Auto-Update: 2025-04-27T08:00:19.723584+00:00

This commit is contained in:
cad-safe-bot 2025-04-27 08:03:57 +00:00
parent 0c6e8b60f9
commit 66cba31246
6 changed files with 468 additions and 17 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24054",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-03-11T17:16:27.660",
"lastModified": "2025-04-18T14:15:17.677",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-27T07:15:14.857",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -247,6 +247,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2025/Apr/28",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,148 @@
{
"id": "CVE-2025-3960",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T06:15:14.870",
"lastModified": "2025-04-27T06:15:14.870",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in withstars Books-Management-System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /allreaders.html of the component Background Interface. The manipulation leads to missing authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
},
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/caigo8/CVE-md/blob/main/Books-Management-System/%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.306296",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.306296",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.557230",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,148 @@
{
"id": "CVE-2025-3961",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T07:15:15.307",
"lastModified": "2025-04-27T07:15:15.307",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in withstars Books-Management-System 1.0. This affects an unknown part of the file /admin/article/add/do. The manipulation of the argument Title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS1.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.306297",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.306297",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.557231",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,148 @@
{
"id": "CVE-2025-3962",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T07:15:15.580",
"lastModified": "2025-04-27T07:15:15.580",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in withstars Books-Management-System 1.0. This vulnerability affects unknown code of the file /api/comment/add of the component Comment Handler. The manipulation of the argument content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS2.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.306298",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.306298",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.557236",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-27T06:00:20.529607+00:00
2025-04-27T08:00:19.723584+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-27T05:15:14.913000+00:00
2025-04-27T07:15:15.580000+00:00
```
### Last Data Feed Release
@ -33,23 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
291504
291507
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `3`
- [CVE-2025-3956](CVE-2025/CVE-2025-39xx/CVE-2025-3956.json) (`2025-04-27T04:15:19.820`)
- [CVE-2025-3957](CVE-2025/CVE-2025-39xx/CVE-2025-3957.json) (`2025-04-27T04:15:21.303`)
- [CVE-2025-3958](CVE-2025/CVE-2025-39xx/CVE-2025-3958.json) (`2025-04-27T04:15:22.183`)
- [CVE-2025-3959](CVE-2025/CVE-2025-39xx/CVE-2025-3959.json) (`2025-04-27T05:15:14.913`)
- [CVE-2025-3960](CVE-2025/CVE-2025-39xx/CVE-2025-3960.json) (`2025-04-27T06:15:14.870`)
- [CVE-2025-3961](CVE-2025/CVE-2025-39xx/CVE-2025-3961.json) (`2025-04-27T07:15:15.307`)
- [CVE-2025-3962](CVE-2025/CVE-2025-39xx/CVE-2025-3962.json) (`2025-04-27T07:15:15.580`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2025-24054](CVE-2025/CVE-2025-240xx/CVE-2025-24054.json) (`2025-04-27T07:15:14.857`)
## Download and Usage

View File

@ -285636,7 +285636,7 @@ CVE-2025-24049,0,0,c96a830ec0f18d79a5db8a9190cb42a90f71219e9f2b1730e8fadf97f4ebe
CVE-2025-24050,0,0,96b0d6d2d7280b137bb6b32fee5f429bee61ce1818c850d79656322dd5861855,2025-03-11T17:16:27.273000
CVE-2025-24051,0,0,62e4c6d776991955eddf8f9fa84956d92911f7357d924edcbd1e9b911107f978,2025-03-11T17:16:27.467000
CVE-2025-24053,0,0,2c998e5eb6f912e01c89bb52688ba2a8dd4218fded0639925effa402db8e971e,2025-03-13T18:15:47.597000
CVE-2025-24054,0,0,ac20251ebe8496eaaf0c95a4c46422df5c703bb56169ff36d632835a03e9a833,2025-04-18T14:15:17.677000
CVE-2025-24054,0,1,232579a58f7c3e073a24d7bc043f3137e9839fc41e844484b11f3c599e406494,2025-04-27T07:15:14.857000
CVE-2025-24055,0,0,a8b8e4cdf1af85735e51c417e608db31da64b217ea9a84bbe3faa9ab9f183fac,2025-03-31T02:15:18.163000
CVE-2025-24056,0,0,5c04f556316dbd8033fde99ee6b7a7436c924957f8339e64eeff70189003a64b,2025-03-11T17:16:28.130000
CVE-2025-24057,0,0,e93c1320ebadbbf28092c6fd0ce7c31e79b375949df78d42f385ee860a69efb1,2025-03-11T17:16:28.390000
@ -291199,7 +291199,7 @@ CVE-2025-39556,0,0,d68e9daa1c3faf2971d81baac3100d35c7f22607e7ec3dd48a6a61dad3fcc
CVE-2025-39557,0,0,ab798f74104e4ea6a62d1741144fecbded0c6e6a35299650562afb62fcd68b64,2025-04-16T13:25:37.340000
CVE-2025-39558,0,0,67a2a860cfbc0ea088c90bb02f84d72dc8a481fb30d037d0aef53a535f1a6d24,2025-04-17T20:21:05.203000
CVE-2025-39559,0,0,c1ad53e856c4f768703a54f48cc513afd8e437d825b78af7c6346c9c763439ca,2025-04-17T20:21:05.203000
CVE-2025-3956,1,1,014f908f4d0e10bec4482507afe09f2ffb74d46ac7de278573210da64d93dec3,2025-04-27T04:15:19.820000
CVE-2025-3956,0,0,014f908f4d0e10bec4482507afe09f2ffb74d46ac7de278573210da64d93dec3,2025-04-27T04:15:19.820000
CVE-2025-39560,0,0,42e2ca75c726dff6d99ee282e4af806d0fe49793ad81863f016666bfac2f4d89,2025-04-16T13:25:37.340000
CVE-2025-39562,0,0,d4d4487b38eb46ba5421d3523a3d0b7819a9efcedbaa8ee370d835f2cb48dc83,2025-04-17T20:21:05.203000
CVE-2025-39563,0,0,b0f0bb1bf2f780ed510466be812b57e730b9164ecf6ec630c83329e9f8d451f9,2025-04-16T13:25:37.340000
@ -291209,7 +291209,7 @@ CVE-2025-39566,0,0,b44bf7ee79269356d146a5ba7f17bde177e33d9e54e2e2271a81c83e0ca0d
CVE-2025-39567,0,0,8edd9105a6a6b1c9b6e38ff0e7a08628e7a440d0e563784bd8c32c8c570c8b84,2025-04-17T20:21:05.203000
CVE-2025-39568,0,0,82d2b43234ceda3a6c917e821eb93c294ae610746b1e2d35e954f4d031019ea8,2025-04-17T20:21:05.203000
CVE-2025-39569,0,0,bbd3885bb273d8540d768161ed8b0a66f400ca218afebf274483cb20cc58eb9a,2025-04-17T20:21:05.203000
CVE-2025-3957,1,1,22aaf54b9dadd008568ea19b33708a84c2b61627fbde18394415d8c8758d3d71,2025-04-27T04:15:21.303000
CVE-2025-3957,0,0,22aaf54b9dadd008568ea19b33708a84c2b61627fbde18394415d8c8758d3d71,2025-04-27T04:15:21.303000
CVE-2025-39570,0,0,bcbcc3a610b6380b6d25206f15e28075545f9fa9fe69af87e9ff2f3b2eab8461,2025-04-16T13:25:37.340000
CVE-2025-39571,0,0,f1943abf030c7c593c49f4592f830cc61d4a0028491b1b7c16dc062caebd1580,2025-04-16T13:25:37.340000
CVE-2025-39572,0,0,04d8b4cab5c52be01224a9e1e92feedbba712b9e8124769dd248bad97451c8cb,2025-04-16T13:25:37.340000
@ -291220,7 +291220,7 @@ CVE-2025-39576,0,0,d4badf7bc91022baca59bc9f19a8c58ba65235e4e22fed18a3b809f41a409
CVE-2025-39577,0,0,3177e0444a2b26293a4453b1bce883e7c655bb415c657c03d5ca6b58d18acdc2,2025-04-16T13:25:37.340000
CVE-2025-39578,0,0,a1079a80b92eb97a4e9f7eef52d34afde11a50b87b51d67d47a76652671f0467,2025-04-16T13:25:37.340000
CVE-2025-39579,0,0,21384c15a899fd4b363a0177befed383262734d257c01f4137f1b18c7c060156,2025-04-16T13:25:37.340000
CVE-2025-3958,1,1,b93086a7e004e6a6b4689a756198e01a2cf88637d8dbd4d19008b4d866488a68,2025-04-27T04:15:22.183000
CVE-2025-3958,0,0,b93086a7e004e6a6b4689a756198e01a2cf88637d8dbd4d19008b4d866488a68,2025-04-27T04:15:22.183000
CVE-2025-39580,0,0,17507b32926f9769a24b6ff0d4db96a2f9ac34595dad828839eb8469b133b674,2025-04-17T20:21:05.203000
CVE-2025-39581,0,0,a9cf9144b2768c6db90b8d19758d7d9dd55ebe6ec2f998597a728f8c8cb750ae,2025-04-16T13:25:37.340000
CVE-2025-39582,0,0,c48811629ddaa60afe46494894898a8fc914f0f9ed52c2f9358d9b57f7ea0df8,2025-04-16T13:25:37.340000
@ -291231,7 +291231,7 @@ CVE-2025-39586,0,0,52bb59767bbab516240eeb25d98c85fb9c17cc7c0a7291a452e44c2d2d8fd
CVE-2025-39587,0,0,33b50d289bef4c6cf8e1d438372ef1b7294ade35fdd035c52b9205ffa75f7054,2025-04-17T20:21:05.203000
CVE-2025-39588,0,0,11c774fc5ce2f3ca664860ee721c9f2e869880e366a587e3ea483924c9217fef,2025-04-17T20:21:05.203000
CVE-2025-39589,0,0,b29715a124e04614d12bf3ec3760b977199c44ae1ab61b48901af87bf741aa31,2025-04-16T13:25:37.340000
CVE-2025-3959,1,1,28c0f258cc0c12bce38df7670a8c07c3b0305490344aa8266596fffec0492b36,2025-04-27T05:15:14.913000
CVE-2025-3959,0,0,28c0f258cc0c12bce38df7670a8c07c3b0305490344aa8266596fffec0492b36,2025-04-27T05:15:14.913000
CVE-2025-39590,0,0,cbdd893bfedbcc5d8fb6519f3f308a6d352d7fa479853807ae3480a0edfcba1b,2025-04-16T13:25:37.340000
CVE-2025-39591,0,0,e700c0dfaa8a5bae80ad0a0b7ed51d5cdc4aea4794301d82136f242a1a8957b1,2025-04-16T13:25:37.340000
CVE-2025-39592,0,0,e8ceb434cbf9e8e6650a1ba72155a574a58e7aa1902306fcf199521eadc1fdb4,2025-04-16T13:25:37.340000
@ -291242,9 +291242,12 @@ CVE-2025-39596,0,0,e173976a1c0999b01b788ac1a4c5ae24f6505527b92ae9fe5f45ca8a72d79
CVE-2025-39597,0,0,b362997db93d9bfea0d7af44af4fd221eb0b25a2a82395ff55df61546df84055,2025-04-16T13:25:37.340000
CVE-2025-39598,0,0,73d622048aeed09278774e13f22cb598b1a5cb08b2f1dd7ec3313a376059ffea,2025-04-16T13:25:37.340000
CVE-2025-39599,0,0,091138247dcd1675bb93a1a469c4c7e89efe9b80c6a9739e4d163c5f536db88d,2025-04-16T13:25:37.340000
CVE-2025-3960,1,1,0a205fc71590454f80109f0a1ee8ee5a9fa54132db4db7c45917814b38948f8d,2025-04-27T06:15:14.870000
CVE-2025-39600,0,0,71f55bfcced2bb7d7f35d4ab207853635aec1cc4573a3ee9f10ef122db1f0de7,2025-04-16T13:25:37.340000
CVE-2025-39601,0,0,4f2eb6f0c2c624c12002346e13c479a2ea3b462ff0c42b3b14b9783c236c648a,2025-04-16T13:25:37.340000
CVE-2025-39602,0,0,372857ab0b3fa589d5d3849a523521babea3aee49aea0f2c09c05c2852655522,2025-04-16T13:25:37.340000
CVE-2025-3961,1,1,45a7ac44f384c30e3fbb9f668e36f375f4d1331a1daa19419d9d2a8c22592190,2025-04-27T07:15:15.307000
CVE-2025-3962,1,1,346464949fea6dd25a02f68fe26d10089c971b819db5bc3379dd490e49dc640e,2025-04-27T07:15:15.580000
CVE-2025-39688,0,0,98c7c61fe32c2ce6358a9d7ef0df54915bb47bee498593264d8ad933fcce6211,2025-04-21T14:23:45.950000
CVE-2025-39728,0,0,1aabeb48c74961651a085e70675ac1fbb7850a26c8e3690479606fce3eed8d57,2025-04-21T14:23:45.950000
CVE-2025-39735,0,0,685f7725750b068bcf70f45c9b43584f95555d2cf42375499465209022c1892a,2025-04-21T14:23:45.950000

Can't render this file because it is too large.