Auto-Update: 2025-04-04T14:00:19.568674+00:00

This commit is contained in:
cad-safe-bot 2025-04-04 14:03:55 +00:00
parent 491746a95e
commit 955530be35
25 changed files with 1075 additions and 117 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-0041",
"sourceIdentifier": "security@android.com",
"published": "2020-03-10T20:15:21.383",
"lastModified": "2025-02-07T13:15:28.600",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-04T13:01:37.253",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-0069",
"sourceIdentifier": "security@android.com",
"published": "2020-03-10T20:15:21.947",
"lastModified": "2025-02-07T13:15:28.787",
"vulnStatus": "Modified",
"lastModified": "2025-04-04T13:01:47.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-0787",
"sourceIdentifier": "secure@microsoft.com",
"published": "2020-03-12T16:15:15.203",
"lastModified": "2025-02-07T16:15:31.970",
"vulnStatus": "Modified",
"lastModified": "2025-04-04T13:01:58.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1048",
"sourceIdentifier": "security@android.com",
"published": "2021-12-15T19:15:14.917",
"lastModified": "2025-02-04T20:15:39.623",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-04T13:05:45.083",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20248",
"sourceIdentifier": "psirt@cisco.com",
"published": "2024-04-24T21:15:46.510",
"lastModified": "2024-11-21T07:40:59.390",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-04T13:00:29.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,16 +49,50 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_management_suite:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.13.6",
"matchCriteriaId": "657B8E82-E583-483E-A27B-FEB834F78B8E"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-portal-xss-AXNeVg3s",
"source": "psirt@cisco.com"
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-portal-xss-AXNeVg3s",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40493",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:23.120",
"lastModified": "2024-11-21T08:19:35.597",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-04T13:47:04.490",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,14 +73,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lg:simple_editor:3.21.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDB5FD9-3D29-48CB-85C5-B96A573E58FC"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1199/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1199/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40494",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:23.303",
"lastModified": "2024-11-21T08:19:35.730",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-04T13:42:10.263",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,14 +73,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lg:simple_editor:3.21.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDB5FD9-3D29-48CB-85C5-B96A573E58FC"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1200/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1200/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40495",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:23.477",
"lastModified": "2025-02-04T17:15:16.380",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-04T13:33:58.703",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -83,14 +83,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lg:simple_editor:3.21.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDB5FD9-3D29-48CB-85C5-B96A573E58FC"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1201/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1201/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28890",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-04-23T05:15:49.260",
"lastModified": "2024-11-21T09:07:07.400",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-04T13:12:03.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,30 +51,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:incsub:forminator:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "1.29.0",
"matchCriteriaId": "59D7B250-32D4-4B3D-BC2E-70CCC6A1B767"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN50132400/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/forminator/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://wpmudev.com/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://jvn.jp/en/jp/JVN50132400/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/forminator/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://wpmudev.com/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30938",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-19T00:15:10.623",
"lastModified": "2024-11-21T09:12:36.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-04T13:25:20.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sem-cms:semcms:4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BD382DC4-F472-49F5-AA7E-939EC76D4E8F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/lampSEC/semcms/blob/main/semcms.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/lampSEC/semcms/blob/main/semcms.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31077",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-04-23T05:15:49.323",
"lastModified": "2024-11-21T09:12:48.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-04T13:09:27.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,30 +51,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:incsub:forminator:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "1.29.3",
"matchCriteriaId": "50690F82-3240-4FCA-B4AC-A21CAF3C4691"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN50132400/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/forminator/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://wpmudev.com/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://jvn.jp/en/jp/JVN50132400/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/forminator/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://wpmudev.com/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31857",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-04-23T05:15:49.377",
"lastModified": "2024-11-21T09:14:01.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-04T13:03:08.680",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,30 +51,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:incsub:forminator:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "1.15.4",
"matchCriteriaId": "C88D1D40-B2B6-4645-BA37-13B49807BD91"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN50132400/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/forminator/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://wpmudev.com/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://jvn.jp/en/jp/JVN50132400/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/forminator/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://wpmudev.com/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32409",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-19T16:15:10.883",
"lastModified": "2024-11-21T09:14:53.293",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-04T13:23:40.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,30 +51,65 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sem-cms:semcms:4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BD382DC4-F472-49F5-AA7E-939EC76D4E8F"
}
]
}
]
}
],
"references": [
{
"url": "http://semcms.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://www.sem-cms.com/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://gitee.com/whats-the-bad-idea/cve",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://semcms.com",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "http://www.sem-cms.com/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://gitee.com/whats-the-bad-idea/cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-8600",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-10-29T22:15:08.330",
"lastModified": "2025-02-03T17:15:24.650",
"lastModified": "2025-04-04T13:15:44.070",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted SLDPRT file when parsed in odxsw_dll.dll through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process."
"value": "A maliciously crafted SLDPRT file when parsed in odxsw_dll.dll through Autodesk affected applications can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-1428",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2025-03-13T17:15:34.900",
"lastModified": "2025-03-13T17:15:34.900",
"lastModified": "2025-04-04T13:15:45.193",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted CATPART file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
"value": "A maliciously crafted CATPART file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-1430",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2025-03-13T17:15:35.217",
"lastModified": "2025-03-13T17:15:35.217",
"lastModified": "2025-04-04T13:15:45.440",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted SLDPRT file, when parsed through Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
"value": "A maliciously crafted SLDPRT file, when parsed through Autodesk AutoCAD, can force a Memory Corruption vulnerability.A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
},
{
"lang": "es",

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2859",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-03-28T14:15:20.810",
"lastModified": "2025-03-28T18:11:40.180",
"lastModified": "2025-04-04T13:15:46.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An attacker with access to the network where the vulnerable device is located could capture traffic and obtain cookies from the user, allowing them to steal a user's active session and make changes to the device via the web, depending on the privileges obtained by the user."
"value": "An attacker with network\u00a0access,\u00a0could capture traffic and obtain user cookies, allowing the attacker to steal the active user session and make changes to the device via web, depending on the privileges obtained by the user."
},
{
"lang": "es",
"value": "Un atacante con acceso a la red donde se encuentra el dispositivo vulnerable podr\u00eda capturar tr\u00e1fico y obtener cookies del usuario, lo que le permitir\u00eda robar la sesi\u00f3n activa de un usuario y realizar cambios en el dispositivo v\u00eda web, dependiendo de los privilegios obtenidos por el usuario."
}
],
"metrics": {
@ -60,7 +64,7 @@
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-31420",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-04T13:15:46.630",
"lastModified": "2025-04-04T13:15:46.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Privilege Assignment vulnerability in Tomdever wpForo Forum allows Privilege Escalation.This issue affects wpForo Forum: from n/a through 2.4.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wpforo/vulnerability/wordpress-wpforo-forum-plugin-2-4-2-privilege-escalation-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-31421",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-04T13:15:46.780",
"lastModified": "2025-04-04T13:15:46.780",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Oblak Studio Srbtranslatin allows Retrieve Embedded Sensitive Data.This issue affects Srbtranslatin: from n/a through 3.2.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-538"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/srbtranslatin/vulnerability/wordpress-srbtranslatin-plugin-3-2-0-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-3189",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-04-04T13:15:46.940",
"lastModified": "2025-04-04T13:15:46.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stored Cross-Site Scripting (XSS) in DoWISP in versions prior to 1.16.2.50, which consists of an stored XSS through the upload of a profile picture in SVG format with malicious Javascript code in it."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/stored-cross-site-scripting-xss-dowisp",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3243",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-04T12:15:15.530",
"lastModified": "2025-04-04T12:15:15.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dental_form.php. The manipulation of the argument itr_no leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/BinBall/cve/blob/master/README.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303269",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303269",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.547882",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3244",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-04T12:15:16.217",
"lastModified": "2025-04-04T12:15:16.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /add-admin.php of the component Create User Page. The manipulation of the argument Avatar leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/6s6-630/CVE/blob/main/yaofang.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303271",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303271",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.547916",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3245",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-04T12:15:16.400",
"lastModified": "2025-04-04T12:15:16.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itsourcecode Library Management System 1.0. It has been rated as critical. Affected by this issue is the function Search of the file library_management/src/Library_Management/Forgot.java. The manipulation of the argument txtuname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/wlingze/IRify_scan/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://itsourcecode.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303272",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303272",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.548087",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-04T12:00:21.499406+00:00
2025-04-04T14:00:19.568674+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-04T11:15:40.980000+00:00
2025-04-04T13:47:04.490000+00:00
```
### Last Data Feed Release
@ -33,32 +33,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
288506
288512
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `6`
- [CVE-2025-1865](CVE-2025/CVE-2025-18xx/CVE-2025-1865.json) (`2025-04-04T10:15:15.277`)
- [CVE-2025-22282](CVE-2025/CVE-2025-222xx/CVE-2025-22282.json) (`2025-04-04T11:15:39.680`)
- [CVE-2025-2243](CVE-2025/CVE-2025-22xx/CVE-2025-2243.json) (`2025-04-04T10:15:16.313`)
- [CVE-2025-2244](CVE-2025/CVE-2025-22xx/CVE-2025-2244.json) (`2025-04-04T10:15:16.580`)
- [CVE-2025-2245](CVE-2025/CVE-2025-22xx/CVE-2025-2245.json) (`2025-04-04T10:15:16.740`)
- [CVE-2025-3235](CVE-2025/CVE-2025-32xx/CVE-2025-3235.json) (`2025-04-04T10:15:16.900`)
- [CVE-2025-3236](CVE-2025/CVE-2025-32xx/CVE-2025-3236.json) (`2025-04-04T10:15:17.177`)
- [CVE-2025-3237](CVE-2025/CVE-2025-32xx/CVE-2025-3237.json) (`2025-04-04T10:15:17.383`)
- [CVE-2025-3238](CVE-2025/CVE-2025-32xx/CVE-2025-3238.json) (`2025-04-04T10:15:17.577`)
- [CVE-2025-3239](CVE-2025/CVE-2025-32xx/CVE-2025-3239.json) (`2025-04-04T11:15:40.393`)
- [CVE-2025-3240](CVE-2025/CVE-2025-32xx/CVE-2025-3240.json) (`2025-04-04T11:15:40.603`)
- [CVE-2025-3241](CVE-2025/CVE-2025-32xx/CVE-2025-3241.json) (`2025-04-04T11:15:40.783`)
- [CVE-2025-3242](CVE-2025/CVE-2025-32xx/CVE-2025-3242.json) (`2025-04-04T11:15:40.980`)
- [CVE-2025-31420](CVE-2025/CVE-2025-314xx/CVE-2025-31420.json) (`2025-04-04T13:15:46.630`)
- [CVE-2025-31421](CVE-2025/CVE-2025-314xx/CVE-2025-31421.json) (`2025-04-04T13:15:46.780`)
- [CVE-2025-3189](CVE-2025/CVE-2025-31xx/CVE-2025-3189.json) (`2025-04-04T13:15:46.940`)
- [CVE-2025-3243](CVE-2025/CVE-2025-32xx/CVE-2025-3243.json) (`2025-04-04T12:15:15.530`)
- [CVE-2025-3244](CVE-2025/CVE-2025-32xx/CVE-2025-3244.json) (`2025-04-04T12:15:16.217`)
- [CVE-2025-3245](CVE-2025/CVE-2025-32xx/CVE-2025-3245.json) (`2025-04-04T12:15:16.400`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `17`
- [CVE-2020-0041](CVE-2020/CVE-2020-00xx/CVE-2020-0041.json) (`2025-04-04T13:01:37.253`)
- [CVE-2020-0069](CVE-2020/CVE-2020-00xx/CVE-2020-0069.json) (`2025-04-04T13:01:47.817`)
- [CVE-2020-0787](CVE-2020/CVE-2020-07xx/CVE-2020-0787.json) (`2025-04-04T13:01:58.867`)
- [CVE-2021-1048](CVE-2021/CVE-2021-10xx/CVE-2021-1048.json) (`2025-04-04T13:05:45.083`)
- [CVE-2023-20248](CVE-2023/CVE-2023-202xx/CVE-2023-20248.json) (`2025-04-04T13:00:29.450`)
- [CVE-2023-40493](CVE-2023/CVE-2023-404xx/CVE-2023-40493.json) (`2025-04-04T13:47:04.490`)
- [CVE-2023-40494](CVE-2023/CVE-2023-404xx/CVE-2023-40494.json) (`2025-04-04T13:42:10.263`)
- [CVE-2023-40495](CVE-2023/CVE-2023-404xx/CVE-2023-40495.json) (`2025-04-04T13:33:58.703`)
- [CVE-2024-28890](CVE-2024/CVE-2024-288xx/CVE-2024-28890.json) (`2025-04-04T13:12:03.720`)
- [CVE-2024-30938](CVE-2024/CVE-2024-309xx/CVE-2024-30938.json) (`2025-04-04T13:25:20.460`)
- [CVE-2024-31077](CVE-2024/CVE-2024-310xx/CVE-2024-31077.json) (`2025-04-04T13:09:27.250`)
- [CVE-2024-31857](CVE-2024/CVE-2024-318xx/CVE-2024-31857.json) (`2025-04-04T13:03:08.680`)
- [CVE-2024-32409](CVE-2024/CVE-2024-324xx/CVE-2024-32409.json) (`2025-04-04T13:23:40.187`)
- [CVE-2024-8600](CVE-2024/CVE-2024-86xx/CVE-2024-8600.json) (`2025-04-04T13:15:44.070`)
- [CVE-2025-1428](CVE-2025/CVE-2025-14xx/CVE-2025-1428.json) (`2025-04-04T13:15:45.193`)
- [CVE-2025-1430](CVE-2025/CVE-2025-14xx/CVE-2025-1430.json) (`2025-04-04T13:15:45.440`)
- [CVE-2025-2859](CVE-2025/CVE-2025-28xx/CVE-2025-2859.json) (`2025-04-04T13:15:46.493`)
## Download and Usage

View File

@ -144345,7 +144345,7 @@ CVE-2020-0037,0,0,41e403094ba6a045322d7e04b4f87a730b779ebf04b4050c31f74ed32cdd08
CVE-2020-0038,0,0,0be6c0237b437b6eb08224027fdb8b3bb69f2322ae8b62c3c669d28e1845a906,2024-11-21T04:52:47.583000
CVE-2020-0039,0,0,7618b44bd3ba6b7cdfd0a64c9c872de5e78ba00f57fc793fd15f4a2523350163,2024-11-21T04:52:47.683000
CVE-2020-0040,0,0,327fccd97e3de4721dac876f3f81f6a391401dd9264bed98ab70cdb9f6b7a506,2025-01-18T00:15:25.273000
CVE-2020-0041,0,0,6eec7bd3aea7b5fd3bfcd5951820b693b9e1023127a2b78d60a5596062d99bda,2025-02-07T13:15:28.600000
CVE-2020-0041,0,1,9b2955412ad02669f6f881510992b21e6ab6391b989bbf3ea8fc970cbb7169ce,2025-04-04T13:01:37.253000
CVE-2020-0042,0,0,d7f0e064e5fbb278776d2d7faf4fb87c5d172ac4e2dead292c3f85cc4c813703,2024-11-21T04:52:47.887000
CVE-2020-0043,0,0,14bcc8466d5c443021e087cfb66517016dab13c49e05cf9e560a89cb40ee4afe,2024-11-21T04:52:48.003000
CVE-2020-0044,0,0,42c44fa02306848dbeaff538a0f2ddecaedf0417b561902ea28e0b9b3c5c8e09,2024-11-21T04:52:48.107000
@ -144373,7 +144373,7 @@ CVE-2020-0065,0,0,f7ca8e09b2764d2b41b8fdde746a1805d10e35a728ccb4009cb8724efad028
CVE-2020-0066,0,0,1d19fd7de8f94f88b1c4805320f198d81987096cfadc34ae614f20f6405ad2b6,2024-11-21T04:52:50.453000
CVE-2020-0067,0,0,d2410847056d5dc825c4019a7ba8d9efccc48dda195d2be1d4ed3d9672ee76bc,2024-11-21T04:52:50.563000
CVE-2020-0068,0,0,945e0e73a8608c6f0fc295b6a88fbba7fd6d1511e7b8a2a979993924666b1a48,2024-11-21T04:52:50.690000
CVE-2020-0069,0,0,d68f135d6fced2f4472f9284747e90e125e063981b77e057f42b344e93999ba8,2025-02-07T13:15:28.787000
CVE-2020-0069,0,1,15eb0d8e3b0ef0843fa0bd15166c329eb316034c7a03d2bbc49484fa981f1b86,2025-04-04T13:01:47.817000
CVE-2020-0070,0,0,34dfdee23ce22fc7cc584db33451557b31e46405456845f804f5a2810fbdc6a8,2024-11-21T04:52:50.967000
CVE-2020-0071,0,0,fa891ab3869d3eb9ed0de28ab158679b3e1a7c4514e4f53def5ef01e39337b6c,2024-11-21T04:52:51.077000
CVE-2020-0072,0,0,68bc0b162b140c51ac81be1b05e0cd0d73a744d939c5e87e3f04a3c009867cab,2024-11-21T04:52:51.190000
@ -145082,7 +145082,7 @@ CVE-2020-0783,0,0,de20629ee4d0e27392fc4f55b7cee09919ac95363a03fc294d09d37e667ce8
CVE-2020-0784,0,0,b8096a0a427408558c58cfd476af1cb068e4e16704d8fac38333b7005793608c,2024-11-21T04:54:12.520000
CVE-2020-0785,0,0,e3bc815874c300dac45f2a60b6afd50bb47141d5eaea85a5ced8837fc16fda18,2024-11-21T04:54:12.640000
CVE-2020-0786,0,0,1bed435bb92f832bf1ed719b475b3b0afb85071392e0acb82a3aa00675b3b1f3,2024-11-21T04:54:12.763000
CVE-2020-0787,0,0,b5b8107f1168f075e15f520fc59d9b67d8344b2565a0c0207dde5de4a8f61958,2025-02-07T16:15:31.970000
CVE-2020-0787,0,1,bdd0753bbb29cbf69eaf7ff10c662b4c1458c8d017aacb1d8076dde1677cf5c6,2025-04-04T13:01:58.867000
CVE-2020-0788,0,0,45144fe5748834f81b3b97d9be9799087c20c5e97eda233bd95e7f833f7bd84a,2024-11-21T04:54:12.997000
CVE-2020-0789,0,0,5841d77cb261e3595b8f4791c4e18c399f4cc3d6d297a5609d9cbb1b15ed80ea,2024-11-21T04:54:13.133000
CVE-2020-0790,0,0,35ab8fdf2d0cd8da0474a9a16ee6ceca6b0b4a13bee1673f39e17d2fd91d42af,2024-11-21T04:54:13.253000
@ -165743,7 +165743,7 @@ CVE-2021-1044,0,0,1d2a70bf34022fcf540f0f165bf74f063999f10981f2d8661a432c505e6558
CVE-2021-1045,0,0,52c86b88026600c46c0feb022cf0953ee0d0ec5852efc20082c99f693afb3529,2024-11-21T05:43:27.370000
CVE-2021-1046,0,0,a1c9c7ab089ff8d2b016f85bfbe48d340de900d2cc828cbea2f155986a389b45,2024-11-21T05:43:27.470000
CVE-2021-1047,0,0,4f00b24d3c322ea115fb217d0a6847a7e1a67fb1b0b0b860a3e955bd7fada2c2,2024-11-21T05:43:27.577000
CVE-2021-1048,0,0,b934b5fe088ec4f1958a04103c4ce0bd59b50a24f847f810b6597f32b8bb4836,2025-02-04T20:15:39.623000
CVE-2021-1048,0,1,bd8c7e5c734b94d390f55e6bd8dbd6a16cceff7cf4741260090228c088b58268,2025-04-04T13:05:45.083000
CVE-2021-1049,0,0,c9fa9781e361534a0500d0b54cefbcc1bc5e3a4edceff32900661c129722c95d,2024-11-21T05:43:27.770000
CVE-2021-1050,0,0,5f1d1cb96547724c36cf1bdccfc0c0363ae554179dd9624741147c7a8b4d1beb,2024-11-21T05:43:27.877000
CVE-2021-1051,0,0,d111531949be4a2667a7cabccccad754da75b2de44fa6f5f9a8aaa6b47a0ad45,2024-11-21T05:43:27.983000
@ -216194,7 +216194,7 @@ CVE-2023-20244,0,0,04d06cc910e8622ed4582c8bd365231315a3a7773630ed77fe4b6e8996960
CVE-2023-20245,0,0,9f7d0684fcd3dc88fd4b6a3fa68ecf02841f70db54f8fbf5c3bfa4f335ba39e2,2024-11-21T07:40:58.890000
CVE-2023-20246,0,0,6d2b37f5c6ac086ceda5bb29e8646cadf5c50f638a870e23c0dbdcde6ad30bed,2024-11-21T07:40:59.063000
CVE-2023-20247,0,0,14bf4b27e0fd5450e104dae5e7cf40f4887a3f17c84342c9769adaf9047c3e20,2024-11-21T07:40:59.200000
CVE-2023-20248,0,0,4a58281cd1b4cf53d0679ec99d2f9f43ac54b1d7c3834a6509a8a10b26d131b1,2024-11-21T07:40:59.390000
CVE-2023-20248,0,1,3a4cc8786bf48587de2c29993072c2d412e2b1fe651247a9c003ca1ec3e61f23,2025-04-04T13:00:29.450000
CVE-2023-20249,0,0,711e541b7a7ffeed6af09a65e2ed00262343e253e3ac8a5f9545057f1f77bb44,2024-11-21T07:40:59.573000
CVE-2023-2025,0,0,f2ee56fa364f118987b4743945088cc9b4233edd69248c0556648598d17b0711,2024-11-21T07:57:47.043000
CVE-2023-20250,0,0,f1bfbe430c90a1e77a0e3bab5e445960f08b5671ac0822c192f18f5e8778d7fe,2024-11-21T07:40:59.683000
@ -232444,9 +232444,9 @@ CVE-2023-4049,0,0,64349c7d7728318992b9d8ac9bc063772f37e3ff89dcb54aadcdbc8bdf210d
CVE-2023-40490,0,0,b305530e1cd192949fc426741c848a099bb11b4d204df0ebc5381f6e6d249826,2024-11-21T08:19:35.203000
CVE-2023-40491,0,0,2a908a50f6204b8e3c02efcdc72acad622579cd988ae66d3f56ae77f2a332961,2024-11-21T08:19:35.340000
CVE-2023-40492,0,0,1e2c820f786ac4cbc2504f8b86b120ed0260685829e28ba8d52ed6cce83707b2,2024-11-21T08:19:35.467000
CVE-2023-40493,0,0,4d38f9d04ac779d50c45e78dab0b0eec826676238f9c726263382caf012e171e,2024-11-21T08:19:35.597000
CVE-2023-40494,0,0,b475f7b9b176816fba77ad16a4c162f2ccee1eb744b244a10f67524ccf8c4097,2024-11-21T08:19:35.730000
CVE-2023-40495,0,0,4de5b40abe746d1dfac91545d29fb61c3cb5528d4305faccf2d595266a7353f4,2025-02-04T17:15:16.380000
CVE-2023-40493,0,1,8c8c2798b046bd53589f6b4e0ad98e19ade803bf152c491c3f238aa122d46fc8,2025-04-04T13:47:04.490000
CVE-2023-40494,0,1,601b019f06f304ee99d6982b6230e27aea81e366cb541b7b7ac03fa3ad3dcb30,2025-04-04T13:42:10.263000
CVE-2023-40495,0,1,4b7f4a7a18cd0edfbb72d9a1c73805fee1bfa7493317bfefe3d89f67da52ca91,2025-04-04T13:33:58.703000
CVE-2023-40496,0,0,c05214a4beff0efc426be383f47e603c524ea6a24a74be7d02966bc130a33eb1,2024-11-21T08:19:36.013000
CVE-2023-40497,0,0,52bd73661eeea436a79bc8e9940335105120d4eec20fc48bfafb094252ca8956,2024-11-21T08:19:36.157000
CVE-2023-40498,0,0,f36254e3b26721241b5f240decf47a69479a61fad8b76a81f651f4ac34db40ac,2024-11-21T08:19:36.283000
@ -255883,7 +255883,7 @@ CVE-2024-28887,0,0,c3ca1b3d7a62186763846c5cd9ca8eaefd4f2b80d7ff47790f3655a062e62
CVE-2024-28888,0,0,ebbb3a65d0d5e986be41d82152364fcda8a869f51d8deddd91ac98fd34888cbf,2024-11-21T09:07:07.100000
CVE-2024-28889,0,0,56e4da21fbc62908e65bc9d6315a2b989ea164aaccf23dde236dcd94fbd502c6,2024-11-21T09:07:07.260000
CVE-2024-2889,0,0,1885c0f2ecfe4bdb417129f70852e4157a6de85584ef6ee4549701263ae39757,2024-11-21T09:10:45.900000
CVE-2024-28890,0,0,3bbdab4f532fab507ef698fd11be91e1ccfe6d2327e03eb3fd78e1be839e0795,2024-11-21T09:07:07.400000
CVE-2024-28890,0,1,eca2de8dcd01c6acf30a292021531961571db838e2603d2599373b293773d39d,2025-04-04T13:12:03.720000
CVE-2024-28891,0,0,89149026c6e5f7e226ede146241710be24ae96a683eeb359126523d37dd3135e,2024-11-21T09:07:07.617000
CVE-2024-28892,0,0,2e191531e41f7891094b87fe8cebe43719428c7eea4b56c908156d0a86b2616d,2024-12-20T17:05:48.707000
CVE-2024-28893,0,0,af3c6467d810236b8f22b401cc7bbcfe893a3ccf1e1cf36778afb8e9bb65fec9,2025-03-27T15:15:51.380000
@ -257450,7 +257450,7 @@ CVE-2024-30928,0,0,5b79e5750f6c7878ce52be4234b1efc12eb7d9c9b9f616dec536a86871f39
CVE-2024-30929,0,0,ca6fc83d263a440f702c6f59d54a14988d9d3577d12e8c28e17f1b62456ed34c,2024-11-21T09:12:36.360000
CVE-2024-3093,0,0,fe746195c4e2001fde57b14e03afb6f54529d797bc86f2aa9c4028e9fadd8f82,2024-05-07T13:15:48.260000
CVE-2024-30931,0,0,e7f92a3bf6da27812eb57cfbe43def6f2d5e4701d41c61760d71792a7b76604c,2024-11-21T09:12:36.580000
CVE-2024-30938,0,0,84db941aea113a12f79b6bd4c401c3082aa309dbface7b4b799fa38c3d85107b,2024-11-21T09:12:36.783000
CVE-2024-30938,0,1,9009dc01caa7aeffb7dcce25e73dd1fc51b559609e021b8542c536639b2cd09d,2025-04-04T13:25:20.460000
CVE-2024-30939,0,0,c09450d6fbdf180599d8aa90a71eee8592202cdaeff38c062b16f67a0a29459f,2024-11-21T09:12:36.997000
CVE-2024-3094,0,0,b9e85c0248ef2cd036bdd4cbb530b96250054f5e14f6d51439fbf04202b0fd31,2025-02-06T09:15:10.820000
CVE-2024-30946,0,0,377a4d69a3316def640c171befad2d35850a0a77388338767e966f749486eb06,2025-04-01T18:05:53.003000
@ -257524,7 +257524,7 @@ CVE-2024-31070,0,0,1c611948de1365114224205017306826df6e14c3741670ceac64efb86dc1f
CVE-2024-31071,0,0,d588fd52b561587765d8d52346268042bc1c49cbc106c6b370e0c836853f77c7,2024-11-21T09:12:47.910000
CVE-2024-31074,0,0,a2f238abb53e6d12a2f868f2cb51afa58ab2d87eab5b0d20d91ca0ad2c12fd72,2024-11-15T14:00:09.720000
CVE-2024-31076,0,0,1293d87671585f621e57738a562115aa8563ab94cc4beb2163a9d49bb681d6cc,2024-11-21T09:12:48.140000
CVE-2024-31077,0,0,289d0fa87ed9966f075d7cf387e3721edb9b2f366b0ec4a722be692dbf847080,2024-11-21T09:12:48.273000
CVE-2024-31077,0,1,3478e0b66574ac38fc54e164834c3535d63b6475aa6e95b2b89a99e7036e51ad,2025-04-04T13:09:27.250000
CVE-2024-31078,0,0,c685657ef2ddb5a5f6950813502d56bfa1502d3b4d479876fa59d79cc3cba853,2025-01-02T19:04:58.017000
CVE-2024-31079,0,0,165a2aa326e41b281850472925f9b409c38425124b3d29959aeb9d8da9b7e905,2025-01-24T16:01:04.653000
CVE-2024-3108,0,0,0a457dab289bbab6cbbf64df7736b6d0a7c3250fc6713e73c93a6029760a47aa,2024-11-21T09:28:54.970000
@ -258113,7 +258113,7 @@ CVE-2024-31850,0,0,3cf28f7334b4de0542e5428e9e2adb543da6f22147b194d3fb612012e6aa1
CVE-2024-31851,0,0,e45f336d82b2d3d9adbf3a8bac0b970c5266b3cdbe6939aeace9733f93a83fdc,2024-11-21T09:14:01.463000
CVE-2024-31852,0,0,ba9051f6bc6d3b5aba3b4d7f2092d68c6a17eb29edddb549caa75380b0b647ce,2024-12-04T21:15:23.467000
CVE-2024-31856,0,0,b0ae28b2cf04a3d57b1162c504882bace010687db30d97cb579a93bed060de40,2024-11-21T09:14:01.757000
CVE-2024-31857,0,0,8ccaeff2e48a5a06dc8b607f81d3ae85f8bd08deb2ade42799168b9bafd37d10,2024-11-21T09:14:01.880000
CVE-2024-31857,0,1,20dfb12af53dc65b264ed20f498f15824869d4ee981fc0225fa3ba43b44587e3,2025-04-04T13:03:08.680000
CVE-2024-31858,0,0,fb7ea5972ca29ef5dbb01c13ffa0f30c065ee6f5e39915061b97fa7a1c736b37,2025-02-12T22:15:33.340000
CVE-2024-31859,0,0,5188bfcb73daa943c532580bcafd9e1ae4e11ae27457e4083ab53378c72ba6e7,2024-11-21T09:14:02.070000
CVE-2024-3186,0,0,6a202e3b12d67ed267f46ad36df1ad5893d1c9a9eec4366d9174b91b675690fe,2024-10-18T12:52:33.507000
@ -258499,7 +258499,7 @@ CVE-2024-32404,0,0,74a4e470851f7065c54824eefb65f28406cfe534ec539cba27c7d9ad4f1d2
CVE-2024-32405,0,0,d6cebee4f160fbfebcd1643d9266858f67b5ac275a62bd0c0eb14ec6bc477ccb,2024-11-21T09:14:52.610000
CVE-2024-32406,0,0,adc8cb262025358dc4dfe8f438d40cf02ab2906d5eddacd2f331ca567828e67d,2024-11-21T09:14:52.837000
CVE-2024-32407,0,0,0df07e739a8ca11adc8e64033efd14a2769f0d1340e998db62e6a377858daa19,2024-11-21T09:14:53.060000
CVE-2024-32409,0,0,18b0f3062892cdbdf03588220ff6b6036159d6e3762a6fad7fa112af7d603be7,2024-11-21T09:14:53.293000
CVE-2024-32409,0,1,bf9e59848caae45d0cc6872d258056c0c656eeada01f508a560f9f71f7f2c3bf,2025-04-04T13:23:40.187000
CVE-2024-3241,0,0,b1badc4f1f5873ff7ca017fdd306f21fc66be32391b8d27fe7739f7ab8ee3128,2024-11-21T09:29:13.510000
CVE-2024-32418,0,0,d8130dedbe76cdd228daed362bf2d1aca28a9841235dbcc9e6fc321e75783a23,2024-11-21T09:14:53.523000
CVE-2024-3242,0,0,5f9a392d5baa5578fca1ab76c564a35b8fe07ebbba529c9b61373bb8ee0e2f7d,2025-01-16T15:08:00.773000
@ -279837,7 +279837,7 @@ CVE-2024-8596,0,0,22e87c05a881144248073e39d597b5379dfc78f98b055324b92268561474ba
CVE-2024-8597,0,0,4bdf3980e94f272c2937a9011ae04eb189d04ed8b16c1f1ae4fbae13c13a831f,2025-02-03T17:15:24.297000
CVE-2024-8598,0,0,65e114fef269c3e148fd3d6c3c67dcb79837e4f920c870586eed56a88095fa3b,2025-02-03T17:15:24.413000
CVE-2024-8599,0,0,34f5b9d9d6f8575360ec482776d3a2f1d00ec2089f5e9b2b2b434a9d0cfaeff9,2025-02-03T17:15:24.537000
CVE-2024-8600,0,0,b93a2f0133ecc6c1f4d95330748e0842c2c972d18c9727af8894ae29ab019d6b,2025-02-03T17:15:24.650000
CVE-2024-8600,0,1,5909cb8fbb5868f1b93fa16c0b5494f065b67c989958daedb9d75904ae719abc,2025-04-04T13:15:44.070000
CVE-2024-8601,0,0,0926d345ee13eaf1f1cd351ae0c9b59ed8151694e14d0d1c9aaf73b0a718a214,2024-09-17T17:54:39.767000
CVE-2024-8602,0,0,de8dccdf870e3101b819a150a22cd3b990f9026c7bfa5293a315af8d994b8878,2024-12-11T09:15:05.890000
CVE-2024-8603,0,0,ad533194a238e7e4d06b8b70ae4b1b2ef8e12abb7905d0c1ce979a1390f5e50b,2025-01-15T16:15:32.190000
@ -282054,9 +282054,9 @@ CVE-2025-1424,0,0,028aeccf06b420fd3ae1e41e07745fbc6608efab9b9570b82ad820d0434865
CVE-2025-1425,0,0,5581bc90886ae6a96bcdd3391932814fcfec4b3e066f6fbd2840021651a3a39d,2025-03-04T16:15:36.803000
CVE-2025-1426,0,0,2876b3a8dca30380599d9579c9abf35d17096290894ef7cda88e0e95c5efa326,2025-02-19T20:15:36.467000
CVE-2025-1427,0,0,b7e473094712eef353836f4dde44e4c76d523f8b97e423856aa00a1873196c89,2025-03-13T17:15:34.743000
CVE-2025-1428,0,0,a24edc1900e2037eca1697d853a9c3a7a365dd6871ccbd3e92089041366e0a1a,2025-03-13T17:15:34.900000
CVE-2025-1428,0,1,2f08e5c3fe8253a6c4a3240306a5b36c7e9ce35b373973ea3a582bb4384dbfa9,2025-04-04T13:15:45.193000
CVE-2025-1429,0,0,a48d6ec582d2dad82c65a4daa1cedeefccc3b069798b0ebae06e65b05843be71,2025-03-13T17:15:35.053000
CVE-2025-1430,0,0,33dbb475df7942ea8f3e7704cf91befc5308feee95ef4d2792bd71bcc1f7182c,2025-03-13T17:15:35.217000
CVE-2025-1430,0,1,3a88959b8a2b6d6c00221dfa1f4e8d1f46d17417652a6eca853dc32dcc8ce865,2025-04-04T13:15:45.440000
CVE-2025-1431,0,0,94ea65fbb42352fa40eb2a0db95e32214ef7a7b91e7c98bab1ba1f7102862083,2025-03-13T17:15:35.377000
CVE-2025-1432,0,0,230507126806f849e3915bac4bc192105fa5d833fd312f680552b0c8cb74cd90,2025-03-13T17:15:35.533000
CVE-2025-1433,0,0,e4257b265cb0fea8237bfb54d6e25ede0c1cfc291c5042720840e13d6e6532c4,2025-03-13T17:15:35.683000
@ -282348,7 +282348,7 @@ CVE-2025-1859,0,0,70eed6aa2ae7042bee5e2f20f0d8c842e42ef5f3e1a1b3da126361521cdde1
CVE-2025-1860,0,0,7736a4cb2a2d2c15bb0706bffc9efba228a43975c53e60863c3f3d89ec467e3c,2025-04-02T22:15:18.623000
CVE-2025-1861,0,0,e574c7a5998a3dbf2cb6ce42d9de675d2d94a4e25a0eacc37130096101f987d1,2025-04-01T20:26:30.593000
CVE-2025-1864,0,0,c92fc87cd84b99acae49e648c1289b46612421f948d2c6533ab7724af225a718,2025-03-03T09:15:39.210000
CVE-2025-1865,1,1,8ed8bddbb51a3fac0589def8fb3b0d6b7c4b5dd1f1e5d2d5891da0bb29e4be07,2025-04-04T10:15:15.277000
CVE-2025-1865,0,0,8ed8bddbb51a3fac0589def8fb3b0d6b7c4b5dd1f1e5d2d5891da0bb29e4be07,2025-04-04T10:15:15.277000
CVE-2025-1866,0,0,6d645070e86ae70b91e6d45d95a260c1e9eb1ae7937ef173d0ea19de235adb52,2025-03-03T09:15:39.370000
CVE-2025-1867,0,0,a65a0cea20f97468944d29f6ba9795de8029e0ca08dd1a9572fb100876a713fb,2025-03-03T09:15:39.520000
CVE-2025-1868,0,0,33eb58dac94a982acb086671165958ead51bdf581c5edfedb494a4e91abd786e,2025-03-03T12:15:34.610000
@ -283621,7 +283621,7 @@ CVE-2025-22277,0,0,d3953de33b0251c415d71264a93a8d08d09a60d984824c8d1bfdf7718d25e
CVE-2025-22278,0,0,cc8f354bce230092658929ccab2063a437175395281c0a62d02df7bef8385557,2025-03-27T16:45:12.210000
CVE-2025-2228,0,0,b8e082346d4d2d148e6a99881a0d1d5f06a659dc8972867638956a785b9cdf28,2025-03-27T16:45:27.850000
CVE-2025-22280,0,0,7e887d74f1380d8cf0e36667690a3957b0ae26b7cf636de27c1eae24280ecf11,2025-02-27T14:15:36.033000
CVE-2025-22282,1,1,bd66d4b687544e2b13caf35aff6698f43fd54fd66dfa60396ba9b69f61c2d4e8,2025-04-04T11:15:39.680000
CVE-2025-22282,0,0,bd66d4b687544e2b13caf35aff6698f43fd54fd66dfa60396ba9b69f61c2d4e8,2025-04-04T11:15:39.680000
CVE-2025-22283,0,0,c6e0038bc1265de2aebb3206299f123b1602ed0ab9f0a11ae0639273d1681a40,2025-03-27T16:45:27.850000
CVE-2025-22284,0,0,141756b91553288d6d3b7a6baecfb796de636cfa27171ddd3204c869f7233bc2,2025-02-16T23:15:09.280000
CVE-2025-22286,0,0,a057abc87f895feda50fc222dd31de7ff11581af126698bf58f0b63b8d8dc92a,2025-02-16T23:15:09.427000
@ -283730,13 +283730,13 @@ CVE-2025-2240,0,0,2a3ccc213981a0c7a04acca32ee567b557068e9dccba83e3d74fc058a2aa56
CVE-2025-22402,0,0,6f8fff7283a94f5896b11ef84f302b0565ff570b2cada8e73fd3faea43645321,2025-03-04T16:24:09.313000
CVE-2025-2241,0,0,6926f2fa842474fe6a55e7174f46044c3c08c97e12f8e662d0b323e4fb945b10,2025-03-17T17:15:40.393000
CVE-2025-2242,0,0,02569f538af68313d2c79f3ea63f2697b367e188a2ca3eaefd938c12f3f7055f,2025-03-27T16:45:12.210000
CVE-2025-2243,1,1,c90737c56da556138b477400deeb05313f318917a55e72cab185064ea0c581b4,2025-04-04T10:15:16.313000
CVE-2025-2244,1,1,791ac96582fe066cf46a80807b8d6f3a3a3ff30321083a3c8d19de7087001d5c,2025-04-04T10:15:16.580000
CVE-2025-2243,0,0,c90737c56da556138b477400deeb05313f318917a55e72cab185064ea0c581b4,2025-04-04T10:15:16.313000
CVE-2025-2244,0,0,791ac96582fe066cf46a80807b8d6f3a3a3ff30321083a3c8d19de7087001d5c,2025-04-04T10:15:16.580000
CVE-2025-22443,0,0,090cd1f4946368fc1e9eb5b6ab55668fbc2f20256169bdd81ac865305ea8e57a,2025-03-06T18:08:17.313000
CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000
CVE-2025-22447,0,0,14015e645ec113cec25abf1a777870417d62c167fc494c4315fe7d69805523a2,2025-03-06T04:15:25.377000
CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000
CVE-2025-2245,1,1,a9ff9699ae5a41975d2184fc91caaffa9dfd762f8ebe8ce30741f7eef46a88f6,2025-04-04T10:15:16.740000
CVE-2025-2245,0,0,a9ff9699ae5a41975d2184fc91caaffa9dfd762f8ebe8ce30741f7eef46a88f6,2025-04-04T10:15:16.740000
CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000
CVE-2025-22454,0,0,04f15e88e5a975efe8c2b32608cedcfad6c31392d1260fbd49043c6c8c78ea98,2025-03-11T15:15:44.737000
CVE-2025-22457,0,0,d15ae9efc4d84549a102fdac173000023601aa5d5cf3a5e807d8e19a71b8f59b,2025-04-03T16:15:35.370000
@ -287095,7 +287095,7 @@ CVE-2025-2854,0,0,281d4fc379506fb237df8903b8089035b874fedbc255b747985b9c9923b31a
CVE-2025-2855,0,0,5aaa475d5b8aab66a1ff02a7daf81660e986d985c8ef92681c11f5951c238f6a,2025-03-27T16:45:12.210000
CVE-2025-2857,0,0,8c7f8ac266f15d25c9af4fc5e517cf8a450da35ae1d4923b3d1c4b2dbd19ab2e,2025-03-28T16:15:30.180000
CVE-2025-2858,0,0,2e4b5f87bba94151b8774bfb4ece0ee9ed37a427c4372ccf2d59be0c4734d06d,2025-03-28T18:11:40.180000
CVE-2025-2859,0,0,ed3cdbae9f5da0c21f6653f091dc072a8e330a6bdc40c117d4a69a844bea1c9a,2025-03-28T18:11:40.180000
CVE-2025-2859,0,1,e65abd0b60f7827efad318631d07986b97bfd6a357c0604e2e3311a9d74c8481,2025-04-04T13:15:46.493000
CVE-2025-2860,0,0,2925b9644f166b8592fa371a02cb9c9e8b48780b6a0fbc61a9674b845b1d1e9c,2025-03-28T18:11:40.180000
CVE-2025-2861,0,0,7dad4c2c440266b98ec3759b932eef5f284ec025d86a17d9bc5b9d07901246c6,2025-03-28T18:11:40.180000
CVE-2025-2862,0,0,ad3586de27adfb4a89c83bf812f10d08ad110fe40d81b5c935b824380cef3797,2025-03-28T18:11:40.180000
@ -288037,6 +288037,8 @@ CVE-2025-31415,0,0,414e63d224a09cd075a83b960b86b86bc2238dd067741c725e74f34715621
CVE-2025-31417,0,0,0d3c1b109fae4b739454cb1a0b8eb7abc566c168fc7a86169fb95a201cbbcd1f,2025-04-01T20:26:30.593000
CVE-2025-31419,0,0,86daefd4cfae6cd0bc5dfe16310f6844d1f9e0f956e501ba1300c694a97deb9e,2025-04-01T20:26:30.593000
CVE-2025-3142,0,0,89dad725a78f99af9996b26eb4fd0b6e3130ff2cdf8b39de58f0a92b7681d0ad,2025-04-03T06:15:43.200000
CVE-2025-31420,1,1,b1e62500f59f82b3c0e41319b0be822dd95b1c52c179f4ea3f0c6d3a0c4c9e17,2025-04-04T13:15:46.630000
CVE-2025-31421,1,1,18b0871652150cdc4d60cde21b02ab562675125f486033750c92b6e45ba68815,2025-04-04T13:15:46.780000
CVE-2025-3143,0,0,94ecb7e4d681183309e1820ee8aa59c723a65e9bcb295db0aa131fd273d1f89e,2025-04-03T06:15:43.467000
CVE-2025-31431,0,0,9b65447f095eb6450cd16ceaae607c3f49ad8abcc8b0a8029061fac7fc7f6b63,2025-04-02T14:58:07.527000
CVE-2025-31432,0,0,66cb912d57f88bc72b111a0fcfbe419506a386c0afd760e3d30a46c5880e1d8f,2025-03-28T18:11:40.180000
@ -288440,6 +288442,7 @@ CVE-2025-31886,0,0,c73d86de86d3dc81b1c40f856db66f0a60956c38dbc4709d4ad0d4bf832e0
CVE-2025-31887,0,0,d54c33d517591b302b00ebc4e45735e58a8050b413372297cdc25b43fb40c5f8,2025-04-01T20:26:01.990000
CVE-2025-31888,0,0,6b4b44419e886eaa88230ec92a6476d580d8851b0d61dc8e06e42f2f45ce30b6,2025-04-01T20:26:01.990000
CVE-2025-31889,0,0,578b38d2dc9b6570f94ad6c848a3be4aed02c44ccbf0e3efa8a83b22f79d15a2,2025-04-02T14:58:07.527000
CVE-2025-3189,1,1,0bd3ea66e0743728b4646f02961dad6a7ffa30b4db28792bb1114c8d5d3f5cb9,2025-04-04T13:15:46.940000
CVE-2025-31890,0,0,b65898ce0553e8ce7fd4ab06e6cf7313e7f14c0d47bfb9ba085b4557bfb68295,2025-04-01T20:26:01.990000
CVE-2025-31891,0,0,0d5532363eae4a56d554bccc6fd0a90dca74503bbed8f03648dd943cb45d4007,2025-04-01T20:26:01.990000
CVE-2025-31892,0,0,3486378412c30d4b31ffeaa1b02f9c09ebdef5d6229cdf9d3eb7c7c44d1231e7,2025-04-01T20:26:01.990000
@ -288497,11 +288500,14 @@ CVE-2025-3219,0,0,dcfa632dff9e94c092f2d73b57763caab9c8b78bb5cc723e30d512c5a10d78
CVE-2025-3220,0,0,ba171ffb9f57124578c57e06aaab81ada82d0720d186647156c5c4abaa6f4704,2025-04-04T08:15:14.767000
CVE-2025-3229,0,0,09347180a6a7f828e0747f2ed45b00fdd7a1f719f9ab350e19aecf2c1c123a1d,2025-04-04T09:15:17.357000
CVE-2025-3231,0,0,de2ff2a8c76e38c6b06f54c3981a381c63043cd187dc0f869ed608d2e9e7696c,2025-04-04T09:15:17.677000
CVE-2025-3235,1,1,d022d5157edbac8fbfeb9141a3748050787bdf76ed78cf441cd594af050e5131,2025-04-04T10:15:16.900000
CVE-2025-3236,1,1,5d4e067380b83b38fff7db048531cbbf8dd6b43b2fc6d26b5d090f351b090b28,2025-04-04T10:15:17.177000
CVE-2025-3237,1,1,2b0634913d301c0209a0690fb90ddcaa8b200550805a1d4ec2db149b30fd4af2,2025-04-04T10:15:17.383000
CVE-2025-3238,1,1,49b7638c423114327b5e6867f71919ab552663d9bb2b5517ae05eef59b2968e0,2025-04-04T10:15:17.577000
CVE-2025-3239,1,1,a890b57275ecd0351eb57a0ff486b7b7ddc21d7a21c77a8b45094fdc21902b92,2025-04-04T11:15:40.393000
CVE-2025-3240,1,1,5b17439a0d44f5ff15b1b29eb52afc1b18c24e4ea281876bb94711a18baa0212,2025-04-04T11:15:40.603000
CVE-2025-3241,1,1,6109a3416c31e472988921dc354b6985d4f1985e340f34f97f9d234f6989df73,2025-04-04T11:15:40.783000
CVE-2025-3242,1,1,60be5ba649ac775f082baeb48a3ba854460f9aca2f32b24fcfec33ebf86a1f6c,2025-04-04T11:15:40.980000
CVE-2025-3235,0,0,d022d5157edbac8fbfeb9141a3748050787bdf76ed78cf441cd594af050e5131,2025-04-04T10:15:16.900000
CVE-2025-3236,0,0,5d4e067380b83b38fff7db048531cbbf8dd6b43b2fc6d26b5d090f351b090b28,2025-04-04T10:15:17.177000
CVE-2025-3237,0,0,2b0634913d301c0209a0690fb90ddcaa8b200550805a1d4ec2db149b30fd4af2,2025-04-04T10:15:17.383000
CVE-2025-3238,0,0,49b7638c423114327b5e6867f71919ab552663d9bb2b5517ae05eef59b2968e0,2025-04-04T10:15:17.577000
CVE-2025-3239,0,0,a890b57275ecd0351eb57a0ff486b7b7ddc21d7a21c77a8b45094fdc21902b92,2025-04-04T11:15:40.393000
CVE-2025-3240,0,0,5b17439a0d44f5ff15b1b29eb52afc1b18c24e4ea281876bb94711a18baa0212,2025-04-04T11:15:40.603000
CVE-2025-3241,0,0,6109a3416c31e472988921dc354b6985d4f1985e340f34f97f9d234f6989df73,2025-04-04T11:15:40.783000
CVE-2025-3242,0,0,60be5ba649ac775f082baeb48a3ba854460f9aca2f32b24fcfec33ebf86a1f6c,2025-04-04T11:15:40.980000
CVE-2025-3243,1,1,6cc184b6e9c2da2a9036a96f34024776eea63025e8c651f8f4b858c84c5a62f4,2025-04-04T12:15:15.530000
CVE-2025-3244,1,1,f40fcae26782bbc07fea6b0fd93020e8bffc63cfce19c9be4fcd9d216f2366f1,2025-04-04T12:15:16.217000
CVE-2025-3245,1,1,55a4666052abbcba093004e177627f630dc2b418996c95946336b62bce428aae,2025-04-04T12:15:16.400000

Can't render this file because it is too large.