Auto-Update: 2025-04-25T02:00:19.369081+00:00

This commit is contained in:
cad-safe-bot 2025-04-25 02:03:52 +00:00
parent 8690152ff8
commit e97f57777b
6 changed files with 358 additions and 22 deletions

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2025-2185",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-04-25T00:15:15.340",
"lastModified": "2025-04-25T00:15:15.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ALBEDO Telecom Net.Time - PTP/NTP clock (Serial No. NBC0081P) software release 1.4.4 is vulnerable to an insufficient session expiration vulnerability, which\n could permit an attacker to transmit passwords over unencrypted \nconnections, resulting in the product becoming vulnerable to \ninterception."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [
{
"url": "https://www.albedotelecom.com/contactus.php",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-114-02",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2025-3606",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-04-25T00:15:15.807",
"lastModified": "2025-04-25T00:15:15.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vestel AC Charger \nversion \n\n3.75.0 contains a vulnerability that \ncould enable an attacker to access files containing sensitive \ninformation, such as credentials which could be used to further \ncompromise the device."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-497"
}
]
}
],
"references": [
{
"url": "https://firebasestorage.googleapis.com/v0/b/vestel-shield.firebasestorage.app/o/PRODUCTION%2F1%2FVSA-1_R2.pdf?alt=media&token=8201f299-5014-4720-9200-f1b335736ac1",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-114-03",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-43864",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-25T01:15:43.117",
"lastModified": "2025-04-25T01:15:43.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "React Router is a router for React. Starting in version 7.2.0 and prior to version 7.5.2, it is possible to force an application to switch to SPA mode by adding a header to the request. If the application uses SSR and is forced to switch to SPA, this causes an error that completely corrupts the page. If a cache system is in place, this allows the response containing the error to be cached, resulting in a cache poisoning that strongly impacts the availability of the application. This issue has been patched in version 7.5.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"references": [
{
"url": "https://github.com/remix-run/react-router/blob/e6c53a0130559b4a9bd47f9cf76ea5b08a69868a/packages/react-router/lib/server-runtime/server.ts#L407",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/remix-run/react-router/commit/c84302972a152d851cf5dd859ff332b354b70111",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/remix-run/react-router/security/advisories/GHSA-f46r-rw29-r322",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-43865",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-25T01:15:43.270",
"lastModified": "2025-04-25T01:15:43.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "React Router is a router for React. In versions on the 7.0 branch prior to version 7.5.2, it's possible to modify pre-rendered data by adding a header to the request. This allows to completely spoof its contents and modify all the values \u200b\u200bof the data object passed to the HTML. This issue has been patched in version 7.5.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"references": [
{
"url": "https://github.com/remix-run/react-router/blob/e6c53a0130559b4a9bd47f9cf76ea5b08a69868a/packages/react-router/lib/server-runtime/routes.ts#L87",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/remix-run/react-router/commit/c84302972a152d851cf5dd859ff332b354b70111",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/remix-run/react-router/security/advisories/GHSA-cpj6-fhp6-mr6j",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-24T23:55:19.554162+00:00
2025-04-25T02:00:19.369081+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-24T23:15:15.977000+00:00
2025-04-25T01:15:43.270000+00:00
```
### Last Data Feed Release
@ -27,33 +27,29 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-04-24T00:00:10.093071+00:00
2025-04-25T00:00:04.386722+00:00
```
### Total Number of included CVEs
```plain
291385
291389
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `4`
- [CVE-2025-1294](CVE-2025/CVE-2025-12xx/CVE-2025-1294.json) (`2025-04-24T23:15:14.720`)
- [CVE-2025-3749](CVE-2025/CVE-2025-37xx/CVE-2025-3749.json) (`2025-04-24T23:15:15.200`)
- [CVE-2025-46271](CVE-2025/CVE-2025-462xx/CVE-2025-46271.json) (`2025-04-24T23:15:15.357`)
- [CVE-2025-46272](CVE-2025/CVE-2025-462xx/CVE-2025-46272.json) (`2025-04-24T23:15:15.513`)
- [CVE-2025-46273](CVE-2025/CVE-2025-462xx/CVE-2025-46273.json) (`2025-04-24T23:15:15.673`)
- [CVE-2025-46274](CVE-2025/CVE-2025-462xx/CVE-2025-46274.json) (`2025-04-24T23:15:15.827`)
- [CVE-2025-46275](CVE-2025/CVE-2025-462xx/CVE-2025-46275.json) (`2025-04-24T23:15:15.977`)
- [CVE-2025-2185](CVE-2025/CVE-2025-21xx/CVE-2025-2185.json) (`2025-04-25T00:15:15.340`)
- [CVE-2025-3606](CVE-2025/CVE-2025-36xx/CVE-2025-3606.json) (`2025-04-25T00:15:15.807`)
- [CVE-2025-43864](CVE-2025/CVE-2025-438xx/CVE-2025-43864.json) (`2025-04-25T01:15:43.117`)
- [CVE-2025-43865](CVE-2025/CVE-2025-438xx/CVE-2025-43865.json) (`2025-04-25T01:15:43.270`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `0`
- [CVE-2024-8926](CVE-2024/CVE-2024-89xx/CVE-2024-8926.json) (`2025-04-24T22:15:14.663`)
## Download and Usage

View File

@ -280382,7 +280382,7 @@ CVE-2024-8922,0,0,84dbe21b7f577938ba370736412585c2490a3ddc6e72a6f39a9ae5e3d60518
CVE-2024-8923,0,0,48441981c92606209e58726fd8ebe6aa4293d8572dced7ca9fcd00364e9ba603,2024-11-27T19:31:56.417000
CVE-2024-8924,0,0,fa653b47436154676c3f1b541069065d978b00290a8ee89e15492973ea1ea94c,2024-11-27T19:32:01.823000
CVE-2024-8925,0,0,f8e6224c919b32dad944cbb3d7da3b4d7b30369cbcd1a2c103a12e6bb26c7138,2025-03-17T18:15:20.433000
CVE-2024-8926,0,1,fb965ebd8a92fe27f14e71c494d4747397dd6fd47d2404bcc941456ac9c9eaeb,2025-04-24T22:15:14.663000
CVE-2024-8926,0,0,fb965ebd8a92fe27f14e71c494d4747397dd6fd47d2404bcc941456ac9c9eaeb,2025-04-24T22:15:14.663000
CVE-2024-8927,0,0,aafe8ef71dfcc052ecaa8fa4a1e0007cf5cf5ad740e9765835524ef8a42eab43,2025-03-18T17:15:44.707000
CVE-2024-8929,0,0,ff6a045732aac1c81eaaf843b68c1293fe05ebd7ecf4460b6fec091ede522e48,2025-01-10T13:15:10.460000
CVE-2024-8932,0,0,c5fffc9638f172950dd3b0bc71a124092612a89bfe67c2c048ea6a2b2b43d457,2025-01-10T13:15:10.617000
@ -282264,7 +282264,7 @@ CVE-2025-1290,0,0,c9c6b4e4034fee3373a4498ecd0e4538ef34ec42c33aea19a440c94d0456b3
CVE-2025-1291,0,0,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000
CVE-2025-1292,0,0,00b41adf4c55958f36634300df4d26998df2f42f33d3060579cd81750e49fb9e,2025-04-17T20:15:27.180000
CVE-2025-1293,0,0,60a11b51b89461cf0f7c120de5ab3c93294ee5f6a5e19d6ba8d0bb06e8828d44,2025-02-20T01:15:09.950000
CVE-2025-1294,1,1,1c63642b052f7335fa0950b61e092c8a5675948576c5121c6eb42c940bbf472b,2025-04-24T23:15:14.720000
CVE-2025-1294,0,0,1c63642b052f7335fa0950b61e092c8a5675948576c5121c6eb42c940bbf472b,2025-04-24T23:15:14.720000
CVE-2025-1295,0,0,2a4bc8a9e306b7d7cae49d0fff6161acb070f2799f35d70bd6c6546c6dbde442,2025-02-27T06:15:21.990000
CVE-2025-1296,0,0,d95bfd9a7f0753e22aec4081e35e5f3d5b17ed2789c524a1845821d0907a79ad,2025-03-10T18:15:30.237000
CVE-2025-1298,0,0,46bbd0640b99e3a8c29a7cfa1112effb80548c1779a987abd8d49502f38fdf00,2025-02-18T15:15:18.007000
@ -283787,6 +283787,7 @@ CVE-2025-21846,0,0,a8c4aafa56e990c981f46d27e4cf31dd17e18aba3aa6774e9c80e1469260b
CVE-2025-21847,0,0,c5290d0f707550329c963c7bedefc01553b2c58a7ce20e595561857ab1243c53,2025-03-13T16:28:39.640000
CVE-2025-21848,0,0,90ecc1a25d7c22d7cc542aa7c0a64a482d87451bb9e957dfbeae5637fb708f88,2025-03-13T16:28:48.737000
CVE-2025-21849,0,0,2b4770f02f0a18d2a4722cf2279be3d213e0608407324d6df5d299d0295e6bb1,2025-03-13T16:29:00.400000
CVE-2025-2185,1,1,91b412b1d296ace687d40a6783e92d40fc865c9d24522642b0a45c94519a33e3,2025-04-25T00:15:15.340000
CVE-2025-21850,0,0,5a64ab06a2b6f581200ce1660927997cede0a2eabc44b30e9f55d39dacccfe4f,2025-03-13T16:29:12.770000
CVE-2025-21851,0,0,7bdca895fa921f203a0d87c612234a5ad7017395a8665ed600f55d38ca809496,2025-03-13T16:29:50.380000
CVE-2025-21852,0,0,c4adf7ded1a0df944edbc23a29fae37f72674fd1d9b49cefe98286acd387c332,2025-03-13T16:30:07.307000
@ -290871,6 +290872,7 @@ CVE-2025-35965,0,0,5032599512a77bd51cf02842d0854bae70c3e0a5ffd87935d76910ac7a556
CVE-2025-3598,0,0,edf26968210ce22617ec678e5e822a9b5bd12eb64af0b7486db98454fc1aebda,2025-04-21T14:23:45.950000
CVE-2025-3603,0,0,528b682d4291a1224b42893433697d22b911f371a51927b820eacad6e22b750e,2025-04-24T09:15:31.367000
CVE-2025-3604,0,0,baf31b0791e80504b193fa7013e2e38c60ac45c1991419d39d318c8f5b9465a1,2025-04-24T09:15:31.537000
CVE-2025-3606,1,1,4958770339244fe85adbb15a01e4f9e2cab95f3b848d93236024fef264765e4a,2025-04-25T00:15:15.807000
CVE-2025-3607,0,0,ecdbe72dea167374582b7a0b21b2763d55a028fec03c0df7dca0ae6a22873e5d,2025-04-24T09:15:31.730000
CVE-2025-3608,0,0,39b182f4ebb2561066bac4e2df270fac3ea79c341f6f5d3809c1d21f023dee46,2025-04-18T15:15:59.183000
CVE-2025-3612,0,0,b3e7e1fd46c9147c27f3feb15d1a5ba8eabce3f8bab41f1f78e6d74dff7b1b50,2025-04-15T18:39:27.967000
@ -290933,7 +290935,7 @@ CVE-2025-3736,0,0,f81598e354505c3b86cca3b6d6ac3e7d5695f2586db3773875748cfbfcdf1c
CVE-2025-3737,0,0,98a95ab2f4879b0b170253df49030361243357a0145c7fdf9d3fa9de5820ef7a,2025-04-17T20:22:16.240000
CVE-2025-3738,0,0,c83d4f2a6441d2be69ba3cb43eb59d7030deb3093e3e67d3c0e56f5cdb68cd8a,2025-04-17T20:22:16.240000
CVE-2025-3739,0,0,3ba4b773d7335861548869f23a25d3ac3371b26ca4f649a48ada76178430d177,2025-04-17T20:22:16.240000
CVE-2025-3749,1,1,dfe3d8adf0c9ae62f9e072fee9ec18ed154cfa9d1304a3fa9b38df843cdc9c16,2025-04-24T23:15:15.200000
CVE-2025-3749,0,0,dfe3d8adf0c9ae62f9e072fee9ec18ed154cfa9d1304a3fa9b38df843cdc9c16,2025-04-24T23:15:15.200000
CVE-2025-3760,0,0,36221436c9b2aad8e2661d17eeb875cdb75bc11bc6de102414da035a40dafb2c,2025-04-17T20:21:48.243000
CVE-2025-3761,0,0,29b48d6ef97bbd82b1ba2374596b164d6785c6a2f2073db12b269cee052b0c63,2025-04-24T07:15:31.437000
CVE-2025-3762,0,0,2cd33c56775b0364c0c4571374c3d034630212b70aa6400f2018cfd1493149ca,2025-04-17T20:21:05.203000
@ -291197,6 +291199,8 @@ CVE-2025-43855,0,0,4d028e3310f63e7b38c21bf23731ae08e632de948592957426a9b77ab2fde
CVE-2025-43858,0,0,be917ba81d6a4d272a488bb23a25073002401f8c107bf400145b77cd525a018b,2025-04-24T19:15:46.947000
CVE-2025-43859,0,0,7a013095b013ce1413e569741ba7a3ea7943a5c2c3b80bb4c5fde50bae191b7b,2025-04-24T19:15:47.060000
CVE-2025-43861,0,0,ababfbf43410d468d3b1cf5988fc1b1169850e57998f458994c591d91a5d40a5,2025-04-24T21:15:24.310000
CVE-2025-43864,1,1,d35200039b663ce38e5be44c2d98b816373656933116778671f27ce1e5e5fb63,2025-04-25T01:15:43.117000
CVE-2025-43865,1,1,fe3b7d3e8117adbc9d9fe73a5b54d5c41ecdb20fcc9aa86eb767a47e7d2934d0,2025-04-25T01:15:43.270000
CVE-2025-43893,0,0,ce2184c9570a27f32b1c53e1a7eb084bc072ba61bfa0569a85000898bdc56f02,2025-04-19T03:15:14.017000
CVE-2025-43894,0,0,38ad6fd8c7d98bd63b2db2d688fe0af16a117e87d6d33ebfcd5ac8fe03cfe13b,2025-04-19T03:15:14.087000
CVE-2025-43895,0,0,25a6bc942a38867782955bcdd3844f6ecfae393455eeebbf2d597ac091c02f6e,2025-04-19T03:15:14.147000
@ -291283,11 +291287,11 @@ CVE-2025-46254,0,0,bf07c3165e203be5ba443ee65f7f0d2b683b1a1e42092cc03c450122c0887
CVE-2025-46260,0,0,1bd9579628e84d29afabe0658d6f81e28f55ead4fabaf8372b63d9bc0298c851,2025-04-24T16:15:34.200000
CVE-2025-46261,0,0,210334cc42163662dd53cae4552032f706e500c73cc3eacdd4da15269385ad9c,2025-04-24T16:15:34.337000
CVE-2025-46264,0,0,a5175a32778e3e99e4b007835bdb8c6829d1f933ee6e1f42e67f40379e40b66a,2025-04-24T16:15:34.470000
CVE-2025-46271,1,1,2f803a917f8a479208c18db018b56eb5f6d799e32f98a0b24fa00cd22388fa93,2025-04-24T23:15:15.357000
CVE-2025-46272,1,1,6723f88845cee1e1cbb0cc8f1bfd044966d04b97767ef53e121be0034a68bd23,2025-04-24T23:15:15.513000
CVE-2025-46273,1,1,d17f1c243c8f331f47f487cb9b89ff51d5b9a1113a60ac7af8fce23396651144,2025-04-24T23:15:15.673000
CVE-2025-46274,1,1,6278bbb431335706a41e3628a533ceb0ce48f92d57ea7b392bf579f553e8b8c6,2025-04-24T23:15:15.827000
CVE-2025-46275,1,1,a7109528e796df3e754eeba6ee8017193e4e96b7dbaf347dc967b55909d9e9a5,2025-04-24T23:15:15.977000
CVE-2025-46271,0,0,2f803a917f8a479208c18db018b56eb5f6d799e32f98a0b24fa00cd22388fa93,2025-04-24T23:15:15.357000
CVE-2025-46272,0,0,6723f88845cee1e1cbb0cc8f1bfd044966d04b97767ef53e121be0034a68bd23,2025-04-24T23:15:15.513000
CVE-2025-46273,0,0,d17f1c243c8f331f47f487cb9b89ff51d5b9a1113a60ac7af8fce23396651144,2025-04-24T23:15:15.673000
CVE-2025-46274,0,0,6278bbb431335706a41e3628a533ceb0ce48f92d57ea7b392bf579f553e8b8c6,2025-04-24T23:15:15.827000
CVE-2025-46275,0,0,a7109528e796df3e754eeba6ee8017193e4e96b7dbaf347dc967b55909d9e9a5,2025-04-24T23:15:15.977000
CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000
CVE-2025-46375,0,0,c7cadd24d0c0ef6263c2e4f0e993c1b14e1cbac838119ad2f4f42dcfb3b1b113,2025-04-24T03:15:15.867000
CVE-2025-46376,0,0,4a4eb88dda9426fffae031e9cc4c1cb39c01ffb8fef76394b4584f59d8624ab6,2025-04-24T03:15:15.917000

Can't render this file because it is too large.