diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2185.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2185.json new file mode 100644 index 00000000000..3961c4b617b --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2185.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-2185", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-04-25T00:15:15.340", + "lastModified": "2025-04-25T00:15:15.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ALBEDO Telecom Net.Time - PTP/NTP clock (Serial No. NBC0081P) software release 1.4.4 is vulnerable to an insufficient session expiration vulnerability, which\n could permit an attacker to transmit passwords over unencrypted \nconnections, resulting in the product becoming vulnerable to \ninterception." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "references": [ + { + "url": "https://www.albedotelecom.com/contactus.php", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-114-02", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3606.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3606.json new file mode 100644 index 00000000000..63dd7e0d901 --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3606.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-3606", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-04-25T00:15:15.807", + "lastModified": "2025-04-25T00:15:15.807", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vestel AC Charger \nversion \n\n3.75.0 contains a vulnerability that \ncould enable an attacker to access files containing sensitive \ninformation, such as credentials which could be used to further \ncompromise the device." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://firebasestorage.googleapis.com/v0/b/vestel-shield.firebasestorage.app/o/PRODUCTION%2F1%2FVSA-1_R2.pdf?alt=media&token=8201f299-5014-4720-9200-f1b335736ac1", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-114-03", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-438xx/CVE-2025-43864.json b/CVE-2025/CVE-2025-438xx/CVE-2025-43864.json new file mode 100644 index 00000000000..18cc630f1b6 --- /dev/null +++ b/CVE-2025/CVE-2025-438xx/CVE-2025-43864.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-43864", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-25T01:15:43.117", + "lastModified": "2025-04-25T01:15:43.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "React Router is a router for React. Starting in version 7.2.0 and prior to version 7.5.2, it is possible to force an application to switch to SPA mode by adding a header to the request. If the application uses SSR and is forced to switch to SPA, this causes an error that completely corrupts the page. If a cache system is in place, this allows the response containing the error to be cached, resulting in a cache poisoning that strongly impacts the availability of the application. This issue has been patched in version 7.5.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/remix-run/react-router/blob/e6c53a0130559b4a9bd47f9cf76ea5b08a69868a/packages/react-router/lib/server-runtime/server.ts#L407", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/remix-run/react-router/commit/c84302972a152d851cf5dd859ff332b354b70111", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/remix-run/react-router/security/advisories/GHSA-f46r-rw29-r322", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-438xx/CVE-2025-43865.json b/CVE-2025/CVE-2025-438xx/CVE-2025-43865.json new file mode 100644 index 00000000000..6784de97bc6 --- /dev/null +++ b/CVE-2025/CVE-2025-438xx/CVE-2025-43865.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-43865", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-25T01:15:43.270", + "lastModified": "2025-04-25T01:15:43.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "React Router is a router for React. In versions on the 7.0 branch prior to version 7.5.2, it's possible to modify pre-rendered data by adding a header to the request. This allows to completely spoof its contents and modify all the values \u200b\u200bof the data object passed to the HTML. This issue has been patched in version 7.5.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/remix-run/react-router/blob/e6c53a0130559b4a9bd47f9cf76ea5b08a69868a/packages/react-router/lib/server-runtime/routes.ts#L87", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/remix-run/react-router/commit/c84302972a152d851cf5dd859ff332b354b70111", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/remix-run/react-router/security/advisories/GHSA-cpj6-fhp6-mr6j", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index a1db12e4a07..9820ad38d9e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-24T23:55:19.554162+00:00 +2025-04-25T02:00:19.369081+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-24T23:15:15.977000+00:00 +2025-04-25T01:15:43.270000+00:00 ``` ### Last Data Feed Release @@ -27,33 +27,29 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-04-24T00:00:10.093071+00:00 +2025-04-25T00:00:04.386722+00:00 ``` ### Total Number of included CVEs ```plain -291385 +291389 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `4` -- [CVE-2025-1294](CVE-2025/CVE-2025-12xx/CVE-2025-1294.json) (`2025-04-24T23:15:14.720`) -- [CVE-2025-3749](CVE-2025/CVE-2025-37xx/CVE-2025-3749.json) (`2025-04-24T23:15:15.200`) -- [CVE-2025-46271](CVE-2025/CVE-2025-462xx/CVE-2025-46271.json) (`2025-04-24T23:15:15.357`) -- [CVE-2025-46272](CVE-2025/CVE-2025-462xx/CVE-2025-46272.json) (`2025-04-24T23:15:15.513`) -- [CVE-2025-46273](CVE-2025/CVE-2025-462xx/CVE-2025-46273.json) (`2025-04-24T23:15:15.673`) -- [CVE-2025-46274](CVE-2025/CVE-2025-462xx/CVE-2025-46274.json) (`2025-04-24T23:15:15.827`) -- [CVE-2025-46275](CVE-2025/CVE-2025-462xx/CVE-2025-46275.json) (`2025-04-24T23:15:15.977`) +- [CVE-2025-2185](CVE-2025/CVE-2025-21xx/CVE-2025-2185.json) (`2025-04-25T00:15:15.340`) +- [CVE-2025-3606](CVE-2025/CVE-2025-36xx/CVE-2025-3606.json) (`2025-04-25T00:15:15.807`) +- [CVE-2025-43864](CVE-2025/CVE-2025-438xx/CVE-2025-43864.json) (`2025-04-25T01:15:43.117`) +- [CVE-2025-43865](CVE-2025/CVE-2025-438xx/CVE-2025-43865.json) (`2025-04-25T01:15:43.270`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2024-8926](CVE-2024/CVE-2024-89xx/CVE-2024-8926.json) (`2025-04-24T22:15:14.663`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 71d34a7cec5..7e06883c724 100644 --- a/_state.csv +++ b/_state.csv @@ -280382,7 +280382,7 @@ CVE-2024-8922,0,0,84dbe21b7f577938ba370736412585c2490a3ddc6e72a6f39a9ae5e3d60518 CVE-2024-8923,0,0,48441981c92606209e58726fd8ebe6aa4293d8572dced7ca9fcd00364e9ba603,2024-11-27T19:31:56.417000 CVE-2024-8924,0,0,fa653b47436154676c3f1b541069065d978b00290a8ee89e15492973ea1ea94c,2024-11-27T19:32:01.823000 CVE-2024-8925,0,0,f8e6224c919b32dad944cbb3d7da3b4d7b30369cbcd1a2c103a12e6bb26c7138,2025-03-17T18:15:20.433000 -CVE-2024-8926,0,1,fb965ebd8a92fe27f14e71c494d4747397dd6fd47d2404bcc941456ac9c9eaeb,2025-04-24T22:15:14.663000 +CVE-2024-8926,0,0,fb965ebd8a92fe27f14e71c494d4747397dd6fd47d2404bcc941456ac9c9eaeb,2025-04-24T22:15:14.663000 CVE-2024-8927,0,0,aafe8ef71dfcc052ecaa8fa4a1e0007cf5cf5ad740e9765835524ef8a42eab43,2025-03-18T17:15:44.707000 CVE-2024-8929,0,0,ff6a045732aac1c81eaaf843b68c1293fe05ebd7ecf4460b6fec091ede522e48,2025-01-10T13:15:10.460000 CVE-2024-8932,0,0,c5fffc9638f172950dd3b0bc71a124092612a89bfe67c2c048ea6a2b2b43d457,2025-01-10T13:15:10.617000 @@ -282264,7 +282264,7 @@ CVE-2025-1290,0,0,c9c6b4e4034fee3373a4498ecd0e4538ef34ec42c33aea19a440c94d0456b3 CVE-2025-1291,0,0,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000 CVE-2025-1292,0,0,00b41adf4c55958f36634300df4d26998df2f42f33d3060579cd81750e49fb9e,2025-04-17T20:15:27.180000 CVE-2025-1293,0,0,60a11b51b89461cf0f7c120de5ab3c93294ee5f6a5e19d6ba8d0bb06e8828d44,2025-02-20T01:15:09.950000 -CVE-2025-1294,1,1,1c63642b052f7335fa0950b61e092c8a5675948576c5121c6eb42c940bbf472b,2025-04-24T23:15:14.720000 +CVE-2025-1294,0,0,1c63642b052f7335fa0950b61e092c8a5675948576c5121c6eb42c940bbf472b,2025-04-24T23:15:14.720000 CVE-2025-1295,0,0,2a4bc8a9e306b7d7cae49d0fff6161acb070f2799f35d70bd6c6546c6dbde442,2025-02-27T06:15:21.990000 CVE-2025-1296,0,0,d95bfd9a7f0753e22aec4081e35e5f3d5b17ed2789c524a1845821d0907a79ad,2025-03-10T18:15:30.237000 CVE-2025-1298,0,0,46bbd0640b99e3a8c29a7cfa1112effb80548c1779a987abd8d49502f38fdf00,2025-02-18T15:15:18.007000 @@ -283787,6 +283787,7 @@ CVE-2025-21846,0,0,a8c4aafa56e990c981f46d27e4cf31dd17e18aba3aa6774e9c80e1469260b CVE-2025-21847,0,0,c5290d0f707550329c963c7bedefc01553b2c58a7ce20e595561857ab1243c53,2025-03-13T16:28:39.640000 CVE-2025-21848,0,0,90ecc1a25d7c22d7cc542aa7c0a64a482d87451bb9e957dfbeae5637fb708f88,2025-03-13T16:28:48.737000 CVE-2025-21849,0,0,2b4770f02f0a18d2a4722cf2279be3d213e0608407324d6df5d299d0295e6bb1,2025-03-13T16:29:00.400000 +CVE-2025-2185,1,1,91b412b1d296ace687d40a6783e92d40fc865c9d24522642b0a45c94519a33e3,2025-04-25T00:15:15.340000 CVE-2025-21850,0,0,5a64ab06a2b6f581200ce1660927997cede0a2eabc44b30e9f55d39dacccfe4f,2025-03-13T16:29:12.770000 CVE-2025-21851,0,0,7bdca895fa921f203a0d87c612234a5ad7017395a8665ed600f55d38ca809496,2025-03-13T16:29:50.380000 CVE-2025-21852,0,0,c4adf7ded1a0df944edbc23a29fae37f72674fd1d9b49cefe98286acd387c332,2025-03-13T16:30:07.307000 @@ -290871,6 +290872,7 @@ CVE-2025-35965,0,0,5032599512a77bd51cf02842d0854bae70c3e0a5ffd87935d76910ac7a556 CVE-2025-3598,0,0,edf26968210ce22617ec678e5e822a9b5bd12eb64af0b7486db98454fc1aebda,2025-04-21T14:23:45.950000 CVE-2025-3603,0,0,528b682d4291a1224b42893433697d22b911f371a51927b820eacad6e22b750e,2025-04-24T09:15:31.367000 CVE-2025-3604,0,0,baf31b0791e80504b193fa7013e2e38c60ac45c1991419d39d318c8f5b9465a1,2025-04-24T09:15:31.537000 +CVE-2025-3606,1,1,4958770339244fe85adbb15a01e4f9e2cab95f3b848d93236024fef264765e4a,2025-04-25T00:15:15.807000 CVE-2025-3607,0,0,ecdbe72dea167374582b7a0b21b2763d55a028fec03c0df7dca0ae6a22873e5d,2025-04-24T09:15:31.730000 CVE-2025-3608,0,0,39b182f4ebb2561066bac4e2df270fac3ea79c341f6f5d3809c1d21f023dee46,2025-04-18T15:15:59.183000 CVE-2025-3612,0,0,b3e7e1fd46c9147c27f3feb15d1a5ba8eabce3f8bab41f1f78e6d74dff7b1b50,2025-04-15T18:39:27.967000 @@ -290933,7 +290935,7 @@ CVE-2025-3736,0,0,f81598e354505c3b86cca3b6d6ac3e7d5695f2586db3773875748cfbfcdf1c CVE-2025-3737,0,0,98a95ab2f4879b0b170253df49030361243357a0145c7fdf9d3fa9de5820ef7a,2025-04-17T20:22:16.240000 CVE-2025-3738,0,0,c83d4f2a6441d2be69ba3cb43eb59d7030deb3093e3e67d3c0e56f5cdb68cd8a,2025-04-17T20:22:16.240000 CVE-2025-3739,0,0,3ba4b773d7335861548869f23a25d3ac3371b26ca4f649a48ada76178430d177,2025-04-17T20:22:16.240000 -CVE-2025-3749,1,1,dfe3d8adf0c9ae62f9e072fee9ec18ed154cfa9d1304a3fa9b38df843cdc9c16,2025-04-24T23:15:15.200000 +CVE-2025-3749,0,0,dfe3d8adf0c9ae62f9e072fee9ec18ed154cfa9d1304a3fa9b38df843cdc9c16,2025-04-24T23:15:15.200000 CVE-2025-3760,0,0,36221436c9b2aad8e2661d17eeb875cdb75bc11bc6de102414da035a40dafb2c,2025-04-17T20:21:48.243000 CVE-2025-3761,0,0,29b48d6ef97bbd82b1ba2374596b164d6785c6a2f2073db12b269cee052b0c63,2025-04-24T07:15:31.437000 CVE-2025-3762,0,0,2cd33c56775b0364c0c4571374c3d034630212b70aa6400f2018cfd1493149ca,2025-04-17T20:21:05.203000 @@ -291197,6 +291199,8 @@ CVE-2025-43855,0,0,4d028e3310f63e7b38c21bf23731ae08e632de948592957426a9b77ab2fde CVE-2025-43858,0,0,be917ba81d6a4d272a488bb23a25073002401f8c107bf400145b77cd525a018b,2025-04-24T19:15:46.947000 CVE-2025-43859,0,0,7a013095b013ce1413e569741ba7a3ea7943a5c2c3b80bb4c5fde50bae191b7b,2025-04-24T19:15:47.060000 CVE-2025-43861,0,0,ababfbf43410d468d3b1cf5988fc1b1169850e57998f458994c591d91a5d40a5,2025-04-24T21:15:24.310000 +CVE-2025-43864,1,1,d35200039b663ce38e5be44c2d98b816373656933116778671f27ce1e5e5fb63,2025-04-25T01:15:43.117000 +CVE-2025-43865,1,1,fe3b7d3e8117adbc9d9fe73a5b54d5c41ecdb20fcc9aa86eb767a47e7d2934d0,2025-04-25T01:15:43.270000 CVE-2025-43893,0,0,ce2184c9570a27f32b1c53e1a7eb084bc072ba61bfa0569a85000898bdc56f02,2025-04-19T03:15:14.017000 CVE-2025-43894,0,0,38ad6fd8c7d98bd63b2db2d688fe0af16a117e87d6d33ebfcd5ac8fe03cfe13b,2025-04-19T03:15:14.087000 CVE-2025-43895,0,0,25a6bc942a38867782955bcdd3844f6ecfae393455eeebbf2d597ac091c02f6e,2025-04-19T03:15:14.147000 @@ -291283,11 +291287,11 @@ CVE-2025-46254,0,0,bf07c3165e203be5ba443ee65f7f0d2b683b1a1e42092cc03c450122c0887 CVE-2025-46260,0,0,1bd9579628e84d29afabe0658d6f81e28f55ead4fabaf8372b63d9bc0298c851,2025-04-24T16:15:34.200000 CVE-2025-46261,0,0,210334cc42163662dd53cae4552032f706e500c73cc3eacdd4da15269385ad9c,2025-04-24T16:15:34.337000 CVE-2025-46264,0,0,a5175a32778e3e99e4b007835bdb8c6829d1f933ee6e1f42e67f40379e40b66a,2025-04-24T16:15:34.470000 -CVE-2025-46271,1,1,2f803a917f8a479208c18db018b56eb5f6d799e32f98a0b24fa00cd22388fa93,2025-04-24T23:15:15.357000 -CVE-2025-46272,1,1,6723f88845cee1e1cbb0cc8f1bfd044966d04b97767ef53e121be0034a68bd23,2025-04-24T23:15:15.513000 -CVE-2025-46273,1,1,d17f1c243c8f331f47f487cb9b89ff51d5b9a1113a60ac7af8fce23396651144,2025-04-24T23:15:15.673000 -CVE-2025-46274,1,1,6278bbb431335706a41e3628a533ceb0ce48f92d57ea7b392bf579f553e8b8c6,2025-04-24T23:15:15.827000 -CVE-2025-46275,1,1,a7109528e796df3e754eeba6ee8017193e4e96b7dbaf347dc967b55909d9e9a5,2025-04-24T23:15:15.977000 +CVE-2025-46271,0,0,2f803a917f8a479208c18db018b56eb5f6d799e32f98a0b24fa00cd22388fa93,2025-04-24T23:15:15.357000 +CVE-2025-46272,0,0,6723f88845cee1e1cbb0cc8f1bfd044966d04b97767ef53e121be0034a68bd23,2025-04-24T23:15:15.513000 +CVE-2025-46273,0,0,d17f1c243c8f331f47f487cb9b89ff51d5b9a1113a60ac7af8fce23396651144,2025-04-24T23:15:15.673000 +CVE-2025-46274,0,0,6278bbb431335706a41e3628a533ceb0ce48f92d57ea7b392bf579f553e8b8c6,2025-04-24T23:15:15.827000 +CVE-2025-46275,0,0,a7109528e796df3e754eeba6ee8017193e4e96b7dbaf347dc967b55909d9e9a5,2025-04-24T23:15:15.977000 CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000 CVE-2025-46375,0,0,c7cadd24d0c0ef6263c2e4f0e993c1b14e1cbac838119ad2f4f42dcfb3b1b113,2025-04-24T03:15:15.867000 CVE-2025-46376,0,0,4a4eb88dda9426fffae031e9cc4c1cb39c01ffb8fef76394b4584f59d8624ab6,2025-04-24T03:15:15.917000