Auto-Update: 2025-04-25T14:00:19.709220+00:00

This commit is contained in:
cad-safe-bot 2025-04-25 14:03:53 +00:00
parent 1964e086ee
commit b6c7adad22
9 changed files with 548 additions and 46 deletions

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11917",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-04-25T12:15:16.013",
"lastModified": "2025-04-25T12:15:16.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The JobSearch WP Job Board plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.8.8. This is due to improper configurations in the 'jobsearch_xing_response_data_callback', 'set_access_tokes', and 'google_callback' functions. This makes it possible for unauthenticated attackers to log in as the first connected Xing user, or any connected Xing user if the Xing id is known. It is also possible for unauthenticated attackers to log in as the first connected Google user if the user has logged in, without subsequently logging out, in thirty days. The vulnerability was partially patched in version 2.8.4."
},
{
"lang": "es",
"value": "El complemento JobSearch WP Job Board para WordPress es vulnerable a la omisi\u00f3n de la autenticaci\u00f3n en todas las versiones hasta la 2.8.8 incluida. Esto se debe a configuraciones incorrectas en las funciones \u00abjobsearch_xing_response_data_callback\u00bb, \u00abset_access_tokes\u00bb y \u00abgoogle_callback\u00bb. Esto permite que atacantes no autenticados inicien sesi\u00f3n como el primer usuario de Xing conectado, o como cualquier otro usuario de Xing conectado si se conoce su ID. Tambi\u00e9n es posible que atacantes no autenticados inicien sesi\u00f3n como el primer usuario de Google conectado si este ha iniciado sesi\u00f3n, sin cerrarla posteriormente, en treinta d\u00edas. La vulnerabilidad se corrigi\u00f3 parcialmente en la versi\u00f3n 2.8.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://codecanyon.net/item/jobsearch-wp-job-board-wordpress-plugin/21066856",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6de8a608-8715-4f9c-9f2f-df60dd1cc579?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3227",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-03T03:15:11.457",
"lastModified": "2024-11-21T09:29:11.463",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-25T13:52:04.237",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -74,40 +94,100 @@
"value": "CWE-24"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:weaver:e-office_oa:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.5",
"matchCriteriaId": "5BC57384-9952-4FD7-9E44-66307841C357"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/garboa/cve_3/blob/main/upload.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.259072",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.259072",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.308750",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/garboa/cve_3/blob/main/upload.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.259072",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.259072",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.308750",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-6198",
"sourceIdentifier": "research@onekey.com",
"published": "2025-04-25T13:15:42.370",
"lastModified": "2025-04-25T13:15:42.370",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The device exposes a web interface on ports TCP/3030 and TCP/9882. This web service runs lighttpd, which implements the\u00a0\u201cSNORE\u201d interface. This interface is affected by a stack buffer overflow vulnerability due to insecure path parsing. An attacker\nwith access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the\u00a0modem."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "research@onekey.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:C/RE:M/U:Red",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "YES",
"Recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "RED"
}
}
]
},
"weaknesses": [
{
"source": "research@onekey.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://www.onekey.com/resource/security-advisory-rce-on-viasat-modems-cve-2024-6198",
"source": "research@onekey.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-6199",
"sourceIdentifier": "research@onekey.com",
"published": "2025-04-25T13:15:43.510",
"lastModified": "2025-04-25T13:15:43.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated attacker on the WAN interface, with the ability to intercept Dynamic DNS (DDNS) traffic between DDNS\u00a0services and the modem, could manipulate specific responses to include code that forces a buffer overflow on the modem.\n\nCustomers that have not enabled Dynamic DNS on their modem are not vulnerable."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "research@onekey.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:M/U:Red",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "NO",
"Recovery": "USER",
"valueDensity": "DIFFUSE",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "RED"
}
}
]
},
"weaknesses": [
{
"source": "research@onekey.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://www.onekey.com/resource/security-advisory-rce-on-viasat-modems-cve-2024-6199",
"source": "research@onekey.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-2470",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-04-25T12:15:16.903",
"lastModified": "2025-04-25T12:15:16.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Service Finder Bookings plugin for WordPress, used by the Service Finder - Directory and Job Board WordPress Theme, is vulnerable to privilege escalation in all versions up to, and including, 5.1. This is due to a lack of restriction on user role in the 'nsl_registration_store_extra_input' function. This makes it possible for unauthenticated attackers to register an account on the site with an arbitrary role, including Administrator, when registering via a social login. The Nextend Social Login plugin must be installed and configured to exploit the vulnerability."
},
{
"lang": "es",
"value": "El complemento Service Finder Bookings plugin for WordPress, used by the Service Finder - Directory and Job Board WordPress Theme, es vulnerable a la escalada de privilegios en todas las versiones hasta la 5.1 incluida. Esto se debe a la falta de restricci\u00f3n del rol de usuario en la funci\u00f3n 'nsl_registration_store_extra_input'. Esto permite que atacantes no autenticados registren una cuenta en el sitio con un rol arbitrario, incluido el de Administrador, al registrarse mediante inicio de sesi\u00f3n con redes sociales. El complemento Nextend Social Login debe estar instalado y configurado para explotar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"references": [
{
"url": "https://themeforest.net/item/service-finder-service-and-business-listing-wordpress-theme/15208793",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a1f62cda-262b-46d9-a839-0a573813cfa1?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-2986",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-04-25T12:15:17.083",
"lastModified": "2025-04-25T12:15:17.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Maximo Asset Management 7.6.1.3 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
},
{
"lang": "es",
"value": "IBM Maximo Asset Management 7.6.1.3 es vulnerable a cross-site scripting almacenado. Esta vulnerabilidad permite a un usuario privilegiado incrustar c\u00f3digo JavaScript arbitrario en la interfaz web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales en una sesi\u00f3n de confianza."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7231785",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,80 @@
{
"id": "CVE-2025-3912",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-04-25T12:15:17.243",
"lastModified": "2025-04-25T12:15:17.243",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WS Form LITE \u2013 Drag & Drop Contact Form Builder for WordPress plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_config' function in all versions up to, and including, 1.10.35. This makes it possible for unauthenticated attackers to read the value of the plugin's settings, including API keys for integrated services."
},
{
"lang": "es",
"value": "El complemento WS Form LITE \u2013 Drag & Drop Contact Form Builder for WordPress para WordPress es vulnerable al acceso no autorizado a los datos debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n 'get_config' en todas las versiones hasta la 1.10.35 incluida. Esto permite que atacantes no autenticados lean la configuraci\u00f3n del complemento, incluidas las claves API para los servicios integrados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ws-form/trunk/api/class-ws-form-api.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/ws-form/trunk/includes/class-ws-form-common.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/ws-form/trunk/includes/class-ws-form-config.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/ws-form/trunk/ws-form.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3280355/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3f6058e2-a5ec-43b2-9cb7-9efcf0853ffc?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-25T12:00:23.836593+00:00
2025-04-25T14:00:19.709220+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-25T11:15:46.147000+00:00
2025-04-25T13:52:04.237000+00:00
```
### Last Data Feed Release
@ -33,34 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
291415
291421
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `6`
- [CVE-2025-1565](CVE-2025/CVE-2025-15xx/CVE-2025-1565.json) (`2025-04-25T10:15:15.557`)
- [CVE-2024-11917](CVE-2024/CVE-2024-119xx/CVE-2024-11917.json) (`2025-04-25T12:15:16.013`)
- [CVE-2024-6198](CVE-2024/CVE-2024-61xx/CVE-2024-6198.json) (`2025-04-25T13:15:42.370`)
- [CVE-2024-6199](CVE-2024/CVE-2024-61xx/CVE-2024-6199.json) (`2025-04-25T13:15:43.510`)
- [CVE-2025-2470](CVE-2025/CVE-2025-24xx/CVE-2025-2470.json) (`2025-04-25T12:15:16.903`)
- [CVE-2025-2986](CVE-2025/CVE-2025-29xx/CVE-2025-2986.json) (`2025-04-25T12:15:17.083`)
- [CVE-2025-3912](CVE-2025/CVE-2025-39xx/CVE-2025-3912.json) (`2025-04-25T12:15:17.243`)
### CVEs modified in the last Commit
Recently modified CVEs: `14`
Recently modified CVEs: `1`
- [CVE-2024-36908](CVE-2024/CVE-2024-369xx/CVE-2024-36908.json) (`2025-04-25T11:15:44.417`)
- [CVE-2024-46733](CVE-2024/CVE-2024-467xx/CVE-2024-46733.json) (`2025-04-25T11:15:44.663`)
- [CVE-2024-46742](CVE-2024/CVE-2024-467xx/CVE-2024-46742.json) (`2025-04-25T11:15:44.777`)
- [CVE-2024-46774](CVE-2024/CVE-2024-467xx/CVE-2024-46774.json) (`2025-04-25T11:15:44.910`)
- [CVE-2024-46816](CVE-2024/CVE-2024-468xx/CVE-2024-46816.json) (`2025-04-25T11:15:45.030`)
- [CVE-2024-49569](CVE-2024/CVE-2024-495xx/CVE-2024-49569.json) (`2025-04-25T11:15:45.147`)
- [CVE-2024-50063](CVE-2024/CVE-2024-500xx/CVE-2024-50063.json) (`2025-04-25T11:15:45.253`)
- [CVE-2024-53203](CVE-2024/CVE-2024-532xx/CVE-2024-53203.json) (`2025-04-25T11:15:45.400`)
- [CVE-2025-21853](CVE-2025/CVE-2025-218xx/CVE-2025-21853.json) (`2025-04-25T11:15:45.520`)
- [CVE-2025-22013](CVE-2025/CVE-2025-220xx/CVE-2025-22013.json) (`2025-04-25T11:15:45.647`)
- [CVE-2025-22077](CVE-2025/CVE-2025-220xx/CVE-2025-22077.json) (`2025-04-25T11:15:45.767`)
- [CVE-2025-22126](CVE-2025/CVE-2025-221xx/CVE-2025-22126.json) (`2025-04-25T11:15:45.880`)
- [CVE-2025-37838](CVE-2025/CVE-2025-378xx/CVE-2025-37838.json) (`2025-04-25T11:15:45.993`)
- [CVE-2025-37893](CVE-2025/CVE-2025-378xx/CVE-2025-37893.json) (`2025-04-25T11:15:46.147`)
- [CVE-2024-3227](CVE-2024/CVE-2024-32xx/CVE-2024-3227.json) (`2025-04-25T13:52:04.237`)
## Download and Usage

View File

@ -246458,6 +246458,7 @@ CVE-2024-11913,0,0,dd7d1aef6bd9b33c5cbc226bd6c46c9362be3e1f9ee0d5457fc9f3944230b
CVE-2024-11914,0,0,fa4ae25ac8caf18cb116501f16c4447bae56afeb864dc904882202ad6cc9632f,2024-12-12T04:15:06.983000
CVE-2024-11915,0,0,28ea0a161b7eefe74ada087940b67270e2ec51b6fcf1def4945f57e6c8ae681f,2025-01-11T08:15:24.680000
CVE-2024-11916,0,0,772212fec6b655643f1c957d90058c2fa42ec3e452d3898107b79ded42b35191,2025-04-14T12:27:30.293000
CVE-2024-11917,1,1,031167b73343774ee40ea835a42c4eab1f9c685cc3097d68bcac659311c4c55d,2025-04-25T12:15:16.013000
CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc06b,2024-11-28T06:15:08.347000
CVE-2024-1192,0,0,5063d16699b3db058d0f99170ded601d82fcfc6f39ec66d01e8a7cebfd42903d,2025-01-08T14:35:22.633000
CVE-2024-11921,0,0,8d14fd5ac89466ae906ad741ca0367246b772d6837be889940ee25bf6694b61d,2024-12-27T19:15:07.850000
@ -258529,7 +258530,7 @@ CVE-2024-32258,0,0,6307eaacd8410373f8e4971a56af08ef21a11ce548d7dc244e05c1cbd8242
CVE-2024-3226,0,0,d62a9b3627d473bf4da79a5994599afd5c9f26e2657570b8d6caf53a5569c149,2025-02-27T18:07:16.257000
CVE-2024-32268,0,0,4220b068189651923e7c03eaebbdaa1016b5566433d5df81372417a7a35be918,2025-02-10T23:15:13.667000
CVE-2024-32269,0,0,946bbdfbb629e9015a5d3fff72eb7016b39f3bb020c4b6fcea1e2b24974b3684,2024-11-21T09:14:38.380000
CVE-2024-3227,0,0,5e35ccb7a18c8f050486b123c0a41fc84140b2686da07023d7bd03192c5cc2b5,2024-11-21T09:29:11.463000
CVE-2024-3227,0,1,9e1d1fdbd4e1a4c34f6443452404f929d05306c6519fd21de6a244492ebf2163,2025-04-25T13:52:04.237000
CVE-2024-3228,0,0,08ccf2d9f01838c2ec15add697673a4972e6918a8d27a226bfa96edaba6deef9,2024-11-21T09:29:11.610000
CVE-2024-32281,0,0,7a66376ebdecf29b4444f8dc1c8f2ff04e98ba785ec70376a9c15ff0e2aacc79,2025-03-17T14:35:04.940000
CVE-2024-32282,0,0,46f9031bc243af75396d20ca183c4cf0747f94988e54cae7dc9de7135eba9c12,2025-04-09T14:20:58.563000
@ -262119,7 +262120,7 @@ CVE-2024-36904,0,0,98d6f735fc0e69f80deb2775ee6d5ef9e6471c0cc466f9251fa33735b25ec
CVE-2024-36905,0,0,d5655420c4e3e449e82b6c63b4afb80b0339e2202099a683554894c8b046d2c6,2025-01-14T17:15:17.077000
CVE-2024-36906,0,0,0aa76302720abb83a6a595e3140035dda654871b13cfc1eb2d8e0c500a12eaea,2024-11-21T09:22:47.157000
CVE-2024-36907,0,0,ffcc8ba9c8087981a33e390f5bfe4cc5a8c9c80b5d73e0c2a7a0f0128b189a0b,2025-03-01T02:46:34.373000
CVE-2024-36908,0,1,268e26cf1d3b4b6412affafdc478cc5f8c0c91962fbc5a3cb638de525fd46e75,2025-04-25T11:15:44.417000
CVE-2024-36908,0,0,268e26cf1d3b4b6412affafdc478cc5f8c0c91962fbc5a3cb638de525fd46e75,2025-04-25T11:15:44.417000
CVE-2024-36909,0,0,ce8ab62abeb377bee1d2bcd01da69db2cab04518b9e69f70cc2e82cdc2c9b18a,2024-11-21T09:22:47.580000
CVE-2024-3691,0,0,d0d5563495d9075b90bfaa6d2ab5bbf6dcf82c228d110efa49a20a6893129bd8,2025-02-18T19:04:33.587000
CVE-2024-36910,0,0,965398f938ac02c33ab743ca0d6997217b03f61a61087a6612c1b060ebce2068,2025-04-01T18:35:10.140000
@ -269557,7 +269558,7 @@ CVE-2024-4673,0,0,f9b8ec8d09cbbc1fe6ff8d3280c9d1c6c9821644bece84737cd22cabad037e
CVE-2024-46730,0,0,bbc0b138e2a127b2c6313e4e35e80e439f6fb3f79cf66854f3c83b93cd82ccd3,2024-09-30T12:49:00.333000
CVE-2024-46731,0,0,0bd7fa544e7b9ced432ca27de4e82ff1274f4f99e19ad791df993119a3c218c7,2024-09-26T13:29:19.877000
CVE-2024-46732,0,0,27f344a9c6c15a241e945bff7e9beb916eaa511582226dbb9cbc1bd0ddc0a6b4,2024-09-26T13:28:07.157000
CVE-2024-46733,0,1,1eadd3c68884f37342e4c618590c919532c25dfd4f771123aabb5222a77b99e3,2025-04-25T11:15:44.663000
CVE-2024-46733,0,0,1eadd3c68884f37342e4c618590c919532c25dfd4f771123aabb5222a77b99e3,2025-04-25T11:15:44.663000
CVE-2024-46734,0,0,54144e8397a8d8508d8b9ddc79011d1a73acd2236e76feed8ed79d1cd04c3452,2024-09-20T12:30:51.220000
CVE-2024-46735,0,0,7ffe4e26154503e86c91237b2c052c7f699d83a84a3ccaab2d3bbbd436c8823a,2024-09-20T18:35:53.967000
CVE-2024-46736,0,0,3c1ef12c24cce0f8bcbd38405e5151195e4b1250b39e7384abcf96ac2ee7ee60,2024-09-20T12:30:51.220000
@ -269567,7 +269568,7 @@ CVE-2024-46739,0,0,d205af77e24ab1326a75221d3af9b7b3b23426f178d16d2d86739cbf44af5
CVE-2024-4674,0,0,6e651da8702364f3ba8e5d536b29f090de9919ba02f02656062eb022212d5998,2025-02-19T18:07:22
CVE-2024-46740,0,0,f3cf7a1cb956f7a2c7d7e6990fc54e0386248e09abb927170aa60b8743f7fc32,2025-02-18T16:15:17.540000
CVE-2024-46741,0,0,09ed688b4e4a53d400e039f005d8e90ff80aabd957af947df6953f4926024947,2024-09-20T18:33:27.960000
CVE-2024-46742,0,1,d7d48f5b92030aab8c7493bc41d9c10a6cef82a61e47898bf1c54c830c60a61e,2025-04-25T11:15:44.777000
CVE-2024-46742,0,0,d7d48f5b92030aab8c7493bc41d9c10a6cef82a61e47898bf1c54c830c60a61e,2025-04-25T11:15:44.777000
CVE-2024-46743,0,0,b288832ee6d9c1844cb85119e621151e5809ad63298328c3c8489107631c2c24,2024-09-20T18:32:11.827000
CVE-2024-46744,0,0,c5fdb13f5a39a9642ab64854ebe3762ca44ce32d6586ba3c3edcf41ded86bc1a,2024-09-30T13:36:19.557000
CVE-2024-46745,0,0,1810fdd8cfd3dd07004fc4f09934af972754cc295d1890751708649bd77ab182,2024-09-20T12:30:51.220000
@ -269602,7 +269603,7 @@ CVE-2024-46770,0,0,3f28505d665ed7d2a19c63b8d28261802b71417515044c3bbe4e51a66d261
CVE-2024-46771,0,0,edd9de48a6966046e6e9b6c2d3d272bef734ff444f550b1023dacf571ecaa1d8,2024-11-20T18:20:03.130000
CVE-2024-46772,0,0,b2c6ed5053aa341269ac29fedbae440b943ba220fcede06edf01c3cddaf3d726,2025-04-07T09:15:15.800000
CVE-2024-46773,0,0,9cb44fe5397f6f84da684c8a0d3f69b229955bd83404f07dea2f1ec57ef48521,2024-09-23T16:51:59.983000
CVE-2024-46774,0,1,4168e5ce888bfeb50941ebaddef62bd83f7891732567f9e76c73fc0314db12fc,2025-04-25T11:15:44.910000
CVE-2024-46774,0,0,4168e5ce888bfeb50941ebaddef62bd83f7891732567f9e76c73fc0314db12fc,2025-04-25T11:15:44.910000
CVE-2024-46775,0,0,dfe5d776fd445a63c4996e3d7df7495f59178368d527e55e62a9c064e9c37ae2,2024-11-20T18:17:13.750000
CVE-2024-46776,0,0,ec71ec4690ef1f88bad3a62d9534132ced4b0bc07181c73bcd14a33c6e5a6f29,2024-11-20T17:56:57.290000
CVE-2024-46777,0,0,21ad3223e2428dfb57f4e57cfa918d664e2242c1748d72724a3159e943e581ac,2024-11-20T17:56:02.287000
@ -269648,7 +269649,7 @@ CVE-2024-46812,0,0,27f6c4dd25aa09a7e159856242be9f35fcc3122270f1ffd285e46652bc96a
CVE-2024-46813,0,0,ea4d886f1e469214530c3dc96328c5a7e7a8e2952f8545005f2a3901833e8bad,2025-04-10T13:15:45.303000
CVE-2024-46814,0,0,2d733e7cbdb19a14fbb31b604fcdeab772c427714b4e97ba0aea10c564457763,2024-10-04T17:27:47.450000
CVE-2024-46815,0,0,0d1eb43c74ba7bba5cc3b81322d15c43ea9fab0c4d58caf610783efac6ba13ce,2024-11-20T18:22:12.017000
CVE-2024-46816,0,1,18fd749effccc4eabc15a7febc128b4aa5d1503fa50b3b1753b126dfd8416644,2025-04-25T11:15:45.030000
CVE-2024-46816,0,0,18fd749effccc4eabc15a7febc128b4aa5d1503fa50b3b1753b126dfd8416644,2025-04-25T11:15:45.030000
CVE-2024-46817,0,0,f3ef23bb7390f2003e5dca267765a9b740d485c9c14e2cde1118f1e713765186,2024-11-20T17:45:43.893000
CVE-2024-46818,0,0,3c0ad7e9cb76891d8ac9b71df08567941cf062277ff4b72f5c15f729dfb8c7d8,2024-10-04T17:18:36.613000
CVE-2024-46819,0,0,fdca475d6dbaa09ef703a9cbcb418bdd925bbb20ca810eb936548c9b0d16f32a,2024-10-04T17:11:00.570000
@ -271664,7 +271665,7 @@ CVE-2024-49563,0,0,827ccbaea80bb5467dfc7289ca91a4d25f83cf30606ab4fec461139f2338b
CVE-2024-49564,0,0,8fb79c39b275f39082453aaf778c650f840e21c30d5bf7f5f4c7b0874de8c9d6,2025-03-28T18:11:40.180000
CVE-2024-49565,0,0,86e9989132e287d257bb63a69e2b6ee4b796cbb5c943261cdbbee1512f302599,2025-03-28T18:11:40.180000
CVE-2024-49568,0,0,2424937b6c632a3bb8bbe23f1d59070173b0b27451c699774823ff5adcd561d7,2025-01-11T13:15:23.637000
CVE-2024-49569,0,1,c656afc1e37b05a2772fd3607af20e8af9829dc5345d9176667b64dff5c0bf85,2025-04-25T11:15:45.147000
CVE-2024-49569,0,0,c656afc1e37b05a2772fd3607af20e8af9829dc5345d9176667b64dff5c0bf85,2025-04-25T11:15:45.147000
CVE-2024-4957,0,0,faf1bb90e1dc631958a9f6c5494539e38e22b9c3203a1f9393f289eefc9d7e39,2024-11-21T09:43:56.650000
CVE-2024-49570,0,0,6c0963f2b3310752a9fe1fd9ff9254cc20b94f75ba1819af3eccbe69179a39b0,2025-03-24T18:56:21.257000
CVE-2024-49571,0,0,48d41a1ed34da6a8d207508416dbadcc69c521f2274992ee3d4ce336a0c1087e,2025-01-11T13:15:24.027000
@ -272129,7 +272130,7 @@ CVE-2024-5006,0,0,5837c31bef582ca5d4638814ad63e32eeef8a5f2602838bc11a08790f4dd08
CVE-2024-50060,0,0,01dcad8cd7e5f8d2f3beeaf93497ab292892b951e329958f62a92464cf3d2176,2024-11-20T20:25:37.210000
CVE-2024-50061,0,0,7bf2c4f77a17eac93db10fdc03c0ad62be89d829ad4c533fe6b9e7cd9f3cf7f4,2025-02-21T14:15:49.370000
CVE-2024-50062,0,0,d50f044e8938707dae39384ec96cd77ececb8faa96071400b106a3c62189fac5,2024-10-23T21:48:57.737000
CVE-2024-50063,0,1,1d819a0d9c52f884fb82ae905e6716faebbfad22105f6ba7bd372ac48572b212,2025-04-25T11:15:45.253000
CVE-2024-50063,0,0,1d819a0d9c52f884fb82ae905e6716faebbfad22105f6ba7bd372ac48572b212,2025-04-25T11:15:45.253000
CVE-2024-50064,0,0,292ba67048c70b5eca902a8914b6e46b5ff25ff4177582fed7a5e55d850d7e8e,2025-04-16T19:15:52.623000
CVE-2024-50065,0,0,84caec01af79e694589460b1fd2d22181973d74a594b1014f17ab14d35b8559b,2024-11-20T20:07:01.320000
CVE-2024-50066,0,0,f8cbeb952d27740648470cb34786d680aee0eb2b11c0988fbc6b4e4ca35c50e9,2025-03-07T17:15:18.990000
@ -274490,7 +274491,7 @@ CVE-2024-53199,0,0,b7d164e48aa05e3c01fb8207aa331e220207154288cf87cf44ac3ccbb8685
CVE-2024-53200,0,0,382e2ed7c91ff816c9972e95788547d617ab94e25d45361504cd38a28e7c4e1f,2025-01-08T21:29:35.877000
CVE-2024-53201,0,0,c711eb722b8f180d53de7616fe5e83ef81c9c735e27696929f70cbb31bb1797d,2025-01-08T21:26:58.670000
CVE-2024-53202,0,0,6dbe997bc5638474adb0491890778fbeedc8cad0594dca99d0aa34c6acab69cf,2025-01-14T16:23:54.130000
CVE-2024-53203,0,1,bc7464a41527670661c503e9ac7d02c0a1dbf7fcbd194b81ecda2ddfe2204ae1,2025-04-25T11:15:45.400000
CVE-2024-53203,0,0,bc7464a41527670661c503e9ac7d02c0a1dbf7fcbd194b81ecda2ddfe2204ae1,2025-04-25T11:15:45.400000
CVE-2024-53204,0,0,2c897609f21b073f2aedfbae9db3f6afa71168ae92f23356b369b32f12df3275,2025-04-18T14:15:20.860000
CVE-2024-53205,0,0,f32da2740c9268726c877ede297f0d5488feab408e6344c210626a8b8000caed,2025-04-18T14:15:20.987000
CVE-2024-53206,0,0,2f6a2fc7adb42267dc8ee97a338aa8c24c6fa9462fbe1480b8392e4aae94186c,2025-02-11T16:15:41.840000
@ -277866,6 +277867,8 @@ CVE-2024-6194,0,0,edbd6241b7f987aa3a81863460dff0ff43067716b0eb6760c0d7999432f960
CVE-2024-6195,0,0,b4caf70d1edba8ea49e05884b1f80490b69a86c6f542eb35b84fa4578f274f1c,2024-11-21T09:49:10.187000
CVE-2024-6196,0,0,b1f39cc423aa2f573c963bfda2e2954c189faa3c6a65007de94824a0fe67c7b5,2024-11-21T09:49:10.340000
CVE-2024-6197,0,0,341d9f6df4ae3e4e99279c2cfac2e321c8271a012cdb7cb8f491cac94878c7fc,2024-11-29T12:15:08.430000
CVE-2024-6198,1,1,e2cdff1cf80ababece59ab0490c507d33c33b635c59ba8e50b012afe62fe25be,2025-04-25T13:15:42.370000
CVE-2024-6199,1,1,15389f1e61eaf87a77f28615f893dcedcf409e67ecf18f2698fddddd6250ddba,2025-04-25T13:15:43.510000
CVE-2024-6200,0,0,9ea80a7e2b2604a341d4266c7e6316677c4c7b3562bbab6c326247f642929732,2024-08-29T17:53:40.483000
CVE-2024-6201,0,0,d7508e5c68d1c9f58af9fd9a0f0c496f8219bfb780e580739e4f5ce4075f9531,2024-08-29T17:52:07.493000
CVE-2024-6202,0,0,6ede66ad5d88af3e4e7acd719dab516e45d0d130ab973638092e6c9d7ab6930d,2024-08-29T17:48:43.723000
@ -282452,7 +282455,7 @@ CVE-2025-1559,0,0,709a243835f3c6ce0779a28711cc25be41f0a8c4f301b124730fe9903567f9
CVE-2025-1560,0,0,5806fdd5d9f8e8a09704d33fd8caadc121e4fbb048f372fad8d43065a1e4a103,2025-03-06T16:15:42.753000
CVE-2025-1561,0,0,c0dd475a880b302ad58d5da65215c03a4b2329b9f43fd50459164bc801594e00,2025-03-13T05:15:27.890000
CVE-2025-1564,0,0,9d62e5431da133f133499b29bcb96aa13e41c1b673396891299a0b15aab9c828,2025-03-01T08:15:34.007000
CVE-2025-1565,1,1,6a57515da5c4230495c0789870c12c6576677843afc19ebfd9c8b119f2d4704f,2025-04-25T10:15:15.557000
CVE-2025-1565,0,0,6a57515da5c4230495c0789870c12c6576677843afc19ebfd9c8b119f2d4704f,2025-04-25T10:15:15.557000
CVE-2025-1566,0,0,0d1842651ca918db30bbbf585031a9882a06885240b960efc255c27959e9c4bf,2025-04-17T20:21:48.243000
CVE-2025-1568,0,0,82a20d4ff7b9cf0c7b45c5657d4a44e92b8acae0c9a7f165ae8fd2f575e43934,2025-04-17T20:21:48.243000
CVE-2025-1570,0,0,e2c8a697fd328cfac1cb14bcdda0501641702037da6bc6d3e9d43d7d6e474d73,2025-03-06T15:35:59.507000
@ -283794,7 +283797,7 @@ CVE-2025-2185,0,0,91b412b1d296ace687d40a6783e92d40fc865c9d24522642b0a45c94519a33
CVE-2025-21850,0,0,5a64ab06a2b6f581200ce1660927997cede0a2eabc44b30e9f55d39dacccfe4f,2025-03-13T16:29:12.770000
CVE-2025-21851,0,0,7bdca895fa921f203a0d87c612234a5ad7017395a8665ed600f55d38ca809496,2025-03-13T16:29:50.380000
CVE-2025-21852,0,0,c4adf7ded1a0df944edbc23a29fae37f72674fd1d9b49cefe98286acd387c332,2025-03-13T16:30:07.307000
CVE-2025-21853,0,1,f8d6f3489d97a0a2ae851b25b85ca4505d50e6d8cb626c12c21d9ea965be501c,2025-04-25T11:15:45.520000
CVE-2025-21853,0,0,f8d6f3489d97a0a2ae851b25b85ca4505d50e6d8cb626c12c21d9ea965be501c,2025-04-25T11:15:45.520000
CVE-2025-21854,0,0,9c78450b8715b387e8b26947750bb1e0ffed5820b15e3f2e0a35a80d6d8f2f8c,2025-03-13T21:18:24.623000
CVE-2025-21855,0,0,b60684fe956750d19be1267ce72b8af8344e6c62db29457ed70e99353d1b5be9,2025-03-28T16:15:28.047000
CVE-2025-21856,0,0,b09c68ce23969b8e4c4ebe578130af0c7fcaa476814ad748e7bff8a78b6b4332,2025-03-13T21:18:08.423000
@ -283969,7 +283972,7 @@ CVE-2025-2201,0,0,2371e9549039387486019592f5bf6cd7cee4f08ab86a19044d07c960855c7b
CVE-2025-22010,0,0,bdac999142019e0464835ba2c58bc0993611c3b3716f57cce8448da038080674,2025-04-10T13:15:50.687000
CVE-2025-22011,0,0,d6f0b86ea4fcae9c437f3df761e6c6f1254719a130d7c775b001ee5d7ce8ebed,2025-04-10T13:10:41.140000
CVE-2025-22012,0,0,2a1ef2918aee65275f9f773f0505976a03f119761b851bcaee2754c36f3fb91c,2025-04-10T13:10:36.613000
CVE-2025-22013,0,1,e8d7eac0691bf4cbc9e5abeade565aec25f8bc10d25f6483a2e9965a7c6af5e3,2025-04-25T11:15:45.647000
CVE-2025-22013,0,0,e8d7eac0691bf4cbc9e5abeade565aec25f8bc10d25f6483a2e9965a7c6af5e3,2025-04-25T11:15:45.647000
CVE-2025-22014,0,0,d0677bce9b40bf2440f1e3f05d26248d0f1a8e04e3af5766ae8663607da1e5dd,2025-04-10T13:15:50.823000
CVE-2025-22015,0,0,76ef40b09e4f1cb899d4a2ab31f22c4f6d8c6e60d75140b0b3e5777f401c7fbf,2025-04-08T18:13:53.347000
CVE-2025-22016,0,0,147b90da5e7863ebd9aa554a0d14ec0b4cb2770bdef3a66630422d63719c334c,2025-04-08T18:13:53.347000
@ -284037,7 +284040,7 @@ CVE-2025-22073,0,0,1011b1983c78355d02123f7c88dfc6182e9722c50b1fa6a835a8fbaf3084f
CVE-2025-22074,0,0,c93b26d255a98622f3c64207f2f2068cdbbb7943477ed1bda9847c2aed7aca12,2025-04-17T20:22:16.240000
CVE-2025-22075,0,0,261a98e89208109572cff4ef6745cb89aaeaf045a6efabf16dc812a41d8ddf6b,2025-04-17T20:22:16.240000
CVE-2025-22076,0,0,d420dac94d6fe51cc4ff1a0eb9628b40a00756768d7df0795a7580a2fb35e174,2025-04-17T20:22:16.240000
CVE-2025-22077,0,1,e4c836444f60fbb6831fded739bc536c15e2a4eafc62baa6c6353c3ffaefbe08,2025-04-25T11:15:45.767000
CVE-2025-22077,0,0,e4c836444f60fbb6831fded739bc536c15e2a4eafc62baa6c6353c3ffaefbe08,2025-04-25T11:15:45.767000
CVE-2025-22078,0,0,26f7b68d0cdad5a890aa75dadfa17672e8c28f9f0bf4ecb4fdd0f808542f5350,2025-04-17T20:22:16.240000
CVE-2025-22079,0,0,364458579769c3e0f2ccd2c4af19c4b4e0f96f4d7196e9e43e8a4f54c705c689,2025-04-17T20:22:16.240000
CVE-2025-2208,0,0,99b9d91a36ada917eec10dfce1128ade8f30ac7ffcb2e43a5105e2922f45ad1f,2025-03-11T21:15:54.117000
@ -284091,7 +284094,7 @@ CVE-2025-22122,0,0,26e482aa45f505c68da92af2963c9fb39c7d8be8e64626761306f6c9b438e
CVE-2025-22123,0,0,a22bc16ff55af1fbdd1763364944a06f5c48ab9a4828301000c285323ef8c595,2025-04-17T20:22:16.240000
CVE-2025-22124,0,0,7752cd210f8b2ed08482c6c58db66be96f05fdb19aaf501c80318fd986dc557c,2025-04-17T20:22:16.240000
CVE-2025-22125,0,0,d9d0d0be3e2ebc61c6d38c65cfcd45551569612dd89c48d601633ab28d2d34a8,2025-04-17T20:22:16.240000
CVE-2025-22126,0,1,d69a5c7dd72e14d4efa2f34c1be80ca5e4fba4822f184eaebcbe35636daca26c,2025-04-25T11:15:45.880000
CVE-2025-22126,0,0,d69a5c7dd72e14d4efa2f34c1be80ca5e4fba4822f184eaebcbe35636daca26c,2025-04-25T11:15:45.880000
CVE-2025-22127,0,0,f9fcfb39b6cb065d69a4e7639d1cd69417958e922b4049b689ebb96ace44c8a0,2025-04-17T20:22:16.240000
CVE-2025-22128,0,0,3706fdd79c3eacd04ed61d0b9c3b1b0449d18067b311dc6b7e2f28d4c5657ff7,2025-04-17T20:22:16.240000
CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000
@ -286121,6 +286124,7 @@ CVE-2025-24696,0,0,3f05e52259d3b900a80613c5b1e8b568819cf706464f6128c6614eb8c2149
CVE-2025-24697,0,0,524ece83a68382cbbf9bfb8b326769c1433565110882c970ecb2d390f56fd66b,2025-02-03T15:15:30.090000
CVE-2025-24698,0,0,ee9ed28bb6a4d45cbe5d6914ce763041875739a745cdfb0d75cc00a562396221,2025-01-24T18:15:43.050000
CVE-2025-24699,0,0,393e254dc7ad1cd4683fc4d4519da575204d2336c4593392a7c99d9a332989ca,2025-02-14T13:15:50.193000
CVE-2025-2470,1,1,4488c07429fb0f638a2bcf5f18f1c8dcca11fa0873f3deecc47a9e2553b57a37,2025-04-25T12:15:16.903000
CVE-2025-24700,0,0,751d45a0c372daf25447afad51791e39d3a984cf49ee5476e94da07a79832cbd,2025-02-14T13:15:50.330000
CVE-2025-24701,0,0,3286a9d08a955762787b23c92470d2629e626a4bb3688501e99db53a7da2cb4d,2025-01-24T18:15:43.207000
CVE-2025-24702,0,0,7c38f7de4d5427e8c69c77b42285f55828f36aa11705bf9605c2b3dfb09c1912,2025-01-24T18:15:43.360000
@ -288573,6 +288577,7 @@ CVE-2025-2983,0,0,d31f69cd4a503a465c90bfed858cd3831ad229c0ecb657ddc75c62172e5f91
CVE-2025-29834,0,0,4578a3b9050d36f7b5d401ef2cff9bd2a539c6ae9a0546aae8bc67b2af1fdb40,2025-04-15T18:39:43.697000
CVE-2025-2984,0,0,1ca7c36096a1944da99408d66ce040b5e7a8b1b551935cef4ecf4b2025e27c21,2025-04-01T20:26:30.593000
CVE-2025-2985,0,0,687fc2820bd43d778eaf02f10df92a92091bdb50597369a30af5a9476cdae1b0,2025-04-01T20:26:30.593000
CVE-2025-2986,1,1,971cb370a2208d6ff8e7ca861d70c22c3f320da3a2730619b33177fbeacbd69c,2025-04-25T12:15:17.083000
CVE-2025-29868,0,0,3cdd5d5bc9e5c1cb38e652f74faead4f53d8e8683a37455baaae14fba635a1fa,2025-04-15T13:07:54.393000
CVE-2025-2987,0,0,c5ae0e320f83eaa0b28afb3c153f6c745fec2a59a31f1b5ca52889e16590e49b,2025-04-23T14:08:13.383000
CVE-2025-29870,0,0,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000
@ -290955,14 +290960,14 @@ CVE-2025-3775,0,0,16e8478151448d32ea3ecef550364f3909606c3573641ec825932b7de0e1fc
CVE-2025-3776,0,0,cf81d0de1f8bc345c4abdbda2fd10df58ffa252c89f7ba1ddea13cef90f5d4da,2025-04-24T09:15:31.890000
CVE-2025-37785,0,0,d1c64bd1cadcc5f51780313b6aae97c63b6e0722d1c5a54d61cc46c9690e399a,2025-04-21T14:23:45.950000
CVE-2025-3783,0,0,08564e7625cce7923d54746f30fbc8f13bf12d9607faa6a7346084b96420b3f3,2025-04-23T18:03:35.193000
CVE-2025-37838,0,1,34b866110a481f88ddb643755af79280103467b2b106118ed6c8b965b4af27fd,2025-04-25T11:15:45.993000
CVE-2025-37838,0,0,34b866110a481f88ddb643755af79280103467b2b106118ed6c8b965b4af27fd,2025-04-25T11:15:45.993000
CVE-2025-3785,0,0,bff9ab0e8b6a6a32cd5139ba0f7e4bd4305d4e6ab42c05e8cc90a3044ee64a2a,2025-04-21T14:23:45.950000
CVE-2025-3786,0,0,ef1623c50d812a740179b99f61135828f9278cbc4c5320b64de7a7e4bc416e8d,2025-04-22T16:35:33.920000
CVE-2025-37860,0,0,0c77e81593ef5482779e31740051c4064947edf1b07804581ac12225df1491b3,2025-04-21T14:23:45.950000
CVE-2025-3787,0,0,3beed123857a653da372b7c8a1c42164041d5977b1dd91112f1404522a8170e5,2025-04-23T17:52:33.120000
CVE-2025-3788,0,0,cdf311291578b63efe8f95343add07fd97c2f4779c659c598fcec26571babece,2025-04-23T17:34:33.343000
CVE-2025-3789,0,0,28ab61c6372862568fce1ec9243f66e532b73550891c86833c4ef7464ff888b9,2025-04-21T14:23:45.950000
CVE-2025-37893,0,1,35f579b7463913981e9fb2e00bbe850fbdc5a97f02dc87f739a7a8fd54cfceb1,2025-04-25T11:15:46.147000
CVE-2025-37893,0,0,35f579b7463913981e9fb2e00bbe850fbdc5a97f02dc87f739a7a8fd54cfceb1,2025-04-25T11:15:46.147000
CVE-2025-3790,0,0,dc490dedfd3bb31d7338c71c9fcad5c80abd89749a2e60e6c362365fde12516a,2025-04-21T14:23:45.950000
CVE-2025-3791,0,0,291bfa74dbfa6e6e6c9947564765be440c26b137eac96eb1712e4de3014fe092,2025-04-21T14:23:45.950000
CVE-2025-3792,0,0,626f142eb589b39cf00a55b3a0accb178a0101c9e56a4bac9f54695372acad2c,2025-04-21T14:23:45.950000
@ -291034,6 +291039,7 @@ CVE-2025-3902,0,0,676970333097082de40f6f58233872070947df9bef43bb3df9e412f6058936
CVE-2025-3903,0,0,c819a464552e9e27e8ed2bfdd866426360d2fc34658c9fc1c82fb0c8ffcfc0a1,2025-04-23T19:16:25.843000
CVE-2025-3904,0,0,0d6553172301a91027b8c3c2558169e5d5696a7e7eb460e09b39ca21f58cb939,2025-04-23T19:16:25.977000
CVE-2025-3907,0,0,f81e129f5f652610151f5866cb425f616cfd83cdc084a2f30c48e0083539d88e,2025-04-23T18:16:03.620000
CVE-2025-3912,1,1,901e67c14b99b1df95fb427fedf0205e55435551b230eb40d3ab7b801534a4de,2025-04-25T12:15:17.243000
CVE-2025-3923,0,0,182118b3a4f54e107b68d12918f8a2e69019afc473ce8aee5e35db6077d81a3b,2025-04-25T06:15:46.117000
CVE-2025-39359,0,0,fe1620cebe6a3577f2510d166c3a64f56c7e8a35f76d5fc351e9b3c2125fe136,2025-04-24T16:15:30.737000
CVE-2025-39360,0,0,415da8a72d7f8b017363e845eb01588faa06aeb0917d4cea44c42e1c474de6f5,2025-04-24T16:15:30.877000

Can't render this file because it is too large.