Auto-Update: 2025-04-08T14:00:19.459633+00:00

This commit is contained in:
cad-safe-bot 2025-04-08 14:03:55 +00:00
parent 7d8f77075b
commit e48a893195
18 changed files with 1066 additions and 102 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25428",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-20T22:15:08.727",
"lastModified": "2025-03-13T19:15:43.037",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T13:19:04.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mrcms:mrcms:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "254B64CD-32D5-4E91-8A4C-54C155EA7E0B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wuweiit/mushroom/issues/19",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/wuweiit/mushroom/issues/19",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0444",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-02-04T19:15:32.237",
"lastModified": "2025-02-07T22:15:13.807",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T12:26:11.430",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,16 +49,51 @@
"value": "CWE-416"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "133.0.6943.53",
"matchCriteriaId": "619AD205-1050-4377-9DA6-E20DF49B4112"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/390889644",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Issue Tracking",
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0445",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-02-04T19:15:32.353",
"lastModified": "2025-02-07T22:15:13.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T12:25:50.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "133.0.6943.53",
"matchCriteriaId": "619AD205-1050-4377-9DA6-E20DF49B4112"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/392521083",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Issue Tracking",
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0451",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-02-04T19:15:32.477",
"lastModified": "2025-02-07T22:15:14.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T12:25:41.690",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "133.0.6943.53",
"matchCriteriaId": "619AD205-1050-4377-9DA6-E20DF49B4112"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/40061026",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1013",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-02-04T14:15:32.123",
"lastModified": "2025-02-04T22:15:41.743",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T12:26:22.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,26 +51,78 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
"versionEndExcluding": "128.7.0",
"matchCriteriaId": "B1B11C09-3033-44F5-ACC7-591196075CB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "135.0",
"matchCriteriaId": "BADF1FB6-FA36-4AD1-B176-0DD893E0CD9A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"versionEndExcluding": "128.7.0",
"matchCriteriaId": "1E4B98F4-AC9B-402A-B7D2-829373BFBD66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"versionStartIncluding": "129.0",
"versionEndExcluding": "135.0",
"matchCriteriaId": "5E83B28A-FF6A-4C0A-B5BD-1CE5DEC24C64"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1932555",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-07/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-09/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-10/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-11/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1062",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-24T06:15:12.910",
"lastModified": "2025-03-24T18:15:22.217",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T13:20:11.020",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Slider, Gallery, and Carousel by MetaSlider WordPress plugin before 3.95.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
},
{
"lang": "es",
"value": "El complemento Slider, Gallery, and Carousel de MetaSlider para WordPress anterior a la versi\u00f3n 3.95.0 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados como el administrador realizar ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)."
}
],
"metrics": {
@ -35,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:metaslider:slider\\,_gallery\\,_and_carousel:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.95.0",
"matchCriteriaId": "6F2E1BBE-4255-4319-80A3-229CDFDE414F"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/657b355b-e38f-46d6-b574-7ce736d25f31/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1203",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-24T06:15:13.013",
"lastModified": "2025-03-24T18:15:22.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T13:13:35.707",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Slider, Gallery, and Carousel by MetaSlider WordPress plugin before 3.95.0 does not sanitise and escape some of its settings, which could allow high privilege users such as editor to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
},
{
"lang": "es",
"value": "El complemento Slider, Gallery, and Carousel de MetaSlider para WordPress anterior a la versi\u00f3n 3.95.0 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados como el editor realizar ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)."
}
],
"metrics": {
@ -35,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:metaslider:slider\\,_gallery\\,_and_carousel:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.95.0",
"matchCriteriaId": "6F2E1BBE-4255-4319-80A3-229CDFDE414F"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/fca0b129-3299-46d6-9231-ca5afd2fdb66/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22457",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-04-03T16:15:35.370",
"lastModified": "2025-04-08T01:00:02.673",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-08T13:39:05.933",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -53,12 +73,279 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:*:-:*:*:*:*:*:*",
"versionEndExcluding": "22.7",
"matchCriteriaId": "A0EC2FCD-5402-4269-B86A-18F8DFB8F2C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*",
"matchCriteriaId": "F788F6D9-5368-4B8E-BFA0-E8FB3CDADB01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*",
"matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*",
"matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*",
"matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*",
"matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*",
"matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*",
"matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*",
"matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*",
"matchCriteriaId": "3447428E-DBCD-4553-B51D-AC08ECAFD881"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:*",
"matchCriteriaId": "A08BAF98-7F05-4596-8BFC-91F1A79D3BD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.5:*:*:*:*:*:*",
"matchCriteriaId": "40717D97-A062-49C4-B105-C22AAC3A206A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E4387B4-BC5C-41DE-92DA-84866A649AD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "24514B40-540E-45D7-90DC-BCC1D9D7E92C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r4:*:*:*:*:*:*",
"matchCriteriaId": "BFD510E9-12DC-4942-BAA0-6405CBD905EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r5:*:*:*:*:*:*",
"matchCriteriaId": "EA11BB6D-36C7-438B-A5A7-71C3CB2E5EC8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.3:r1:*:*:*:*:*:*",
"matchCriteriaId": "7B01001B-FA11-4297-AB81-12A00B97C820"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.3:r4:*:*:*:*:*:*",
"matchCriteriaId": "9F28E6B1-44AB-4635-8939-5B0A44BED1E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "3E9D957B-49F9-492D-A66A-0D25BA27AD35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.4:r3:*:*:*:*:*:*",
"matchCriteriaId": "D1AB497E-E403-4DEE-A83D-CB2E119E5E96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.5:r1:*:*:*:*:*:*",
"matchCriteriaId": "CA6B3322-9AFB-44B5-B571-995AB606FD01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.5:r1.2:*:*:*:*:*:*",
"matchCriteriaId": "47CB7C12-D642-4015-842C-37241F87DB86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1:*:*:*:*:*:*",
"matchCriteriaId": "58E49DF1-F66A-4F52-87FA-A50DFD735ECB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.2:*:*:*:*:*:*",
"matchCriteriaId": "62A0393A-C1C6-4708-BC41-5A5B8FB765FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.3:*:*:*:*:*:*",
"matchCriteriaId": "1F3358B0-4751-4DCD-8BFC-BB4C68505658"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.5:*:*:*:*:*:*",
"matchCriteriaId": "5C9313A0-2F33-412B-A6F0-E51AE19E199B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.6:*:*:*:*:*:*",
"matchCriteriaId": "2979603E-F5CF-4C53-9828-36795E1B6247"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.7:*:*:*:*:*:*",
"matchCriteriaId": "D0D33C96-EE5C-41EB-8D9F-88ED025C191A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "9F0A44E1-3670-4AD5-A54D-FDA6C200AA73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.2:*:*:*:*:*:*",
"matchCriteriaId": "C5B4CE43-2D9B-4DF9-AC2A-F649622CD190"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.3:*:*:*:*:*:*",
"matchCriteriaId": "3C9B3FF8-F613-404D-BC85-9DD6F2A6DB5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.4:*:*:*:*:*:*",
"matchCriteriaId": "CFC583B5-18F5-4943-8C68-6C601857CE5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.5:*:*:*:*:*:*",
"matchCriteriaId": "6E4DE5D9-C92B-4143-835F-2D16F0CC328F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.6:*:*:*:*:*:*",
"matchCriteriaId": "F874F69E-C621-4C4B-802F-900E7BFAB71B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2:*:*:*:*:*:*",
"matchCriteriaId": "67D43D1D-564D-4ACD-B0FF-3828B95E9864"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.2:*:*:*:*:*:*",
"matchCriteriaId": "BC8480E0-17C0-4590-950F-D3954E735365"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.3:*:*:*:*:*:*",
"matchCriteriaId": "3FAF4FB0-A88C-4A87-B6CB-32EF7B415885"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.8:r1:*:*:*:*:*:*",
"matchCriteriaId": "9779B197-1A14-4750-B8BC-9CA00F46D123"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.8:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFF5CD8-AB78-436B-AA16-8447706D0E86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.8:r2:*:*:*:*:*:*",
"matchCriteriaId": "2ADB0039-5652-428A-96A4-66B29DFB0F9D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:*:-:*:*:*:*:*:*",
"versionEndExcluding": "22.7",
"matchCriteriaId": "48EFA63B-1322-45B0-B86D-87F24A2B4E8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*",
"matchCriteriaId": "1F22B988-2585-4853-9838-AB3746C8B888"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "FD9BE8C2-43EB-4870-A4B7-267CB17A19F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "C8915BB2-C1C0-4189-A847-DDB2EF161D62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:*",
"matchCriteriaId": "8D24A8DB-D697-4C60-935D-B08EE36861CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.3:*:*:*:*:*:*",
"matchCriteriaId": "4C12D325-77E1-4873-8A77-D76F4A73BCF8"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-25914",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-17T20:15:14.013",
"lastModified": "2025-04-07T20:31:44.523",
"lastModified": "2025-04-08T13:41:36.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -60,8 +60,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:carmelogarcia:online_exam_mastering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CBE0D98A-8407-4C1B-9A52-8C571F31DF8A"
"criteria": "cpe:2.3:a:carmelo:online_exam_mastering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6CF5A638-55FA-4E3A-A2BB-BE6C2D8D6A6B"
}
]
}

View File

@ -0,0 +1,76 @@
{
"id": "CVE-2025-2568",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-04-08T12:15:15.760",
"lastModified": "2025-04-08T12:15:15.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Vayu Blocks \u2013 Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized access and modification of data due to missing capability checks on the 'vayu_blocks_get_toggle_switch_values_callback' and 'vayu_blocks_save_toggle_switch_callback' function in versions 1.0.4 to 1.2.1. This makes it possible for unauthenticated attackers to read plugin options and update any option with a key name ending in '_value'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/vayu-blocks/trunk/inc/function.php#L126",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/vayu-blocks/trunk/inc/function.php#L133",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/vayu-blocks/trunk/inc/function.php#L139",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/vayu-blocks/trunk/inc/function.php#L182",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3263702/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27ca93a1-3dfc-4bbd-834a-1c04d9e22ebf?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-2876",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-04-08T12:15:16.820",
"lastModified": "2025-04-08T12:15:16.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MelaPress Login Security and MelaPress Login Security Premium plugins for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'monitor_admin_actions' function in version 2.1.0. This makes it possible for unauthenticated attackers to delete any user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://melapress.com/wordpress-login-security/releases/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/melapress-login-security/trunk/app/modules/temporary-logins/class-temporary-logins.php#L71",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3267748/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/559cbc69-85b6-4bad-9bb2-26d64195ba7e?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2995",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-31T13:15:45.310",
"lastModified": "2025-04-01T20:26:30.593",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T13:05:30.387",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Tenda FH1202 1.2.0.14(408) and classified as critical. This vulnerability affects unknown code of the file /goform/SysToolChangePwd of the component Web Management Interface. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad en Tenda FH1202 1.2.0.14(408), clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /goform/SysToolChangePwd del componente Interfaz de Administraci\u00f3n Web. La manipulaci\u00f3n genera controles de acceso inadecuados. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -118,32 +122,94 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\\(408\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9FD9D0A-39F4-4AD8-AEE0-71C9E77D2799"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A632A11-60A0-457C-A039-BED32F83BD52"
}
]
}
]
}
],
"references": [
{
"url": "https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-SysToolChangePwd-1bc53a41781f809b95a4efb617090d3c?pvs=4",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.302044",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.302044",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.523418",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-SysToolChangePwd-1bc53a41781f809b95a4efb617090d3c",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2996",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-31T13:15:45.503",
"lastModified": "2025-04-01T20:26:30.593",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T13:04:38.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda FH1202 1.2.0.14(408) and classified as critical. This issue affects some unknown processing of the file /goform/SysToolDDNS of the component Web Management Interface. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Tenda FH1202 1.2.0.14(408) y se clasific\u00f3 como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /goform/SysToolDDNS del componente Interfaz de Administraci\u00f3n Web. La manipulaci\u00f3n genera controles de acceso inadecuados. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,6 +63,26 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -118,28 +142,86 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\\(408\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9FD9D0A-39F4-4AD8-AEE0-71C9E77D2799"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A632A11-60A0-457C-A039-BED32F83BD52"
}
]
}
]
}
],
"references": [
{
"url": "https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-SysToolDDNS-1bc53a41781f8012a03be8bebed1125b?pvs=4",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.302045",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.302045",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.523419",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-3155",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-04-03T14:15:46.413",
"lastModified": "2025-04-07T14:18:34.453",
"lastModified": "2025-04-08T13:15:41.573",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -63,6 +63,10 @@
{
"url": "http://www.openwall.com/lists/oss-security/2025/04/04/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://gist.github.com/parrot409/e970b155358d45b298d7024edd9b17f2",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3167",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T17:15:31.390",
"lastModified": "2025-04-07T14:18:34.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T13:50:05.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -120,30 +140,82 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac23_firmware:16.03.07.52:*:*:*:*:*:*:*",
"matchCriteriaId": "A70D64A9-3FF1-4777-ACB5-0D66D5B9448F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac23:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B730D9E-D9B0-480B-9941-7C48C56BBE94"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/LZY0522/CVE/blob/main/CVE_1.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.303113",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.303113",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.543150",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/LZY0522/CVE/blob/main/CVE_1.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3203",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-04T03:15:14.207",
"lastModified": "2025-04-07T14:18:15.560",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T13:41:35.810",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -122,32 +122,92 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:w18e_firmware:16.01.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "125BF798-C5BA-40C5-A7C9-CC3F09102584"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:w18e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "169334F3-1B6E-4A8A-99E5-2B4B98D92BE0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ZIKH26/tmp_store_reports/blob/main/tenda-w18e.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.303157",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.303157",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.545883",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/ZIKH26/tmp_store_reports/blob/main/tenda-w18e.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-08T12:00:20.635458+00:00
2025-04-08T14:00:19.459633+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-08T11:15:44.267000+00:00
2025-04-08T13:50:05.433000+00:00
```
### Last Data Feed Release
@ -33,27 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
289014
289016
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `2`
- [CVE-2025-2807](CVE-2025/CVE-2025-28xx/CVE-2025-2807.json) (`2025-04-08T10:15:16.780`)
- [CVE-2025-2808](CVE-2025/CVE-2025-28xx/CVE-2025-2808.json) (`2025-04-08T10:15:18.940`)
- [CVE-2025-2883](CVE-2025/CVE-2025-28xx/CVE-2025-2883.json) (`2025-04-08T10:15:19.197`)
- [CVE-2025-29985](CVE-2025/CVE-2025-299xx/CVE-2025-29985.json) (`2025-04-08T11:15:42.707`)
- [CVE-2025-29986](CVE-2025/CVE-2025-299xx/CVE-2025-29986.json) (`2025-04-08T11:15:44.033`)
- [CVE-2025-30166](CVE-2025/CVE-2025-301xx/CVE-2025-30166.json) (`2025-04-08T11:15:44.267`)
- [CVE-2025-3437](CVE-2025/CVE-2025-34xx/CVE-2025-3437.json) (`2025-04-08T10:15:19.413`)
- [CVE-2025-2568](CVE-2025/CVE-2025-25xx/CVE-2025-2568.json) (`2025-04-08T12:15:15.760`)
- [CVE-2025-2876](CVE-2025/CVE-2025-28xx/CVE-2025-2876.json) (`2025-04-08T12:15:16.820`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `14`
- [CVE-2025-3436](CVE-2025/CVE-2025-34xx/CVE-2025-3436.json) (`2025-04-08T09:15:29.300`)
- [CVE-2024-25428](CVE-2024/CVE-2024-254xx/CVE-2024-25428.json) (`2025-04-08T13:19:04.327`)
- [CVE-2025-0444](CVE-2025/CVE-2025-04xx/CVE-2025-0444.json) (`2025-04-08T12:26:11.430`)
- [CVE-2025-0445](CVE-2025/CVE-2025-04xx/CVE-2025-0445.json) (`2025-04-08T12:25:50.060`)
- [CVE-2025-0451](CVE-2025/CVE-2025-04xx/CVE-2025-0451.json) (`2025-04-08T12:25:41.690`)
- [CVE-2025-1013](CVE-2025/CVE-2025-10xx/CVE-2025-1013.json) (`2025-04-08T12:26:22.417`)
- [CVE-2025-1062](CVE-2025/CVE-2025-10xx/CVE-2025-1062.json) (`2025-04-08T13:20:11.020`)
- [CVE-2025-1203](CVE-2025/CVE-2025-12xx/CVE-2025-1203.json) (`2025-04-08T13:13:35.707`)
- [CVE-2025-22457](CVE-2025/CVE-2025-224xx/CVE-2025-22457.json) (`2025-04-08T13:39:05.933`)
- [CVE-2025-25914](CVE-2025/CVE-2025-259xx/CVE-2025-25914.json) (`2025-04-08T13:41:36.747`)
- [CVE-2025-2995](CVE-2025/CVE-2025-29xx/CVE-2025-2995.json) (`2025-04-08T13:05:30.387`)
- [CVE-2025-2996](CVE-2025/CVE-2025-29xx/CVE-2025-2996.json) (`2025-04-08T13:04:38.877`)
- [CVE-2025-3155](CVE-2025/CVE-2025-31xx/CVE-2025-3155.json) (`2025-04-08T13:15:41.573`)
- [CVE-2025-3167](CVE-2025/CVE-2025-31xx/CVE-2025-3167.json) (`2025-04-08T13:50:05.433`)
- [CVE-2025-3203](CVE-2025/CVE-2025-32xx/CVE-2025-3203.json) (`2025-04-08T13:41:35.810`)
## Download and Usage

View File

@ -253187,7 +253187,7 @@ CVE-2024-25420,0,0,e7efd1ed23ca746b8704e9c9ed47bae8368187f076c5294cba2da51c48b1f
CVE-2024-25421,0,0,4aaa4c906586deeb67dc43ed5331c3d0f3499a1d45ec23efb878770db6ed62f1,2024-11-21T09:00:47.180000
CVE-2024-25422,0,0,fd73cf22ceb02c6d1e99c3c5f2ec1ae1e4fb298d4ce867f4d1c13cae5d716e9e,2025-03-29T00:15:18.687000
CVE-2024-25423,0,0,94ea816a321c84c96a2ebe547c547d669f3866b10bc313b7f77b960fe74089b8,2024-11-21T09:00:47.563000
CVE-2024-25428,0,0,c1f8565d15f7bd231c5fb8c027cc10a0d0772315131ae0f14d1dd29e933516ae,2025-03-13T19:15:43.037000
CVE-2024-25428,0,1,d32399d8410f8e07f69a05223c98e83a079bf5b4c6fdae245110c0891b91b7de,2025-04-08T13:19:04.327000
CVE-2024-2543,0,0,e35575ccd402f68f321b7401fe74212ccd49958980ed309abbebc7424e6af3c9,2025-02-05T17:11:54.403000
CVE-2024-25431,0,0,a8f01c9a37ff069c7fe24fb46f974e9aa02888ea78827e75d08c3ba0b43d9f70,2024-11-14T20:42:47.297000
CVE-2024-25434,0,0,f6e4f2fadc8ceca96061be4132e7b90e015d2912a1fcf0291427a1223fb2e0f5,2024-11-21T09:00:48.197000
@ -281429,13 +281429,13 @@ CVE-2025-0440,0,0,bab5646fe57be32b81759b8d43c7715137b5a3dd2925726f076ac6ff1f1698
CVE-2025-0441,0,0,9be667b7ca3d6b0c4024db684ea154da0a17206dccf5623644eeb5915a246618,2025-03-18T15:15:58.760000
CVE-2025-0442,0,0,b67a5ab0a614c9dcc349e6c0e7630de1fb2af7af324e655577d77f7fa5f9a38f,2025-03-14T18:15:31.303000
CVE-2025-0443,0,0,1c12e337dcd70248f9855587510cef5c758f6b380d7c66c9f8bf888012a95d02,2025-03-19T19:15:44.070000
CVE-2025-0444,0,0,b57406504b58c76909f2c14a128c362cf7e0f5ed01cd46bcebd537920650043d,2025-02-07T22:15:13.807000
CVE-2025-0445,0,0,757acb8a0cefc693cbaf9e83fdad6cd24630be0355ff9a4060422c2852425aa3,2025-02-07T22:15:13.980000
CVE-2025-0444,0,1,1efb751b59aa45ed04e864bea01bc8adcc91e8c80cd105fb2b653639e4bd415b,2025-04-08T12:26:11.430000
CVE-2025-0445,0,1,1f0c7fcb92d671b93522c916f7edddd00703164b635b638ea3f141d50a752722,2025-04-08T12:25:50.060000
CVE-2025-0446,0,0,fa18d3e516501e304df9d785a2dd2f8e211e5095ae3d05bc045a0067edb62028,2025-03-14T17:15:50.033000
CVE-2025-0447,0,0,8d240d6923af2f79d18d6792cf7889c4bb668a774bac90a2a65697cac9d0826d,2025-03-14T16:15:39.803000
CVE-2025-0448,0,0,a91e2ae4b6f8dabbb6ae6cf566ef088075dfbe12391b6ba99af7e04d16a0c199,2025-03-24T18:15:21.910000
CVE-2025-0450,0,0,b38cc1b8bbfcc6d3647330d9f8e0167854327a3c3ad51d1f3e314ec78717ad4d,2025-01-21T11:15:10.593000
CVE-2025-0451,0,0,db4561898a7688dcdda2a1ca729c77eb37f2f44c57b9474f78cbce6bdceedaa2,2025-02-07T22:15:14.130000
CVE-2025-0451,0,1,ec162982b97bd5a4c8706791bf9297009e6b97295238977b32f66ef504825b2e,2025-04-08T12:25:41.690000
CVE-2025-0452,0,0,599e6d76f34b4186a031b1b81a37a110510d71d0a0d59cb5cc0da33a1062cba5,2025-03-20T10:15:52.890000
CVE-2025-0453,0,0,272cd88ee03bee6d7c6dd41617c8778ef9dd8ff18c14bc2fd8f315016111d90f,2025-04-02T16:10:48.930000
CVE-2025-0454,0,0,c42580a24b871e3fa3d3cd6f1a94379fb78f76a962d205b211328d7bbd6206cb,2025-03-20T10:15:53.157000
@ -281844,7 +281844,7 @@ CVE-2025-1009,0,0,2eaef1afd010c535fd50fceaedaa339dbea694d459d94247ca2cdf1816ccd1
CVE-2025-1010,0,0,62a03586b01b5384628b2b24394869ef4f272c9b8354e05188dae652a849042c,2025-02-06T19:30:13.637000
CVE-2025-1011,0,0,c7aab2f6a9c0415627154b90d3f96ebb209e4ddce064fa55ea39e2629e66c93d,2025-02-06T19:31:38.610000
CVE-2025-1012,0,0,4df28ce86cbd4e49559b6caf4f9713bdb42cefc5aa3a7f0ac2efbb26c1309b49,2025-02-06T19:33:46.407000
CVE-2025-1013,0,0,651300f5a902e2a90163edfab2155a83dd0507c6882d48dd9ffa23457be2f8b0,2025-02-04T22:15:41.743000
CVE-2025-1013,0,1,a694ebadfb836aa5cd945940b6983167477e640ab4f752d26f4c3011a4a51b06,2025-04-08T12:26:22.417000
CVE-2025-1014,0,0,c6156421e09c044512d56480035ada4fc6ec0f71d0de078370b84abda2b3d73f,2025-02-06T21:15:22.397000
CVE-2025-1015,0,0,c0fb0efc7bcd0a499f759d56d25d3e4c19351e1b390774630a281c721e58035d,2025-03-10T19:15:39.590000
CVE-2025-1016,0,0,2e0db284a246d9cb5702937ac7dbd1f00f468e9b4a4a58c00bbc39db26d0ee7b,2025-02-06T21:15:22.560000
@ -281871,7 +281871,7 @@ CVE-2025-1058,0,0,931565082cf6be7adcbf5c17fdfd20136c63742e85ad7be32de9be500e9b28
CVE-2025-1059,0,0,c8e08f393241882abd9f520991c8527e65d38e4d6c43516ed6bd207e016f7d2f,2025-02-13T06:15:21.680000
CVE-2025-1060,0,0,249a972722a8ea5c8c8703c094cf839a07a282f53cdfa1c21d84e389f952edae,2025-02-13T06:15:22.213000
CVE-2025-1061,0,0,719d74f0f0646df1bcdf5186f15b6b006503d4de7dcd7fdf659e983ae5a27990,2025-02-07T02:15:29.587000
CVE-2025-1062,0,0,0417d6496f79757d2c368398369c1b186f30d26153fee17b3f67f7bd395be185,2025-03-24T18:15:22.217000
CVE-2025-1062,0,1,7c0cf9c21117ca1714e5223a23745f872db0f1f3c0df124b87c28b2d150da2ed,2025-04-08T13:20:11.020000
CVE-2025-1063,0,0,f6ebc08f6e2568783d19012ba06b647ad752279ad00c89461f145d2a92f0083e,2025-02-28T16:07:01.990000
CVE-2025-1064,0,0,7b7164b210697e056675206baf5cc1f85c1aa8eb0b02774ad30b163694ee3ea3,2025-02-25T20:41:01.500000
CVE-2025-1065,0,0,70a90000a3a4cb679474daa22883e05e6abe48ed1e55dd42dffa8e01fc4b0bec,2025-02-19T06:15:21.507000
@ -281982,7 +281982,7 @@ CVE-2025-1199,0,0,b293e1750426e162cd73c69f2470f66e74330c6db9c1208ddcbe2ec678b89d
CVE-2025-1200,0,0,2cf33b7c7420072fbc797907606ea05888cf6aaff43c22f0ef1f03dfb676810e,2025-02-12T14:15:32.090000
CVE-2025-1201,0,0,9013de96c060dac01f3dd28cb24bb7efd9ce2730a40f3d2bb427bc4ce086e7ef,2025-02-18T18:01:07.620000
CVE-2025-1202,0,0,145e416d76817c96da29e1ee25f9dd444dc5ef4d95ddc6c06c93503cc4db41a1,2025-02-18T18:02:04.383000
CVE-2025-1203,0,0,34455ec817352faef1d2803275dfeff65d4d0b3cf199e494d0d41977b4eb990a,2025-03-24T18:15:22.360000
CVE-2025-1203,0,1,f2cbe4d9ffe40b5c9d21320d372187afdf27e726c0bb8950fba8244f09423775,2025-04-08T13:13:35.707000
CVE-2025-1204,0,0,1a6a6d6d7e9c4d6739bac4886c5ffe95dd752abb1877293a1f41dffddd75c21f,2025-02-25T17:15:14.057000
CVE-2025-1206,0,0,ea94e082f0fb2c3e9cbf9071800bfcaa07133d59e9c405a94dd3f8f199626042,2025-02-20T20:39:04.393000
CVE-2025-1207,0,0,7d124cbc886c8b13b8ddd3ab6b7b5525d0938d2d0afc4dcd7d8089b241a520f5,2025-02-12T16:15:44.393000
@ -283868,7 +283868,7 @@ CVE-2025-2245,0,0,47aa418e84b3637e8df058444cbc8a6e983fd5867c6c8fc35a1ae9e7ece391
CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000
CVE-2025-22452,0,0,ff338c2acc92abbef6e1d867487b0bd2693a0084a4ebaee6adef7d21d7f92aea,2025-04-07T14:17:50.220000
CVE-2025-22454,0,0,04f15e88e5a975efe8c2b32608cedcfad6c31392d1260fbd49043c6c8c78ea98,2025-03-11T15:15:44.737000
CVE-2025-22457,0,0,a8c6ac00f7a19b689fb44e74a369d2d9a441ce2727c1482a225f467e61dae066,2025-04-08T01:00:02.673000
CVE-2025-22457,0,1,06854130f0059ca72764b9c6e13d7893e783ab5e6f2271d978b176c2139c91f1,2025-04-08T13:39:05.933000
CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000
CVE-2025-22472,0,0,da7c2c2731a1940c60b4ae6c1edcbbf175ca5a2d3964a03701282be7a86cbe41,2025-03-17T18:15:20.930000
CVE-2025-22473,0,0,24aeaee52dbfb2b3f71ea7cd4512b20455b60139bbfda5acf051e65598986ddc,2025-03-17T18:15:21.077000
@ -286127,6 +286127,7 @@ CVE-2025-25675,0,0,c72dca8ea86886a3af81f324f3cf1b0ae0870a19e6aae0e2e014084eb2e1c
CVE-2025-25676,0,0,daf85732e597f1793e01b57a88af2ab73ae5e7b139e5e84dbb4cacf83744c130,2025-02-21T18:16:04.577000
CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b237f2,2025-02-21T18:16:08.493000
CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000
CVE-2025-2568,1,1,e63a9e1a5153be668a020909330e347014fc2091f50aceab3c0ade02f9bc05ac,2025-04-08T12:15:15.760000
CVE-2025-25680,0,0,8919bd2c5780d2fa1291e3679750e4e12f0c9d491f8dd8781fc99e5d4e2ec16e,2025-03-21T21:15:36.390000
CVE-2025-25683,0,0,3255bc8ab1d20b4d3f7b9e4f7d5ecc3209c23b4404d764181c9a91c6bf864bb3,2025-03-12T19:15:39.490000
CVE-2025-25684,0,0,3b58a1bef0cae9aea4ea5fa2ee9c7e1f876d6c7c88d8df3de973a9b1df4c99cc,2025-03-19T20:15:19.383000
@ -286220,7 +286221,7 @@ CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439
CVE-2025-25907,0,0,042fa44ae3449a91128a4cfdb3781e1176518918252daa0010b67c1143785aa9,2025-03-11T03:15:39.160000
CVE-2025-25908,0,0,fe355032e83d1fcac48ab80d23790fbbd6e28bd9d81eb2d8242e10204ea981e4,2025-03-11T03:15:39.350000
CVE-2025-2591,0,0,a1e4a67e01889d41f47571b6e9a1809cdf5b6c98f2756860cfcf5e05b47f2705,2025-03-21T14:15:16.853000
CVE-2025-25914,0,0,8f10f68b5ad601ca334924ef18a3f5e524caafa2d515f094f584596ea979480c,2025-04-07T20:31:44.523000
CVE-2025-25914,0,1,5f56c66d8de9bee616cb1da5ef251af605f05e5d5c498321787e18b7ebe1d356,2025-04-08T13:41:36.747000
CVE-2025-25916,0,0,91ba974117f22dab8d3678a8beecd3ea90efc52e588600708e1af441e5e35add,2025-02-28T16:15:39.867000
CVE-2025-2592,0,0,802101c6825ef87ca411ff48e867fc157f089d6dc8c2b07fbcff6e162493f0c0,2025-03-21T14:15:17.037000
CVE-2025-25925,0,0,992a4d92cdd1ca6c67a633afcfd4f776b6fb4440a7e0f0b6613ea419786bbe59,2025-03-12T16:15:23.337000
@ -287207,8 +287208,8 @@ CVE-2025-28011,0,0,fdcb5591ea26e059e8d35048712169c6e42fd9f817189e1097ee50f0c5ccd
CVE-2025-28015,0,0,2ec3b03d6a2c5b451e55cb244fde2066264789b2e32a98f716bffd5d4cc31009,2025-03-28T19:49:16.520000
CVE-2025-2803,0,0,e47ecd50bab8435762f20a0360685d74e0ceaca5cc3e5df3e0509ccc4da5c57f,2025-04-01T20:26:30.593000
CVE-2025-2804,0,0,920f730e5efd8732e0e5abb52416672a1a115bcae2eab5cbf394b4b15549c65b,2025-03-28T18:11:40.180000
CVE-2025-2807,1,1,13a598db827a1b55c2d01d688eae408cbeef468c81f7cf27eaeefd3d38b0e726,2025-04-08T10:15:16.780000
CVE-2025-2808,1,1,e7bfb734c1a2ea1587a06fb6b2eabdf9987ab02a2a6212e24d126411d61c6573,2025-04-08T10:15:18.940000
CVE-2025-2807,0,0,13a598db827a1b55c2d01d688eae408cbeef468c81f7cf27eaeefd3d38b0e726,2025-04-08T10:15:16.780000
CVE-2025-2808,0,0,e7bfb734c1a2ea1587a06fb6b2eabdf9987ab02a2a6212e24d126411d61c6573,2025-04-08T10:15:18.940000
CVE-2025-28087,0,0,1a24fc8fa031815998ab3cec95d83c4ceea417049d18cb4b484e469d0233d5a6,2025-04-07T14:22:33.160000
CVE-2025-28089,0,0,67dcb00b253159ea36147dba2ae48f5f5632d8f7c0e820c0f6cd1525d263b4dd,2025-04-07T14:20:46.543000
CVE-2025-28090,0,0,493fc323568428ac078046a31d0aa0ab344284d8b92655b7299afbb44b2e5613,2025-04-07T14:18:13.877000
@ -287278,10 +287279,11 @@ CVE-2025-2868,0,0,85b9dc17660105c1d52e94e9c61b1a822461960fd4e0c0e93de75ddcee9642
CVE-2025-2869,0,0,5066d8ca712c82ee845e66f8b1fc3a6c9e0a4e6b74c2b3263804ec9c98b4e586,2025-03-28T18:11:40.180000
CVE-2025-2870,0,0,532ce24468347275f11c46ecc24e5d6555c309a32268ad9ae9a421f0ae266a95,2025-03-28T18:11:40.180000
CVE-2025-2874,0,0,6a503ede6640ff91644e2f2d002d5c6c981994fafd27ed943d3456640dee218b,2025-04-07T14:18:34.453000
CVE-2025-2876,1,1,8a04444f60d0c286f113af81e09efd398da0aec904766cae13c72e9a062c1e16,2025-04-08T12:15:16.820000
CVE-2025-2877,0,0,84ec84d2bfb12624c83348efbdfe58ac8be43428be65066c732bbd9fdb6142cb,2025-04-07T16:15:25.720000
CVE-2025-2878,0,0,125728ac281a69ac5ecf14e31ba48aa14b6b6ffc7aef5853980db8dfb30bd674,2025-03-28T18:11:40.180000
CVE-2025-2882,0,0,37159719a6744bd7c4b3e5214bb194116cb1f154395ebf42cd3293c288a9a410,2025-04-08T08:15:16.860000
CVE-2025-2883,1,1,545a7679e9b3c6c1b299cd5e1d8da407be62e3f85141aaa4314765c3b1cf020f,2025-04-08T10:15:19.197000
CVE-2025-2883,0,0,545a7679e9b3c6c1b299cd5e1d8da407be62e3f85141aaa4314765c3b1cf020f,2025-04-08T10:15:19.197000
CVE-2025-2885,0,0,e2d01fa5043ddafa560e776b063da46f782fa630659191bee2d9e55b0a2acc15,2025-03-28T18:11:40.180000
CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000
CVE-2025-28856,0,0,db2bbb32cf52cca2ced522652c0571cdcf66f2f5f62f3cd167e79253416a8f6a,2025-03-11T21:15:42.763000
@ -287585,15 +287587,15 @@ CVE-2025-2993,0,0,e3a05f1130ad000a2e8949a1f58bab2527b1b4fcefaa78154e627a74dbdd1c
CVE-2025-29930,0,0,5c209ec60ca4eeb14d225cb677e5ddb09384395f274bc0cae2e3304b0a41e066,2025-03-18T19:15:51.340000
CVE-2025-29932,0,0,4b9314c077daab23a79ad834ada6389de74731b87a8def4d7d8999f0fd1a08b1,2025-03-27T16:45:46.410000
CVE-2025-2994,0,0,3998d75b7f0f42041f2d8938e2e7cae9fc19fcfd6624d2244213d422cfb3dff5,2025-04-07T14:38:29.277000
CVE-2025-2995,0,0,e694bb93662e3e6bb0f401f6372c51929ff3990a96ab9a67d9309580fd0f358c,2025-04-01T20:26:30.593000
CVE-2025-2996,0,0,7bbdd53b483fc5fbc9f485fbcd7ea4957b8c349b8017466a9f0d8bb20d88140c,2025-04-01T20:26:30.593000
CVE-2025-2995,0,1,5436a78f06a70eb8d33e1fe2c9cd6f31aabdc45a26a44233afe5c6b73ef22b68,2025-04-08T13:05:30.387000
CVE-2025-2996,0,1,ed0c2bf67d75b7c11a9588f001f1b50b2ae957ae2e7644b79be0a93f378f18b1,2025-04-08T13:04:38.877000
CVE-2025-2997,0,0,bc69099f8d7511956f428361eaf24eeb839dd67cac5eb37cbb44b2b22459dbf9,2025-04-01T20:26:30.593000
CVE-2025-2998,0,0,827aa23e1866da63b394bb2878f39c7208b378e6225cdb1e91f5f1852d0e36c0,2025-04-01T20:26:30.593000
CVE-2025-29980,0,0,02b1f4fe8cc2958b2decdcfb4a2e99acadf56a3773103d9215c6253bff189364,2025-03-20T20:15:33.233000
CVE-2025-29981,0,0,0cc2dcfb5af6923aabfbdf35cc06825eda3d5f1d817d89ebee60d30dc3aea5db,2025-04-02T14:58:07.527000
CVE-2025-29982,0,0,23affa7daecc4825576e77403823b6557774b9426b2d4d0f7cba7e9e66506adc,2025-04-02T14:58:07.527000
CVE-2025-29985,1,1,89052bb19c7af55c8aa0a03957e6893eab53a59e520f2de71daaca4dadc653ef,2025-04-08T11:15:42.707000
CVE-2025-29986,1,1,4acd386576fc63796eeeeb7ff01e5cdc5814f3dd50f3c5d462bb02ab309f26e7,2025-04-08T11:15:44.033000
CVE-2025-29985,0,0,89052bb19c7af55c8aa0a03957e6893eab53a59e520f2de71daaca4dadc653ef,2025-04-08T11:15:42.707000
CVE-2025-29986,0,0,4acd386576fc63796eeeeb7ff01e5cdc5814f3dd50f3c5d462bb02ab309f26e7,2025-04-08T11:15:44.033000
CVE-2025-29987,0,0,962644397d15823d289c2ad8de7be5eae2dfe8787c0957eaa9f9d8409e9ed1a4,2025-04-07T14:18:34.453000
CVE-2025-2999,0,0,81444588dd7906e6c8cac51c6c8e57e7e231b44db369bc45695ecb3a2d560ed4,2025-04-01T20:26:22.890000
CVE-2025-29991,0,0,40bf08e0cf4babdcbf62be0cd1c52dbd14323391ac7d7ab9cf689de3abb126a1,2025-04-07T14:18:34.453000
@ -287678,7 +287680,7 @@ CVE-2025-30161,0,0,93f02337f899fffc0a069554c6055fbd6fabd15132725d35bb3b73cfadbf6
CVE-2025-30162,0,0,8641e47d280f65cb3bb61486e9cfbaa56cd67a484749372cb3bbdafe7ce809ee,2025-03-27T16:45:46.410000
CVE-2025-30163,0,0,655322787d885aa61d50ea5e7ecff74dc9237e2c1710cc57eaf106a5eadfb182,2025-03-27T16:45:46.410000
CVE-2025-30164,0,0,c838231ddadd650538b91334381739f0e5f84496049f4ab61b98fedaf2408f7b,2025-03-27T16:45:27.850000
CVE-2025-30166,1,1,e488d3d7d257df7e5f7a5bae3073f2d1e075901bd28792ff49f682935a366064,2025-04-08T11:15:44.267000
CVE-2025-30166,0,0,e488d3d7d257df7e5f7a5bae3073f2d1e075901bd28792ff49f682935a366064,2025-04-08T11:15:44.267000
CVE-2025-30168,0,0,650d771cf97916a28afc5f172eb3b832385c1c5e1b844b714aca8ef5a55b9cbc,2025-03-21T15:15:43.440000
CVE-2025-3017,0,0,ae6477a257eae8225bc122e9d2ffd840d22d835e0499aad249230b11392c7bd0,2025-04-01T20:26:22.890000
CVE-2025-30177,0,0,bc31f6237a8a75bdd9699eb57e1c446258bc4f357acb1c9dcc48b902103b6e3c,2025-04-01T20:26:11.547000
@ -288368,7 +288370,7 @@ CVE-2025-31546,0,0,c81be945160530a5d8972f502c8b6dccdcbc4f31426d17fb23e7ca1bda644
CVE-2025-31547,0,0,34c1819315aa0af394560d2aea8a2920a9d3d7da1f143da584c8e8a4f22c83cb,2025-04-01T20:26:30.593000
CVE-2025-31548,0,0,d1b4214b4f31dcd8a9025f858166713a075840a49164ed00e12986869a0aecde,2025-04-02T14:58:07.527000
CVE-2025-31549,0,0,83b4a5c9d8badcd5b96931246bf4796624e241c3b1f405e59a18f12c8a783db6,2025-04-01T20:26:30.593000
CVE-2025-3155,0,0,3f7b5f8d08ab088a1e15be062cb74cd7dd4d9668dbb82032ec1d0b05943b204f,2025-04-07T14:18:34.453000
CVE-2025-3155,0,1,4c655058ba8507752997992f548ef355bd8a4c2040437a6bcc8ac21390dc4ebb,2025-04-08T13:15:41.573000
CVE-2025-31550,0,0,83f208aa53a9d367608231584d9c7b6b24f74f32a0a08dd8a80b85123a4b82ee,2025-04-02T14:58:07.527000
CVE-2025-31551,0,0,01a6ff107cfbcc3282db3d6ad9a7d1be104aab604084a23cac69debe8b4c1934,2025-04-02T14:58:07.527000
CVE-2025-31552,0,0,acadf09f28068f6285801331d50088e92d056876ddaa343a4a85705dae7fcdc2,2025-04-02T14:58:07.527000
@ -288457,7 +288459,7 @@ CVE-2025-3163,0,0,1abd6db1045bbae70669f1f8c9907280a5478489e8b1ebabb8eb88b115451d
CVE-2025-3164,0,0,524d9769a71affe8b81690c3ed0b562fd00f5c5232f9c0d91b2d9be6cf9796fb,2025-04-07T14:18:34.453000
CVE-2025-3165,0,0,2e02105ce99f3564dd878406ce8c0b7835d84010bc4a7c0c3ba88c3a6192f2c5,2025-04-07T14:18:34.453000
CVE-2025-3166,0,0,f93ee5d98274aaf48b0d321ffa90ba737cb5d64397eeed1cfa876157b59d3cfa,2025-04-07T14:18:34.453000
CVE-2025-3167,0,0,bd9c89afe51e40001d9fecf9a1da318ca968fce494dd47fa136274010ffe6747,2025-04-07T14:18:34.453000
CVE-2025-3167,0,1,b34599c040918980d6f606e5670b68090d1729d06d9c44998cbb7c2b6c7b9e52,2025-04-08T13:50:05.433000
CVE-2025-31673,0,0,4d87be6269b25250eebf5a9fce7cb9a2b88c94e00b9796d1018bcbd1dcf3b9cf,2025-04-01T20:26:22.890000
CVE-2025-31674,0,0,4c83b8fc56b3a5cdd09f994e999ba9d59f2e5140397359adac70c0dab25f825d,2025-04-03T18:15:47.417000
CVE-2025-31675,0,0,49c705166752735d64cb862d463bc2edf7315c17b8526bfff696b889b2b4e1b7,2025-04-01T20:26:22.890000
@ -288710,7 +288712,7 @@ CVE-2025-32013,0,0,c2a630586e3eb8d59df4073f809ec2e7f81c5bc7cc9d9bbbdf8f221f6d3ab
CVE-2025-32014,0,0,56762cbef9e5296f371a227e3d5a52cd9e157a1f840b6fd7cbb75f28d1fdeb59,2025-04-07T15:15:44.593000
CVE-2025-3202,0,0,b5df9a4f10b6a094526640bce151f74d263fe1512b1e3334f9249ec0e5e39a5f,2025-04-07T14:18:15.560000
CVE-2025-32029,0,0,8d9488255e68c0b28514f596d0e50e6d91cda4981696c0a5900811d7c043f680,2025-04-07T21:15:42.880000
CVE-2025-3203,0,0,8fa48768394bcd70db4b42e0cbf522ee067f4bdfadf116a6b0c16ce5e749253b,2025-04-07T14:18:15.560000
CVE-2025-3203,0,1,78b57c278226d9f3a2b475550553a6fb17775b43c46bacbb60b11f6ff85b8c2e,2025-04-08T13:41:35.810000
CVE-2025-32030,0,0,6501cbda6f1602cfd9282e8257ed63760701f2685f6445d31ec8f27cc31c7ac2,2025-04-07T21:15:43.037000
CVE-2025-32031,0,0,fbce7391a766676a7fa0a4ed2e770435aee21097045cdea7e0749ce233431124,2025-04-07T21:15:43.220000
CVE-2025-32032,0,0,d1ecde2a08cd3b8c264c932685f37069a85c50652ba63181ea45821acd643460,2025-04-07T21:15:43.363000
@ -289011,5 +289013,5 @@ CVE-2025-3430,0,0,b6c40d6b0ef3c8648892c15b77657ef236c19f9740d69b867859874e4fc547
CVE-2025-3431,0,0,e670e7d054e601025cf0eb72b723d5b37fb9fbb720309197877ef8f8d03470f7,2025-04-08T08:15:18.447000
CVE-2025-3432,0,0,2bf3e23b6bedbebc6bd8cdc2583c4de94eee07f3a92d57f813cb35a4cfad2133,2025-04-08T09:15:28.630000
CVE-2025-3433,0,0,c3110812ae023f72ad64a55b3ad2c3c0f766c027fee5bad7535d072d777395fa,2025-04-08T09:15:28.943000
CVE-2025-3436,0,1,9f90f52a69532e8408936e7cbb7e0f366cbd02a815f6e064670c79628bd8cc03,2025-04-08T09:15:29.300000
CVE-2025-3437,1,1,6875252e368ccc0365c18def92525cae93bda325f2d7ee4896a66443f4d3e9bf,2025-04-08T10:15:19.413000
CVE-2025-3436,0,0,9f90f52a69532e8408936e7cbb7e0f366cbd02a815f6e064670c79628bd8cc03,2025-04-08T09:15:29.300000
CVE-2025-3437,0,0,6875252e368ccc0365c18def92525cae93bda325f2d7ee4896a66443f4d3e9bf,2025-04-08T10:15:19.413000

Can't render this file because it is too large.