mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2025-04-25T02:00:19.369081+00:00
This commit is contained in:
parent
8690152ff8
commit
e97f57777b
104
CVE-2025/CVE-2025-21xx/CVE-2025-2185.json
Normal file
104
CVE-2025/CVE-2025-21xx/CVE-2025-2185.json
Normal file
@ -0,0 +1,104 @@
|
||||
{
|
||||
"id": "CVE-2025-2185",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-04-25T00:15:15.340",
|
||||
"lastModified": "2025-04-25T00:15:15.340",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ALBEDO Telecom Net.Time - PTP/NTP clock (Serial No. NBC0081P) software release 1.4.4 is vulnerable to an insufficient session expiration vulnerability, which\n could permit an attacker to transmit passwords over unencrypted \nconnections, resulting in the product becoming vulnerable to \ninterception."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.albedotelecom.com/contactus.php",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-114-02",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
104
CVE-2025/CVE-2025-36xx/CVE-2025-3606.json
Normal file
104
CVE-2025/CVE-2025-36xx/CVE-2025-3606.json
Normal file
@ -0,0 +1,104 @@
|
||||
{
|
||||
"id": "CVE-2025-3606",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-04-25T00:15:15.807",
|
||||
"lastModified": "2025-04-25T00:15:15.807",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vestel AC Charger \nversion \n\n3.75.0 contains a vulnerability that \ncould enable an attacker to access files containing sensitive \ninformation, such as credentials which could be used to further \ncompromise the device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-497"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://firebasestorage.googleapis.com/v0/b/vestel-shield.firebasestorage.app/o/PRODUCTION%2F1%2FVSA-1_R2.pdf?alt=media&token=8201f299-5014-4720-9200-f1b335736ac1",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-114-03",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-438xx/CVE-2025-43864.json
Normal file
64
CVE-2025/CVE-2025-438xx/CVE-2025-43864.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-43864",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-04-25T01:15:43.117",
|
||||
"lastModified": "2025-04-25T01:15:43.117",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "React Router is a router for React. Starting in version 7.2.0 and prior to version 7.5.2, it is possible to force an application to switch to SPA mode by adding a header to the request. If the application uses SSR and is forced to switch to SPA, this causes an error that completely corrupts the page. If a cache system is in place, this allows the response containing the error to be cached, resulting in a cache poisoning that strongly impacts the availability of the application. This issue has been patched in version 7.5.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/remix-run/react-router/blob/e6c53a0130559b4a9bd47f9cf76ea5b08a69868a/packages/react-router/lib/server-runtime/server.ts#L407",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/remix-run/react-router/commit/c84302972a152d851cf5dd859ff332b354b70111",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/remix-run/react-router/security/advisories/GHSA-f46r-rw29-r322",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-438xx/CVE-2025-43865.json
Normal file
64
CVE-2025/CVE-2025-438xx/CVE-2025-43865.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-43865",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-04-25T01:15:43.270",
|
||||
"lastModified": "2025-04-25T01:15:43.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "React Router is a router for React. In versions on the 7.0 branch prior to version 7.5.2, it's possible to modify pre-rendered data by adding a header to the request. This allows to completely spoof its contents and modify all the values \u200b\u200bof the data object passed to the HTML. This issue has been patched in version 7.5.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-345"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/remix-run/react-router/blob/e6c53a0130559b4a9bd47f9cf76ea5b08a69868a/packages/react-router/lib/server-runtime/routes.ts#L87",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/remix-run/react-router/commit/c84302972a152d851cf5dd859ff332b354b70111",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/remix-run/react-router/security/advisories/GHSA-cpj6-fhp6-mr6j",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
24
README.md
24
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-24T23:55:19.554162+00:00
|
||||
2025-04-25T02:00:19.369081+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-24T23:15:15.977000+00:00
|
||||
2025-04-25T01:15:43.270000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,33 +27,29 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2025-04-24T00:00:10.093071+00:00
|
||||
2025-04-25T00:00:04.386722+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
291385
|
||||
291389
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2025-1294](CVE-2025/CVE-2025-12xx/CVE-2025-1294.json) (`2025-04-24T23:15:14.720`)
|
||||
- [CVE-2025-3749](CVE-2025/CVE-2025-37xx/CVE-2025-3749.json) (`2025-04-24T23:15:15.200`)
|
||||
- [CVE-2025-46271](CVE-2025/CVE-2025-462xx/CVE-2025-46271.json) (`2025-04-24T23:15:15.357`)
|
||||
- [CVE-2025-46272](CVE-2025/CVE-2025-462xx/CVE-2025-46272.json) (`2025-04-24T23:15:15.513`)
|
||||
- [CVE-2025-46273](CVE-2025/CVE-2025-462xx/CVE-2025-46273.json) (`2025-04-24T23:15:15.673`)
|
||||
- [CVE-2025-46274](CVE-2025/CVE-2025-462xx/CVE-2025-46274.json) (`2025-04-24T23:15:15.827`)
|
||||
- [CVE-2025-46275](CVE-2025/CVE-2025-462xx/CVE-2025-46275.json) (`2025-04-24T23:15:15.977`)
|
||||
- [CVE-2025-2185](CVE-2025/CVE-2025-21xx/CVE-2025-2185.json) (`2025-04-25T00:15:15.340`)
|
||||
- [CVE-2025-3606](CVE-2025/CVE-2025-36xx/CVE-2025-3606.json) (`2025-04-25T00:15:15.807`)
|
||||
- [CVE-2025-43864](CVE-2025/CVE-2025-438xx/CVE-2025-43864.json) (`2025-04-25T01:15:43.117`)
|
||||
- [CVE-2025-43865](CVE-2025/CVE-2025-438xx/CVE-2025-43865.json) (`2025-04-25T01:15:43.270`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-8926](CVE-2024/CVE-2024-89xx/CVE-2024-8926.json) (`2025-04-24T22:15:14.663`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
20
_state.csv
20
_state.csv
@ -280382,7 +280382,7 @@ CVE-2024-8922,0,0,84dbe21b7f577938ba370736412585c2490a3ddc6e72a6f39a9ae5e3d60518
|
||||
CVE-2024-8923,0,0,48441981c92606209e58726fd8ebe6aa4293d8572dced7ca9fcd00364e9ba603,2024-11-27T19:31:56.417000
|
||||
CVE-2024-8924,0,0,fa653b47436154676c3f1b541069065d978b00290a8ee89e15492973ea1ea94c,2024-11-27T19:32:01.823000
|
||||
CVE-2024-8925,0,0,f8e6224c919b32dad944cbb3d7da3b4d7b30369cbcd1a2c103a12e6bb26c7138,2025-03-17T18:15:20.433000
|
||||
CVE-2024-8926,0,1,fb965ebd8a92fe27f14e71c494d4747397dd6fd47d2404bcc941456ac9c9eaeb,2025-04-24T22:15:14.663000
|
||||
CVE-2024-8926,0,0,fb965ebd8a92fe27f14e71c494d4747397dd6fd47d2404bcc941456ac9c9eaeb,2025-04-24T22:15:14.663000
|
||||
CVE-2024-8927,0,0,aafe8ef71dfcc052ecaa8fa4a1e0007cf5cf5ad740e9765835524ef8a42eab43,2025-03-18T17:15:44.707000
|
||||
CVE-2024-8929,0,0,ff6a045732aac1c81eaaf843b68c1293fe05ebd7ecf4460b6fec091ede522e48,2025-01-10T13:15:10.460000
|
||||
CVE-2024-8932,0,0,c5fffc9638f172950dd3b0bc71a124092612a89bfe67c2c048ea6a2b2b43d457,2025-01-10T13:15:10.617000
|
||||
@ -282264,7 +282264,7 @@ CVE-2025-1290,0,0,c9c6b4e4034fee3373a4498ecd0e4538ef34ec42c33aea19a440c94d0456b3
|
||||
CVE-2025-1291,0,0,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000
|
||||
CVE-2025-1292,0,0,00b41adf4c55958f36634300df4d26998df2f42f33d3060579cd81750e49fb9e,2025-04-17T20:15:27.180000
|
||||
CVE-2025-1293,0,0,60a11b51b89461cf0f7c120de5ab3c93294ee5f6a5e19d6ba8d0bb06e8828d44,2025-02-20T01:15:09.950000
|
||||
CVE-2025-1294,1,1,1c63642b052f7335fa0950b61e092c8a5675948576c5121c6eb42c940bbf472b,2025-04-24T23:15:14.720000
|
||||
CVE-2025-1294,0,0,1c63642b052f7335fa0950b61e092c8a5675948576c5121c6eb42c940bbf472b,2025-04-24T23:15:14.720000
|
||||
CVE-2025-1295,0,0,2a4bc8a9e306b7d7cae49d0fff6161acb070f2799f35d70bd6c6546c6dbde442,2025-02-27T06:15:21.990000
|
||||
CVE-2025-1296,0,0,d95bfd9a7f0753e22aec4081e35e5f3d5b17ed2789c524a1845821d0907a79ad,2025-03-10T18:15:30.237000
|
||||
CVE-2025-1298,0,0,46bbd0640b99e3a8c29a7cfa1112effb80548c1779a987abd8d49502f38fdf00,2025-02-18T15:15:18.007000
|
||||
@ -283787,6 +283787,7 @@ CVE-2025-21846,0,0,a8c4aafa56e990c981f46d27e4cf31dd17e18aba3aa6774e9c80e1469260b
|
||||
CVE-2025-21847,0,0,c5290d0f707550329c963c7bedefc01553b2c58a7ce20e595561857ab1243c53,2025-03-13T16:28:39.640000
|
||||
CVE-2025-21848,0,0,90ecc1a25d7c22d7cc542aa7c0a64a482d87451bb9e957dfbeae5637fb708f88,2025-03-13T16:28:48.737000
|
||||
CVE-2025-21849,0,0,2b4770f02f0a18d2a4722cf2279be3d213e0608407324d6df5d299d0295e6bb1,2025-03-13T16:29:00.400000
|
||||
CVE-2025-2185,1,1,91b412b1d296ace687d40a6783e92d40fc865c9d24522642b0a45c94519a33e3,2025-04-25T00:15:15.340000
|
||||
CVE-2025-21850,0,0,5a64ab06a2b6f581200ce1660927997cede0a2eabc44b30e9f55d39dacccfe4f,2025-03-13T16:29:12.770000
|
||||
CVE-2025-21851,0,0,7bdca895fa921f203a0d87c612234a5ad7017395a8665ed600f55d38ca809496,2025-03-13T16:29:50.380000
|
||||
CVE-2025-21852,0,0,c4adf7ded1a0df944edbc23a29fae37f72674fd1d9b49cefe98286acd387c332,2025-03-13T16:30:07.307000
|
||||
@ -290871,6 +290872,7 @@ CVE-2025-35965,0,0,5032599512a77bd51cf02842d0854bae70c3e0a5ffd87935d76910ac7a556
|
||||
CVE-2025-3598,0,0,edf26968210ce22617ec678e5e822a9b5bd12eb64af0b7486db98454fc1aebda,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3603,0,0,528b682d4291a1224b42893433697d22b911f371a51927b820eacad6e22b750e,2025-04-24T09:15:31.367000
|
||||
CVE-2025-3604,0,0,baf31b0791e80504b193fa7013e2e38c60ac45c1991419d39d318c8f5b9465a1,2025-04-24T09:15:31.537000
|
||||
CVE-2025-3606,1,1,4958770339244fe85adbb15a01e4f9e2cab95f3b848d93236024fef264765e4a,2025-04-25T00:15:15.807000
|
||||
CVE-2025-3607,0,0,ecdbe72dea167374582b7a0b21b2763d55a028fec03c0df7dca0ae6a22873e5d,2025-04-24T09:15:31.730000
|
||||
CVE-2025-3608,0,0,39b182f4ebb2561066bac4e2df270fac3ea79c341f6f5d3809c1d21f023dee46,2025-04-18T15:15:59.183000
|
||||
CVE-2025-3612,0,0,b3e7e1fd46c9147c27f3feb15d1a5ba8eabce3f8bab41f1f78e6d74dff7b1b50,2025-04-15T18:39:27.967000
|
||||
@ -290933,7 +290935,7 @@ CVE-2025-3736,0,0,f81598e354505c3b86cca3b6d6ac3e7d5695f2586db3773875748cfbfcdf1c
|
||||
CVE-2025-3737,0,0,98a95ab2f4879b0b170253df49030361243357a0145c7fdf9d3fa9de5820ef7a,2025-04-17T20:22:16.240000
|
||||
CVE-2025-3738,0,0,c83d4f2a6441d2be69ba3cb43eb59d7030deb3093e3e67d3c0e56f5cdb68cd8a,2025-04-17T20:22:16.240000
|
||||
CVE-2025-3739,0,0,3ba4b773d7335861548869f23a25d3ac3371b26ca4f649a48ada76178430d177,2025-04-17T20:22:16.240000
|
||||
CVE-2025-3749,1,1,dfe3d8adf0c9ae62f9e072fee9ec18ed154cfa9d1304a3fa9b38df843cdc9c16,2025-04-24T23:15:15.200000
|
||||
CVE-2025-3749,0,0,dfe3d8adf0c9ae62f9e072fee9ec18ed154cfa9d1304a3fa9b38df843cdc9c16,2025-04-24T23:15:15.200000
|
||||
CVE-2025-3760,0,0,36221436c9b2aad8e2661d17eeb875cdb75bc11bc6de102414da035a40dafb2c,2025-04-17T20:21:48.243000
|
||||
CVE-2025-3761,0,0,29b48d6ef97bbd82b1ba2374596b164d6785c6a2f2073db12b269cee052b0c63,2025-04-24T07:15:31.437000
|
||||
CVE-2025-3762,0,0,2cd33c56775b0364c0c4571374c3d034630212b70aa6400f2018cfd1493149ca,2025-04-17T20:21:05.203000
|
||||
@ -291197,6 +291199,8 @@ CVE-2025-43855,0,0,4d028e3310f63e7b38c21bf23731ae08e632de948592957426a9b77ab2fde
|
||||
CVE-2025-43858,0,0,be917ba81d6a4d272a488bb23a25073002401f8c107bf400145b77cd525a018b,2025-04-24T19:15:46.947000
|
||||
CVE-2025-43859,0,0,7a013095b013ce1413e569741ba7a3ea7943a5c2c3b80bb4c5fde50bae191b7b,2025-04-24T19:15:47.060000
|
||||
CVE-2025-43861,0,0,ababfbf43410d468d3b1cf5988fc1b1169850e57998f458994c591d91a5d40a5,2025-04-24T21:15:24.310000
|
||||
CVE-2025-43864,1,1,d35200039b663ce38e5be44c2d98b816373656933116778671f27ce1e5e5fb63,2025-04-25T01:15:43.117000
|
||||
CVE-2025-43865,1,1,fe3b7d3e8117adbc9d9fe73a5b54d5c41ecdb20fcc9aa86eb767a47e7d2934d0,2025-04-25T01:15:43.270000
|
||||
CVE-2025-43893,0,0,ce2184c9570a27f32b1c53e1a7eb084bc072ba61bfa0569a85000898bdc56f02,2025-04-19T03:15:14.017000
|
||||
CVE-2025-43894,0,0,38ad6fd8c7d98bd63b2db2d688fe0af16a117e87d6d33ebfcd5ac8fe03cfe13b,2025-04-19T03:15:14.087000
|
||||
CVE-2025-43895,0,0,25a6bc942a38867782955bcdd3844f6ecfae393455eeebbf2d597ac091c02f6e,2025-04-19T03:15:14.147000
|
||||
@ -291283,11 +291287,11 @@ CVE-2025-46254,0,0,bf07c3165e203be5ba443ee65f7f0d2b683b1a1e42092cc03c450122c0887
|
||||
CVE-2025-46260,0,0,1bd9579628e84d29afabe0658d6f81e28f55ead4fabaf8372b63d9bc0298c851,2025-04-24T16:15:34.200000
|
||||
CVE-2025-46261,0,0,210334cc42163662dd53cae4552032f706e500c73cc3eacdd4da15269385ad9c,2025-04-24T16:15:34.337000
|
||||
CVE-2025-46264,0,0,a5175a32778e3e99e4b007835bdb8c6829d1f933ee6e1f42e67f40379e40b66a,2025-04-24T16:15:34.470000
|
||||
CVE-2025-46271,1,1,2f803a917f8a479208c18db018b56eb5f6d799e32f98a0b24fa00cd22388fa93,2025-04-24T23:15:15.357000
|
||||
CVE-2025-46272,1,1,6723f88845cee1e1cbb0cc8f1bfd044966d04b97767ef53e121be0034a68bd23,2025-04-24T23:15:15.513000
|
||||
CVE-2025-46273,1,1,d17f1c243c8f331f47f487cb9b89ff51d5b9a1113a60ac7af8fce23396651144,2025-04-24T23:15:15.673000
|
||||
CVE-2025-46274,1,1,6278bbb431335706a41e3628a533ceb0ce48f92d57ea7b392bf579f553e8b8c6,2025-04-24T23:15:15.827000
|
||||
CVE-2025-46275,1,1,a7109528e796df3e754eeba6ee8017193e4e96b7dbaf347dc967b55909d9e9a5,2025-04-24T23:15:15.977000
|
||||
CVE-2025-46271,0,0,2f803a917f8a479208c18db018b56eb5f6d799e32f98a0b24fa00cd22388fa93,2025-04-24T23:15:15.357000
|
||||
CVE-2025-46272,0,0,6723f88845cee1e1cbb0cc8f1bfd044966d04b97767ef53e121be0034a68bd23,2025-04-24T23:15:15.513000
|
||||
CVE-2025-46273,0,0,d17f1c243c8f331f47f487cb9b89ff51d5b9a1113a60ac7af8fce23396651144,2025-04-24T23:15:15.673000
|
||||
CVE-2025-46274,0,0,6278bbb431335706a41e3628a533ceb0ce48f92d57ea7b392bf579f553e8b8c6,2025-04-24T23:15:15.827000
|
||||
CVE-2025-46275,0,0,a7109528e796df3e754eeba6ee8017193e4e96b7dbaf347dc967b55909d9e9a5,2025-04-24T23:15:15.977000
|
||||
CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000
|
||||
CVE-2025-46375,0,0,c7cadd24d0c0ef6263c2e4f0e993c1b14e1cbac838119ad2f4f42dcfb3b1b113,2025-04-24T03:15:15.867000
|
||||
CVE-2025-46376,0,0,4a4eb88dda9426fffae031e9cc4c1cb39c01ffb8fef76394b4584f59d8624ab6,2025-04-24T03:15:15.917000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user