diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1337.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1337.json new file mode 100644 index 00000000000..e47d9fd6b5c --- /dev/null +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1337.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1337", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-16T11:15:08.203", + "lastModified": "2025-02-16T11:15:08.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Eastnets PaymentSafe 2.5.26.0. It has been classified as problematic. This affects an unknown part of the component BIC Search. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://drive.google.com/file/d/1uTRLoCnOGcXtSpoZO8xyPakhIO4MbCMk/view?usp=sharing", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295953", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295953", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.493686", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1338.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1338.json new file mode 100644 index 00000000000..90eb4618923 --- /dev/null +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1338.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1338", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-16T11:15:09.530", + "lastModified": "2025-02-16T11:15:09.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in NUUO Camera up to 20250203. It has been declared as critical. This vulnerability affects the function print_file of the file /handle_config.php. The manipulation of the argument log leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://pan.baidu.com/s/1YW52iM0ehUfFKa_CiTHBjQ?from=init&pwd=kqec", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295954", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295954", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.493912", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1339.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1339.json new file mode 100644 index 00000000000..53f47745200 --- /dev/null +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1339.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-1339", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-16T12:15:08.173", + "lastModified": "2025-02-16T12:15:08.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK X18 9.1.0cu.2024_B20220329. It has been rated as critical. This issue affects the function setL2tpdConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument enable leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/stevenchen0x01/CVE2/blob/main/cve1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295955", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295955", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.495367", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 7bf209f9e05..c118a745374 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-16T11:00:21.391775+00:00 +2025-02-16T13:00:19.794762+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-16T09:15:09.347000+00:00 +2025-02-16T12:15:08.173000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281477 +281480 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `3` -- [CVE-2025-1336](CVE-2025/CVE-2025-13xx/CVE-2025-1336.json) (`2025-02-16T09:15:09.347`) +- [CVE-2025-1337](CVE-2025/CVE-2025-13xx/CVE-2025-1337.json) (`2025-02-16T11:15:08.203`) +- [CVE-2025-1338](CVE-2025/CVE-2025-13xx/CVE-2025-1338.json) (`2025-02-16T11:15:09.530`) +- [CVE-2025-1339](CVE-2025/CVE-2025-13xx/CVE-2025-1339.json) (`2025-02-16T12:15:08.173`) ### CVEs modified in the last Commit -Recently modified CVEs: `3` +Recently modified CVEs: `0` -- [CVE-2024-0532](CVE-2024/CVE-2024-05xx/CVE-2024-0532.json) (`2025-02-16T09:15:07.263`) -- [CVE-2025-1115](CVE-2025/CVE-2025-11xx/CVE-2025-1115.json) (`2025-02-16T09:15:08.897`) -- [CVE-2025-1196](CVE-2025/CVE-2025-11xx/CVE-2025-1196.json) (`2025-02-16T09:15:09.073`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e4ac2eef764..86f9617858c 100644 --- a/_state.csv +++ b/_state.csv @@ -243031,7 +243031,7 @@ CVE-2024-0528,0,0,c3d7be5e3147e324e9d52e7aad31d666693dd0338290bb50ae6d8796f0665e CVE-2024-0529,0,0,d0357b578395287496288d5bd47336b6aff8f2b5dd7db0e31e26aa9d4787f1fc,2024-11-21T08:46:48.190000 CVE-2024-0530,0,0,0db10b2a9ede6fa493e286759f39f82339b01d0fbd60979f7f34b0e1c42c799e,2024-11-21T08:46:48.333000 CVE-2024-0531,0,0,78d50b09008906d370ee43f0a26e6eb041293de2a5ee78c36d22c566ea6e451e,2024-11-21T08:46:48.473000 -CVE-2024-0532,0,1,4d52123f9ecb3ea128d2503bb3205eb357516305946aa0fe6390aedb0c229890,2025-02-16T09:15:07.263000 +CVE-2024-0532,0,0,4d52123f9ecb3ea128d2503bb3205eb357516305946aa0fe6390aedb0c229890,2025-02-16T09:15:07.263000 CVE-2024-0533,0,0,28359450ced486cdfd0eac516c87e927e526517d5c7411a52999b01dcba1d448,2024-11-21T08:46:48.760000 CVE-2024-0534,0,0,d0147a8ee0182ddbdc33a9ba93d6a20b910a3ab584abc3bc57ffb886a5fc5c7e,2024-11-21T08:46:48.893000 CVE-2024-0535,0,0,8941fafeddb6849c560eb46fc17fba660adf0f1a8519aa87fac4e719cc7e3664,2024-11-21T08:46:49.030000 @@ -279181,7 +279181,7 @@ CVE-2025-1107,0,0,88a8719351346afa69c0eb84e5c94d3ac98eeae345d66ccbfb838f179b4a14 CVE-2025-1108,0,0,70b44a68f944b132ac1602e83624e59a01ee9e1d6bf1d641646c3c0fbcfd3886,2025-02-07T14:15:48.530000 CVE-2025-1113,0,0,cac5bea27dd30c10d0eb1785409700bc014da3946e77c6ad0cb2611e25e69ecf,2025-02-07T23:15:14.727000 CVE-2025-1114,0,0,08776686bb1020fc2e5b3b4601e411908ccf47316245572027365404f7e1e0d8,2025-02-10T18:15:33.877000 -CVE-2025-1115,0,1,93d9d490db8f65e6d9fe600a161957920a2ef1f3333e07357c060c69119e0510,2025-02-16T09:15:08.897000 +CVE-2025-1115,0,0,93d9d490db8f65e6d9fe600a161957920a2ef1f3333e07357c060c69119e0510,2025-02-16T09:15:08.897000 CVE-2025-1116,0,0,1900baef94df31cdc087bd9edd3d7c5b346aa1791e055e2d94009a8615107e2d,2025-02-08T12:15:39.660000 CVE-2025-1117,0,0,2322fdff6f8393d6ada2664cbf25a349bfc8c7b701fcb01c2d988bad4837c701,2025-02-08T13:15:07.843000 CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000 @@ -279237,7 +279237,7 @@ CVE-2025-1191,0,0,a9443451c80e7e8f60c9625659585c30e981d1cf45549b4cb91185c07237bb CVE-2025-1192,0,0,d1f7e39b32f8c53dde42a30e4b900bd146d3192392e3efbb1e9aa57fb4c397d2,2025-02-12T11:15:10.727000 CVE-2025-1193,0,0,27e75799b537e2de7edb54e06b6e2c56ad7e3022fd1313c3a37564f7ef341b08,2025-02-10T18:15:34.273000 CVE-2025-1195,0,0,8173ee044f7a44d277ecd5bcf18ea26c61474b7fa54bcdb4ba1d679169d475f8,2025-02-12T12:15:29.397000 -CVE-2025-1196,0,1,435397c42d4554b8303fe9acd648ea47598aadff4112f5ba7c2a02d4e91fe3eb,2025-02-16T09:15:09.073000 +CVE-2025-1196,0,0,435397c42d4554b8303fe9acd648ea47598aadff4112f5ba7c2a02d4e91fe3eb,2025-02-16T09:15:09.073000 CVE-2025-1197,0,0,a51ead443f214c0f6ef96f804505332b87f10dc50ce1367c994773610f655dcd,2025-02-12T15:15:17.670000 CVE-2025-1198,0,0,f6207b50eb6e80b33d6cce685120110cd12848ecf71b1003965e650eb121e529,2025-02-13T02:15:29.627000 CVE-2025-1199,0,0,0b2d000c300f1d87e0ba30963c3bee998d11347294a6daefb6410adbf670161a,2025-02-12T13:15:09.537000 @@ -279275,7 +279275,10 @@ CVE-2025-1298,0,0,c241b07b63fa1a12db4bf2cbddc777a3c460534a51a196b1be44ba87a34980 CVE-2025-1302,0,0,80ab185ad47640442cc52c9cc763e0a51ea23219a81264b6e3df3c8afc9e7cea,2025-02-15T05:15:11.683000 CVE-2025-1332,0,0,b482e2f3c2fe31a7c23343f351379d12ec2298734a614d40739ee811eedd1bd1,2025-02-16T01:15:20.440000 CVE-2025-1335,0,0,cca5a5aeab602daf60e1966b659a6706e108a1c270c3d12ddcea19b2340f545f,2025-02-16T04:15:23.230000 -CVE-2025-1336,1,1,1d4332a43e181efb84f487de4a15195bff051d66dfbf23e944c2a28a29d70a13,2025-02-16T09:15:09.347000 +CVE-2025-1336,0,0,1d4332a43e181efb84f487de4a15195bff051d66dfbf23e944c2a28a29d70a13,2025-02-16T09:15:09.347000 +CVE-2025-1337,1,1,3fb4fd92ce9eb4ab893d657cf4e65cb90f24441679bce73cf357765516690d6d,2025-02-16T11:15:08.203000 +CVE-2025-1338,1,1,e4858627d5b15f5a42c72ef7bfb61ece178b4c7bf6a8e3bbd9b24bc2581c61f6,2025-02-16T11:15:09.530000 +CVE-2025-1339,1,1,d4e323ee96c3c4bba4a59429c645443db325cf6db89704cebcea62b9c5f4107d,2025-02-16T12:15:08.173000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000