From 349bd9e03445759296bccdf6eeb6b22941c40774 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 19 Feb 2025 03:06:22 +0000 Subject: [PATCH] Auto-Update: 2025-02-19T03:02:54.694460+00:00 --- CVE-2024/CVE-2024-537xx/CVE-2024-53704.json | 6 +- CVE-2024/CVE-2024-572xx/CVE-2024-57257.json | 39 +++++- CVE-2024/CVE-2024-572xx/CVE-2024-57258.json | 39 +++++- CVE-2024/CVE-2024-572xx/CVE-2024-57259.json | 39 +++++- CVE-2024/CVE-2024-572xx/CVE-2024-57261.json | 60 ++++++++ CVE-2024/CVE-2024-572xx/CVE-2024-57262.json | 60 ++++++++ CVE-2025/CVE-2025-01xx/CVE-2025-0108.json | 8 +- CVE-2025/CVE-2025-14xx/CVE-2025-1447.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-14xx/CVE-2025-1448.json | 141 +++++++++++++++++++ README.md | 40 ++---- _state.csv | 46 ++++--- 11 files changed, 568 insertions(+), 55 deletions(-) create mode 100644 CVE-2024/CVE-2024-572xx/CVE-2024-57261.json create mode 100644 CVE-2024/CVE-2024-572xx/CVE-2024-57262.json create mode 100644 CVE-2025/CVE-2025-14xx/CVE-2025-1447.json create mode 100644 CVE-2025/CVE-2025-14xx/CVE-2025-1448.json diff --git a/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json b/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json index 4bca31a1a5e..c3edc58aba5 100644 --- a/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json +++ b/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53704", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T07:15:27.203", - "lastModified": "2025-02-18T21:15:22.547", + "lastModified": "2025-02-19T02:00:02.000", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,10 @@ } ] }, + "cisaExploitAdd": "2025-02-18", + "cisaActionDue": "2025-03-11", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "SonicWall SonicOS SSLVPN Improper Authentication Vulnerability", "weaknesses": [ { "source": "PSIRT@sonicwall.com", diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57257.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57257.json index 5e8722bfc98..e06b88ae4b9 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57257.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57257.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57257", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T23:15:09.800", - "lastModified": "2025-02-18T23:15:09.800", + "lastModified": "2025-02-19T01:15:08.963", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A stack consumption issue in sqfs_size in Das U-Boot before 2025.01-rc1 occurs via a crafted squashfs filesystem with deep symlink nesting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-674" + } + ] + } + ], "references": [ { "url": "https://source.denx.de/u-boot/u-boot/-/commit/4f5cc096bfd0a591f8a11e86999e3d90a9484c34", diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57258.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57258.json index 13f3f2dabcd..3f9207e587d 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57258.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57258.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57258", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T23:15:09.893", - "lastModified": "2025-02-18T23:15:09.893", + "lastModified": "2025-02-19T01:15:09.117", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Integer overflows in memory allocation in Das U-Boot before 2025.01-rc1 occur for a crafted squashfs filesystem via sbrk, via request2size, or because ptrdiff_t is mishandled on x86_64." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], "references": [ { "url": "https://source.denx.de/u-boot/u-boot/-/commit/0a10b49206a29b4aa2f80233a3e53ca0466bb0b3", diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57259.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57259.json index cbdc9bc2d2b..4404f5477f2 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57259.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57259.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57259", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T23:15:09.980", - "lastModified": "2025-02-18T23:15:09.980", + "lastModified": "2025-02-19T01:15:09.257", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "sqfs_search_dir in Das U-Boot before 2025.01-rc1 exhibits an off-by-one error and resultant heap memory corruption for squashfs directory listing because the path separator is not considered in a size calculation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-193" + } + ] + } + ], "references": [ { "url": "https://source.denx.de/u-boot/u-boot/-/commit/048d795bb5b3d9c5701b4855f5e74bcf6849bf5e", diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57261.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57261.json new file mode 100644 index 00000000000..9f0c6fae4a2 --- /dev/null +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57261.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-57261", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-19T02:15:08.480", + "lastModified": "2025-02-19T02:15:08.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In barebox before 2025.01.0, request2size in common/dlmalloc.c has an integer overflow, a related issue to CVE-2024-57258." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://git.pengutronix.de/cgit/barebox/commit/?id=7cf25e0733f08f68d1bf0ca0c3cf6e2dfe51bd3c", + "source": "cve@mitre.org" + }, + { + "url": "https://lists.infradead.org/pipermail/barebox/2024-November/048631.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57262.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57262.json new file mode 100644 index 00000000000..d2cfb8a18d4 --- /dev/null +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57262.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-57262", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-19T02:15:08.677", + "lastModified": "2025-02-19T02:15:08.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In barebox before 2025.01.0, ext4fs_read_symlink has an integer overflow for zalloc (adding one to an le32 variable) via a crafted ext4 filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite, a related issue to CVE-2024-57256." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://git.pengutronix.de/cgit/barebox/commit/?id=a2b76550f7d8", + "source": "cve@mitre.org" + }, + { + "url": "https://git.pengutronix.de/cgit/barebox/commit/?id=a2b76550f7d87ba6f88a9ea50e71f107b514ff4e", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json index 5d0843ff700..b1911ae7c0b 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0108", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-02-12T21:15:16.290", - "lastModified": "2025-02-12T21:15:16.290", - "vulnStatus": "Received", + "lastModified": "2025-02-19T02:00:02.000", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -61,6 +61,10 @@ } ] }, + "cisaExploitAdd": "2025-02-18", + "cisaActionDue": "2025-03-11", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Palo Alto PAN-OS Authentication Bypass Vulnerability", "weaknesses": [ { "source": "psirt@paloaltonetworks.com", diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1447.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1447.json new file mode 100644 index 00000000000..90ec3afe936 --- /dev/null +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1447.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-1447", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-19T01:15:09.407", + "lastModified": "2025-02-19T01:15:09.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in kasuganosoras Pigeon 1.0.177. It has been declared as critical. This vulnerability affects unknown code of the file /pigeon/imgproxy/index.php. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. Upgrading to version 1.0.181 is able to address this issue. The patch is identified as 84cea5fe73141689da2e7ec8676d47435bd6423e. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kasuganosoras/Pigeon/commit/84cea5fe73141689da2e7ec8676d47435bd6423e", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/kasuganosoras/Pigeon/releases/tag/1.0.181", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/sheratan4/cve/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.296134", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.296134", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.501978", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1448.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1448.json new file mode 100644 index 00000000000..6e020d95018 --- /dev/null +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1448.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1448", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-19T02:15:08.833", + "lastModified": "2025-02-19T02:15:08.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Synway SMG Gateway Management Software up to 20250204. It has been rated as critical. This issue affects some unknown processing of the file 9-12ping.php. The manipulation of the argument retry leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/stevenchen0x01/CVE/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.296135", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.296135", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.494788", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f78c9573c32..ff2808479f8 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-19T00:55:26.738110+00:00 +2025-02-19T03:02:54.694460+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-19T00:15:10.550000+00:00 +2025-02-19T02:15:08.833000+00:00 ``` ### Last Data Feed Release @@ -27,44 +27,34 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-02-18T01:00:04.385107+00:00 +2025-02-19T01:00:04.358936+00:00 ``` ### Total Number of included CVEs ```plain -281727 +281731 ``` ### CVEs added in the last Commit -Recently added CVEs: `18` +Recently added CVEs: `4` -- [CVE-2024-13508](CVE-2024/CVE-2024-135xx/CVE-2024-13508.json) (`2025-02-19T00:15:09.360`) -- [CVE-2024-13743](CVE-2024/CVE-2024-137xx/CVE-2024-13743.json) (`2025-02-18T23:15:09.267`) -- [CVE-2024-57254](CVE-2024/CVE-2024-572xx/CVE-2024-57254.json) (`2025-02-18T23:15:09.523`) -- [CVE-2024-57255](CVE-2024/CVE-2024-572xx/CVE-2024-57255.json) (`2025-02-18T23:15:09.620`) -- [CVE-2024-57256](CVE-2024/CVE-2024-572xx/CVE-2024-57256.json) (`2025-02-18T23:15:09.710`) -- [CVE-2024-57257](CVE-2024/CVE-2024-572xx/CVE-2024-57257.json) (`2025-02-18T23:15:09.800`) -- [CVE-2024-57258](CVE-2024/CVE-2024-572xx/CVE-2024-57258.json) (`2025-02-18T23:15:09.893`) -- [CVE-2024-57259](CVE-2024/CVE-2024-572xx/CVE-2024-57259.json) (`2025-02-18T23:15:09.980`) -- [CVE-2025-22919](CVE-2025/CVE-2025-229xx/CVE-2025-22919.json) (`2025-02-18T23:15:10.073`) -- [CVE-2025-22920](CVE-2025/CVE-2025-229xx/CVE-2025-22920.json) (`2025-02-18T23:15:10.160`) -- [CVE-2025-24928](CVE-2025/CVE-2025-249xx/CVE-2025-24928.json) (`2025-02-18T23:15:10.250`) -- [CVE-2025-25471](CVE-2025/CVE-2025-254xx/CVE-2025-25471.json) (`2025-02-18T23:15:10.370`) -- [CVE-2025-25472](CVE-2025/CVE-2025-254xx/CVE-2025-25472.json) (`2025-02-18T23:15:10.453`) -- [CVE-2025-25473](CVE-2025/CVE-2025-254xx/CVE-2025-25473.json) (`2025-02-18T23:15:10.543`) -- [CVE-2025-25474](CVE-2025/CVE-2025-254xx/CVE-2025-25474.json) (`2025-02-18T23:15:10.627`) -- [CVE-2025-25475](CVE-2025/CVE-2025-254xx/CVE-2025-25475.json) (`2025-02-18T23:15:10.720`) -- [CVE-2025-26624](CVE-2025/CVE-2025-266xx/CVE-2025-26624.json) (`2025-02-18T23:15:10.810`) -- [CVE-2025-27113](CVE-2025/CVE-2025-271xx/CVE-2025-27113.json) (`2025-02-18T23:15:10.960`) +- [CVE-2024-57261](CVE-2024/CVE-2024-572xx/CVE-2024-57261.json) (`2025-02-19T02:15:08.480`) +- [CVE-2024-57262](CVE-2024/CVE-2024-572xx/CVE-2024-57262.json) (`2025-02-19T02:15:08.677`) +- [CVE-2025-1447](CVE-2025/CVE-2025-14xx/CVE-2025-1447.json) (`2025-02-19T01:15:09.407`) +- [CVE-2025-1448](CVE-2025/CVE-2025-14xx/CVE-2025-1448.json) (`2025-02-19T02:15:08.833`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `5` -- [CVE-2024-56171](CVE-2024/CVE-2024-561xx/CVE-2024-56171.json) (`2025-02-18T23:15:09.413`) +- [CVE-2024-53704](CVE-2024/CVE-2024-537xx/CVE-2024-53704.json) (`2025-02-19T02:00:02.000`) +- [CVE-2024-57257](CVE-2024/CVE-2024-572xx/CVE-2024-57257.json) (`2025-02-19T01:15:08.963`) +- [CVE-2024-57258](CVE-2024/CVE-2024-572xx/CVE-2024-57258.json) (`2025-02-19T01:15:09.117`) +- [CVE-2024-57259](CVE-2024/CVE-2024-572xx/CVE-2024-57259.json) (`2025-02-19T01:15:09.257`) +- [CVE-2025-0108](CVE-2025/CVE-2025-01xx/CVE-2025-0108.json) (`2025-02-19T02:00:02.000`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d968996cdc0..73be74eaa8e 100644 --- a/_state.csv +++ b/_state.csv @@ -246586,7 +246586,7 @@ CVE-2024-13503,0,0,ffb0135326ea2a3ea18800ce3bd83bc523a9e303f03b2acc60a1815003b24 CVE-2024-13504,0,0,65d5eda0db4362f31390d7f75ebf33f34fcbb67dce33bcab3e8868827236c840,2025-01-31T06:15:29.603000 CVE-2024-13505,0,0,895d0e00033b2fc93f737f0101cc08804d47354317cd9b6a35dce5b9b4d90dcc,2025-02-04T17:20:18.253000 CVE-2024-13506,0,0,930bb6bf4f5f135719a404ee3e3d8937d2d3b23c92567785b27ff7a81d86db45,2025-02-11T11:15:12.263000 -CVE-2024-13508,1,1,cb500d45d3d1c5f13cf603c102bdf058371a7c70fc790b3143ee2ca90431b0e4,2025-02-19T00:15:09.360000 +CVE-2024-13508,0,0,cb500d45d3d1c5f13cf603c102bdf058371a7c70fc790b3143ee2ca90431b0e4,2025-02-19T00:15:09.360000 CVE-2024-13509,0,0,4616681e9925b5001099930aae74cd3c34870295df83ba209474cc01f26318f5,2025-01-30T17:56:17.080000 CVE-2024-1351,0,0,405f7ca5457b566dd144bafd06aaa6f59a3ff04b5a8a69549d30c39336936faa,2025-02-13T18:16:24.043000 CVE-2024-13510,0,0,bf025b224548dff5677e13c6095ef04edc46d236692642ff5d521730071b549d,2025-02-04T10:15:08.167000 @@ -246747,7 +246747,7 @@ CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269d CVE-2024-13740,0,0,ba6332fba984f0b615db8e6ca888f7060538e8c0e0b28351d9f7958c938b931d,2025-02-18T03:15:10.273000 CVE-2024-13741,0,0,175049f3021b19cf7fa751f03fe80f12100c24edbb7e3c159d12f4c96d5eb8a9,2025-02-18T02:15:13.047000 CVE-2024-13742,0,0,aa7b21df6f3ec325db10419962054c1a324c9ebd12e6b4ba3b8ccbdda20e9f49,2025-01-30T18:38:19.663000 -CVE-2024-13743,1,1,27ea41ebfcfb791fdac8994b9a3c60039e7203f73b7d197f4d7616cc1f730a6d,2025-02-18T23:15:09.267000 +CVE-2024-13743,0,0,27ea41ebfcfb791fdac8994b9a3c60039e7203f73b7d197f4d7616cc1f730a6d,2025-02-18T23:15:09.267000 CVE-2024-13749,0,0,80f262ecaea974125eab2d55e54ea371d41d3a900599102c4f121cdbe4bfacc8,2025-02-12T04:15:09.793000 CVE-2024-1375,0,0,be19da9eb494f4d8787330f2f78fc8aabab79724cc539fca66a358b2ab7e8ba7,2024-11-21T08:50:26.593000 CVE-2024-13752,0,0,90982070281cf6fac387cb369b7b78fff5885316e613711da2e6fb3910f9109c,2025-02-15T10:15:08.533000 @@ -272676,7 +272676,7 @@ CVE-2024-5370,0,0,48c7315107625a479797e074526b223c8b52af346ac3d015ac5eeb0155616f CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000 CVE-2024-53702,0,0,df4acdecd1eceade8b04c1e8f2d0208a2fb87f2140d6e9f86d0b91986c09f3f5,2024-12-05T16:15:26.077000 CVE-2024-53703,0,0,fb9cc5fb637d3f614eb88b1748740fd2dceb8edefd36486bf6555b6ace1738fb,2024-12-05T15:15:11.270000 -CVE-2024-53704,0,0,27969c48b5153c259e07425a651025ffafc5f424229dab59a6c01f93d4252f9a,2025-02-18T21:15:22.547000 +CVE-2024-53704,0,1,5a29d0026803cfefd80daeb2effed8634f8ef892ba81f5bbfbab498237e4d8ea,2025-02-19T02:00:02 CVE-2024-53705,0,0,cb2aece8a5d68261ccbbe06bdcbef5f15dc8b4b71fbf212b281c5c2102470ea9,2025-01-09T15:15:18.800000 CVE-2024-53706,0,0,df37bc87068a5b2ce03429b7e89276c6f6c8ca589f496366856bc396d49be328,2025-01-09T16:16:21.743000 CVE-2024-53707,0,0,4163d5321b4bf42492ee17d3e3420b9e06f0f632230aa0e5ae79c446b00e1993,2024-12-02T14:15:13.323000 @@ -273978,7 +273978,7 @@ CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b18 CVE-2024-56161,0,0,2a6c7438bc454e067e4c7217ccd5cceb54331357f693b69fc6ab4e188462cd9e,2025-02-04T12:15:28.027000 CVE-2024-56169,0,0,567a94aa793aa7d8ac0858cf8e15bf66684dbd548103356ddbc53b2c4594c82e,2025-02-10T23:15:15.203000 CVE-2024-56170,0,0,32611264582c3e86fc6149b20f12d5acbffe58d1028228c5f9baa4ad2faec8d4,2024-12-26T19:15:08.283000 -CVE-2024-56171,0,1,a57b28947d21118f6e92b6897a79ff02d9554d30c40f0d4e932307aae08f766f,2025-02-18T23:15:09.413000 +CVE-2024-56171,0,0,a57b28947d21118f6e92b6897a79ff02d9554d30c40f0d4e932307aae08f766f,2025-02-18T23:15:09.413000 CVE-2024-56173,0,0,5336dffcdc7d9618ebdef949381efb90ee1b3998a2588e22f737fe5a77849f25,2024-12-18T16:15:15.600000 CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e97c,2024-12-18T17:15:15.190000 CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000 @@ -274688,13 +274688,15 @@ CVE-2024-57248,0,0,fb61bd5f2cf829e3e9949d68a4efd231804cc252fcca96074ac9da52c6e82 CVE-2024-57249,0,0,8fcbb1cd0dac9099c77da0f7019c7d58aadbbe52552dc9898297ef492ac8f84f,2025-02-11T16:15:48.463000 CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000 CVE-2024-57252,0,0,1934cc1672f51074e73fec8f79c8c1a0c2b2ef217ce3d8eb4ed233f3d5050e7d,2025-01-17T22:15:28.817000 -CVE-2024-57254,1,1,78f3756f504d64aafe3c7fe030d998338c4f68eeebca5a88a1ee7746dcf3b080,2025-02-19T00:15:10.243000 -CVE-2024-57255,1,1,47d85e6c518447f6b2398d380509ce606bb346706e2218bb1c2ffeae53aec47c,2025-02-19T00:15:10.397000 -CVE-2024-57256,1,1,04cbb17411d01c78be02ff0e779795e92b0782215dfab979123c37fbfd98ae11,2025-02-19T00:15:10.550000 -CVE-2024-57257,1,1,c02469de9d1b543cabfa11e611ceef6b6ed25780e09ca62798f2a6a8f745f628,2025-02-18T23:15:09.800000 -CVE-2024-57258,1,1,b1226ae97e32f2a04e094c1e261a53664906621f290009196c615659226fd163,2025-02-18T23:15:09.893000 -CVE-2024-57259,1,1,7f3f9f1c92708c0da6871a7c74e2205f47948119c8e641f13a3345092a6e6157,2025-02-18T23:15:09.980000 +CVE-2024-57254,0,0,78f3756f504d64aafe3c7fe030d998338c4f68eeebca5a88a1ee7746dcf3b080,2025-02-19T00:15:10.243000 +CVE-2024-57255,0,0,47d85e6c518447f6b2398d380509ce606bb346706e2218bb1c2ffeae53aec47c,2025-02-19T00:15:10.397000 +CVE-2024-57256,0,0,04cbb17411d01c78be02ff0e779795e92b0782215dfab979123c37fbfd98ae11,2025-02-19T00:15:10.550000 +CVE-2024-57257,0,1,0f11b41937fa4627d73472deb52deae8f6bc85d7966ebb62d9c4447ed3649650,2025-02-19T01:15:08.963000 +CVE-2024-57258,0,1,22fe56d0f81aba8abf95644ff85b0581abf3fa4849ede72d307ace4cb2da41cb,2025-02-19T01:15:09.117000 +CVE-2024-57259,0,1,7a6eb23f5e3eaefce3e01258346d6c3c63f7f8eb3b1eabb3adf0a779bd3162ae,2025-02-19T01:15:09.257000 CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000 +CVE-2024-57261,1,1,ca42f68e153d0be6e9cb0cd79e10c17f8af4df029f55193e9ee3cebd8e1524d1,2025-02-19T02:15:08.480000 +CVE-2024-57262,1,1,9450e719a6c12b68a90f479bb3c057c51a8162807b8fbaf825e482631247111d,2025-02-19T02:15:08.677000 CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000 CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000 CVE-2024-57276,0,0,21b620c07e0e3337064dc5d61a9e1c6b46709ad965f39dbfecad11193ff5bb9d,2025-01-30T22:15:09.297000 @@ -278767,7 +278769,7 @@ CVE-2025-0104,0,0,21c4318a0d99e7fa45fcf41d38940b721a051c25e3dcd31ab0543aa8393743 CVE-2025-0105,0,0,1d92b789c4ee5a1ce8b95be14f67c2ed638278c6036b1fd20d689cfe8ca07ce7,2025-01-11T03:15:22.317000 CVE-2025-0106,0,0,297e7d67cc0892af79dd6eab9f30b7cbc802b5a94f8e51453a83d44734601e5e,2025-01-11T03:15:22.490000 CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b02,2025-01-15T23:15:10.273000 -CVE-2025-0108,0,0,00274592986205c6ad43614425baa116d11a253f878966ea5c2ab772d032a552,2025-02-12T21:15:16.290000 +CVE-2025-0108,0,1,9984445b2ca5afb1526508f1260cfbe552aa27c58dc311866cf73b702ffbbe92,2025-02-19T02:00:02 CVE-2025-0109,0,0,5a24ce2e009561b2fb59096b6f1ded171180346c747fdc8ee1c0182acced781c,2025-02-12T21:15:16.470000 CVE-2025-0110,0,0,b411c8390eb932e9490dd491fe7ec15b7990f1154a6a3792e2622d16f01feb5d,2025-02-12T21:15:16.630000 CVE-2025-0111,0,0,aa2258940e699552d6ad0522d6bc535ee5e05cc6ed6d0935f57d5a6bf309cd74,2025-02-12T21:15:16.793000 @@ -279433,6 +279435,8 @@ CVE-2025-1390,0,0,02ff75a3058ee51af8713fa469c7bed94932b28a55e59655029e36f100f66a CVE-2025-1391,0,0,a1f2e3a8ca093b8de620c0e72b50119acca7a6fd87679168958e3acea938ff79,2025-02-17T14:15:08.413000 CVE-2025-1392,0,0,381fc64763a47738c9a933c7e4bcfcc84ef66c73e4a81eacddf01751da768947,2025-02-17T16:15:16.120000 CVE-2025-1414,0,0,b6f2fa5b41b9076d018bd1d274a1717bfb4b17a7162b38316b8f5f46b587bbc9,2025-02-18T21:15:25.440000 +CVE-2025-1447,1,1,0171066f5cc38b75ed48310b7b051ba77753a7de710aef2fb49270a13c1b0697,2025-02-19T01:15:09.407000 +CVE-2025-1448,1,1,8646602fe654ea9c8b8dc30e88ebd580a07aa04ffb2e255dc4fb4a77857c3ea4,2025-02-19T02:15:08.833000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000 @@ -280384,8 +280388,8 @@ CVE-2025-22913,0,0,cd3c3aefe7c3a5669cde7a2ee1d89cefb3b13bfe1cdbf0f6d928668a7ec0e CVE-2025-22916,0,0,6c28d06c66a3a04473870372fc3d915bb705229b4ce4207a1272b25cfd8538c4,2025-02-18T21:15:27.950000 CVE-2025-22917,0,0,0d72f7ff6d66913d2820416ce95685d3bc853139131a9698fa080019dc84bb06,2025-01-29T16:15:43.907000 CVE-2025-22918,0,0,2fd7b69a5783a0816fd30844977f8382a02d00bf28fb9a113c66c1ed7d87d02d,2025-02-18T19:15:26.700000 -CVE-2025-22919,1,1,1b0d00aaf6631f840ce13a016b207283d93d827c42bc5445866edb031c55f281,2025-02-18T23:15:10.073000 -CVE-2025-22920,1,1,fd7b66fc43d3a9481e10e6d16eeabb06cbc7558b61e61ab2d56633a397652b91,2025-02-18T23:15:10.160000 +CVE-2025-22919,0,0,1b0d00aaf6631f840ce13a016b207283d93d827c42bc5445866edb031c55f281,2025-02-18T23:15:10.073000 +CVE-2025-22920,0,0,fd7b66fc43d3a9481e10e6d16eeabb06cbc7558b61e61ab2d56633a397652b91,2025-02-18T23:15:10.160000 CVE-2025-22921,0,0,debc99abe53255cfa5a22b0ec7ab8f1dfb477f7032a6902bbdfd515f66bcedf6,2025-02-18T22:15:18.040000 CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000 CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000 @@ -281407,7 +281411,7 @@ CVE-2025-24903,0,0,f94c50d2f0574a93b5b48805712360c1af6392fea087d65c2ed61830aedff CVE-2025-24904,0,0,922b25d3a9b426b643b71230fe8a3d6600552e09598c6cd6bc1bcb32f760c1d1,2025-02-13T16:16:49.053000 CVE-2025-24905,0,0,ecc12daf91d871ae88d04f98498257679fd02d46bd8922b3f82316cc94d8878c,2025-02-13T19:00:37.593000 CVE-2025-24906,0,0,13b689df14524878d89525acaf7cfd0d975a63297d29c07d6d881d3b3e914d54,2025-02-13T18:59:59.940000 -CVE-2025-24928,1,1,e5fd8968e5c5c56f275d71a964d0b667b12bcc4ba8d81e28fd60cc19579119bd,2025-02-18T23:15:10.250000 +CVE-2025-24928,0,0,e5fd8968e5c5c56f275d71a964d0b667b12bcc4ba8d81e28fd60cc19579119bd,2025-02-18T23:15:10.250000 CVE-2025-24956,0,0,60f62dbd8ca3ec9022b0bbf689d92a9416e8938202e5bdb77bb2e05ca0ed67f7,2025-02-11T11:15:17.273000 CVE-2025-24957,0,0,4c6009fdcebadcde59c81c994d42af877595682fdef18bb7378b4f2679eaf5d8,2025-02-13T18:59:32.867000 CVE-2025-24958,0,0,83843e5baca1cb66509cb1b7cb198ebfd9f486662ffcb2ce9c260edca5373dcd,2025-02-13T18:58:56.320000 @@ -281555,11 +281559,11 @@ CVE-2025-25389,0,0,9f7198ffc91c33105d03adb0c3ce8e30d33f5591c78e15ae8d3046dd1ba01 CVE-2025-25467,0,0,61ffc7e889c5c4d70b42d956678cc9ed638e9d5b8d680d26869fea336cad8905,2025-02-18T22:15:18.373000 CVE-2025-25468,0,0,85057d249a185badd8089bc6bcbf97fd2a496ee7b42fd2afcf4045da21103a1d,2025-02-18T22:15:18.477000 CVE-2025-25469,0,0,e9ca9bae21c00b3260ea3e00b66e7b1daf3a8f35534912c9c9e5bdd584776714,2025-02-18T22:15:18.587000 -CVE-2025-25471,1,1,1cf8cabe5ddcb48378e820b0e4aeb116707ed6be0c741b8dc51daf45d68d9938,2025-02-18T23:15:10.370000 -CVE-2025-25472,1,1,c2f5cc257d7e5a6c5a49c63bafb1948a39e5c850debde3aec5b79fd0d4b3f6fa,2025-02-18T23:15:10.453000 -CVE-2025-25473,1,1,c3377abea32643377986d4a6c8e6cee28a2c25045f9979e0b4cd6a8ce35d70a2,2025-02-18T23:15:10.543000 -CVE-2025-25474,1,1,b925b7428c677c1e850c370ad9f0ec38d1213c70f43bec4b9eca1ff32d89c5ca,2025-02-18T23:15:10.627000 -CVE-2025-25475,1,1,748ef3834a42c41684ceff00188d0797766715b6cc9289f8a3a26c427d42cf2e,2025-02-18T23:15:10.720000 +CVE-2025-25471,0,0,1cf8cabe5ddcb48378e820b0e4aeb116707ed6be0c741b8dc51daf45d68d9938,2025-02-18T23:15:10.370000 +CVE-2025-25472,0,0,c2f5cc257d7e5a6c5a49c63bafb1948a39e5c850debde3aec5b79fd0d4b3f6fa,2025-02-18T23:15:10.453000 +CVE-2025-25473,0,0,c3377abea32643377986d4a6c8e6cee28a2c25045f9979e0b4cd6a8ce35d70a2,2025-02-18T23:15:10.543000 +CVE-2025-25474,0,0,b925b7428c677c1e850c370ad9f0ec38d1213c70f43bec4b9eca1ff32d89c5ca,2025-02-18T23:15:10.627000 +CVE-2025-25475,0,0,748ef3834a42c41684ceff00188d0797766715b6cc9289f8a3a26c427d42cf2e,2025-02-18T23:15:10.720000 CVE-2025-25522,0,0,9f2c0bc0a6dbb67154353c2da3969483621b5d35364f73acfaa2a34b0ff5a40b,2025-02-13T17:17:20.517000 CVE-2025-25523,0,0,9c6d5a6c8c747b7673e69ebf58bf535f17db00e0831b58073ddd586410cf36d9,2025-02-13T18:18:23.400000 CVE-2025-25524,0,0,40af9c5e5be067f2e684b500c6cae4a5dab6d519bde35d9c0fd3353781274a87,2025-02-13T18:18:23.597000 @@ -281699,7 +281703,7 @@ CVE-2025-26616,0,0,adfc76ec40903a204c1832e3daed3f0e44bf0c652172addd04989d3ff972b CVE-2025-26617,0,0,1b0fc09fd0258e134911cacd2ad1e559b3734d07d890bba395627bae512ac0ad,2025-02-18T21:15:30.137000 CVE-2025-26620,0,0,b52554701527e486a669272c32db538b4af2be9f7d05b83de248aad0441a11da,2025-02-18T18:15:36.767000 CVE-2025-26623,0,0,8058a54e26172919c4073d93d1e5d8c8b4196bc60cec9ced7fa5cc190a1b8657,2025-02-18T20:15:33.153000 -CVE-2025-26624,1,1,b1ee6d12b9f4cff5337865530f2b95198c23875bf3e99102a3d462bb47eeba02,2025-02-18T23:15:10.810000 +CVE-2025-26624,0,0,b1ee6d12b9f4cff5337865530f2b95198c23875bf3e99102a3d462bb47eeba02,2025-02-18T23:15:10.810000 CVE-2025-26700,0,0,a62049a64dad278ca1213054f25f2aed479e1d05d98e9fdc2dc613607ff558b5,2025-02-17T03:15:09.750000 CVE-2025-26754,0,0,402a2759dad93da9f23b2492c07100626d0693520f28e20423238f6ecd814d8a,2025-02-17T12:15:28.267000 CVE-2025-26755,0,0,ab55ada10e2471e3f3b6d39ba7098336ac0a1b0769fa3f43fd2c4de0b71599ce,2025-02-16T23:15:10.627000 @@ -281725,4 +281729,4 @@ CVE-2025-26793,0,0,23a8e0213a0ca1b8120177cee0a8b3703ebe8289aad842eda98d1b97dcb6b CVE-2025-26819,0,0,7afd4e7cb03752c52e5526c11c2ec114770ff5f83e4468a7bb7571814f4cc158,2025-02-15T00:15:28.510000 CVE-2025-27013,0,0,f948cc3f5edcc63c02fbe1aa3ab5587f3b1659a21b1a5f943b19bb040cbb2d15,2025-02-18T20:15:33.880000 CVE-2025-27016,0,0,04fa07ed62d9b49f3b31ebda2ac8455c38c6351226a3cae9904a3c1abe91e83f,2025-02-18T20:15:34.013000 -CVE-2025-27113,1,1,5361e7323e42f3b09824985b5c3b788849d795bb02cd5dec29aec9ac11d6b7a1,2025-02-18T23:15:10.960000 +CVE-2025-27113,0,0,5361e7323e42f3b09824985b5c3b788849d795bb02cd5dec29aec9ac11d6b7a1,2025-02-18T23:15:10.960000