Auto-Update: 2025-03-10T09:00:24.108152+00:00

This commit is contained in:
cad-safe-bot 2025-03-10 09:03:52 +00:00
parent 705f213eec
commit 99ebb1a8e8
7 changed files with 114 additions and 103 deletions

View File

@ -2,68 +2,15 @@
"id": "CVE-2024-27055",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T13:15:50.317",
"lastModified": "2024-11-21T09:03:45.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T08:15:10.287",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nworkqueue: Don't call cpumask_test_cpu() with -1 CPU in wq_update_node_max_active()\n\nFor wq_update_node_max_active(), @off_cpu of -1 indicates that no CPU is\ngoing down. The function was incorrectly calling cpumask_test_cpu() with -1\nCPU leading to oopses like the following on some archs:\n\n Unable to handle kernel paging request at virtual address ffff0002100296e0\n ..\n pc : wq_update_node_max_active+0x50/0x1fc\n lr : wq_update_node_max_active+0x1f0/0x1fc\n ...\n Call trace:\n wq_update_node_max_active+0x50/0x1fc\n apply_wqattrs_commit+0xf0/0x114\n apply_workqueue_attrs_locked+0x58/0xa0\n alloc_workqueue+0x5ac/0x774\n workqueue_init_early+0x460/0x540\n start_kernel+0x258/0x684\n __primary_switched+0xb8/0xc0\n Code: 9100a273 35000d01 53067f00 d0016dc1 (f8607a60)\n ---[ end trace 0000000000000000 ]---\n Kernel panic - not syncing: Attempted to kill the idle task!\n ---[ end Kernel panic - not syncing: Attempted to kill the idle task! ]---\n\nFix it."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cola de trabajo: no llame a cpumask_test_cpu() con -1 CPU en wq_update_node_max_active() Para wq_update_node_max_active(), @off_cpu de -1 indica que no hay ninguna CPU fallando. La funci\u00f3n llamaba incorrectamente a cpumask_test_cpu() con -1 CPU, lo que provocaba errores como los siguientes en algunos arcos: No se puede manejar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual ffff0002100296e0 .. pc: wq_update_node_max_active+0x50/0x1fc lr: wq_update_node_max_active+0x1f0/0x1fc .. Seguimiento de llamadas: wq_update_node_max_active+0x50/0x1fc apply_wqattrs_commit+0xf0/0x114 apply_workqueue_attrs_locked+0x58/0xa0 alloc_workqueue+0x5ac/0x774 workqueue_init_early+0x460/0x540 start_kernel+0x258/0x68. 4 __primary_switched+0xb8/0xc0 C\u00f3digo: 9100a273 35000d01 53067f00 d0016dc1 (f8607a60) -- -[ end trace 0000000000000000 ]--- P\u00e1nico del kernel - no se sincroniza: \u00a1Se intent\u00f3 finalizar la tarea inactiva! ---[ fin del p\u00e1nico del kernel: no se sincroniza: \u00a1se intent\u00f3 finalizar la tarea inactiva! ]--- Arreglalo."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/15930da42f8981dc42c19038042947b475b19f47",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/38c19c44cc05ec1e84d2e31a9a289b83b6c7ec85",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7df62b8cca38aa452b508b477b16544cba615084",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9fc557d489f8163c1aabcb89114b8eba960f4097",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a75ac2693d734d20724f0e10e039ca85f1fcfc4e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/adc646d2126988a64234502f579e4bc2b080d7cf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/15930da42f8981dc42c19038042947b475b19f47",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/38c19c44cc05ec1e84d2e31a9a289b83b6c7ec85",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/7df62b8cca38aa452b508b477b16544cba615084",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/9fc557d489f8163c1aabcb89114b8eba960f4097",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/a75ac2693d734d20724f0e10e039ca85f1fcfc4e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/adc646d2126988a64234502f579e4bc2b080d7cf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8261",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2025-03-03T15:15:15.820",
"lastModified": "2025-03-07T19:37:23.273",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-10T08:15:11.360",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,27 +19,27 @@
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
@ -62,7 +62,7 @@
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8262",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2025-03-03T15:15:15.990",
"lastModified": "2025-03-07T19:37:23.273",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-10T08:15:11.687",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,27 +19,27 @@
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"exploitabilityScore": 2.5,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
@ -62,7 +62,7 @@
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-2030",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-06T15:15:18.127",
"lastModified": "2025-03-06T16:15:55.593",
"lastModified": "2025-03-10T07:15:36.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -22,13 +22,13 @@
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
@ -63,22 +63,22 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
@ -88,17 +88,17 @@
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-2150",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-03-10T08:15:11.917",
"lastModified": "2025-03-10T08:15:11.917",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The C&Cm@il from HGiga has a Stored Cross-Site Scripting (XSS) vulnerability, allowing remote attackers with regular privileges to send emails containing malicious JavaScript code, which will be executed in the recipient's browser when they view the email."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-10005-05e0f-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-10004-99474-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-10T07:00:24.609539+00:00
2025-03-10T09:00:24.108152+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-10T06:15:20.797000+00:00
2025-03-10T08:15:11.917000+00:00
```
### Last Data Feed Release
@ -33,21 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
284588
284589
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `1`
- [CVE-2024-11638](CVE-2024/CVE-2024-116xx/CVE-2024-11638.json) (`2025-03-10T06:15:20.797`)
- [CVE-2025-1926](CVE-2025/CVE-2025-19xx/CVE-2025-1926.json) (`2025-03-10T05:15:35.347`)
- [CVE-2025-2150](CVE-2025/CVE-2025-21xx/CVE-2025-2150.json) (`2025-03-10T08:15:11.917`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `4`
- [CVE-2024-27055](CVE-2024/CVE-2024-270xx/CVE-2024-27055.json) (`2025-03-10T08:15:10.287`)
- [CVE-2024-8261](CVE-2024/CVE-2024-82xx/CVE-2024-8261.json) (`2025-03-10T08:15:11.360`)
- [CVE-2024-8262](CVE-2024/CVE-2024-82xx/CVE-2024-8262.json) (`2025-03-10T08:15:11.687`)
- [CVE-2025-2030](CVE-2025/CVE-2025-20xx/CVE-2025-2030.json) (`2025-03-10T07:15:36.400`)
## Download and Usage

View File

@ -245757,7 +245757,7 @@ CVE-2024-11634,0,0,14627ed8cbf95632caf8b74a22783ca02eb0bf7651aea5ed85be227c49580
CVE-2024-11635,0,0,ffacee27dce2a3419b3aa106b350e83d5585d5dcfe645774b0023dac2c389ee8,2025-01-08T08:15:24.117000
CVE-2024-11636,0,0,477a215831f10296b9ea3788441fcca038078cee1d80a9e966a40e92f5b59df4,2025-01-13T15:15:07.560000
CVE-2024-11637,0,0,5348ca65261140ae16ec15332c773ee06343664939e89530c0d5541b934692f4,2025-01-14T02:15:07.907000
CVE-2024-11638,1,1,552649984b67f5b1ef18257a0d06eb421eca6da700aa98bde360d18a4c898d04,2025-03-10T06:15:20.797000
CVE-2024-11638,0,0,552649984b67f5b1ef18257a0d06eb421eca6da700aa98bde360d18a4c898d04,2025-03-10T06:15:20.797000
CVE-2024-11639,0,0,b0b1970767477e87b7cf619e96fa5cb2fbca7d53895c7bdaf49d93303071061e,2025-01-17T19:40:09.763000
CVE-2024-1164,0,0,d6b3223f31512976ce37113225736cbf014a2aac3d8c295ef68c5d3e3fda5f16,2025-01-16T15:08:00.773000
CVE-2024-11640,0,0,703b195ff151c253fbe91a68928542f3fce11ad9103611204a13abf98a6770f0,2025-03-08T12:15:34.510000
@ -254001,7 +254001,7 @@ CVE-2024-27051,0,0,29c4b363431a5a9f51f00fd8a89b743131cb7ef3c9e253b048cd323779287
CVE-2024-27052,0,0,b014ef3d70e7d52f212b070ccf280ec8602a40234d19cdb7cfeefe9fb54997dc,2024-11-21T09:03:45.253000
CVE-2024-27053,0,0,fab5ac77fb553181428dd3f4ccb1dfcc138fd34b12976177a1399f1f5f83e7be,2024-11-21T09:03:45.457000
CVE-2024-27054,0,0,56c6f67afa434cc0076215a854fd0036a15b86608accbe0d9b824b22834c21d6,2024-11-21T09:03:45.667000
CVE-2024-27055,0,0,567532cde91599899067f455d5c7b87fb6bd7d422556d36a861d5078f328e1a4,2024-11-21T09:03:45.863000
CVE-2024-27055,0,1,7b39e69c60cdf41f6248e9f85b771f9c297d2438c8a24fe3eda1cac546961d77,2025-03-10T08:15:10.287000
CVE-2024-27056,0,0,0c46f13676f36e598862e1367000c5f83b6f006bf4cfa76fa723d92a467f92b1,2024-11-21T09:03:45.980000
CVE-2024-27057,0,0,59020acf3ab82c0eef52cab6667be5665e673c02ff7c385265b72e8eb5c4ebf2,2024-11-21T09:03:46.097000
CVE-2024-27058,0,0,e8e18c8efb56c2ad87995b6dc7ebbe8c01bb5c8a51c8ae719afbfa612893fc4d,2024-11-21T09:03:46.217000
@ -278675,8 +278675,8 @@ CVE-2024-8256,0,0,1611701250ae3ec61529b0da09cb8680607654a2f70f8e904e5974c82b4cf9
CVE-2024-8258,0,0,f110e480f74f3d8ee9f2f16ea989eb0ea229b8f21015ec0d3b5c01c8038eabd1,2024-09-27T18:56:41.140000
CVE-2024-8259,0,0,7bf4352426e14b796c98c3dff8a9f93d11f407925658b449d6ea8fe3ebd0f96f,2024-12-13T08:15:05.017000
CVE-2024-8260,0,0,1a5d0d9640e33b2f7c9f22aba5e11715bf32bcc340f2c05d167a5a396b68ca4a,2024-09-19T16:08:58.863000
CVE-2024-8261,0,0,c897a07730782795d57c9afcc6840c1c91721fea5fad18731002040448e27255,2025-03-07T19:37:23.273000
CVE-2024-8262,0,0,a8f7b4aa15785640ae8bb74224a13bebe2b89827e2dfcff6e5586d4dfda3209e,2025-03-07T19:37:23.273000
CVE-2024-8261,0,1,ad6bc6f26ee1968485316eb29d9ee4b80c5c331842bd14a1e05d1ff8c5c245f7,2025-03-10T08:15:11.360000
CVE-2024-8262,0,1,313809a66dfb9216a969c110441841344f9ee0d03969012d74a162d67ca33a0a,2025-03-10T08:15:11.687000
CVE-2024-8263,0,0,c30b2614165b38dd1e79b54ad73ee801cd690dec6dfd531970fbb0c695a6b519,2024-09-30T15:57:26.213000
CVE-2024-8264,0,0,2d0f7550734ab3870107734db176c89529f357d12409e5b5d0288029aba420c5,2024-10-17T14:06:39.420000
CVE-2024-8266,0,0,7f51b02f290727aff51f7eadea155b5c0e5946c8babbbc1d8d023ac984ce4386,2025-02-13T01:15:25.137000
@ -281254,7 +281254,7 @@ CVE-2025-1921,0,0,52bb07cc9f6cf05de10de265c3df2b2725a17528bd0219c2e259fa5ff16cca
CVE-2025-1922,0,0,de1e1ca67fdc901d18061c6676a386188acf9c3e5652956afbc8bfc4df588be3,2025-03-05T15:15:16.700000
CVE-2025-1923,0,0,fb6bb796e915c4eb19c73c083cba3d2b11c3c2b6d1b2cce8fa809b77f776c071,2025-03-05T15:15:16.857000
CVE-2025-1925,0,0,89ec5e399eff8562ba7e03e6894b43f8413799ce819ad10dde1cb15895d5ace1,2025-03-04T14:15:36.717000
CVE-2025-1926,1,1,3fd383620155bc700a1d424e89a4dd95e4a6ba03a5a74627a122d5ca83dd4aff,2025-03-10T05:15:35.347000
CVE-2025-1926,0,0,3fd383620155bc700a1d424e89a4dd95e4a6ba03a5a74627a122d5ca83dd4aff,2025-03-10T05:15:35.347000
CVE-2025-1930,0,0,e0eeca60a40599b41d4e2503f5a7e0f6e6ab961d2b56420baaf24ed1ff9b0d96,2025-03-05T17:15:13.583000
CVE-2025-1931,0,0,f3d2bb31d03f02113b6a4ed220650cd525ede36c0527a7d65dba0bfc00331a6b,2025-03-05T00:15:36.227000
CVE-2025-1932,0,0,7d5e9706440df74109c0e84082a12ded8a21dcc94be932d0427a55e38803d4ce,2025-03-05T00:15:36.320000
@ -281355,7 +281355,7 @@ CVE-2025-20208,0,0,1dba31708947f0b7dca30112bb6add1340ccdac1898cf64bb899cff2c905f
CVE-2025-20211,0,0,f40e52cb9e720a750ff40a6d984cd863919cf3388eccfdd326c3ba9106482e42,2025-02-19T16:15:41.163000
CVE-2025-2024,0,0,75cfaab8b65dff5d975a0b56e229eaec536c96c4441c3d1fb60716f5d1f62b9c,2025-03-07T20:15:39.023000
CVE-2025-2029,0,0,9912e19fe47f7d188961387a6c0b865a7aecf5ff404ea1967730181d7c80ca4f,2025-03-06T15:15:17.943000
CVE-2025-2030,0,0,9d3ca014c2cbdd0f3fee5987738ba77f6ec67b576eca6b9c42c160b2be0231a4,2025-03-06T16:15:55.593000
CVE-2025-2030,0,1,0db11fa08b70dd10247ef179309e085beb9571fa920d72b01ff3edc5b3f7ce4f,2025-03-10T07:15:36.400000
CVE-2025-2031,0,0,dce624b010eeacc43b1e4cf156805ac2bc0f212d05221d32ac1dc4cbb4ae0e23,2025-03-06T17:15:24.153000
CVE-2025-2032,0,0,5ed73860b2dfdd2b63a0278ec4bf58bd501d5a253672f34c06d7e31cb25d6a0b,2025-03-06T17:15:24.297000
CVE-2025-2033,0,0,f8953d527a8dd7fa2ec425e0e1a8988a67e5617e7fb84176b06f18b159bf60ed,2025-03-06T17:15:24.490000
@ -281789,6 +281789,7 @@ CVE-2025-21495,0,0,fe11be338e1c05fec9619cc491b1fbe01f7127eb46f2c1cd0e8e0b8eeb095
CVE-2025-21497,0,0,d72398150450df53d5b7a47f71be2a91de3fc300c37f2167b3e74a3222c92d53,2025-01-23T17:15:23.070000
CVE-2025-21498,0,0,79239fea0fbf0d172db5dafbc92924ab759f3676cf4dbe1cb372fd23b3ba88fd,2025-01-31T21:15:12.840000
CVE-2025-21499,0,0,2c32e354ed5a6e4eea492ba23bb7728e07a08fad97151da4f29131ca6df8e113,2025-01-23T17:15:23.230000
CVE-2025-2150,1,1,730f3d271820dcdc68dc69533ef19345a277b0d7a482a48e590f383a80309ea5,2025-03-10T08:15:11.917000
CVE-2025-21500,0,0,bbe9f114cc8d8e49962ad9854df4e89c5a30ee8cfa74d29f4db3b527d20b85d8,2025-01-23T17:15:23.520000
CVE-2025-21501,0,0,b499d527899d3c99b0af0dd327ab08d36e2a133ebd4d99fcf7220ac8dcf2048e,2025-01-23T17:15:23.680000
CVE-2025-21502,0,0,389d0578b0efac827f054d0c6c38b5e80f2fec0e9cc037bd997594f58cd454d8,2025-02-07T11:15:10.717000

Can't render this file because it is too large.