From 3fd72e11bb7d25854e18d4ea17830da3cfd30d13 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 6 Mar 2025 11:03:49 +0000 Subject: [PATCH] Auto-Update: 2025-03-06T11:00:20.763007+00:00 --- CVE-2022/CVE-2022-15xx/CVE-2022-1586.json | 13 +- CVE-2024/CVE-2024-122xx/CVE-2024-12297.json | 8 +- CVE-2024/CVE-2024-138xx/CVE-2024-13897.json | 64 +++++++++ CVE-2024/CVE-2024-139xx/CVE-2024-13902.json | 137 ++++++++++++++++++++ CVE-2025/CVE-2025-15xx/CVE-2025-1540.json | 60 +++++++++ CVE-2025/CVE-2025-16xx/CVE-2025-1672.json | 64 +++++++++ README.md | 42 ++---- _state.csv | 70 +++++----- 8 files changed, 390 insertions(+), 68 deletions(-) create mode 100644 CVE-2024/CVE-2024-138xx/CVE-2024-13897.json create mode 100644 CVE-2024/CVE-2024-139xx/CVE-2024-13902.json create mode 100644 CVE-2025/CVE-2025-15xx/CVE-2025-1540.json create mode 100644 CVE-2025/CVE-2025-16xx/CVE-2025-1672.json diff --git a/CVE-2022/CVE-2022-15xx/CVE-2022-1586.json b/CVE-2022/CVE-2022-15xx/CVE-2022-1586.json index 8e2897ebc9b..5ea29781a6b 100644 --- a/CVE-2022/CVE-2022-15xx/CVE-2022-1586.json +++ b/CVE-2022/CVE-2022-15xx/CVE-2022-1586.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1586", "sourceIdentifier": "secalert@redhat.com", "published": "2022-05-16T21:15:07.793", - "lastModified": "2025-02-11T20:42:44.623", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-06T09:15:22.620", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -328,6 +328,7 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077976%2C", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Issue Tracking" ] }, @@ -388,6 +389,10 @@ "Third Party Advisory" ] }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077976", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077976%2C", "source": "af854a3a-2127-422b-91ae-364da2661108", @@ -396,6 +401,10 @@ "Issue Tracking" ] }, + { + "url": "https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a%2C", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12297.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12297.json index 174383af0df..15a879b9b7c 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12297.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12297.json @@ -2,13 +2,13 @@ "id": "CVE-2024-12297", "sourceIdentifier": "psirt@moxa.com", "published": "2025-01-15T10:15:07.237", - "lastModified": "2025-01-15T10:15:07.237", + "lastModified": "2025-03-06T09:15:25.380", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Moxa\u2019s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device." + "value": "Moxa\u2019s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device." }, { "lang": "es", @@ -77,6 +77,10 @@ { "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241407-cve-2024-12297-frontend-authorization-logic-disclosure-vulnerability-in-eds-508a-series", "source": "psirt@moxa.com" + }, + { + "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241408-cve-2024-12297-frontend-authorization-logic-disclosure-vulnerability-identified-in-pt-switches", + "source": "psirt@moxa.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13897.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13897.json new file mode 100644 index 00000000000..a3e54c9f828 --- /dev/null +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13897.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-13897", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-06T09:15:25.787", + "lastModified": "2025-03-06T09:15:25.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Moving Media Library plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the generate_json_page function in all versions up to, and including, 1.22. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/moving-media-library/trunk/lib/class-movingmedialibraryadmin.php#L166", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3244709/moving-media-library/trunk/lib/class-movingmedialibraryadmin.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/815ce00b-3753-4c38-8a30-5242a5841734?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13902.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13902.json new file mode 100644 index 00000000000..2e1b78787b1 --- /dev/null +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13902.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-13902", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-06T10:15:09.900", + "lastModified": "2025-03-06T10:15:09.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in huang-yk student-manage 1.0. This affects an unknown part of the component Edit a Student Information Page. The manipulation of the argument Class leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/huang-yk/student-manage/issues/I9UXC4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298785", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298785", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1540.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1540.json new file mode 100644 index 00000000000..8c456306d51 --- /dev/null +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1540.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-1540", + "sourceIdentifier": "cve@gitlab.com", + "published": "2025-03-06T09:15:26.317", + "lastModified": "2025-03-06T09:15:26.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue has been discovered in GitLab CE/EE for Self-Managed and Dedicated instances affecting all versions from 17.5 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2. It was possible for a user added as an External to read and clone internal projects under certain circumstances.\"" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://about.gitlab.com/releases/2025/02/12/patch-release-gitlab-17-8-2-released/#saml-authentication-misconfigures-external-user-attribute", + "source": "cve@gitlab.com" + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/512765", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1672.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1672.json new file mode 100644 index 00000000000..4fa20b79691 --- /dev/null +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1672.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-1672", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-06T10:15:11.897", + "lastModified": "2025-03-06T10:15:11.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Notibar \u2013 Notification Bar for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3246799/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/notibar/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9985627d-9ba4-4a5b-94fb-06bcc769acfd?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 56220b0e122..f4657d160c2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-06T07:00:21.103739+00:00 +2025-03-06T11:00:20.763007+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-06T06:15:36.640000+00:00 +2025-03-06T10:15:11.897000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284296 +284300 ``` ### CVEs added in the last Commit -Recently added CVEs: `30` +Recently added CVEs: `4` -- [CVE-2025-20910](CVE-2025/CVE-2025-209xx/CVE-2025-20910.json) (`2025-03-06T05:15:17.480`) -- [CVE-2025-20911](CVE-2025/CVE-2025-209xx/CVE-2025-20911.json) (`2025-03-06T05:15:17.653`) -- [CVE-2025-20912](CVE-2025/CVE-2025-209xx/CVE-2025-20912.json) (`2025-03-06T05:15:17.860`) -- [CVE-2025-20913](CVE-2025/CVE-2025-209xx/CVE-2025-20913.json) (`2025-03-06T05:15:18.037`) -- [CVE-2025-20914](CVE-2025/CVE-2025-209xx/CVE-2025-20914.json) (`2025-03-06T05:15:18.210`) -- [CVE-2025-20915](CVE-2025/CVE-2025-209xx/CVE-2025-20915.json) (`2025-03-06T05:15:18.387`) -- [CVE-2025-20916](CVE-2025/CVE-2025-209xx/CVE-2025-20916.json) (`2025-03-06T05:15:18.527`) -- [CVE-2025-20917](CVE-2025/CVE-2025-209xx/CVE-2025-20917.json) (`2025-03-06T05:15:18.683`) -- [CVE-2025-20918](CVE-2025/CVE-2025-209xx/CVE-2025-20918.json) (`2025-03-06T05:15:18.883`) -- [CVE-2025-20919](CVE-2025/CVE-2025-209xx/CVE-2025-20919.json) (`2025-03-06T05:15:19.050`) -- [CVE-2025-20920](CVE-2025/CVE-2025-209xx/CVE-2025-20920.json) (`2025-03-06T05:15:19.203`) -- [CVE-2025-20921](CVE-2025/CVE-2025-209xx/CVE-2025-20921.json) (`2025-03-06T05:15:19.347`) -- [CVE-2025-20922](CVE-2025/CVE-2025-209xx/CVE-2025-20922.json) (`2025-03-06T05:15:19.533`) -- [CVE-2025-20923](CVE-2025/CVE-2025-209xx/CVE-2025-20923.json) (`2025-03-06T05:15:19.690`) -- [CVE-2025-20924](CVE-2025/CVE-2025-209xx/CVE-2025-20924.json) (`2025-03-06T05:15:19.870`) -- [CVE-2025-20925](CVE-2025/CVE-2025-209xx/CVE-2025-20925.json) (`2025-03-06T05:15:20.093`) -- [CVE-2025-20926](CVE-2025/CVE-2025-209xx/CVE-2025-20926.json) (`2025-03-06T05:15:20.383`) -- [CVE-2025-20927](CVE-2025/CVE-2025-209xx/CVE-2025-20927.json) (`2025-03-06T05:15:20.547`) -- [CVE-2025-20928](CVE-2025/CVE-2025-209xx/CVE-2025-20928.json) (`2025-03-06T05:15:20.703`) -- [CVE-2025-20929](CVE-2025/CVE-2025-209xx/CVE-2025-20929.json) (`2025-03-06T05:15:20.900`) -- [CVE-2025-20930](CVE-2025/CVE-2025-209xx/CVE-2025-20930.json) (`2025-03-06T05:15:21.063`) -- [CVE-2025-20931](CVE-2025/CVE-2025-209xx/CVE-2025-20931.json) (`2025-03-06T05:15:21.210`) -- [CVE-2025-20932](CVE-2025/CVE-2025-209xx/CVE-2025-20932.json) (`2025-03-06T05:15:21.440`) -- [CVE-2025-20933](CVE-2025/CVE-2025-209xx/CVE-2025-20933.json) (`2025-03-06T05:15:21.607`) -- [CVE-2025-22623](CVE-2025/CVE-2025-226xx/CVE-2025-22623.json) (`2025-03-06T05:15:21.790`) +- [CVE-2024-13897](CVE-2024/CVE-2024-138xx/CVE-2024-13897.json) (`2025-03-06T09:15:25.787`) +- [CVE-2024-13902](CVE-2024/CVE-2024-139xx/CVE-2024-13902.json) (`2025-03-06T10:15:09.900`) +- [CVE-2025-1540](CVE-2025/CVE-2025-15xx/CVE-2025-1540.json) (`2025-03-06T09:15:26.317`) +- [CVE-2025-1672](CVE-2025/CVE-2025-16xx/CVE-2025-1672.json) (`2025-03-06T10:15:11.897`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `2` -- [CVE-2024-56161](CVE-2024/CVE-2024-561xx/CVE-2024-56161.json) (`2025-03-06T06:15:36.640`) +- [CVE-2022-1586](CVE-2022/CVE-2022-15xx/CVE-2022-1586.json) (`2025-03-06T09:15:22.620`) +- [CVE-2024-12297](CVE-2024/CVE-2024-122xx/CVE-2024-12297.json) (`2025-03-06T09:15:25.380`) ## Download and Usage diff --git a/_state.csv b/_state.csv index df47738f880..583ad518277 100644 --- a/_state.csv +++ b/_state.csv @@ -189381,7 +189381,7 @@ CVE-2022-1582,0,0,dace5e4010745f77894b12ada5b9e82644ec62025375cf740a6b2ebdd764ac CVE-2022-1583,0,0,9fc38651a069d6f2da6bd685610c015b33d8de1f21446b0fc9bccaccc34c643a,2024-11-21T06:41:00.943000 CVE-2022-1584,0,0,fd8ea0d786a8cc4ee1614f65f6ce5bd87dad6e566c4414065756f607612464af,2024-11-21T06:41:01.053000 CVE-2022-1585,0,0,7ae45bdbf483386a0b5c6ce9a6289f541468fb6bf7c1a82dd016ea498870c6b2,2024-11-21T06:41:01.180000 -CVE-2022-1586,0,0,ef0b729c4971e6a4d3436640fc49dd4a670f6af832b75338e2212b0e26dba986,2025-02-11T20:42:44.623000 +CVE-2022-1586,0,1,b22a07222d6583368b52544fed9de2db26aef6afa8f52486a2552793f18965ad,2025-03-06T09:15:22.620000 CVE-2022-1587,0,0,33531b130b42bff477994b0784c4db381a86095bed324f62c579e2e1f266ca43,2024-11-21T06:41:01.463000 CVE-2022-1588,0,0,bd6f8bc30591dc10ab8cff70a8c4dcd1839e97bc2ac01535e77d20aca85e3290,2023-11-07T03:42:01.640000 CVE-2022-1589,0,0,96e1e225316eab2298ded5be262eee0dba57de9ca9e6e3b7e6a051e3dede1578,2024-11-21T06:41:01.620000 @@ -246376,7 +246376,7 @@ CVE-2024-12292,0,0,9c2e3f4715c47523d2f1e1d813aca821c280ab211aff2eeed6650ad59c376 CVE-2024-12293,0,0,2953fa4e59ad0d89a9c80037ec9c293444942d58e596c71e3b8975df1192ecb7,2024-12-17T09:15:05.347000 CVE-2024-12294,0,0,beb757b9be530a21bd62fb0889c97c31013e2208ab8db98bc3384b757caf5365,2024-12-11T11:15:06.623000 CVE-2024-12296,0,0,2e1864fa6072ab80c406429c59d508ec6233147fe965c5fb3773394e06f5d391,2025-02-20T16:09:14.287000 -CVE-2024-12297,0,0,3d5a8227273bb5f494c301b7e03ba8440d5f772850115c2d0319b768e8d37fee,2025-01-15T10:15:07.237000 +CVE-2024-12297,0,1,0bf5340e7a5fbc70cb59bfd941e3c3af31a7ca051fcdd935c4a0bdf03ed01122,2025-03-06T09:15:25.380000 CVE-2024-12298,0,0,cc5fe609045dfd20e01ee8b5a4a2dfa91435af5a3c75ddd1927f875f5047d786,2025-01-14T01:15:09.423000 CVE-2024-12299,0,0,6bf8e5e626459eb3d35ab60bd9555f090eb208e414339f648c4215470dc975d2,2025-01-31T18:22:07.800000 CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000 @@ -247755,7 +247755,7 @@ CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 CVE-2024-13866,0,0,7b6522806f9fda20a87affc69ae1455066ad3672ed7237b6480428aa11037ef9,2025-03-05T09:15:09.587000 CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000 -CVE-2024-13868,1,1,01282352025192d89cb78e275647952c2fc34343530e7fd3626f707fafb8b5b5,2025-03-06T06:15:34.720000 +CVE-2024-13868,0,0,01282352025192d89cb78e275647952c2fc34343530e7fd3626f707fafb8b5b5,2025-03-06T06:15:34.720000 CVE-2024-13869,0,0,c77419cef6121e679e8e638d5bb725353463651ff74190e6dc66952341bcdf5d,2025-03-05T21:28:15.293000 CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000 CVE-2024-13873,0,0,ef7d81633c3243b5a662796d38d39a610ff44d855cd436a1a77aa5716496d20c,2025-02-22T04:15:09.567000 @@ -247764,10 +247764,12 @@ CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e CVE-2024-13883,0,0,1e82cdf8d40eea1cf0fdba117374eff50482e8082835729e73b8298b4bf2a5eb,2025-02-25T03:39:21.267000 CVE-2024-13888,0,0,45ea465fd1196bf38b8c341b411c16c5302500649feb2c402e910f2e8aae7f79,2025-02-25T20:39:44.927000 CVE-2024-1389,0,0,44c915b89d8f24815db27dcf9521c10fcca5d968291afb2cbd201094aadb9d12,2025-01-27T17:15:51.567000 +CVE-2024-13897,1,1,07f598b96e670ba19e3823cc39b2ae054e4338a7f34c42c2715bbbd41cb120b3,2025-03-06T09:15:25.787000 CVE-2024-13899,0,0,372540a329e3dd48ea203e26ad119a2f49b08582c995a840b88c85b67384dc50,2025-02-22T04:15:09.720000 CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f88,2025-01-22T16:49:11.553000 CVE-2024-13900,0,0,a36f38c86f625b2f6c78f95d04b10fcda1c4c7dcd50cfc141d8c356f3933fb59,2025-02-25T04:02:36.137000 CVE-2024-13901,0,0,b4d4185fc2cf368e3c24da5377f1f5ad78958c5d2f761e097232a413aff597e6,2025-03-01T06:15:33.827000 +CVE-2024-13902,1,1,d88d3cc9e45e0c55d2afb6679644be58fc5bebe0dd23fa62d23f86a13679c70f,2025-03-06T10:15:09.900000 CVE-2024-13905,0,0,94a06017058e47ea224d64f1fcc59573ef0629f841649e95825b26eac6b9c491,2025-02-27T05:15:13.610000 CVE-2024-13907,0,0,f2da3425f3470ad3127836884558cd2ad3921d2f9bdfdbcb35d8a21b911174f4,2025-02-27T07:15:33.543000 CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000 @@ -275157,7 +275159,7 @@ CVE-2024-56145,0,0,1bf04321f372be6a391b26e37787c9310c18edadc786028f82c542bd3efa0 CVE-2024-5615,0,0,37856ff1a2df0ee42bdd2faed17aef170393a5807410ba1a41f1c8e8ad65ffc3,2024-11-21T09:48:01.413000 CVE-2024-56159,0,0,d6437f8167288212b0feaa31ad952f4a47211de648a6e462a65c30d1453de687,2024-12-20T21:15:09.940000 CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b1818,2024-11-21T09:48:01.540000 -CVE-2024-56161,0,1,cd0de4438b5b4aaa67a57689c54fc4182cd270be65158ff9fc5864c87b196fde,2025-03-06T06:15:36.640000 +CVE-2024-56161,0,0,cd0de4438b5b4aaa67a57689c54fc4182cd270be65158ff9fc5864c87b196fde,2025-03-06T06:15:36.640000 CVE-2024-56169,0,0,567a94aa793aa7d8ac0858cf8e15bf66684dbd548103356ddbc53b2c4594c82e,2025-02-10T23:15:15.203000 CVE-2024-56170,0,0,32611264582c3e86fc6149b20f12d5acbffe58d1028228c5f9baa4ad2faec8d4,2024-12-26T19:15:08.283000 CVE-2024-56171,0,0,8cc43a9d9ba32f16f963a5c9359e85704bcc5f8cac2b879034099a3ffd3643fe,2025-02-18T23:15:09.413000 @@ -280887,6 +280889,7 @@ CVE-2025-1536,0,0,13d2bb79966b022c194b53190d029539a3b9db0220df5fb889249e7f79d2fa CVE-2025-1537,0,0,861630e1b0372f1f37852ff12813e7a5ac2fa6d179d082cf3113227aa130bf0c,2025-02-21T15:15:12.460000 CVE-2025-1538,0,0,13e428f2e0a70ca29f792d43841bea06ccb32609b695e1ccad7a3e5c918f65a6,2025-02-25T20:54:42.947000 CVE-2025-1539,0,0,97460c98bf526740214940beb1708fd987b97676a93649d845868894467b4304,2025-02-21T15:15:12.830000 +CVE-2025-1540,1,1,0c563f4f685636159ddf5e4314eb08b0ba3d992f086b463f21581a35e349e4cd,2025-03-06T09:15:26.317000 CVE-2025-1543,0,0,dfb74998b01a6403cafc6b46cb4c4c78345f8468d3e985eba5ddcbda95801293,2025-02-21T16:15:32.787000 CVE-2025-1544,0,0,2377ad87743f4fe242650024fb03372701542bc42778ab3d19eda86c524de177,2025-02-21T16:15:32.953000 CVE-2025-1546,0,0,84418e607817926124f36f2ad2fdd36567961e93366563a9f6287482acdf5eab,2025-02-21T18:15:21.523000 @@ -280953,6 +280956,7 @@ CVE-2025-1646,0,0,82269c59d8fff978173814c505cbeb09d268e21305971283c38395c7897fc3 CVE-2025-1648,0,0,01be54e92ee6583d4b180477f3f82c99c2017256ad3257671bbc83775fcbe841,2025-02-28T01:30:32.830000 CVE-2025-1662,0,0,65cfd856306d889617e3038fc6a8c795bc27be9c444f1a9c5df3c4ffdd828a0f,2025-02-28T09:15:12.373000 CVE-2025-1671,0,0,dfe1ff393d446d4a55c0e76e273c07a93a52c6ac6df15c5814731fbc40a9a1ea,2025-03-01T08:15:34.320000 +CVE-2025-1672,1,1,7a20675a12af4d2fa4d4625b3c2a44c55632de2b78981cd05f1c08d4059e6b7d,2025-03-06T10:15:11.897000 CVE-2025-1673,0,0,43512569ec0b0b4646ee8d2f3e7a6a4bcb909a60652f0dbc32a6d2623d178b1f,2025-02-28T01:30:32.830000 CVE-2025-1674,0,0,c9ab5cf0d854b00d30135f8d3aae01653c22e99139baff93dd6ad32b17a41d13,2025-02-28T01:30:32.830000 CVE-2025-1675,0,0,0b817eb545f757f9942631ee6d87bc1530fc1d31342388c76d70ff502c500bfa,2025-02-25T08:15:30.020000 @@ -281125,7 +281129,7 @@ CVE-2025-1965,0,0,72705674a561d6056f4e54dfd5d2fda7d9f6e486812e38d2b199633b788552 CVE-2025-1966,0,0,6ccd782fa14c79bfb085da504344a1de6f9901dce1ffefcf87ba1c9f56a60487,2025-03-05T15:15:17.260000 CVE-2025-1967,0,0,42e655fe49f6762d0d9e1e0fe0e87e8caffe391f86ae92c278c36c149b534595,2025-03-05T15:15:17.410000 CVE-2025-1969,0,0,06a782c53158bfcfa719a54832f6c914b6b8cf10ad0fb557e3dedb429cf5a384,2025-03-04T19:15:38.290000 -CVE-2025-1979,1,1,ab6ebd8432729f4d1f89f60a1b5f33ac4641f195a8abf7cc03358d6bf3593a07,2025-03-06T05:15:16.213000 +CVE-2025-1979,0,0,ab6ebd8432729f4d1f89f60a1b5f33ac4641f195a8abf7cc03358d6bf3593a07,2025-03-06T05:15:16.213000 CVE-2025-20002,0,0,2bccd9ef008596859abc4b0349462cb16836a7cb045dcda2e77e2e2faea7a70c,2025-03-05T00:15:37.910000 CVE-2025-20011,0,0,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000 CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000 @@ -281241,37 +281245,37 @@ CVE-2025-20899,0,0,37e552d621ddc6dc1641fe22a67e7855bbb90df3935b8b7bcae06f629e861 CVE-2025-20900,0,0,cdbfe12fadb6b1daef1b5df096ec18e9fbbc9e22b5f7855c559a75859f21009e,2025-02-04T08:15:31.573000 CVE-2025-20901,0,0,1cd5be79ef23e55fe6145042cb5a2419ef341bfead0310c40602ee7c827f70ed,2025-02-04T08:15:31.707000 CVE-2025-20902,0,0,8013f469fd8000f4a72f5eaf9c7432ead63aa4009d5e5a41230ef22aa8a9bad7,2025-02-04T08:15:31.857000 -CVE-2025-20903,1,1,e6de6e0786fabbd61c6bd9213d37b2911630c09b38b3dbfc4fe2ee023225e67f,2025-03-06T05:15:16.977000 +CVE-2025-20903,0,0,e6de6e0786fabbd61c6bd9213d37b2911630c09b38b3dbfc4fe2ee023225e67f,2025-03-06T05:15:16.977000 CVE-2025-20904,0,0,e64372ca9753518166d5d1484c4b77aaccc9ceef13997ee92c25077a814f1ec5,2025-02-12T13:48:47.607000 CVE-2025-20905,0,0,a956dc69bd97b881e89bd16659a244ea0d2dfdbee0596702ba457566048c8c03,2025-02-12T13:49:26.310000 CVE-2025-20906,0,0,227b94242ada97f5f1b38d2297103a593c8ae5078c64d6e33b6eecd693ed4b68,2025-02-04T08:15:32.263000 CVE-2025-20907,0,0,379c340eb54b31b9cb5f71668b76a83cd25f313f0ca982b642024600b12637ce,2025-02-12T13:49:49.460000 -CVE-2025-20908,1,1,cdd16c5f2a8b406c1a35a1f3f4bb4dabb289605a74b59ea8e98551412e416f2f,2025-03-06T05:15:17.150000 -CVE-2025-20909,1,1,b2c6099ab5458167997f0f666fc93748e67670d51d094993e13883929a1691f3,2025-03-06T05:15:17.307000 -CVE-2025-20910,1,1,6aa0678b65cc17902a07d2e24a3710740c20d68cfc7aad727e04273e0eb39320,2025-03-06T05:15:17.480000 -CVE-2025-20911,1,1,8a605c713889c830090292428e557fc940d2352b115c3bdf3980b6f3b7a14821,2025-03-06T05:15:17.653000 -CVE-2025-20912,1,1,210cdeb2c4a03759c922510e8ce6889f6e2e3ab0540a9eeb7b979d21d9406c40,2025-03-06T05:15:17.860000 -CVE-2025-20913,1,1,dc18939858db4a9dabaa35d3591b5a676ffa9a82b67f92f7515d7c9f2e58f2c4,2025-03-06T05:15:18.037000 -CVE-2025-20914,1,1,b3c681a324204be876ca2bea2b93b62698d43635f22105ad6617ff757a2c47ea,2025-03-06T05:15:18.210000 -CVE-2025-20915,1,1,7e0aaa10504b9f6431708e5d3c2a03cf19b4e9bb97c57cddd95a398396118c76,2025-03-06T05:15:18.387000 -CVE-2025-20916,1,1,a3ccdb6e5f7216dd9620777c14810228a99c108ebbd357e01034541061a8cd8f,2025-03-06T05:15:18.527000 -CVE-2025-20917,1,1,891c495a84fb4f080761d9c0ce277e7f0b005b198b7d9b787822ad5e3f0f5df2,2025-03-06T05:15:18.683000 -CVE-2025-20918,1,1,546c0a12bf01fab2f53897b868cfda60be7a0122eca9ff933a870647f693fa78,2025-03-06T05:15:18.883000 -CVE-2025-20919,1,1,1812aa8cfcfc5333cffeb298b89555dab225eb40a4eaca5f4d0a431aebcc0f39,2025-03-06T05:15:19.050000 -CVE-2025-20920,1,1,08676ad132da64a11d1a6a857a0611e26c1babe338eb248077300512e5f97acc,2025-03-06T05:15:19.203000 -CVE-2025-20921,1,1,fd1fd95d82d1189544e61726dfcac3b6663e8a89a439f2951f6b4ddb250c6543,2025-03-06T05:15:19.347000 -CVE-2025-20922,1,1,3ad36465ea53683d6c24419f2d57a9924498c7d5eb8a386e3e60fe9f98fe4226,2025-03-06T05:15:19.533000 -CVE-2025-20923,1,1,a22e990ccdfa1497f700e265dac8f4f5d75cec773ba22e3f62bae353d567c6b7,2025-03-06T05:15:19.690000 -CVE-2025-20924,1,1,39db03778b4bc36516af3cb47462ef4e5b140a73f0e7f01701125d6ac5484830,2025-03-06T05:15:19.870000 -CVE-2025-20925,1,1,97882705f9b81e2b2ab97f6c2749d117a0edaca217671aa9a23b2c024671de48,2025-03-06T05:15:20.093000 -CVE-2025-20926,1,1,888fde423793e6049271d2f28dd33f1061aedc60ff9ecb9dba38d065204c4aa1,2025-03-06T05:15:20.383000 -CVE-2025-20927,1,1,a91be5515495a3d34d196829d47903c1893510322e01e578f39c3bba75d9c24f,2025-03-06T05:15:20.547000 -CVE-2025-20928,1,1,da9f49ea75ced231fac5c30669418edbea8d3153111bf8477e5f66cb40641f4e,2025-03-06T05:15:20.703000 -CVE-2025-20929,1,1,2dce13ec28c6ed5e496045ee2a31327f1fce4e10348c2c287649e719a2844a69,2025-03-06T05:15:20.900000 -CVE-2025-20930,1,1,bab4c083da011ea0367ed0226c007ad7a6239b4ffdd12dbc6f7212f68a5c25c5,2025-03-06T05:15:21.063000 -CVE-2025-20931,1,1,b15093c52baa75c84a98d672b6f6a3cd23e07c961fb2a36b02824adf054c2662,2025-03-06T05:15:21.210000 -CVE-2025-20932,1,1,81815a0a786eaf533d780b376fc38d3bfe12c02cf7f75e867f04a83384938f1b,2025-03-06T05:15:21.440000 -CVE-2025-20933,1,1,4d27621d6c7c64c672d5a5becfc0ae215b76265ce07a5a1bfdec129c6401322c,2025-03-06T05:15:21.607000 +CVE-2025-20908,0,0,cdd16c5f2a8b406c1a35a1f3f4bb4dabb289605a74b59ea8e98551412e416f2f,2025-03-06T05:15:17.150000 +CVE-2025-20909,0,0,b2c6099ab5458167997f0f666fc93748e67670d51d094993e13883929a1691f3,2025-03-06T05:15:17.307000 +CVE-2025-20910,0,0,6aa0678b65cc17902a07d2e24a3710740c20d68cfc7aad727e04273e0eb39320,2025-03-06T05:15:17.480000 +CVE-2025-20911,0,0,8a605c713889c830090292428e557fc940d2352b115c3bdf3980b6f3b7a14821,2025-03-06T05:15:17.653000 +CVE-2025-20912,0,0,210cdeb2c4a03759c922510e8ce6889f6e2e3ab0540a9eeb7b979d21d9406c40,2025-03-06T05:15:17.860000 +CVE-2025-20913,0,0,dc18939858db4a9dabaa35d3591b5a676ffa9a82b67f92f7515d7c9f2e58f2c4,2025-03-06T05:15:18.037000 +CVE-2025-20914,0,0,b3c681a324204be876ca2bea2b93b62698d43635f22105ad6617ff757a2c47ea,2025-03-06T05:15:18.210000 +CVE-2025-20915,0,0,7e0aaa10504b9f6431708e5d3c2a03cf19b4e9bb97c57cddd95a398396118c76,2025-03-06T05:15:18.387000 +CVE-2025-20916,0,0,a3ccdb6e5f7216dd9620777c14810228a99c108ebbd357e01034541061a8cd8f,2025-03-06T05:15:18.527000 +CVE-2025-20917,0,0,891c495a84fb4f080761d9c0ce277e7f0b005b198b7d9b787822ad5e3f0f5df2,2025-03-06T05:15:18.683000 +CVE-2025-20918,0,0,546c0a12bf01fab2f53897b868cfda60be7a0122eca9ff933a870647f693fa78,2025-03-06T05:15:18.883000 +CVE-2025-20919,0,0,1812aa8cfcfc5333cffeb298b89555dab225eb40a4eaca5f4d0a431aebcc0f39,2025-03-06T05:15:19.050000 +CVE-2025-20920,0,0,08676ad132da64a11d1a6a857a0611e26c1babe338eb248077300512e5f97acc,2025-03-06T05:15:19.203000 +CVE-2025-20921,0,0,fd1fd95d82d1189544e61726dfcac3b6663e8a89a439f2951f6b4ddb250c6543,2025-03-06T05:15:19.347000 +CVE-2025-20922,0,0,3ad36465ea53683d6c24419f2d57a9924498c7d5eb8a386e3e60fe9f98fe4226,2025-03-06T05:15:19.533000 +CVE-2025-20923,0,0,a22e990ccdfa1497f700e265dac8f4f5d75cec773ba22e3f62bae353d567c6b7,2025-03-06T05:15:19.690000 +CVE-2025-20924,0,0,39db03778b4bc36516af3cb47462ef4e5b140a73f0e7f01701125d6ac5484830,2025-03-06T05:15:19.870000 +CVE-2025-20925,0,0,97882705f9b81e2b2ab97f6c2749d117a0edaca217671aa9a23b2c024671de48,2025-03-06T05:15:20.093000 +CVE-2025-20926,0,0,888fde423793e6049271d2f28dd33f1061aedc60ff9ecb9dba38d065204c4aa1,2025-03-06T05:15:20.383000 +CVE-2025-20927,0,0,a91be5515495a3d34d196829d47903c1893510322e01e578f39c3bba75d9c24f,2025-03-06T05:15:20.547000 +CVE-2025-20928,0,0,da9f49ea75ced231fac5c30669418edbea8d3153111bf8477e5f66cb40641f4e,2025-03-06T05:15:20.703000 +CVE-2025-20929,0,0,2dce13ec28c6ed5e496045ee2a31327f1fce4e10348c2c287649e719a2844a69,2025-03-06T05:15:20.900000 +CVE-2025-20930,0,0,bab4c083da011ea0367ed0226c007ad7a6239b4ffdd12dbc6f7212f68a5c25c5,2025-03-06T05:15:21.063000 +CVE-2025-20931,0,0,b15093c52baa75c84a98d672b6f6a3cd23e07c961fb2a36b02824adf054c2662,2025-03-06T05:15:21.210000 +CVE-2025-20932,0,0,81815a0a786eaf533d780b376fc38d3bfe12c02cf7f75e867f04a83384938f1b,2025-03-06T05:15:21.440000 +CVE-2025-20933,0,0,4d27621d6c7c64c672d5a5becfc0ae215b76265ce07a5a1bfdec129c6401322c,2025-03-06T05:15:21.607000 CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000 CVE-2025-21084,0,0,ace7c6554080c25439589c0a6a78bc459d9093293af90dc6240cc40f99cc164e,2025-03-04T17:41:14.237000 CVE-2025-21087,0,0,28561df062c57bddb73cb1503a50933afccce81ed6c2872e01fa7d13e8dbf5f5,2025-02-05T18:15:30.430000 @@ -282128,7 +282132,7 @@ CVE-2025-22619,0,0,d515e7076865e4f01be05b309607c7d226293e7a0f8bc68ef1e74f170971f CVE-2025-22620,0,0,428c7806e74732326369c718351571848c196156b9eb9eb7ffe99ba9002a1b52,2025-01-20T16:15:28.017000 CVE-2025-22621,0,0,6ff4aa50f3e07d892cb8ed858e238d42c832836da0723e6a77be4111c28ff27e,2025-01-15T17:15:20.810000 CVE-2025-22622,0,0,0a67f003bf728be4e0886c35c47488ba14ce354a6aa44e3a32da5ad98803d9bf,2025-02-19T04:15:10.550000 -CVE-2025-22623,1,1,20d6283ace4a04a12b28905e821d2ab26d0d4a26370a914557bf0a67bd8cf554,2025-03-06T05:15:21.790000 +CVE-2025-22623,0,0,20d6283ace4a04a12b28905e821d2ab26d0d4a26370a914557bf0a67bd8cf554,2025-03-06T05:15:21.790000 CVE-2025-22624,0,0,99f67b51b4924176c5d13d7970c078d5eee1a532ddb11bde6592626dbf4b6321,2025-02-27T19:15:50.940000 CVE-2025-22630,0,0,593d04dbe4592bbbd0e67cbe1d1c9339c2fd794f2c49ac1ded1166dba2e072b6,2025-02-14T07:15:32.750000 CVE-2025-22631,0,0,698f5af7c231ca612ef49b5c9557ed0a6275cc603aec3b288e67c713c264419b,2025-02-23T23:15:10.290000