-2025-3961.json | 148 ++++++++++++++++++++ CVE-2025/CVE-2025-39xx/CVE-2025-3962.json | 148 ++++++++++++++++++++ README.md | 18 +-- _state.csv | 13 +- 6 files changed, 468 insertions(+), 17 deletions(-) create mode 100644 CVE-2025/CVE-2025-39xx/CVE-2025-3960.json create mode 100644 CVE-2025/CVE-2025-39xx/CVE-2025-3961.json create mode 100644 CVE-2025/CVE-2025-39xx/CVE-2025-3962.json diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24054.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24054.json index 905b9c7073b..6e095aac094 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24054.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24054.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24054", "sourceIdentifier": "secure@microsoft.com", "published": "2025-03-11T17:16:27.660", - "lastModified": "2025-04-18T14:15:17.677", - "vulnStatus": "Analyzed", + "lastModified": "2025-04-27T07:15:14.857", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -66,7 +66,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -247,6 +247,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2025/Apr/28", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3960.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3960.json new file mode 100644 index 00000000000..9e349f75ee6 --- /dev/null +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3960.json @@ -0,0 +1,148 @@ +{ + "id": "CVE-2025-3960", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-27T06:15:14.870", + "lastModified": "2025-04-27T06:15:14.870", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in withstars Books-Management-System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /allreaders.html of the component Background Interface. The manipulation leads to missing authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + }, + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/Books-Management-System/%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306296", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306296", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.557230", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3961.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3961.json new file mode 100644 index 00000000000..999d0bc88a3 --- /dev/null +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3961.json @@ -0,0 +1,148 @@ +{ + "id": "CVE-2025-3961", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-27T07:15:15.307", + "lastModified": "2025-04-27T07:15:15.307", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in withstars Books-Management-System 1.0. This affects an unknown part of the file /admin/article/add/do. The manipulation of the argument Title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306297", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306297", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.557231", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3962.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3962.json new file mode 100644 index 00000000000..cbe5c00fd6d --- /dev/null +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3962.json @@ -0,0 +1,148 @@ +{ + "id": "CVE-2025-3962", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-27T07:15:15.580", + "lastModified": "2025-04-27T07:15:15.580", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in withstars Books-Management-System 1.0. This vulnerability affects unknown code of the file /api/comment/add of the component Comment Handler. The manipulation of the argument content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS2.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306298", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306298", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.557236", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 18a790a06a1..3adbebb5184 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-27T06:00:20.529607+00:00 +2025-04-27T08:00:19.723584+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-27T05:15:14.913000+00:00 +2025-04-27T07:15:15.580000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -291504 +291507 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `3` -- [CVE-2025-3956](CVE-2025/CVE-2025-39xx/CVE-2025-3956.json) (`2025-04-27T04:15:19.820`) -- [CVE-2025-3957](CVE-2025/CVE-2025-39xx/CVE-2025-3957.json) (`2025-04-27T04:15:21.303`) -- [CVE-2025-3958](CVE-2025/CVE-2025-39xx/CVE-2025-3958.json) (`2025-04-27T04:15:22.183`) -- [CVE-2025-3959](CVE-2025/CVE-2025-39xx/CVE-2025-3959.json) (`2025-04-27T05:15:14.913`) +- [CVE-2025-3960](CVE-2025/CVE-2025-39xx/CVE-2025-3960.json) (`2025-04-27T06:15:14.870`) +- [CVE-2025-3961](CVE-2025/CVE-2025-39xx/CVE-2025-3961.json) (`2025-04-27T07:15:15.307`) +- [CVE-2025-3962](CVE-2025/CVE-2025-39xx/CVE-2025-3962.json) (`2025-04-27T07:15:15.580`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +- [CVE-2025-24054](CVE-2025/CVE-2025-240xx/CVE-2025-24054.json) (`2025-04-27T07:15:14.857`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 66c60deeffa..bbde1db88b8 100644 --- a/_state.csv +++ b/_state.csv @@ -285636,7 +285636,7 @@ CVE-2025-24049,0,0,c96a830ec0f18d79a5db8a9190cb42a90f71219e9f2b1730e8fadf97f4ebe CVE-2025-24050,0,0,96b0d6d2d7280b137bb6b32fee5f429bee61ce1818c850d79656322dd5861855,2025-03-11T17:16:27.273000 CVE-2025-24051,0,0,62e4c6d776991955eddf8f9fa84956d92911f7357d924edcbd1e9b911107f978,2025-03-11T17:16:27.467000 CVE-2025-24053,0,0,2c998e5eb6f912e01c89bb52688ba2a8dd4218fded0639925effa402db8e971e,2025-03-13T18:15:47.597000 -CVE-2025-24054,0,0,ac20251ebe8496eaaf0c95a4c46422df5c703bb56169ff36d632835a03e9a833,2025-04-18T14:15:17.677000 +CVE-2025-24054,0,1,232579a58f7c3e073a24d7bc043f3137e9839fc41e844484b11f3c599e406494,2025-04-27T07:15:14.857000 CVE-2025-24055,0,0,a8b8e4cdf1af85735e51c417e608db31da64b217ea9a84bbe3faa9ab9f183fac,2025-03-31T02:15:18.163000 CVE-2025-24056,0,0,5c04f556316dbd8033fde99ee6b7a7436c924957f8339e64eeff70189003a64b,2025-03-11T17:16:28.130000 CVE-2025-24057,0,0,e93c1320ebadbbf28092c6fd0ce7c31e79b375949df78d42f385ee860a69efb1,2025-03-11T17:16:28.390000 @@ -291199,7 +291199,7 @@ CVE-2025-39556,0,0,d68e9daa1c3faf2971d81baac3100d35c7f22607e7ec3dd48a6a61dad3fcc CVE-2025-39557,0,0,ab798f74104e4ea6a62d1741144fecbded0c6e6a35299650562afb62fcd68b64,2025-04-16T13:25:37.340000 CVE-2025-39558,0,0,67a2a860cfbc0ea088c90bb02f84d72dc8a481fb30d037d0aef53a535f1a6d24,2025-04-17T20:21:05.203000 CVE-2025-39559,0,0,c1ad53e856c4f768703a54f48cc513afd8e437d825b78af7c6346c9c763439ca,2025-04-17T20:21:05.203000 -CVE-2025-3956,1,1,014f908f4d0e10bec4482507afe09f2ffb74d46ac7de278573210da64d93dec3,2025-04-27T04:15:19.820000 +CVE-2025-3956,0,0,014f908f4d0e10bec4482507afe09f2ffb74d46ac7de278573210da64d93dec3,2025-04-27T04:15:19.820000 CVE-2025-39560,0,0,42e2ca75c726dff6d99ee282e4af806d0fe49793ad81863f016666bfac2f4d89,2025-04-16T13:25:37.340000 CVE-2025-39562,0,0,d4d4487b38eb46ba5421d3523a3d0b7819a9efcedbaa8ee370d835f2cb48dc83,2025-04-17T20:21:05.203000 CVE-2025-39563,0,0,b0f0bb1bf2f780ed510466be812b57e730b9164ecf6ec630c83329e9f8d451f9,2025-04-16T13:25:37.340000 @@ -291209,7 +291209,7 @@ CVE-2025-39566,0,0,b44bf7ee79269356d146a5ba7f17bde177e33d9e54e2e2271a81c83e0ca0d CVE-2025-39567,0,0,8edd9105a6a6b1c9b6e38ff0e7a08628e7a440d0e563784bd8c32c8c570c8b84,2025-04-17T20:21:05.203000 CVE-2025-39568,0,0,82d2b43234ceda3a6c917e821eb93c294ae610746b1e2d35e954f4d031019ea8,2025-04-17T20:21:05.203000 CVE-2025-39569,0,0,bbd3885bb273d8540d768161ed8b0a66f400ca218afebf274483cb20cc58eb9a,2025-04-17T20:21:05.203000 -CVE-2025-3957,1,1,22aaf54b9dadd008568ea19b33708a84c2b61627fbde18394415d8c8758d3d71,2025-04-27T04:15:21.303000 +CVE-2025-3957,0,0,22aaf54b9dadd008568ea19b33708a84c2b61627fbde18394415d8c8758d3d71,2025-04-27T04:15:21.303000 CVE-2025-39570,0,0,bcbcc3a610b6380b6d25206f15e28075545f9fa9fe69af87e9ff2f3b2eab8461,2025-04-16T13:25:37.340000 CVE-2025-39571,0,0,f1943abf030c7c593c49f4592f830cc61d4a0028491b1b7c16dc062caebd1580,2025-04-16T13:25:37.340000 CVE-2025-39572,0,0,04d8b4cab5c52be01224a9e1e92feedbba712b9e8124769dd248bad97451c8cb,2025-04-16T13:25:37.340000 @@ -291220,7 +291220,7 @@ CVE-2025-39576,0,0,d4badf7bc91022baca59bc9f19a8c58ba65235e4e22fed18a3b809f41a409 CVE-2025-39577,0,0,3177e0444a2b26293a4453b1bce883e7c655bb415c657c03d5ca6b58d18acdc2,2025-04-16T13:25:37.340000 CVE-2025-39578,0,0,a1079a80b92eb97a4e9f7eef52d34afde11a50b87b51d67d47a76652671f0467,2025-04-16T13:25:37.340000 CVE-2025-39579,0,0,21384c15a899fd4b363a0177befed383262734d257c01f4137f1b18c7c060156,2025-04-16T13:25:37.340000 -CVE-2025-3958,1,1,b93086a7e004e6a6b4689a756198e01a2cf88637d8dbd4d19008b4d866488a68,2025-04-27T04:15:22.183000 +CVE-2025-3958,0,0,b93086a7e004e6a6b4689a756198e01a2cf88637d8dbd4d19008b4d866488a68,2025-04-27T04:15:22.183000 CVE-2025-39580,0,0,17507b32926f9769a24b6ff0d4db96a2f9ac34595dad828839eb8469b133b674,2025-04-17T20:21:05.203000 CVE-2025-39581,0,0,a9cf9144b2768c6db90b8d19758d7d9dd55ebe6ec2f998597a728f8c8cb750ae,2025-04-16T13:25:37.340000 CVE-2025-39582,0,0,c48811629ddaa60afe46494894898a8fc914f0f9ed52c2f9358d9b57f7ea0df8,2025-04-16T13:25:37.340000 @@ -291231,7 +291231,7 @@ CVE-2025-39586,0,0,52bb59767bbab516240eeb25d98c85fb9c17cc7c0a7291a452e44c2d2d8fd CVE-2025-39587,0,0,33b50d289bef4c6cf8e1d438372ef1b7294ade35fdd035c52b9205ffa75f7054,2025-04-17T20:21:05.203000 CVE-2025-39588,0,0,11c774fc5ce2f3ca664860ee721c9f2e869880e366a587e3ea483924c9217fef,2025-04-17T20:21:05.203000 CVE-2025-39589,0,0,b29715a124e04614d12bf3ec3760b977199c44ae1ab61b48901af87bf741aa31,2025-04-16T13:25:37.340000 -CVE-2025-3959,1,1,28c0f258cc0c12bce38df7670a8c07c3b0305490344aa8266596fffec0492b36,2025-04-27T05:15:14.913000 +CVE-2025-3959,0,0,28c0f258cc0c12bce38df7670a8c07c3b0305490344aa8266596fffec0492b36,2025-04-27T05:15:14.913000 CVE-2025-39590,0,0,cbdd893bfedbcc5d8fb6519f3f308a6d352d7fa479853807ae3480a0edfcba1b,2025-04-16T13:25:37.340000 CVE-2025-39591,0,0,e700c0dfaa8a5bae80ad0a0b7ed51d5cdc4aea4794301d82136f242a1a8957b1,2025-04-16T13:25:37.340000 CVE-2025-39592,0,0,e8ceb434cbf9e8e6650a1ba72155a574a58e7aa1902306fcf199521eadc1fdb4,2025-04-16T13:25:37.340000 @@ -291242,9 +291242,12 @@ CVE-2025-39596,0,0,e173976a1c0999b01b788ac1a4c5ae24f6505527b92ae9fe5f45ca8a72d79 CVE-2025-39597,0,0,b362997db93d9bfea0d7af44af4fd221eb0b25a2a82395ff55df61546df84055,2025-04-16T13:25:37.340000 CVE-2025-39598,0,0,73d622048aeed09278774e13f22cb598b1a5cb08b2f1dd7ec3313a376059ffea,2025-04-16T13:25:37.340000 CVE-2025-39599,0,0,091138247dcd1675bb93a1a469c4c7e89efe9b80c6a9739e4d163c5f536db88d,2025-04-16T13:25:37.340000 +CVE-2025-3960,1,1,0a205fc71590454f80109f0a1ee8ee5a9fa54132db4db7c45917814b38948f8d,2025-04-27T06:15:14.870000 CVE-2025-39600,0,0,71f55bfcced2bb7d7f35d4ab207853635aec1cc4573a3ee9f10ef122db1f0de7,2025-04-16T13:25:37.340000 CVE-2025-39601,0,0,4f2eb6f0c2c624c12002346e13c479a2ea3b462ff0c42b3b14b9783c236c648a,2025-04-16T13:25:37.340000 CVE-2025-39602,0,0,372857ab0b3fa589d5d3849a523521babea3aee49aea0f2c09c05c2852655522,2025-04-16T13:25:37.340000 +CVE-2025-3961,1,1,45a7ac44f384c30e3fbb9f668e36f375f4d1331a1daa19419d9d2a8c22592190,2025-04-27T07:15:15.307000 +CVE-2025-3962,1,1,346464949fea6dd25a02f68fe26d10089c971b819db5bc3379dd490e49dc640e,2025-04-27T07:15:15.580000 CVE-2025-39688,0,0,98c7c61fe32c2ce6358a9d7ef0df54915bb47bee498593264d8ad933fcce6211,2025-04-21T14:23:45.950000 CVE-2025-39728,0,0,1aabeb48c74961651a085e70675ac1fbb7850a26c8e3690479606fce3eed8d57,2025-04-21T14:23:45.950000 CVE-2025-39735,0,0,685f7725750b068bcf70f45c9b43584f95555d2cf42375499465209022c1892a,2025-04-21T14:23:45.950000