|
|
<!DOCTYPE html> |
|
|
<html lang="en"> |
|
|
<head> |
|
|
<meta charset="UTF-8" /> |
|
|
<meta name="viewport" content="width=device-width, initial-scale=1.0" /> |
|
|
<title>CVE-KEV Snapshot — Offline Quickstart (HTML)</title> |
|
|
<style> |
|
|
body { font-family: -apple-system, BlinkMacSystemFont, Segoe UI, Roboto, Helvetica, Arial, sans-serif; margin: 24px; line-height: 1.45; } |
|
|
h1, h2, h3 { margin-top: 1.2em; } |
|
|
code, pre { background: #f6f8fa; padding: 2px 4px; border-radius: 4px; } |
|
|
table { border-collapse: collapse; width: 100%; margin: 12px 0; } |
|
|
th, td { text-align: left; border: 1px solid #e1e4e8; padding: 6px 8px; } |
|
|
th { background: #fafbfc; } |
|
|
.meta { color: #555; } |
|
|
.links a { margin-right: 12px; } |
|
|
.empty { color: #777; font-style: italic; } |
|
|
</style> |
|
|
|
|
|
</head> |
|
|
<body> |
|
|
<h1>CVE-KEV Snapshot — Offline Quickstart</h1> |
|
|
<p class="meta">Snapshot as of (UTC): <strong>2025-10-29T13:51:37Z</strong></p> |
|
|
<p class="meta">Total CVE rows: <strong>12307</strong> · Total KEV rows: <strong>28</strong></p> |
|
|
<p class="links"> |
|
|
<a href="../docs/VALIDATION.json">Validation Report</a> |
|
|
<a href="../docs/INTEGRITY.txt">Integrity Check</a> |
|
|
<a href="../docs/BUILD_MANIFEST.json">Build Manifest</a> |
|
|
</p> |
|
|
|
|
|
<h2>Accuracy at a glance</h2> |
|
|
<div><table><tbody><tr><th>cvss_v3_presence_ratio</th><td>0.760137</td></tr><tr><th>cwe_presence_ratio</th><td>0.827659</td></tr><tr><th>kev_cve_coverage_ratio_within_window</th><td>1.0</td></tr><tr><th>kev_rows_total_fetched</th><td>1451</td></tr><tr><th>kev_rows_within_window</th><td>28</td></tr><tr><th>kev_rows_filtered_out</th><td>1423</td></tr><tr><th>kev_within_window_over_global_ratio</th><td>0.019297</td></tr><tr><th>rejected_cve_count</th><td>103</td></tr><tr><th>url_shape_failures</th><td>0</td></tr><tr><th>http_head_failures_hard</th><td>744</td></tr><tr><th>http_head_failures_flaky</th><td>5487</td></tr><tr><th>dead_reference_links</th><td>6231</td></tr><tr><th>duplicate_edges_dropped</th><td>2027</td></tr></tbody></table></div> |
|
|
<p class="meta">Notes: <code>http_head_failures_hard</code> are definitive HTTP errors (4xx/5xx); <code>http_head_failures_flaky</code> are timeouts or rate limiting. <code>dead_reference_links</code> equals the sum of these categories in this snapshot.</p> |
|
|
|
|
|
<h2>Data previews</h2> |
|
|
<h3>Top KEV CVEs by CVSS (max 20)</h3> |
|
|
<div><table border="1" class="dataframe"> |
|
|
<thead> |
|
|
<tr style="text-align: right;"> |
|
|
<th>cve_id</th> |
|
|
<th>cvss_v3_score</th> |
|
|
<th>date_added</th> |
|
|
<th>notes</th> |
|
|
</tr> |
|
|
</thead> |
|
|
<tbody> |
|
|
<tr> |
|
|
<td>CVE-2025-54253</td> |
|
|
<td>10.0</td> |
|
|
<td>2025-10-15</td> |
|
|
<td>https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-54253</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-10035</td> |
|
|
<td>10.0</td> |
|
|
<td>2025-09-29</td> |
|
|
<td>https://www.fortra.com/security/advisories/product-security/fi-2025-012 ; https://nvd.nist.gov/vuln/detail/CVE-2025-10035</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-20333</td> |
|
|
<td>9.9</td> |
|
|
<td>2025-09-25</td> |
|
|
<td>CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions ; https://www.cisa.gov/eviction-strategies-tool/create-from-template ; https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks ; https://sec.cloudapps.cisco.com/security/center/private/resources/asa_ftd_continued_attacks#Details ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB ; https://nvd.nist.gov/vuln/detail/CVE-2025-20333</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-59287</td> |
|
|
<td>9.8</td> |
|
|
<td>2025-10-24</td> |
|
|
<td>https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287 ; https://nvd.nist.gov/vuln/detail/CVE-2025-59287</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-61932</td> |
|
|
<td>9.8</td> |
|
|
<td>2025-10-22</td> |
|
|
<td>https://www.motex.co.jp/news/notice/2025/release251020/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-61932</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-61882</td> |
|
|
<td>9.8</td> |
|
|
<td>2025-10-06</td> |
|
|
<td>https://www.oracle.com/security-alerts/alert-cve-2025-61882.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-61882</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-10585</td> |
|
|
<td>9.8</td> |
|
|
<td>2025-09-23</td> |
|
|
<td>https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-10585</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-57819</td> |
|
|
<td>9.8</td> |
|
|
<td>2025-08-29</td> |
|
|
<td>https://github.com/FreePBX/security-reporting/security/advisories/GHSA-m42g-xg4c-5f3h ; https://nvd.nist.gov/vuln/detail/CVE-2025-57819</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-7775</td> |
|
|
<td>9.8</td> |
|
|
<td>2025-08-26</td> |
|
|
<td>https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938 ; https://nvd.nist.gov/vuln/detail/CVE-2025-7775</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-54948</td> |
|
|
<td>9.4</td> |
|
|
<td>2025-08-18</td> |
|
|
<td>https://success.trendmicro.com/en-US/solution/KA-0020652 ; N/A ; https://nvd.nist.gov/vuln/detail/CVE-2025-54948</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-6205</td> |
|
|
<td>9.1</td> |
|
|
<td>2025-10-28</td> |
|
|
<td>https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6205 ; https://nvd.nist.gov/vuln/detail/CVE-2025-6205</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-54236</td> |
|
|
<td>9.1</td> |
|
|
<td>2025-10-24</td> |
|
|
<td>https://experienceleague.adobe.com/en/docs/experience-cloud-kcs/kbarticles/ka-27397 ; https://nvd.nist.gov/vuln/detail/CVE-2025-54236</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-53690</td> |
|
|
<td>9.0</td> |
|
|
<td>2025-09-04</td> |
|
|
<td>https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1003865 ; https://nvd.nist.gov/vuln/detail/CVE-2025-53690</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-21043</td> |
|
|
<td>8.8</td> |
|
|
<td>2025-10-02</td> |
|
|
<td>https://security.samsungmobile.com/securityUpdate.smsb?year=2025&month=09 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21043</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-48543</td> |
|
|
<td>8.8</td> |
|
|
<td>2025-09-04</td> |
|
|
<td>https://source.android.com/docs/security/bulletin/2025-09-01 ; https://nvd.nist.gov/vuln/detail/CVE-2025-48543</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-43300</td> |
|
|
<td>8.8</td> |
|
|
<td>2025-08-21</td> |
|
|
<td>https://support.apple.com/en-us/124925 ; https://support.apple.com/en-us/124926 ; https://support.apple.com/en-us/124927 ; https://support.apple.com/en-us/124928 ; https://support.apple.com/en-us/124929 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43300</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-8876</td> |
|
|
<td>8.8</td> |
|
|
<td>2025-08-13</td> |
|
|
<td>https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-8876</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-8088</td> |
|
|
<td>8.8</td> |
|
|
<td>2025-08-12</td> |
|
|
<td>https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 ; https://nvd.nist.gov/vuln/detail/CVE-2025-8088</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-6204</td> |
|
|
<td>8.0</td> |
|
|
<td>2025-10-28</td> |
|
|
<td>https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6204 ; https://nvd.nist.gov/vuln/detail/CVE-2025-6204</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-59230</td> |
|
|
<td>7.8</td> |
|
|
<td>2025-10-14</td> |
|
|
<td>https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59230 ; https://nvd.nist.gov/vuln/detail/CVE-2025-59230</td> |
|
|
</tr> |
|
|
</tbody> |
|
|
</table></div> |
|
|
|
|
|
<h3>CWE pivot (max 20)</h3> |
|
|
<div><table border="1" class="dataframe"> |
|
|
<thead> |
|
|
<tr style="text-align: right;"> |
|
|
<th>cwe</th> |
|
|
<th>cnt</th> |
|
|
</tr> |
|
|
</thead> |
|
|
<tbody> |
|
|
<tr> |
|
|
<td>CWE-79</td> |
|
|
<td>1941</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-89</td> |
|
|
<td>1179</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-74</td> |
|
|
<td>686</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-862</td> |
|
|
<td>462</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-94</td> |
|
|
<td>411</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-284</td> |
|
|
<td>348</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-352</td> |
|
|
<td>332</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-78</td> |
|
|
<td>321</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-121</td> |
|
|
<td>296</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-434</td> |
|
|
<td>276</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-22</td> |
|
|
<td>264</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-119</td> |
|
|
<td>242</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-77</td> |
|
|
<td>239</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-200</td> |
|
|
<td>229</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-416</td> |
|
|
<td>218</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-125</td> |
|
|
<td>205</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-787</td> |
|
|
<td>192</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-20</td> |
|
|
<td>171</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-502</td> |
|
|
<td>169</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CWE-918</td> |
|
|
<td>167</td> |
|
|
</tr> |
|
|
</tbody> |
|
|
</table></div> |
|
|
|
|
|
<h3>Citations for a CVE (sample)</h3> |
|
|
<div><table border="1" class="dataframe"> |
|
|
<thead> |
|
|
<tr style="text-align: right;"> |
|
|
<th>cve_id</th> |
|
|
<th>reference_url</th> |
|
|
</tr> |
|
|
</thead> |
|
|
<tbody> |
|
|
<tr> |
|
|
<td>CVE-2025-54589</td> |
|
|
<td>https://github.com/9001/copyparty/commit/a8705e611d05eeb22be5d3d7d9ab5c020fe54c62</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-54589</td> |
|
|
<td>https://github.com/9001/copyparty/releases/tag/v1.18.7</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-54589</td> |
|
|
<td>https://github.com/9001/copyparty/security/advisories/GHSA-8mx2-rjh8-q3jq</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-7738</td> |
|
|
<td>https://access.redhat.com/errata/RHSA-2025:12772</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-7738</td> |
|
|
<td>https://access.redhat.com/security/cve/CVE-2025-7738</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-7738</td> |
|
|
<td>https://bugzilla.redhat.com/show_bug.cgi?id=2381589</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-8407</td> |
|
|
<td>https://code-projects.org/</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-8407</td> |
|
|
<td>https://github.com/wllovemy/cve/issues/3</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-8407</td> |
|
|
<td>https://vuldb.com/?ctiid.318395</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-8407</td> |
|
|
<td>https://vuldb.com/?id.318395</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2025-8407</td> |
|
|
<td>https://vuldb.com/?submit.624009</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2011-10008</td> |
|
|
<td>https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/mplayer_m3u_bof.rb</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2011-10008</td> |
|
|
<td>https://www.exploit-db.com/exploits/17013</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2011-10008</td> |
|
|
<td>https://www.vulncheck.com/advisories/mplayer-lite-r33064-m3u-stack-based-buffer-overflow</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2012-10021</td> |
|
|
<td>https://forums.dlink.com/index.php?topic=51923.0</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2012-10021</td> |
|
|
<td>https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2012-10021</td> |
|
|
<td>https://web.archive.org/web/20121012062554/http://www.devttys0.com/2012/10/exploiting-a-mips-stack-overflow/</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2012-10021</td> |
|
|
<td>https://www.exploit-db.com/exploits/29127</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2012-10021</td> |
|
|
<td>https://www.vulncheck.com/advisories/dlink-dir605l-captcha-handling-stack-based-buffer-overflow</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2013-10033</td> |
|
|
<td>https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/kimai_sqli.rb</td> |
|
|
</tr> |
|
|
</tbody> |
|
|
</table></div> |
|
|
|
|
|
<h3>Provenance sample</h3> |
|
|
<div><table border="1" class="dataframe"> |
|
|
<thead> |
|
|
<tr style="text-align: right;"> |
|
|
<th>cve_id</th> |
|
|
<th>source</th> |
|
|
<th>source_url</th> |
|
|
<th>retrieved_at</th> |
|
|
<th>source_record_hash</th> |
|
|
</tr> |
|
|
</thead> |
|
|
<tbody> |
|
|
<tr> |
|
|
<td>CVE-2005-10004</td> |
|
|
<td>nvd</td> |
|
|
<td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=2000</td> |
|
|
<td>2025-10-29 06:52:01.759408-07:00</td> |
|
|
<td>2a55c362bb75b1cf2ccee02b7ac3b31a11e1e546ad68e5fc28f0cd656375de41</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2008-20001</td> |
|
|
<td>nvd</td> |
|
|
<td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=2000</td> |
|
|
<td>2025-10-29 06:52:01.759408-07:00</td> |
|
|
<td>d95f6a12b98c9caebea1c431ba26e4a8b8b77711cd94eccd7abc43a9ec39aa94</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2009-10005</td> |
|
|
<td>nvd</td> |
|
|
<td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=2000</td> |
|
|
<td>2025-10-29 06:52:01.759408-07:00</td> |
|
|
<td>a40b9fda78392a9207ebb108cfcc38f34ecca7f4028b4d98f96abbba244b48f4</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2009-10006</td> |
|
|
<td>nvd</td> |
|
|
<td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=2000</td> |
|
|
<td>2025-10-29 06:52:01.759408-07:00</td> |
|
|
<td>a06f93253a5961c5dcdfafc518d6f70b1b57faef5f20cdd9e0368f927f6e5c23</td> |
|
|
</tr> |
|
|
<tr> |
|
|
<td>CVE-2009-20002</td> |
|
|
<td>nvd</td> |
|
|
<td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=2000</td> |
|
|
<td>2025-10-29 06:52:01.759408-07:00</td> |
|
|
<td>a0293a64b504ab0094417c0feeb192786b5d5c857b944f287f28fa6ab8e28453</td> |
|
|
</tr> |
|
|
</tbody> |
|
|
</table></div> |
|
|
|
|
|
<h2>RAG configuration</h2> |
|
|
<p>model_name=BAAI/bge-small-en-v1.5, dim=384, normalize=True, metric=IP, texts_count=12335</p> |
|
|
<p class="meta">Retrieval requires the model to be present in the local cache; no downloads are attempted.</p> |
|
|
|
|
|
<h2>Limits & assumptions</h2> |
|
|
<ul> |
|
|
<li>Point-in-time snapshot; no update cadence.</li> |
|
|
<li>Upstream truth: reflects NVD (PD) and CISA KEV (CC0).</li> |
|
|
<li>KEV is filtered to the same NVD window; only KEV CVEs that are also in the NVD window are included. Edges never reference out‑of‑window CVEs.</li> |
|
|
<li>URL checks are bounded; timeouts possible.</li> |
|
|
<li>Texts for RAG are PD/CC0-only.</li> |
|
|
</ul> |
|
|
|
|
|
<h2>Links</h2> |
|
|
<ul> |
|
|
<li><a href="OVX_quickstart.ipynb">OVX_quickstart.ipynb</a></li> |
|
|
<li><a href="../parquet/">parquet/</a></li> |
|
|
<li><a href="../docs/">docs/</a></li> |
|
|
</ul> |
|
|
</body> |
|
|
</html> |
|
|
|
|
|
|
|
|
|