From 804e12312db96a30d736e0f9a43be7356bf24fc7 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 19 Apr 2025 20:03:52 +0000 Subject: [PATCH] Auto-Update: 2025-04-19T20:00:19.686744+00:00 --- CVE-2025/CVE-2025-38xx/CVE-2025-3808.json | 141 +++++++++++++++++++ CVE-2025/CVE-2025-38xx/CVE-2025-3816.json | 141 +++++++++++++++++++ CVE-2025/CVE-2025-38xx/CVE-2025-3817.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-439xx/CVE-2025-43917.json | 56 ++++++++ README.md | 17 ++- _state.csv | 14 +- 6 files changed, 500 insertions(+), 14 deletions(-) create mode 100644 CVE-2025/CVE-2025-38xx/CVE-2025-3808.json create mode 100644 CVE-2025/CVE-2025-38xx/CVE-2025-3816.json create mode 100644 CVE-2025/CVE-2025-38xx/CVE-2025-3817.json create mode 100644 CVE-2025/CVE-2025-439xx/CVE-2025-43917.json diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3808.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3808.json new file mode 100644 index 00000000000..90cfc54faf6 --- /dev/null +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3808.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3808", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-19T18:15:13.540", + "lastModified": "2025-04-19T18:15:13.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in zhenfeng13 My-BBS 1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Multiple endpoints might be affected." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/My-bbs/CSRF.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.305662", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.305662", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.555259", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3816.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3816.json new file mode 100644 index 00000000000..1c1e7fc67ed --- /dev/null +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3816.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3816", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-19T18:15:14.580", + "lastModified": "2025-04-19T18:15:14.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in westboy CicadasCMS 2.0. This vulnerability affects unknown code of the file /system/schedule/save of the component Scheduled Task Handler. The manipulation leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "baseScore": 5.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/chujianxin0101/vuln/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.305722", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.305722", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.555555", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3817.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3817.json new file mode 100644 index 00000000000..ab384653bf5 --- /dev/null +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3817.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-3817", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-19T19:15:44.947", + "lastModified": "2025-04-19T19:15:44.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Online Eyewear Shop 1.0. This issue affects some unknown processing of the file /oews/classes/Master.php?f=delete_stock. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/88hsb88/cve/blob/main/sql.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.305723", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.305723", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.555607", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43917.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43917.json new file mode 100644 index 00000000000..bb5fd0adeb2 --- /dev/null +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43917.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43917", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-19T19:15:45.123", + "lastModified": "2025-04-19T19:15:45.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Pritunl Client before 1.3.4220.57, an administrator with access to /Applications can escalate privileges after uninstalling the product. Specifically, an administrator can insert a new file at the pathname of the removed pritunl-service file. This file then is executed by a LaunchDaemon as root." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://forum.pritunl.com/t/pritunl-client-v1-3-4220-57/3183", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 760fa15e860..f7ffed029d5 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-19T18:00:19.935090+00:00 +2025-04-19T20:00:19.686744+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-19T17:15:44.860000+00:00 +2025-04-19T19:15:45.123000+00:00 ``` ### Last Data Feed Release @@ -33,24 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -290913 +290917 ``` ### CVEs added in the last Commit Recently added CVEs: `4` -- [CVE-2025-3804](CVE-2025/CVE-2025-38xx/CVE-2025-3804.json) (`2025-04-19T16:15:14.250`) -- [CVE-2025-3805](CVE-2025/CVE-2025-38xx/CVE-2025-3805.json) (`2025-04-19T16:15:14.437`) -- [CVE-2025-3806](CVE-2025/CVE-2025-38xx/CVE-2025-3806.json) (`2025-04-19T17:15:44.690`) -- [CVE-2025-3807](CVE-2025/CVE-2025-38xx/CVE-2025-3807.json) (`2025-04-19T17:15:44.860`) +- [CVE-2025-3808](CVE-2025/CVE-2025-38xx/CVE-2025-3808.json) (`2025-04-19T18:15:13.540`) +- [CVE-2025-3816](CVE-2025/CVE-2025-38xx/CVE-2025-3816.json) (`2025-04-19T18:15:14.580`) +- [CVE-2025-3817](CVE-2025/CVE-2025-38xx/CVE-2025-3817.json) (`2025-04-19T19:15:44.947`) +- [CVE-2025-43917](CVE-2025/CVE-2025-439xx/CVE-2025-43917.json) (`2025-04-19T19:15:45.123`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2025-32433](CVE-2025/CVE-2025-324xx/CVE-2025-32433.json) (`2025-04-19T16:15:14.003`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ed4b134b81f..262cf461ef2 100644 --- a/_state.csv +++ b/_state.csv @@ -290077,7 +290077,7 @@ CVE-2025-32426,0,0,97f7719ef42c67257e2006b52ab9747f51788ff83c926fc892139743aec5a CVE-2025-32427,0,0,0416426b54022f69535fafb066a105f3453a61c3cc047d8982deab84a0710a9d,2025-04-11T15:39:52.920000 CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b345a,2025-04-15T18:39:27.967000 CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000 -CVE-2025-32433,0,1,c289caeadd1f888b70f82733772d9676d42fd1a51298736b3d467e81ab5fbfd7,2025-04-19T16:15:14.003000 +CVE-2025-32433,0,0,c289caeadd1f888b70f82733772d9676d42fd1a51298736b3d467e81ab5fbfd7,2025-04-19T16:15:14.003000 CVE-2025-32434,0,0,60a9d0f9f62fb664481ba807b23fb0fcf5caffaccf64d81ef76109da351ead25,2025-04-18T16:15:23.183000 CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000 CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000 @@ -290742,14 +290742,17 @@ CVE-2025-3800,0,0,5a8dd97821b67d356a95921757917e897c3845e23e6878e79795ab927b8af2 CVE-2025-3801,0,0,7e4659bb9e345c112ae3c07d5f0da59c07d8fbae9bc83379f93f2b318a87b302,2025-04-19T14:15:38.333000 CVE-2025-3802,0,0,d682b1e71f7408fce752a1fc7a22a9dd9a29b18f8f0e273dd0c0bfb788ac652b,2025-04-19T15:15:46.073000 CVE-2025-3803,0,0,09f179d679e1c9035d339bafa41426a95df4462858b7e2a0a230448bd9d217f2,2025-04-19T15:15:47.040000 -CVE-2025-3804,1,1,d85200a5c5b178f3532baf338c703baccbd3e9b56ce0ec8f7d83bb89966b3a22,2025-04-19T16:15:14.250000 +CVE-2025-3804,0,0,d85200a5c5b178f3532baf338c703baccbd3e9b56ce0ec8f7d83bb89966b3a22,2025-04-19T16:15:14.250000 CVE-2025-38049,0,0,7676e0b60d8c855a8dd99b4b359c4fa0a814b8ab512b074750cfe511fcf6fb68,2025-04-18T07:15:43.187000 -CVE-2025-3805,1,1,3c520b153f616d262f7ff7ad6d2c8e837411e2121d1dc80bceb9847404c57631,2025-04-19T16:15:14.437000 -CVE-2025-3806,1,1,c06311dd910ba7e183ab9bb9f51e135ecd067e643161fe34206cad768547d07a,2025-04-19T17:15:44.690000 -CVE-2025-3807,1,1,ca01d40879d601a40fade6771a1cbd2ab417a194b35696f344bd73ac63d66be2,2025-04-19T17:15:44.860000 +CVE-2025-3805,0,0,3c520b153f616d262f7ff7ad6d2c8e837411e2121d1dc80bceb9847404c57631,2025-04-19T16:15:14.437000 +CVE-2025-3806,0,0,c06311dd910ba7e183ab9bb9f51e135ecd067e643161fe34206cad768547d07a,2025-04-19T17:15:44.690000 +CVE-2025-3807,0,0,ca01d40879d601a40fade6771a1cbd2ab417a194b35696f344bd73ac63d66be2,2025-04-19T17:15:44.860000 +CVE-2025-3808,1,1,e0f1d97a9d24d553e7cb8358130adda58200255a4bd7acf6c2b8404aa800327d,2025-04-19T18:15:13.540000 CVE-2025-3809,0,0,f5fbe405d13683c6b73ef7af09c5f40188da9234689ff8ec610595967a32a1cd,2025-04-19T06:15:19.960000 CVE-2025-38104,0,0,aac46924a4c28c51faaf99f75d4c0a5d0a65a1747d000155ea8b633f4bfe56a7,2025-04-18T07:15:43.290000 CVE-2025-38152,0,0,d2296d820f7f71e71472cf853a8cba12b58f3c84c5429c1618bed2e28567d654,2025-04-18T07:15:43.403000 +CVE-2025-3816,1,1,78f306cc7721a97dee4c8df91eedafde6afce929a4e4659a3dce0b00b0222fc5,2025-04-19T18:15:14.580000 +CVE-2025-3817,1,1,f43ec164ae30066f99f1b2718e141a59aea2f074c379769d6e8a68efe6a53d56,2025-04-19T19:15:44.947000 CVE-2025-38240,0,0,55c3c53507175385d390f4e5f0701155663d7d45488ce3854f0ce48d67d704f4,2025-04-18T07:15:43.510000 CVE-2025-38479,0,0,b2b6ea65e240d4ffeed782b9d037d3b3cf1f0ae1e3ce4a6e40a815527e135169,2025-04-18T07:15:43.613000 CVE-2025-38575,0,0,fc45fd45a431f685538b4001e1e87131d23faf0a16a9209a56843479513a7e70,2025-04-18T07:15:43.717000 @@ -290912,3 +290915,4 @@ CVE-2025-43899,0,0,8ab93a6edab6a82e6476c57ce7e31ae1effa4c1cbd643056ee95b9fb0d1e9 CVE-2025-43900,0,0,8ae3246d09152552bbb6cdca3332360753ff66f5c97b078c8130a1d2fe1845d9,2025-04-19T03:15:14.427000 CVE-2025-43901,0,0,98878e012cf8d6baa1ac5ec62480882e6fac2e6450aa75eeb2862c95e2d438b9,2025-04-19T03:15:14.487000 CVE-2025-43903,0,0,e5d1b15c49355d90acc1825ad603611c50f01a5b790925f883e01da3dd84b8af,2025-04-18T21:15:44.673000 +CVE-2025-43917,1,1,88ad75149c88491db8dc72ead689c318e5e0e483cf1cf93847c68c0ac210662b,2025-04-19T19:15:45.123000