Auto-Update: 2025-03-03T05:00:19.701238+00:00

This commit is contained in:
cad-safe-bot 2025-03-03 05:03:48 +00:00
parent 461e9772c9
commit 5f27d6bd51
17 changed files with 991 additions and 33 deletions

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-1846",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T03:15:08.777",
"lastModified": "2025-03-03T03:15:08.777",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in zj1983 zz up to 2024-8. It has been declared as problematic. This vulnerability affects the function deleteLocalFile of the file src/main/java/com/futvan/z/system/zfile/ZfileAction.java of the component File Handler. The manipulation of the argument zids leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"baseScore": 5.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-404"
}
]
}
],
"references": [
{
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.298114",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298114",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.505097",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-1847",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T03:15:08.983",
"lastModified": "2025-03-03T03:15:08.983",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in zj1983 zz up to 2024-8. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
},
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%9E%82%E7%9B%B4%E8%B6%8A%E6%9D%83.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.298115",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298115",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.505303",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-1848",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T04:15:08.657",
"lastModified": "2025-03-03T04:15:08.657",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in zj1983 zz up to 2024-8. Affected is an unknown function of the file /import_data_check. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_check_SSRF.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.298116",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298116",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.505345",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-1849",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T04:15:08.837",
"lastModified": "2025-03-03T04:15:08.837",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in zj1983 zz up to 2024-8. Affected by this vulnerability is an unknown functionality of the file /import_data_todb. The manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_todb_SSRF.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.298117",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298117",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.505346",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-20644",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-03-03T03:15:09.173",
"lastModified": "2025-03-03T03:15:09.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01525673; Issue ID: MSV-2747."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1286"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2025",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-20645",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-03-03T03:15:09.293",
"lastModified": "2025-03-03T03:15:09.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09475476; Issue ID: MSV-2599."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2025",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-20646",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-03-03T03:15:09.403",
"lastModified": "2025-03-03T03:15:09.403",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In wlan AP FW, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389074; Issue ID: MSV-1803."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2025",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-20647",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-03-03T03:15:09.510",
"lastModified": "2025-03-03T03:15:09.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00791311 / MOLY01067019; Issue ID: MSV-2721."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2025",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-20648",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-03-03T03:15:09.620",
"lastModified": "2025-03-03T03:15:09.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09456673; Issue ID: MSV-2584."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2025",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-20649",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-03-03T03:15:09.730",
"lastModified": "2025-03-03T03:15:09.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Bluetooth Stack SW, there is a possible information disclosure due to a missing permission check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00396437; Issue ID: MSV-2184."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-280"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2025",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-20650",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-03-03T03:15:09.840",
"lastModified": "2025-03-03T03:15:09.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2061."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2025",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-20651",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-03-03T03:15:09.950",
"lastModified": "2025-03-03T03:15:09.950",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2062."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2025",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-20652",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-03-03T03:15:10.060",
"lastModified": "2025-03-03T03:15:10.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In V5 DA, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291215; Issue ID: MSV-2052."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2025",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-20653",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-03-03T03:15:10.170",
"lastModified": "2025-03-03T03:15:10.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In da, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291064; Issue ID: MSV-2046."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2025",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-27590",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-03T04:15:09.020",
"lastModified": "2025-03-03T04:15:09.020",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In oxidized-web (aka Oxidized Web) before 0.15.0, the RANCID migration page allows an unauthenticated user to gain control over the Linux user account that is running oxidized-web."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/ytti/oxidized-web/commit/a5220a0ddc57b85cd122bffee228d3ed4901668e",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ytti/oxidized-web/releases/tag/0.15.0",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-03T03:00:19.990404+00:00
2025-03-03T05:00:19.701238+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-03T02:15:33.563000+00:00
2025-03-03T04:15:09.020000+00:00
```
### Last Data Feed Release
@ -33,33 +33,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
283644
283659
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `15`
- [CVE-2025-1842](CVE-2025/CVE-2025-18xx/CVE-2025-1842.json) (`2025-03-03T01:15:10.023`)
- [CVE-2025-1843](CVE-2025/CVE-2025-18xx/CVE-2025-1843.json) (`2025-03-03T01:15:11.127`)
- [CVE-2025-1844](CVE-2025/CVE-2025-18xx/CVE-2025-1844.json) (`2025-03-03T02:15:33.390`)
- [CVE-2025-1845](CVE-2025/CVE-2025-18xx/CVE-2025-1845.json) (`2025-03-03T02:15:33.563`)
- [CVE-2025-25948](CVE-2025/CVE-2025-259xx/CVE-2025-25948.json) (`2025-03-03T01:15:11.310`)
- [CVE-2025-25949](CVE-2025/CVE-2025-259xx/CVE-2025-25949.json) (`2025-03-03T01:15:11.423`)
- [CVE-2025-25950](CVE-2025/CVE-2025-259xx/CVE-2025-25950.json) (`2025-03-03T01:15:11.533`)
- [CVE-2025-25951](CVE-2025/CVE-2025-259xx/CVE-2025-25951.json) (`2025-03-03T01:15:11.660`)
- [CVE-2025-25952](CVE-2025/CVE-2025-259xx/CVE-2025-25952.json) (`2025-03-03T01:15:11.777`)
- [CVE-2025-25953](CVE-2025/CVE-2025-259xx/CVE-2025-25953.json) (`2025-03-03T01:15:11.910`)
- [CVE-2025-27583](CVE-2025/CVE-2025-275xx/CVE-2025-27583.json) (`2025-03-03T01:15:12.030`)
- [CVE-2025-27584](CVE-2025/CVE-2025-275xx/CVE-2025-27584.json) (`2025-03-03T01:15:12.157`)
- [CVE-2025-27585](CVE-2025/CVE-2025-275xx/CVE-2025-27585.json) (`2025-03-03T01:15:12.277`)
- [CVE-2025-1846](CVE-2025/CVE-2025-18xx/CVE-2025-1846.json) (`2025-03-03T03:15:08.777`)
- [CVE-2025-1847](CVE-2025/CVE-2025-18xx/CVE-2025-1847.json) (`2025-03-03T03:15:08.983`)
- [CVE-2025-1848](CVE-2025/CVE-2025-18xx/CVE-2025-1848.json) (`2025-03-03T04:15:08.657`)
- [CVE-2025-1849](CVE-2025/CVE-2025-18xx/CVE-2025-1849.json) (`2025-03-03T04:15:08.837`)
- [CVE-2025-20644](CVE-2025/CVE-2025-206xx/CVE-2025-20644.json) (`2025-03-03T03:15:09.173`)
- [CVE-2025-20645](CVE-2025/CVE-2025-206xx/CVE-2025-20645.json) (`2025-03-03T03:15:09.293`)
- [CVE-2025-20646](CVE-2025/CVE-2025-206xx/CVE-2025-20646.json) (`2025-03-03T03:15:09.403`)
- [CVE-2025-20647](CVE-2025/CVE-2025-206xx/CVE-2025-20647.json) (`2025-03-03T03:15:09.510`)
- [CVE-2025-20648](CVE-2025/CVE-2025-206xx/CVE-2025-20648.json) (`2025-03-03T03:15:09.620`)
- [CVE-2025-20649](CVE-2025/CVE-2025-206xx/CVE-2025-20649.json) (`2025-03-03T03:15:09.730`)
- [CVE-2025-20650](CVE-2025/CVE-2025-206xx/CVE-2025-20650.json) (`2025-03-03T03:15:09.840`)
- [CVE-2025-20651](CVE-2025/CVE-2025-206xx/CVE-2025-20651.json) (`2025-03-03T03:15:09.950`)
- [CVE-2025-20652](CVE-2025/CVE-2025-206xx/CVE-2025-20652.json) (`2025-03-03T03:15:10.060`)
- [CVE-2025-20653](CVE-2025/CVE-2025-206xx/CVE-2025-20653.json) (`2025-03-03T03:15:10.170`)
- [CVE-2025-27590](CVE-2025/CVE-2025-275xx/CVE-2025-27590.json) (`2025-03-03T04:15:09.020`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `0`
- [CVE-2025-1244](CVE-2025/CVE-2025-12xx/CVE-2025-1244.json) (`2025-03-03T02:15:33.190`)
## Download and Usage

View File

@ -280603,7 +280603,7 @@ CVE-2025-1231,0,0,53b09d0e70e608d42ef2315cf58b2a0031ad64c29b00c44d026df29aef3338
CVE-2025-1239,0,0,6187788ffe5fd6000cc24d081f477dcae5b0ef59871d160b3ff23ee25b818501,2025-02-14T14:15:32.687000
CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa84,2025-02-11T22:15:29.800000
CVE-2025-1243,0,0,b36908327b1b41fa664c4a39c71934592fd1d75bcc40ba67f7d64ed64955da7e,2025-02-12T01:15:09.073000
CVE-2025-1244,0,1,24b712abc5473f98be5b45c650fef26d8d6a16ebd1fa65ca9c83aff0724f41bc,2025-03-03T02:15:33.190000
CVE-2025-1244,0,0,24b712abc5473f98be5b45c650fef26d8d6a16ebd1fa65ca9c83aff0724f41bc,2025-03-03T02:15:33.190000
CVE-2025-1247,0,0,076ebdee060c0d22b647df1a0cc091510262713de157cf89796199eeb4b4a429,2025-02-27T16:15:38.390000
CVE-2025-1249,0,0,f9cf8228939f75e3961b7ce63e2e103ee292f920596572fc4d2ff4b8583fc869,2025-02-26T15:15:24.470000
CVE-2025-1258,0,0,e60d49e74992453b0cd2d8b93f0bc7a60901e2447adb1d6d0cde7627e3bb44f5,2025-02-20T18:15:26.217000
@ -280838,10 +280838,14 @@ CVE-2025-1835,0,0,2a60a18877264a79f9b058b41ced82deb6530a74d9ea4d0efc608520850215
CVE-2025-1836,0,0,13bb65ca0c6e5a0d08d48c52a2ee2cb91592f3886044f600fe193534f47d51c6,2025-03-02T23:15:10.993000
CVE-2025-1840,0,0,d37a1f00306bec1b2440f6ba2a388e661831cd809495b3808bb6eec88299d06e,2025-03-03T00:15:42.857000
CVE-2025-1841,0,0,72bd852d9729b5ab0e0fcfbf1d47c2dc8f892ff9f5a00440a1cc43c8f6ead9b4,2025-03-03T00:15:43.033000
CVE-2025-1842,1,1,2740657f48db38aea65ff197731a80f46823dc93f34b86cad29da345a9d78495,2025-03-03T01:15:10.023000
CVE-2025-1843,1,1,de69dfec2e0b193564d55ff4e98cb87273a9fbfd2b156d82a5acaf926ac31da8,2025-03-03T01:15:11.127000
CVE-2025-1844,1,1,f7a0768b0a78e26485c5dc34e4b3b0832ad616e62441c9ecdb8a086661609d04,2025-03-03T02:15:33.390000
CVE-2025-1845,1,1,4d13fb467d03250d9d7ad58527e0d7ddc037dede35f97e95d7597953255643db,2025-03-03T02:15:33.563000
CVE-2025-1842,0,0,2740657f48db38aea65ff197731a80f46823dc93f34b86cad29da345a9d78495,2025-03-03T01:15:10.023000
CVE-2025-1843,0,0,de69dfec2e0b193564d55ff4e98cb87273a9fbfd2b156d82a5acaf926ac31da8,2025-03-03T01:15:11.127000
CVE-2025-1844,0,0,f7a0768b0a78e26485c5dc34e4b3b0832ad616e62441c9ecdb8a086661609d04,2025-03-03T02:15:33.390000
CVE-2025-1845,0,0,4d13fb467d03250d9d7ad58527e0d7ddc037dede35f97e95d7597953255643db,2025-03-03T02:15:33.563000
CVE-2025-1846,1,1,5c7f3bcd4f600ed21100c2323eba63af680e8a42c3178debbd9d070582d1b8dc,2025-03-03T03:15:08.777000
CVE-2025-1847,1,1,746236a7f5daba7186147d066b7aaaa80fd843c4adbf688ee60e53e05f7bb637,2025-03-03T03:15:08.983000
CVE-2025-1848,1,1,b4b3792b2f071cb7baebc550aa244188045e4139769a51b876e21cea9dd8bd3b,2025-03-03T04:15:08.657000
CVE-2025-1849,1,1,354df1d3115e7ed477918e35dd2218a14edf9641d1ba7b4fa97da52f2d0d22aa,2025-03-03T04:15:08.837000
CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000
@ -280914,6 +280918,16 @@ CVE-2025-20640,0,0,19242b4ab5555d3c296c9d663e46f0f6013cbb3b643a9a42576483affee44
CVE-2025-20641,0,0,8f64d7bdc38a4d4d6ffe4b925ecebf51da87177f825fd96d952c3b788cf66055,2025-02-04T15:22:10.670000
CVE-2025-20642,0,0,110f2bb3fd587df7b20a2739b2ed2dbc64fbe49db6605a51a1b388b3e56f194a,2025-02-04T15:20:21.300000
CVE-2025-20643,0,0,2e2366245f9f5bcad98b9838a1898890ae5530ce7393a7ea521ec6965e892894,2025-02-04T15:19:23.330000
CVE-2025-20644,1,1,ca4674e609c8d43590774d83b33a9ead2d66ed4ea8d3e9136628580894824b31,2025-03-03T03:15:09.173000
CVE-2025-20645,1,1,50c2f7a77d19c85e70131931e626054a7b3b307d4380740abc99317c0cc503c0,2025-03-03T03:15:09.293000
CVE-2025-20646,1,1,cffc2e10e8f144699ea086242ab9f118a4a5f283ffced233e9122854e6f3cb85,2025-03-03T03:15:09.403000
CVE-2025-20647,1,1,8a1eccd67e32504722648d481fb0a36889c42cc821e1adb9ab74063465d39f96,2025-03-03T03:15:09.510000
CVE-2025-20648,1,1,8a5329795e49d943046cd42334c66ec6e22086a139db47fcc996c0e16d9bec63,2025-03-03T03:15:09.620000
CVE-2025-20649,1,1,e6b321888e5587435d9fe5c887af311fd6ada0707e9e5d0aaa38016074282498,2025-03-03T03:15:09.730000
CVE-2025-20650,1,1,d87d253c52d390a1c1085865131f5ccd369068e01b98708e99f6223902cbbf92,2025-03-03T03:15:09.840000
CVE-2025-20651,1,1,91a6edaedf97b72a36635756fe5c003928d0f2574a67677d8ca9edc25dc1f723,2025-03-03T03:15:09.950000
CVE-2025-20652,1,1,3253055a437a7e7167e30e28345b7382edb1b4af82598b45ccb73b9362c6f828,2025-03-03T03:15:10.060000
CVE-2025-20653,1,1,b2968adfcae86c06be703d17e416c9128a6d8c15cde3e34e7292e056ebacb491,2025-03-03T03:15:10.170000
CVE-2025-20881,0,0,69e8ec3ffc0d609e9ff0a5c0f14dc382935286a9654ff8a957242175a6264c27,2025-02-12T13:42:58.443000
CVE-2025-20882,0,0,f4193a007427cf2316ed2b8c45d5bf9c15dfb695bfcd22869153b3359f33afd6,2025-02-12T13:43:13.267000
CVE-2025-20883,0,0,cb8cf9b686cdb6300b673deaabe4b9ce5e5f73e6e26d527f21f3d0dcbca2cc19,2025-02-12T13:43:37.743000
@ -283286,12 +283300,12 @@ CVE-2025-25944,0,0,ddbe030374d7cbb79a7eeac3a7fcb4800d8524e9c1e33154d3a9a0836431f
CVE-2025-25945,0,0,a135cb8b6e7bd92832108ad425fd681184321fd3911817b0fa3751ad82620c01,2025-02-20T15:15:15.073000
CVE-2025-25946,0,0,dd68555679ad8b07f36b669fbde20639acf7f7115a512ba533c880a157808efa,2025-02-20T15:15:15.227000
CVE-2025-25947,0,0,c7879e4f126007a6472b19a25e66309955a18ccc3104a8ec27cf1080eaf6c736,2025-02-20T15:15:15.530000
CVE-2025-25948,1,1,bc560d2220fd028a653a081d22383d164e056255714378146b7b62eefed286d5,2025-03-03T01:15:11.310000
CVE-2025-25949,1,1,3cfa74ff045f781d89869a7cdbed7b20ce1334851fd89a396fe13626a2974881,2025-03-03T01:15:11.423000
CVE-2025-25950,1,1,3916f5c28c3f302975a560ff96a81908108c4c53a986ae981c3082abb48c3f5d,2025-03-03T01:15:11.533000
CVE-2025-25951,1,1,5e03db7cb04f399d33b773be36bfa729ec05dcfca6e4b59da3213063b8d7ff8a,2025-03-03T01:15:11.660000
CVE-2025-25952,1,1,e091a6c6f46851aba907ad0dad28b656d2a71566a5b86479330f4ef9f67be09f,2025-03-03T01:15:11.777000
CVE-2025-25953,1,1,915a39123f74be5e8908d9d30d1592ddd79f24dba0a3ced858032c78f44c715e,2025-03-03T01:15:11.910000
CVE-2025-25948,0,0,bc560d2220fd028a653a081d22383d164e056255714378146b7b62eefed286d5,2025-03-03T01:15:11.310000
CVE-2025-25949,0,0,3cfa74ff045f781d89869a7cdbed7b20ce1334851fd89a396fe13626a2974881,2025-03-03T01:15:11.423000
CVE-2025-25950,0,0,3916f5c28c3f302975a560ff96a81908108c4c53a986ae981c3082abb48c3f5d,2025-03-03T01:15:11.533000
CVE-2025-25951,0,0,5e03db7cb04f399d33b773be36bfa729ec05dcfca6e4b59da3213063b8d7ff8a,2025-03-03T01:15:11.660000
CVE-2025-25952,0,0,e091a6c6f46851aba907ad0dad28b656d2a71566a5b86479330f4ef9f67be09f,2025-03-03T01:15:11.777000
CVE-2025-25953,0,0,915a39123f74be5e8908d9d30d1592ddd79f24dba0a3ced858032c78f44c715e,2025-03-03T01:15:11.910000
CVE-2025-25957,0,0,b65136edccab78b78b9c909881827ed1ed034886966746fcab259eb6d692acae,2025-02-21T15:15:13.067000
CVE-2025-25958,0,0,0f8b1b28a95747b988ec24f56374cc73cf997d93ede793e430858c23744338af,2025-02-21T16:15:33.173000
CVE-2025-25960,0,0,f81f6a42cc37f50d144da0c1d5b21881b06cbfd074736b0e8bb6bc8c20ba8aa2,2025-02-21T22:15:13.297000
@ -283640,6 +283654,7 @@ CVE-2025-27414,0,0,dade89b00ff438afc3d75db3405cd2399cd0f72f2b40e361d9e8e1ad3c96c
CVE-2025-27416,0,0,bfd9605f18fa0d0b58583b28f8d49afc65f3c8a40e0ddae1ef370584ff7e71a4,2025-03-01T01:15:28.857000
CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000
CVE-2025-27579,0,0,1e17d16504251ae47acc90d9c67b6caae5e3d8109a892a4d76197d339c767b90,2025-03-03T00:15:43.210000
CVE-2025-27583,1,1,18dfdb5a0ae261632796dbd76e99b9a1ffc071aa6c00449a4d28af735e378f81,2025-03-03T01:15:12.030000
CVE-2025-27584,1,1,528fd914f7c34c65eae553c4ccbee063eaa5a2dc2276b2287ac4b1a05fd56700,2025-03-03T01:15:12.157000
CVE-2025-27585,1,1,ec13aea414938446dd43753a7aefcb7dfd82f11bab9f163de2447f190af31843,2025-03-03T01:15:12.277000
CVE-2025-27583,0,0,18dfdb5a0ae261632796dbd76e99b9a1ffc071aa6c00449a4d28af735e378f81,2025-03-03T01:15:12.030000
CVE-2025-27584,0,0,528fd914f7c34c65eae553c4ccbee063eaa5a2dc2276b2287ac4b1a05fd56700,2025-03-03T01:15:12.157000
CVE-2025-27585,0,0,ec13aea414938446dd43753a7aefcb7dfd82f11bab9f163de2447f190af31843,2025-03-03T01:15:12.277000
CVE-2025-27590,1,1,8f529b7a611aa7d0497c9571b53ac8f03ea946efbb8deff8b1efa4972d889bb1,2025-03-03T04:15:09.020000

Can't render this file because it is too large.