diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10153.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10153.json index f3eda7cc570..3c54e905427 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10153.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10153.json @@ -2,13 +2,13 @@ "id": "CVE-2024-10153", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-19T18:15:02.437", - "lastModified": "2024-10-22T14:45:04.670", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-16T18:15:11.503", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file book-boat.php?bid=1 of the component Book a Boat Page. The manipulation of the argument nopeople leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + "value": "A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file book-boat.php?bid=1 of the component Book a Boat Page. The manipulation of the argument bookingdatefrom/nopeople leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." }, { "lang": "es", @@ -133,6 +133,10 @@ "source": "cna@vuldb.com", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-74" + }, { "lang": "en", "value": "CWE-89" diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2343.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2343.json new file mode 100644 index 00000000000..6bef48033a5 --- /dev/null +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2343.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2343", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-16T18:15:11.830", + "lastModified": "2025-03-16T18:15:11.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in IROAD Dash Cam X5 and Dash Cam X6 up to 20250308. Affected by this vulnerability is an unknown functionality of the component Device Pairing. The manipulation leads to hard-coded credentials. Access to the local network is required for this attack to succeed. The complexity of an attack is rather high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 6.8, + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.2, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + }, + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/geo-chen/IROAD#finding-3-bypassing-of-device-pairing-cwe-798-for-iroad-x-series", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299809", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299809", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.516881", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2344.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2344.json new file mode 100644 index 00000000000..de1f2f6be08 --- /dev/null +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2344.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2344", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-16T18:15:12.113", + "lastModified": "2025-03-16T18:15:12.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in IROAD Dash Cam X5 and Dash Cam X6 up to 20250308. Affected by this issue is some unknown functionality of the component API Endpoint. The manipulation leads to missing authentication. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + }, + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/geo-chen/IROAD#finding-4-remotely-dump-video-footage-and-live-video-stream", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299810", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299810", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.516882", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30066.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30066.json index c28d13ad77a..a8d5a52f146 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30066.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30066.json @@ -2,7 +2,7 @@ "id": "CVE-2025-30066", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-15T06:15:12.193", - "lastModified": "2025-03-16T05:15:10.333", + "lastModified": "2025-03-16T17:15:36.070", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -103,6 +103,18 @@ { "url": "https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised", "source": "cve@mitre.org" + }, + { + "url": "https://www.stream.security/post/github-action-supply-chain-attack-exposes-secrets-what-you-need-to-know-and-how-to-respond", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sweet.security/blog/cve-2025-30066-tj-actions-supply-chain-attack", + "source": "cve@mitre.org" + }, + { + "url": "https://www.wiz.io/blog/github-action-tj-actions-changed-files-supply-chain-attack-cve-2025-30066", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/README.md b/README.md index fb56368ac54..5390f5cb61d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-16T17:00:19.513724+00:00 +2025-03-16T19:00:19.503600+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-16T16:15:11.613000+00:00 +2025-03-16T18:15:12.113000+00:00 ``` ### Last Data Feed Release @@ -33,22 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -285350 +285352 ``` ### CVEs added in the last Commit Recently added CVEs: `2` -- [CVE-2025-2341](CVE-2025/CVE-2025-23xx/CVE-2025-2341.json) (`2025-03-16T15:15:36.523`) -- [CVE-2025-2342](CVE-2025/CVE-2025-23xx/CVE-2025-2342.json) (`2025-03-16T16:15:11.613`) +- [CVE-2025-2343](CVE-2025/CVE-2025-23xx/CVE-2025-2343.json) (`2025-03-16T18:15:11.830`) +- [CVE-2025-2344](CVE-2025/CVE-2025-23xx/CVE-2025-2344.json) (`2025-03-16T18:15:12.113`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `2` -- [CVE-2024-11879](CVE-2024/CVE-2024-118xx/CVE-2024-11879.json) (`2025-03-16T15:15:36.407`) +- [CVE-2024-10153](CVE-2024/CVE-2024-101xx/CVE-2024-10153.json) (`2025-03-16T18:15:11.503`) +- [CVE-2025-30066](CVE-2025/CVE-2025-300xx/CVE-2025-30066.json) (`2025-03-16T17:15:36.070`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d5cb06ae043..a92193aad32 100644 --- a/_state.csv +++ b/_state.csv @@ -244406,7 +244406,7 @@ CVE-2024-1015,0,0,be928180cb003f6a5eec5ab2bae4726bcad9bf29373863ff5830478d509979 CVE-2024-10150,0,0,fac5f7de9492af33015847edbbaf4e66b672db3781dc50dc161c61d03c3e187d,2024-11-05T17:47:35.353000 CVE-2024-10151,0,0,196e4fe4a8a05e0a3b22ed32baf3158e628b58ccada6bd06daf1c3495376c183,2025-01-08T16:15:33.753000 CVE-2024-10152,0,0,e70dda99748cb4f840e29333dec3d9f83e01b068635f8a9c005b3b78503424ad,2025-02-26T17:15:21.417000 -CVE-2024-10153,0,0,2f333937ac1cd6eb354355eaca9c7cf481b7802384e6fa7c27d5e638db3b56fd,2024-10-22T14:45:04.670000 +CVE-2024-10153,0,1,7bc579e7bec45689a036cc79b1aa4411e6ee6dd2be550c900171b69d6d417a94,2025-03-16T18:15:11.503000 CVE-2024-10154,0,0,881067e74e39ed69d1e96d86c551a91f65aae8723617d9113c95819b20a5b961,2024-10-22T14:44:47.807000 CVE-2024-10155,0,0,69ecac29dc7d85f6dc32fa941cb477f1015cc4923a81013963fc8d1644072128,2024-10-22T14:43:42.607000 CVE-2024-10156,0,0,ecc45f2d45ec0f80c7c71287b6cd15b59c38ac5b046533ddc094bf068a506aaf,2024-10-22T14:43:00.543000 @@ -246028,7 +246028,7 @@ CVE-2024-11875,0,0,2fce0016aa8c6a027c95eca97da341c6f52b04c99e151a803448f2d92e035 CVE-2024-11876,0,0,4d446e019fc456b762b8b387c5e79806d641107f5a6d66eca5284969e986ead6,2024-12-14T05:15:08.890000 CVE-2024-11877,0,0,ea4b234684fec63e3511addc951d161596023eb0b3e6bfea2e1878541e65dfd7,2024-12-14T05:15:09.060000 CVE-2024-11878,0,0,2e699d96d7e78c506aa9282249a36163ab9a3efeb4dbea09b924dcc97dfb0028,2024-12-20T07:15:11.577000 -CVE-2024-11879,0,1,bfc93ecdd227bdaa407f87843c48a410b29b48902694ce48754cc8caa0e47759,2025-03-16T15:15:36.407000 +CVE-2024-11879,0,0,bfc93ecdd227bdaa407f87843c48a410b29b48902694ce48754cc8caa0e47759,2025-03-16T15:15:36.407000 CVE-2024-1188,0,0,a65e9144328c7bf88ed9510065b2567c80bec907fa15019254b44a904bcf4c98,2024-11-21T08:49:59.690000 CVE-2024-11880,0,0,bc08b419001e69ecc8df6960919cacc77cc712a48473883e8526af3cf15bbb8b,2024-12-04T09:15:04.470000 CVE-2024-11881,0,0,8fa46a17561a3f64d47980cb006235813b4640fc22e06e929d7ed0d5e4fb648d,2024-12-18T03:15:26.103000 @@ -283128,7 +283128,7 @@ CVE-2025-23403,0,0,644047de2ce1ffb265b5a42cecfc2f854cd0e7552ab44d86c93242e1e0442 CVE-2025-23405,0,0,ddeb2b5db57c9fcee267274617b0df7ed66e371a7704cf175d824eede48f6b9a,2025-02-28T17:15:16.637000 CVE-2025-23406,0,0,38d5c87f4e786637cbc4fcb4a2f7006ad80927b3c7219b037e30cf1414c39e8c,2025-02-14T05:15:12.567000 CVE-2025-23409,0,0,1a3520493aa68f1dcbe322db4ee95d2acadad9f2e524f892c3f32c34d0db5297,2025-03-04T17:40:38.997000 -CVE-2025-2341,1,1,4afb60d3c86721212d82b469e9afe1e6ae512771a67149ff5180d32538982cb6,2025-03-16T15:15:36.523000 +CVE-2025-2341,0,0,4afb60d3c86721212d82b469e9afe1e6ae512771a67149ff5180d32538982cb6,2025-03-16T15:15:36.523000 CVE-2025-23410,0,0,3a80115160ef99d7b702d3a18a15cf574791aa7a10fe93b7ce15f60d58877b71,2025-03-05T00:15:38.250000 CVE-2025-23411,0,0,aac0c0506ff92f62f0126c5480be46ecee57401908d90757a18ef61467b10cfe,2025-03-04T21:18:50.307000 CVE-2025-23412,0,0,879dc1f233cd1ed0927b887a0c257bb01d6c254311c7a39c5817d5ae0b0fbc54,2025-02-05T18:15:31.580000 @@ -283138,7 +283138,7 @@ CVE-2025-23415,0,0,c2dd48094efc8e1bfacac6004cbfdb2acecbbfdd3e26439f960c8800a711b CVE-2025-23416,0,0,738b40e2665859ff1149c71c3890c183cdfa2a48dcf76c7c1a8fabc9acef88ff,2025-03-05T16:15:38.530000 CVE-2025-23418,0,0,eaa977c3712de827637fe8b26b1c9584964237077e6aebddc00a01c8a84de575,2025-03-04T17:14:49.393000 CVE-2025-23419,0,0,dcd7b3325727301465e5372f86361f511c377c0aa3f87515df8f22306063b58f,2025-02-05T20:15:45.717000 -CVE-2025-2342,1,1,452e7a05658627ee4e1370c4bd6e5430d11a60055a6f4be8f3384f0c19900b9d,2025-03-16T16:15:11.613000 +CVE-2025-2342,0,0,452e7a05658627ee4e1370c4bd6e5430d11a60055a6f4be8f3384f0c19900b9d,2025-03-16T16:15:11.613000 CVE-2025-23420,0,0,ea19881d25ade64b6c8429d514b5edebdd89c09d7db1271e5f57f9dea48d9a7f,2025-03-04T17:15:27.643000 CVE-2025-23421,0,0,e43dea6eba9dd389189f164d376c83ee3800e2f7fb6bbdb2086d590d848a63d6,2025-02-13T22:15:12.073000 CVE-2025-23422,0,0,02fa1caf24a4eabe3a7a82363ae4ebce4a671b3054c1ebfa03694d43e05e5f21,2025-01-24T11:15:09.987000 @@ -283149,6 +283149,7 @@ CVE-2025-23426,0,0,2229e7d1ff76d0c5e969c3251982ab349229fc474aaf0fa42cebd6f9eb1f7 CVE-2025-23427,0,0,1ab1fc81c6d9ecd522651b87bcc6522c6506303e1906de8f32583cb95508df8d,2025-01-24T11:15:10.140000 CVE-2025-23428,0,0,0933c655ffc4826ad6a9bae1408067074f41d57f71628a4f0c9688d55f588b8a,2025-02-14T13:15:43.160000 CVE-2025-23429,0,0,2e8256da44ff61177c4f2a5d237cc05baadd69659454e348a75499c81473e2a7,2025-01-16T20:15:34.057000 +CVE-2025-2343,1,1,d7d234853842ca610306c345c0c97d876a396e1d384c7a8aa9673f3f5e3d899c,2025-03-16T18:15:11.830000 CVE-2025-23430,0,0,d6a6f32e23dfcc5842a2f98f2cef617f4db5d83551088778a76b915d16293a79,2025-01-16T20:15:34.287000 CVE-2025-23431,0,0,7bf90ba4dc8c9a49a35700f3e925d5c3fe575a48b0411f9f0ff3561fc0ae270b,2025-02-14T13:15:43.300000 CVE-2025-23432,0,0,e754a47d3de4a683f85700167b4d6315e5e70c68f0936fe6c95c5e783cb9730f,2025-01-16T20:15:34.467000 @@ -283159,6 +283160,7 @@ CVE-2025-23436,0,0,08242c4461d18884c3a6e4bd2512fa98787dc7ff698cde97d27e848859dd0 CVE-2025-23437,0,0,d95f7248ff8befee805416d52d11dc00fce167efe31ea5ed1611d5df5e8c01b0,2025-03-03T14:15:34.890000 CVE-2025-23438,0,0,d5b99d41ae258b81c318d76badc751e3c16a7fbfb5848a85ee9570d47579e418,2025-01-16T20:15:35.067000 CVE-2025-23439,0,0,2aa0a643b351d0c05161919469d3d04499068eccb32da7f9c74f6d499f96d87c,2025-03-03T14:15:35.047000 +CVE-2025-2344,1,1,e8a4e12f83d6972b99d7d9c2dd526679506d98bd85e98da29f32d331751254ea,2025-03-16T18:15:12.113000 CVE-2025-23440,0,0,beff568a4a345f14aabca3baf637ba469d0ee24b5f969b032dde5cd35e74773a,2025-03-03T14:15:35.217000 CVE-2025-23441,0,0,fb1bd9fbb669ae04cc0d28d5b88102ee89f1552c510147295df2b7f610bbe58b,2025-03-03T14:15:35.360000 CVE-2025-23442,0,0,ff778f6541faf895ad64165d80b689e528bc89a7807a8adddefabde77d4edffa,2025-01-16T20:15:35.210000 @@ -285345,7 +285347,7 @@ CVE-2025-29996,0,0,5a028c0824c2542a10ce116c608912fe4301f96b5ba2d38f7cdf305f3c126 CVE-2025-29997,0,0,c91a3ed6edd1bd6100eee0c75a281e2a7672ecbd486c58c8341dc417d8ca6a68,2025-03-13T12:15:14.127000 CVE-2025-29998,0,0,f3a82be3b9ce90965eef31dd3d04a06fbca5fc5f31b02ac26305664f3f7de5cb,2025-03-13T12:15:14.277000 CVE-2025-30022,0,0,2bbf4fa055fd725723d405bb131a4cfd34b9f8909da4fc3e54c5f19c6cbb00ed,2025-03-14T03:15:45.257000 -CVE-2025-30066,0,0,8d686a0c09287690ddd28c186a26a65cbebd489480f1591a6fd59c8b76a7a072,2025-03-16T05:15:10.333000 +CVE-2025-30066,0,1,7479c8cc8c0a3ecad3f9b836dd8eaf82e1665db546cdc86a8c305f627bbb6f88,2025-03-16T17:15:36.070000 CVE-2025-30074,0,0,5d0dfb842ba5d24afb134fe0eb5f7e2e10f0c5619590d2c6aaa9483b4a17999a,2025-03-16T03:15:39.117000 CVE-2025-30076,0,0,73b545175c622f545b3e58f187da27cc5145bebf384c71534063285e97c9fef3,2025-03-16T03:15:39.273000 CVE-2025-30077,0,0,2db345dd70e7b66b3b6a900a65df42bbd4951033f7463cd688ce7463166f7e72,2025-03-16T03:15:39.437000