Auto-Update: 2025-02-16T11:00:21.391775+00:00

This commit is contained in:
cad-safe-bot 2025-02-16 11:03:49 +00:00
parent a057b87228
commit 7918935aa7
6 changed files with 222 additions and 27 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-0532", "id": "CVE-2024-0532",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-15T02:15:15.650", "published": "2024-01-15T02:15:15.650",
"lastModified": "2024-11-21T08:46:48.613", "lastModified": "2025-02-16T09:15:07.263",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects unknown code of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250702 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." "value": "A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects the function set_repeat5 of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g/wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}, },
{ {
"lang": "es", "lang": "es",
@ -16,6 +16,50 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
@ -87,8 +131,12 @@
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Primary",
"description": [ "description": [
{
"lang": "en",
"value": "CWE-119"
},
{ {
"lang": "en", "lang": "en",
"value": "CWE-121" "value": "CWE-121"
@ -97,7 +145,7 @@
}, },
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -162,6 +210,14 @@
"VDB Entry" "VDB Entry"
] ]
}, },
{
"url": "https://vuldb.com/?submit.262690",
"source": "cna@vuldb.com"
},
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
},
{ {
"url": "https://github.com/yaoyue123/iot/blob/main/Tenda/A15/WifExtraSet.md", "url": "https://github.com/yaoyue123/iot/blob/main/Tenda/A15/WifExtraSet.md",
"source": "af854a3a-2127-422b-91ae-364da2661108", "source": "af854a3a-2127-422b-91ae-364da2661108",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-1115", "id": "CVE-2025-1115",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-08T10:15:20.997", "published": "2025-02-08T10:15:20.997",
"lastModified": "2025-02-08T10:15:20.997", "lastModified": "2025-02-16T09:15:08.897",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability classified as problematic was found in RT-Thread up to 5.1.0. Affected by this vulnerability is the function sys_thread_create of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument arg[0] leads to information disclosure. An attack has to be approached locally." "value": "A vulnerability classified as problematic was found in RT-Thread up to 5.1.0. Affected by this vulnerability is the function sys_device_close/sys_device_control/sys_device_find/sys_device_init/sys_device_open/sys_device_read/sys_device_register/sys_device_write/sys_event_delete/sys_event_recv/sys_event_send/sys_mb_delete/sys_mb_recv/sys_mb_send/sys_mb_send_wait/sys_mq_recv/sys_mq_send/sys_mq_urgent/sys_mutex_delete/sys_mutex_release/sys_mutex_take/sys_rt_timer_control/sys_rt_timer_delete/sys_rt_timer_start/sys_rt_timer_stop/sys_sem_delete/sys_sem_release/sys_sem_take/sys_shmat/sys_shmdt/sys_thread_create/sys_thread_delete/sys_thread_startup/sys_timer_delete/sys_timer_gettime/sys_timer_settime of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument arg[0] leads to information disclosure. An attack has to be approached locally."
}, },
{ {
"lang": "es", "lang": "es",
@ -63,7 +63,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
@ -111,7 +111,7 @@
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-1196", "id": "CVE-2025-1196",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-12T12:15:29.640", "published": "2025-02-12T12:15:29.640",
"lastModified": "2025-02-12T12:15:29.640", "lastModified": "2025-02-16T09:15:09.073",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /search.php. The manipulation of the argument PropertyName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." "value": "A vulnerability, which was classified as problematic, was found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /search.php. The manipulation of the argument PropertyName/StateName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
}, },
{ {
"lang": "es", "lang": "es",
@ -63,7 +63,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -111,7 +111,7 @@
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-1336",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-16T09:15:09.347",
"lastModified": "2025-02-16T09:15:09.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in CmsEasy 7.7.7.9 and classified as problematic. Affected by this vulnerability is the function deleteimg_action in the library lib/admin/image_admin.php. The manipulation of the argument imgname leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasy-v7.7.7.9-PathTraversal-2-2-2.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.295951",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.295951",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.493685",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-02-16T05:00:27.373983+00:00 2025-02-16T11:00:21.391775+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-02-16T04:15:23.230000+00:00 2025-02-16T09:15:09.347000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,22 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
281476 281477
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `3` Recently added CVEs: `1`
- [CVE-2024-57970](CVE-2024/CVE-2024-579xx/CVE-2024-57970.json) (`2025-02-16T04:15:21.843`) - [CVE-2025-1336](CVE-2025/CVE-2025-13xx/CVE-2025-1336.json) (`2025-02-16T09:15:09.347`)
- [CVE-2024-57971](CVE-2024/CVE-2024-579xx/CVE-2024-57971.json) (`2025-02-16T04:15:23.077`)
- [CVE-2025-1335](CVE-2025/CVE-2025-13xx/CVE-2025-1335.json) (`2025-02-16T04:15:23.230`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `3`
- [CVE-2024-0532](CVE-2024/CVE-2024-05xx/CVE-2024-0532.json) (`2025-02-16T09:15:07.263`)
- [CVE-2025-1115](CVE-2025/CVE-2025-11xx/CVE-2025-1115.json) (`2025-02-16T09:15:08.897`)
- [CVE-2025-1196](CVE-2025/CVE-2025-11xx/CVE-2025-1196.json) (`2025-02-16T09:15:09.073`)
## Download and Usage ## Download and Usage

View File

@ -243031,7 +243031,7 @@ CVE-2024-0528,0,0,c3d7be5e3147e324e9d52e7aad31d666693dd0338290bb50ae6d8796f0665e
CVE-2024-0529,0,0,d0357b578395287496288d5bd47336b6aff8f2b5dd7db0e31e26aa9d4787f1fc,2024-11-21T08:46:48.190000 CVE-2024-0529,0,0,d0357b578395287496288d5bd47336b6aff8f2b5dd7db0e31e26aa9d4787f1fc,2024-11-21T08:46:48.190000
CVE-2024-0530,0,0,0db10b2a9ede6fa493e286759f39f82339b01d0fbd60979f7f34b0e1c42c799e,2024-11-21T08:46:48.333000 CVE-2024-0530,0,0,0db10b2a9ede6fa493e286759f39f82339b01d0fbd60979f7f34b0e1c42c799e,2024-11-21T08:46:48.333000
CVE-2024-0531,0,0,78d50b09008906d370ee43f0a26e6eb041293de2a5ee78c36d22c566ea6e451e,2024-11-21T08:46:48.473000 CVE-2024-0531,0,0,78d50b09008906d370ee43f0a26e6eb041293de2a5ee78c36d22c566ea6e451e,2024-11-21T08:46:48.473000
CVE-2024-0532,0,0,d535686ef8d7d5f78257cb5edb3183817896ad26ac017056621b3d8ba6177eed,2024-11-21T08:46:48.613000 CVE-2024-0532,0,1,4d52123f9ecb3ea128d2503bb3205eb357516305946aa0fe6390aedb0c229890,2025-02-16T09:15:07.263000
CVE-2024-0533,0,0,28359450ced486cdfd0eac516c87e927e526517d5c7411a52999b01dcba1d448,2024-11-21T08:46:48.760000 CVE-2024-0533,0,0,28359450ced486cdfd0eac516c87e927e526517d5c7411a52999b01dcba1d448,2024-11-21T08:46:48.760000
CVE-2024-0534,0,0,d0147a8ee0182ddbdc33a9ba93d6a20b910a3ab584abc3bc57ffb886a5fc5c7e,2024-11-21T08:46:48.893000 CVE-2024-0534,0,0,d0147a8ee0182ddbdc33a9ba93d6a20b910a3ab584abc3bc57ffb886a5fc5c7e,2024-11-21T08:46:48.893000
CVE-2024-0535,0,0,8941fafeddb6849c560eb46fc17fba660adf0f1a8519aa87fac4e719cc7e3664,2024-11-21T08:46:49.030000 CVE-2024-0535,0,0,8941fafeddb6849c560eb46fc17fba660adf0f1a8519aa87fac4e719cc7e3664,2024-11-21T08:46:49.030000
@ -274978,8 +274978,8 @@ CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e
CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000 CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000
CVE-2024-57968,0,0,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6e40,2025-02-06T18:15:32.287000 CVE-2024-57968,0,0,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6e40,2025-02-06T18:15:32.287000
CVE-2024-57969,0,0,b371badd84f84271fd7c4769fff6f836cd92998659f71f251308fa31806e425a,2025-02-14T07:15:32.340000 CVE-2024-57969,0,0,b371badd84f84271fd7c4769fff6f836cd92998659f71f251308fa31806e425a,2025-02-14T07:15:32.340000
CVE-2024-57970,1,1,fc94e473eab89136d60efd4d226219db9cbde959702cd7788c370f74c3d3ceb3,2025-02-16T04:15:21.843000 CVE-2024-57970,0,0,fc94e473eab89136d60efd4d226219db9cbde959702cd7788c370f74c3d3ceb3,2025-02-16T04:15:21.843000
CVE-2024-57971,1,1,c3ebbc678e2e75513f00418181cbcb1e653e71fdcb237d937003b8561a873e70,2025-02-16T04:15:23.077000 CVE-2024-57971,0,0,c3ebbc678e2e75513f00418181cbcb1e653e71fdcb237d937003b8561a873e70,2025-02-16T04:15:23.077000
CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000 CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000
CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000 CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000
CVE-2024-5800,0,0,0f1ba4e6921bceda8aa9f69d4954ff1ca271a0069f260f484c22f7b777658fee,2024-08-12T13:41:36.517000 CVE-2024-5800,0,0,0f1ba4e6921bceda8aa9f69d4954ff1ca271a0069f260f484c22f7b777658fee,2024-08-12T13:41:36.517000
@ -279181,7 +279181,7 @@ CVE-2025-1107,0,0,88a8719351346afa69c0eb84e5c94d3ac98eeae345d66ccbfb838f179b4a14
CVE-2025-1108,0,0,70b44a68f944b132ac1602e83624e59a01ee9e1d6bf1d641646c3c0fbcfd3886,2025-02-07T14:15:48.530000 CVE-2025-1108,0,0,70b44a68f944b132ac1602e83624e59a01ee9e1d6bf1d641646c3c0fbcfd3886,2025-02-07T14:15:48.530000
CVE-2025-1113,0,0,cac5bea27dd30c10d0eb1785409700bc014da3946e77c6ad0cb2611e25e69ecf,2025-02-07T23:15:14.727000 CVE-2025-1113,0,0,cac5bea27dd30c10d0eb1785409700bc014da3946e77c6ad0cb2611e25e69ecf,2025-02-07T23:15:14.727000
CVE-2025-1114,0,0,08776686bb1020fc2e5b3b4601e411908ccf47316245572027365404f7e1e0d8,2025-02-10T18:15:33.877000 CVE-2025-1114,0,0,08776686bb1020fc2e5b3b4601e411908ccf47316245572027365404f7e1e0d8,2025-02-10T18:15:33.877000
CVE-2025-1115,0,0,bba7944893cb5bc261b1df2cb755b8651ef45b33e7a808ef1ba8b382d022ea71,2025-02-08T10:15:20.997000 CVE-2025-1115,0,1,93d9d490db8f65e6d9fe600a161957920a2ef1f3333e07357c060c69119e0510,2025-02-16T09:15:08.897000
CVE-2025-1116,0,0,1900baef94df31cdc087bd9edd3d7c5b346aa1791e055e2d94009a8615107e2d,2025-02-08T12:15:39.660000 CVE-2025-1116,0,0,1900baef94df31cdc087bd9edd3d7c5b346aa1791e055e2d94009a8615107e2d,2025-02-08T12:15:39.660000
CVE-2025-1117,0,0,2322fdff6f8393d6ada2664cbf25a349bfc8c7b701fcb01c2d988bad4837c701,2025-02-08T13:15:07.843000 CVE-2025-1117,0,0,2322fdff6f8393d6ada2664cbf25a349bfc8c7b701fcb01c2d988bad4837c701,2025-02-08T13:15:07.843000
CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000 CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000
@ -279237,7 +279237,7 @@ CVE-2025-1191,0,0,a9443451c80e7e8f60c9625659585c30e981d1cf45549b4cb91185c07237bb
CVE-2025-1192,0,0,d1f7e39b32f8c53dde42a30e4b900bd146d3192392e3efbb1e9aa57fb4c397d2,2025-02-12T11:15:10.727000 CVE-2025-1192,0,0,d1f7e39b32f8c53dde42a30e4b900bd146d3192392e3efbb1e9aa57fb4c397d2,2025-02-12T11:15:10.727000
CVE-2025-1193,0,0,27e75799b537e2de7edb54e06b6e2c56ad7e3022fd1313c3a37564f7ef341b08,2025-02-10T18:15:34.273000 CVE-2025-1193,0,0,27e75799b537e2de7edb54e06b6e2c56ad7e3022fd1313c3a37564f7ef341b08,2025-02-10T18:15:34.273000
CVE-2025-1195,0,0,8173ee044f7a44d277ecd5bcf18ea26c61474b7fa54bcdb4ba1d679169d475f8,2025-02-12T12:15:29.397000 CVE-2025-1195,0,0,8173ee044f7a44d277ecd5bcf18ea26c61474b7fa54bcdb4ba1d679169d475f8,2025-02-12T12:15:29.397000
CVE-2025-1196,0,0,276f4d719785571ad93558e9354f0f7bf07fb4e2f380c7fbd2137d99c51b8be0,2025-02-12T12:15:29.640000 CVE-2025-1196,0,1,435397c42d4554b8303fe9acd648ea47598aadff4112f5ba7c2a02d4e91fe3eb,2025-02-16T09:15:09.073000
CVE-2025-1197,0,0,a51ead443f214c0f6ef96f804505332b87f10dc50ce1367c994773610f655dcd,2025-02-12T15:15:17.670000 CVE-2025-1197,0,0,a51ead443f214c0f6ef96f804505332b87f10dc50ce1367c994773610f655dcd,2025-02-12T15:15:17.670000
CVE-2025-1198,0,0,f6207b50eb6e80b33d6cce685120110cd12848ecf71b1003965e650eb121e529,2025-02-13T02:15:29.627000 CVE-2025-1198,0,0,f6207b50eb6e80b33d6cce685120110cd12848ecf71b1003965e650eb121e529,2025-02-13T02:15:29.627000
CVE-2025-1199,0,0,0b2d000c300f1d87e0ba30963c3bee998d11347294a6daefb6410adbf670161a,2025-02-12T13:15:09.537000 CVE-2025-1199,0,0,0b2d000c300f1d87e0ba30963c3bee998d11347294a6daefb6410adbf670161a,2025-02-12T13:15:09.537000
@ -279274,7 +279274,8 @@ CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813
CVE-2025-1298,0,0,c241b07b63fa1a12db4bf2cbddc777a3c460534a51a196b1be44ba87a34980ab,2025-02-14T08:15:30.877000 CVE-2025-1298,0,0,c241b07b63fa1a12db4bf2cbddc777a3c460534a51a196b1be44ba87a34980ab,2025-02-14T08:15:30.877000
CVE-2025-1302,0,0,80ab185ad47640442cc52c9cc763e0a51ea23219a81264b6e3df3c8afc9e7cea,2025-02-15T05:15:11.683000 CVE-2025-1302,0,0,80ab185ad47640442cc52c9cc763e0a51ea23219a81264b6e3df3c8afc9e7cea,2025-02-15T05:15:11.683000
CVE-2025-1332,0,0,b482e2f3c2fe31a7c23343f351379d12ec2298734a614d40739ee811eedd1bd1,2025-02-16T01:15:20.440000 CVE-2025-1332,0,0,b482e2f3c2fe31a7c23343f351379d12ec2298734a614d40739ee811eedd1bd1,2025-02-16T01:15:20.440000
CVE-2025-1335,1,1,cca5a5aeab602daf60e1966b659a6706e108a1c270c3d12ddcea19b2340f545f,2025-02-16T04:15:23.230000 CVE-2025-1335,0,0,cca5a5aeab602daf60e1966b659a6706e108a1c270c3d12ddcea19b2340f545f,2025-02-16T04:15:23.230000
CVE-2025-1336,1,1,1d4332a43e181efb84f487de4a15195bff051d66dfbf23e944c2a28a29d70a13,2025-02-16T09:15:09.347000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000 CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000

Can't render this file because it is too large.