From 5f27d6bd519e2e2e8354a6e8ee47b802e10c7092 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 3 Mar 2025 05:03:48 +0000 Subject: [PATCH] Auto-Update: 2025-03-03T05:00:19.701238+00:00 --- CVE-2025/CVE-2025-18xx/CVE-2025-1846.json | 137 +++++++++++++++++++ CVE-2025/CVE-2025-18xx/CVE-2025-1847.json | 141 ++++++++++++++++++++ CVE-2025/CVE-2025-18xx/CVE-2025-1848.json | 137 +++++++++++++++++++ CVE-2025/CVE-2025-18xx/CVE-2025-1849.json | 137 +++++++++++++++++++ CVE-2025/CVE-2025-206xx/CVE-2025-20644.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20645.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20646.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20647.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20648.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20649.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20650.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20651.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20652.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20653.json | 33 +++++ CVE-2025/CVE-2025-275xx/CVE-2025-27590.json | 60 +++++++++ README.md | 39 +++--- _state.csv | 43 ++++-- 17 files changed, 991 insertions(+), 33 deletions(-) create mode 100644 CVE-2025/CVE-2025-18xx/CVE-2025-1846.json create mode 100644 CVE-2025/CVE-2025-18xx/CVE-2025-1847.json create mode 100644 CVE-2025/CVE-2025-18xx/CVE-2025-1848.json create mode 100644 CVE-2025/CVE-2025-18xx/CVE-2025-1849.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20644.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20645.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20646.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20647.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20648.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20649.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20650.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20651.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20652.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20653.json create mode 100644 CVE-2025/CVE-2025-275xx/CVE-2025-27590.json diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1846.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1846.json new file mode 100644 index 00000000000..fd6916d8202 --- /dev/null +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1846.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-1846", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-03T03:15:08.777", + "lastModified": "2025-03-03T03:15:08.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in zj1983 zz up to 2024-8. It has been declared as problematic. This vulnerability affects the function deleteLocalFile of the file src/main/java/com/futvan/z/system/zfile/ZfileAction.java of the component File Handler. The manipulation of the argument zids leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 4.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298114", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298114", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.505097", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1847.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1847.json new file mode 100644 index 00000000000..76f40e5cccf --- /dev/null +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1847.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1847", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-03T03:15:08.983", + "lastModified": "2025-03-03T03:15:08.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in zj1983 zz up to 2024-8. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%9E%82%E7%9B%B4%E8%B6%8A%E6%9D%83.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298115", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298115", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.505303", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1848.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1848.json new file mode 100644 index 00000000000..0076b5c8ad7 --- /dev/null +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1848.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-1848", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-03T04:15:08.657", + "lastModified": "2025-03-03T04:15:08.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in zj1983 zz up to 2024-8. Affected is an unknown function of the file /import_data_check. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_check_SSRF.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298116", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298116", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.505345", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1849.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1849.json new file mode 100644 index 00000000000..189d88d9e2f --- /dev/null +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1849.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-1849", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-03T04:15:08.837", + "lastModified": "2025-03-03T04:15:08.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in zj1983 zz up to 2024-8. Affected by this vulnerability is an unknown functionality of the file /import_data_todb. The manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_todb_SSRF.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298117", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298117", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.505346", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20644.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20644.json new file mode 100644 index 00000000000..7ee89f79770 --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20644.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20644", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-03-03T03:15:09.173", + "lastModified": "2025-03-03T03:15:09.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01525673; Issue ID: MSV-2747." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1286" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/March-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20645.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20645.json new file mode 100644 index 00000000000..48f4ece88b8 --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20645.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20645", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-03-03T03:15:09.293", + "lastModified": "2025-03-03T03:15:09.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09475476; Issue ID: MSV-2599." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/March-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20646.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20646.json new file mode 100644 index 00000000000..ca6709fefba --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20646.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20646", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-03-03T03:15:09.403", + "lastModified": "2025-03-03T03:15:09.403", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In wlan AP FW, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389074; Issue ID: MSV-1803." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/March-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20647.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20647.json new file mode 100644 index 00000000000..93694349ea9 --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20647.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20647", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-03-03T03:15:09.510", + "lastModified": "2025-03-03T03:15:09.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00791311 / MOLY01067019; Issue ID: MSV-2721." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/March-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20648.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20648.json new file mode 100644 index 00000000000..9406056738d --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20648.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20648", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-03-03T03:15:09.620", + "lastModified": "2025-03-03T03:15:09.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09456673; Issue ID: MSV-2584." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/March-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20649.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20649.json new file mode 100644 index 00000000000..dfec1a17fd6 --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20649.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20649", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-03-03T03:15:09.730", + "lastModified": "2025-03-03T03:15:09.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Bluetooth Stack SW, there is a possible information disclosure due to a missing permission check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00396437; Issue ID: MSV-2184." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/March-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20650.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20650.json new file mode 100644 index 00000000000..e7f0d29ef7a --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20650.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20650", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-03-03T03:15:09.840", + "lastModified": "2025-03-03T03:15:09.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2061." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/March-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20651.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20651.json new file mode 100644 index 00000000000..90f11c28b28 --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20651.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20651", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-03-03T03:15:09.950", + "lastModified": "2025-03-03T03:15:09.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2062." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/March-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20652.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20652.json new file mode 100644 index 00000000000..8bd088be93e --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20652.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20652", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-03-03T03:15:10.060", + "lastModified": "2025-03-03T03:15:10.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In V5 DA, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291215; Issue ID: MSV-2052." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/March-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20653.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20653.json new file mode 100644 index 00000000000..a001794d4c1 --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20653.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20653", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-03-03T03:15:10.170", + "lastModified": "2025-03-03T03:15:10.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In da, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291064; Issue ID: MSV-2046." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/March-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27590.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27590.json new file mode 100644 index 00000000000..3a6749f135a --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27590.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-27590", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-03T04:15:09.020", + "lastModified": "2025-03-03T04:15:09.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In oxidized-web (aka Oxidized Web) before 0.15.0, the RANCID migration page allows an unauthenticated user to gain control over the Linux user account that is running oxidized-web." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ytti/oxidized-web/commit/a5220a0ddc57b85cd122bffee228d3ed4901668e", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ytti/oxidized-web/releases/tag/0.15.0", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 94a835ce8c8..c63a8d0c3b0 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-03T03:00:19.990404+00:00 +2025-03-03T05:00:19.701238+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-03T02:15:33.563000+00:00 +2025-03-03T04:15:09.020000+00:00 ``` ### Last Data Feed Release @@ -33,33 +33,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -283644 +283659 ``` ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `15` -- [CVE-2025-1842](CVE-2025/CVE-2025-18xx/CVE-2025-1842.json) (`2025-03-03T01:15:10.023`) -- [CVE-2025-1843](CVE-2025/CVE-2025-18xx/CVE-2025-1843.json) (`2025-03-03T01:15:11.127`) -- [CVE-2025-1844](CVE-2025/CVE-2025-18xx/CVE-2025-1844.json) (`2025-03-03T02:15:33.390`) -- [CVE-2025-1845](CVE-2025/CVE-2025-18xx/CVE-2025-1845.json) (`2025-03-03T02:15:33.563`) -- [CVE-2025-25948](CVE-2025/CVE-2025-259xx/CVE-2025-25948.json) (`2025-03-03T01:15:11.310`) -- [CVE-2025-25949](CVE-2025/CVE-2025-259xx/CVE-2025-25949.json) (`2025-03-03T01:15:11.423`) -- [CVE-2025-25950](CVE-2025/CVE-2025-259xx/CVE-2025-25950.json) (`2025-03-03T01:15:11.533`) -- [CVE-2025-25951](CVE-2025/CVE-2025-259xx/CVE-2025-25951.json) (`2025-03-03T01:15:11.660`) -- [CVE-2025-25952](CVE-2025/CVE-2025-259xx/CVE-2025-25952.json) (`2025-03-03T01:15:11.777`) -- [CVE-2025-25953](CVE-2025/CVE-2025-259xx/CVE-2025-25953.json) (`2025-03-03T01:15:11.910`) -- [CVE-2025-27583](CVE-2025/CVE-2025-275xx/CVE-2025-27583.json) (`2025-03-03T01:15:12.030`) -- [CVE-2025-27584](CVE-2025/CVE-2025-275xx/CVE-2025-27584.json) (`2025-03-03T01:15:12.157`) -- [CVE-2025-27585](CVE-2025/CVE-2025-275xx/CVE-2025-27585.json) (`2025-03-03T01:15:12.277`) +- [CVE-2025-1846](CVE-2025/CVE-2025-18xx/CVE-2025-1846.json) (`2025-03-03T03:15:08.777`) +- [CVE-2025-1847](CVE-2025/CVE-2025-18xx/CVE-2025-1847.json) (`2025-03-03T03:15:08.983`) +- [CVE-2025-1848](CVE-2025/CVE-2025-18xx/CVE-2025-1848.json) (`2025-03-03T04:15:08.657`) +- [CVE-2025-1849](CVE-2025/CVE-2025-18xx/CVE-2025-1849.json) (`2025-03-03T04:15:08.837`) +- [CVE-2025-20644](CVE-2025/CVE-2025-206xx/CVE-2025-20644.json) (`2025-03-03T03:15:09.173`) +- [CVE-2025-20645](CVE-2025/CVE-2025-206xx/CVE-2025-20645.json) (`2025-03-03T03:15:09.293`) +- [CVE-2025-20646](CVE-2025/CVE-2025-206xx/CVE-2025-20646.json) (`2025-03-03T03:15:09.403`) +- [CVE-2025-20647](CVE-2025/CVE-2025-206xx/CVE-2025-20647.json) (`2025-03-03T03:15:09.510`) +- [CVE-2025-20648](CVE-2025/CVE-2025-206xx/CVE-2025-20648.json) (`2025-03-03T03:15:09.620`) +- [CVE-2025-20649](CVE-2025/CVE-2025-206xx/CVE-2025-20649.json) (`2025-03-03T03:15:09.730`) +- [CVE-2025-20650](CVE-2025/CVE-2025-206xx/CVE-2025-20650.json) (`2025-03-03T03:15:09.840`) +- [CVE-2025-20651](CVE-2025/CVE-2025-206xx/CVE-2025-20651.json) (`2025-03-03T03:15:09.950`) +- [CVE-2025-20652](CVE-2025/CVE-2025-206xx/CVE-2025-20652.json) (`2025-03-03T03:15:10.060`) +- [CVE-2025-20653](CVE-2025/CVE-2025-206xx/CVE-2025-20653.json) (`2025-03-03T03:15:10.170`) +- [CVE-2025-27590](CVE-2025/CVE-2025-275xx/CVE-2025-27590.json) (`2025-03-03T04:15:09.020`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2025-1244](CVE-2025/CVE-2025-12xx/CVE-2025-1244.json) (`2025-03-03T02:15:33.190`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 9aaccb58b56..8fce398876b 100644 --- a/_state.csv +++ b/_state.csv @@ -280603,7 +280603,7 @@ CVE-2025-1231,0,0,53b09d0e70e608d42ef2315cf58b2a0031ad64c29b00c44d026df29aef3338 CVE-2025-1239,0,0,6187788ffe5fd6000cc24d081f477dcae5b0ef59871d160b3ff23ee25b818501,2025-02-14T14:15:32.687000 CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa84,2025-02-11T22:15:29.800000 CVE-2025-1243,0,0,b36908327b1b41fa664c4a39c71934592fd1d75bcc40ba67f7d64ed64955da7e,2025-02-12T01:15:09.073000 -CVE-2025-1244,0,1,24b712abc5473f98be5b45c650fef26d8d6a16ebd1fa65ca9c83aff0724f41bc,2025-03-03T02:15:33.190000 +CVE-2025-1244,0,0,24b712abc5473f98be5b45c650fef26d8d6a16ebd1fa65ca9c83aff0724f41bc,2025-03-03T02:15:33.190000 CVE-2025-1247,0,0,076ebdee060c0d22b647df1a0cc091510262713de157cf89796199eeb4b4a429,2025-02-27T16:15:38.390000 CVE-2025-1249,0,0,f9cf8228939f75e3961b7ce63e2e103ee292f920596572fc4d2ff4b8583fc869,2025-02-26T15:15:24.470000 CVE-2025-1258,0,0,e60d49e74992453b0cd2d8b93f0bc7a60901e2447adb1d6d0cde7627e3bb44f5,2025-02-20T18:15:26.217000 @@ -280838,10 +280838,14 @@ CVE-2025-1835,0,0,2a60a18877264a79f9b058b41ced82deb6530a74d9ea4d0efc608520850215 CVE-2025-1836,0,0,13bb65ca0c6e5a0d08d48c52a2ee2cb91592f3886044f600fe193534f47d51c6,2025-03-02T23:15:10.993000 CVE-2025-1840,0,0,d37a1f00306bec1b2440f6ba2a388e661831cd809495b3808bb6eec88299d06e,2025-03-03T00:15:42.857000 CVE-2025-1841,0,0,72bd852d9729b5ab0e0fcfbf1d47c2dc8f892ff9f5a00440a1cc43c8f6ead9b4,2025-03-03T00:15:43.033000 -CVE-2025-1842,1,1,2740657f48db38aea65ff197731a80f46823dc93f34b86cad29da345a9d78495,2025-03-03T01:15:10.023000 -CVE-2025-1843,1,1,de69dfec2e0b193564d55ff4e98cb87273a9fbfd2b156d82a5acaf926ac31da8,2025-03-03T01:15:11.127000 -CVE-2025-1844,1,1,f7a0768b0a78e26485c5dc34e4b3b0832ad616e62441c9ecdb8a086661609d04,2025-03-03T02:15:33.390000 -CVE-2025-1845,1,1,4d13fb467d03250d9d7ad58527e0d7ddc037dede35f97e95d7597953255643db,2025-03-03T02:15:33.563000 +CVE-2025-1842,0,0,2740657f48db38aea65ff197731a80f46823dc93f34b86cad29da345a9d78495,2025-03-03T01:15:10.023000 +CVE-2025-1843,0,0,de69dfec2e0b193564d55ff4e98cb87273a9fbfd2b156d82a5acaf926ac31da8,2025-03-03T01:15:11.127000 +CVE-2025-1844,0,0,f7a0768b0a78e26485c5dc34e4b3b0832ad616e62441c9ecdb8a086661609d04,2025-03-03T02:15:33.390000 +CVE-2025-1845,0,0,4d13fb467d03250d9d7ad58527e0d7ddc037dede35f97e95d7597953255643db,2025-03-03T02:15:33.563000 +CVE-2025-1846,1,1,5c7f3bcd4f600ed21100c2323eba63af680e8a42c3178debbd9d070582d1b8dc,2025-03-03T03:15:08.777000 +CVE-2025-1847,1,1,746236a7f5daba7186147d066b7aaaa80fd843c4adbf688ee60e53e05f7bb637,2025-03-03T03:15:08.983000 +CVE-2025-1848,1,1,b4b3792b2f071cb7baebc550aa244188045e4139769a51b876e21cea9dd8bd3b,2025-03-03T04:15:08.657000 +CVE-2025-1849,1,1,354df1d3115e7ed477918e35dd2218a14edf9641d1ba7b4fa97da52f2d0d22aa,2025-03-03T04:15:08.837000 CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000 @@ -280914,6 +280918,16 @@ CVE-2025-20640,0,0,19242b4ab5555d3c296c9d663e46f0f6013cbb3b643a9a42576483affee44 CVE-2025-20641,0,0,8f64d7bdc38a4d4d6ffe4b925ecebf51da87177f825fd96d952c3b788cf66055,2025-02-04T15:22:10.670000 CVE-2025-20642,0,0,110f2bb3fd587df7b20a2739b2ed2dbc64fbe49db6605a51a1b388b3e56f194a,2025-02-04T15:20:21.300000 CVE-2025-20643,0,0,2e2366245f9f5bcad98b9838a1898890ae5530ce7393a7ea521ec6965e892894,2025-02-04T15:19:23.330000 +CVE-2025-20644,1,1,ca4674e609c8d43590774d83b33a9ead2d66ed4ea8d3e9136628580894824b31,2025-03-03T03:15:09.173000 +CVE-2025-20645,1,1,50c2f7a77d19c85e70131931e626054a7b3b307d4380740abc99317c0cc503c0,2025-03-03T03:15:09.293000 +CVE-2025-20646,1,1,cffc2e10e8f144699ea086242ab9f118a4a5f283ffced233e9122854e6f3cb85,2025-03-03T03:15:09.403000 +CVE-2025-20647,1,1,8a1eccd67e32504722648d481fb0a36889c42cc821e1adb9ab74063465d39f96,2025-03-03T03:15:09.510000 +CVE-2025-20648,1,1,8a5329795e49d943046cd42334c66ec6e22086a139db47fcc996c0e16d9bec63,2025-03-03T03:15:09.620000 +CVE-2025-20649,1,1,e6b321888e5587435d9fe5c887af311fd6ada0707e9e5d0aaa38016074282498,2025-03-03T03:15:09.730000 +CVE-2025-20650,1,1,d87d253c52d390a1c1085865131f5ccd369068e01b98708e99f6223902cbbf92,2025-03-03T03:15:09.840000 +CVE-2025-20651,1,1,91a6edaedf97b72a36635756fe5c003928d0f2574a67677d8ca9edc25dc1f723,2025-03-03T03:15:09.950000 +CVE-2025-20652,1,1,3253055a437a7e7167e30e28345b7382edb1b4af82598b45ccb73b9362c6f828,2025-03-03T03:15:10.060000 +CVE-2025-20653,1,1,b2968adfcae86c06be703d17e416c9128a6d8c15cde3e34e7292e056ebacb491,2025-03-03T03:15:10.170000 CVE-2025-20881,0,0,69e8ec3ffc0d609e9ff0a5c0f14dc382935286a9654ff8a957242175a6264c27,2025-02-12T13:42:58.443000 CVE-2025-20882,0,0,f4193a007427cf2316ed2b8c45d5bf9c15dfb695bfcd22869153b3359f33afd6,2025-02-12T13:43:13.267000 CVE-2025-20883,0,0,cb8cf9b686cdb6300b673deaabe4b9ce5e5f73e6e26d527f21f3d0dcbca2cc19,2025-02-12T13:43:37.743000 @@ -283286,12 +283300,12 @@ CVE-2025-25944,0,0,ddbe030374d7cbb79a7eeac3a7fcb4800d8524e9c1e33154d3a9a0836431f CVE-2025-25945,0,0,a135cb8b6e7bd92832108ad425fd681184321fd3911817b0fa3751ad82620c01,2025-02-20T15:15:15.073000 CVE-2025-25946,0,0,dd68555679ad8b07f36b669fbde20639acf7f7115a512ba533c880a157808efa,2025-02-20T15:15:15.227000 CVE-2025-25947,0,0,c7879e4f126007a6472b19a25e66309955a18ccc3104a8ec27cf1080eaf6c736,2025-02-20T15:15:15.530000 -CVE-2025-25948,1,1,bc560d2220fd028a653a081d22383d164e056255714378146b7b62eefed286d5,2025-03-03T01:15:11.310000 -CVE-2025-25949,1,1,3cfa74ff045f781d89869a7cdbed7b20ce1334851fd89a396fe13626a2974881,2025-03-03T01:15:11.423000 -CVE-2025-25950,1,1,3916f5c28c3f302975a560ff96a81908108c4c53a986ae981c3082abb48c3f5d,2025-03-03T01:15:11.533000 -CVE-2025-25951,1,1,5e03db7cb04f399d33b773be36bfa729ec05dcfca6e4b59da3213063b8d7ff8a,2025-03-03T01:15:11.660000 -CVE-2025-25952,1,1,e091a6c6f46851aba907ad0dad28b656d2a71566a5b86479330f4ef9f67be09f,2025-03-03T01:15:11.777000 -CVE-2025-25953,1,1,915a39123f74be5e8908d9d30d1592ddd79f24dba0a3ced858032c78f44c715e,2025-03-03T01:15:11.910000 +CVE-2025-25948,0,0,bc560d2220fd028a653a081d22383d164e056255714378146b7b62eefed286d5,2025-03-03T01:15:11.310000 +CVE-2025-25949,0,0,3cfa74ff045f781d89869a7cdbed7b20ce1334851fd89a396fe13626a2974881,2025-03-03T01:15:11.423000 +CVE-2025-25950,0,0,3916f5c28c3f302975a560ff96a81908108c4c53a986ae981c3082abb48c3f5d,2025-03-03T01:15:11.533000 +CVE-2025-25951,0,0,5e03db7cb04f399d33b773be36bfa729ec05dcfca6e4b59da3213063b8d7ff8a,2025-03-03T01:15:11.660000 +CVE-2025-25952,0,0,e091a6c6f46851aba907ad0dad28b656d2a71566a5b86479330f4ef9f67be09f,2025-03-03T01:15:11.777000 +CVE-2025-25953,0,0,915a39123f74be5e8908d9d30d1592ddd79f24dba0a3ced858032c78f44c715e,2025-03-03T01:15:11.910000 CVE-2025-25957,0,0,b65136edccab78b78b9c909881827ed1ed034886966746fcab259eb6d692acae,2025-02-21T15:15:13.067000 CVE-2025-25958,0,0,0f8b1b28a95747b988ec24f56374cc73cf997d93ede793e430858c23744338af,2025-02-21T16:15:33.173000 CVE-2025-25960,0,0,f81f6a42cc37f50d144da0c1d5b21881b06cbfd074736b0e8bb6bc8c20ba8aa2,2025-02-21T22:15:13.297000 @@ -283640,6 +283654,7 @@ CVE-2025-27414,0,0,dade89b00ff438afc3d75db3405cd2399cd0f72f2b40e361d9e8e1ad3c96c CVE-2025-27416,0,0,bfd9605f18fa0d0b58583b28f8d49afc65f3c8a40e0ddae1ef370584ff7e71a4,2025-03-01T01:15:28.857000 CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000 CVE-2025-27579,0,0,1e17d16504251ae47acc90d9c67b6caae5e3d8109a892a4d76197d339c767b90,2025-03-03T00:15:43.210000 -CVE-2025-27583,1,1,18dfdb5a0ae261632796dbd76e99b9a1ffc071aa6c00449a4d28af735e378f81,2025-03-03T01:15:12.030000 -CVE-2025-27584,1,1,528fd914f7c34c65eae553c4ccbee063eaa5a2dc2276b2287ac4b1a05fd56700,2025-03-03T01:15:12.157000 -CVE-2025-27585,1,1,ec13aea414938446dd43753a7aefcb7dfd82f11bab9f163de2447f190af31843,2025-03-03T01:15:12.277000 +CVE-2025-27583,0,0,18dfdb5a0ae261632796dbd76e99b9a1ffc071aa6c00449a4d28af735e378f81,2025-03-03T01:15:12.030000 +CVE-2025-27584,0,0,528fd914f7c34c65eae553c4ccbee063eaa5a2dc2276b2287ac4b1a05fd56700,2025-03-03T01:15:12.157000 +CVE-2025-27585,0,0,ec13aea414938446dd43753a7aefcb7dfd82f11bab9f163de2447f190af31843,2025-03-03T01:15:12.277000 +CVE-2025-27590,1,1,8f529b7a611aa7d0497c9571b53ac8f03ea946efbb8deff8b1efa4972d889bb1,2025-03-03T04:15:09.020000