From 7918935aa7af378dee369ad581e2d6ac849c1591 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 16 Feb 2025 11:03:49 +0000 Subject: [PATCH] Auto-Update: 2025-02-16T11:00:21.391775+00:00 --- CVE-2024/CVE-2024-05xx/CVE-2024-0532.json | 64 +++++++++- CVE-2025/CVE-2025-11xx/CVE-2025-1115.json | 8 +- CVE-2025/CVE-2025-11xx/CVE-2025-1196.json | 10 +- CVE-2025/CVE-2025-13xx/CVE-2025-1336.json | 137 ++++++++++++++++++++++ README.md | 17 +-- _state.csv | 13 +- 6 files changed, 222 insertions(+), 27 deletions(-) create mode 100644 CVE-2025/CVE-2025-13xx/CVE-2025-1336.json diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0532.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0532.json index db04ffa51a2..0f10ef8c4aa 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0532.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0532.json @@ -2,13 +2,13 @@ "id": "CVE-2024-0532", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T02:15:15.650", - "lastModified": "2024-11-21T08:46:48.613", + "lastModified": "2025-02-16T09:15:07.263", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects unknown code of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250702 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects the function set_repeat5 of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g/wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "es", @@ -16,6 +16,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], "cvssMetricV31": [ { "source": "cna@vuldb.com", @@ -87,8 +131,12 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-119" + }, { "lang": "en", "value": "CWE-121" @@ -97,7 +145,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -162,6 +210,14 @@ "VDB Entry" ] }, + { + "url": "https://vuldb.com/?submit.262690", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cna@vuldb.com" + }, { "url": "https://github.com/yaoyue123/iot/blob/main/Tenda/A15/WifExtraSet.md", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1115.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1115.json index c41e2cbb38e..5bbce14db8c 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1115.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1115.json @@ -2,13 +2,13 @@ "id": "CVE-2025-1115", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-08T10:15:20.997", - "lastModified": "2025-02-08T10:15:20.997", + "lastModified": "2025-02-16T09:15:08.897", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability classified as problematic was found in RT-Thread up to 5.1.0. Affected by this vulnerability is the function sys_thread_create of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument arg[0] leads to information disclosure. An attack has to be approached locally." + "value": "A vulnerability classified as problematic was found in RT-Thread up to 5.1.0. Affected by this vulnerability is the function sys_device_close/sys_device_control/sys_device_find/sys_device_init/sys_device_open/sys_device_read/sys_device_register/sys_device_write/sys_event_delete/sys_event_recv/sys_event_send/sys_mb_delete/sys_mb_recv/sys_mb_send/sys_mb_send_wait/sys_mq_recv/sys_mq_send/sys_mq_urgent/sys_mutex_delete/sys_mutex_release/sys_mutex_take/sys_rt_timer_control/sys_rt_timer_delete/sys_rt_timer_start/sys_rt_timer_stop/sys_sem_delete/sys_sem_release/sys_sem_take/sys_shmat/sys_shmdt/sys_thread_create/sys_thread_delete/sys_thread_startup/sys_timer_delete/sys_timer_gettime/sys_timer_settime of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument arg[0] leads to information disclosure. An attack has to be approached locally." }, { "lang": "es", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -111,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1196.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1196.json index 983756a2670..6694cc44a8c 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1196.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1196.json @@ -2,13 +2,13 @@ "id": "CVE-2025-1196", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T12:15:29.640", - "lastModified": "2025-02-12T12:15:29.640", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-16T09:15:09.073", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability, which was classified as problematic, was found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /search.php. The manipulation of the argument PropertyName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + "value": "A vulnerability, which was classified as problematic, was found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /search.php. The manipulation of the argument PropertyName/StateName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." }, { "lang": "es", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -111,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1336.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1336.json new file mode 100644 index 00000000000..950f4617ab6 --- /dev/null +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1336.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-1336", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-16T09:15:09.347", + "lastModified": "2025-02-16T09:15:09.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in CmsEasy 7.7.7.9 and classified as problematic. Affected by this vulnerability is the function deleteimg_action in the library lib/admin/image_admin.php. The manipulation of the argument imgname leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasy-v7.7.7.9-PathTraversal-2-2-2.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295951", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295951", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.493685", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c5b79ebbe94..7bf209f9e05 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-16T05:00:27.373983+00:00 +2025-02-16T11:00:21.391775+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-16T04:15:23.230000+00:00 +2025-02-16T09:15:09.347000+00:00 ``` ### Last Data Feed Release @@ -33,22 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281476 +281477 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `1` -- [CVE-2024-57970](CVE-2024/CVE-2024-579xx/CVE-2024-57970.json) (`2025-02-16T04:15:21.843`) -- [CVE-2024-57971](CVE-2024/CVE-2024-579xx/CVE-2024-57971.json) (`2025-02-16T04:15:23.077`) -- [CVE-2025-1335](CVE-2025/CVE-2025-13xx/CVE-2025-1335.json) (`2025-02-16T04:15:23.230`) +- [CVE-2025-1336](CVE-2025/CVE-2025-13xx/CVE-2025-1336.json) (`2025-02-16T09:15:09.347`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `3` +- [CVE-2024-0532](CVE-2024/CVE-2024-05xx/CVE-2024-0532.json) (`2025-02-16T09:15:07.263`) +- [CVE-2025-1115](CVE-2025/CVE-2025-11xx/CVE-2025-1115.json) (`2025-02-16T09:15:08.897`) +- [CVE-2025-1196](CVE-2025/CVE-2025-11xx/CVE-2025-1196.json) (`2025-02-16T09:15:09.073`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2259014de99..e4ac2eef764 100644 --- a/_state.csv +++ b/_state.csv @@ -243031,7 +243031,7 @@ CVE-2024-0528,0,0,c3d7be5e3147e324e9d52e7aad31d666693dd0338290bb50ae6d8796f0665e CVE-2024-0529,0,0,d0357b578395287496288d5bd47336b6aff8f2b5dd7db0e31e26aa9d4787f1fc,2024-11-21T08:46:48.190000 CVE-2024-0530,0,0,0db10b2a9ede6fa493e286759f39f82339b01d0fbd60979f7f34b0e1c42c799e,2024-11-21T08:46:48.333000 CVE-2024-0531,0,0,78d50b09008906d370ee43f0a26e6eb041293de2a5ee78c36d22c566ea6e451e,2024-11-21T08:46:48.473000 -CVE-2024-0532,0,0,d535686ef8d7d5f78257cb5edb3183817896ad26ac017056621b3d8ba6177eed,2024-11-21T08:46:48.613000 +CVE-2024-0532,0,1,4d52123f9ecb3ea128d2503bb3205eb357516305946aa0fe6390aedb0c229890,2025-02-16T09:15:07.263000 CVE-2024-0533,0,0,28359450ced486cdfd0eac516c87e927e526517d5c7411a52999b01dcba1d448,2024-11-21T08:46:48.760000 CVE-2024-0534,0,0,d0147a8ee0182ddbdc33a9ba93d6a20b910a3ab584abc3bc57ffb886a5fc5c7e,2024-11-21T08:46:48.893000 CVE-2024-0535,0,0,8941fafeddb6849c560eb46fc17fba660adf0f1a8519aa87fac4e719cc7e3664,2024-11-21T08:46:49.030000 @@ -274978,8 +274978,8 @@ CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000 CVE-2024-57968,0,0,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6e40,2025-02-06T18:15:32.287000 CVE-2024-57969,0,0,b371badd84f84271fd7c4769fff6f836cd92998659f71f251308fa31806e425a,2025-02-14T07:15:32.340000 -CVE-2024-57970,1,1,fc94e473eab89136d60efd4d226219db9cbde959702cd7788c370f74c3d3ceb3,2025-02-16T04:15:21.843000 -CVE-2024-57971,1,1,c3ebbc678e2e75513f00418181cbcb1e653e71fdcb237d937003b8561a873e70,2025-02-16T04:15:23.077000 +CVE-2024-57970,0,0,fc94e473eab89136d60efd4d226219db9cbde959702cd7788c370f74c3d3ceb3,2025-02-16T04:15:21.843000 +CVE-2024-57971,0,0,c3ebbc678e2e75513f00418181cbcb1e653e71fdcb237d937003b8561a873e70,2025-02-16T04:15:23.077000 CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000 CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000 CVE-2024-5800,0,0,0f1ba4e6921bceda8aa9f69d4954ff1ca271a0069f260f484c22f7b777658fee,2024-08-12T13:41:36.517000 @@ -279181,7 +279181,7 @@ CVE-2025-1107,0,0,88a8719351346afa69c0eb84e5c94d3ac98eeae345d66ccbfb838f179b4a14 CVE-2025-1108,0,0,70b44a68f944b132ac1602e83624e59a01ee9e1d6bf1d641646c3c0fbcfd3886,2025-02-07T14:15:48.530000 CVE-2025-1113,0,0,cac5bea27dd30c10d0eb1785409700bc014da3946e77c6ad0cb2611e25e69ecf,2025-02-07T23:15:14.727000 CVE-2025-1114,0,0,08776686bb1020fc2e5b3b4601e411908ccf47316245572027365404f7e1e0d8,2025-02-10T18:15:33.877000 -CVE-2025-1115,0,0,bba7944893cb5bc261b1df2cb755b8651ef45b33e7a808ef1ba8b382d022ea71,2025-02-08T10:15:20.997000 +CVE-2025-1115,0,1,93d9d490db8f65e6d9fe600a161957920a2ef1f3333e07357c060c69119e0510,2025-02-16T09:15:08.897000 CVE-2025-1116,0,0,1900baef94df31cdc087bd9edd3d7c5b346aa1791e055e2d94009a8615107e2d,2025-02-08T12:15:39.660000 CVE-2025-1117,0,0,2322fdff6f8393d6ada2664cbf25a349bfc8c7b701fcb01c2d988bad4837c701,2025-02-08T13:15:07.843000 CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000 @@ -279237,7 +279237,7 @@ CVE-2025-1191,0,0,a9443451c80e7e8f60c9625659585c30e981d1cf45549b4cb91185c07237bb CVE-2025-1192,0,0,d1f7e39b32f8c53dde42a30e4b900bd146d3192392e3efbb1e9aa57fb4c397d2,2025-02-12T11:15:10.727000 CVE-2025-1193,0,0,27e75799b537e2de7edb54e06b6e2c56ad7e3022fd1313c3a37564f7ef341b08,2025-02-10T18:15:34.273000 CVE-2025-1195,0,0,8173ee044f7a44d277ecd5bcf18ea26c61474b7fa54bcdb4ba1d679169d475f8,2025-02-12T12:15:29.397000 -CVE-2025-1196,0,0,276f4d719785571ad93558e9354f0f7bf07fb4e2f380c7fbd2137d99c51b8be0,2025-02-12T12:15:29.640000 +CVE-2025-1196,0,1,435397c42d4554b8303fe9acd648ea47598aadff4112f5ba7c2a02d4e91fe3eb,2025-02-16T09:15:09.073000 CVE-2025-1197,0,0,a51ead443f214c0f6ef96f804505332b87f10dc50ce1367c994773610f655dcd,2025-02-12T15:15:17.670000 CVE-2025-1198,0,0,f6207b50eb6e80b33d6cce685120110cd12848ecf71b1003965e650eb121e529,2025-02-13T02:15:29.627000 CVE-2025-1199,0,0,0b2d000c300f1d87e0ba30963c3bee998d11347294a6daefb6410adbf670161a,2025-02-12T13:15:09.537000 @@ -279274,7 +279274,8 @@ CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813 CVE-2025-1298,0,0,c241b07b63fa1a12db4bf2cbddc777a3c460534a51a196b1be44ba87a34980ab,2025-02-14T08:15:30.877000 CVE-2025-1302,0,0,80ab185ad47640442cc52c9cc763e0a51ea23219a81264b6e3df3c8afc9e7cea,2025-02-15T05:15:11.683000 CVE-2025-1332,0,0,b482e2f3c2fe31a7c23343f351379d12ec2298734a614d40739ee811eedd1bd1,2025-02-16T01:15:20.440000 -CVE-2025-1335,1,1,cca5a5aeab602daf60e1966b659a6706e108a1c270c3d12ddcea19b2340f545f,2025-02-16T04:15:23.230000 +CVE-2025-1335,0,0,cca5a5aeab602daf60e1966b659a6706e108a1c270c3d12ddcea19b2340f545f,2025-02-16T04:15:23.230000 +CVE-2025-1336,1,1,1d4332a43e181efb84f487de4a15195bff051d66dfbf23e944c2a28a29d70a13,2025-02-16T09:15:09.347000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000