Auto-Update: 2025-04-02T02:00:19.991871+00:00

This commit is contained in:
cad-safe-bot 2025-04-02 02:03:53 +00:00
parent e668abbb59
commit d8f1a20daa
17 changed files with 573 additions and 15 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-24813", "id": "CVE-2025-24813",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2025-03-10T17:15:35.067", "published": "2025-03-10T17:15:35.067",
"lastModified": "2025-03-21T18:15:34.600", "lastModified": "2025-04-02T01:00:02.367",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -59,6 +59,10 @@
} }
] ]
}, },
"cisaExploitAdd": "2025-04-01",
"cisaActionDue": "2025-04-22",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Apache Tomcat Path Equivalence Vulnerability",
"weaknesses": [ "weaknesses": [
{ {
"source": "security@apache.org", "source": "security@apache.org",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27692",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-02T01:15:37.117",
"lastModified": "2025-04-02T01:15:37.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Unrestricted Upload of File with Dangerous Type vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service, Information disclosure, and Remote execution"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000296515/dsa-2025-135",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27693",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-02T01:15:37.283",
"lastModified": "2025-04-02T01:15:37.283",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Script injection."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000296515/dsa-2025-135",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27694",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-02T01:15:37.430",
"lastModified": "2025-04-02T01:15:37.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Insufficient Resource Pool vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-410"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000296515/dsa-2025-135",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-29981",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-02T01:15:37.577",
"lastModified": "2025-04-02T01:15:37.577",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Exposure of Sensitive Information Through Data Queries vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-202"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000296515/dsa-2025-135",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-29982",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-02T01:15:37.723",
"lastModified": "2025-04-02T01:15:37.723",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Insecure Inherited Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-277"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000296515/dsa-2025-135",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-3066",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:37.873",
"lastModified": "2025-04-02T01:15:37.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Navigations in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/405140652",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-3067",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:38.010",
"lastModified": "2025-04-02T01:15:38.010",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform privilege escalation via a crafted app. (Chromium security severity: Medium)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/376491759",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-3068",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:38.093",
"lastModified": "2025-04-02T01:15:38.093",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Intents in Google Chrome on Android prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/401823929",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-3069",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:38.187",
"lastModified": "2025-04-02T01:15:38.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/40060076",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-3070",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:38.283",
"lastModified": "2025-04-02T01:15:38.283",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient validation of untrusted input in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/40086360",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-3071",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:38.413",
"lastModified": "2025-04-02T01:15:38.413",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Navigations in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass same origin policy via a crafted HTML page. (Chromium security severity: Low)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/40051596",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-3072",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:38.503",
"lastModified": "2025-04-02T01:15:38.503",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Custom Tabs in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/362545037",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-3073",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:38.600",
"lastModified": "2025-04-02T01:15:38.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Autofill in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/388680893",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-3074",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:38.690",
"lastModified": "2025-04-02T01:15:38.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Downloads in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/392818696",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-04-01T23:55:19.839239+00:00 2025-04-02T02:00:19.991871+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-04-01T22:15:21.437000+00:00 2025-04-02T01:15:38.690000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -27,29 +27,40 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain ```plain
2025-04-01T00:00:04.510351+00:00 2025-04-02T00:00:04.382238+00:00
``` ```
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
288157 288171
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `3` Recently added CVEs: `14`
- [CVE-2023-46988](CVE-2023/CVE-2023-469xx/CVE-2023-46988.json) (`2025-04-01T22:15:20.023`) - [CVE-2025-27692](CVE-2025/CVE-2025-276xx/CVE-2025-27692.json) (`2025-04-02T01:15:37.117`)
- [CVE-2025-30356](CVE-2025/CVE-2025-303xx/CVE-2025-30356.json) (`2025-04-01T22:15:21.297`) - [CVE-2025-27693](CVE-2025/CVE-2025-276xx/CVE-2025-27693.json) (`2025-04-02T01:15:37.283`)
- [CVE-2025-31135](CVE-2025/CVE-2025-311xx/CVE-2025-31135.json) (`2025-04-01T22:15:21.437`) - [CVE-2025-27694](CVE-2025/CVE-2025-276xx/CVE-2025-27694.json) (`2025-04-02T01:15:37.430`)
- [CVE-2025-29981](CVE-2025/CVE-2025-299xx/CVE-2025-29981.json) (`2025-04-02T01:15:37.577`)
- [CVE-2025-29982](CVE-2025/CVE-2025-299xx/CVE-2025-29982.json) (`2025-04-02T01:15:37.723`)
- [CVE-2025-3066](CVE-2025/CVE-2025-30xx/CVE-2025-3066.json) (`2025-04-02T01:15:37.873`)
- [CVE-2025-3067](CVE-2025/CVE-2025-30xx/CVE-2025-3067.json) (`2025-04-02T01:15:38.010`)
- [CVE-2025-3068](CVE-2025/CVE-2025-30xx/CVE-2025-3068.json) (`2025-04-02T01:15:38.093`)
- [CVE-2025-3069](CVE-2025/CVE-2025-30xx/CVE-2025-3069.json) (`2025-04-02T01:15:38.187`)
- [CVE-2025-3070](CVE-2025/CVE-2025-30xx/CVE-2025-3070.json) (`2025-04-02T01:15:38.283`)
- [CVE-2025-3071](CVE-2025/CVE-2025-30xx/CVE-2025-3071.json) (`2025-04-02T01:15:38.413`)
- [CVE-2025-3072](CVE-2025/CVE-2025-30xx/CVE-2025-3072.json) (`2025-04-02T01:15:38.503`)
- [CVE-2025-3073](CVE-2025/CVE-2025-30xx/CVE-2025-3073.json) (`2025-04-02T01:15:38.600`)
- [CVE-2025-3074](CVE-2025/CVE-2025-30xx/CVE-2025-3074.json) (`2025-04-02T01:15:38.690`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `1` Recently modified CVEs: `1`
- [CVE-2024-20439](CVE-2024/CVE-2024-204xx/CVE-2024-20439.json) (`2025-04-01T22:15:20.950`) - [CVE-2025-24813](CVE-2025/CVE-2025-248xx/CVE-2025-24813.json) (`2025-04-02T01:00:02.367`)
## Download and Usage ## Download and Usage

View File

@ -237127,7 +237127,7 @@ CVE-2023-4698,0,0,9dfe8d865c6a7f1aa233e49914d858db0f5052b28d0060d7fc9a19845c64ca
CVE-2023-46980,0,0,dacb1018c155a0147f0608fc0394f59dd8f2f2f0512e453c092745a2746dd14f,2024-11-21T08:29:35.433000 CVE-2023-46980,0,0,dacb1018c155a0147f0608fc0394f59dd8f2f2f0512e453c092745a2746dd14f,2024-11-21T08:29:35.433000
CVE-2023-46981,0,0,026350644202b54d0cca0c15982b2b92ecf956938336a88c9fa0604ee3f1ed5f,2024-11-21T08:29:35.663000 CVE-2023-46981,0,0,026350644202b54d0cca0c15982b2b92ecf956938336a88c9fa0604ee3f1ed5f,2024-11-21T08:29:35.663000
CVE-2023-46987,0,0,229a1f390d396188d389c42c1c5da39c22ec617d23e459a8ad14ed7bcc5123c4,2024-11-21T08:29:35.810000 CVE-2023-46987,0,0,229a1f390d396188d389c42c1c5da39c22ec617d23e459a8ad14ed7bcc5123c4,2024-11-21T08:29:35.810000
CVE-2023-46988,1,1,802d8d0c9b3e42ea4c79902173df4cb5e36cd1bbd92fb617d81a0b4ce5a0358d,2025-04-01T22:15:20.023000 CVE-2023-46988,0,0,802d8d0c9b3e42ea4c79902173df4cb5e36cd1bbd92fb617d81a0b4ce5a0358d,2025-04-01T22:15:20.023000
CVE-2023-46989,0,0,45791d629ccc30ec38a0335dae48670585df4009011aeab0a1590f09dc4ec070,2024-11-21T08:29:35.957000 CVE-2023-46989,0,0,45791d629ccc30ec38a0335dae48670585df4009011aeab0a1590f09dc4ec070,2024-11-21T08:29:35.957000
CVE-2023-4699,0,0,65e91627f3db2e81b2cf04839985e20c3b1b4c4eb2f486d5e0771b5eef9626df,2025-03-17T16:15:18.850000 CVE-2023-4699,0,0,65e91627f3db2e81b2cf04839985e20c3b1b4c4eb2f486d5e0771b5eef9626df,2025-03-17T16:15:18.850000
CVE-2023-46990,0,0,160645d54c54d888c229c9d1c24711089a9818f72a67e4f52929e8b3e327db4e,2024-11-21T08:29:36.120000 CVE-2023-46990,0,0,160645d54c54d888c229c9d1c24711089a9818f72a67e4f52929e8b3e327db4e,2024-11-21T08:29:36.120000
@ -249286,7 +249286,7 @@ CVE-2024-20435,0,0,8b646979c41ec7de58575637102a01e3e1888da1726e49b926d55997d46bb
CVE-2024-20436,0,0,43b99a83735a1deef14d37878c34b3245659a80bba53d63455a76bb0d3703908,2024-10-08T21:00:00.670000 CVE-2024-20436,0,0,43b99a83735a1deef14d37878c34b3245659a80bba53d63455a76bb0d3703908,2024-10-08T21:00:00.670000
CVE-2024-20437,0,0,59d31400139cd4b295151b81e477c1e2539a52b4a6692c93f661bf74a9c22902,2024-10-24T19:45:01.540000 CVE-2024-20437,0,0,59d31400139cd4b295151b81e477c1e2539a52b4a6692c93f661bf74a9c22902,2024-10-24T19:45:01.540000
CVE-2024-20438,0,0,801db4a130c9994307cf5f0ae95dd4b599dd796092b52e8fa69dcf687e3ec077,2024-10-08T13:54:46.450000 CVE-2024-20438,0,0,801db4a130c9994307cf5f0ae95dd4b599dd796092b52e8fa69dcf687e3ec077,2024-10-08T13:54:46.450000
CVE-2024-20439,0,1,4fbf2ad41b4df9ac936f478a3b236238d9976e9129c140035ade1bfc7daf6dad,2025-04-01T22:15:20.950000 CVE-2024-20439,0,0,4fbf2ad41b4df9ac936f478a3b236238d9976e9129c140035ade1bfc7daf6dad,2025-04-01T22:15:20.950000
CVE-2024-2044,0,0,c3dd5aa5d2203eb1541a9242e72737c95ff6504f7ed93370ec0cf404c8320024,2025-02-13T18:17:51.447000 CVE-2024-2044,0,0,c3dd5aa5d2203eb1541a9242e72737c95ff6504f7ed93370ec0cf404c8320024,2025-02-13T18:17:51.447000
CVE-2024-20440,0,0,d1af3249c51bd7f941a39610d3a4681288a908bc2312c18dc00dbcffe30b3365,2024-09-19T13:42:41.017000 CVE-2024-20440,0,0,d1af3249c51bd7f941a39610d3a4681288a908bc2312c18dc00dbcffe30b3365,2024-09-19T13:42:41.017000
CVE-2024-20441,0,0,cfa61712a3c29cf86bd6533f2ff41455184f1538f6f64c55699096835398fd6d,2024-10-08T13:45:07.300000 CVE-2024-20441,0,0,cfa61712a3c29cf86bd6533f2ff41455184f1538f6f64c55699096835398fd6d,2024-10-08T13:45:07.300000
@ -285430,7 +285430,7 @@ CVE-2025-2481,0,0,c2c28d972678d70cba9bebdec9ea93fe1d44de9c5f8caa95f7b1a4769c38aa
CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000 CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000
CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000 CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000
CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000 CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000
CVE-2025-24813,0,0,1777555b5f20b0b5c1b8ea6c8ca1fe36c2e1ab9bec5d1dab12bfafa80c48bb19,2025-03-21T18:15:34.600000 CVE-2025-24813,0,1,f7331bb40ec2dcc0353aeab62186a5c231864e3c581b537158dc3c468fdabb44,2025-04-02T01:00:02.367000
CVE-2025-24814,0,0,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000 CVE-2025-24814,0,0,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000
CVE-2025-2482,0,0,be7a8d723327735044c6ecc1944caac7a739318f0bdbfa562a15b7f5a44fe782,2025-03-22T07:15:25.307000 CVE-2025-2482,0,0,be7a8d723327735044c6ecc1944caac7a739318f0bdbfa562a15b7f5a44fe782,2025-03-22T07:15:25.307000
CVE-2025-24826,0,0,afc4a3c6aa0e8288830e8c91cc81c25b8636a1b49a80120ea49c59c3d903f3ac,2025-01-28T21:15:18.817000 CVE-2025-24826,0,0,afc4a3c6aa0e8288830e8c91cc81c25b8636a1b49a80120ea49c59c3d903f3ac,2025-01-28T21:15:18.817000
@ -286846,6 +286846,9 @@ CVE-2025-27683,0,0,7e20c72afe8c88bc84d73e31c2ba29fb18f4a737228bf1bf47c1090223f9e
CVE-2025-27684,0,0,240682932b2a460f603a664c7d08c6697d3ad68db39d84d7af33037bb7ea91b8,2025-04-01T20:45:03.630000 CVE-2025-27684,0,0,240682932b2a460f603a664c7d08c6697d3ad68db39d84d7af33037bb7ea91b8,2025-04-01T20:45:03.630000
CVE-2025-27685,0,0,f1cd2113ab987f8aa8854222629b62161d79f2c62b06433ec39fa30503650db2,2025-04-01T20:44:56.343000 CVE-2025-27685,0,0,f1cd2113ab987f8aa8854222629b62161d79f2c62b06433ec39fa30503650db2,2025-04-01T20:44:56.343000
CVE-2025-27688,0,0,37bfd097838352d3a2c81f7e24a7a0eef1d098aec6c34d136894861caf071b8f,2025-03-18T16:15:27.980000 CVE-2025-27688,0,0,37bfd097838352d3a2c81f7e24a7a0eef1d098aec6c34d136894861caf071b8f,2025-03-18T16:15:27.980000
CVE-2025-27692,1,1,9ca37d99405705bc3811a9ef260a33dffb32c6a5759c2fd82f54af204311ff49,2025-04-02T01:15:37.117000
CVE-2025-27693,1,1,0eef02cc0236343b6aa16a2eb59cdb732e91f389e90fb92a5fef21e8140d0fc7,2025-04-02T01:15:37.283000
CVE-2025-27694,1,1,c891683dcfd971294e72cdfba4f5a33a48aecbde78c1324919a1d3fd57042b60,2025-04-02T01:15:37.430000
CVE-2025-27704,0,0,86d6df9596e1ab01bb839e39075597fb6abcd0e8a7145e06c224ef11d5c72693,2025-03-19T19:15:47.390000 CVE-2025-27704,0,0,86d6df9596e1ab01bb839e39075597fb6abcd0e8a7145e06c224ef11d5c72693,2025-03-19T19:15:47.390000
CVE-2025-27705,0,0,c5ff1aec7cfc8542770275a002f6e0d41571adb88f3dd40ea1ae12b57d47c3ea,2025-03-19T20:15:19.727000 CVE-2025-27705,0,0,c5ff1aec7cfc8542770275a002f6e0d41571adb88f3dd40ea1ae12b57d47c3ea,2025-03-19T20:15:19.727000
CVE-2025-27715,0,0,3945a29c5f5d17f328e68afe21b406dfe2951d48ca4e13bc184b7c24d7c6efed,2025-03-27T15:01:03.360000 CVE-2025-27715,0,0,3945a29c5f5d17f328e68afe21b406dfe2951d48ca4e13bc184b7c24d7c6efed,2025-03-27T15:01:03.360000
@ -287261,6 +287264,8 @@ CVE-2025-2996,0,0,7bbdd53b483fc5fbc9f485fbcd7ea4957b8c349b8017466a9f0d8bb20d8814
CVE-2025-2997,0,0,bc69099f8d7511956f428361eaf24eeb839dd67cac5eb37cbb44b2b22459dbf9,2025-04-01T20:26:30.593000 CVE-2025-2997,0,0,bc69099f8d7511956f428361eaf24eeb839dd67cac5eb37cbb44b2b22459dbf9,2025-04-01T20:26:30.593000
CVE-2025-2998,0,0,827aa23e1866da63b394bb2878f39c7208b378e6225cdb1e91f5f1852d0e36c0,2025-04-01T20:26:30.593000 CVE-2025-2998,0,0,827aa23e1866da63b394bb2878f39c7208b378e6225cdb1e91f5f1852d0e36c0,2025-04-01T20:26:30.593000
CVE-2025-29980,0,0,02b1f4fe8cc2958b2decdcfb4a2e99acadf56a3773103d9215c6253bff189364,2025-03-20T20:15:33.233000 CVE-2025-29980,0,0,02b1f4fe8cc2958b2decdcfb4a2e99acadf56a3773103d9215c6253bff189364,2025-03-20T20:15:33.233000
CVE-2025-29981,1,1,09c28e3ee545109db38128e7f5d516fe3a6a99af856d0f50210b74debfea6398,2025-04-02T01:15:37.577000
CVE-2025-29982,1,1,443f279ec3e8f8ec74d9581c45f6c19a36b2a204d80517adb9c5466221fe93dc,2025-04-02T01:15:37.723000
CVE-2025-2999,0,0,81444588dd7906e6c8cac51c6c8e57e7e231b44db369bc45695ecb3a2d560ed4,2025-04-01T20:26:22.890000 CVE-2025-2999,0,0,81444588dd7906e6c8cac51c6c8e57e7e231b44db369bc45695ecb3a2d560ed4,2025-04-01T20:26:22.890000
CVE-2025-29993,0,0,5a3aa3d216416e2fe2b892d0a3793dacda985a3191a3f3e25b8b0846fab45986,2025-03-27T16:45:27.850000 CVE-2025-29993,0,0,5a3aa3d216416e2fe2b892d0a3793dacda985a3191a3f3e25b8b0846fab45986,2025-03-27T16:45:27.850000
CVE-2025-29994,0,0,8b1d4c4db8a5bb026ac4bf9b653f3b25d05b3b75f8c87e310d6dd90fa8b8e6c7,2025-03-13T12:15:13.660000 CVE-2025-29994,0,0,8b1d4c4db8a5bb026ac4bf9b653f3b25d05b3b75f8c87e310d6dd90fa8b8e6c7,2025-03-13T12:15:13.660000
@ -287393,7 +287398,7 @@ CVE-2025-30352,0,0,2de13b7ea6496a9753fe04c1b9f1d1f6040e23740e41cd04836f25b10e4f3
CVE-2025-30353,0,0,8e65a7ad0acf611c52613ace8bbc6a0d71be7f9b2d98fcdd8dc95fe923800548,2025-03-27T16:45:27.850000 CVE-2025-30353,0,0,8e65a7ad0acf611c52613ace8bbc6a0d71be7f9b2d98fcdd8dc95fe923800548,2025-03-27T16:45:27.850000
CVE-2025-30354,0,0,5dfd79e839963dacd533ae1d1045edbad165ae9e4f05b41666c121d409d7b22d,2025-04-01T20:26:11.547000 CVE-2025-30354,0,0,5dfd79e839963dacd533ae1d1045edbad165ae9e4f05b41666c121d409d7b22d,2025-04-01T20:26:11.547000
CVE-2025-30355,0,0,c181bb9f03178ada7f8864d95d9a7bf782ab89dac6c391740fa45089c2c71179,2025-03-27T16:45:27.850000 CVE-2025-30355,0,0,c181bb9f03178ada7f8864d95d9a7bf782ab89dac6c391740fa45089c2c71179,2025-03-27T16:45:27.850000
CVE-2025-30356,1,1,4e2c8f1702b034f0ec44cd60888c6cfb635d04d1ae8401edcf97484e33555318,2025-04-01T22:15:21.297000 CVE-2025-30356,0,0,4e2c8f1702b034f0ec44cd60888c6cfb635d04d1ae8401edcf97484e33555318,2025-04-01T22:15:21.297000
CVE-2025-30358,0,0,1336bf68dc77795212b15e968253b9b288e4ef6b51817854b1199a3a91700753,2025-03-27T16:45:12.210000 CVE-2025-30358,0,0,1336bf68dc77795212b15e968253b9b288e4ef6b51817854b1199a3a91700753,2025-03-27T16:45:12.210000
CVE-2025-3036,0,0,9b0cf009578125197aa4aec620a4f3c05203c71ea759e4feb8ce4148704a9ff5,2025-04-01T20:26:22.890000 CVE-2025-3036,0,0,9b0cf009578125197aa4aec620a4f3c05203c71ea759e4feb8ce4148704a9ff5,2025-04-01T20:26:22.890000
CVE-2025-30361,0,0,2a99a8777446b2a7100805cd3ee21a3444f465410c503a48207dd0edeacecf45,2025-03-28T18:11:40.180000 CVE-2025-30361,0,0,2a99a8777446b2a7100805cd3ee21a3444f465410c503a48207dd0edeacecf45,2025-03-28T18:11:40.180000
@ -287562,9 +287567,18 @@ CVE-2025-30620,0,0,c08b515269c7c0e04b1b49f9e6c2ffe9756d4e917a1b7d90dc4cbb8598369
CVE-2025-30621,0,0,8c6a6eedc9f943375208fa96aeb0d151078d5fa54598208cfb233511cfe9bf71,2025-03-27T16:44:44.143000 CVE-2025-30621,0,0,8c6a6eedc9f943375208fa96aeb0d151078d5fa54598208cfb233511cfe9bf71,2025-03-27T16:44:44.143000
CVE-2025-30622,0,0,797c397d49f77f00a276d4088c4e3466e59efa0b6ce4fa17d94546d3a32ca074,2025-04-01T20:26:11.547000 CVE-2025-30622,0,0,797c397d49f77f00a276d4088c4e3466e59efa0b6ce4fa17d94546d3a32ca074,2025-04-01T20:26:11.547000
CVE-2025-30623,0,0,a8e0620fa0eff69e53f34c91bac6562d90d04f91188fb9d1c9bfa47d4c96dabd,2025-03-27T16:44:44.143000 CVE-2025-30623,0,0,a8e0620fa0eff69e53f34c91bac6562d90d04f91188fb9d1c9bfa47d4c96dabd,2025-03-27T16:44:44.143000
CVE-2025-3066,1,1,2dc9237ed16bea3a669d44eb9c63d5f5d3da5f52c8da53369eb787262bef2b6b,2025-04-02T01:15:37.873000
CVE-2025-3067,1,1,a1cd7ecee7808b7e6eeee70125e8546a5e4ee2d55893fb24b796ccabf8cba6d9,2025-04-02T01:15:38.010000
CVE-2025-30672,0,0,3ded266990ba9009f55577f3f5d04302a5c6b8450014b92c80b83398ad23d15e,2025-04-01T20:26:11.547000 CVE-2025-30672,0,0,3ded266990ba9009f55577f3f5d04302a5c6b8450014b92c80b83398ad23d15e,2025-04-01T20:26:11.547000
CVE-2025-30673,0,0,1cf76211fcfa10ad4c1393e8c6dafbf3bed92def83ca793b34e5eea95c528365,2025-04-01T20:26:11.547000 CVE-2025-30673,0,0,1cf76211fcfa10ad4c1393e8c6dafbf3bed92def83ca793b34e5eea95c528365,2025-04-01T20:26:11.547000
CVE-2025-30676,0,0,3e67eb6b5b390fd0a890a53592e5ec879a5cd04f0023bc4e82423b1868db6a78,2025-04-01T20:26:11.547000 CVE-2025-30676,0,0,3e67eb6b5b390fd0a890a53592e5ec879a5cd04f0023bc4e82423b1868db6a78,2025-04-01T20:26:11.547000
CVE-2025-3068,1,1,091cc762d9b8a8f8a077c885a0683f5ea215e12b55d95a52c5aebce7ef6a86e4,2025-04-02T01:15:38.093000
CVE-2025-3069,1,1,ee8ca143266eb86d15c9848d2c3360cd19f3cc71787f917dbc410fab67008eb4,2025-04-02T01:15:38.187000
CVE-2025-3070,1,1,53c53f991861f7edd26c24e9fb702f7a6d4774d5803aca32533dfe8b8501e92e,2025-04-02T01:15:38.283000
CVE-2025-3071,1,1,b35b5cf222bbb77b2698400bcd639e542a2b5443d1d7db5767f2873521232f46,2025-04-02T01:15:38.413000
CVE-2025-3072,1,1,89bbf3614f5396edbb5e52d5f46ab7c379153dc4a1ae5b07a06c22c32e47481b,2025-04-02T01:15:38.503000
CVE-2025-3073,1,1,a931a3351eadab7ee300cef65f8faaccae3408f260751d9049570702898cefc4,2025-04-02T01:15:38.600000
CVE-2025-3074,1,1,45ec19092253c1036517bac5becbff3ee7ae7f49e5c3f825354b9ed9e5c8ed43,2025-04-02T01:15:38.690000
CVE-2025-30741,0,0,a7ba724d5523a4cf0c1b38678a2ee1b0c99bfb24f80e0249782577c8771159ad,2025-03-27T16:45:46.410000 CVE-2025-30741,0,0,a7ba724d5523a4cf0c1b38678a2ee1b0c99bfb24f80e0249782577c8771159ad,2025-03-27T16:45:46.410000
CVE-2025-30742,0,0,86ca35df94be3200dc999955b93d6c2b0d3e9fbdd347944fb57613c93c49228a,2025-03-27T16:45:46.410000 CVE-2025-30742,0,0,86ca35df94be3200dc999955b93d6c2b0d3e9fbdd347944fb57613c93c49228a,2025-03-27T16:45:46.410000
CVE-2025-30763,0,0,8cae761cd1fe343dec958c3bde26a021d7b611e1f3fb5c049ea6e8543db73e0c,2025-03-27T16:45:27.850000 CVE-2025-30763,0,0,8cae761cd1fe343dec958c3bde26a021d7b611e1f3fb5c049ea6e8543db73e0c,2025-03-27T16:45:27.850000
@ -287788,7 +287802,7 @@ CVE-2025-31128,0,0,52e006b38e138bd3cfa52eda23e225a5789ea16b27f326a93ad59b1b0e562
CVE-2025-31129,0,0,a6a4a9f484942a82b7b2400d9c67e69c64eabd46827eb84a0adccbba59ac10d1,2025-04-01T20:26:22.890000 CVE-2025-31129,0,0,a6a4a9f484942a82b7b2400d9c67e69c64eabd46827eb84a0adccbba59ac10d1,2025-04-01T20:26:22.890000
CVE-2025-31131,0,0,ffe40251d16a258e4a81f59dcec18bb939bd64bb0cc9817076ba3c26ae95274a,2025-04-01T20:26:11.547000 CVE-2025-31131,0,0,ffe40251d16a258e4a81f59dcec18bb939bd64bb0cc9817076ba3c26ae95274a,2025-04-01T20:26:11.547000
CVE-2025-31132,0,0,eaf6e55e3fdf39265a487f499946844b88ccfa5eca63cf5dd8b8ef7debd6ca38,2025-04-01T20:26:11.547000 CVE-2025-31132,0,0,eaf6e55e3fdf39265a487f499946844b88ccfa5eca63cf5dd8b8ef7debd6ca38,2025-04-01T20:26:11.547000
CVE-2025-31135,1,1,5d9830fe721eb6879569dafe35a9908674f9d7fcb73071cd61bc77ec344b4fe5,2025-04-01T22:15:21.437000 CVE-2025-31135,0,0,5d9830fe721eb6879569dafe35a9908674f9d7fcb73071cd61bc77ec344b4fe5,2025-04-01T22:15:21.437000
CVE-2025-31137,0,0,aa5cb365eeb8f1ccf4d4e02b2375f9788bb7b8b918887cbc536481f36524d9de,2025-04-01T20:26:01.990000 CVE-2025-31137,0,0,aa5cb365eeb8f1ccf4d4e02b2375f9788bb7b8b918887cbc536481f36524d9de,2025-04-01T20:26:01.990000
CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb16d,2025-03-27T16:45:12.210000 CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb16d,2025-03-27T16:45:12.210000
CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000 CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000

Can't render this file because it is too large.