diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27055.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27055.json index 388a69a9196..fe576e6be6d 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27055.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27055.json @@ -2,68 +2,15 @@ "id": "CVE-2024-27055", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:50.317", - "lastModified": "2024-11-21T09:03:45.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T08:15:10.287", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nworkqueue: Don't call cpumask_test_cpu() with -1 CPU in wq_update_node_max_active()\n\nFor wq_update_node_max_active(), @off_cpu of -1 indicates that no CPU is\ngoing down. The function was incorrectly calling cpumask_test_cpu() with -1\nCPU leading to oopses like the following on some archs:\n\n Unable to handle kernel paging request at virtual address ffff0002100296e0\n ..\n pc : wq_update_node_max_active+0x50/0x1fc\n lr : wq_update_node_max_active+0x1f0/0x1fc\n ...\n Call trace:\n wq_update_node_max_active+0x50/0x1fc\n apply_wqattrs_commit+0xf0/0x114\n apply_workqueue_attrs_locked+0x58/0xa0\n alloc_workqueue+0x5ac/0x774\n workqueue_init_early+0x460/0x540\n start_kernel+0x258/0x684\n __primary_switched+0xb8/0xc0\n Code: 9100a273 35000d01 53067f00 d0016dc1 (f8607a60)\n ---[ end trace 0000000000000000 ]---\n Kernel panic - not syncing: Attempted to kill the idle task!\n ---[ end Kernel panic - not syncing: Attempted to kill the idle task! ]---\n\nFix it." - }, - { - "lang": "es", - "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cola de trabajo: no llame a cpumask_test_cpu() con -1 CPU en wq_update_node_max_active() Para wq_update_node_max_active(), @off_cpu de -1 indica que no hay ninguna CPU fallando. La funci\u00f3n llamaba incorrectamente a cpumask_test_cpu() con -1 CPU, lo que provocaba errores como los siguientes en algunos arcos: No se puede manejar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual ffff0002100296e0 .. pc: wq_update_node_max_active+0x50/0x1fc lr: wq_update_node_max_active+0x1f0/0x1fc .. Seguimiento de llamadas: wq_update_node_max_active+0x50/0x1fc apply_wqattrs_commit+0xf0/0x114 apply_workqueue_attrs_locked+0x58/0xa0 alloc_workqueue+0x5ac/0x774 workqueue_init_early+0x460/0x540 start_kernel+0x258/0x68. 4 __primary_switched+0xb8/0xc0 C\u00f3digo: 9100a273 35000d01 53067f00 d0016dc1 (f8607a60) -- -[ end trace 0000000000000000 ]--- P\u00e1nico del kernel - no se sincroniza: \u00a1Se intent\u00f3 finalizar la tarea inactiva! ---[ fin del p\u00e1nico del kernel: no se sincroniza: \u00a1se intent\u00f3 finalizar la tarea inactiva! ]--- Arreglalo." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/15930da42f8981dc42c19038042947b475b19f47", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/38c19c44cc05ec1e84d2e31a9a289b83b6c7ec85", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/7df62b8cca38aa452b508b477b16544cba615084", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/9fc557d489f8163c1aabcb89114b8eba960f4097", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/a75ac2693d734d20724f0e10e039ca85f1fcfc4e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/adc646d2126988a64234502f579e4bc2b080d7cf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/15930da42f8981dc42c19038042947b475b19f47", - "source": "af854a3a-2127-422b-91ae-364da2661108" - }, - { - "url": "https://git.kernel.org/stable/c/38c19c44cc05ec1e84d2e31a9a289b83b6c7ec85", - "source": "af854a3a-2127-422b-91ae-364da2661108" - }, - { - "url": "https://git.kernel.org/stable/c/7df62b8cca38aa452b508b477b16544cba615084", - "source": "af854a3a-2127-422b-91ae-364da2661108" - }, - { - "url": "https://git.kernel.org/stable/c/9fc557d489f8163c1aabcb89114b8eba960f4097", - "source": "af854a3a-2127-422b-91ae-364da2661108" - }, - { - "url": "https://git.kernel.org/stable/c/a75ac2693d734d20724f0e10e039ca85f1fcfc4e", - "source": "af854a3a-2127-422b-91ae-364da2661108" - }, - { - "url": "https://git.kernel.org/stable/c/adc646d2126988a64234502f579e4bc2b080d7cf", - "source": "af854a3a-2127-422b-91ae-364da2661108" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8261.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8261.json index bf1ef428081..2cd0e311e0a 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8261.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8261.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8261", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2025-03-03T15:15:15.820", - "lastModified": "2025-03-07T19:37:23.273", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-10T08:15:11.360", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,27 +19,27 @@ "cvssMetricV31": [ { "source": "iletisim@usom.gov.tr", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", - "baseScore": 5.3, + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, - "exploitabilityScore": 1.6, + "exploitabilityScore": 2.2, "impactScore": 3.6 }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "iletisim@usom.gov.tr", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8262.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8262.json index 467ae8ca213..dd399827c70 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8262.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8262.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8262", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2025-03-03T15:15:15.990", - "lastModified": "2025-03-07T19:37:23.273", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-10T08:15:11.687", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,27 +19,27 @@ "cvssMetricV31": [ { "source": "iletisim@usom.gov.tr", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "baseScore": 5.5, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.2, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, - "exploitabilityScore": 1.8, + "exploitabilityScore": 2.5, "impactScore": 3.6 }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "iletisim@usom.gov.tr", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2030.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2030.json index adc55f115ba..1c1774310c5 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2030.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2030.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2030", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-06T15:15:18.127", - "lastModified": "2025-03-06T16:15:55.593", + "lastModified": "2025-03-10T07:15:36.400", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -22,13 +22,13 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 5.3, + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", @@ -63,22 +63,22 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 3.9, "impactScore": 3.4 } ], @@ -88,17 +88,17 @@ "type": "Secondary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", - "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", - "authentication": "SINGLE", + "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, - "baseSeverity": "MEDIUM", - "exploitabilityScore": 8.0, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2150.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2150.json new file mode 100644 index 00000000000..b0046322143 --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2150.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-2150", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2025-03-10T08:15:11.917", + "lastModified": "2025-03-10T08:15:11.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The C&Cm@il from HGiga has a Stored Cross-Site Scripting (XSS) vulnerability, allowing remote attackers with regular privileges to send emails containing malicious JavaScript code, which will be executed in the recipient's browser when they view the email." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/en/cp-139-10005-05e0f-2.html", + "source": "twcert@cert.org.tw" + }, + { + "url": "https://www.twcert.org.tw/tw/cp-132-10004-99474-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 1cb579b0222..e143def7992 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-10T07:00:24.609539+00:00 +2025-03-10T09:00:24.108152+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-10T06:15:20.797000+00:00 +2025-03-10T08:15:11.917000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284588 +284589 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `1` -- [CVE-2024-11638](CVE-2024/CVE-2024-116xx/CVE-2024-11638.json) (`2025-03-10T06:15:20.797`) -- [CVE-2025-1926](CVE-2025/CVE-2025-19xx/CVE-2025-1926.json) (`2025-03-10T05:15:35.347`) +- [CVE-2025-2150](CVE-2025/CVE-2025-21xx/CVE-2025-2150.json) (`2025-03-10T08:15:11.917`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `4` +- [CVE-2024-27055](CVE-2024/CVE-2024-270xx/CVE-2024-27055.json) (`2025-03-10T08:15:10.287`) +- [CVE-2024-8261](CVE-2024/CVE-2024-82xx/CVE-2024-8261.json) (`2025-03-10T08:15:11.360`) +- [CVE-2024-8262](CVE-2024/CVE-2024-82xx/CVE-2024-8262.json) (`2025-03-10T08:15:11.687`) +- [CVE-2025-2030](CVE-2025/CVE-2025-20xx/CVE-2025-2030.json) (`2025-03-10T07:15:36.400`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 118bc1fa284..5d13b56af7b 100644 --- a/_state.csv +++ b/_state.csv @@ -245757,7 +245757,7 @@ CVE-2024-11634,0,0,14627ed8cbf95632caf8b74a22783ca02eb0bf7651aea5ed85be227c49580 CVE-2024-11635,0,0,ffacee27dce2a3419b3aa106b350e83d5585d5dcfe645774b0023dac2c389ee8,2025-01-08T08:15:24.117000 CVE-2024-11636,0,0,477a215831f10296b9ea3788441fcca038078cee1d80a9e966a40e92f5b59df4,2025-01-13T15:15:07.560000 CVE-2024-11637,0,0,5348ca65261140ae16ec15332c773ee06343664939e89530c0d5541b934692f4,2025-01-14T02:15:07.907000 -CVE-2024-11638,1,1,552649984b67f5b1ef18257a0d06eb421eca6da700aa98bde360d18a4c898d04,2025-03-10T06:15:20.797000 +CVE-2024-11638,0,0,552649984b67f5b1ef18257a0d06eb421eca6da700aa98bde360d18a4c898d04,2025-03-10T06:15:20.797000 CVE-2024-11639,0,0,b0b1970767477e87b7cf619e96fa5cb2fbca7d53895c7bdaf49d93303071061e,2025-01-17T19:40:09.763000 CVE-2024-1164,0,0,d6b3223f31512976ce37113225736cbf014a2aac3d8c295ef68c5d3e3fda5f16,2025-01-16T15:08:00.773000 CVE-2024-11640,0,0,703b195ff151c253fbe91a68928542f3fce11ad9103611204a13abf98a6770f0,2025-03-08T12:15:34.510000 @@ -254001,7 +254001,7 @@ CVE-2024-27051,0,0,29c4b363431a5a9f51f00fd8a89b743131cb7ef3c9e253b048cd323779287 CVE-2024-27052,0,0,b014ef3d70e7d52f212b070ccf280ec8602a40234d19cdb7cfeefe9fb54997dc,2024-11-21T09:03:45.253000 CVE-2024-27053,0,0,fab5ac77fb553181428dd3f4ccb1dfcc138fd34b12976177a1399f1f5f83e7be,2024-11-21T09:03:45.457000 CVE-2024-27054,0,0,56c6f67afa434cc0076215a854fd0036a15b86608accbe0d9b824b22834c21d6,2024-11-21T09:03:45.667000 -CVE-2024-27055,0,0,567532cde91599899067f455d5c7b87fb6bd7d422556d36a861d5078f328e1a4,2024-11-21T09:03:45.863000 +CVE-2024-27055,0,1,7b39e69c60cdf41f6248e9f85b771f9c297d2438c8a24fe3eda1cac546961d77,2025-03-10T08:15:10.287000 CVE-2024-27056,0,0,0c46f13676f36e598862e1367000c5f83b6f006bf4cfa76fa723d92a467f92b1,2024-11-21T09:03:45.980000 CVE-2024-27057,0,0,59020acf3ab82c0eef52cab6667be5665e673c02ff7c385265b72e8eb5c4ebf2,2024-11-21T09:03:46.097000 CVE-2024-27058,0,0,e8e18c8efb56c2ad87995b6dc7ebbe8c01bb5c8a51c8ae719afbfa612893fc4d,2024-11-21T09:03:46.217000 @@ -278675,8 +278675,8 @@ CVE-2024-8256,0,0,1611701250ae3ec61529b0da09cb8680607654a2f70f8e904e5974c82b4cf9 CVE-2024-8258,0,0,f110e480f74f3d8ee9f2f16ea989eb0ea229b8f21015ec0d3b5c01c8038eabd1,2024-09-27T18:56:41.140000 CVE-2024-8259,0,0,7bf4352426e14b796c98c3dff8a9f93d11f407925658b449d6ea8fe3ebd0f96f,2024-12-13T08:15:05.017000 CVE-2024-8260,0,0,1a5d0d9640e33b2f7c9f22aba5e11715bf32bcc340f2c05d167a5a396b68ca4a,2024-09-19T16:08:58.863000 -CVE-2024-8261,0,0,c897a07730782795d57c9afcc6840c1c91721fea5fad18731002040448e27255,2025-03-07T19:37:23.273000 -CVE-2024-8262,0,0,a8f7b4aa15785640ae8bb74224a13bebe2b89827e2dfcff6e5586d4dfda3209e,2025-03-07T19:37:23.273000 +CVE-2024-8261,0,1,ad6bc6f26ee1968485316eb29d9ee4b80c5c331842bd14a1e05d1ff8c5c245f7,2025-03-10T08:15:11.360000 +CVE-2024-8262,0,1,313809a66dfb9216a969c110441841344f9ee0d03969012d74a162d67ca33a0a,2025-03-10T08:15:11.687000 CVE-2024-8263,0,0,c30b2614165b38dd1e79b54ad73ee801cd690dec6dfd531970fbb0c695a6b519,2024-09-30T15:57:26.213000 CVE-2024-8264,0,0,2d0f7550734ab3870107734db176c89529f357d12409e5b5d0288029aba420c5,2024-10-17T14:06:39.420000 CVE-2024-8266,0,0,7f51b02f290727aff51f7eadea155b5c0e5946c8babbbc1d8d023ac984ce4386,2025-02-13T01:15:25.137000 @@ -281254,7 +281254,7 @@ CVE-2025-1921,0,0,52bb07cc9f6cf05de10de265c3df2b2725a17528bd0219c2e259fa5ff16cca CVE-2025-1922,0,0,de1e1ca67fdc901d18061c6676a386188acf9c3e5652956afbc8bfc4df588be3,2025-03-05T15:15:16.700000 CVE-2025-1923,0,0,fb6bb796e915c4eb19c73c083cba3d2b11c3c2b6d1b2cce8fa809b77f776c071,2025-03-05T15:15:16.857000 CVE-2025-1925,0,0,89ec5e399eff8562ba7e03e6894b43f8413799ce819ad10dde1cb15895d5ace1,2025-03-04T14:15:36.717000 -CVE-2025-1926,1,1,3fd383620155bc700a1d424e89a4dd95e4a6ba03a5a74627a122d5ca83dd4aff,2025-03-10T05:15:35.347000 +CVE-2025-1926,0,0,3fd383620155bc700a1d424e89a4dd95e4a6ba03a5a74627a122d5ca83dd4aff,2025-03-10T05:15:35.347000 CVE-2025-1930,0,0,e0eeca60a40599b41d4e2503f5a7e0f6e6ab961d2b56420baaf24ed1ff9b0d96,2025-03-05T17:15:13.583000 CVE-2025-1931,0,0,f3d2bb31d03f02113b6a4ed220650cd525ede36c0527a7d65dba0bfc00331a6b,2025-03-05T00:15:36.227000 CVE-2025-1932,0,0,7d5e9706440df74109c0e84082a12ded8a21dcc94be932d0427a55e38803d4ce,2025-03-05T00:15:36.320000 @@ -281355,7 +281355,7 @@ CVE-2025-20208,0,0,1dba31708947f0b7dca30112bb6add1340ccdac1898cf64bb899cff2c905f CVE-2025-20211,0,0,f40e52cb9e720a750ff40a6d984cd863919cf3388eccfdd326c3ba9106482e42,2025-02-19T16:15:41.163000 CVE-2025-2024,0,0,75cfaab8b65dff5d975a0b56e229eaec536c96c4441c3d1fb60716f5d1f62b9c,2025-03-07T20:15:39.023000 CVE-2025-2029,0,0,9912e19fe47f7d188961387a6c0b865a7aecf5ff404ea1967730181d7c80ca4f,2025-03-06T15:15:17.943000 -CVE-2025-2030,0,0,9d3ca014c2cbdd0f3fee5987738ba77f6ec67b576eca6b9c42c160b2be0231a4,2025-03-06T16:15:55.593000 +CVE-2025-2030,0,1,0db11fa08b70dd10247ef179309e085beb9571fa920d72b01ff3edc5b3f7ce4f,2025-03-10T07:15:36.400000 CVE-2025-2031,0,0,dce624b010eeacc43b1e4cf156805ac2bc0f212d05221d32ac1dc4cbb4ae0e23,2025-03-06T17:15:24.153000 CVE-2025-2032,0,0,5ed73860b2dfdd2b63a0278ec4bf58bd501d5a253672f34c06d7e31cb25d6a0b,2025-03-06T17:15:24.297000 CVE-2025-2033,0,0,f8953d527a8dd7fa2ec425e0e1a8988a67e5617e7fb84176b06f18b159bf60ed,2025-03-06T17:15:24.490000 @@ -281789,6 +281789,7 @@ CVE-2025-21495,0,0,fe11be338e1c05fec9619cc491b1fbe01f7127eb46f2c1cd0e8e0b8eeb095 CVE-2025-21497,0,0,d72398150450df53d5b7a47f71be2a91de3fc300c37f2167b3e74a3222c92d53,2025-01-23T17:15:23.070000 CVE-2025-21498,0,0,79239fea0fbf0d172db5dafbc92924ab759f3676cf4dbe1cb372fd23b3ba88fd,2025-01-31T21:15:12.840000 CVE-2025-21499,0,0,2c32e354ed5a6e4eea492ba23bb7728e07a08fad97151da4f29131ca6df8e113,2025-01-23T17:15:23.230000 +CVE-2025-2150,1,1,730f3d271820dcdc68dc69533ef19345a277b0d7a482a48e590f383a80309ea5,2025-03-10T08:15:11.917000 CVE-2025-21500,0,0,bbe9f114cc8d8e49962ad9854df4e89c5a30ee8cfa74d29f4db3b527d20b85d8,2025-01-23T17:15:23.520000 CVE-2025-21501,0,0,b499d527899d3c99b0af0dd327ab08d36e2a133ebd4d99fcf7220ac8dcf2048e,2025-01-23T17:15:23.680000 CVE-2025-21502,0,0,389d0578b0efac827f054d0c6c38b5e80f2fec0e9cc037bd997594f58cd454d8,2025-02-07T11:15:10.717000