diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36353.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36353.json new file mode 100644 index 00000000000..86ddaa8112c --- /dev/null +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36353.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36353", + "sourceIdentifier": "psirt@amd.com", + "published": "2025-03-02T18:15:34.033", + "lastModified": "2025-03-02T18:15:34.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient clearing of GPU global memory could allow a malicious process running on the same GPU to read left over memory values, potentially leading to loss of confidentiality." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-459" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6019.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1819.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1819.json new file mode 100644 index 00000000000..93075b8fcae --- /dev/null +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1819.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-1819", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-02T17:15:11.483", + "lastModified": "2025-03-02T17:15:11.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Tenda AC7 1200M 15.03.06.44. Affected is the function TendaTelnet of the file /goform/telnet. The manipulation of the argument lan_ip leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Raining-101/IOT_cve/blob/main/Tenda%20a7%20V15.03.06.44%20Command%20injection.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298092", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298092", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.504429", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1820.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1820.json new file mode 100644 index 00000000000..bfd7864fceb --- /dev/null +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1820.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1820", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-02T17:15:11.677", + "lastModified": "2025-03-02T17:15:11.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in zj1983 zz up to 2024-8 and classified as critical. Affected by this vulnerability is the function getOaWid of the file src/main/java/com/futvan/z/system/zworkflow/ZworkflowAction.java. The manipulation of the argument tableId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8_SQL%E6%B3%A8%E5%85%A51.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298093", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298093", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.504478", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 46779cbcb38..c9eed11daef 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-02T17:00:19.996546+00:00 +2025-03-02T19:00:19.599952+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-02T16:15:35.563000+00:00 +2025-03-02T18:15:34.033000+00:00 ``` ### Last Data Feed Release @@ -33,26 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -283616 +283619 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `3` -- [CVE-2022-49733](CVE-2022/CVE-2022-497xx/CVE-2022-49733.json) (`2025-03-02T15:15:11.480`) -- [CVE-2024-55907](CVE-2024/CVE-2024-559xx/CVE-2024-55907.json) (`2025-03-02T16:15:34.577`) -- [CVE-2025-0895](CVE-2025/CVE-2025-08xx/CVE-2025-0895.json) (`2025-03-02T16:15:35.410`) -- [CVE-2025-1817](CVE-2025/CVE-2025-18xx/CVE-2025-1817.json) (`2025-03-02T15:15:11.773`) -- [CVE-2025-1818](CVE-2025/CVE-2025-18xx/CVE-2025-1818.json) (`2025-03-02T16:15:35.563`) +- [CVE-2024-36353](CVE-2024/CVE-2024-363xx/CVE-2024-36353.json) (`2025-03-02T18:15:34.033`) +- [CVE-2025-1819](CVE-2025/CVE-2025-18xx/CVE-2025-1819.json) (`2025-03-02T17:15:11.483`) +- [CVE-2025-1820](CVE-2025/CVE-2025-18xx/CVE-2025-1820.json) (`2025-03-02T17:15:11.677`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `0` -- [CVE-2022-49045](CVE-2022/CVE-2022-490xx/CVE-2022-49045.json) (`2025-03-02T15:15:11.130`) -- [CVE-2025-21818](CVE-2025/CVE-2025-218xx/CVE-2025-21818.json) (`2025-03-02T15:15:12.043`) ## Download and Usage diff --git a/_state.csv b/_state.csv index cfa8c5b32fc..5466cc31898 100644 --- a/_state.csv +++ b/_state.csv @@ -213159,7 +213159,7 @@ CVE-2022-49040,0,0,7c1631b8e82470f3fb0abe0b727113e6db8e2f90e0ba3793feff44556a8e1 CVE-2022-49041,0,0,a98f649e96ac9b0759657a1878fe20db3a57b93d993dafffc5b04e911a2c6299,2024-10-08T16:06:51.067000 CVE-2022-49043,0,0,7174066d58537267d7d2a315cb17b3519790e5764e973f2a3d77df9ee2584f26,2025-01-26T06:15:21 CVE-2022-49044,0,0,87e11112e05d607c865d63fe94d99d6e2791458f497309c2a6ed1cfce98d7f84,2025-02-26T07:00:41.680000 -CVE-2022-49045,0,1,22b344a7121cb72fa2f5cfafcc1e2e6a7a43841d65552a779c8562575cc2777e,2025-03-02T15:15:11.130000 +CVE-2022-49045,0,0,22b344a7121cb72fa2f5cfafcc1e2e6a7a43841d65552a779c8562575cc2777e,2025-03-02T15:15:11.130000 CVE-2022-49046,0,0,152256c493efc2a2b5b605660bb04f41c607235ab596db80244258078dfd0936,2025-02-26T07:00:41.890000 CVE-2022-49047,0,0,7d1778a660a2d6b6fcbd30662171589ccad6a73fa527f91b3cd6e7bfeeca8f42,2025-02-27T18:15:23.557000 CVE-2022-49048,0,0,30ba31e289eae907a079f1fc58d7af0c6f37213dbb97a2d01e7de8118c89cc45,2025-02-26T07:00:42.073000 @@ -213913,7 +213913,7 @@ CVE-2022-4973,0,0,3f7bb8af7d8ad41d4b8c2b6df6303f0dad9415526c1ebfae5140748d302176 CVE-2022-49730,0,0,2bfdce97189f4294a4f5bd9bb6fb8ea7daf4ec20279fe3e8023054ddc72e2701,2025-02-27T19:15:47.153000 CVE-2022-49731,0,0,3087aebf92cbb510ce471fc8272df920f283560767e2c40c990611543a35c126,2025-02-26T07:01:48.710000 CVE-2022-49732,0,0,91e898c8ed487c200545020bc19ca94e34172dbee027d967192fdde21cd00234,2025-02-26T15:15:17.843000 -CVE-2022-49733,1,1,00f2b16464e767d64334286585f8472692130288e9ce1355e7473b1b47f21c8d,2025-03-02T15:15:11.480000 +CVE-2022-49733,0,0,00f2b16464e767d64334286585f8472692130288e9ce1355e7473b1b47f21c8d,2025-03-02T15:15:11.480000 CVE-2022-4974,0,0,b3c59950ee3eade0f74a15ade2edad03cf700537d377a12415779325d85e4da4,2024-10-16T16:38:14.557000 CVE-2022-4975,0,0,f3499ac468d9abe551aab7c55d7d6df29ba7ff95cc64d5206edf5add6a87fbd5,2025-01-27T14:15:27.210000 CVE-2023-0001,0,0,2dfbf6dbe59b530ec18f5af443ba14cd4d2a5b201d3a1ffcc25574a8da444091,2024-11-21T07:36:22.050000 @@ -260990,6 +260990,7 @@ CVE-2024-3632,0,0,119403a424687bcfc6e7f9b6ed0b72a6392ff6135bcf171b98aba3696d4839 CVE-2024-3633,0,0,dbe24389bbbd4529b7f9091dcdd1cc4e50034e3cae1ae255b02e49488151e4ae,2024-11-21T09:30:02.327000 CVE-2024-3634,0,0,3383030fed20fc028b4b4484c7a11fba64d2ea257fb986bc506941077c30f176,2024-11-21T09:30:02.520000 CVE-2024-3635,0,0,6b91ce08fb1c4fe8eb1c3b4b2db88c9ffd3abcddd772228d559fe4e3fab4a5b8,2024-10-02T14:30:24.627000 +CVE-2024-36353,1,1,ade3955585b2e2df19175e76e2c957adddbd0f7fc9adfe05514ac8465db87674,2025-03-02T18:15:34.033000 CVE-2024-36358,0,0,d02ad1b74b8c432827349c8f1ff39b47bfcc0cce31a5ed55b7cbdf51520b6cba,2024-11-21T09:22:00.920000 CVE-2024-36359,0,0,3cc0d651469873089668811614995b932e2a134931c52e95469939b03a9b9e74,2024-11-21T09:22:01.040000 CVE-2024-3636,0,0,4c7744b51293bd4e3a9aa3d916a63e7f32e699b3ac0ad0263818bae7fdeef663,2024-08-07T16:35:14.110000 @@ -274844,7 +274845,7 @@ CVE-2024-55897,0,0,86f551f0669482615238eeaffb68bcc56791f5e1b9341f9faf1df69a0f991 CVE-2024-55898,0,0,adcc5d516d89a41277ae34a6de418cf17da58482170efe79dea1e265741329cc,2025-02-24T02:15:31.940000 CVE-2024-5590,0,0,1e127169a6d11120a9395f2effaf6ec6531c09b92460b351c9b795dacfe5c5ec,2025-02-07T15:10:57.540000 CVE-2024-55904,0,0,985e264a3f8f59b658a98ed276a5675a14d822dac410c29893607d517450a9ef,2025-02-14T04:15:08.753000 -CVE-2024-55907,1,1,0751a7e8342da583a1aa00e0d3217f178737262107bfe8f2640e91cf1edc9019,2025-03-02T16:15:34.577000 +CVE-2024-55907,0,0,0751a7e8342da583a1aa00e0d3217f178737262107bfe8f2640e91cf1edc9019,2025-03-02T16:15:34.577000 CVE-2024-5591,0,0,5b452d13d5bfa9a2af82af55a6427cebed5363226c02cb0163eff6e664b73ee7,2025-01-03T15:15:10.813000 CVE-2024-55916,0,0,bb2f39fb2dbe90e6c07ae14f8caf688273b3c9276641493fe6ca8dc8b8b6b9eb,2025-01-16T15:18:39.293000 CVE-2024-55917,0,0,c12e2bbc393b15d20fbce1ec995c8d1d26abb7f3ae27ddc186e402fd7d620706,2024-12-31T17:15:09.140000 @@ -280378,7 +280379,7 @@ CVE-2025-0882,0,0,5c1edbc7dbbc3f98ebcedbafebdf2aeff716655934824b3ca1dcdd38b6a04f CVE-2025-0889,0,0,a3ae28cd1eb9ad44d4044429c5d77259cb331427005c0b4f2bd4843ae7a60701,2025-02-26T08:13:09.050000 CVE-2025-0890,0,0,68df14f89e9fe80a79d0a5c45e2ac7eb09be58559d3bae2cdceaf342154a05c6,2025-02-04T11:15:08.880000 CVE-2025-0893,0,0,9aeacb99190c595b48dfab12a1ef373316d1268f2ba3ec63739da944f1088a1b,2025-02-27T16:15:38.110000 -CVE-2025-0895,1,1,ea239554253dca837dc66c7dba816f60e18253ed7dc7c58c3db5032863591bd7,2025-03-02T16:15:35.410000 +CVE-2025-0895,0,0,ea239554253dca837dc66c7dba816f60e18253ed7dc7c58c3db5032863591bd7,2025-03-02T16:15:35.410000 CVE-2025-0896,0,0,6751a9384c4941fc50728420c1f3798103a546a9d03291af10ad95d9f21fc6d0,2025-02-13T02:15:29.470000 CVE-2025-0897,0,0,17e8fee0d08c1e41eba72312a61f77d72e1199079fe8978f61db78a1602a3680,2025-02-25T20:40:15.277000 CVE-2025-0899,0,0,d8701cd2c405f04761906304023370caa539e5fcf15c63a9325dc062ea45abed,2025-02-12T19:00:59.227000 @@ -280822,8 +280823,10 @@ CVE-2025-1813,0,0,02ae6ad1ffdefd5aeb6eb7e2654a3edb0871de09a85ec36c91ba84639e7d05 CVE-2025-1814,0,0,f32f303f45c0d5175642c5f837f279040d610ef80b5baab57e9f2806480cde1b,2025-03-02T11:15:10.133000 CVE-2025-1815,0,0,a34c30dda4b911432b4b2b780f4af0dad0a2b4112829890565e05e2f2e8dfd92,2025-03-02T12:15:36.507000 CVE-2025-1816,0,0,b9a8d73a53c33b886b17728345a6e936b4d7513f0874340a3269630d4a8274b4,2025-03-02T14:15:34.123000 -CVE-2025-1817,1,1,ed607cf4b18dba3fedc634a87c9b205b76aabdc7299e279dfb6076fd4bc82a71,2025-03-02T15:15:11.773000 -CVE-2025-1818,1,1,d36c337878b30c2f80b4fe6d65335bad90523aeaff616d34524d0eb820cfb6df,2025-03-02T16:15:35.563000 +CVE-2025-1817,0,0,ed607cf4b18dba3fedc634a87c9b205b76aabdc7299e279dfb6076fd4bc82a71,2025-03-02T15:15:11.773000 +CVE-2025-1818,0,0,d36c337878b30c2f80b4fe6d65335bad90523aeaff616d34524d0eb820cfb6df,2025-03-02T16:15:35.563000 +CVE-2025-1819,1,1,b8077e9897a336636549b20cf9dc0e287a17bc30f636d2d56ac710cc82e6e8b0,2025-03-02T17:15:11.483000 +CVE-2025-1820,1,1,5b07ae8a40a108bc4ab7ed1b8cb2828218b05189c18957cbe94b8a5f85021b26,2025-03-02T17:15:11.677000 CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000 @@ -281489,7 +281492,7 @@ CVE-2025-21814,0,0,d61e6a6604289a43928f9985281c7eaadc09d460fef0080c1f10b34fdf9b6 CVE-2025-21815,0,0,505081b931ce8b8c7648642e1759e5d2b9d854ed396415c4f32376b2124b935f,2025-02-27T20:16:04.063000 CVE-2025-21816,0,0,c528fc8128c19bc0bd15f68d6d374b8163180d99f68610bfa350a8bd45cfeffe,2025-02-27T20:16:04.150000 CVE-2025-21817,0,0,fb75e4ad84b34fea43e1625612ef1f6ef9314f907dcd5da0b3430bf5a489cbce,2025-02-27T20:16:04.243000 -CVE-2025-21818,0,1,68cb1db63634248e0d05be36e88289887b47df3d3a20d0885cc9e5401cfe2ddb,2025-03-02T15:15:12.043000 +CVE-2025-21818,0,0,68cb1db63634248e0d05be36e88289887b47df3d3a20d0885cc9e5401cfe2ddb,2025-03-02T15:15:12.043000 CVE-2025-21819,0,0,94bfba28f3d8b661ffc0c813899c721c943da294e0b08f1f347068f2b89e6225,2025-02-27T20:16:04.430000 CVE-2025-21820,0,0,928b3fdbe42fa69be133f26d3b8d8ffc038a4e05f115c6d98b017372c42ef2d7,2025-02-27T20:16:04.520000 CVE-2025-21821,0,0,fd6efc5d1ffad2a00aa09e345a704277d9daeb9e6fddc1a42c293b6132b6a1e2,2025-02-27T20:16:04.613000