Auto-Update: 2025-05-18T16:00:20.529755+00:00

This commit is contained in:
cad-safe-bot 2025-05-18 16:03:56 +00:00
parent 2695dab4f0
commit 97e0c2b406
7 changed files with 671 additions and 15 deletions

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2025-48219",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-18T15:15:17.340",
"lastModified": "2025-05-18T15:15:17.340",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "O2 UK through 2025-05-17 allows subscribers to determine the Cell ID of other subscribers by initiating an IMS (IP Multimedia Subsystem) call and then reading the utran-cell-id-3gpp field of a Cellular-Network-Info SIP header, aka an ECI (E-UTRAN Cell Identity) leak. The Cell ID might be usable to identify a cell location via crowdsourced data, and might correspond to a small physical area (e.g., if the called party is in a city centre). Removal of the Cellular-Network-Info header is mentioned in section 4.4.19 of ETSI TS 124 229."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-201"
}
]
}
],
"references": [
{
"url": "https://mastdatabase.co.uk/blog/2025/05/o2-expose-customer-location-call-4g/",
"source": "cve@mitre.org"
},
{
"url": "https://news.ycombinator.com/item?id=44014046",
"source": "cve@mitre.org"
},
{
"url": "https://www.etsi.org/deliver/etsi_ts/124200_124299/124229/15.10.00_60/ts_124229v151000p.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-4881",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-18T14:15:20.407",
"lastModified": "2025-05-18T14:15:20.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itsourcecode Restaurant Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/user_save.php. The manipulation of the argument username/name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Cherish-Ink/CVE/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://itsourcecode.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.309434",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.309434",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.576284",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-4882",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-18T14:15:21.027",
"lastModified": "2025-05-18T14:15:21.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itsourcecode Restaurant Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/team_update.php. The manipulation of the argument team leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Cherish-Ink/CVE/issues/2",
"source": "cna@vuldb.com"
},
{
"url": "https://itsourcecode.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.309435",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.309435",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.576285",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-4883",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-18T15:15:18.000",
"lastModified": "2025-05-18T15:15:18.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been declared as critical. This vulnerability affects the function ctxz_asp of the file /ctxz.asp of the component Connection Limit Page. The manipulation of the argument def/defTcp/defUdp/defIcmp/defOther leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:C/I:C/A:C",
"baseScore": 8.3,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 6.4,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/Yhuanhuan01/DI-8100_Vulnerability_Report/blob/main/DI-8100-Vulnerability_Report_ctxz.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.309436",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.309436",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.576392",
"source": "cna@vuldb.com"
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-4884",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-18T15:15:18.193",
"lastModified": "2025-05-18T15:15:18.193",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itsourcecode Restaurant Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/assign_save.php. The manipulation of the argument team leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/arpcyber555/CVE/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://itsourcecode.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.309437",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.309437",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.577363",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-05-18T14:00:19.636953+00:00
2025-05-18T16:00:20.529755+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-05-18T13:15:32.580000+00:00
2025-05-18T15:15:18.193000+00:00
```
### Last Data Feed Release
@ -33,24 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
294541
294546
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `5`
- [CVE-2025-4873](CVE-2025/CVE-2025-48xx/CVE-2025-4873.json) (`2025-05-18T12:15:17.753`)
- [CVE-2025-4874](CVE-2025/CVE-2025-48xx/CVE-2025-4874.json) (`2025-05-18T12:15:17.933`)
- [CVE-2025-4875](CVE-2025/CVE-2025-48xx/CVE-2025-4875.json) (`2025-05-18T13:15:32.410`)
- [CVE-2025-4880](CVE-2025/CVE-2025-48xx/CVE-2025-4880.json) (`2025-05-18T13:15:32.580`)
- [CVE-2025-48219](CVE-2025/CVE-2025-482xx/CVE-2025-48219.json) (`2025-05-18T15:15:17.340`)
- [CVE-2025-4881](CVE-2025/CVE-2025-48xx/CVE-2025-4881.json) (`2025-05-18T14:15:20.407`)
- [CVE-2025-4882](CVE-2025/CVE-2025-48xx/CVE-2025-4882.json) (`2025-05-18T14:15:21.027`)
- [CVE-2025-4883](CVE-2025/CVE-2025-48xx/CVE-2025-4883.json) (`2025-05-18T15:15:18.000`)
- [CVE-2025-4884](CVE-2025/CVE-2025-48xx/CVE-2025-4884.json) (`2025-05-18T15:15:18.193`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `0`
- [CVE-2024-12950](CVE-2024/CVE-2024-129xx/CVE-2024-12950.json) (`2025-05-18T13:15:31.633`)
## Download and Usage

View File

@ -247885,7 +247885,7 @@ CVE-2024-12947,0,0,2a3b3661396a8dbff0af925a2eecb0ff0c824fbb50cd41bb9999cb701b8dc
CVE-2024-12948,0,0,8a0f5d3c1fc1755c7bf26ac47b67e882b4269014f117c1b8df8936a0faf412eb,2025-04-03T16:26:47.640000
CVE-2024-12949,0,0,c0d72c08e20d7d41036fb7ba004e80016a051d20d7be2064c97fce41a5c0ab40,2025-04-03T16:26:56.777000
CVE-2024-1295,0,0,58e65e331ff11f824ceffb79237c2ca705e423c379ee489ababaab58413247e4,2024-11-21T08:50:15.410000
CVE-2024-12950,0,1,6a20a83a9c75da423e29227b0f1aedc6e453e5f4f437b9fc7030969ddc17e8df,2025-05-18T13:15:31.633000
CVE-2024-12950,0,0,6a20a83a9c75da423e29227b0f1aedc6e453e5f4f437b9fc7030969ddc17e8df,2025-05-18T13:15:31.633000
CVE-2024-12951,0,0,3803b69eec63458dffb1607404bb50eb2d06da8ca6db14918c2e0bea40f6aaf5,2025-04-22T15:09:08.513000
CVE-2024-12952,0,0,5b3fe07b4ee37c9593938d2f3bdefc1818a0886552b2a517ca99441e36c712dd,2024-12-26T16:15:10.540000
CVE-2024-12953,0,0,66285571c7dee08ea8df1d6d9aa780871d25246873232680b8c9291666615d51,2025-04-22T15:09:40.237000
@ -294489,6 +294489,7 @@ CVE-2025-4818,0,0,cce346449247f6eea730cbdcda70b9edf49e23659b1b92adc93ed7d9797858
CVE-2025-48187,0,0,5b4e452f0166ef5255d0a0e3e9ab3cff0e4f91c21343aae8e735dc7ab6ba661d,2025-05-17T13:15:47.750000
CVE-2025-48188,0,0,2672529ed2134d7e822c4e80adc1926206b8fee924bd8bafce4743aab07b6b9a,2025-05-16T21:15:35.210000
CVE-2025-4819,0,0,4170295b00fdcc5c32af5626f4b445edd90e064fa6a2e1cbd6416c33a2f01997,2025-05-17T06:15:19.287000
CVE-2025-48219,1,1,77c329424e78eacb99939575046e4e1ab2bd964fa81bcb26a5fccfb5d0ae2169,2025-05-18T15:15:17.340000
CVE-2025-4823,0,0,6f3b1707ea72ee3a3c3eeff12c136291b56cd7ea52535556fbfa26248b64922a,2025-05-17T10:15:21.023000
CVE-2025-4824,0,0,07725436676b5208c9d7c3df3eff48f7728c789d7657d91224ca8534f0628e25,2025-05-17T10:15:21.357000
CVE-2025-4825,0,0,c450e6df89b5d8c10396ad2772810d18549f3fc96d828a70a23f4d8ce2699b8a,2025-05-17T10:15:21.657000
@ -294532,10 +294533,14 @@ CVE-2025-4869,0,0,886e3ac0b1366d8eb0a0104a9cddba82d0f398cdd11cf2517363e24624f30c
CVE-2025-4870,0,0,de0732ba9af066993528fffe87c87861529e5ca0a4c8af418f921e706ac65729,2025-05-18T10:15:19.260000
CVE-2025-4871,0,0,7b42fd6d5fd89445a829ef35e810e6782029f31cd18045a9500c2e0d990dcc81,2025-05-18T11:15:47.560000
CVE-2025-4872,0,0,717205cce649f15d132e857ecddf23be9048801c5bd58a31d0ce04d74d62f005,2025-05-18T11:15:48.523000
CVE-2025-4873,1,1,4aa22745614ed0b8a06b44016915067473ebcf61b5bbbaf0aa618aab2762ce8f,2025-05-18T12:15:17.753000
CVE-2025-4874,1,1,357f78cfb35045c32fe79c1933369907c3aa8140fbba671a957504c1e5eed5c0,2025-05-18T12:15:17.933000
CVE-2025-4875,1,1,55aa6236c590d83b3621be0c3f9f78c2e51a3326db80153482a4f8ede5dc0698,2025-05-18T13:15:32.410000
CVE-2025-4880,1,1,959bc46298b2c95c3c0daa2688c86042955816e4302c84551deda7bf1e73857e,2025-05-18T13:15:32.580000
CVE-2025-4873,0,0,4aa22745614ed0b8a06b44016915067473ebcf61b5bbbaf0aa618aab2762ce8f,2025-05-18T12:15:17.753000
CVE-2025-4874,0,0,357f78cfb35045c32fe79c1933369907c3aa8140fbba671a957504c1e5eed5c0,2025-05-18T12:15:17.933000
CVE-2025-4875,0,0,55aa6236c590d83b3621be0c3f9f78c2e51a3326db80153482a4f8ede5dc0698,2025-05-18T13:15:32.410000
CVE-2025-4880,0,0,959bc46298b2c95c3c0daa2688c86042955816e4302c84551deda7bf1e73857e,2025-05-18T13:15:32.580000
CVE-2025-4881,1,1,1f7e9f79976d528ba43a5e0fab4db548c67f9d39ae8c39a7ccf52d5c8c27c337,2025-05-18T14:15:20.407000
CVE-2025-4882,1,1,e85a94af617a1a0a64a7fe2e482b9200371dcae210c528ae42ac894e53a2c36f,2025-05-18T14:15:21.027000
CVE-2025-4883,1,1,64b0e1d0590667ab04561e08ffd44bd4febb06a3905df217aa6b5d57063e40b4,2025-05-18T15:15:18
CVE-2025-4884,1,1,39d13ee5e66e1a414fda5e3b9979581d8800f0e8bf7816f98ab46de2729a5b5b,2025-05-18T15:15:18.193000
CVE-2025-4918,0,0,d0cf6aa59c9812008499a44d121fecc28710a5b912f95ff0edfb6017c9ae2fc5,2025-05-17T22:15:19.563000
CVE-2025-4919,0,0,f36da81bfae85369958b3aa8b9fbe215275f7c04b4694a88cf27b731ad2b6f15,2025-05-17T22:15:19.653000
CVE-2025-4920,0,0,bc40542eb632588a51155c6fe2f2681e16d991e89023a359a7d96e377210d0a6,2025-05-17T22:15:19.753000

Can't render this file because it is too large.