diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12173.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12173.json new file mode 100644 index 00000000000..d7251bdf873 --- /dev/null +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12173.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-12173", + "sourceIdentifier": "contact@wpscan.com", + "published": "2025-02-19T06:15:21.003", + "lastModified": "2025-02-19T06:15:21.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Master Slider WordPress plugin before 3.10.5 does not sanitise and escape some of its settings, which could allow high privilege users such as Editor and above to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/0f35be0e-0f63-4e33-aa4d-c47b1f1e0595/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13799.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13799.json new file mode 100644 index 00000000000..3f3aecdb599 --- /dev/null +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13799.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-13799", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-19T06:15:21.283", + "lastModified": "2025-02-19T06:15:21.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The User Private Files \u2013 File Upload & Download Manager with Secure File Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018new-fldr-name\u2019 parameter in all versions up to, and including, 2.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/user-private-files/trunk/js/folder.js", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3240877/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/419cf912-3187-43d7-90ab-1a20a46d86e4?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1065.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1065.json new file mode 100644 index 00000000000..2a4945d5d6c --- /dev/null +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1065.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-1065", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-19T06:15:21.507", + "lastModified": "2025-02-19T06:15:21.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Visualizer: Tables and Charts Manager for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Import Data From File feature in all versions up to, and including, 3.11.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3240066/visualizer", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/17c1de7b-5178-4fbe-a515-169de4323ae7?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1441.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1441.json new file mode 100644 index 00000000000..188888a1baf --- /dev/null +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1441.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-1441", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-19T05:15:12.050", + "lastModified": "2025-02-19T05:15:12.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.1007. This is due to missing or incorrect nonce validation on the 'wpr_filter_woo_products' function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1007/classes/modules/wpr-filter-woo-products.php#L1895", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1008/classes/modules/wpr-filter-woo-products.php#L1904", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6bc6a436-6df3-4eaf-a16b-d8b3c3ca7d87?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22888.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22888.json new file mode 100644 index 00000000000..4e4dabda49d --- /dev/null +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22888.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-22888", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2025-02-19T06:15:21.687", + "lastModified": "2025-02-19T06:15:21.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Movable Type contains a stored cross-site scripting vulnerability in the custom block edit page of MT Block Editor. If exploited, an arbitrary script may be executed on a logged-in user's web browser." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN48742353/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.movabletype.org/news/2025/02/mt-842-released.html", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24841.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24841.json new file mode 100644 index 00000000000..5a7557dc0c8 --- /dev/null +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24841.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-24841", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2025-02-19T06:15:21.853", + "lastModified": "2025-02-19T06:15:21.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Movable Type contains a stored cross-site scripting vulnerability in the HTML edit mode of MT Block Editor. It is exploitable when TinyMCE6 is used as a rich text editor and an arbitrary script may be executed on a logged-in user's web browser." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN48742353/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.movabletype.org/news/2025/02/mt-842-released.html", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25054.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25054.json new file mode 100644 index 00000000000..07aefb8ef1a --- /dev/null +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25054.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-25054", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2025-02-19T06:15:22.010", + "lastModified": "2025-02-19T06:15:22.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Movable Type contains a reflected cross-site scripting vulnerability in the user information edit page. When Multi-Factor authentication plugin is enabled and a user accesses a crafted page while logged in to the affected product, an arbitrary script may be executed on the web browser of the user." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN48742353/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.movabletype.org/news/2025/02/mt-842-released.html", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json index bfbee6ca550..309b6d59e27 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26465", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-18T19:15:29.230", - "lastModified": "2025-02-18T19:15:29.230", + "lastModified": "2025-02-19T05:15:12.440", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -56,9 +56,49 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344780", "source": "secalert@redhat.com" }, + { + "url": "https://blog.qualys.com/vulnerabilities-threat-research/2025/02/18/qualys-tru-discovers-two-vulnerabilities-in-openssh-cve-2025-26465-cve-2025-26466", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1237040", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/008_ssh.patch.sig", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00020.html", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2025-February/000161.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security-tracker.debian.org/tracker/CVE-2025-26465", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ubuntu.com/security/CVE-2025-26465", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openssh.com/releasenotes.html#9.9p2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2025/02/18/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2025/02/18/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 6a607bde445..63b8173d139 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-19T05:01:06.410035+00:00 +2025-02-19T07:00:56.090581+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-19T04:15:10.550000+00:00 +2025-02-19T06:15:22.010000+00:00 ``` ### Last Data Feed Release @@ -33,22 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281734 +281741 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `7` -- [CVE-2024-11582](CVE-2024/CVE-2024-115xx/CVE-2024-11582.json) (`2025-02-19T04:15:10.200`) -- [CVE-2024-13443](CVE-2024/CVE-2024-134xx/CVE-2024-13443.json) (`2025-02-19T04:15:10.360`) -- [CVE-2025-22622](CVE-2025/CVE-2025-226xx/CVE-2025-22622.json) (`2025-02-19T04:15:10.550`) +- [CVE-2024-12173](CVE-2024/CVE-2024-121xx/CVE-2024-12173.json) (`2025-02-19T06:15:21.003`) +- [CVE-2024-13799](CVE-2024/CVE-2024-137xx/CVE-2024-13799.json) (`2025-02-19T06:15:21.283`) +- [CVE-2025-1065](CVE-2025/CVE-2025-10xx/CVE-2025-1065.json) (`2025-02-19T06:15:21.507`) +- [CVE-2025-1441](CVE-2025/CVE-2025-14xx/CVE-2025-1441.json) (`2025-02-19T05:15:12.050`) +- [CVE-2025-22888](CVE-2025/CVE-2025-228xx/CVE-2025-22888.json) (`2025-02-19T06:15:21.687`) +- [CVE-2025-24841](CVE-2025/CVE-2025-248xx/CVE-2025-24841.json) (`2025-02-19T06:15:21.853`) +- [CVE-2025-25054](CVE-2025/CVE-2025-250xx/CVE-2025-25054.json) (`2025-02-19T06:15:22.010`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +- [CVE-2025-26465](CVE-2025/CVE-2025-264xx/CVE-2025-26465.json) (`2025-02-19T05:15:12.440`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ff2c02c02b1..22010b65ad8 100644 --- a/_state.csv +++ b/_state.csv @@ -244892,7 +244892,7 @@ CVE-2024-11579,0,0,a0e8ebe7e9d438299b2b08bfdc182fcceaa66df7c647d83ef69f75c205558 CVE-2024-1158,0,0,cc758ded81eb4716575c03ddb54fc317f50917a2b43ee2a36cb438fc8fb74732,2024-11-21T08:49:55.723000 CVE-2024-11580,0,0,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000 CVE-2024-11581,0,0,54519437e00f96c23a8c70641ca6b3fe6fa4bcc79e1443a9a5c2a0ca7b114449,2024-12-20T17:32:03.967000 -CVE-2024-11582,1,1,f9ff8eb2d12ec0bbd7818a1709287484b4780b4422c883d3ad5ed537bbf3d553,2025-02-19T04:15:10.200000 +CVE-2024-11582,0,0,f9ff8eb2d12ec0bbd7818a1709287484b4780b4422c883d3ad5ed537bbf3d553,2025-02-19T04:15:10.200000 CVE-2024-11583,0,0,0b07441a5ea7c52db00cfe826d700b0c0eb6984d5bc925e0a246fd9c511bc36e,2025-01-31T20:03:24.500000 CVE-2024-11585,0,0,d73bc146050e187d4f7b957a4961cb8470ba9ebdf69a5843cdfa9e686c284b8e,2024-12-06T06:15:22.723000 CVE-2024-11586,0,0,acbb89c7a73edeb9af616fbe1a7bbf2dff72a4d1c23f19e17196df7c7df36053,2024-11-25T18:15:10.123000 @@ -245444,6 +245444,7 @@ CVE-2024-1217,0,0,6b4f28a64a0963868a0b0fd68f3e80e1f35d8f2883d87d4094b446f0742cbc CVE-2024-12170,0,0,dda5e4dfb884254330b10e15454ff7f267eea062af3a3c0f061f58e061dbc21b,2025-01-07T05:15:15.713000 CVE-2024-12171,0,0,02bdcd1ee67eefd33d15b29c0f023f4ae1c93e77bdd7b1fc34ccf1ee81e2337a,2025-02-01T04:15:30.303000 CVE-2024-12172,0,0,71dcf4ad1517a839187dba7f34de208b20f0af666e791340d3555b8bf199e319,2024-12-12T06:15:23.587000 +CVE-2024-12173,1,1,4f1370f3a33cf5d39fb9681c7defbf9004f56ec2e518087913fd718e7f630f17,2025-02-19T06:15:21.003000 CVE-2024-12174,0,0,d557284551bec104067ec802c1680b85a8fd3b4f89f1ebaca3a04bd8bacf5eb2,2024-12-09T22:15:22.237000 CVE-2024-12175,0,0,d343e9c859734ac59607cdd69472323b5b2b24ca1f02ce9797a72fd283ae52a1,2025-01-10T21:26:56.183000 CVE-2024-12176,0,0,c0f27faa92b2096f6d155f1bdd3b84e12e907e1e8188f65eb3c16d954de1037d,2025-01-07T05:15:15.900000 @@ -246542,7 +246543,7 @@ CVE-2024-13439,0,0,9977a2cc02f20b148bdbeb2cb70da6b957cfc1fa7b049bde9614c22678a63 CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000 CVE-2024-13440,0,0,5766e7a438a8e4269354aacca2cf4360d814b2b0ba936161bc318042a1e4abc8,2025-02-13T17:17:19.413000 CVE-2024-13441,0,0,c4feb7fa45e58abcf7c01d5df380ea3f267be46791773adc8606a649a8a16fa9,2025-02-04T19:37:08.100000 -CVE-2024-13443,1,1,5e0554feb4a2f4dbf6619974907598a97160af25d67a3f0cb251733bc39feede,2025-02-19T04:15:10.360000 +CVE-2024-13443,0,0,5e0554feb4a2f4dbf6619974907598a97160af25d67a3f0cb251733bc39feede,2025-02-19T04:15:10.360000 CVE-2024-13444,0,0,f559be4a09d3b0d4718253e232ed1d6b01b700beffd4896c1d6f62eac4116d3c,2025-01-21T11:15:09.450000 CVE-2024-13447,0,0,4e4ee51c076699c7672245e5729c9870c182faecf6e2bd018441c71df98cbb9d,2025-01-24T20:53:40.380000 CVE-2024-13448,0,0,99bef776585fb11dba8e8ef9f028b4f3c7371956a91f9b56a4977bbe471e6b70,2025-01-30T18:01:07.080000 @@ -246767,6 +246768,7 @@ CVE-2024-13791,0,0,e8f3bd70e313cf86e3514fe881c4b6e7c79dc2453560333d0bb8ba3721282 CVE-2024-13794,0,0,27d6b89d805464403aa5cd7b47bffa4f0df39472970f2a8182a5a27be68e3d41,2025-02-18T18:15:19.290000 CVE-2024-13795,0,0,5ff186d2b18ebdd910aed1b17c910f62f178a43b9b5396d894a01eab3d2cf2bf,2025-02-18T08:15:09.980000 CVE-2024-13797,0,0,fe09b7061fe6273763b2c8668b8146404830403c0458cc4116f6d91c5b5628d2,2025-02-18T11:15:11.753000 +CVE-2024-13799,1,1,ec8cb514ef31404e1cd13657eea18c026b0b0f4d5ffefec8356a7aac820d1c0c,2025-02-19T06:15:21.283000 CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000 CVE-2024-13800,0,0,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000 CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000 @@ -279275,6 +279277,7 @@ CVE-2025-1058,0,0,f0fad2f3f49afeee020cd5166bcf442481ddfb4558eb17fc96aa811a077ae5 CVE-2025-1059,0,0,0ab1d4e680647fc777b1f82262b0090b83c24b4ef86b71d82e6bf1295dac9761,2025-02-13T06:15:21.680000 CVE-2025-1060,0,0,a3af803539184a670e8a1150c8d0a2bc56d4cd2cc859a7263777d630bbc1a271,2025-02-13T06:15:22.213000 CVE-2025-1061,0,0,719d74f0f0646df1bcdf5186f15b6b006503d4de7dcd7fdf659e983ae5a27990,2025-02-07T02:15:29.587000 +CVE-2025-1065,1,1,7a62f98369ffccf4b00a81d8982feffe5ffb0f550549018fa41283fbe2ed1658,2025-02-19T06:15:21.507000 CVE-2025-1066,0,0,3fc22615f942b72b8cf5d09f7bd097e7cf373f3b0fcdec9d31e667deb7a70a15,2025-02-18T19:15:24.243000 CVE-2025-1070,0,0,5146e4f08b2531ff82fc620bde7cb0c34c86b4487a1fbc38c78ecd1432016151,2025-02-13T06:15:22.463000 CVE-2025-1071,0,0,7cf48f5c0704f7102ee404aa34c514af5ccf3668a768a5efc6948bb3495dcf52,2025-02-14T14:15:32.560000 @@ -279437,6 +279440,7 @@ CVE-2025-1390,0,0,02ff75a3058ee51af8713fa469c7bed94932b28a55e59655029e36f100f66a CVE-2025-1391,0,0,a1f2e3a8ca093b8de620c0e72b50119acca7a6fd87679168958e3acea938ff79,2025-02-17T14:15:08.413000 CVE-2025-1392,0,0,381fc64763a47738c9a933c7e4bcfcc84ef66c73e4a81eacddf01751da768947,2025-02-17T16:15:16.120000 CVE-2025-1414,0,0,b6f2fa5b41b9076d018bd1d274a1717bfb4b17a7162b38316b8f5f46b587bbc9,2025-02-18T21:15:25.440000 +CVE-2025-1441,1,1,dea0748ac4805add0b5a620a8c550d3c2cb9f813ccabe70b3df2355bbf5d5eab,2025-02-19T05:15:12.050000 CVE-2025-1447,0,0,0171066f5cc38b75ed48310b7b051ba77753a7de710aef2fb49270a13c1b0697,2025-02-19T01:15:09.407000 CVE-2025-1448,0,0,8646602fe654ea9c8b8dc30e88ebd580a07aa04ffb2e255dc4fb4a77857c3ea4,2025-02-19T02:15:08.833000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 @@ -280228,7 +280232,7 @@ CVE-2025-22618,0,0,c19d0c974c1e5e33f6d26b1c1e9e7666054e0a20c6f455c24ab32d4bd2226 CVE-2025-22619,0,0,94078c2e9a44454365aeb387ac2d1c51351bb08f1b9ba4f80444a5076273dcd6,2025-02-13T19:44:19.580000 CVE-2025-22620,0,0,428c7806e74732326369c718351571848c196156b9eb9eb7ffe99ba9002a1b52,2025-01-20T16:15:28.017000 CVE-2025-22621,0,0,6ff4aa50f3e07d892cb8ed858e238d42c832836da0723e6a77be4111c28ff27e,2025-01-15T17:15:20.810000 -CVE-2025-22622,1,1,8b4c82fcbc47b89df336e33d6772dec0ee9982d3b30816e5d8a35cac0fdcc0d3,2025-02-19T04:15:10.550000 +CVE-2025-22622,0,0,8b4c82fcbc47b89df336e33d6772dec0ee9982d3b30816e5d8a35cac0fdcc0d3,2025-02-19T04:15:10.550000 CVE-2025-22630,0,0,79b3801f8ae7e0fc2c6a6c47d25a128abd9fd0016caa673d59d6e5ab1ad69955,2025-02-14T07:15:32.750000 CVE-2025-22639,0,0,1d384823c10ffe5023799b5e360ec42a153bd848562aed6770e0af17e75e00b2,2025-02-18T20:15:26.010000 CVE-2025-22641,0,0,6bee2e22f4c2218c32261d50c3b76051122c36d8b22f1fe821f826f72b0d1ffb,2025-02-04T15:15:19.923000 @@ -280378,6 +280382,7 @@ CVE-2025-22865,0,0,19a89c82649ad3129bff7c393f18a8aa29547854e8bed3a25f76183fca3a3 CVE-2025-22866,0,0,fc628e612226994670042c6a80d861aab3b14ae86f86a5f49a1359b3e287ae21,2025-02-11T15:15:20.870000 CVE-2025-22867,0,0,89eb6539ba2561e6ed2f62e1706818e853753182ae09675c0ce3557a15684ce3,2025-02-06T22:15:40.393000 CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000 +CVE-2025-22888,1,1,f5d32f8dd85089b4081119504cdbaa08e62536c566f34b631736ce9146eeb63c,2025-02-19T06:15:21.687000 CVE-2025-22890,0,0,8dd6ffe45f0151dcb8b41a48dac74b1e668a5294c2f1614982860358b9b03cd6,2025-02-06T07:15:17.113000 CVE-2025-22891,0,0,34a57f6019ba9072a9a6b4c9f86ff3b9d6f2414d47e8b5c13c1861a56f0b44ab,2025-02-05T18:15:31.190000 CVE-2025-22894,0,0,099d82dc8568fb50b5dde7926f3fbb32a13311bb5c7a970a54e9828e99c29a1c,2025-02-06T08:15:30.027000 @@ -281379,6 +281384,7 @@ CVE-2025-24829,0,0,7efc0c94ae292054ed83b5517e6eda6a14703f283b7f8ef2e7ee76b6d97d3 CVE-2025-24830,0,0,149ce554396e6f6a2d01866c124b61e24002e40c9d6d50b44720c1d2e3007d9d,2025-02-18T19:15:27.847000 CVE-2025-24831,0,0,c92da556f0147b9019570da06039147ae8945532d2deb083de9ea344daaf5414,2025-02-18T19:15:27.963000 CVE-2025-24836,0,0,da95ab8528e6c549bba778d1d67c04ab75f1d50ed423e85181f04464f9165463,2025-02-13T22:15:12.270000 +CVE-2025-24841,1,1,b90ee7fc7dcc14ca371664adcb7ca95c030eed2895558abceb191c7049f6a6b1,2025-02-19T06:15:21.853000 CVE-2025-24845,0,0,b01e6a569b8cc3a4584487bdfb3da2fbed952ffc0174ca89c61a3e20ee1bf86f,2025-02-06T08:15:30.673000 CVE-2025-24858,0,0,3b82f7da2305463da0ac5aea20b0458ff46f3b144923110e5153f9a34733f4c3,2025-01-26T07:15:09.237000 CVE-2025-24860,0,0,f6b6c9635e86cbebd470da0b1fb7a3385879aa273aed1cf32bf09076c689158e,2025-02-15T01:15:11.327000 @@ -281435,6 +281441,7 @@ CVE-2025-24980,0,0,93f5736ad811fe47d31660fba8d04da062656820cb9c23ad70329bc04caee CVE-2025-24981,0,0,53e7b164e1e8344d44125c41e4616160d5eab5393458f601a78911be7625504e,2025-02-06T18:15:32.847000 CVE-2025-24982,0,0,bb2e7ed21733f592bc39cfa057a56b08d6aa180f6c36351b70c6f04a2bffef43,2025-02-04T05:15:10.543000 CVE-2025-25039,0,0,2c724cd99b172314f0551d5e25be43761b6ee80f3cb5f750659e6bd374aa7b28,2025-02-04T19:15:33.977000 +CVE-2025-25054,1,1,bdc6a9739f43c6ee9f7dd792b2a86b688f134fb79a9c00222c307f085f96633f,2025-02-19T06:15:22.010000 CVE-2025-25055,0,0,7bdf77ab21026e12270a24a96ec203744f408d808d0439c316497fbe0f801ffc,2025-02-18T00:15:21.277000 CVE-2025-25062,0,0,c25c343fff538b868333c18656ef24f68b7ac30942ec67bd9f1be9d92e00b2a9,2025-02-03T04:15:09.587000 CVE-2025-25063,0,0,fe8d3efef171b62a11b34e6bca9a7ce9094019d5a41cf3cdaf3675f4485dfea9,2025-02-03T04:15:09.760000 @@ -281649,7 +281656,7 @@ CVE-2025-26408,0,0,e45f7220dde0c01d1f86f33cd06eb34062f4e98e989de6c2a87bcb17b259e CVE-2025-26409,0,0,998a9bcbefad73980e88cfadca0416aeed1df460a44260fe4402eb5cd5541ec2,2025-02-18T18:15:36.230000 CVE-2025-26410,0,0,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000 CVE-2025-26411,0,0,fcde46ab874d21012fc4027217c83b95868b33b38456359d4b0f7ea8269a0842,2025-02-18T18:15:36.473000 -CVE-2025-26465,0,0,f4c7247d22749011efb6512f7ca9c4f47d8860332944852cf3848123f69b661d,2025-02-18T19:15:29.230000 +CVE-2025-26465,0,1,3c472d5b9fa5deafc6b883ebf568235c3cb637f5368b3f619a33dbc4e629f1f6,2025-02-19T05:15:12.440000 CVE-2025-26473,0,0,db43a7bf53d161b7d55a979bd6ef7796563f4bed6f8f8b30bb8e0a50af69bdea,2025-02-13T22:15:13.417000 CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000 CVE-2025-26491,0,0,7c0d222179eba4a77c32c46173122e282947b63a6de5118491e2b730e6dd9271,2025-02-14T20:15:37.930000