Auto-Update: 2025-02-28T17:00:19.921748+00:00

This commit is contained in:
cad-safe-bot 2025-02-28 17:03:48 +00:00
parent f51bf49e3e
commit 30492cf778
51 changed files with 3521 additions and 352 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24774",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-10T13:15:11.033",
"lastModified": "2024-11-21T07:48:23.573",
"lastModified": "2025-02-28T16:15:36.360",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-36046",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T23:15:36.953",
"lastModified": "2025-02-27T23:15:36.953",
"lastModified": "2025-02-28T16:15:36.987",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Infoblox NIOS through 8.6.4 executes with more privileges than required."
},
{
"lang": "es",
"value": "Informlox Nios a trav\u00e9s de 8.6.4 se ejecuta con m\u00e1s privilegios de los requeridos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.infoblox.com/s/article/000010390",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-36047",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T23:15:37.040",
"lastModified": "2025-02-27T23:15:37.040",
"lastModified": "2025-02-28T16:15:37.137",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Infoblox NIOS through 8.6.4 and 9.x through 9.0.3 has Improper Input Validation."
},
{
"lang": "es",
"value": "Informlox NIOS a trav\u00e9s de 8.6.4 y 9.x a 9.0.3 tiene una validaci\u00f3n de entrada incorrecta."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.infoblox.com/s/article/000010391",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-37566",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T23:15:37.130",
"lastModified": "2025-02-27T23:15:37.130",
"lastModified": "2025-02-28T16:15:37.287",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Infoblox NIOS through 8.6.4 has Improper Authentication for Grids."
},
{
"lang": "es",
"value": "Informlox Nios a trav\u00e9s de 8.6.4 tiene una autenticaci\u00f3n inadecuada para Grids."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.infoblox.com/s/article/000010392",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-37567",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T23:15:37.210",
"lastModified": "2025-02-27T23:15:37.210",
"lastModified": "2025-02-28T16:15:37.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Infoblox NIOS through 8.6.4 has Improper Access Control for Grids."
},
{
"lang": "es",
"value": "Informlox NIOS hasta 8.6.4 tiene un control de acceso incorrecto para Grids."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.infoblox.com/s/article/000010393",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-41334",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T21:15:36.483",
"lastModified": "2025-02-27T21:15:36.483",
"lastModified": "2025-02-28T16:15:37.587",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 were discovered to not utilize certificate verification, allowing attackers to upload crafted APPE modules from non-official servers, leading to arbitrary code execution."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que los dispositivos Draytek Vigor 165/166 anteriores a la v4.2.6, Vigor 2620/LTE200 anteriores a la v3.9.8.8, Vigor 2860/2925 anteriores a la v3.9.7, Vigor 2862/2926 anteriores a la v3.9.9.4, Vigor 2133/2762/2832 anteriores a la v3.9.8, Vigor 2135/2765/2766 anteriores a la v4.4.5.1, Vigor 2865/2866/2927 anteriores a la v4.4.5.3, Vigor 2962/3910 anteriores a la v4.3.2.7, Vigor 3912 anteriores a la v4.3.5.2 y Vigor 2925 hasta la v3.9.6 no utilizaban la verificaci\u00f3n de certificados, lo que permit\u00eda a los atacantes cargar m\u00f3dulos APPE manipulados desde servidores no oficiales, lo que lleva a la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://draytek.com",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-41338",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T21:15:36.753",
"lastModified": "2025-02-27T21:15:36.753",
"lastModified": "2025-02-28T15:15:11.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A NULL pointer dereference in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to cause a Denial of Service (DoS) via a crafted DHCP request."
},
{
"lang": "es",
"value": "Una desreferencia de puntero NULL en los dispositivos Draytek Vigor 165/166 anteriores a v4.2.6, Vigor 2620/LTE200 anteriores a v3.9.8.8, Vigor 2860/2925 anteriores a v3.9.7, Vigor 2862/2926 anteriores a v3.9.9.4, Vigor 2133/2762/2832 anteriores a v3.9.8, Vigor 2135/2765/2766 anteriores a v4.4.5.1, Vigor 2865/2866/2927 anteriores a v4.4.5.3, Vigor 2962/3910 anteriores a v4.3.2.7, Vigor 3912 anteriores a v4.3.5.2 y Vigor 2925 hasta v3.9.6 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud DHCP manipulada espec\u00edficamente."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://draytek.com",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-41339",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T21:15:36.837",
"lastModified": "2025-02-27T21:15:36.837",
"lastModified": "2025-02-28T16:15:37.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the CGI endpoint used to upload configurations in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to upload a crafted kernel module, allowing for arbitrary code execution."
},
{
"lang": "es",
"value": "Un problema en el endpoint CGI utilizado para cargar configuraciones en dispositivos Draytek Vigor 165/166 anterior a v4.2.6, Vigor 2620/LTE200 anterior a v3.9.8.8, Vigor 2860/2925 anterior a v3.9.7, Vigor 2862/2926 anterior a v3.9.9.4, Vigor 2133/2762/2832 anterior a v3.9.8, Vigor 2135/2765/2766 anterior a v4.4.5.1, Vigor 2865/2866/2927 anterior a v4.4.5.3, Vigor 2962/3910 anterior a v4.3.2.7, Vigor 3912 anterior a v4.3.5.2 y Vigor 2925 hasta v3.9.6 permite a los atacantes cargar un m\u00f3dulo de kernel manipulado espec\u00edficamente, lo que permite la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://draytek.com",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-44754",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T16:15:37.883",
"lastModified": "2025-02-28T16:15:37.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cryptographic key extraction from internal flash in Minut M2 with firmware version #15142 allows physically proximate attackers to inject modified firmware into any other Minut M2 product via USB."
}
],
"metrics": {},
"references": [
{
"url": "http://minut.com",
"source": "cve@mitre.org"
},
{
"url": "https://www.amlisoft.se/sec_20241114.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2024-53408",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T20:16:01.790",
"lastModified": "2025-02-27T20:16:01.790",
"lastModified": "2025-02-28T15:15:12.317",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AVE System Web Client v2.1.131.13992 was discovered to contain a cross-site scripting (XSS) vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que AVE System Web Client v2.1.131.13992 conten\u00eda una vulnerabilidad de cross-site scripting (XSS)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://cosmosofcyberspace.github.io/ave-system-cve.html",
"source": "cve@mitre.org"
},
{
"url": "https://cosmosofcyberspace.github.io/ave-system-cve.html",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,81 @@
"id": "CVE-2024-57026",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-24T18:15:19.023",
"lastModified": "2025-02-24T18:15:19.023",
"vulnStatus": "Received",
"lastModified": "2025-02-28T16:07:41.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TawkTo Widget Version <= 1.3.7 is vulnerable to Cross Site Scripting (XSS) due to processing user input in a way that allows JavaScript execution."
},
{
"lang": "es",
"value": " La versi\u00f3n del widget TawkTo &lt;= 1.3.7 es vulnerable a Cross Site Scripting (XSS) debido a que procesa la entrada del usuario de una manera que permite la ejecuci\u00f3n de JavaScript."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tawk:tawk.to:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.3.7",
"matchCriteriaId": "B28A9CDE-1840-44C4-8BD1-2119AA6D1489"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://cosmosofcyberspace.github.io/tawk_to_cve.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21184",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:30.180",
"lastModified": "2025-02-11T18:15:30.180",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,141 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.5487",
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.5487",
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4890",
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4890",
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.3207",
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.25398.1425",
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21184",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21188",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:30.403",
"lastModified": "2025-02-11T18:15:30.403",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,51 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:azure_network_watcher:*:*:*:*:*:azure_virtual_machine:*:*",
"versionEndExcluding": "1.4.3563.1",
"matchCriteriaId": "5870563D-82CF-4D78-8020-7FD45C747385"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21188",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21190",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:30.610",
"lastModified": "2025-02-11T18:15:30.610",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,166 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.5487",
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.5487",
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4890",
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4890",
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.3207",
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.25398.1425",
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21190",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21198",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:31.020",
"lastModified": "2025-02-11T18:15:31.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,50 @@
"value": "CWE-306"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:hpc_pack_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2016.3",
"matchCriteriaId": "E75B4ABA-9F2F-49A7-9300-F987D791AEE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:hpc_pack_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.8328.0",
"matchCriteriaId": "7A1C45BD-7ED9-4F9F-A91D-810A4CC5E662"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21198",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21200",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:31.203",
"lastModified": "2025-02-11T18:15:31.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,166 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.5487",
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.5487",
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4890",
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4890",
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.3207",
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.25398.1425",
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21200",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21201",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:31.407",
"lastModified": "2025-02-11T18:15:31.407",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,166 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.5487",
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.5487",
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4890",
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4890",
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.3207",
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.25398.1425",
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21201",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21206",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:31.610",
"lastModified": "2025-02-11T18:15:31.610",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,80 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.9.70",
"matchCriteriaId": "7148C3A7-9A70-4560-9A0C-94951B2C9B49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0",
"versionEndExcluding": "16.11.44",
"matchCriteriaId": "E672587A-4C0E-40F9-9417-0E9F91BC0361"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.8",
"versionEndExcluding": "17.8.18",
"matchCriteriaId": "6AD60982-A18A-446A-970E-212B3F351925"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.10",
"versionEndExcluding": "17.10.11",
"matchCriteriaId": "950538A7-8681-497B-BB96-A040B9989362"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.12",
"versionEndExcluding": "17.12.5",
"matchCriteriaId": "B7F01478-80E9-4E46-AD9B-CC6D095347D3"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21206",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21208",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:31.793",
"lastModified": "2025-02-11T18:15:31.793",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,100 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.3207",
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.25398.1425",
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21208",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21212",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:31.980",
"lastModified": "2025-02-11T18:15:31.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,129 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.5487",
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.5487",
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4890",
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4890",
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.3207",
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.25398.1425",
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21212",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21216",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:32.177",
"lastModified": "2025-02-11T18:15:32.177",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,129 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.5487",
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.5487",
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4890",
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4890",
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.3207",
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.25398.1425",
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21216",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21254",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:32.450",
"lastModified": "2025-02-11T18:15:32.450",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,129 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.5487",
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.5487",
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4890",
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4890",
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.3207",
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.25398.1425",
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21254",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21259",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:32.643",
"lastModified": "2025-02-11T18:15:32.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,51 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-451"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:outlook:*:*:*:*:*:android:*:*",
"versionEndExcluding": "4.2501.1",
"matchCriteriaId": "8DA759E6-2D16-4362-87BC-3FA342CC7D77"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21259",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21322",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:33.027",
"lastModified": "2025-02-11T18:15:33.027",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,51 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:pc_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.15.4.0",
"matchCriteriaId": "4CD76985-D5BF-41B9-80FF-3B3526B5B449"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21322",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21337",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:33.217",
"lastModified": "2025-02-11T18:15:33.217",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,166 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.5487",
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.5487",
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4890",
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4890",
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.3207",
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.25398.1425",
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21337",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21347",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:33.497",
"lastModified": "2025-02-11T18:15:33.497",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,151 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.5487",
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.5487",
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4890",
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4890",
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.3207",
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.25398.1425",
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21347",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21349",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:33.697",
"lastModified": "2025-02-11T18:15:33.697",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,141 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.5487",
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.5487",
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4890",
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4890",
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.3207",
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.25398.1425",
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21349",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21350",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:33.903",
"lastModified": "2025-02-11T18:15:33.903",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-28T16:02:50.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,166 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.10240.20915",
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.5487",
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.5487",
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4890",
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4890",
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7785",
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6893",
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.3207",
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.25398.1425",
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.3194",
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21350",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25323",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T16:15:39.637",
"lastModified": "2025-02-27T16:15:39.637",
"lastModified": "2025-02-28T16:15:38.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Qianjin Network Information Technology (Shanghai) Co., Ltd 51Job iOS 14.22.0 allows attackers to access sensitive user information via supplying a crafted link."
},
{
"lang": "es",
"value": "Un problema en Qianjin Network Information Technology (Shanghai) Co., Ltd 51Job iOS 14.22.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-84"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250111-51Job/250111-51Job.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250111-51Job/250111-51Job.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25324",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T16:15:39.760",
"lastModified": "2025-02-27T16:15:39.760",
"lastModified": "2025-02-28T16:15:38.307",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Shandong Provincial Big Data Center AiShanDong iOS 5.0.0 allows attackers to access sensitive user information via supplying a crafted link."
},
{
"lang": "es",
"value": "Un problema en Shandong Provincial Big Data Center AiShanDong iOS 5.0.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-84"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250111-AiShanDong/250111-AiShanDong.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250111-AiShanDong/250111-AiShanDong.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25325",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T16:15:39.870",
"lastModified": "2025-02-27T16:15:39.870",
"lastModified": "2025-02-28T16:15:38.457",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Yibin Fengguan Network Technology Co., Ltd YuPao DirectHire iOS 8.8.0 allows attackers to access sensitive user information via supplying a crafted link."
},
{
"lang": "es",
"value": "Un problema en Yibin Fengguan Network Technology Co., Ltd YuPao DirectHire iOS 8.8.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-84"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250112-YuPaoDirectHire/250112-YuPaoDirectHire.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250112-YuPaoDirectHire/250112-YuPaoDirectHire.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25326",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T16:15:39.987",
"lastModified": "2025-02-27T16:15:39.987",
"lastModified": "2025-02-28T16:15:38.603",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Merchants Union Consumer Finance Company Limited Merchants Union Finance iOS 6.19.0 allows attackers to access sensitive user information via supplying a crafted link."
},
{
"lang": "es",
"value": "Un problema en Merchants Union Consumer Finance Company Limited Merchants Union Finance iOS 6.19.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-84"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250115-MerchantsUnionFinance/250115-MerchantsUnionFinance.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250115-MerchantsUnionFinance/250115-MerchantsUnionFinance.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25329",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T17:15:16.773",
"lastModified": "2025-02-27T17:15:16.773",
"lastModified": "2025-02-28T16:15:38.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Tencent Technology (Beijing) Company Limited Tencent MicroVision iOS 8.137.0 allows attackers to access sensitive user information via supplying a crafted link."
},
{
"lang": "es",
"value": "Un problema en Tencent Technology (Beijing) Company Limited Tencent MicroVision iOS 8.137.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-84"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-TencentMicroVision/250116-TencentMicroVision.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-TencentMicroVision/250116-TencentMicroVision.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25330",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T16:15:40.103",
"lastModified": "2025-02-27T16:15:40.103",
"lastModified": "2025-02-28T16:15:38.913",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Boohee Technology Boohee Health iOS 13.0.13 allows attackers to access sensitive user information via supplying a crafted link."
},
{
"lang": "es",
"value": "Un problema en Boohee Technology Boohee Health iOS 13.0.13 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-84"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-BooheeHealth/250116-BooheeHealth.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-BooheeHealth/250116-BooheeHealth.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25331",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T16:15:40.217",
"lastModified": "2025-02-27T16:15:40.217",
"lastModified": "2025-02-28T16:15:39.067",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Beitatong Technology LianJia iOS 9.83.50 allows attackers to access sensitive user information via supplying a crafted link."
},
{
"lang": "es",
"value": "Un problema en Beitatong Technology LianJia iOS 9.83.50 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-84"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-LianJia/250116-LianJia.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-LianJia/250116-LianJia.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25334",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T16:15:40.463",
"lastModified": "2025-02-27T16:15:40.463",
"lastModified": "2025-02-28T16:15:39.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Suning Commerce Group Suning EMall iOS 9.5.198 allows attackers to access sensitive user information via supplying a crafted link."
},
{
"lang": "es",
"value": "Un problema en Suning Commerce Group Suning EMall iOS 9.5.198 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-84"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-SuningEMall/250116-SuningEMall.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-SuningEMall/250116-SuningEMall.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-25461",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T16:15:39.387",
"lastModified": "2025-02-28T16:15:39.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Stored Cross-Site Scripting (XSS) vulnerability exists in SeedDMS 6.0.29. A user or rogue admin with the \"Add Category\" permission can inject a malicious XSS payload into the category name field. When a document is subsequently associated with this category, the payload is stored on the server and rendered without proper sanitization or output encoding. This results in the XSS payload executing in the browser of any user who views the document."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/RoNiXxCybSeC0101/CVE-2025-25461",
"source": "cve@mitre.org"
},
{
"url": "https://www.seeddms.org/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/RoNiXxCybSeC0101/CVE-2025-25461",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-25477",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T00:15:36.380",
"lastModified": "2025-02-28T00:15:36.380",
"lastModified": "2025-02-28T16:15:39.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A host header injection vulnerability in SysPass 3.2x allows an attacker to load malicious JS files from an arbitrary domain which would be executed in the victim's browser."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"references": [
{
"url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2025-25477",

View File

@ -2,20 +2,81 @@
"id": "CVE-2025-25513",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-24T22:15:22.807",
"lastModified": "2025-02-24T22:15:22.807",
"vulnStatus": "Received",
"lastModified": "2025-02-28T16:07:41.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Seacms <=13.3 is vulnerable to SQL Injection in admin_members.php."
},
{
"lang": "es",
"value": " Seacms &lt;=13.3 es vulnerable a la inyecci\u00f3n SQL en admin_members.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seacms:seacms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "13.3",
"matchCriteriaId": "C75904E7-D260-47F7-9D21-2751E901FA86"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Colorado-all/cve/blob/main/seacms/seacms%20V13.3-sql-1.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-25729",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T00:15:36.827",
"lastModified": "2025-02-28T00:15:36.827",
"lastModified": "2025-02-28T16:15:39.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An information disclosure vulnerability in Bosscomm IF740 Firmware versions:11001.7078 & v11001.0000 and System versions: 6.25 & 6.00 allows attackers to obtain hardcoded cleartext credentials via the update or boot process."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://gainsec.com/2025/02/27/cve-2025-25727cve-2025-25728cve-2025-25729-multiple-vulnerabilities-found-in-bosscomm-obd2-tablet/",

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-25916",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T15:15:13.613",
"lastModified": "2025-02-28T16:15:39.867",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "wuzhicms v4.1.0 has a Cross Site Scripting (XSS) vulnerability in del function in \\coreframe\\app\\member\\admin\\group.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/A7cc/e28b5790d8b40df8d418d1bd15c25d12",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/wuzhicms/wuzhicms/issues/213",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/wuzhicms/wuzhicms/issues/213",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-26047",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T16:15:40.020",
"lastModified": "2025-02-28T16:15:40.020",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Loggrove v1.0 is vulnerable to SQL Injection in the read.py file."
}
],
"metrics": {},
"references": [
{
"url": "https://gitee.com/olajowon/loggrove/issues/IBJXG8",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-26263",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T16:15:40.127",
"lastModified": "2025-02-28T16:15:40.127",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less, is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DRAGOWN/CVE-2025-26263",
"source": "cve@mitre.org"
},
{
"url": "https://www.geovision.com.tw/download/product/GV-ASManager",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-26326",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T15:15:13.743",
"lastModified": "2025-02-28T15:15:13.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the remote connection complements of the NVDA (Nonvisual Desktop Access) 2024.4.1 and 2024.4.2 was identified, which allows an attacker to obtain total control of the remote system when guessing a weak password. The problem occurs because the complements accept any password typed by the user and do not have an additional authentication or checking mechanism by the computer that will be accessed. Tests indicate that over 1,000 systems use easy to guess passwords, many with less than 4 to 6 characters, including common sequences. This enables brute strength or attempt and error attacks on the part of malicious invaders. Vulnerability can be explored by a remote striker who knows or can guess the password used in the connection. As a result, the invader gets complete access to the affected system and can run commands, modify files and compromise user security."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/azurejoga/CVE-2025-26326",
"source": "cve@mitre.org"
},
{
"url": "https://www.nvaccess.org",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-27133",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-24T19:15:14.763",
"lastModified": "2025-02-24T19:15:14.763",
"vulnStatus": "Received",
"lastModified": "2025-02-28T16:07:41.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was discovered in the WeGIA application prior to version 3.2.15 at the `adicionar_tipo_exame.php` endpoint. This vulnerability allows an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.2.15 contains a patch for the issue."
},
{
"lang": "es",
"value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en la aplicaci\u00f3n WeGIA anterior a la versi\u00f3n 3.2.15 en el endpoint `adicionar_tipo_exame.php`. Esta vulnerabilidad permite a un atacante autorizado ejecutar consultas SQL arbitrarias, lo que permite el acceso a informaci\u00f3n confidencial. La versi\u00f3n 3.2.15 contiene un parche para el problema."
}
],
"metrics": {
@ -26,35 +30,57 @@
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
@ -69,14 +95,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2.15",
"matchCriteriaId": "4033D4E0-87CC-418C-BBA1-C63CF2C4F09C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/619ead748e18e685459c6dc3c226e621b9ff5403",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xj79-w799-qjcp",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-27140",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-24T22:15:22.913",
"lastModified": "2025-02-24T22:15:22.913",
"vulnStatus": "Received",
"lastModified": "2025-02-28T16:07:41.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a Web manager for charitable institutions. An OS Command Injection vulnerability was discovered in versions prior to 3.2.15 of the WeGIA application, `importar_dump.php` endpoint. This vulnerability could allow an attacker to execute arbitrary code remotely. The command is basically a command to move a temporary file, so a webshell upload is also possible. Version 3.2.15 contains a patch for the issue."
},
{
"lang": "es",
"value": " WeGIA es un gestor web para instituciones ben\u00e9ficas. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de comandos en el sistema operativo en versiones anteriores a la 3.2.15 de la aplicaci\u00f3n WeGIA, endpoint `importar_dump.php`. Esta vulnerabilidad podr\u00eda permitir a un atacante ejecutar c\u00f3digo arbitrario de forma remota. El comando es b\u00e1sicamente un comando para mover un archivo temporal, por lo que tambi\u00e9n es posible una carga mediante webshell. La versi\u00f3n 3.2.15 contiene un parche para el problema."
}
],
"metrics": {
@ -26,35 +30,57 @@
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
@ -71,16 +97,51 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2.15",
"matchCriteriaId": "4033D4E0-87CC-418C-BBA1-C63CF2C4F09C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/7d0df8c9a0b8b7d6862bbc23dc729d73e39672a1",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xw6w-x28r-2p5c",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-27141",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-24T22:15:23.077",
"lastModified": "2025-02-24T22:15:23.077",
"vulnStatus": "Received",
"lastModified": "2025-02-28T16:07:41.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Metabase Enterprise Edition is the enterprise version of Metabase business intelligence and data analytics software. Starting in version 1.47.0 and prior to versions 1.50.36, 1.51.14, 1.52.11, and 1.53.2 of Metabase Enterprise Edition, users with impersonation permissions may be able to see results of cached questions, even if their permissions don\u2019t allow them to see the data. If some user runs a question which gets cached, and then an impersonated user runs that question, then the impersonated user sees the same results as the previous user. These cached results may include data the impersonated user should not have access to. This vulnerability only impacts the Enterprise Edition of Metabase and not the Open Source Edition. Versions 1.53.2, 1.52.11, 1.51.14, and 1.50.36 contains a patch. Versions on the 1.49.X, 1.48.X, and 1.47.X branches are vulnerable but do not have a patch available, so users should upgrade to a major version with an available fix. Disabling question caching is a workaround for this issue."
},
{
"lang": "es",
"value": "Metabase Enterprise Edition es la versi\u00f3n empresarial del software de inteligencia empresarial y an\u00e1lisis de datos Metabase. A partir de la versi\u00f3n 1.47.0 y anteriores a las versiones 1.50.36, 1.51.14, 1.52.11 y 1.53.2 de Metabase Enterprise Edition, los usuarios con permisos de suplantaci\u00f3n de identidad pueden ver los resultados de las preguntas almacenadas en cach\u00e9, incluso si sus permisos no les permiten ver los datos. Si alg\u00fan usuario ejecuta una pregunta que se almacena en cach\u00e9 y luego un usuario suplantado ejecuta esa pregunta, el usuario suplantado ve los mismos resultados que el usuario anterior. Estos resultados almacenados en cach\u00e9 pueden incluir datos a los que el usuario suplantado no deber\u00eda tener acceso. Esta vulnerabilidad solo afecta a la Enterprise Edition de Metabase y no a la Open Source Edition. Las versiones 1.53.2, 1.52.11, 1.51.14 y 1.50.36 contienen un parche. Las versiones de las ramas 1.49.X, 1.48.X y 1.47.X son vulnerables, pero no tienen un parche disponible, por lo que los usuarios deben actualizar a una versi\u00f3n principal con una soluci\u00f3n disponible. Deshabilitar el almacenamiento en cach\u00e9 de preguntas es un workaround para este problema."
}
],
"metrics": {
@ -26,35 +30,57 @@
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
@ -69,18 +95,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "1.47.0",
"versionEndExcluding": "1.50.36",
"matchCriteriaId": "AACC8509-72A6-4D34-834D-2E28DEE43E3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "1.51.0",
"versionEndExcluding": "1.51.14",
"matchCriteriaId": "838875F9-C45A-4610-9D27-476B440862C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "1.52.0",
"versionEndExcluding": "1.52.11",
"matchCriteriaId": "CAF5BC90-DC75-40EA-9ACA-EECB3E56EAD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "1.53.0",
"versionEndExcluding": "1.53.2",
"matchCriteriaId": "F93B3622-0521-479F-817F-378FA03854AA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/metabase/metabase/security/advisories/GHSA-6cc4-h534-xh5p",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.metabase.com/docs/latest/configuring-metabase/caching",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Technical Description"
]
},
{
"url": "https://www.metabase.com/docs/latest/permissions/impersonation",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Technical Description"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-27143",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-24T23:15:11.160",
"lastModified": "2025-02-24T23:15:11.160",
"vulnStatus": "Received",
"lastModified": "2025-02-28T16:07:41.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Better Auth is an authentication and authorization library for TypeScript. Prior to version 1.1.21, the application is vulnerable to an open redirect due to improper validation of the callbackURL parameter in the email verification endpoint and any other endpoint that accepts callback url. While the server blocks fully qualified URLs, it incorrectly allows scheme-less URLs. This results in the browser interpreting the URL as a fully qualified URL, leading to unintended redirection. An attacker can exploit this flaw by crafting a malicious verification link and tricking users into clicking it. Upon successful email verification, the user will be automatically redirected to the attacker's website, which can be used for phishing, malware distribution, or stealing sensitive authentication tokens. This CVE is a bypass of the fix for GHSA-8jhw-6pjj-8723/CVE-2024-56734. Version 1.1.21 contains an updated patch."
},
{
"lang": "es",
"value": "Better Auth es una librer\u00eda de autenticaci\u00f3n y autorizaci\u00f3n para TypeScript. Antes de la versi\u00f3n 1.1.21, la aplicaci\u00f3n era vulnerable a una redirecci\u00f3n abierta debido a una validaci\u00f3n incorrecta del par\u00e1metro callbackURL en el endpoint de verificaci\u00f3n de correo electr\u00f3nico y cualquier otro endpoint que acepte una URL de devoluci\u00f3n de llamada. Si bien el servidor bloquea las URL completamente calificadas, permite incorrectamente las URL sin esquema. Esto hace que el navegador interprete la URL como una URL completamente calificada, lo que genera una redirecci\u00f3n no deseada. Un atacante puede explotar este fallo creando un enlace de verificaci\u00f3n malicioso y enga\u00f1ando a los usuarios para que hagan clic en \u00e9l. Tras una verificaci\u00f3n de correo electr\u00f3nico exitosa, el usuario ser\u00e1 redirigido autom\u00e1ticamente al sitio web del atacante, que puede usarse para suplantaci\u00f3n de identidad, distribuci\u00f3n de malware o robo de tokens de autenticaci\u00f3n confidenciales. Esta CVE es una omisi\u00f3n de la correcci\u00f3n para GHSA-8jhw-6pjj-8723/CVE-2024-56734. La versi\u00f3n 1.1.21 contiene un parche actualizado."
}
],
"metrics": {
@ -26,35 +30,57 @@
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
@ -69,26 +95,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:better-auth:better_auth:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "1.1.21",
"matchCriteriaId": "31BED966-390F-4645-B4C8-DD62F07542B4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/better-auth/better-auth/commit/24659aefc35a536b95ea4e5347e52c8803910153",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/better-auth/better-auth/commit/b381cac7aafd6aa53ef78b6ab771ebfa24643c80",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/better-auth/better-auth/releases/tag/v1.1.21",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/better-auth/better-auth/security/advisories/GHSA-8jhw-6pjj-8723",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Not Applicable"
]
},
{
"url": "https://github.com/better-auth/better-auth/security/advisories/GHSA-hjpm-7mrm-26w8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,98 @@
{
"id": "CVE-2025-27400",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-28T16:15:40.237",
"lastModified": "2025-02-28T16:15:40.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Versions prior to 20.12.3 and 20.13.1 contain a vulnerability that allows script execution in the admin panel which could lead to cross-site scripting against authenticated admin users. The attack requires an admin user with configuration access, so in practicality it is not very likely to be useful given that a user with this level of access is probably already a full admin. Versions 20.12.3 and 20.13.1 contain a patch for the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L",
"baseScore": 2.9,
"baseSeverity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.4,
"impactScore": 2.5
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L",
"baseScore": 2.9,
"baseSeverity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.4,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/OpenMage/magento-lts/commit/d307e5bf75729a2347dde0952fe9fd9fcd9c6aea",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.12.3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.13.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5pxh-89cx-4668",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-28T15:00:20.043026+00:00
2025-02-28T17:00:19.921748+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-28T14:53:55.297000+00:00
2025-02-28T16:15:40.237000+00:00
```
### Last Data Feed Release
@ -33,56 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
283514
283521
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `7`
- [CVE-2025-1300](CVE-2025/CVE-2025-13xx/CVE-2025-1300.json) (`2025-02-28T13:15:27.043`)
- [CVE-2025-1319](CVE-2025/CVE-2025-13xx/CVE-2025-1319.json) (`2025-02-28T13:15:27.267`)
- [CVE-2025-1746](CVE-2025/CVE-2025-17xx/CVE-2025-1746.json) (`2025-02-28T14:15:34.943`)
- [CVE-2025-1747](CVE-2025/CVE-2025-17xx/CVE-2025-1747.json) (`2025-02-28T14:15:35.480`)
- [CVE-2025-1748](CVE-2025/CVE-2025-17xx/CVE-2025-1748.json) (`2025-02-28T14:15:35.617`)
- [CVE-2025-1749](CVE-2025/CVE-2025-17xx/CVE-2025-1749.json) (`2025-02-28T14:15:35.760`)
- [CVE-2025-1776](CVE-2025/CVE-2025-17xx/CVE-2025-1776.json) (`2025-02-28T14:15:35.943`)
- [CVE-2025-22270](CVE-2025/CVE-2025-222xx/CVE-2025-22270.json) (`2025-02-28T13:15:27.447`)
- [CVE-2025-22271](CVE-2025/CVE-2025-222xx/CVE-2025-22271.json) (`2025-02-28T13:15:27.630`)
- [CVE-2025-22272](CVE-2025/CVE-2025-222xx/CVE-2025-22272.json) (`2025-02-28T13:15:27.770`)
- [CVE-2025-22273](CVE-2025/CVE-2025-222xx/CVE-2025-22273.json) (`2025-02-28T13:15:27.927`)
- [CVE-2025-22274](CVE-2025/CVE-2025-222xx/CVE-2025-22274.json) (`2025-02-28T13:15:28.067`)
- [CVE-2024-44754](CVE-2024/CVE-2024-447xx/CVE-2024-44754.json) (`2025-02-28T16:15:37.883`)
- [CVE-2025-25461](CVE-2025/CVE-2025-254xx/CVE-2025-25461.json) (`2025-02-28T16:15:39.387`)
- [CVE-2025-25916](CVE-2025/CVE-2025-259xx/CVE-2025-25916.json) (`2025-02-28T15:15:13.613`)
- [CVE-2025-26047](CVE-2025/CVE-2025-260xx/CVE-2025-26047.json) (`2025-02-28T16:15:40.020`)
- [CVE-2025-26263](CVE-2025/CVE-2025-262xx/CVE-2025-26263.json) (`2025-02-28T16:15:40.127`)
- [CVE-2025-26326](CVE-2025/CVE-2025-263xx/CVE-2025-26326.json) (`2025-02-28T15:15:13.743`)
- [CVE-2025-27400](CVE-2025/CVE-2025-274xx/CVE-2025-27400.json) (`2025-02-28T16:15:40.237`)
### CVEs modified in the last Commit
Recently modified CVEs: `52`
Recently modified CVEs: `42`
- [CVE-2021-3929](CVE-2021/CVE-2021-39xx/CVE-2021-3929.json) (`2025-02-28T13:15:25.913`)
- [CVE-2022-22587](CVE-2022/CVE-2022-225xx/CVE-2022-22587.json) (`2025-02-28T14:53:55.297`)
- [CVE-2022-22620](CVE-2022/CVE-2022-226xx/CVE-2022-22620.json) (`2025-02-28T14:44:48.713`)
- [CVE-2022-22674](CVE-2022/CVE-2022-226xx/CVE-2022-22674.json) (`2025-02-28T14:53:55.297`)
- [CVE-2022-32893](CVE-2022/CVE-2022-328xx/CVE-2022-32893.json) (`2025-02-28T14:53:55.297`)
- [CVE-2022-32894](CVE-2022/CVE-2022-328xx/CVE-2022-32894.json) (`2025-02-28T14:53:55.297`)
- [CVE-2022-32917](CVE-2022/CVE-2022-329xx/CVE-2022-32917.json) (`2025-02-28T14:53:55.297`)
- [CVE-2022-42856](CVE-2022/CVE-2022-428xx/CVE-2022-42856.json) (`2025-02-28T14:44:48.713`)
- [CVE-2023-23529](CVE-2023/CVE-2023-235xx/CVE-2023-23529.json) (`2025-02-28T14:53:55.297`)
- [CVE-2023-28206](CVE-2023/CVE-2023-282xx/CVE-2023-28206.json) (`2025-02-28T14:53:55.297`)
- [CVE-2023-32373](CVE-2023/CVE-2023-323xx/CVE-2023-32373.json) (`2025-02-28T14:53:55.297`)
- [CVE-2023-34188](CVE-2023/CVE-2023-341xx/CVE-2023-34188.json) (`2025-02-28T13:15:26.103`)
- [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2025-02-28T14:53:55.297`)
- [CVE-2024-26306](CVE-2024/CVE-2024-263xx/CVE-2024-26306.json) (`2025-02-28T13:15:26.423`)
- [CVE-2024-36259](CVE-2024/CVE-2024-362xx/CVE-2024-36259.json) (`2025-02-28T13:35:22.340`)
- [CVE-2024-40896](CVE-2024/CVE-2024-408xx/CVE-2024-40896.json) (`2025-02-28T13:15:26.640`)
- [CVE-2025-0395](CVE-2025/CVE-2025-03xx/CVE-2025-0395.json) (`2025-02-28T13:15:26.860`)
- [CVE-2025-23046](CVE-2025/CVE-2025-230xx/CVE-2025-23046.json) (`2025-02-28T13:35:22.340`)
- [CVE-2025-23083](CVE-2025/CVE-2025-230xx/CVE-2025-23083.json) (`2025-02-28T13:15:28.213`)
- [CVE-2025-24085](CVE-2025/CVE-2025-240xx/CVE-2025-24085.json) (`2025-02-28T14:44:48.713`)
- [CVE-2025-25192](CVE-2025/CVE-2025-251xx/CVE-2025-25192.json) (`2025-02-28T13:35:22.340`)
- [CVE-2025-26465](CVE-2025/CVE-2025-264xx/CVE-2025-26465.json) (`2025-02-28T13:15:28.343`)
- [CVE-2025-27110](CVE-2025/CVE-2025-271xx/CVE-2025-27110.json) (`2025-02-28T13:35:22.340`)
- [CVE-2025-27139](CVE-2025/CVE-2025-271xx/CVE-2025-27139.json) (`2025-02-28T13:35:22.340`)
- [CVE-2025-27142](CVE-2025/CVE-2025-271xx/CVE-2025-27142.json) (`2025-02-28T13:35:22.340`)
- [CVE-2025-21208](CVE-2025/CVE-2025-212xx/CVE-2025-21208.json) (`2025-02-28T16:02:50.353`)
- [CVE-2025-21212](CVE-2025/CVE-2025-212xx/CVE-2025-21212.json) (`2025-02-28T16:02:50.353`)
- [CVE-2025-21216](CVE-2025/CVE-2025-212xx/CVE-2025-21216.json) (`2025-02-28T16:02:50.353`)
- [CVE-2025-21254](CVE-2025/CVE-2025-212xx/CVE-2025-21254.json) (`2025-02-28T16:02:50.353`)
- [CVE-2025-21259](CVE-2025/CVE-2025-212xx/CVE-2025-21259.json) (`2025-02-28T16:02:50.353`)
- [CVE-2025-21322](CVE-2025/CVE-2025-213xx/CVE-2025-21322.json) (`2025-02-28T16:02:50.353`)
- [CVE-2025-21337](CVE-2025/CVE-2025-213xx/CVE-2025-21337.json) (`2025-02-28T16:02:50.353`)
- [CVE-2025-21347](CVE-2025/CVE-2025-213xx/CVE-2025-21347.json) (`2025-02-28T16:02:50.353`)
- [CVE-2025-21349](CVE-2025/CVE-2025-213xx/CVE-2025-21349.json) (`2025-02-28T16:02:50.353`)
- [CVE-2025-21350](CVE-2025/CVE-2025-213xx/CVE-2025-21350.json) (`2025-02-28T16:02:50.353`)
- [CVE-2025-25323](CVE-2025/CVE-2025-253xx/CVE-2025-25323.json) (`2025-02-28T16:15:38.153`)
- [CVE-2025-25324](CVE-2025/CVE-2025-253xx/CVE-2025-25324.json) (`2025-02-28T16:15:38.307`)
- [CVE-2025-25325](CVE-2025/CVE-2025-253xx/CVE-2025-25325.json) (`2025-02-28T16:15:38.457`)
- [CVE-2025-25326](CVE-2025/CVE-2025-253xx/CVE-2025-25326.json) (`2025-02-28T16:15:38.603`)
- [CVE-2025-25329](CVE-2025/CVE-2025-253xx/CVE-2025-25329.json) (`2025-02-28T16:15:38.760`)
- [CVE-2025-25330](CVE-2025/CVE-2025-253xx/CVE-2025-25330.json) (`2025-02-28T16:15:38.913`)
- [CVE-2025-25331](CVE-2025/CVE-2025-253xx/CVE-2025-25331.json) (`2025-02-28T16:15:39.067`)
- [CVE-2025-25334](CVE-2025/CVE-2025-253xx/CVE-2025-25334.json) (`2025-02-28T16:15:39.220`)
- [CVE-2025-25477](CVE-2025/CVE-2025-254xx/CVE-2025-25477.json) (`2025-02-28T16:15:39.550`)
- [CVE-2025-25513](CVE-2025/CVE-2025-255xx/CVE-2025-25513.json) (`2025-02-28T16:07:41.847`)
- [CVE-2025-25729](CVE-2025/CVE-2025-257xx/CVE-2025-25729.json) (`2025-02-28T16:15:39.707`)
- [CVE-2025-27133](CVE-2025/CVE-2025-271xx/CVE-2025-27133.json) (`2025-02-28T16:07:41.847`)
- [CVE-2025-27140](CVE-2025/CVE-2025-271xx/CVE-2025-27140.json) (`2025-02-28T16:07:41.847`)
- [CVE-2025-27141](CVE-2025/CVE-2025-271xx/CVE-2025-27141.json) (`2025-02-28T16:07:41.847`)
- [CVE-2025-27143](CVE-2025/CVE-2025-271xx/CVE-2025-27143.json) (`2025-02-28T16:07:41.847`)
## Download and Usage

View File

@ -87889,8 +87889,8 @@ CVE-2016-4652,0,0,743b4e077d1600bf8aaea43c6730d83c83cdf30b8c52a624555f460f8e9989
CVE-2016-4653,0,0,d894561ed26d3c592147a1313b1920ac20102bdee2962e3accda329b1da3b733,2024-11-21T02:52:42.343000
CVE-2016-4654,0,0,74af2c171ca29b607036a19152933e201bbd895eb1ffcae27d358251dc54de64,2024-11-21T02:52:42.490000
CVE-2016-4655,0,0,f3b2e2852359ec879f695defe2b724c840abee2b548d4c99ea49aea75b4f9d75,2025-02-04T21:03:31.853000
CVE-2016-4656,0,1,311680fe0bb8cd88c66a9ead4a59631b992b995dd27bde0e785b2153f57c5d72,2025-02-28T14:53:55.297000
CVE-2016-4657,0,1,f9e7d8d08b3ff494867f78b57ecd0bfe788b1cac1fecbc625ad44ea7cb25e45d,2025-02-28T14:44:48.713000
CVE-2016-4656,0,0,311680fe0bb8cd88c66a9ead4a59631b992b995dd27bde0e785b2153f57c5d72,2025-02-28T14:53:55.297000
CVE-2016-4657,0,0,f9e7d8d08b3ff494867f78b57ecd0bfe788b1cac1fecbc625ad44ea7cb25e45d,2025-02-28T14:44:48.713000
CVE-2016-4658,0,0,075d3f82167218a13fe5a4cbb749a67c510179ede31fc77656bd872b094e7c8c,2024-11-21T02:52:43.043000
CVE-2016-4659,0,0,24e16ca19628f69d9a5abdf267f119d264b31393a70db6d894d0d0cf653fe29f,2023-11-07T02:32:42.950000
CVE-2016-4660,0,0,537ac03788d6e6fda7aeabd3bac1e8e212429a779adefa296b409ec2fbc15d68,2024-11-21T02:52:43.220000
@ -122903,7 +122903,7 @@ CVE-2018-4340,0,0,b43a7e0ee120ba44162f384df239fbe47b66e855e37863afa72de3a193e074
CVE-2018-4341,0,0,dea7e02377f1c376cd8c7dd3f2fc7eec24381821f6351ee5ef277a5dff751657,2024-11-21T04:07:13.693000
CVE-2018-4342,0,0,b3f59b2ac0e3061a3d11a75df46b1eb40d080946d103d59cb30c9ce21652eb54,2024-11-21T04:07:13.817000
CVE-2018-4343,0,0,9bd920e62f902f0e28bf3098ea4a2540290dbc2e43262cff2b5daf96ec73e24b,2024-11-21T04:07:13.930000
CVE-2018-4344,0,1,c9cbae5048691b8f23ebfa2f3f2b1e95414a32ac0980b5ff328d938005ad17b8,2025-02-28T14:53:55.297000
CVE-2018-4344,0,0,c9cbae5048691b8f23ebfa2f3f2b1e95414a32ac0980b5ff328d938005ad17b8,2025-02-28T14:53:55.297000
CVE-2018-4345,0,0,d451457e99571660e2050d70a45a870ea804274a1fb75662fd8abb18d7011d71,2024-11-21T04:07:14.190000
CVE-2018-4346,0,0,c4f593031dd265962878bb12b22a5c97f896433c5c8288900694de10de896240,2024-11-21T04:07:14.320000
CVE-2018-4347,0,0,355d9b8cce85661c40a474957973641c83e188a4cf32f3c1f7abbba32c8c1096,2024-11-21T04:07:14.437000
@ -141290,7 +141290,7 @@ CVE-2019-6219,0,0,51fb8aba06c50f5beb34035c1b242a41d19be52942c31c18d7c2bc7a8531d9
CVE-2019-6220,0,0,cbf2407952b07ecf4492f093b5fc103d1b2a227a81b385b9faca3d2d185c14eb,2024-11-21T04:46:15.033000
CVE-2019-6221,0,0,f50ee778054e49605f683211032acfa21388b43f0c6177a6b438d11f78a69b76,2024-11-21T04:46:15.137000
CVE-2019-6222,0,0,b2e119bf8c2ad53cb80edcff569884b3877b26f333c41130791c9bc95e585fe3,2024-11-21T04:46:15.247000
CVE-2019-6223,0,1,b0a1cf0311e6d7b17e3a1c232bfe5aa56b83af594803c0ed83b1b8e17a3d6f48,2025-02-28T14:53:55.297000
CVE-2019-6223,0,0,b0a1cf0311e6d7b17e3a1c232bfe5aa56b83af594803c0ed83b1b8e17a3d6f48,2025-02-28T14:53:55.297000
CVE-2019-6224,0,0,ecfbf121a69bfc82d1550f3281adf5d3bf177bace8e5f517f9f0d32509cf5d40,2024-11-21T04:46:15.460000
CVE-2019-6225,0,0,ce41491fd66792659c0d145bd85753c0d55c4ec7b1ab133ce86b89f9ab9f2ca5,2024-11-21T04:46:15.573000
CVE-2019-6226,0,0,2aa666681d279cd3af63767890ce00e7894e99d62118a90ff3d1b5e4f08ebd09,2024-11-21T04:46:15.687000
@ -142061,7 +142061,7 @@ CVE-2019-7283,0,0,feffafb71756ca36d7ebb5e5732cf21c65af1eef8b0b4a000a01722bcbf9d7
CVE-2019-7284,0,0,4f4944ffaef6b9ae94cd5db36f56541cb3730404bdacdc17a02e650c89f80cde,2024-11-21T04:47:55.540000
CVE-2019-7285,0,0,313d5b7c9ac5d469845e6bfae8fac9cde4a21e9607c8aa24344fef7be804554b,2024-11-21T04:47:55.650000
CVE-2019-7286,0,0,02a5092dc2c9edee56617f9cb1cc06cefc2fe17bcd4f6e2cc3426d833d26be53,2025-01-29T18:15:32.340000
CVE-2019-7287,0,1,bcea0373ff9cd91321e9961f29326629e8c8c2294f50b6a6965bdf51faf4ab8f,2025-02-28T14:53:55.297000
CVE-2019-7287,0,0,bcea0373ff9cd91321e9961f29326629e8c8c2294f50b6a6965bdf51faf4ab8f,2025-02-28T14:53:55.297000
CVE-2019-7288,0,0,37259472abe9a71efd7ecb7947dce39a94a93ee4f5a3fc21f4b31239799bffb6,2024-11-21T04:47:56.020000
CVE-2019-7289,0,0,490b84305deba02cd9c12685d90ff374698a1976137c62fa8dacb278f2a4b4ee,2024-11-21T04:47:56.150000
CVE-2019-7290,0,0,364d38b1b25fabde5737927c410b77a3a82901e5520f715924a529b21f8dd778,2024-11-21T04:47:56.273000
@ -142971,7 +142971,7 @@ CVE-2019-8502,0,0,c434befa76a4d4ec9f96079a6522d800615fb7b5a48ac54913486401cebb09
CVE-2019-8503,0,0,0fa026e8d1f022ec049b1ca9e49137afb60072dff1e8e2dd72b28d15c80c7f81,2024-11-21T04:49:57.480000
CVE-2019-8504,0,0,dbc06dfdb448c3a4a5038f7f7fffd2ddbd9e83bd6911705199749c704ab21b6d,2024-11-21T04:49:57.607000
CVE-2019-8505,0,0,e1a01ac4804c5cc3e2fc73634b47f99331a6a4ce7a7c3c2bbfed7c9969ad3586,2024-11-21T04:49:57.723000
CVE-2019-8506,0,1,8bc594c9d8b72685a83e0f4e7329dc602a676de64487ea84a22e29044361bae6,2025-02-28T14:44:48.713000
CVE-2019-8506,0,0,8bc594c9d8b72685a83e0f4e7329dc602a676de64487ea84a22e29044361bae6,2025-02-28T14:44:48.713000
CVE-2019-8507,0,0,b01ebef1a03939c2e3ada65de3c55f419e29cf0247c08ea4d212b6b10f7b019d,2024-11-21T04:49:57.980000
CVE-2019-8508,0,0,cef14e0810b1e31a960bc6e50e6e7aba1a448ffacb5ba344f9c35735a88a9bf6,2024-11-21T04:49:58.090000
CVE-2019-8509,0,0,ec37506e1999ed61157738d5e3cb9f41d210f01cd362d5aea688c39cd5258611,2024-11-21T04:49:58.203000
@ -142991,7 +142991,7 @@ CVE-2019-8522,0,0,0eae3335c616182d312f36c43cae51aa49706785a5e522721af70477311a7b
CVE-2019-8523,0,0,58aaa978a7e9de77277ba3f7bc706507334d4693bd0c5521150bdec55490072c,2024-11-21T04:49:59.800000
CVE-2019-8524,0,0,32c4b83ccc7f0a278121313d1e2f9075e195d072f0b93eabeb1707ea8b920726,2024-11-21T04:49:59.923000
CVE-2019-8525,0,0,6ecd93b661cfa469f49d67d3496d956460a9b9f18cdb8779c33e292274db4eb8,2024-11-21T04:50:00.047000
CVE-2019-8526,0,1,df91717360992f75b9a028be6f4e595df112c6423e9a37d36a085ae3717da22f,2025-02-28T14:44:48.713000
CVE-2019-8526,0,0,df91717360992f75b9a028be6f4e595df112c6423e9a37d36a085ae3717da22f,2025-02-28T14:44:48.713000
CVE-2019-8527,0,0,7f47548387851680e5a961a6246e9e3c27175977bb648565dd45c6a5b3234b0e,2024-11-21T04:50:00.290000
CVE-2019-8528,0,0,1639b73f58d13f7ed0ff712ed4ffad30e15b2bab49d4978d2759cd12fc2ee8e7,2024-11-21T04:50:00.423000
CVE-2019-8529,0,0,cf361ae2751882bf4341036b0cfea24f00b715e4dc1d6ea3088e8dd4127f4153,2024-11-21T04:50:00.540000
@ -143068,7 +143068,7 @@ CVE-2019-8601,0,0,5e1b649cd76c28875d6e8e75de505e8524898c98238cb4a152590695820ca2
CVE-2019-8602,0,0,dfd4f0ad81cd404bc76b02e5763cbcb73de09c2d34cedf9136b1b93dd3c3c1d3,2024-11-21T04:50:09.217000
CVE-2019-8603,0,0,397ffd36d4e84c621cf449a9fe68c20353e9e5a5e6eeb155fe03bdbf21382c50,2024-11-21T04:50:09.353000
CVE-2019-8604,0,0,a865afc630f7beaf44df56caaf7efbc7bcf793b8a0a6e8a16c85b32c7369a571,2024-11-21T04:50:09.463000
CVE-2019-8605,0,1,3a2299d2d1bfc7d2195a113ef0e40f429fd6a1ff9c25c8a2ae4da3435809117c,2025-02-28T14:44:48.713000
CVE-2019-8605,0,0,3a2299d2d1bfc7d2195a113ef0e40f429fd6a1ff9c25c8a2ae4da3435809117c,2025-02-28T14:44:48.713000
CVE-2019-8606,0,0,9d793373058d23a812a6cec3d9e2bdd104d6ee9c23a4401600c30545293a6e9d,2024-11-21T04:50:09.690000
CVE-2019-8607,0,0,7ac0d064c6b42563e8682aff1dcfab6f7183e1d42a575096d72bb934c174f4b5,2024-11-21T04:50:09.797000
CVE-2019-8608,0,0,db9ceb00c77dadef8090d297e1f1d19a2d5eb960a616fdf84109118f8a2fb620,2024-11-21T04:50:09.923000
@ -156758,7 +156758,7 @@ CVE-2020-27947,0,0,bdab85e9f6517d7edd3e13b7350718f9ad953c6de0da6392435fb79ad4365
CVE-2020-27948,0,0,74ff44fbc11d14ffb0e2560785e15d6d6ddb2c5037b226bcfd9403a14505cacc,2024-11-21T05:22:06.417000
CVE-2020-27949,0,0,1e77071bd6ed69c94468c0ca30b29016b44256bbb0737e7795d5c1adfd21e5b9,2024-11-21T05:22:06.537000
CVE-2020-2795,0,0,ea6d9119a7d08536109093ac2e9c142a3d976d091ca02de0b12940cd00b054e7,2024-11-21T05:26:17.380000
CVE-2020-27950,0,1,dd947c41e325618f88642548f3547dabf83258dbec9e79e304742bfceab4e5ac,2025-02-28T14:44:48.713000
CVE-2020-27950,0,0,dd947c41e325618f88642548f3547dabf83258dbec9e79e304742bfceab4e5ac,2025-02-28T14:44:48.713000
CVE-2020-27951,0,0,4394fd9fd0d270e5685d681c055c43d114e98685e00457e179c818543125646b,2024-11-21T05:22:06.777000
CVE-2020-27952,0,0,f8663fddee1a7d1e8de2028f541b90d05e9b18fe2b6c949432d04623122b475d,2024-11-21T05:22:06.910000
CVE-2020-27955,0,0,84ffb7d25d038cf287196c1671c1e7197adbde6851d5e0fc38b11a1788de87ba,2024-11-21T05:22:07.027000
@ -159728,7 +159728,7 @@ CVE-2020-3833,0,0,e764dc5cfbb8f637552b2441e9ddb593562a3918809b4c677bb07276f1f37b
CVE-2020-3834,0,0,3e772505e33e0e780d0ee45c96850de3b9441fb84529cb87198cfe1cd9457c55,2024-11-21T05:31:48.527000
CVE-2020-3835,0,0,cdcfa07a09a472bd33c6fad2c5ebc47f55b7047cf8a668f3558757ee2f0554ef,2024-11-21T05:31:48.627000
CVE-2020-3836,0,0,26198ab0a7a09181b9daabad3d9d21eadd74796c73b69cca8eeebfe42cc70abc,2024-11-21T05:31:48.737000
CVE-2020-3837,0,1,86abdb9e0304dc7bdf2ecb0d23fdef34602bfff56071f34c6be57fcbe54e5ce1,2025-02-28T14:44:48.713000
CVE-2020-3837,0,0,86abdb9e0304dc7bdf2ecb0d23fdef34602bfff56071f34c6be57fcbe54e5ce1,2025-02-28T14:44:48.713000
CVE-2020-3838,0,0,8d1784baae371177f9d969f0cf7d2c32eccd6737302888ee0e7d97c3ed35fe4e,2024-11-21T05:31:48.980000
CVE-2020-3839,0,0,cce4070eb0b58eef19224cd877e2e6dd6b8f5e237e9f84b7c9bae85d5ed0c879,2024-11-21T05:31:49.107000
CVE-2020-3840,0,0,514e04d2cf82acf4eded7fae4a5294fb412c6b1287f03b9bf0112344f66a3086,2024-11-21T05:31:49.210000
@ -164696,8 +164696,8 @@ CVE-2020-9814,0,0,39d23ae595854756548268c04031dd78beb4f4daf7ec7db61e365f2b36b9a1
CVE-2020-9815,0,0,a003a768ee0eea54e269add860f10e3abee748e6ca2781978085f4f2ae41bb71,2024-11-21T05:41:20.167000
CVE-2020-9816,0,0,ead57dd330ea3372df51f17718a1057a151f35f4442acd93f18839173d58f970,2024-11-21T05:41:20.270000
CVE-2020-9817,0,0,6451091f69be5568064f6c8a083aedc1278642490c4a281b5e17f6d40ca1424c,2024-11-21T05:41:20.380000
CVE-2020-9818,0,1,7158fa775e6022751c784326b5e02610838f27aef51a64442d4f4f1e601d3c1a,2025-02-28T14:44:48.713000
CVE-2020-9819,0,1,f896a3c2a319a7bb9db48cddc9d86c13dd6a1c64463ae5ccc663bd158270e3cd,2025-02-28T14:44:48.713000
CVE-2020-9818,0,0,7158fa775e6022751c784326b5e02610838f27aef51a64442d4f4f1e601d3c1a,2025-02-28T14:44:48.713000
CVE-2020-9819,0,0,f896a3c2a319a7bb9db48cddc9d86c13dd6a1c64463ae5ccc663bd158270e3cd,2025-02-28T14:44:48.713000
CVE-2020-9820,0,0,4fdad7d17b8d9bbdef875e36d0061295507fa69ba2f8dbd3a4a1d39c55b0a586,2024-11-21T05:41:20.713000
CVE-2020-9821,0,0,07529420971d10ff2bbfd70ddd9990d24f55005291e73adea0637f70f81b6285,2024-11-21T05:41:20.820000
CVE-2020-9822,0,0,dd0bacca6d947be1747310d2122b048f784f56925b7be141e555edeaa848edf0,2024-11-21T05:41:20.927000
@ -164735,7 +164735,7 @@ CVE-2020-9855,0,0,f62de7238477aea93f3abf3ab8ea2dfc400975c6489e15199db3b3de03a472
CVE-2020-9856,0,0,e48989f32d60137c0edc8a02e834ea84cd4505ab62440e90630bb6ca0255475d,2024-11-21T05:41:25.117000
CVE-2020-9857,0,0,4564f37640cf033d502580176544c1ca67b90e10b289096385a5ce052561a423,2024-11-21T05:41:25.217000
CVE-2020-9858,0,0,365f269021dc2690a80c7be2353be85740b98a3c242d31c022e2f1ae9fd07a21,2024-11-21T05:41:25.317000
CVE-2020-9859,0,1,f8d8dfa4d5caba5a14c215dcf9ef2f6a548e2d2a3ecc31a8703c7892ab30bb5c,2025-02-28T14:44:48.713000
CVE-2020-9859,0,0,f8d8dfa4d5caba5a14c215dcf9ef2f6a548e2d2a3ecc31a8703c7892ab30bb5c,2025-02-28T14:44:48.713000
CVE-2020-9860,0,0,6d689ddd768a7729996307cbe7c2aa5b1d09bcc559832a4fec10fff8c58a23c6,2024-11-21T05:41:25.513000
CVE-2020-9861,0,0,5c800faea68343bf58424d7e251e1c13d6dc6d14a61816a5cf1f99cb4d5b1992,2024-11-21T05:41:25.610000
CVE-2020-9862,0,0,b6f03288f468f0d4024a3988e42405a25e797fb0852093161144538c7e8105b3,2024-11-21T05:41:25.710000
@ -164780,7 +164780,7 @@ CVE-2020-9903,0,0,fd8ba9246c03cf84ed34090daa738b1e21ec1682f0f8cda6dedaa4761c5864
CVE-2020-9904,0,0,5fdc6e10d2f1f01c714b258e99f79acbd6194e185af91fb066f25cb2d75768c4,2024-11-21T05:41:30.013000
CVE-2020-9905,0,0,b68cf578fe49078f790bcf44e5ff24959136d2e396535b0c2537b5b0ffecaa75,2024-11-21T05:41:30.123000
CVE-2020-9906,0,0,166cedb6a95dee0a53a40439951152b4c6ffba0b89929eb32a8c66f410558976,2024-11-21T05:41:30.230000
CVE-2020-9907,0,1,e1eb448ccd186c4271a29f7e5836588c535b03a045456a3bc9dba09ef694c182,2025-02-28T14:44:48.713000
CVE-2020-9907,0,0,e1eb448ccd186c4271a29f7e5836588c535b03a045456a3bc9dba09ef694c182,2025-02-28T14:44:48.713000
CVE-2020-9908,0,0,06606ab1c2077a54e1320041f575a636b9cd10146870b40c63b7a42243148093,2024-11-21T05:41:30.437000
CVE-2020-9909,0,0,db45329d72cab554faea03693de3ea5691e4845af8f9053ecf8a8d9d2e894736,2024-11-21T05:41:30.537000
CVE-2020-9910,0,0,eacc185ba0c7ff3cc1d990c8fea0abc7edb47327ee8ca9ee20d8023e0c9a1f62,2024-11-21T05:41:30.647000
@ -164807,7 +164807,7 @@ CVE-2020-9930,0,0,6e27c898f04c57974ee33a6efc19d92b2d388cd1a02ee2fa6c053c46a67dc9
CVE-2020-9931,0,0,f8db6056ab6e7b000a860597155fbc28fbf14076d94aef57849ea84edb033dec,2024-11-21T05:41:32.923000
CVE-2020-9932,0,0,d4ac093d8a0c5c44ead5f82d1790e5da018a7c279ee0812a2e45de174844d665,2024-11-21T05:41:33.040000
CVE-2020-9933,0,0,b1ac39dc4c32bae5f3c1adcbaa421d06f55965e5d7f7c3871b963dbc0c4a1561,2024-11-21T05:41:33.153000
CVE-2020-9934,0,1,4d21200c47655d51de0db1c759e230024ba761fb080941cd11237a66be1e9820,2025-02-28T14:44:48.713000
CVE-2020-9934,0,0,4d21200c47655d51de0db1c759e230024ba761fb080941cd11237a66be1e9820,2025-02-28T14:44:48.713000
CVE-2020-9935,0,0,8c8962420a06ea8b9704251fdd323828ea6570405c8d4526638213ce066ddf64,2024-11-21T05:41:33.400000
CVE-2020-9936,0,0,3f0520c5f2eface2c145c0dc6c279d5078dc8e79c797e1a3ffd2befbb5d1d782,2024-11-21T05:41:33.513000
CVE-2020-9937,0,0,d572deb06e95e84154ea8a51424aa07761fb2c381fd1bef9008c747db6755e1f,2024-11-21T05:41:33.633000
@ -166431,14 +166431,14 @@ CVE-2021-1778,0,0,8b826b7ae2ae17b8b9901d1f612230aee30d0fc68a265ebf3396e3ceebf943
CVE-2021-1779,0,0,64bb89c45d76f13f2d9fd67f86b95e7c100b655c340943ae93bf17b44851a0c9,2024-11-21T05:45:05.733000
CVE-2021-1780,0,0,23e85a6351e1b98f470ccb20f8ae4ad7e1ecfb25beb2334c601960dad2a662bf,2024-11-21T05:45:05.857000
CVE-2021-1781,0,0,8c1ef084f5ffd81b1dfb865bf625ce113bbf8db4f404f5f4818a50fc994e667a,2024-11-21T05:45:05.980000
CVE-2021-1782,0,1,a6fa5b0ece19eac0526619722b2b8053f557785f9b2432c61e563c0ba9541f75,2025-02-28T14:44:48.713000
CVE-2021-1782,0,0,a6fa5b0ece19eac0526619722b2b8053f557785f9b2432c61e563c0ba9541f75,2025-02-28T14:44:48.713000
CVE-2021-1783,0,0,a629262b9c76bc864d84116a8a9a03cf0ee6646c816a5b730a6fbd198836526b,2024-11-21T05:45:06.240000
CVE-2021-1784,0,0,5dbd3fae571e03fbab98f6009778ed0be04756e7c33fd360175bd60500fa009e,2024-11-21T05:45:06.360000
CVE-2021-1785,0,0,f5c50d287644a4824d77890a58b7c0971d824c705a80905719d22378d0b6b379,2024-11-21T05:45:06.473000
CVE-2021-1786,0,0,844528cd02ae52e41c72912ba3abea868e3a31a8ead52c9afc5203d16bdb7bdd,2024-11-21T05:45:06.603000
CVE-2021-1787,0,0,2fed3cae125c2895dac1e44fd837f817f5b5e70f63daf568baaa5ea04f53dd36,2024-11-21T05:45:06.733000
CVE-2021-1788,0,0,7cd9b9e8fd97ec6f34bcc85b8d8ae756cef050deec7f91d8bdd5e69f3ff22f38,2024-11-21T05:45:06.860000
CVE-2021-1789,0,1,1601985ede48d3a9fccb36bcea9d682fe7acb0623b59b92c9743d3b550ed4f2f,2025-02-28T14:44:48.713000
CVE-2021-1789,0,0,1601985ede48d3a9fccb36bcea9d682fe7acb0623b59b92c9743d3b550ed4f2f,2025-02-28T14:44:48.713000
CVE-2021-1790,0,0,453727956bec9f85809fc98d61ce3827a48322b65c0a1308fdd19254e25b7d46,2024-11-21T05:45:07.223000
CVE-2021-1791,0,0,0858d7a66d6852664ff89bbf6b3f6519588dcf813a61680a95653c00c4525806,2024-11-21T05:45:07.340000
CVE-2021-1792,0,0,5ffc2bf1833bc5c8fb2e4843cb4db95b9711424cf4aab2d2cc4aaf61cb70cd0c,2024-11-21T05:45:07.477000
@ -166509,8 +166509,8 @@ CVE-2021-1864,0,0,e61bb78daa00b5dca2e6f100a892bda75d87a592b9962975d78c060881b491
CVE-2021-1865,0,0,d4d8e0986b62bedaab54dbcf207c7ced93d3d91287ee0883bce3ef5ceb5d3d36,2024-11-21T05:45:15.390000
CVE-2021-1867,0,0,88725f08a5e44d02242ea72ac07f37bb9e06618f3cd63825dbd1ad8b63b8cb04,2024-11-21T05:45:15.513000
CVE-2021-1868,0,0,432a8d063e46b26199a2f940e4c6839746a15a330270af8952a5e97a5f7524ac,2024-11-21T05:45:15.640000
CVE-2021-1870,0,1,d3172f265697091d76b36ed5dc99fb1ce60e7c8b5c92f65c90effae9bcbb20fd,2025-02-28T14:44:48.713000
CVE-2021-1871,0,1,cceb5d9011172094e721f2a997f9baadaf42f1efa5cdac99fcee2f8ee4a2bb93,2025-02-28T14:44:48.713000
CVE-2021-1870,0,0,d3172f265697091d76b36ed5dc99fb1ce60e7c8b5c92f65c90effae9bcbb20fd,2025-02-28T14:44:48.713000
CVE-2021-1871,0,0,cceb5d9011172094e721f2a997f9baadaf42f1efa5cdac99fcee2f8ee4a2bb93,2025-02-28T14:44:48.713000
CVE-2021-1872,0,0,4aad0f7c4f760558662da2aa02617c0ae0669394f36c9abb206cff7b5c7e6f77,2024-11-21T05:45:16.040000
CVE-2021-1873,0,0,f647da70e48b4a0e757dc32d4da6a78ccdcb576a528532094359d47a435eae89,2024-11-21T05:45:16.153000
CVE-2021-1874,0,0,11acb083af68bc66cbb55a31d610911ff9e1492756cdefbcf79bd2d863878bb4,2024-11-21T05:45:16.287000
@ -166518,7 +166518,7 @@ CVE-2021-1875,0,0,a763019d62a197757c122cba7e6ec2caf0210e0fc06c38570a6774aace7636
CVE-2021-1876,0,0,50e3e6073a13251685729089e5f9b48623129fa60396e005f85f8948fe4b1930,2024-11-21T05:45:16.527000
CVE-2021-1877,0,0,78167aec1738ed934a9db101730f2475d220aa596ff08cccd6d82eadaaf3136f,2024-11-21T05:45:16.647000
CVE-2021-1878,0,0,bbc94e824fa34a03db5d35e1bbb0245d5ebeb5ba4878c0691539ed3e105efdd0,2024-11-21T05:45:16.777000
CVE-2021-1879,0,1,7d9df0393de12880300d4ee90fc81fc4100559c0ceb81aae28fa79423d6ded14,2025-02-28T14:44:48.713000
CVE-2021-1879,0,0,7d9df0393de12880300d4ee90fc81fc4100559c0ceb81aae28fa79423d6ded14,2025-02-28T14:44:48.713000
CVE-2021-1880,0,0,f21767cc17b0b400ea36769c68e9dc0fc94bd57122b1b556aeb6342108dfd313,2024-11-21T05:45:17.023000
CVE-2021-1881,0,0,71d96589a667db4e83dea8a9b9340b5dda8ce4877b845ef6e86d23e76d807867,2024-11-21T05:45:17.143000
CVE-2021-1882,0,0,0de80653eb0cc938d031bd299bc26b6178d33ea21b4b167b4804efdfdc78bad9,2024-11-21T05:45:17.280000
@ -175042,15 +175042,15 @@ CVE-2021-30653,0,0,af6209998169bf0b59156640376c5ebe8e7a91975ee599eee6d8c80cb5bdb
CVE-2021-30654,0,0,d454b5e9d0444f22c1324170868a7170e32ba4142b3b3d1feb9e8f43129b786d,2024-11-21T06:04:22.110000
CVE-2021-30655,0,0,c5bd87f283bc66de8cf6a1dccdc1113eb65e46ccaaed5eff9fd5299b957c5164,2024-11-21T06:04:22.250000
CVE-2021-30656,0,0,4f25be990cd3e56338347956b5cd16bd2d8602e91cf11f5de83660e31c7f84bc,2024-11-21T06:04:22.390000
CVE-2021-30657,0,1,f0106b43b12737c131c03a5845f94b27adb33721d5ff25e41b5534a7e9c42b3f,2025-02-28T14:44:48.713000
CVE-2021-30657,0,0,f0106b43b12737c131c03a5845f94b27adb33721d5ff25e41b5534a7e9c42b3f,2025-02-28T14:44:48.713000
CVE-2021-30658,0,0,a7e6ce534983d6265ea77dbc37d43cd7f21d26f66f7c40d693487b5c676730f2,2024-11-21T06:04:22.637000
CVE-2021-30659,0,0,ab538d4b06ae94ebba36b98d58ee05bc2d9da4cbd8fd10f31cd6e39e35257775,2024-11-21T06:04:22.750000
CVE-2021-30660,0,0,387f96a9e1e920b2eb249913b885544bc18948e904113099ea966317a9059876,2024-11-21T06:04:22.877000
CVE-2021-30661,0,1,5b53a91cf480f2b7b01bf8b1852ae2e3aac8b86844583ccf15476ba1c2a4de76,2025-02-28T14:44:48.713000
CVE-2021-30661,0,0,5b53a91cf480f2b7b01bf8b1852ae2e3aac8b86844583ccf15476ba1c2a4de76,2025-02-28T14:44:48.713000
CVE-2021-30662,0,0,c4dfc7192dbb2ce4bea44d273c3ad0bccd8bce5f5b4b72ed9d54ec2ac3781f53,2024-11-21T06:04:23.160000
CVE-2021-30663,0,0,739ad3e92cf3fbef3967ff7bcf432b116b4e486bde9bad29cd9c8e885d5501f2,2025-02-14T16:22:02.543000
CVE-2021-30664,0,0,f2057936986b5b73e1cba58f4707641670b3cbaa1c2859e5b4b8f8a2a91dd529,2024-11-21T06:04:23.470000
CVE-2021-30665,0,1,1d936126b05f9b1fef9e3e5168af777bb636b8dc2991cae91e3f24af3c81e56b,2025-02-28T14:44:48.713000
CVE-2021-30665,0,0,1d936126b05f9b1fef9e3e5168af777bb636b8dc2991cae91e3f24af3c81e56b,2025-02-28T14:44:48.713000
CVE-2021-30666,0,0,8dab9f3ed80515f195857a53e3285adb85698bf6f582aa080b13fbb35f8312f2,2025-02-13T16:49:28.897000
CVE-2021-30667,0,0,ee0c4829017313d8362cc93881a4782426de3146989d6fbd51513180306068f5,2024-11-21T06:04:23.897000
CVE-2021-30668,0,0,ef8eec8272941e6ecce5f78376baeda179f835bab56dbd9979f2308401ea7e74,2024-11-21T06:04:24.030000
@ -175096,7 +175096,7 @@ CVE-2021-30708,0,0,0d4ef740951de9fa3c7d46cd5d922d5031082b03c36b68901042a25459d7b
CVE-2021-30709,0,0,ac4f597f103d40c646c9a37992122e647523ecf1a80c9ea7d0cad044139adf79,2024-11-21T06:04:29.733000
CVE-2021-30710,0,0,6f9138aff87c816b5801441de245256cd714004b0c7fe4d082b9380d78dbecf5,2024-11-21T06:04:29.883000
CVE-2021-30712,0,0,fd76d4bdea30f6917b1b4272719a88821011e5d27fc4ee0c3f5302060e454266,2024-11-21T06:04:30.037000
CVE-2021-30713,0,1,9022cbef2103901be5c72836b4c01e327c510bb75b09aee001ae50fd693660f6,2025-02-28T14:44:48.713000
CVE-2021-30713,0,0,9022cbef2103901be5c72836b4c01e327c510bb75b09aee001ae50fd693660f6,2025-02-28T14:44:48.713000
CVE-2021-30714,0,0,1ac3cdebf872ac967c92c82c1f293c834ed9a9b2a9af3cbda73ed47dcff3c59f,2024-11-21T06:04:30.317000
CVE-2021-30715,0,0,8526fff9426684bf5994f2385d0e54f12e8042c43b974b959d854ca5cfd03af8,2024-11-21T06:04:30.440000
CVE-2021-30716,0,0,1351521f863a9be568843ed0717057da020860858dd82d7d962e25e477f48e69,2024-11-21T06:04:30.573000
@ -175183,7 +175183,7 @@ CVE-2021-30802,0,0,d3af46ce2f497920c6024a63ea8ea8888c260d90da7eb1da62c0463dfa869
CVE-2021-30803,0,0,da6c846ff7628e171742041c5c4f2a9ae56f35437b19a5957ae69acd101f42a1,2024-11-21T06:04:45.030000
CVE-2021-30804,0,0,a8448168f3c60c9210c3b99df09e33ba1abc83f92b034856b3391f42be985878,2024-11-21T06:04:45.140000
CVE-2021-30805,0,0,a45ac4492d17d042337985687b2b1544cdce5f65bc715a78eaef4fca60b02db2,2024-11-21T06:04:45.257000
CVE-2021-30807,0,1,814e9c39cf301788a1885999e389fa0561c8fc705e7cb47c6be6427b9687a5ea,2025-02-28T14:44:48.713000
CVE-2021-30807,0,0,814e9c39cf301788a1885999e389fa0561c8fc705e7cb47c6be6427b9687a5ea,2025-02-28T14:44:48.713000
CVE-2021-30808,0,0,7332f9b25719fd725098c6e1a14e50d288895c73b1d9691fc7752d3662d18d33,2024-11-21T06:04:45.500000
CVE-2021-30809,0,0,9faa62183c613ce8119ed921c618805568e2bfada6377a76f91a8e0d329247cf,2024-11-21T06:04:45.630000
CVE-2021-30810,0,0,0e59876a610502b4445f0847e17025234c0f485bc63ceb2d065709a0d4be2e41,2024-11-21T06:04:45.760000
@ -178812,7 +178812,7 @@ CVE-2021-35482,0,0,5b472310c7c4047d6c33038218d864d04f51f66e4d51e1cb7991026a14c61
CVE-2021-35487,0,0,331ce5b429413f54a5bdb9718850b6786d3b058d3cbb6312518d5ffedf213af6,2024-11-21T06:12:21.600000
CVE-2021-35488,0,0,e65262e0a1c1d0504b83abe345c410bff84cdfb7fa7e3e92be53ed427da99d9b,2024-11-21T06:12:21.740000
CVE-2021-35489,0,0,53bce953b714dca045a33c64982814f760f224a2cdd4b57395f881b88326173d,2024-11-21T06:12:21.887000
CVE-2021-3549,0,1,0103ce56d8fdeff983b83cbb86c1c31dad40df775c818ebef79f274a23fafeaa,2025-02-28T13:15:24.940000
CVE-2021-3549,0,0,0103ce56d8fdeff983b83cbb86c1c31dad40df775c818ebef79f274a23fafeaa,2025-02-28T13:15:24.940000
CVE-2021-35490,0,0,8518f891efcd6e2c5ff624523dd1d73b81408947a5d2a6dceb5053db70504775,2024-11-21T06:12:22.030000
CVE-2021-35491,0,0,f4dc4e73cd732408245742225cf63817e06513f351fcb7db023db8d554876caa,2024-11-21T06:12:22.200000
CVE-2021-35492,0,0,c1d7bd87fad0c3e28378adc00aafab61674ebaa8678be1c7775d09b09a4bb35b,2024-11-21T06:12:22.410000
@ -180102,7 +180102,7 @@ CVE-2021-37346,0,0,946b92ddc4fbe8315c7d41ff29ec3fe6897aba5d320afff2a62bc560a60f7
CVE-2021-37347,0,0,3b9e777c10e939bdebc4042602b6811e52742ff1bb9cf92b7d4c7384ff6b0b30,2024-11-21T06:14:59.177000
CVE-2021-37348,0,0,ca272066b16ec187cad70b4e87c46a9e6652a909d15aa5859776a09d1693fbd9,2024-11-21T06:14:59.330000
CVE-2021-37349,0,0,08392ea9c36b212d62ac5ffcca309c8a34443a89420b70fa89a06ba97b793121,2024-11-21T06:14:59.490000
CVE-2021-3735,0,1,a6f7ba7652086c7fb0aaa922e8875ef97c011652c6a9945309818c4d7d776c4a,2025-02-28T13:15:25.767000
CVE-2021-3735,0,0,a6f7ba7652086c7fb0aaa922e8875ef97c011652c6a9945309818c4d7d776c4a,2025-02-28T13:15:25.767000
CVE-2021-37350,0,0,cf25b34ef1bbfd95231919aef949f1c5ef44e04e05be9690834576ef277c1b91,2024-11-21T06:14:59.677000
CVE-2021-37351,0,0,d11c79c834d15cc2144d8711dffb0ddf0689cebc7c8d0fa23ad5d1503584c13d,2024-11-21T06:14:59.823000
CVE-2021-37352,0,0,1d39000a015942794d66401eebb5b89f81736f941a96aecacf01420137c33cd4,2024-11-21T06:14:59.973000
@ -181647,7 +181647,7 @@ CVE-2021-39283,0,0,eda15ad1b3bcdcea2bbabe3c3a719378090dd1f6b09ac9e32c24dec27d162
CVE-2021-39285,0,0,a30e82f0b54273bf7230675bfc50d449c5b054125f271ae318a58b9f82ff968d,2024-11-21T06:19:07.193000
CVE-2021-39286,0,0,ef6a7f535e70ea4c70e16914bb393fc1fe7ddce52d7869aa8e27ed3514a1c0a5,2024-11-21T06:19:07.390000
CVE-2021-39289,0,0,065932f15029abf31cec0e9a8c93f437f6a2e6f1d70a6cf84aed55a74ab5c3a9,2024-11-21T06:19:07.593000
CVE-2021-3929,0,1,9b475fc91b0b9592c4e6edc6366d3f7182869eb394ef53d8fac1179039a4fbdd,2025-02-28T13:15:25.913000
CVE-2021-3929,0,0,9b475fc91b0b9592c4e6edc6366d3f7182869eb394ef53d8fac1179039a4fbdd,2025-02-28T13:15:25.913000
CVE-2021-39290,0,0,4faf5271e88619fa8d7ac328a2e3cb3d6fd0f70f73052bb9ecd9122500b24399,2024-11-21T06:19:07.793000
CVE-2021-39291,0,0,cdeac33e28dbcd5736066d6640e454e84e5a3f646d2543c33f601534582dc436,2024-11-21T06:19:07.980000
CVE-2021-39293,0,0,7f06b7eb1a854fa9547bea97c0e43e43aaed1d5a57ac0f47b2f178f3861e1679,2024-11-21T06:19:08.180000
@ -192299,7 +192299,7 @@ CVE-2022-22583,0,0,cef0a1b3c51e05882dd405aa523ef9e9bbbacbdae2cf3cbfa227960daba5e
CVE-2022-22584,0,0,5248aa63983720014377ab3a932e7e26d00aa01f6109bfe9bbfe564e719ab265,2024-11-21T06:47:04.220000
CVE-2022-22585,0,0,49d858c7854d86c30431073a89e3a77a374d0583f41fe955f4122b98bff7b1d8,2024-11-21T06:47:04.370000
CVE-2022-22586,0,0,7a8c327b1fdb0dc879577cb6623c3b5a67edc10748196e7bf3d4d9a371e2a4bb,2024-11-21T06:47:04.493000
CVE-2022-22587,0,1,c14d66a8098f837acb0b6ae91093d9dd88ec6df640a3e3319c4cbdfe64a3f169,2025-02-28T14:53:55.297000
CVE-2022-22587,0,0,c14d66a8098f837acb0b6ae91093d9dd88ec6df640a3e3319c4cbdfe64a3f169,2025-02-28T14:53:55.297000
CVE-2022-22588,0,0,6c57d89d82e014a04c1d1a269239114176bf790579db18cc8a4e0bb9b98618f5,2024-11-21T06:47:04.710000
CVE-2022-22589,0,0,ad265160333aeff24b5a24815da36d925fd4417ebc2ddd4162500edd6aad12ec,2024-11-21T06:47:04.823000
CVE-2022-2259,0,0,150b52071c57e9da09e4562b9e329d9ebb764927f18ed734d3725de25cc194b6,2024-11-21T07:00:38.140000
@ -192334,7 +192334,7 @@ CVE-2022-22616,0,0,fd6c62268b016f15b1bb153516514624f101ccecfdc0b548b6bd7175935d8
CVE-2022-22617,0,0,b9a76fb778badaf7135b648c1b9e7a3b21aea99bf752c663599f8da2405573b1,2024-11-21T06:47:07.893000
CVE-2022-22618,0,0,53a6466f73e6695117bc56fb459dfa0bde3aacbb8110ea335a0c42333cb99e27,2024-11-21T06:47:08.017000
CVE-2022-2262,0,0,48f9f12588c4cb17d7b597dce3fc433cbe7d88db72523f825ed2022a32d1a7a8,2024-11-21T07:00:38.480000
CVE-2022-22620,0,1,d7ad2b5ab0664340b1590ca4fd11c5d8cc296fd60da2cb69592f304405aea94e,2025-02-28T14:44:48.713000
CVE-2022-22620,0,0,d7ad2b5ab0664340b1590ca4fd11c5d8cc296fd60da2cb69592f304405aea94e,2025-02-28T14:44:48.713000
CVE-2022-22621,0,0,f64d274fe62db017d3a340f8a8d18fc17ad01dea66a7a94ad96229b65fa87834,2024-11-21T06:47:08.227000
CVE-2022-22622,0,0,096e2e61980549c51cd46b9fbef7cf08515942db2ff08880a7a4a737ef13b81f,2024-11-21T06:47:08.337000
CVE-2022-22623,0,0,7ed1ca6096215ea8485a50fc8cae6d57524f6a37b6c47c50add71b768de4e4c8,2023-11-07T03:43:56.890000
@ -192393,7 +192393,7 @@ CVE-2022-22670,0,0,c0441f67d04e29f04a1c244c888e912d7e003563c05a6c1660033505dca78
CVE-2022-22671,0,0,45e3aec74933aee8afaecb8c21f01fd35faa1ff9c4bcaf50cb2218b868fb9d06,2024-11-21T06:47:14.617000
CVE-2022-22672,0,0,de90c6361fd9a1d97789e7a6ba0e8b7338e0a166d931a68d67a731ed410f90a5,2024-11-21T06:47:14.713000
CVE-2022-22673,0,0,1dd31fddf4bbbc6721841917516f4c12f29743bfe15c0fe0b54786a8e0aa0b40,2024-11-21T06:47:14.830000
CVE-2022-22674,0,1,0fe9c46442247e9df0f83e3153b893fa055caba9dcc4dcfc03ff32c1d7fc7250,2025-02-28T14:53:55.297000
CVE-2022-22674,0,0,0fe9c46442247e9df0f83e3153b893fa055caba9dcc4dcfc03ff32c1d7fc7250,2025-02-28T14:53:55.297000
CVE-2022-22675,0,0,9b73e32495e2758110ec77d708c740d173f90851713a6ca3b25ff6cd4e5c8922,2025-02-14T16:20:32.273000
CVE-2022-22676,0,0,6a65894de3df0ffc1b1b08e57dd9d4bcce3d4b842361847ed8290de73bac165c,2024-11-21T06:47:15.147000
CVE-2022-22677,0,0,56cd059e6c2c7587fd722cd34a2465621c7288dd46eadedfd0cf211c80aa959f,2024-11-21T06:47:15.250000
@ -201007,8 +201007,8 @@ CVE-2022-32889,0,0,e2460844c4ef16c6e6f8104f084d35290ec40172f3f975d6affa0424c61df
CVE-2022-32890,0,0,785b75357f0818483d1cacb0d31d220a8c2994f7a37cf1dc95c6e55ec8b0f95f,2024-11-21T07:07:10.317000
CVE-2022-32891,0,0,64dde404899da7b8a38662bf5bf5c5c622231e25930ce78f0e30e189e29b18b4,2024-11-21T07:07:10.457000
CVE-2022-32892,0,0,445bb66d3cb66bfa52cb3b8f236b40adfc7de6fe48f16d3abd8207d65c213073,2024-11-21T07:07:10.590000
CVE-2022-32893,0,1,0b4cb8917154340a768c6caf746a2afc42f9f1f351bceaad7f7405671ad2a0b5,2025-02-28T14:53:55.297000
CVE-2022-32894,0,1,e113d16169fce5312414fa6207f899046aaa1659cac33c5e4d7ff051354fbb88,2025-02-28T14:53:55.297000
CVE-2022-32893,0,0,0b4cb8917154340a768c6caf746a2afc42f9f1f351bceaad7f7405671ad2a0b5,2025-02-28T14:53:55.297000
CVE-2022-32894,0,0,e113d16169fce5312414fa6207f899046aaa1659cac33c5e4d7ff051354fbb88,2025-02-28T14:53:55.297000
CVE-2022-32895,0,0,43d08342ad442aaa6b2f9df4c24c35921ef46cb9a7757a6ff79496a2351a09c3,2024-11-21T07:07:11.033000
CVE-2022-32896,0,0,c0ac2853331d6a1c5683c215abdb98389fc122489eb770c05070e76281984e79,2024-11-21T07:07:11.157000
CVE-2022-32897,0,0,65b569b40094135fab0a0df9bc0002c37e324af1cb43918ea27c06ef6acc99c6,2024-11-21T07:07:11.290000
@ -201033,7 +201033,7 @@ CVE-2022-32913,0,0,bee6ebe7950503c4671f6b8c49b9b32e763fce1b26b9f5979303d145518fc
CVE-2022-32914,0,0,c93957ac54124f4a82d1596445082069643ca329b8d54de7ac7bd356a462fcc5,2024-11-21T07:07:13.600000
CVE-2022-32915,0,0,78c1645616a106e9a0eb823083738dc505c10bc26bc5fe020d1a9501ef50763c,2024-11-21T07:07:13.737000
CVE-2022-32916,0,0,8420c01847911ab237df6c870db458a29034fb7635c75b8df91dd2656da74c26,2024-11-21T07:07:13.857000
CVE-2022-32917,0,1,7f5afa1ce6d55a936c916cb014cf1771975f898d365ebe6998411efcc626249e,2025-02-28T14:53:55.297000
CVE-2022-32917,0,0,7f5afa1ce6d55a936c916cb014cf1771975f898d365ebe6998411efcc626249e,2025-02-28T14:53:55.297000
CVE-2022-32918,0,0,7b720f0bcde294bb13f1ee5e56b3d84057c2065e51423f73b3abfbf3cdfd97c9,2024-11-21T07:07:14.143000
CVE-2022-32919,0,0,cc19bca16313977b15c101fcc5b17a18fb56353b18bea3d46c6fe4ebd3d2f68d,2024-11-21T07:07:14.263000
CVE-2022-3292,0,0,65c83db42f543a9e9f1e31aa23648b5d7ede84a2f95a828ce9f929872ace9884,2024-11-21T07:19:13.933000
@ -208701,7 +208701,7 @@ CVE-2022-42852,0,0,e0476a217fd31c1483be3c5faedef92147a868042acfbbedc0b4746165316
CVE-2022-42853,0,0,be314ca2e246b5cbd5d648caafe0058f4047aada97f0268096bc52c067d9151f,2024-11-21T07:25:28.887000
CVE-2022-42854,0,0,69b8e36a93fdf0ee869d865dc40773b09a080590f8a161d00ba036b8c8c87754,2024-11-21T07:25:29.040000
CVE-2022-42855,0,0,2438782da0ac107f7acfb77343c237e44eda85c7d815276b63602765d59cef45,2024-11-21T07:25:29.167000
CVE-2022-42856,0,1,3acea9691a0666b002e87c0f351430e2f65b2ede9686b7cae8b49a205b46c393,2025-02-28T14:44:48.713000
CVE-2022-42856,0,0,3acea9691a0666b002e87c0f351430e2f65b2ede9686b7cae8b49a205b46c393,2025-02-28T14:44:48.713000
CVE-2022-42857,0,0,cdcf832ca21268788c00b206c507e4baf85763977b13479d6144d4ecea8b40eb,2023-11-07T03:53:39.147000
CVE-2022-42858,0,0,c3aa949c738e65fc13679e368931fdfbe17d5f10b70e77201c050fac523b7dba,2025-02-11T18:15:20.220000
CVE-2022-42859,0,0,b7c3c34368d49525f8b5113c35fe596dc55c4694a7957ea7631d371197964aec,2024-11-21T07:25:29.623000
@ -218800,7 +218800,7 @@ CVE-2023-23525,0,0,78db85fa8f2d6299275740c679a54c95ef2f505fd0559284dfc708baa4471
CVE-2023-23526,0,0,0b8fc79c9ef40704de6cf82fef3307acffc518a897d2d19bd4accf30ae6a56be,2025-01-29T16:15:36.057000
CVE-2023-23527,0,0,95e09b7643b70de664ad0a17f59b03a1f5ad459216d89c350de15db250b6ebb9,2025-01-29T16:15:36.233000
CVE-2023-23528,0,0,650e9a99e0fd9e60e2db38b8f8e5930d222f449e060a9d63b17dc22d8f595647,2024-11-21T07:46:21.600000
CVE-2023-23529,0,1,0fa8be8a9e87df07f10b0296f82822f7c36349e16c235223bfc0e6bae0ef2822,2025-02-28T14:53:55.297000
CVE-2023-23529,0,0,0fa8be8a9e87df07f10b0296f82822f7c36349e16c235223bfc0e6bae0ef2822,2025-02-28T14:53:55.297000
CVE-2023-2353,0,0,d9677ccf6a1806a366039f2a958d6f73e93758433d611231baea25eb5f519b29,2024-11-21T07:58:26.637000
CVE-2023-23530,0,0,d04c218cad5b3190fc98feca7f327753f411ad97fa4c08572069ca30e03769e3,2024-11-21T07:46:21.827000
CVE-2023-23531,0,0,3a266917c705a24968ab3ed97ec3fdfa65e946f8403a4045383cd7e7c6ffbb7c,2024-11-21T07:46:21.933000
@ -219841,7 +219841,7 @@ CVE-2023-24763,0,0,c65ce0ddbece16da49a908749c30b176c8580043353d7910dfbde6ccf84d4
CVE-2023-24769,0,0,185959dd746941dbdbeac5aa148647daf8dd47d571a410211fc5c1d4bbded74d,2024-11-21T07:48:23.303000
CVE-2023-2477,0,0,c293435cb6cb5f53f7904bcfb67b099084502f313f9448bc884a4e0dce52cc61,2024-11-21T07:58:41.623000
CVE-2023-24773,0,0,1cc31190f570fc3c23b7b2196d6c7eae4d5aa9f41329bb819157d05a69818791,2024-11-21T07:48:23.443000
CVE-2023-24774,0,0,7eafe72f4a7525306c79f6ce362726fff327ac2b01c767e3f25cf9b56332274f,2024-11-21T07:48:23.573000
CVE-2023-24774,0,1,1bd4641ff4eba85584436710e425d7537ccf4e712955c73fafd022f1e56d88b5,2025-02-28T16:15:36.360000
CVE-2023-24775,0,0,b668469f90fa3e9c9678adfb39908c761d3adbdd38c4e1fbc1564403498a6494,2024-11-21T07:48:23.700000
CVE-2023-24776,0,0,de29802d611b377fda64ea3600ecffda20ec3bfaeee35b9a5967cdf2a0fba02b,2024-11-21T07:48:23.833000
CVE-2023-24777,0,0,4a866ff95b4f709fb308f1ed6883b97243dc32bc5395b4fb2599794ee1bd83c4,2024-11-21T07:48:23.967000
@ -222654,7 +222654,7 @@ CVE-2023-28202,0,0,191014a0200c592d291fa5fba60b126bce7fe013f7105ee7dd188bda0cdcf
CVE-2023-28203,0,0,4cb19dbc67823a1f2ef0f3a0d6b749db68c9403e1ae6273e5d0d612a7d2831a7,2024-11-21T07:54:35.627000
CVE-2023-28204,0,0,167d3cc08edbe340909a094ad5b1b69065f8bcf0543f3b516929c5d3da4ef5d1,2025-02-14T16:16:52.540000
CVE-2023-28205,0,0,37b54305c2b3b2e91ff9c17ed58b5bf03ad35fd96c25af1cc3b2329eb3d9fb13,2025-02-14T16:19:28.840000
CVE-2023-28206,0,1,ef1c4702c761ea5b1b4a52d49a8e7f3cb4359ab33625538e11d9132709f785dd,2025-02-28T14:53:55.297000
CVE-2023-28206,0,0,ef1c4702c761ea5b1b4a52d49a8e7f3cb4359ab33625538e11d9132709f785dd,2025-02-28T14:53:55.297000
CVE-2023-28208,0,0,8fc033bc09b7b40815121b04865c55bdd349e84c32a87bcecfbf9bec0bf2a61e,2024-12-12T14:26:18.893000
CVE-2023-28209,0,0,ae4ef08c6845cc374897f4c97156cf6614c7c1aa7babc4b8a598ea53ad27998a,2024-11-21T07:54:36.330000
CVE-2023-28210,0,0,0a0bf3ceb4448c02d2ec01f4d787a866c183ef21b5c4e0a2261156a4b2c55497,2024-11-21T07:54:36.460000
@ -225918,7 +225918,7 @@ CVE-2023-3237,0,0,71364c0269205ecd02331252875cc17dcbb3a3b361f1f83cffee43f697e80f
CVE-2023-32370,0,0,8af836e3f0aa426ccaafc4eb19ecf9bb0673e0f04a6355f18fa9f37c80cdcb5b,2024-11-21T08:03:13.227000
CVE-2023-32371,0,0,2f4c4f84beaa5a69eb96316f215170b842018fba70a0460d227c16b6ae4ad731,2024-12-05T22:15:19.457000
CVE-2023-32372,0,0,3735b4d95466ee316c3a874d27abb685a259a2edfa2f44f9a0507c56a6f3dc1e,2024-12-05T22:15:19.630000
CVE-2023-32373,0,1,bed29a789a0ea3cadbb7b3cbab59d30b0092bd6e1e916abbd3c285f4354d5ecc,2025-02-28T14:53:55.297000
CVE-2023-32373,0,0,bed29a789a0ea3cadbb7b3cbab59d30b0092bd6e1e916abbd3c285f4354d5ecc,2025-02-28T14:53:55.297000
CVE-2023-32375,0,0,363d658b705a2905988a4381992e7e285988cfbbe26cd1b6b8bb78ee269b1a27,2024-12-05T22:15:19.837000
CVE-2023-32376,0,0,95a529e4063990411c2ca53ecf165580bab43c05d8c5d78dd3562ccd8e98cd87,2024-11-21T08:03:13.820000
CVE-2023-32377,0,0,ba36bd37b2f7c1e17d958e1f4d12ab4bfd5e2df22ada13420271f58cb2eaa905,2024-11-21T08:03:13.940000
@ -227453,7 +227453,7 @@ CVE-2023-34184,0,0,2442eadc7f7ae90259cef50a8536ce9bd375108fe6cfeb3ded94765555a83
CVE-2023-34185,0,0,4c5f4bf40def13d12fc3b4e803a32228e00caefcd5ded5fd0047f122b45f0170,2024-11-21T08:06:43.960000
CVE-2023-34186,0,0,4a58da1254a6f379a26c0f12ec76897c53ffd6ab2c992e984b8875d4d20e7c36,2024-11-21T08:06:44.087000
CVE-2023-34187,0,0,e39c35f0acec0e3289c801cedde27704e32b7fc40943aee9626533ee9c30b2f0,2024-11-21T08:06:44.200000
CVE-2023-34188,0,1,96fc79f58f3b6c8bff0be6695ff26cf8292fada645e8527782080a2d07aa1a9a,2025-02-28T13:15:26.103000
CVE-2023-34188,0,0,96fc79f58f3b6c8bff0be6695ff26cf8292fada645e8527782080a2d07aa1a9a,2025-02-28T13:15:26.103000
CVE-2023-34189,0,0,d6ad5f296df91f0114d60cd15059ae984d1803b57558b7a9cf6db063968348f1,2025-02-13T17:16:34.990000
CVE-2023-3419,0,0,df7622509fc0fb525cb2b82180f57ee07af06f367b6c89769e8b9596f2dc8ee2,2024-08-19T12:59:59.177000
CVE-2023-34192,0,0,8e068b263c612b1cfb21e8e741bf1c7c4a21d6b7a2cbdefe2e15a248cfc85c32,2025-02-27T02:00:01.920000
@ -250879,7 +250879,7 @@ CVE-2024-23218,0,0,0006a236dccd6d4040de501ecabab6df2a8d4ae9a8e9999585907fe0592c2
CVE-2024-23219,0,0,b081eba13aaeb24e29a434866a76e06908163fa30bca3b04413807e5b483dafb,2024-11-21T08:57:13.093000
CVE-2024-2322,0,0,b6a3f2a7272ccec85731db5e0c1d24de9d87c1f88cca07a2e8f931dd31cd1f77,2024-11-21T09:09:30.220000
CVE-2024-23220,0,0,56ec6c9a0c3f534e407a25990b76d9f9791ed14187a0ea0d7f9d644c10ee29ca,2024-12-05T16:36:26.020000
CVE-2024-23222,0,1,223e0e058e16e48787a6d33efec0059198ca659684bd4cd5053c30be40ac22ed,2025-02-28T14:53:55.297000
CVE-2024-23222,0,0,223e0e058e16e48787a6d33efec0059198ca659684bd4cd5053c30be40ac22ed,2025-02-28T14:53:55.297000
CVE-2024-23223,0,0,97ac05c5bd628f6060d7675906f33d1fe0db77305c0052816974d888e538e42e,2024-11-21T08:57:13.563000
CVE-2024-23224,0,0,3122876ced1cc8436d3e7eab9ff8a2d8aa1d77b5acc6cd7e0eb039ac24059a35,2024-11-21T08:57:13.717000
CVE-2024-23225,0,0,eb0782fbd39efc0814ff4369aa9a949dffdf3d310db982851067fe25e2177b43,2024-12-20T17:08:54.523000
@ -253251,7 +253251,7 @@ CVE-2024-26302,0,0,fc5638e5f76b6239bb433ea39fb38c5e3b9f0a6c8cdf6356f010d0b303320
CVE-2024-26303,0,0,683c75be030d56d22a80af6c831391a578fbff95d8a5ed04b60b17b6ef840eb2,2024-11-21T09:02:19.880000
CVE-2024-26304,0,0,56bdf39b2fd43778db8cbd7fca5f3445a4b499228769887ce2c61f9a8c917ddf,2024-11-21T09:02:19.990000
CVE-2024-26305,0,0,207af5372c6fc3b0f4dcceb5d80ed2c82c3f5ceac7cdcccb513c596eec6d1c42,2024-11-21T09:02:20.113000
CVE-2024-26306,0,1,c069a5261b9deb6b8139352eeda6c0c8f7c03f1d588b2d0788484ef55f108ba1,2025-02-28T13:15:26.423000
CVE-2024-26306,0,0,c069a5261b9deb6b8139352eeda6c0c8f7c03f1d588b2d0788484ef55f108ba1,2025-02-28T13:15:26.423000
CVE-2024-26307,0,0,7842c4c7922e6571f612e3612dac5d83a0697d8de4e909017d23fbf7e015db1b,2025-02-13T18:17:19.070000
CVE-2024-26308,0,0,16c5a822939dda338e35525cb9f0065373dcf06f18a2e2eeb8c290b5eb87a157,2025-02-13T18:17:19.247000
CVE-2024-26309,0,0,29b65aa638465aa8c64d469c75ef0651a7e59224972ac32d6818f20d170c6343,2024-11-21T09:02:20.667000
@ -260724,8 +260724,8 @@ CVE-2024-3604,0,0,0c726ac283946631d580b3ea047d73595adcfa6f29e4d6dd86387d266f76d4
CVE-2024-36041,0,0,4161ec03e4910e4c5c5920c414e1b3c98759b0d09bfd41e398f897b3d9dafc1c,2024-11-21T09:21:29.970000
CVE-2024-36042,0,0,dd61539a28198f3c8b42fd4591e0a6d17418212950f931fea78e92fd4e6935c4,2024-11-21T09:21:30.217000
CVE-2024-36043,0,0,00a1a26002231c8d734c9833d45a24991429b502146d23df3d35da93eb56d40a,2024-11-25T18:15:12.213000
CVE-2024-36046,0,0,a71f9d1ce14296660706291dadd5521ea62c73b042b976b441e24a15402db92d,2025-02-27T23:15:36.953000
CVE-2024-36047,0,0,7264120aaaa6fc94b5c29d6436880879d0b64d1b7aadf156a698ef3f6a9f8070,2025-02-27T23:15:37.040000
CVE-2024-36046,0,1,e0f89ab571addd6ccc0a13c28f0987d8d3a2bdf98f6b75fa4bcb1f70cd9694d0,2025-02-28T16:15:36.987000
CVE-2024-36047,0,1,7e66dce3cf964e4f7a2d27e530fbb169401596667aecd9fd25058c0304521c6a,2025-02-28T16:15:37.137000
CVE-2024-36048,0,0,6b6c5fd388f3c5986f4cdf4b3e4b8816859ba03c7b47f889f37c2525cf73f654,2024-11-21T09:21:30.610000
CVE-2024-36049,0,0,f9b51d86d685dfe1d063607d35006d32c1c838354d8d3473b5b37799f50e9f38,2024-11-21T09:21:30.857000
CVE-2024-3605,0,0,0fb02c5cf2e5e4c98134033d37fca28c8f48589ec9fb82d576232d111aa1b2cb,2024-11-21T09:29:58.370000
@ -260922,7 +260922,7 @@ CVE-2024-36254,0,0,e9eafcb361359443ec23018fb13cf39a1d587f64303e68124435b0bb015f3
CVE-2024-36255,0,0,d7e6d38e036e0f497734a7d5973895ae99eae13fe8c3484186f7badc29b2f6f4,2024-11-21T09:21:56.730000
CVE-2024-36257,0,0,cad58f98b66417c7e60acb567f2e31a3e51b4ce6df93624519b9df82a7eb74e2,2024-11-21T09:21:56.843000
CVE-2024-36258,0,0,9cc8c4c4751ce585d0e2c1f7f3567f7c439f589095db18218e1b06914b868919,2025-01-14T16:15:29.250000
CVE-2024-36259,0,1,c607010f6bcd435299e92926ca57c078daf8730201372f203296f67e0bf5aa48,2025-02-28T13:35:22.340000
CVE-2024-36259,0,0,c607010f6bcd435299e92926ca57c078daf8730201372f203296f67e0bf5aa48,2025-02-28T13:35:22.340000
CVE-2024-3626,0,0,78aad9ff73ee6ab23b960b55469d89a68f0d505ac995edf1a620964e508201ae,2024-11-21T09:30:01.217000
CVE-2024-36260,0,0,b666f10d8bb05b7b6ced715e15f1322e5ece66bcfb203e66e5a571b76c472ecd,2024-11-21T09:21:56.977000
CVE-2024-36261,0,0,f5ff682881b9b6abafdae2b09997e2a3b3a9cf4a5388d69f9f28f1bab883cae3,2024-09-23T14:16:44.273000
@ -262002,8 +262002,8 @@ CVE-2024-37562,0,0,5fff92160e9f180d6fe1aded48520e5c6ac7153a661594f79b08cd1a412b6
CVE-2024-37563,0,0,d4e514fd48c3dba41649f3e92a70b0fc3d03714769849d8f74d1af2737d1f75a,2024-11-21T09:24:05.057000
CVE-2024-37564,0,0,5e5d8deb79ce02d4743630e479447f7c70c69d56d6a449fdd936c029fbd20c0c,2024-11-21T09:24:05.177000
CVE-2024-37565,0,0,bd3b0fed28622fea5585bed01c88dfdb2958196d65cd20b1a612d41bf69c1081,2024-11-21T09:24:05.300000
CVE-2024-37566,0,0,afc84a078a0a9b0218b76c2095d0f3cbf51cacb2a19f425267ac8a51241b2229,2025-02-27T23:15:37.130000
CVE-2024-37567,0,0,37373dfcb2cafd40454d28a85d4fe7f5b87c2e25faee6c6b1ee95dc38f4850da,2025-02-27T23:15:37.210000
CVE-2024-37566,0,1,d7487614f1383b8e2d54d9b2f7eb4177f926ae1fbac788241489dfbdff3f5970,2025-02-28T16:15:37.287000
CVE-2024-37567,0,1,095a22db77c4c3bfe2298e23cb9487c31d572f438204db0208873abaceb7a794,2025-02-28T16:15:37.440000
CVE-2024-37568,0,0,856c439c12dc3c079f8f1ff58d753340540c2c4d1ef54b75ce0508c5a8fc3e4b,2024-11-21T09:24:05.420000
CVE-2024-37569,0,0,8791820124a473aaae0983330573ab7c8bbd9a5bcb0565b37b2d1bf3d3a92c7e,2024-11-21T09:24:05.663000
CVE-2024-3757,0,0,3b15c3daf6ad6b887b44ee124913c1fe2d8b6654e23c894d9fab65c313615142,2025-01-02T19:05:19.333000
@ -264427,7 +264427,7 @@ CVE-2024-40891,0,0,cd384657f2d111008bfd470fb69eb7ea4bde608b2882d3a0b77536f9c9b56
CVE-2024-40892,0,0,0bef0c096de1fd9b74596dba063b1cf9ffb172ff0abd417611d342278b46245f,2024-08-21T18:15:09.710000
CVE-2024-40893,0,0,291c1cc414cfaa66f88e6f282a2cb52f9787a1f732797e904eca670adbd8e574,2024-08-21T18:15:09.803000
CVE-2024-40895,0,0,9bfbe451c0a62cc469c348ecf829cab564e06b39ab7ab75fbb9a00c7abd49483,2024-11-21T09:31:48.250000
CVE-2024-40896,0,1,5f7e6fd9c2c31c970118899766d9c516bac9322b2c6c87abac48ef256bc3de22,2025-02-28T13:15:26.640000
CVE-2024-40896,0,0,5f7e6fd9c2c31c970118899766d9c516bac9322b2c6c87abac48ef256bc3de22,2025-02-28T13:15:26.640000
CVE-2024-40897,0,0,5de984c0ce0b5f00f148c2d87f9ba7398ed21388187cb055a9d01cc9ee9adfcc,2024-11-21T09:31:48.450000
CVE-2024-40898,0,0,b930bfc2025b86aea21c8f0fe9e9b6f374f54a09bbb3f9c81abb259ea87ff81c,2024-11-21T09:31:48.670000
CVE-2024-40899,0,0,27efc19ced00bac32be0c727e443e10ff312f5514ad1f8ef8ce233abd9e28b76,2024-11-21T09:31:48.870000
@ -264789,11 +264789,11 @@ CVE-2024-41320,0,0,2a8260febdf4182236d26585f89ccb09d753292e86d39cca719b36642a7c5
CVE-2024-4133,0,0,b3ef04d8b613050399a6f1883ffb08523c57dc187e5da232762cb73f9e44251f,2024-11-21T09:42:15.257000
CVE-2024-41332,0,0,cc02f33b74ee2fc09a400d920f2e51c2c74d8736b4d9412bf001181512ef987f,2024-08-21T18:53:15.927000
CVE-2024-41333,0,0,5d0a608f5ba280f35dd905d53d7227fb5786301ea98916e97e2bbf00edad40a3,2024-08-07T20:54:44.060000
CVE-2024-41334,0,0,5845fe9591167f9c467f1e510f13acf10e81dcd2a3a31ad8ab264052c9baab6a,2025-02-27T21:15:36.483000
CVE-2024-41334,0,1,19fc7d796046d537baaf3e290ebf897dd5658e944e3500f513adc9003711ac13,2025-02-28T16:15:37.587000
CVE-2024-41335,0,0,d3ee5339fa03fba2a5866f9228ee1228004e295e13e06cb78bf5e379f057c8b7,2025-02-27T21:15:36.577000
CVE-2024-41336,0,0,016781541090851745dba8109086c189ef3dfbb0254c6447a98713589cf6b08a,2025-02-27T21:15:36.663000
CVE-2024-41338,0,0,b47e2008cdd659d8f0cdedadff0bdbf2a4bfe032a7e5b7a1018561a0077dea9e,2025-02-27T21:15:36.753000
CVE-2024-41339,0,0,1e4104fd36d7ad7e931c61df1818c76e0ae50dcc9a248e4d0ad045641b8caa68,2025-02-27T21:15:36.837000
CVE-2024-41338,0,1,e56ba6eccb1f913832538e27e67769c5e8bccd2807f995ee0dbd29477021d2da,2025-02-28T15:15:11.727000
CVE-2024-41339,0,1,95fa126ce7ca6eb431bde7c3eaf6536eeaddf344a24f0d3796abf61ab7720cf0,2025-02-28T16:15:37.737000
CVE-2024-41340,0,0,5fb432a505b386cc70f2c3d152557019cc679584cc3504caf8f640cd7a854646,2025-02-27T21:15:36.923000
CVE-2024-41344,0,0,c38269b43014f5cca22fcf4afc82639c77f2b3bf5d57b1fd1305828277d7aa4f,2024-10-16T16:38:43.170000
CVE-2024-41345,0,0,8a6a87dfa4080752a61cdb78a92bacc8a547bb5d8e3779dd7c2648fc92fcbe83,2024-09-04T14:17:57.747000
@ -267372,6 +267372,7 @@ CVE-2024-44739,0,0,6f14d5eff3dff89834977a4432c417b1af61a4ec23be95658eac014ef024c
CVE-2024-4474,0,0,fd3fa0366486b2defe9820ff505cd8868a6d31d4b6c81237532989ab734a6a29,2024-11-21T09:42:53.833000
CVE-2024-44744,0,0,13a864504cc5ddf6bb42dbaf6270143c0dd06ca1a55cc37045e7ac3ebdba96ae,2024-10-04T20:15:07.203000
CVE-2024-4475,0,0,72508479edb36460622b89717d4eaedb904c06449d7fa7d7ad28501bc5167e0b,2024-11-21T09:42:54.027000
CVE-2024-44754,1,1,51d8884ed60ddd5196cae74aa10aca836e313f5c9ccc9d407e3c2204d4dcafbc,2025-02-28T16:15:37.883000
CVE-2024-44756,0,0,3cc662834a62f0e83640a2f55cde38782fc1a331b2d6e5bee47b1efe435ee06c,2024-11-21T17:15:14.863000
CVE-2024-44757,0,0,d9a510bb1d7c1043adeeb88a2b183cdf042cccdbed8ccc72bbec6278713deeea,2024-11-21T17:15:15.110000
CVE-2024-44758,0,0,0f87f6fd64cd3ee32a39610ab34845e08d64c79e468acaf8dd1c0a562c908710,2024-11-27T18:15:13.007000
@ -273562,7 +273563,7 @@ CVE-2024-5338,0,0,abd3cd0960193de57487be3582f664d37ab06a1518c59aace36e92f8c263b6
CVE-2024-5339,0,0,710abf6b65aa86d6904f8abe1101ad889bace87733c06f79ec2fe20822e1db4d,2024-11-21T09:47:27.133000
CVE-2024-5340,0,0,2c2fba286498156a3309f1d9db161c67194b50596b7c53b6a9c7d8df9b89917d,2024-11-21T09:47:27.263000
CVE-2024-53407,0,0,028a3e4d14bfc90eea9cc0c6159117f08c823fe19cf4dd25d6c1d6ae5f9691c6,2025-01-31T21:15:10.213000
CVE-2024-53408,0,0,fad2504477aa5345271d8863f19e55b9d1c9b4f8952b0c3b4bfd093802e01e07,2025-02-27T20:16:01.790000
CVE-2024-53408,0,1,bca41a6c9a00b3326c58a5e4ef803bf4bc97e2a577bf3cf6dac35f1dfb354578,2025-02-28T15:15:12.317000
CVE-2024-5341,0,0,65ff8689965c5e29ef124f69d82afd0c059edc6db5694aac65d8224f8b995833,2025-01-29T18:09:48.960000
CVE-2024-5342,0,0,c19ccffd3ff364daed28ff3ce4f3e63c62c97b909f79a312d9891c60f97a9cce,2024-11-21T09:47:27.517000
CVE-2024-53425,0,0,dba41ac0d03c322e076798942c48ad94ab227d8220eb1e3a3534e4bdae7c6815,2024-11-26T18:15:20.090000
@ -275645,7 +275646,7 @@ CVE-2024-57022,0,0,7e42a0eaca76fdaf1f44229827afe4be716bd161a679aa735bbcf9243657f
CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed7380a6,2025-01-21T18:15:14.677000
CVE-2024-57024,0,0,dd6768df4410fc37cc8c4e8a948bb715a9d72db959034294e4bc9c1d5752aa77,2025-01-21T17:15:14.723000
CVE-2024-57025,0,0,ba6eba255be4ec8bea25a2cdeb615de849af222ae85f044e2a8f32f3b1f8d1b7,2025-01-21T17:15:14.910000
CVE-2024-57026,0,0,0ce7da422e56efba812503b0c89672f64eb9f586762377d6e2bc6a8033301fbd,2025-02-24T18:15:19.023000
CVE-2024-57026,0,1,7bff9bc334b5d71c0a05dc5a9ea9ca7494445d26ebc88d7cd3f4e9846c368395,2025-02-28T16:07:41.847000
CVE-2024-5703,0,0,3d28349807701c555fbb2ea67def24c228f00e38f4a4f9bb2c70209ffe7ffa47,2024-11-21T09:48:12.467000
CVE-2024-57030,0,0,01cfe55aec58900b151b329d4f4c994ce5192423d15550098a7bc9a4f1082c3b,2025-01-17T21:15:09.823000
CVE-2024-57031,0,0,1d859728d6d66a6bcfe5da6cfb404ff9c10a4846f51b5dd74817dad1e9184348,2025-02-18T21:15:22.993000
@ -280037,7 +280038,7 @@ CVE-2025-0391,0,0,ab8f7905746a492810fe86765faefb1fff997fc4d75bb4be776d20c58a3559
CVE-2025-0392,0,0,59785954f613ac3d294944412df9ed2ed102ba9c9ed7f965ef5916a645263c65,2025-01-11T11:15:06.657000
CVE-2025-0393,0,0,959e820d75bdf7a4a4738ade5c663f0e8ec388ca0f6b468cd52102afbed99998,2025-01-14T09:15:21.263000
CVE-2025-0394,0,0,8af05602da319139a083fa2a7a4d905dc508d9028abbcf98db5f09623dbab6ca,2025-01-14T09:15:21.430000
CVE-2025-0395,0,1,6c0480d65cb32616c80fd0c8d1f7a5f562f82dede6c8f4e1992556d40f947f0a,2025-02-28T13:15:26.860000
CVE-2025-0395,0,0,6c0480d65cb32616c80fd0c8d1f7a5f562f82dede6c8f4e1992556d40f947f0a,2025-02-28T13:15:26.860000
CVE-2025-0396,0,0,18d39e6a7adcce3603c1c0aa9eb8543815bc0fec0a28cf7987d5debab0b3fa41,2025-01-12T12:15:17.963000
CVE-2025-0397,0,0,08feac0210d169d6c425c3e514046442ce8702b1c9bf4c395a52e3132e842759,2025-01-12T13:15:07.333000
CVE-2025-0398,0,0,4dce72a8ed9b3c643da849528d4f1f4a44373786b63fbf729a0e8a57af35dcc2,2025-01-12T14:15:08.993000
@ -280585,9 +280586,9 @@ CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813
CVE-2025-1293,0,0,dbd776d425a4170ebc67e8f467d76fdb1a678c6cc6717d2977a3876685bd7d30,2025-02-20T01:15:09.950000
CVE-2025-1295,0,0,675204ae0772f088026fc7f2412f8ab28c43fc8efc072775299de73d53b5b7cf,2025-02-27T06:15:21.990000
CVE-2025-1298,0,0,3dd2689cd87b723cb3286c5171c05d1ec556a4e424788772bb6ebd63733b94f4,2025-02-18T15:15:18.007000
CVE-2025-1300,1,1,8af8030eda5bcffd3329ecb9ab76f19bacf9a248f66c16097998067a1fef5ddf,2025-02-28T13:15:27.043000
CVE-2025-1300,0,0,8af8030eda5bcffd3329ecb9ab76f19bacf9a248f66c16097998067a1fef5ddf,2025-02-28T13:15:27.043000
CVE-2025-1302,0,0,c9edda63e4b129b83e4ee90ce332b54101d53accd5dbf791a7e11f6cb53d7bf8,2025-02-15T05:15:11.683000
CVE-2025-1319,1,1,5e2010b65b7a6bd1939d4ac58e8aeeec8f3a828211b9c76b062b0f9265a18963,2025-02-28T13:15:27.267000
CVE-2025-1319,0,0,5e2010b65b7a6bd1939d4ac58e8aeeec8f3a828211b9c76b062b0f9265a18963,2025-02-28T13:15:27.267000
CVE-2025-1328,0,0,e2b9ad996048bde72d17ec9a6affa826b875b275e51ef749199b511eae0ab088,2025-02-25T18:03:46.410000
CVE-2025-1332,0,0,b2a219041cab0c781fc3ed1f60bdc8b61e41c001aa3e4702ba19a1eecd971a1f,2025-02-16T01:15:20.440000
CVE-2025-1335,0,0,dce25ef764e2aa650c44558ad3d713b3c94597288267c5643fa1900c1837549c,2025-02-16T04:15:23.230000
@ -280752,15 +280753,15 @@ CVE-2025-1742,0,0,739398478edc9ddece71d3399efb7eaab9bd1f42fe6e327305583b23ec5e53
CVE-2025-1743,0,0,f420185c057195d1e0f14c6168b6487602fc3aa63e73bf5c979d7d5fa960e55c,2025-02-27T18:15:27.650000
CVE-2025-1744,0,0,5a87ca10a34bf3a6ed6260577bc3c3361cf00a88203a3dbaf734b36322e0f166,2025-02-28T04:15:09.603000
CVE-2025-1745,0,0,9e47846683e7157da502ac5a77516ebab38eebca4e7114c00a2b8bf268b0ef4b,2025-02-27T18:15:27.923000
CVE-2025-1746,1,1,4905eb9ce171b9c84f0ff4567ef4516b1dd01329de2a1281f5ad3cb7c808213b,2025-02-28T14:15:34.943000
CVE-2025-1747,1,1,38667c313ae87dcac8801e920436cbf9de91b6386d76a94491b207db04add630,2025-02-28T14:15:35.480000
CVE-2025-1748,1,1,9b3a786baaed5e1fea313e703ce5e17073f371e2ecf60737ba15e35e65e984f2,2025-02-28T14:15:35.617000
CVE-2025-1749,1,1,dc52a2408e4b367b9ef9e6396ecbc738757ae1c437d9b5265de79d69416a00f5,2025-02-28T14:15:35.760000
CVE-2025-1746,0,0,4905eb9ce171b9c84f0ff4567ef4516b1dd01329de2a1281f5ad3cb7c808213b,2025-02-28T14:15:34.943000
CVE-2025-1747,0,0,38667c313ae87dcac8801e920436cbf9de91b6386d76a94491b207db04add630,2025-02-28T14:15:35.480000
CVE-2025-1748,0,0,9b3a786baaed5e1fea313e703ce5e17073f371e2ecf60737ba15e35e65e984f2,2025-02-28T14:15:35.617000
CVE-2025-1749,0,0,dc52a2408e4b367b9ef9e6396ecbc738757ae1c437d9b5265de79d69416a00f5,2025-02-28T14:15:35.760000
CVE-2025-1751,0,0,e01d857b710fac9b7b6217b59ced116e365117c6a164f06207b3b6874d6bb32a,2025-02-27T12:15:35.030000
CVE-2025-1755,0,0,022c1cdfb96f9a1d1782ea7a255dc456cf2cd5b57b21fa0b4b69f69925763fae,2025-02-27T16:15:39.137000
CVE-2025-1756,0,0,20464066b464a87a383feb7ebdf7bcca2a5e74a3cb642d459cada04b2b771e8c,2025-02-27T16:15:39.287000
CVE-2025-1757,0,0,2561a8f5c53734c028e83a6bda94ef29e169c9eb7376cb65d67bea6c6b2880de,2025-02-28T05:15:34.097000
CVE-2025-1776,1,1,1a12423b233b2ef4ba69976c3f13498310a33efb7f09102cfb934a1191ac53f0,2025-02-28T14:15:35.943000
CVE-2025-1776,0,0,1a12423b233b2ef4ba69976c3f13498310a33efb7f09102cfb934a1191ac53f0,2025-02-28T14:15:35.943000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
@ -280907,29 +280908,29 @@ CVE-2025-21179,0,0,56c99027ad0d41d9c697e46ad29c10aa7c65635cadb6d982db31f0458c99d
CVE-2025-21181,0,0,71cd8e17f304081f3c6b0247ebefaddfaa4c353fcd560fa012fa60a9c60bf6bd,2025-02-25T16:58:10.650000
CVE-2025-21182,0,0,cc183a741d3d0b62fc82a334158a2ca4fdae6dba068e1b2b22a750e1789b8393,2025-02-25T16:59:25.820000
CVE-2025-21183,0,0,97c60133d935bc6f85808e271daf514b07d577c1754cf44ed14ffde224dc4835,2025-02-25T17:00:06.170000
CVE-2025-21184,0,0,176160e0714d2f36cd4fbe06ebd53804dcc2c0a32ceb6ff9aa34164d56b4a8be,2025-02-11T18:15:30.180000
CVE-2025-21184,0,1,5d06730c00c1dc25128c9225e356567d097b85e0f2f5db86ef3a5ca868f045e8,2025-02-28T16:02:50.353000
CVE-2025-21185,0,0,382559bc0e85e942334285c772283cee8d0ca5a4b02a81c52925c66dc4c27526,2025-02-07T21:06:14.873000
CVE-2025-21186,0,0,8a8ba48b87441215f1c43ede85a3e2813061bed74393786f63526fd639d8d046,2025-01-27T18:42:32.637000
CVE-2025-21187,0,0,05994f278acb907e9de51acc1037aa859f6c5afa8dace166ad321c325a389481,2025-02-05T19:14:06.093000
CVE-2025-21188,0,0,d7b111ff774208de399abaa7106629ded0401669785b4e7d276976a329fcb4c6,2025-02-11T18:15:30.403000
CVE-2025-21188,0,1,b31daea4bb469ad7d6730cf1515cfeaf51d8ab46128508537630adf914f3c6d0,2025-02-28T16:02:50.353000
CVE-2025-21189,0,0,329c5c7b58ec66de4b6d9cd35e4d5fad7c108585bdc451001b100691c802e6da,2025-01-27T18:42:24.057000
CVE-2025-21190,0,0,07646213243484771acd05c18315f79affbd3ab1f88425845bb63026f32e5249,2025-02-11T18:15:30.610000
CVE-2025-21190,0,1,8b2db67cb947998b5b47f9d8f9638f01b53bd9f51551def40a37a7298cc49d1c,2025-02-28T16:02:50.353000
CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000
CVE-2025-21194,0,0,4cbf78ebc8712bf991c571b0aba8e62887ba280acbf4ff53a1e72f262be2e98d,2025-02-11T18:15:30.820000
CVE-2025-21198,0,0,30ced4bcee2342c009365afe74226ad51767dba5f3716858f2213f4790dc210c,2025-02-11T18:15:31.020000
CVE-2025-21200,0,0,6ab25dc0f13c1b559fcf2fc559f0570c61cd1162be881ce79b488a4181e69ae1,2025-02-11T18:15:31.203000
CVE-2025-21201,0,0,d2413a74168a0176b2012cd098348307d5637137afb19e0de2733c18dfa6d511,2025-02-11T18:15:31.407000
CVE-2025-21198,0,1,222e32f01b9e38e4737a53b6906c9486a61c90514139fa02b4604a18d9475dfb,2025-02-28T16:02:50.353000
CVE-2025-21200,0,1,ac452cf5d8fd7ee078abc4bf9e8393b61bfd7da4b4c1364b02d5f65241a430a0,2025-02-28T16:02:50.353000
CVE-2025-21201,0,1,33cb4b63d3221b6237489bbb3ee9e268d6b471a2dc92fe795430f2b500e3c69e,2025-02-28T16:02:50.353000
CVE-2025-21202,0,0,ec4260bee4bd33c21d930aa9c88a20abd99a3045b6128e76b4237cf160037447,2025-01-27T18:41:27.647000
CVE-2025-21206,0,0,a02355978bda2794140bd082fd4bb1ad68e34b4630d7bec026a9c3c3f9e70073,2025-02-11T18:15:31.610000
CVE-2025-21206,0,1,30db180b922f51f20ac3dc612188bb7e771e65f4b8b0475b70dd344d2e79140d,2025-02-28T16:02:50.353000
CVE-2025-21207,0,0,101f5aedceeec8e95c7aa4d154c4fe35b53d1787f61e5e9c69598a5be6aa3415,2025-01-27T18:41:10.137000
CVE-2025-21208,0,0,b0a53ebd1070215b1bcd39c99be1f27e3e7b9ead96e6fc3a22f33f6cf9aad8ba,2025-02-11T18:15:31.793000
CVE-2025-21208,0,1,d6750a7a531b1a606c0d78d60d369b1fb895e79f9d7f1a5bd19ef4a9dbb91db7,2025-02-28T16:02:50.353000
CVE-2025-21210,0,0,c84a831bc35a18a87ded790fe8b815dc0d44394e8c6c6597dc3d56e3ec20caba,2025-01-27T18:41:01.470000
CVE-2025-21211,0,0,50fa81ea05a4c3005f4b83063356d13451968ba8d4fc749bb0a7fe76cb440e94,2025-01-27T18:40:51.233000
CVE-2025-21212,0,0,aacb1bf84eb558b2bb4a198390eb40b2a485f936654ed11ea4df089503cbb313,2025-02-11T18:15:31.980000
CVE-2025-21212,0,1,c3cf3d27935b08b1f99386820b4127d20504a527c2595f60d30d4416e217289b,2025-02-28T16:02:50.353000
CVE-2025-21213,0,0,528a66554547e026ef0c9b0b0fa09fbf1c8980822bfea86508e8a2b2b44cab58,2025-01-27T18:40:41.820000
CVE-2025-21214,0,0,b4b935621385a9108dcb42d4939dc75aba798e00e57001b21bdc03438f9edeb9,2025-01-27T18:40:22.427000
CVE-2025-21215,0,0,d2a7a3bab7c47b0d09e64e875649c7b8760c68d5eb2f91a478aa121dc7ec1b54,2025-01-27T18:38:36.757000
CVE-2025-21216,0,0,0cbb9ca36d7650fef5802048880f5ab67aa53da9ffbd219a6bd893857b2720e2,2025-02-11T18:15:32.177000
CVE-2025-21216,0,1,45d1d7bd112ffc38f5b77d54190bb31c57f5b75d109c891f1f43e2ff5b3e1337,2025-02-28T16:02:50.353000
CVE-2025-21217,0,0,2a656e5f5fc07b78fa6836e5f8dacc4b8751a0a02e8cf075d2e4f1e57fc95b19,2025-01-27T18:45:20.030000
CVE-2025-21218,0,0,d47e4e79318ebd737fa658b56f12e5fb3e30018465210b7af2b0de06c0f4fa6e,2025-01-27T18:46:14.487000
CVE-2025-21219,0,0,424604839da721e4da825bd88d64a2416b0606f77e8b9a1190e69289c7bcf87d,2025-01-27T18:45:30.370000
@ -280964,12 +280965,12 @@ CVE-2025-21250,0,0,4e89a566438f1e28e8838350c59192f7c8bae0fa09d47d1f5f0f32355a4e8
CVE-2025-21251,0,0,5440266405ae4f5a1eea13ba92fdc75258561cea9d4f2a0de5b103c45023d533,2025-01-24T21:54:57.333000
CVE-2025-21252,0,0,6055e1c3e54e765508a0901e6591be173ca3b23ac49a425f1555d0244d559b99,2025-01-24T21:55:05.360000
CVE-2025-21253,0,0,998ca5933add3987f50ef40acf3b400fadb9546f5a2e9bc579c9e6ccaab029f6,2025-02-11T22:18:40.563000
CVE-2025-21254,0,0,4bea76efb0bf23622a0abec3d73b3f9e14acca1cd80277710ecd589ef6304774,2025-02-11T18:15:32.450000
CVE-2025-21254,0,1,910332dc041760d9bcacf4b45917e760de978adbf1ed3ea64c0f0eb9de810eb0,2025-02-28T16:02:50.353000
CVE-2025-21255,0,0,8f8621218daa5ece83eff9b164b167c141187b12e766fb110978adaf1f9c2e14,2025-01-27T18:48:06.630000
CVE-2025-21256,0,0,046fe33676648d49ab958cea06795409b133ff67b2e397e47021fff2b0522138,2025-01-27T18:48:24.467000
CVE-2025-21257,0,0,a4aa8eb764428591988a4a9138451d22d056f236bcba642d77cd9ec1175f53f8,2025-01-27T18:48:34.057000
CVE-2025-21258,0,0,1f595e4730f0a0101ec7c6ff9cdba409af8fa944714e620a4a15245fbce00d59,2025-01-27T18:48:41.780000
CVE-2025-21259,0,0,d7b0093a133cb996a3cdc94dbca5e662a9f75469a51e68e8653813fca7fcf142,2025-02-11T18:15:32.643000
CVE-2025-21259,0,1,8612071202f3d3592dfe29f2bd8e2314128424dcfd6444cf3765d46d69eb3ffb,2025-02-28T16:02:50.353000
CVE-2025-21260,0,0,0a7c1f91b0bf465a1abd98448dde131c6cb51ed7e169790e660636d55e49b3fd,2025-01-27T18:48:49.733000
CVE-2025-21261,0,0,4959e566283cea5c3896dc096def632c73bb2ea004186a297dc44c88399b27c3,2025-01-27T18:49:17.243000
CVE-2025-21262,0,0,53158e77111cde0b4bd12b84c347b79f0eb1bff1360ae5aad148e2597a850e89,2025-02-07T15:18:05.707000
@ -281031,7 +281032,7 @@ CVE-2025-21318,0,0,5ff3710adc6b941daeb26737ee7866486d9c863941517d982a3a97a2f0786
CVE-2025-21319,0,0,f438a23881d0da34e77dbbeb756804186ca74b144b3c3080f26cf29fa51052e5,2025-01-22T14:44:50.860000
CVE-2025-21320,0,0,2bf5b9d6da8e13f0983ed08dc9cf0a61539e484ef9e6c51d78636785e0ee89e5,2025-01-22T14:45:53.317000
CVE-2025-21321,0,0,d4d04e43c9c7fb6525f2965fa6daa0b0763cac5e81f6f3f0f13b65d580f7df1d,2025-01-22T14:46:12.787000
CVE-2025-21322,0,0,36afae68f9b6dac0a27406f76009dfe495c605cb1fe6c331fac0678ef1b2abae,2025-02-11T18:15:33.027000
CVE-2025-21322,0,1,a36700e623b7042775efcb047c6ac1b4f686ce001f46283148f214e3a99ff95a,2025-02-28T16:02:50.353000
CVE-2025-21323,0,0,3579efad4e0f21cb5d5e10181ff8bd15434d6e106723a06738697ae24cf26962,2025-01-22T14:47:11.963000
CVE-2025-21324,0,0,c2e9c6050aebc2d5fce46b1fe10ad3769c28070faa9ed2d2a8db1006deedf2a2,2025-01-22T14:46:51.207000
CVE-2025-21325,0,0,1e9ac8e59ea270ba0213d9228cab1f528312c5bc6be8058bf3244a2b7017b22f,2025-02-07T15:21:31.407000
@ -281046,7 +281047,7 @@ CVE-2025-21333,0,0,53b6f65b92792d651bc7343d317ec8018ad636151aaaa8a80fe15ca3226ca
CVE-2025-21334,0,0,fb3df3a0d1648467aa7e0321fb13275462a742bb7a179f1f294e1b9cdb3727fb,2025-01-15T20:10:39.600000
CVE-2025-21335,0,0,9c773b3c3d2aec7a248b923a70e5a9419e37d3c58c810c23379a419aae9b4597,2025-01-15T20:24:16.867000
CVE-2025-21336,0,0,b7a7af21654de5ea168378d332a9e476f7d93ade46bf5317196ee40a3fcc1e43,2025-01-21T20:06:35.720000
CVE-2025-21337,0,0,3c3423720bfe0d3d5072f95cc233449f86d4cbb35a1665fae8eb0916093a452f,2025-02-11T18:15:33.217000
CVE-2025-21337,0,1,4ecd6e025d7ebaf7e8da468d73429ad6ccf72512bb4d690335b019c7f0ef0c4d,2025-02-28T16:02:50.353000
CVE-2025-21338,0,0,ab086dfca1b49b499ba269066d1300889796e4ccce139b627f3e11f636e5ba00,2025-01-21T20:08:44.550000
CVE-2025-21339,0,0,442e09cebfc2b51a14d5657fd8bad9e56aae7d3e9ea789a26fb84dd1f483d156,2025-01-21T20:11:14.430000
CVE-2025-21340,0,0,47a95b98bc1be24a98506d39df5e3299bee8f816a1a17f7db6df116c0f66f94c,2025-01-21T19:46:40.997000
@ -281056,10 +281057,10 @@ CVE-2025-21343,0,0,0e6138632cbd4475bd4cf71380d93c68f5d11ac4e740335bf785ce7eae137
CVE-2025-21344,0,0,77d0aae01883902f81c0082b1fd6e206aef82974cb0e1c18fa53c6191a390b22,2025-01-21T19:51:39.647000
CVE-2025-21345,0,0,ac230bebff6a1de687bcf2e0076c3320e327f5480e428ca1278d4856df31bf4d,2025-01-21T19:52:00.833000
CVE-2025-21346,0,0,6da1a91fd51d1c7f9efc77c3676ffc0110c4bfd2b3a26770e9ad9795c951b9d8,2025-01-21T19:29:19.320000
CVE-2025-21347,0,0,7d247979bf64f9ac010be1587545cceb03684f90571ae4a0b943cddb699e58dc,2025-02-11T18:15:33.497000
CVE-2025-21347,0,1,8cfce27db856ce3eff69887f010f026ad9562bd729925a63d44c80288ecaad45,2025-02-28T16:02:50.353000
CVE-2025-21348,0,0,36348027e40942c567c69f35820a402c8269c98d7a09f418c29d2484864f7193,2025-01-21T19:30:06.410000
CVE-2025-21349,0,0,6d368976201e52b2580e8a9496c7d5c8b2e92a3335a67efb6eb9f1e83d33b8cc,2025-02-11T18:15:33.697000
CVE-2025-21350,0,0,afdf915978914de12ddb47f8080382e5c3b27b9e602062b6fd9ccfc1c9cd23c8,2025-02-11T18:15:33.903000
CVE-2025-21349,0,1,db46bd1602eca8cc8efcbc08138ac4fee6a0023cf9b4457ce7e79e213146e7e0,2025-02-28T16:02:50.353000
CVE-2025-21350,0,1,946270e0dd658c25e6baa6b79bc8dec8ca08afc3ec5969e08e7326bdd4ced332,2025-02-28T16:02:50.353000
CVE-2025-21351,0,0,48fcf1f43b1c92276907ee87c085abb066108b8d3a5f6a626a70e01ac00f8d1a,2025-02-11T18:15:34.113000
CVE-2025-21352,0,0,a81d34aef4d981cd5666fd3fb8eca70146e26df755619e866a1140df31ff66cc,2025-02-11T18:15:34.310000
CVE-2025-21354,0,0,a598469cd8d9ca843575d2e14e67ad4c30737103b33f7ba5ce5c1e4d9ea266fc,2025-01-21T19:36:51.650000
@ -281476,11 +281477,11 @@ CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f85
CVE-2025-22264,0,0,79177f17455e861265910dfa8dd2caa5a78c248a179fa18c3179e839e36cde00,2025-01-23T16:15:37.257000
CVE-2025-22265,0,0,51006a5fb12dad2a881e7b25e5673794091472c79149c473510be2ae25b435e8,2025-01-31T09:15:07.167000
CVE-2025-22267,0,0,f20afa71bc4d80e805bd92045ab58754dc4544d5a2500dd19c3f675f1704780a,2025-01-21T18:15:15.100000
CVE-2025-22270,1,1,807b190d4f0ab4862548791cd7de2d2a933fd7449e1c271e3fd639132b78f4c5,2025-02-28T13:15:27.447000
CVE-2025-22271,1,1,91ec6fb2c7f6ff3b8a60edc9752c335d55e14d8925ec8a145331596c937be42d,2025-02-28T13:15:27.630000
CVE-2025-22272,1,1,42f7a46564d7913ae6308d940294d39859803837e86188e097e97fa60177249d,2025-02-28T13:15:27.770000
CVE-2025-22273,1,1,2c7f8a406837ec7fcfc81781955b6681674325dee7357023a9d83b9e62e01233,2025-02-28T13:15:27.927000
CVE-2025-22274,1,1,e30e868656ff3716e21cdcc6b25ea9f58339324481c026750595358601d18f56,2025-02-28T13:15:28.067000
CVE-2025-22270,0,0,807b190d4f0ab4862548791cd7de2d2a933fd7449e1c271e3fd639132b78f4c5,2025-02-28T13:15:27.447000
CVE-2025-22271,0,0,91ec6fb2c7f6ff3b8a60edc9752c335d55e14d8925ec8a145331596c937be42d,2025-02-28T13:15:27.630000
CVE-2025-22272,0,0,42f7a46564d7913ae6308d940294d39859803837e86188e097e97fa60177249d,2025-02-28T13:15:27.770000
CVE-2025-22273,0,0,2c7f8a406837ec7fcfc81781955b6681674325dee7357023a9d83b9e62e01233,2025-02-28T13:15:27.927000
CVE-2025-22274,0,0,e30e868656ff3716e21cdcc6b25ea9f58339324481c026750595358601d18f56,2025-02-28T13:15:28.067000
CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000
CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000
CVE-2025-22280,0,0,36b57de6430c09432b283d29b57dfb0829f9a3d1e3f25ed71ed6457697f2c437,2025-02-27T14:15:36.033000
@ -281929,7 +281930,7 @@ CVE-2025-23041,0,0,ffbaafde38ecaf1d57db26f1ec7a4a20e702b6709b42f775e18048cdcef4b
CVE-2025-23042,0,0,92005faa00456aa5afa950bd4ab8b8a8c4ca330b482d221fa1133fac47b2b1ec,2025-01-14T19:15:44.863000
CVE-2025-23044,0,0,5e238ef98168b46c67064d92777a89529d22a98b8fc7a39f7eca89a7360adfa3,2025-01-20T16:15:28.170000
CVE-2025-23045,0,0,5cf9ac707be65a7cb86de834c6707744da7ff35db3dfb07c7b6442c00c475c3a,2025-01-28T16:15:40.690000
CVE-2025-23046,0,1,1cf68391fb62814ffc831b7b70de30d2f6611790a490341e37e2a13af3ec6eca,2025-02-28T13:35:22.340000
CVE-2025-23046,0,0,1cf68391fb62814ffc831b7b70de30d2f6611790a490341e37e2a13af3ec6eca,2025-02-28T13:35:22.340000
CVE-2025-23047,0,0,3ee4320b803ce42dd11205db64093bb842ce4a15de110880f0def489c4da811f,2025-01-22T18:15:21.893000
CVE-2025-23051,0,0,2aefe97c0e4795e43708ca4aacb91936a81f90520498dd80e4c2079564f0d911,2025-01-23T22:15:16
CVE-2025-23052,0,0,9a4a619a1e7b14d6f53e5a9e3dd4b37f5c5ae0529b77755b68f828f3fee5c530,2025-01-23T22:15:16.133000
@ -281950,7 +281951,7 @@ CVE-2025-23079,0,0,78406696c95877d502c4c9b4607328548f20c8246eeff924786f7d9228881
CVE-2025-23080,0,0,165d07f7f3ac467de5017c0ed6cba0e28a556747a1eb136b531ca8b1a8ca92c9,2025-01-14T18:16:06.110000
CVE-2025-23081,0,0,88335d5d07bd744f2fedc19f5e2fa983c6c0a68ed633dfc146bea9e424067900,2025-02-18T22:15:18.257000
CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9a7c,2025-01-14T16:15:36.200000
CVE-2025-23083,0,1,8794d1163f9c90d3558297e77a843291a9ed4394f361008c98d5897814fbbb44,2025-02-28T13:15:28.213000
CVE-2025-23083,0,0,8794d1163f9c90d3558297e77a843291a9ed4394f361008c98d5897814fbbb44,2025-02-28T13:15:28.213000
CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000
CVE-2025-23085,0,0,889840804db6ae2520e814bb23e4a445ed73b7383c73820abba13ffae74db43d,2025-02-25T13:15:11.103000
CVE-2025-23086,0,0,4888f5c9ad449f11aff3bd2005f3629d6cccf17b7858fa974396434a1fb1f4d8,2025-02-18T21:15:28.100000
@ -282476,7 +282477,7 @@ CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c81
CVE-2025-24036,0,0,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1d2e,2025-02-14T17:31:47.153000
CVE-2025-24039,0,0,5a6deab998f4a04c1bf2aaa7b1334181c35e06bd462ce41096e3c4124f3cc07f,2025-02-11T18:15:40.927000
CVE-2025-24042,0,0,73ad21e46a5c4d31019f3989aedc923af4f5ca7a98c12f75915ff5f7e0a5ecb5,2025-02-11T18:15:41.117000
CVE-2025-24085,0,1,16fd34c7f1559d2ca0470b8ed5bce7fa8f5a69d4fe0caa33e25e5318e6902c07,2025-02-28T14:44:48.713000
CVE-2025-24085,0,0,16fd34c7f1559d2ca0470b8ed5bce7fa8f5a69d4fe0caa33e25e5318e6902c07,2025-02-28T14:44:48.713000
CVE-2025-24086,0,0,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000
CVE-2025-24087,0,0,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000
CVE-2025-24092,0,0,c2142774f8b6a5fb4fb8eae46efb7ed3d7fdb26d4474b884bc1d7f7bdbf6519a,2025-02-18T20:15:29.027000
@ -283012,7 +283013,7 @@ CVE-2025-25187,0,0,2ca61614d958811964bebe01178416385840d15966b28619da4a847cdf1ef
CVE-2025-25188,0,0,8332b0ed663268898f9dc507eb6ba5a1e3efef5bd07e1eeae60d0874cbfc0e96,2025-02-10T18:15:35.827000
CVE-2025-25189,0,0,a628e87e2edecc47dcfffa2e7708c10cb2b7cfab3038d1b46f221f2a9f0dada1,2025-02-11T16:15:52.313000
CVE-2025-25190,0,0,4b725faaa031d99f25796e8b66ce91cf84616a2e443190ddbf07d361baa5a988,2025-02-11T16:15:52.420000
CVE-2025-25192,0,1,f74cd9479b2f16f1fb0994f5462818f67695100b0ab32ad2fce87051c690df90,2025-02-28T13:35:22.340000
CVE-2025-25192,0,0,f74cd9479b2f16f1fb0994f5462818f67695100b0ab32ad2fce87051c690df90,2025-02-28T13:35:22.340000
CVE-2025-25193,0,0,9c42e26d0a4f2052fdf43faa73fab75794f787f53e222117d45465e7383dd8fa,2025-02-21T18:15:37.253000
CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000
CVE-2025-25195,0,0,9f82ad0eee600ff678607270c492d4cbcd33d9a3de8e83d2ecd9f2fbea3012e4,2025-02-13T22:15:13.100000
@ -283052,15 +283053,15 @@ CVE-2025-25299,0,0,3b24acf1d2004d8b4c6aca494f2152b620141ac014e17849f142b2b49de11
CVE-2025-25300,0,0,b7e8b6eadd3a124fef94cf4aa5497d00354ff8a753d773c320d25ce607eb8590,2025-02-18T19:15:28.957000
CVE-2025-25304,0,0,788bdf6a18db5f968ef26eda5d9694e7483d0ff6e02996c3186ccc8ce04eb43e,2025-02-14T20:15:36.903000
CVE-2025-25305,0,0,3bc54120ca4b8dd20d29c84d0022ea008e0f61f5bc4dbbe96dcffeee4c227201,2025-02-18T19:15:29.083000
CVE-2025-25323,0,0,9d54f6ab903f7d667d98dd6d95d826ddc61bd41984daa807a0cea6e5a7b6672c,2025-02-27T16:15:39.637000
CVE-2025-25324,0,0,7416fec2baed5a33bce83e714c820e6bbedabfbd40ca8cfcf862246456e22209,2025-02-27T16:15:39.760000
CVE-2025-25325,0,0,c86828d940531de1f9ba9a0442c7b2c96402c4863bc6449fb0dd3ed1d3adb216,2025-02-27T16:15:39.870000
CVE-2025-25326,0,0,955c851f345060263e9fe55f19172f235fd67cd8788d63ce6cc31b2512aba192,2025-02-27T16:15:39.987000
CVE-2025-25329,0,0,c3d3063744527b7041f8dc9250e7653ecc91051586557f2eedaceff36c858bc4,2025-02-27T17:15:16.773000
CVE-2025-25330,0,0,0a92c33d73444ad205c8dff313935ffbef10654588ff371f4eadabd58b6898b2,2025-02-27T16:15:40.103000
CVE-2025-25331,0,0,a7e1084033f53e04a790d37a366d6556d7807dba3d23cde5c9e0f882a523fe13,2025-02-27T16:15:40.217000
CVE-2025-25323,0,1,54c9af45f2f2bfed3aa436188f6ce7824965b5e9499a263eee6799f1b580c38a,2025-02-28T16:15:38.153000
CVE-2025-25324,0,1,5b3b99996b198db19221a35dfdee6e3286d56f16572f9eccdf5efd7ec5b7f501,2025-02-28T16:15:38.307000
CVE-2025-25325,0,1,7ac080e63c68e81f20ebab4d9228091863e1f25a92d142072d332eff1106665c,2025-02-28T16:15:38.457000
CVE-2025-25326,0,1,1a9fe139d2a10b61db16345be5208a2d5105ee9b72982d34638c81056b3db442,2025-02-28T16:15:38.603000
CVE-2025-25329,0,1,f8df5c8a4c4e3265c55fb37312bb192f184fb852627dd7f8acac36e50a6f04fc,2025-02-28T16:15:38.760000
CVE-2025-25330,0,1,d451444efefebddcfb3dc7ce57ea05cff35ad0f74087bdc5624d0389a4070004,2025-02-28T16:15:38.913000
CVE-2025-25331,0,1,8c74b30f6148a1f86bd1fddddb97f036151c8ba6e2589e18bf4755369058efff,2025-02-28T16:15:39.067000
CVE-2025-25333,0,0,6ec9229dcc048d32377c65843d4940ce53486855d56d23de2a9388232fef0e38,2025-02-27T20:16:05.073000
CVE-2025-25334,0,0,09f902b448e0e9b7a4421fffc73864efaba3e065c215ef17ffb5bb8d88ce2adc,2025-02-27T16:15:40.463000
CVE-2025-25334,0,1,8a5b702e03889f859a6722089fa3c1d74ed77250f83296688f277d5760349a3e,2025-02-28T16:15:39.220000
CVE-2025-25343,0,0,58830c0cbe4e53f265b0e865057002c72f07a9ce6d9abf6a7103aa5f63054e04,2025-02-19T16:41:43.887000
CVE-2025-25349,0,0,7493ec8dd478515c80e3ecdac0113c1e149e92926bb9c4a90d85a8a01928eead,2025-02-14T19:34:31.553000
CVE-2025-25351,0,0,9b264106d1e8d6ffeef659bdf79e22896d03641eb6839ed6f4bc0ff6168f9910,2025-02-14T19:35:39.130000
@ -283073,6 +283074,7 @@ CVE-2025-25387,0,0,795aaedd4d9e8425550ebd02042ed4a33da344802c3685e22ff847ed53820
CVE-2025-25388,0,0,6a9ee7104467003ccd60c12bd6c2052b9cc5a20a13a182e826767b7f4080b7c7,2025-02-13T20:15:49.730000
CVE-2025-25389,0,0,9f7198ffc91c33105d03adb0c3ce8e30d33f5591c78e15ae8d3046dd1ba01838,2025-02-14T17:15:20.663000
CVE-2025-25460,0,0,c317be9cfc8a496a253be90cd4dd305f90921029147d15141e5d010adef6c61b,2025-02-24T17:15:13.900000
CVE-2025-25461,1,1,abefcc4a87fcc99aefa917b36b82be2cf46ec09db32826ad12097cd2c52c8d9d,2025-02-28T16:15:39.387000
CVE-2025-25462,0,0,dbc3563b50545898d3f8b4c30a8e42190486beb767837401e5dfa97eecd0595d,2025-02-26T16:15:16.933000
CVE-2025-25467,0,0,88e8377464fdf0cf875ec11d3e8371c15a9465f85314cbabc34c80cddb507da4,2025-02-19T15:15:17.760000
CVE-2025-25468,0,0,9209daa082de7c38fedec36f5894b79e14469faa71894740e63970dc23df9401,2025-02-19T15:15:17.930000
@ -283082,11 +283084,11 @@ CVE-2025-25472,0,0,8e8e171c0300ed9c4535deaeb2c2bc6dfdc66f8eea702fd32fbe4b063c04d
CVE-2025-25473,0,0,55a66f96efd34a8bf6959b64a64a5a6f9abb5389cacde3b98abeba35f1566b08,2025-02-20T22:15:30.863000
CVE-2025-25474,0,0,19b4b9815528a4b62620eec453fddeb47ce33007b3a5a250ea134223fc74a338,2025-02-20T22:15:31.027000
CVE-2025-25475,0,0,da2a2d1f29106b1a0859c6a65cc60cebccb336e99ff5a9bda978918b583eb1de,2025-02-20T22:15:31.190000
CVE-2025-25477,0,0,fa83ac139b189320f092d0f9e3e2e1a7bed57d6a30bb1db68ae534b67a375486,2025-02-28T00:15:36.380000
CVE-2025-25477,0,1,394fe8fbdba802b7903f79579ee44bd6683941d582eaf8039e436a0431983458,2025-02-28T16:15:39.550000
CVE-2025-25505,0,0,c69812bbe3b275d3bc181fb00a5a8c8f1f26c31684ed982db7260503469e7b3d,2025-02-21T21:15:23.723000
CVE-2025-25507,0,0,de0377abf29412c164b8ddbcc15e82dfdb0b23020e12eca7c6e04a6e73ed3fd7,2025-02-21T21:15:23.870000
CVE-2025-25510,0,0,4997c3387297db121e4e9c1042fc244ebe3429ef8058fdf6dffa5196020cd974,2025-02-21T21:15:24.023000
CVE-2025-25513,0,0,e1943590b94885dd95437dc0873156668d062e8b298f484c30409dc6927e7d11,2025-02-24T22:15:22.807000
CVE-2025-25513,0,1,043fca8e8841337dff57d4e28c7e510727843dfcc920ce62d1b986adb3261f5b,2025-02-28T16:07:41.847000
CVE-2025-25514,0,0,a88e1a82b61fa77a3d9be210516c051b22e00e5112ab6f4dd2c37a8804d7ed85,2025-02-25T22:15:23.900000
CVE-2025-25515,0,0,12362bebea8038452149ff678950c3baddf6b375c654587a84882561b06de0a2,2025-02-26T15:15:25.327000
CVE-2025-25516,0,0,2cdca73fe7bd0fa4ed6c7d23f220ae85378dc04e2718623592d0f0650288bb83,2025-02-26T15:15:25.507000
@ -283118,7 +283120,7 @@ CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b23
CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000
CVE-2025-25727,0,0,eed5aa4e92d3da35936b8898a3baaeb8486976d6506a3be4f81c3be66ac7acb1,2025-02-28T00:15:36.530000
CVE-2025-25728,0,0,38f14431760f1e1de76497ea43ecc3b94bb9bcb816cddba23322d1de4314bf22,2025-02-28T00:15:36.680000
CVE-2025-25729,0,0,1dc91ccbc734b272e128d2f5d34455e76de95ae22cd801e388136dbd2cb156ea,2025-02-28T00:15:36.827000
CVE-2025-25729,0,1,ccfc907a3cdaea5cce206db77e8845fc90cde4b7574f7479e893a07bcc8977b9,2025-02-28T16:15:39.707000
CVE-2025-25730,0,0,9e2c6f6143351e8d57d454a9cbdf7dde2aaaadac268330af920b7098a53fa3df,2025-02-27T22:15:38.820000
CVE-2025-25740,0,0,260642afc1d2693297702d9ce768686d3842d2725b59b6c83aca2b22bfb89d6f,2025-02-14T15:15:13.190000
CVE-2025-25741,0,0,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000
@ -283171,6 +283173,7 @@ CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08
CVE-2025-25899,0,0,0a94e1ac94f2348ced8620095f1a1cdbc8d00da1d929db972e382fd33828a613,2025-02-13T20:15:49.913000
CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000
CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000
CVE-2025-25916,1,1,4e2a1655b4a6aaf2526c4ed04e0ae1c0b064355e8a43832e8f7a15b5c3ab676d,2025-02-28T16:15:39.867000
CVE-2025-25942,0,0,aaefa1472b5a3a4ffd45a7b82843a4fba08935bb07eb639c11b55e6ffce6e19f,2025-02-20T15:15:14.587000
CVE-2025-25943,0,0,3d5d9a9e07fdb25bf040079f5fee5cc6a8e0580e939f6bf77bd76c374978b2a7,2025-02-20T15:15:14.743000
CVE-2025-25944,0,0,be3957e03ef6cc753272acb47a0146e6f3e330f45af5947134f7dfc1abcce0e4,2025-02-20T15:15:14.900000
@ -283191,12 +283194,14 @@ CVE-2025-25994,0,0,aada5f394d667f977ebabeb966b8805ece67cc43768150de72852a4683195
CVE-2025-25997,0,0,8311ed2a6df06b368ecafa86d7532bb151f440bce533690a11763d40390899ab,2025-02-18T15:15:19.063000
CVE-2025-26013,0,0,681443cbea1aecaac9440a9aad5c73fef9dca35a347aeb9f53f53f8b739a2bc4,2025-02-21T21:15:24.470000
CVE-2025-26014,0,0,4c1a90c8dc606f24e0044dd527fca4e86b8cdadd364a955283c3e7a026ac0a07,2025-02-21T17:15:14.680000
CVE-2025-26047,1,1,6eee5ba5b9f24b6c856893b12cf4174655504b377088e34ddf907f7cbda1f89f,2025-02-28T16:15:40.020000
CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8cee5,2025-02-19T21:15:15.920000
CVE-2025-26156,0,0,a8694b3e45c4489013c1cde3d4ed9238920082c88bdc645d51681df5fb2b64af,2025-02-14T19:15:15.033000
CVE-2025-26157,0,0,7804a33112b2a9ac773ed8a4ce8c66afc4de94479098b9344da6b84d1d9bf6e8,2025-02-14T20:15:37.543000
CVE-2025-26158,0,0,74f4aa7ecf6ee690115b15bb4e8b902a9165914e813dcbc79db25584fd407063,2025-02-14T20:15:37.677000
CVE-2025-26200,0,0,d9acb4ba138dd72827a5ae920d4119a49bf77bd1ba787405ae12ac352e8d6e5e,2025-02-24T17:15:14.273000
CVE-2025-26201,0,0,a0e37e7a39c3a07c990a5dcec1766cef724c487a497502e59b82a95800cc7450,2025-02-24T18:15:21.047000
CVE-2025-26263,1,1,662238db512d7984d6510c607e6bc28336ca603217f5c07913705819afe210e7,2025-02-28T16:15:40.127000
CVE-2025-26264,0,0,66de1a3ec09277cf0bb2d99d96048c42039940052291dafb3801b689b4bee37d,2025-02-27T22:15:38.947000
CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000
CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000
@ -283207,6 +283212,7 @@ CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4e
CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000
CVE-2025-26311,0,0,06d541ea93c6274eb552bc93a46b31aab60c7a52133551001cc450c9b897d373,2025-02-20T21:15:25.907000
CVE-2025-26325,0,0,159576ddbe22366fba138ea7241c3769634089af321e96d5b630e4afa13ef3de,2025-02-27T22:15:39.057000
CVE-2025-26326,1,1,f84875e9cdda7cdf32b7a706b3dc63076bc4fd2668c6fb2df857dabcd399807f,2025-02-28T15:15:13.743000
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000
CVE-2025-26341,0,0,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000
@ -283251,7 +283257,7 @@ CVE-2025-26408,0,0,e45f7220dde0c01d1f86f33cd06eb34062f4e98e989de6c2a87bcb17b259e
CVE-2025-26409,0,0,998a9bcbefad73980e88cfadca0416aeed1df460a44260fe4402eb5cd5541ec2,2025-02-18T18:15:36.230000
CVE-2025-26410,0,0,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000
CVE-2025-26411,0,0,fcde46ab874d21012fc4027217c83b95868b33b38456359d4b0f7ea8269a0842,2025-02-18T18:15:36.473000
CVE-2025-26465,0,1,fd5bb3f85e1a91bd1d8984e07b7b2ca19bc33d190686c0f3d55567168c5a90e9,2025-02-28T13:15:28.343000
CVE-2025-26465,0,0,fd5bb3f85e1a91bd1d8984e07b7b2ca19bc33d190686c0f3d55567168c5a90e9,2025-02-28T13:15:28.343000
CVE-2025-26473,0,0,db43a7bf53d161b7d55a979bd6ef7796563f4bed6f8f8b30bb8e0a50af69bdea,2025-02-13T22:15:13.417000
CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000
CVE-2025-26491,0,0,7c0d222179eba4a77c32c46173122e282947b63a6de5118491e2b730e6dd9271,2025-02-14T20:15:37.930000
@ -283443,17 +283449,17 @@ CVE-2025-27105,0,0,2bcb6c340eab97672213237573c8f6ca4eeeb614b47978107b021b4da927b
CVE-2025-27106,0,0,2aea6dfc75b6de975e9d792b22b24672e89a28876099e5c80ae756f94e64cf9c,2025-02-22T16:15:33.003000
CVE-2025-27108,0,0,34d6d1e5e32f01741f013d8e11085ab9652369eb805ee793ac08ed811303f050,2025-02-27T20:18:12.583000
CVE-2025-27109,0,0,887a9677b59d7647aa063bf92caff49be61f0df690b2560df78fd44f58dfdb6b,2025-02-24T17:15:14.850000
CVE-2025-27110,0,1,059d870c313e4a557107b6ae0082199b6395bbcf7d1ddc56d5ab6903b573b570,2025-02-28T13:35:22.340000
CVE-2025-27110,0,0,059d870c313e4a557107b6ae0082199b6395bbcf7d1ddc56d5ab6903b573b570,2025-02-28T13:35:22.340000
CVE-2025-27112,0,0,ad3bd22bf68a43e9ef7354153af5bf27543e71ad253b691f1b313d10f702063d,2025-02-27T20:18:12.583000
CVE-2025-27113,0,0,1163a140c7451a5d3ce8342e9e475fc7cc692a5677dca273619df06c0d4a282d,2025-02-27T20:18:12.583000
CVE-2025-27133,0,0,29844716abafc4dda273789005e3e16abe4d7d6eca7ec6dff9bfc7d4679fc1f2,2025-02-24T19:15:14.763000
CVE-2025-27133,0,1,bfde01faa06d9963c59eea543f4fa6168a24602a8639d07c356f8930ec6d4154,2025-02-28T16:07:41.847000
CVE-2025-27135,0,0,2b4ca3a6c4bb963ede6b8510aa33d7ae3bb4bf8b75f298a6d5163ae954eac93d,2025-02-25T19:15:15.677000
CVE-2025-27137,0,0,5036444bad86a0c9ebb929b7c838035a7163ade99e11b550d9873b63f4ee5567,2025-02-24T21:15:11.213000
CVE-2025-27139,0,1,2cb35550ba4d0a90ab72e4571ad148f33e854944ca8f8e710e17710ac500936e,2025-02-28T13:35:22.340000
CVE-2025-27140,0,0,2964053422621195e160e6550b952cf184c5edc007d9580344eb7b008bf03c85,2025-02-24T22:15:22.913000
CVE-2025-27141,0,0,19a3c923af6f6f4189d4be91702969bf59100e645a0e1d60c810d2a5f034238b,2025-02-24T22:15:23.077000
CVE-2025-27142,0,1,50c09bf35dff2e7c08051751460862f1793d1e64e755656069216a4226cde41a,2025-02-28T13:35:22.340000
CVE-2025-27143,0,0,f6196a31f6bc594bd6a78f99bac329907739405671eed3f73a517d781727c862,2025-02-24T23:15:11.160000
CVE-2025-27139,0,0,2cb35550ba4d0a90ab72e4571ad148f33e854944ca8f8e710e17710ac500936e,2025-02-28T13:35:22.340000
CVE-2025-27140,0,1,d3c1009e4516057e75528f0ea0c1750c681f482aac5f8e727817e26f4972cc64,2025-02-28T16:07:41.847000
CVE-2025-27141,0,1,a41b4e712730fea8fc4ff3b257eef40bd5b6d5d5d2766ea09d25a8c5fedfd1f6,2025-02-28T16:07:41.847000
CVE-2025-27142,0,0,50c09bf35dff2e7c08051751460862f1793d1e64e755656069216a4226cde41a,2025-02-28T13:35:22.340000
CVE-2025-27143,0,1,b2f4a315d358bac155e0e21cd73590b43aafc4b46c5907cec4f1957f851895fd,2025-02-28T16:07:41.847000
CVE-2025-27144,0,0,1943a5ebc9fa4ebdac773d12aa5884bfb6e27a53701e1ad9e8e73a5ce013ecba,2025-02-24T23:15:11.427000
CVE-2025-27145,0,0,38c5004ff48d2670f12fb99a3982f3e02a12208e5ab880775c9f41ae19934057,2025-02-25T14:15:31.567000
CVE-2025-27146,0,0,1949c93bb4c1257d1700888fb7aa70bba73c2053b702350dbd7e6c46a590f25c,2025-02-25T20:15:38.030000
@ -283513,3 +283519,4 @@ CVE-2025-27356,0,0,451dc4587cf2e56d947661dd5ce87ee61b0a9c7d0fddf41bb2794ffa4d502
CVE-2025-27357,0,0,a7a6432997c064e16448c81c4ebf75b9895532aa24152d8d607748003751d3d3,2025-02-24T15:15:21.233000
CVE-2025-27364,0,0,a6f68b00caeb3fd723cefacab1c9d3bfa45e0696d3b00b1760eeb7e038956a23,2025-02-24T20:15:34.180000
CVE-2025-27399,0,0,047834ae4cb02eb8c620e48e474a23f71c1292e787766a014db687c899a834cc,2025-02-27T18:15:30.380000
CVE-2025-27400,1,1,cdbf04b984faf2bb61d60f663ecdfdd44190b0515d3b8d47c87701b41ec06666,2025-02-28T16:15:40.237000

Can't render this file because it is too large.