From 9b60c96b0be152c8cc9614689a8ff299dcd04d24 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 14 Feb 2025 00:58:53 +0000 Subject: [PATCH] Auto-Update: 2025-02-14T00:55:25.359569+00:00 --- CVE-2023/CVE-2023-344xx/CVE-2023-34401.json | 21 ++++ CVE-2023/CVE-2023-344xx/CVE-2023-34402.json | 21 ++++ CVE-2023/CVE-2023-344xx/CVE-2023-34403.json | 21 ++++ CVE-2023/CVE-2023-344xx/CVE-2023-34404.json | 21 ++++ CVE-2023/CVE-2023-344xx/CVE-2023-34406.json | 21 ++++ CVE-2024/CVE-2024-120xx/CVE-2024-12054.json | 104 +++++++++++++++++++ CVE-2024/CVE-2024-376xx/CVE-2024-37600.json | 44 ++++++++ CVE-2024/CVE-2024-376xx/CVE-2024-37601.json | 21 ++++ CVE-2024/CVE-2024-376xx/CVE-2024-37602.json | 44 ++++++++ CVE-2024/CVE-2024-376xx/CVE-2024-37603.json | 21 ++++ CVE-2024/CVE-2024-533xx/CVE-2024-53309.json | 21 ++++ CVE-2024/CVE-2024-533xx/CVE-2024-53310.json | 21 ++++ CVE-2024/CVE-2024-533xx/CVE-2024-53311.json | 21 ++++ CVE-2024/CVE-2024-549xx/CVE-2024-54951.json | 21 ++++ CVE-2024/CVE-2024-569xx/CVE-2024-56908.json | 21 ++++ CVE-2024/CVE-2024-577xx/CVE-2024-57782.json | 21 ++++ CVE-2025/CVE-2025-229xx/CVE-2025-22960.json | 21 ++++ CVE-2025/CVE-2025-229xx/CVE-2025-22961.json | 21 ++++ CVE-2025/CVE-2025-229xx/CVE-2025-22962.json | 21 ++++ CVE-2025/CVE-2025-265xx/CVE-2025-26511.json | 6 +- README.md | 72 +++++-------- _state.csv | 107 ++++++++++++-------- 22 files changed, 619 insertions(+), 94 deletions(-) create mode 100644 CVE-2023/CVE-2023-344xx/CVE-2023-34401.json create mode 100644 CVE-2023/CVE-2023-344xx/CVE-2023-34402.json create mode 100644 CVE-2023/CVE-2023-344xx/CVE-2023-34403.json create mode 100644 CVE-2023/CVE-2023-344xx/CVE-2023-34404.json create mode 100644 CVE-2023/CVE-2023-344xx/CVE-2023-34406.json create mode 100644 CVE-2024/CVE-2024-120xx/CVE-2024-12054.json create mode 100644 CVE-2024/CVE-2024-376xx/CVE-2024-37600.json create mode 100644 CVE-2024/CVE-2024-376xx/CVE-2024-37601.json create mode 100644 CVE-2024/CVE-2024-376xx/CVE-2024-37602.json create mode 100644 CVE-2024/CVE-2024-376xx/CVE-2024-37603.json create mode 100644 CVE-2024/CVE-2024-533xx/CVE-2024-53309.json create mode 100644 CVE-2024/CVE-2024-533xx/CVE-2024-53310.json create mode 100644 CVE-2024/CVE-2024-533xx/CVE-2024-53311.json create mode 100644 CVE-2024/CVE-2024-549xx/CVE-2024-54951.json create mode 100644 CVE-2024/CVE-2024-569xx/CVE-2024-56908.json create mode 100644 CVE-2024/CVE-2024-577xx/CVE-2024-57782.json create mode 100644 CVE-2025/CVE-2025-229xx/CVE-2025-22960.json create mode 100644 CVE-2025/CVE-2025-229xx/CVE-2025-22961.json create mode 100644 CVE-2025/CVE-2025-229xx/CVE-2025-22962.json diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34401.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34401.json new file mode 100644 index 00000000000..4f95b600026 --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34401.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2023-34401", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:08.867", + "lastModified": "2025-02-13T23:15:08.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Inside profile folder there is a file, which is encoded with proprietary UD2 codec. Due to missed size checks in the enapsulate file, attacker can achieve Out-of-Bound Read in heap memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34402.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34402.json new file mode 100644 index 00000000000..ca41cf9d413 --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34402.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2023-34402", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:09.337", + "lastModified": "2025-02-13T23:15:09.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Inside file is encapsulate another file, which service will drop during processing. Due to missed checks, attacker can achieve Arbitrary File Write with service speech rights." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34403.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34403.json new file mode 100644 index 00000000000..ce0d7270fca --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34403.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2023-34403", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:09.440", + "lastModified": "2025-02-13T23:15:09.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mercedes-Benz head-unit NTG6 has Ethernet pins on Base Board to connect module CSB. Attacker can connect to this pins and get access to internal network. A race condition can be acquired and attacker can spoof \u201cUserData\u201d with desirable file path and access it though backup on USB." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34404.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34404.json new file mode 100644 index 00000000000..93907861b54 --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34404.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2023-34404", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:09.553", + "lastModified": "2025-02-13T23:15:09.553", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mercedes-Benz head-unit NTG6 has Ethernet pins on Base Board to connect module CSB. Attacker can connect to these pins and get access to internal network. As a result, by accessing a specific port an attacker can send call request to all registered services in router and achieve command injection vulnerability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34406.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34406.json new file mode 100644 index 00000000000..963ff64bddd --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34406.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2023-34406", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:09.633", + "lastModified": "2025-02-13T23:15:09.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on Mercedes Benz NTG 6. A possible integer overflow exists in the user data import/export function of NTG (New Telematics Generation) 6 head units. To perform this attack, local access to USB interface of the car is needed. With prepared data, an attacker can cause the User-Data service to fail. The failed service instance will restart automatically." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12054.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12054.json new file mode 100644 index 00000000000..d46f10228c1 --- /dev/null +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12054.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2024-12054", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-02-13T23:15:09.823", + "lastModified": "2025-02-13T23:15:09.823", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ZF Roll Stability Support Plus (RSSPlus) \nis vulnerable to an authentication bypass vulnerability targeting \ndeterministic RSSPlus SecurityAccess service seeds, which may allow an \nattacker to remotely (proximal/adjacent with RF equipment or via pivot \nfrom J2497 telematics devices) call diagnostic functions intended for \nworkshop or repair scenarios. This can impact system availability, \npotentially degrading performance or erasing software, however the \nvehicle remains in a safe vehicle state." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-305" + } + ] + } + ], + "references": [ + { + "url": "https://nmfta.org/wp-content/media/2022/11/Actionable_Mitigations_Options_v9_DIST.pdf", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-021-03", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37600.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37600.json new file mode 100644 index 00000000000..e620276988b --- /dev/null +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37600.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-37600", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:10.000", + "lastModified": "2025-02-13T23:15:10.000", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6 through 2021. A possible stack buffer overflow in the Service Broker service affects NTG 6 head units. To perform this attack, physical access to Ethernet pins of the head unit base board is needed. With a static IP address, an attacker can connect via the internal network to the Service Broker service. With prepared HTTP requests, an attacker can cause the Service-Broker service to fail." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37601.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37601.json new file mode 100644 index 00000000000..9b620d7a176 --- /dev/null +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37601.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-37601", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:10.113", + "lastModified": "2025-02-13T23:15:10.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6. A possible heap buffer overflow exists in the user data import/export function of NTG 6 head units. To perform this attack, local access to the USB interface of the car is needed. With prepared data, an attacker can cause the User-Data service to fail. The failed service instance will restart automatically." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37602.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37602.json new file mode 100644 index 00000000000..7c224fc4f48 --- /dev/null +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37602.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-37602", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:10.197", + "lastModified": "2025-02-13T23:15:10.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6 through 2021. A possible NULL pointer dereference in the Apple Car Play function affects NTG 6 head units. To perform this attack, physical access to Ethernet pins of the head unit base board is needed. With a static IP address, an attacker can connect via the internal network to the AirTunes / AirPlay service. With prepared HTTP requests, an attacker can cause the Car Play service to fail." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37603.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37603.json new file mode 100644 index 00000000000..55bcb374354 --- /dev/null +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37603.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-37603", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:10.313", + "lastModified": "2025-02-13T23:15:10.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6. A possible type confusion exists in the user data import/export function of NTG 6 head units. To perform this attack, local access to the USB interface of the car is needed. With prepared data, an attacker can cause the User-Data service to fail. The failed service instance will restart automatically." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53309.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53309.json new file mode 100644 index 00000000000..996cb631579 --- /dev/null +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53309.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-53309", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:10.400", + "lastModified": "2025-02-13T23:15:10.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stack-based buffer overflow vulnerability exists in Effectmatrix Total Video Converter Command Line (TVCC) 2.50 when an overly long string is passed to the \"-f\" parameter. This can lead to memory corruption, potentially allowing arbitrary code execution or causing a denial of service via specially crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ufist/vulnerability-research/blob/main/CVE-2024-53309/CVE-2024-53309.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53310.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53310.json new file mode 100644 index 00000000000..27a44da4b43 --- /dev/null +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53310.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-53310", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:10.493", + "lastModified": "2025-02-13T23:15:10.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Structured Exception Handler based buffer overflow vulnerability exists in Effectmatrix Total Video Converter Command Line (TVCC) 2.50 when a specially crafted file is passed to the -ff parameter. The vulnerability occurs due to improper handling of file input with overly long characters, leading to memory corruption. This can result in arbitrary code execution or denial of service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ufist/vulnerability-research/blob/main/CVE-2024-53310/CVE-2024-53310.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53311.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53311.json new file mode 100644 index 00000000000..7879c8a1b30 --- /dev/null +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53311.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-53311", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:10.587", + "lastModified": "2025-02-13T23:15:10.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Stack buffer overflow in the arguments parameter in Immunity Inc. Immunity Debugger v1.85 allows attackers to execute arbitrary code via a crafted input that exceeds the buffer size." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ufist/vulnerability-research/blob/main/CVE-2024-53311/CVE-2024-53311.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54951.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54951.json new file mode 100644 index 00000000000..507984f2cc9 --- /dev/null +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54951.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54951", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:10.677", + "lastModified": "2025-02-13T23:15:10.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Monica 4.1.2 is vulnerable to Cross Site Scripting (XSS). A malicious user can create a malformed contact and use that contact in the \"HOW YOU MET\" customization options to trigger the XSS." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Allevon412/Monica-Stored-XSS-Vulnerability", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56908.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56908.json new file mode 100644 index 00000000000..d89394860b1 --- /dev/null +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56908.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56908", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:10.773", + "lastModified": "2025-02-13T23:15:10.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Perfex Crm < 3.2.1, an authenticated attacker can send a crafted HTTP POST request to the affected upload_sales_file endpoint. By providing malicious input in the rel_id parameter, combined with improper input validation, the attacker can bypass restrictions and upload arbitrary files to directories of their choice, potentially leading to remote code execution or server compromise." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/JuyLang/7406077e3e5e6b2ff35c80f1853e298f", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57782.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57782.json new file mode 100644 index 00000000000..78ad29ac54e --- /dev/null +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57782.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57782", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:10.863", + "lastModified": "2025-02-13T23:15:10.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Docker-proxy v18.09.0 allows attackers to cause a denial of service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/tzzhang123456/test123/issues/2", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22960.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22960.json new file mode 100644 index 00000000000..f6b2526613a --- /dev/null +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22960.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-22960", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:10.960", + "lastModified": "2025-02-13T23:15:10.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A session hijacking vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters. Unauthenticated attackers can access exposed log files (/logs/debug/xteLog*), potentially revealing sensitive session-related information such as session IDs (sess_id) and authentication success tokens (user_check_password OK). Exploiting this flaw could allow attackers to hijack active sessions, gain unauthorized access, and escalate privileges on affected devices." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-22960", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22961.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22961.json new file mode 100644 index 00000000000..18627cb9705 --- /dev/null +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22961.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-22961", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:11.047", + "lastModified": "2025-02-13T23:15:11.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A critical information disclosure vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters due to Incorrect Access Control (CWE-284). Unauthenticated attackers can directly access sensitive database backup files (snapshot_users.db) via publicly exposed URLs (/logs/devcfg/snapshot/ and /logs/devcfg/user/). Exploiting this vulnerability allows retrieval of sensitive user data, including login credentials, potentially leading to full system compromise." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-22961", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22962.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22962.json new file mode 100644 index 00000000000..e5a79db8c64 --- /dev/null +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22962.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-22962", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T23:15:11.140", + "lastModified": "2025-02-13T23:15:11.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A critical remote code execution (RCE) vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters when debugging mode is enabled. An attacker with a valid session ID (sess_id) can send specially crafted POST requests to the /json endpoint, enabling arbitrary command execution on the underlying system. This vulnerability can lead to full system compromise, including unauthorized access, privilege escalation, and potentially full device takeover." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-22962", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26511.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26511.json index e66fd370b26..1a739d5de8e 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26511.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26511.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26511", "sourceIdentifier": "security-alert@netapp.com", "published": "2025-02-13T16:16:50.270", - "lastModified": "2025-02-13T16:16:50.270", - "vulnStatus": "Received", + "lastModified": "2025-02-14T00:15:07.667", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -42,7 +42,7 @@ "description": [ { "lang": "en", - "value": "CWE-288" + "value": "CWE-863" } ] } diff --git a/README.md b/README.md index 4d23c83705e..92da4ff0825 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-13T23:00:21.869606+00:00 +2025-02-14T00:55:25.359569+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-13T22:15:13.417000+00:00 +2025-02-14T00:15:07.667000+00:00 ``` ### Last Data Feed Release @@ -33,61 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281295 +281314 ``` ### CVEs added in the last Commit -Recently added CVEs: `17` +Recently added CVEs: `19` -- [CVE-2023-34397](CVE-2023/CVE-2023-343xx/CVE-2023-34397.json) (`2025-02-13T22:15:10.470`) -- [CVE-2023-34398](CVE-2023/CVE-2023-343xx/CVE-2023-34398.json) (`2025-02-13T22:15:10.603`) -- [CVE-2023-34399](CVE-2023/CVE-2023-343xx/CVE-2023-34399.json) (`2025-02-13T22:15:10.730`) -- [CVE-2023-34400](CVE-2023/CVE-2023-344xx/CVE-2023-34400.json) (`2025-02-13T22:15:10.847`) -- [CVE-2024-57378](CVE-2024/CVE-2024-573xx/CVE-2024-57378.json) (`2025-02-13T22:15:11.167`) -- [CVE-2025-1283](CVE-2025/CVE-2025-12xx/CVE-2025-1283.json) (`2025-02-13T22:15:11.413`) -- [CVE-2025-20615](CVE-2025/CVE-2025-206xx/CVE-2025-20615.json) (`2025-02-13T22:15:11.590`) -- [CVE-2025-22896](CVE-2025/CVE-2025-228xx/CVE-2025-22896.json) (`2025-02-13T22:15:11.737`) -- [CVE-2025-23411](CVE-2025/CVE-2025-234xx/CVE-2025-23411.json) (`2025-02-13T22:15:11.913`) -- [CVE-2025-23421](CVE-2025/CVE-2025-234xx/CVE-2025-23421.json) (`2025-02-13T22:15:12.073`) -- [CVE-2025-24836](CVE-2025/CVE-2025-248xx/CVE-2025-24836.json) (`2025-02-13T22:15:12.270`) -- [CVE-2025-24861](CVE-2025/CVE-2025-248xx/CVE-2025-24861.json) (`2025-02-13T22:15:12.457`) -- [CVE-2025-24865](CVE-2025/CVE-2025-248xx/CVE-2025-24865.json) (`2025-02-13T22:15:12.613`) -- [CVE-2025-25067](CVE-2025/CVE-2025-250xx/CVE-2025-25067.json) (`2025-02-13T22:15:12.780`) -- [CVE-2025-25195](CVE-2025/CVE-2025-251xx/CVE-2025-25195.json) (`2025-02-13T22:15:13.100`) -- [CVE-2025-25281](CVE-2025/CVE-2025-252xx/CVE-2025-25281.json) (`2025-02-13T22:15:13.263`) -- [CVE-2025-26473](CVE-2025/CVE-2025-264xx/CVE-2025-26473.json) (`2025-02-13T22:15:13.417`) +- [CVE-2023-34401](CVE-2023/CVE-2023-344xx/CVE-2023-34401.json) (`2025-02-13T23:15:08.867`) +- [CVE-2023-34402](CVE-2023/CVE-2023-344xx/CVE-2023-34402.json) (`2025-02-13T23:15:09.337`) +- [CVE-2023-34403](CVE-2023/CVE-2023-344xx/CVE-2023-34403.json) (`2025-02-13T23:15:09.440`) +- [CVE-2023-34404](CVE-2023/CVE-2023-344xx/CVE-2023-34404.json) (`2025-02-13T23:15:09.553`) +- [CVE-2023-34406](CVE-2023/CVE-2023-344xx/CVE-2023-34406.json) (`2025-02-13T23:15:09.633`) +- [CVE-2024-12054](CVE-2024/CVE-2024-120xx/CVE-2024-12054.json) (`2025-02-13T23:15:09.823`) +- [CVE-2024-37600](CVE-2024/CVE-2024-376xx/CVE-2024-37600.json) (`2025-02-13T23:15:10.000`) +- [CVE-2024-37601](CVE-2024/CVE-2024-376xx/CVE-2024-37601.json) (`2025-02-13T23:15:10.113`) +- [CVE-2024-37602](CVE-2024/CVE-2024-376xx/CVE-2024-37602.json) (`2025-02-13T23:15:10.197`) +- [CVE-2024-37603](CVE-2024/CVE-2024-376xx/CVE-2024-37603.json) (`2025-02-13T23:15:10.313`) +- [CVE-2024-53309](CVE-2024/CVE-2024-533xx/CVE-2024-53309.json) (`2025-02-13T23:15:10.400`) +- [CVE-2024-53310](CVE-2024/CVE-2024-533xx/CVE-2024-53310.json) (`2025-02-13T23:15:10.493`) +- [CVE-2024-53311](CVE-2024/CVE-2024-533xx/CVE-2024-53311.json) (`2025-02-13T23:15:10.587`) +- [CVE-2024-54951](CVE-2024/CVE-2024-549xx/CVE-2024-54951.json) (`2025-02-13T23:15:10.677`) +- [CVE-2024-56908](CVE-2024/CVE-2024-569xx/CVE-2024-56908.json) (`2025-02-13T23:15:10.773`) +- [CVE-2024-57782](CVE-2024/CVE-2024-577xx/CVE-2024-57782.json) (`2025-02-13T23:15:10.863`) +- [CVE-2025-22960](CVE-2025/CVE-2025-229xx/CVE-2025-22960.json) (`2025-02-13T23:15:10.960`) +- [CVE-2025-22961](CVE-2025/CVE-2025-229xx/CVE-2025-22961.json) (`2025-02-13T23:15:11.047`) +- [CVE-2025-22962](CVE-2025/CVE-2025-229xx/CVE-2025-22962.json) (`2025-02-13T23:15:11.140`) ### CVEs modified in the last Commit -Recently modified CVEs: `26` +Recently modified CVEs: `1` -- [CVE-2022-48226](CVE-2022/CVE-2022-482xx/CVE-2022-48226.json) (`2025-02-13T22:15:08.423`) -- [CVE-2022-48227](CVE-2022/CVE-2022-482xx/CVE-2022-48227.json) (`2025-02-13T22:15:08.713`) -- [CVE-2023-0967](CVE-2023/CVE-2023-09xx/CVE-2023-0967.json) (`2025-02-13T21:15:11.897`) -- [CVE-2023-20675](CVE-2023/CVE-2023-206xx/CVE-2023-20675.json) (`2025-02-13T21:15:12.143`) -- [CVE-2023-22985](CVE-2023/CVE-2023-229xx/CVE-2023-22985.json) (`2025-02-13T21:15:12.317`) -- [CVE-2023-24747](CVE-2023/CVE-2023-247xx/CVE-2023-24747.json) (`2025-02-13T21:15:12.490`) -- [CVE-2023-27760](CVE-2023/CVE-2023-277xx/CVE-2023-27760.json) (`2025-02-13T22:15:09.083`) -- [CVE-2023-27761](CVE-2023/CVE-2023-277xx/CVE-2023-27761.json) (`2025-02-13T22:15:09.283`) -- [CVE-2023-27762](CVE-2023/CVE-2023-277xx/CVE-2023-27762.json) (`2025-02-13T22:15:09.487`) -- [CVE-2023-27763](CVE-2023/CVE-2023-277xx/CVE-2023-27763.json) (`2025-02-13T22:15:09.683`) -- [CVE-2023-27764](CVE-2023/CVE-2023-277xx/CVE-2023-27764.json) (`2025-02-13T22:15:09.873`) -- [CVE-2023-27765](CVE-2023/CVE-2023-277xx/CVE-2023-27765.json) (`2025-02-13T22:15:10.063`) -- [CVE-2023-27766](CVE-2023/CVE-2023-277xx/CVE-2023-27766.json) (`2025-02-13T22:15:10.267`) -- [CVE-2023-27767](CVE-2023/CVE-2023-277xx/CVE-2023-27767.json) (`2025-02-13T21:15:12.653`) -- [CVE-2023-27768](CVE-2023/CVE-2023-277xx/CVE-2023-27768.json) (`2025-02-13T21:15:12.810`) -- [CVE-2023-27769](CVE-2023/CVE-2023-277xx/CVE-2023-27769.json) (`2025-02-13T21:15:12.970`) -- [CVE-2023-27771](CVE-2023/CVE-2023-277xx/CVE-2023-27771.json) (`2025-02-13T21:15:13.123`) -- [CVE-2023-29415](CVE-2023/CVE-2023-294xx/CVE-2023-29415.json) (`2025-02-13T21:15:13.287`) -- [CVE-2023-29416](CVE-2023/CVE-2023-294xx/CVE-2023-29416.json) (`2025-02-13T21:15:13.473`) -- [CVE-2024-34520](CVE-2024/CVE-2024-345xx/CVE-2024-34520.json) (`2025-02-13T21:15:14.113`) -- [CVE-2024-4212](CVE-2024/CVE-2024-42xx/CVE-2024-4212.json) (`2025-02-13T21:15:14.770`) -- [CVE-2024-46910](CVE-2024/CVE-2024-469xx/CVE-2024-46910.json) (`2025-02-13T21:15:14.590`) -- [CVE-2024-51376](CVE-2024/CVE-2024-513xx/CVE-2024-51376.json) (`2025-02-13T21:15:15.083`) -- [CVE-2025-1094](CVE-2025/CVE-2025-10xx/CVE-2025-1094.json) (`2025-02-13T22:15:11.300`) -- [CVE-2025-25069](CVE-2025/CVE-2025-250xx/CVE-2025-25069.json) (`2025-02-13T22:15:12.930`) +- [CVE-2025-26511](CVE-2025/CVE-2025-265xx/CVE-2025-26511.json) (`2025-02-14T00:15:07.667`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e7616f702e7..9bb79fbfc7c 100644 --- a/_state.csv +++ b/_state.csv @@ -200084,7 +200084,7 @@ CVE-2022-31885,0,0,f30f0097d4464ce53d40951dbf9edf2d7114ac031001699119f335f0d6349 CVE-2022-31886,0,0,816d2e94f4379147c60d46ace56eeaca0d5d7e7431f917d426ff8b02fa64c472,2024-11-21T07:05:26.257000 CVE-2022-31887,0,0,998d759ca13f6317ff35b9fe0dbcdb82c5e2f263dc9086419f869fa355c8a3b4,2024-11-21T07:05:26.417000 CVE-2022-31888,0,0,e997b7585f01e276820155625ce95b6c84ac6fcc647bb3a6c1d676e898914242,2025-02-13T17:15:40.707000 -CVE-2022-31889,0,1,7bf028581967fb23b1381c879bfaac81d56b492430ace6568cb76eb75f0254f2,2025-02-13T21:15:11.217000 +CVE-2022-31889,0,0,7bf028581967fb23b1381c879bfaac81d56b492430ace6568cb76eb75f0254f2,2025-02-13T21:15:11.217000 CVE-2022-3189,0,0,e7d548859100ddb6d04bca464c55d8caed0e8a2a134e1418315b1026e1fed597,2024-11-21T07:19:00.523000 CVE-2022-31890,0,0,0265474ae73516ba39374fd36e0aa764d833beba2c251bfd2fc87b8933b7b0d9,2025-02-13T20:15:28.320000 CVE-2022-31897,0,0,a461f02f9809dc1857ed2e240c74a8fa727acdb230c95747b738747c4fc9ff57,2024-11-21T07:05:27.433000 @@ -212327,8 +212327,8 @@ CVE-2022-48222,0,0,3cbf04f924f0a6ee5bf4ecd6da512b69b1636dddc89b2a892e8fd831d8f6c CVE-2022-48223,0,0,1a1b8d147489a3c3fa5c81528f9e431f114304a422558985b701d70f8184d20d,2024-11-21T07:32:59.567000 CVE-2022-48224,0,0,ee88c8665f12e05560c7526b3c91f6382c5a60e0b726f261a3d980bf7ada1b7a,2024-11-21T07:32:59.707000 CVE-2022-48225,0,0,a6ae54d41691aeae705047c9c3cf015025166454e1c3fadfea923075e53d65cc,2024-11-21T07:32:59.857000 -CVE-2022-48226,0,1,4d199d8daa7b07efe29a5c09e3794288c0e5ef2a855af019325c29755103bd6c,2025-02-13T22:15:08.423000 -CVE-2022-48227,0,1,1e9c74ac05bd7f6b98c5dc03521f82da8815cef7e8dfa953ef12568152bb5556,2025-02-13T22:15:08.713000 +CVE-2022-48226,0,0,4d199d8daa7b07efe29a5c09e3794288c0e5ef2a855af019325c29755103bd6c,2025-02-13T22:15:08.423000 +CVE-2022-48227,0,0,1e9c74ac05bd7f6b98c5dc03521f82da8815cef7e8dfa953ef12568152bb5556,2025-02-13T22:15:08.713000 CVE-2022-48228,0,0,1728bc5020e9d5ce083789f95266fe6819a7c18f8e1fdc2ca823020c212eae33,2024-11-21T07:33:00.293000 CVE-2022-4823,0,0,e7fc5fb9db54eb08d7bdb32316cd03ccc89eddab098ff51ef8ef039a2942405f,2024-11-21T07:36:00.993000 CVE-2022-48230,0,0,e6db329d7865ba3b22f42e4c81ac2be3c151cb8eaf5834575e98ae1fd4a66d36,2024-11-21T07:33:00.437000 @@ -214113,7 +214113,7 @@ CVE-2023-0963,0,0,e76c4515e101df845abd9e0cd22380cd7b19a33696d5d8f67abd8ddb667a7d CVE-2023-0964,0,0,963f3a566f3a79a2337c835b6816d91dd7ecc7ad85ac2ebc6a0afd29b88b7157,2024-11-21T07:38:11.770000 CVE-2023-0965,0,0,371ba41b12fc48fbaee5b4688da85d732d4c4614bbe866fa68b5520397d16fa9,2024-11-21T07:38:11.893000 CVE-2023-0966,0,0,4cd2a56099a504d2f466d308e07dd69e48f6365ba4b9ab454a42e7c16e2a7122,2024-11-21T07:38:12.017000 -CVE-2023-0967,0,1,bdaaafe2df1d1735780a8e28b7bd2a2e64b5aa6579340c3788cc39827c9973a9,2025-02-13T21:15:11.897000 +CVE-2023-0967,0,0,bdaaafe2df1d1735780a8e28b7bd2a2e64b5aa6579340c3788cc39827c9973a9,2025-02-13T21:15:11.897000 CVE-2023-0968,0,0,e5bc3ae62aa8c07f47da6f606b18597e36d54de8486b821a41d8e216785ebd88,2024-11-21T07:38:12.250000 CVE-2023-0969,0,0,80994f4d879f4b8f636042272616a496d53175adca3717df2d2456587d8e02a6,2024-11-21T07:38:12.370000 CVE-2023-0970,0,0,c8c2deca64dbd8ab3e898c77810961b2c968c39c5a0596426e77b4cf0c3c846a,2024-11-21T07:38:12.510000 @@ -215551,7 +215551,7 @@ CVE-2023-2067,0,0,0f14ce1d18441d6e968f52ac3b496b8b01e7386a752eeee24930cc49f9b318 CVE-2023-20670,0,0,3d1330a91e286a1fdca38c9b2f6dca7b756deffe5f4200d26ce3ba4caa636a46,2025-02-13T15:15:14.440000 CVE-2023-20673,0,0,29bae4906ec7c96c77c7c09aecc0e7fb7f495988834a892b933466c096361071,2025-01-24T17:15:09.203000 CVE-2023-20674,0,0,eb2146b7419e33779b6b00f43b6162659ce687b1b5ecf2b1d3b2ee2893270957,2024-11-21T07:41:19.830000 -CVE-2023-20675,0,1,7aa7d68c7cc56117546c0a113e3ab20340729652469bbbf530b5b910f1f76562,2025-02-13T21:15:12.143000 +CVE-2023-20675,0,0,7aa7d68c7cc56117546c0a113e3ab20340729652469bbbf530b5b910f1f76562,2025-02-13T21:15:12.143000 CVE-2023-20676,0,0,cac9e70e0811c0897af0048c023485fdde33f6815ec767fbb24f9b47cc3533c3,2025-02-12T16:15:35 CVE-2023-20677,0,0,16defb5b1d67b70811af504802d85fb22e6e7dc792efd018cc72d13dbf886b31,2024-11-21T07:41:20.183000 CVE-2023-20679,0,0,bc056dc1c31fbcb599ca8278730b2a5ae7f450cce065487c52635fab0636d2ba,2025-02-12T16:15:35.183000 @@ -217753,7 +217753,7 @@ CVE-2023-22974,0,0,85415b262be91cde3a112e04d995d9163e65d13b859bc6dfd72ba4fee38ce CVE-2023-22975,0,0,eb8873b34352e4a3cc09ef54ad0d7ccdd681ae65fd1d5bde5e48e17ea477cee6,2024-11-21T07:45:45.080000 CVE-2023-2298,0,0,989f644c1451c5a67e467bb23faffc2f4e6cbf5ba286ec24661d092839141574,2024-11-21T07:58:20.190000 CVE-2023-22984,0,0,5871116efec6ac4d9f92dbbbffd11ed2b4439b834a7278dcd05b96a53714146d,2024-11-21T07:45:45.220000 -CVE-2023-22985,0,1,3e31e1cbf1f1de5ce6cf3c2e1d6a0477b87802898892cf6b79b06c2051f07d7a,2025-02-13T21:15:12.317000 +CVE-2023-22985,0,0,3e31e1cbf1f1de5ce6cf3c2e1d6a0477b87802898892cf6b79b06c2051f07d7a,2025-02-13T21:15:12.317000 CVE-2023-2299,0,0,824be6896313aecbc62521262d1f5fc045b92285be3005bb7b42b30619bee831,2024-11-21T07:58:20.323000 CVE-2023-22995,0,0,93e6265683ddad7b70d16ea39dd84aa9bcf8f539c4ef1ce28d88da0e81fedf71,2024-11-21T07:45:45.550000 CVE-2023-22996,0,0,fe442cb87d4861b04715d9721093b1f2e793cffbe47ffe19ce9d81d6e93c6a1f,2024-11-21T07:45:45.700000 @@ -219091,7 +219091,7 @@ CVE-2023-24736,0,0,64d857016a76527a8740ee1e1c43d0addfc04b72038970083b97686e99dff CVE-2023-24737,0,0,94181775e6f22dc84465e3e4362e4fabf7657336f68abafe1b74be175ea98c57,2024-11-21T07:48:21.480000 CVE-2023-2474,0,0,b9e27b61e50695a5330292e86ca2876b43f16fb3da823598b3c65b2c35fd0b2d,2024-11-21T07:58:41.230000 CVE-2023-24744,0,0,b1b273342b8ba4691ae682d019a2596c7ccca937698635804e714294c7debe50,2025-01-29T22:15:28.470000 -CVE-2023-24747,0,1,03975b8c13701d122fdcca957ee0ada15d6e1234a6b814086a40cc26c630938a,2025-02-13T21:15:12.490000 +CVE-2023-24747,0,0,03975b8c13701d122fdcca957ee0ada15d6e1234a6b814086a40cc26c630938a,2025-02-13T21:15:12.490000 CVE-2023-2475,0,0,c188cdbbc9d9188f8fdc3657f235f48d23e99c97c2b4c85032b31b2a7997d083,2024-11-21T07:58:41.357000 CVE-2023-24751,0,0,131257e46990aa72ffdccb413b9cc6d489c2b7178ddf8c577d4b56b95fad7267,2024-11-21T07:48:21.897000 CVE-2023-24752,0,0,e326f18a2fa1fbea25f07bee3ac3e3ad424ac372a5503c19527265590f0101c2,2024-11-21T07:48:22.033000 @@ -221503,18 +221503,18 @@ CVE-2023-27755,0,0,030e4e29a08e32cec80a06cfd9ceed9e6a484ac94095525885308529b6a52 CVE-2023-27757,0,0,2b1c31a8bd90f1ac9fd058810f197194db7cc21789aa13aeb9c645b2425f2f86,2024-11-21T07:53:25.947000 CVE-2023-27759,0,0,a5a7499505e5eb10085796c47747c10374553b53ecdd40ee382826bcf99fd9ef,2024-11-21T07:53:26.090000 CVE-2023-2776,0,0,c43d162098572ad524d5e0e996e016c6aa5164a6c37cb6f3692cd2e35bfd14fd,2024-11-21T07:59:16.263000 -CVE-2023-27760,0,1,e030fbde06c94af855dcd532801f471acbc0186148872501268b8b74ad215be1,2025-02-13T22:15:09.083000 -CVE-2023-27761,0,1,270ebc6bed1d0454b51818bf8db299057a6af687838cbabc83082626fa67dde3,2025-02-13T22:15:09.283000 -CVE-2023-27762,0,1,e5391af1c5dfe871e262b4eac7242f76c9e6a9bf7b92b14e8fc17f80d12701af,2025-02-13T22:15:09.487000 -CVE-2023-27763,0,1,3fbd542cdd0631a8a202721c46a621b39ec64041828337fff0623747857c71a7,2025-02-13T22:15:09.683000 -CVE-2023-27764,0,1,b061169e40053f9687d73393c47ef28639aa9c10546e27f14541f7ff3d3f6300,2025-02-13T22:15:09.873000 -CVE-2023-27765,0,1,b8154da79dc5ec61c76e59430e20c35b2dff13291097e7712aaa93e2553dc6c8,2025-02-13T22:15:10.063000 -CVE-2023-27766,0,1,c9c5c9d3b383a4447789659812a27e96ea31a9efe6ff89fdad87908b7840e214,2025-02-13T22:15:10.267000 -CVE-2023-27767,0,1,d7a95f3931eb43e78609df84dafcce3436e2b8b9f22e3bc8afce85017a8b9dcf,2025-02-13T21:15:12.653000 -CVE-2023-27768,0,1,717b9b686a6c3cb792d9e39d1721db726125903bce617663ee4ae74641106ad5,2025-02-13T21:15:12.810000 -CVE-2023-27769,0,1,566effd7212c1522781e5ea4a5e269ae9d2ec72ca85dbd8d31cc26b8c49f66fb,2025-02-13T21:15:12.970000 +CVE-2023-27760,0,0,e030fbde06c94af855dcd532801f471acbc0186148872501268b8b74ad215be1,2025-02-13T22:15:09.083000 +CVE-2023-27761,0,0,270ebc6bed1d0454b51818bf8db299057a6af687838cbabc83082626fa67dde3,2025-02-13T22:15:09.283000 +CVE-2023-27762,0,0,e5391af1c5dfe871e262b4eac7242f76c9e6a9bf7b92b14e8fc17f80d12701af,2025-02-13T22:15:09.487000 +CVE-2023-27763,0,0,3fbd542cdd0631a8a202721c46a621b39ec64041828337fff0623747857c71a7,2025-02-13T22:15:09.683000 +CVE-2023-27764,0,0,b061169e40053f9687d73393c47ef28639aa9c10546e27f14541f7ff3d3f6300,2025-02-13T22:15:09.873000 +CVE-2023-27765,0,0,b8154da79dc5ec61c76e59430e20c35b2dff13291097e7712aaa93e2553dc6c8,2025-02-13T22:15:10.063000 +CVE-2023-27766,0,0,c9c5c9d3b383a4447789659812a27e96ea31a9efe6ff89fdad87908b7840e214,2025-02-13T22:15:10.267000 +CVE-2023-27767,0,0,d7a95f3931eb43e78609df84dafcce3436e2b8b9f22e3bc8afce85017a8b9dcf,2025-02-13T21:15:12.653000 +CVE-2023-27768,0,0,717b9b686a6c3cb792d9e39d1721db726125903bce617663ee4ae74641106ad5,2025-02-13T21:15:12.810000 +CVE-2023-27769,0,0,566effd7212c1522781e5ea4a5e269ae9d2ec72ca85dbd8d31cc26b8c49f66fb,2025-02-13T21:15:12.970000 CVE-2023-27770,0,0,0277aa9983dd53ba4ebc77e25b195be9647ff5b9cc853e2c7170da3d9f91a924,2025-02-13T16:15:41.010000 -CVE-2023-27771,0,1,b9309a0c2c576d50528d6f5b49f6ca45150489ee97047b75937f2c2c01995b62,2025-02-13T21:15:13.123000 +CVE-2023-27771,0,0,b9309a0c2c576d50528d6f5b49f6ca45150489ee97047b75937f2c2c01995b62,2025-02-13T21:15:13.123000 CVE-2023-27772,0,0,7ef297c555763637e256ba5f03a2a87e47c9050df35a7e9b311ac060d45c3773,2025-02-07T17:15:26.333000 CVE-2023-27775,0,0,c328c66aa6075952b628655650d586d004c5e1c99d054b10121df930574fbff7,2025-02-08T03:15:09.810000 CVE-2023-27776,0,0,821bfbcd28344012610595833b8a1c5c475750e44dd09aa01bb06cb83268ec2b,2025-02-05T16:15:35.903000 @@ -223052,8 +223052,8 @@ CVE-2023-29411,0,0,b0b5dcd4734f6628fdada1e59048b94a9d241ec79656d0491b41e185d6f01 CVE-2023-29412,0,0,2f8043764e5e22066ce32d65095d0431bd5e5f4b6498eb8605bca575ed780f1d,2024-11-21T07:57:00.663000 CVE-2023-29413,0,0,95db2c23acc68d1e72f038afb0e079209e6e1e4314c41232a32e9ec5f5ad1154,2024-11-21T07:57:00.790000 CVE-2023-29414,0,0,995f6dfbce7b6373c94f8f4446e5c1ab9db1d57586ede22a39a9b94d2ae5ed03,2024-11-21T07:57:00.903000 -CVE-2023-29415,0,1,99a6595de9b1a1d8c6fe47e11af9186d2e228dc0ac8dcc954021c089753a480e,2025-02-13T21:15:13.287000 -CVE-2023-29416,0,1,929e3a57da902720d03f73007363a686a9d7ae6a54fc8b432c92099e4ba63cfe,2025-02-13T21:15:13.473000 +CVE-2023-29415,0,0,99a6595de9b1a1d8c6fe47e11af9186d2e228dc0ac8dcc954021c089753a480e,2025-02-13T21:15:13.287000 +CVE-2023-29416,0,0,929e3a57da902720d03f73007363a686a9d7ae6a54fc8b432c92099e4ba63cfe,2025-02-13T21:15:13.473000 CVE-2023-29417,0,0,af1671cdf04819caefb52843b9d73da01d07e147abbd4c3ea9e6ae4d1237e052,2024-11-21T07:57:01.327000 CVE-2023-29418,0,0,216edffe831d0d592ec0d83d60d807b6fddc27336e8ac8763ba6f9057d2f454c,2024-11-21T07:57:01.473000 CVE-2023-29419,0,0,eee99d945f06108a5e40a1ec9c523d1176d85c277e5d1c52341cf8f78429a077,2024-11-21T07:57:01.617000 @@ -226934,11 +226934,16 @@ CVE-2023-34392,0,0,d8289ef9b8ee4c730669c475b92ed9638b79be5cddb18576855295bf53608 CVE-2023-34394,0,0,5024dd48b5a3dae7028cef62d61893803441cad1bf0497670d85da6b8c6740d0,2024-11-21T08:07:09.990000 CVE-2023-34395,0,0,6b27da8fd46729cf8e00b5b710b84600fc46a48029d9eace73be2c1175bddefe,2024-11-21T08:07:10.127000 CVE-2023-34396,0,0,cabb805a02df64f428d581ac19cc4a5993ad0b37fa13e2c2b635c0e2751edd5c,2025-02-13T17:16:36.117000 -CVE-2023-34397,1,1,249577ceb91ef7e113cb65f6b19506db3856bc2ebed7264fcfc2f88129aee8f5,2025-02-13T22:15:10.470000 -CVE-2023-34398,1,1,1f12e56c45fe1c1220e96832c656b1bd5fc51e1632b5dc21f1555c6214ea9f7c,2025-02-13T22:15:10.603000 -CVE-2023-34399,1,1,0c3b36247c736bcfd69a9407b89938ceed0202f9e093f20c1d489d20cb170fd4,2025-02-13T22:15:10.730000 +CVE-2023-34397,0,0,249577ceb91ef7e113cb65f6b19506db3856bc2ebed7264fcfc2f88129aee8f5,2025-02-13T22:15:10.470000 +CVE-2023-34398,0,0,1f12e56c45fe1c1220e96832c656b1bd5fc51e1632b5dc21f1555c6214ea9f7c,2025-02-13T22:15:10.603000 +CVE-2023-34399,0,0,0c3b36247c736bcfd69a9407b89938ceed0202f9e093f20c1d489d20cb170fd4,2025-02-13T22:15:10.730000 CVE-2023-3440,0,0,c3a148f8bda83f5626794fbc68f98a1dc6c64d7bea5c4682462694a567b20fe9,2024-11-21T08:17:16.337000 -CVE-2023-34400,1,1,c5be95075437fd5867697c3f2c6ea06de62d25c541de8b0de4525dbe7442c060,2025-02-13T22:15:10.847000 +CVE-2023-34400,0,0,c5be95075437fd5867697c3f2c6ea06de62d25c541de8b0de4525dbe7442c060,2025-02-13T22:15:10.847000 +CVE-2023-34401,1,1,a56ec84af0fc63a7e1b026ee8045ffc0b54afd7dbac33da84057cec72673c587,2025-02-13T23:15:08.867000 +CVE-2023-34402,1,1,192b4617fe538192127cae04e62c627e8669702950b4404c454130dab6128709,2025-02-13T23:15:09.337000 +CVE-2023-34403,1,1,eb0dca1a5f6454558c31d75b6ed692ae490c22c970720bd85806096597d47c16,2025-02-13T23:15:09.440000 +CVE-2023-34404,1,1,335287281ac129a1025cb1021db0841bd6f7c8376ff5d231f9f4540744b0246e,2025-02-13T23:15:09.553000 +CVE-2023-34406,1,1,36bc16e478a055fb4fedf2e4d8547169137b2607058a49615980dca05a514b16,2025-02-13T23:15:09.633000 CVE-2023-34407,0,0,feb0cd99a613c0605481c85d03f4038aed84545414c9a8173ba7dd7d0782d2cd,2025-01-08T17:15:13.003000 CVE-2023-34408,0,0,03b9bef6d87ce45b6ba8997f0b9758107c5f0a4c0c52b45bc5822b37a8cffdfe,2025-01-08T20:15:26.503000 CVE-2023-34409,0,0,51b8f8415923aa1a2d243bed75d521d233228a55cbd4b9792f4bc8dabc1d5016,2025-01-08T16:15:31.940000 @@ -245328,6 +245333,7 @@ CVE-2024-12047,0,0,8440f971596bd55cff74a4ca413c1e3de197b2701820ea36a0544bdffdfe4 CVE-2024-12049,0,0,42e54420720f33c4562344743dcb6a33224d938ded42006d07df2fa0d0a23306,2025-01-07T05:15:14.147000 CVE-2024-1205,0,0,7a555763b4ee56426377ab020ddc9dc79c7bd15b9be6f5edc39ecd5779b4ad33,2024-11-21T08:50:02.210000 CVE-2024-12053,0,0,bc2b289301180bd6933809c4de004e58bcafd2b88fa0501ccb1750c43496ee92,2025-01-02T17:47:20.023000 +CVE-2024-12054,1,1,4ba12ec29f03e1b31732298e7df713c42f5671645c234efaa4d4cee36bba5e97,2025-02-13T23:15:09.823000 CVE-2024-12056,0,0,d7fbaa89c201679c30b80d6484a6860abf01d1ecc41424a8e0b08b504062cb8c,2024-12-04T15:15:09.700000 CVE-2024-12057,0,0,bd805d2c90bd77944ba46eb8c9dc7c23cbacd60316de3cfa41d8ef3c61043848,2024-12-09T19:15:12.750000 CVE-2024-12058,0,0,1297ad1337a6a14996d96d7694aaa54397421de227302137e2c91e0896f21be7,2025-02-11T16:15:38.663000 @@ -258478,7 +258484,7 @@ CVE-2024-34511,0,0,c1d20a47728b6c5526364d02e8958d8fb0539448423cf5c76333bac10d97f CVE-2024-34515,0,0,b2a5f6a619eb7e9f032aeb367dbb16cc9eea3104e0bc1ce005d69ffe8c66635e,2024-11-21T09:18:50.773000 CVE-2024-34517,0,0,e9e99883991af2360e74003fd76d7d9474c4615f3c04d4c9966be6f605ba3976,2024-11-21T09:18:50.990000 CVE-2024-34519,0,0,9923095c8ead28a85094bbf98c9269e81fc27f56b86f7b0b473592a53f6f330d,2024-11-21T09:18:51.220000 -CVE-2024-34520,0,1,3940f2626dfd21cc81f4f316b6ff90f799fda5e2ff7bfc481835fbee1c70daea,2025-02-13T21:15:14.113000 +CVE-2024-34520,0,0,3940f2626dfd21cc81f4f316b6ff90f799fda5e2ff7bfc481835fbee1c70daea,2025-02-13T21:15:14.113000 CVE-2024-34521,0,0,e26ea59913eb8ed4248c06c253cb04fc81acdd8fc9ce6901db39d7797658eca7,2025-02-12T23:15:10.730000 CVE-2024-34523,0,0,9238c9d15fb625bf913096c040c0bef2ba8c758ca26eb1436542b02504490f9d,2024-11-21T09:18:51.440000 CVE-2024-34524,0,0,c38382eedbf78ed000ded50091e5476087f57b5ee1f5f0c45a0fd37c8ca78066,2024-11-21T09:18:51.663000 @@ -260976,6 +260982,10 @@ CVE-2024-37575,0,0,fb41a93cda92e423debc2a813128d4d353bf25b2fe44666c8d6cd43b5e9b3 CVE-2024-3758,0,0,1181488ec82078110f1699579a12bafb88b2d59c08c0cadc1f8d0743c817c9b1,2025-01-02T19:04:15.777000 CVE-2024-3759,0,0,46624cef16e7230998500889df497f9ac3c7ef0f50d3eb513c1782b48bf6fa49,2025-01-02T19:03:20.700000 CVE-2024-3760,0,0,1d331199efa43ca30991198616569b583e4d5745c28ba3fbbb6d72d78d13e12a,2024-11-18T22:02:15.053000 +CVE-2024-37600,1,1,b79a51c094f0a6fed9f65e54b9a39c093b563e53c9ad91e82bfd0b19e4aafe5f,2025-02-13T23:15:10 +CVE-2024-37601,1,1,aec0cb3ba1cbe8af2217e7a003790bea0a3bc0a521a72f99614a77c683ba988e,2025-02-13T23:15:10.113000 +CVE-2024-37602,1,1,ec442a35e466f5fd5257edca5d419584b6ca1840882c802195e64121f0957b75,2025-02-13T23:15:10.197000 +CVE-2024-37603,1,1,5e87b65dd6dc773292958ca8ecc777b9991649642bca0fdd87232f42b10c39f3,2025-02-13T23:15:10.313000 CVE-2024-37605,0,0,fb11c6ec5c9451d0fce3b495eefe0ce37a1a8006db99445feeb56f6a0d8feffd,2024-12-17T18:15:22.377000 CVE-2024-37606,0,0,c23e13fa4f81bf586aa65db6e3fff01a9663acc134fa0dd95dc5e03eb97a040f,2024-12-17T18:15:23.083000 CVE-2024-37607,0,0,8deda97648c5ef6da6da35c94a7a01dc1d7b58245833491e93a1544a6a0717f3,2024-12-17T18:15:23.343000 @@ -264311,7 +264321,7 @@ CVE-2024-42116,0,0,c87ddeed9b58fce4f19771124b58a0205767a0ba132a7586c9453bcf4d38e CVE-2024-42117,0,0,806c7bbaa47a63c79c153148308d6c18cdc47e890955b3b9c1e9c60deecd59dd,2024-11-21T09:33:38.313000 CVE-2024-42118,0,0,bfa5d9240584a5e4f4f49f97b36f2463fb85b4110cf08dde6942a6188e7d2aa3,2024-11-21T09:33:38.430000 CVE-2024-42119,0,0,03ea2af429e4e38171757ef1550057411fe944ad3248dd0045fd7f062df6b832,2024-11-21T09:33:38.543000 -CVE-2024-4212,0,1,86c29a7b1919d72ea963552028257ad6e66d351fe99835995b8488350816b1ae,2025-02-13T21:15:14.770000 +CVE-2024-4212,0,0,86c29a7b1919d72ea963552028257ad6e66d351fe99835995b8488350816b1ae,2025-02-13T21:15:14.770000 CVE-2024-42120,0,0,c55507381d2dbda42ba1186aae324969076618a383d70d402103e69c7c75737d,2024-11-21T09:33:38.673000 CVE-2024-42121,0,0,bf6415bde3191c5f5fcd25ffd10af7590ee25a7ffb8661d1b1bd658227b8f687,2024-11-21T09:33:38.810000 CVE-2024-42122,0,0,8f80f34dcee523cc5df99cdb9e0b5f5fb6ff4777f77fd53a4e265209d3244689,2024-12-09T13:10:02.027000 @@ -267744,7 +267754,7 @@ CVE-2024-46906,0,0,9392cc16a6f8541a5ae7fa23a655b4084d1de04fab349df70429579f7befe CVE-2024-46907,0,0,078e0a524a643e2b9cff1a23a8c0882ba95612d7520992e82078626dfc38983e,2024-12-10T18:23:41.573000 CVE-2024-46908,0,0,55b70ed532f1853f99cc2c331e5a024319deea33e2ff1a3d0d6d3f10416dda38,2024-12-10T18:23:09.100000 CVE-2024-46909,0,0,23c76f6e1a6ff88eaca1f23c162ae0295380b6a8eaa129068dfbfc189f6b8c77,2024-12-10T18:10:35.043000 -CVE-2024-46910,0,1,19c35e4a586a075f1d6c3c0126830f7f29749b700c6bfb541416c07500b10fd9,2025-02-13T21:15:14.590000 +CVE-2024-46910,0,0,19c35e4a586a075f1d6c3c0126830f7f29749b700c6bfb541416c07500b10fd9,2025-02-13T21:15:14.590000 CVE-2024-46911,0,0,3d0ee5b10efd83bd968feb73195ce7d2aa3abe80ac847507929e8b55f2484d57,2024-11-21T09:39:07.520000 CVE-2024-46914,0,0,8183f2e81bda981099173d1b49f2e9d3c952a93e63b81e2bd23ce00d12f134f9,2024-10-22T22:15:05.810000 CVE-2024-46918,0,0,4ffbb01b562296291ac13b104d12d655761406982e7cf7d77cad5d9f13d483f1,2024-09-20T18:14:23.897000 @@ -270957,7 +270967,7 @@ CVE-2024-51365,0,0,d837cc1586c1d4910b5dfde0140d794651911e802de0b0b7889dd34212429 CVE-2024-51366,0,0,8cb37b642efd94f1ef2cb009c97c3b6b6785b34318fa56f7821210d8849df437,2024-12-04T16:15:25.903000 CVE-2024-51367,0,0,321834f3c68e231d48212ed0455e22a6133cdcee14f287745838cf2ad31fdf76,2024-11-27T17:15:13.207000 CVE-2024-5137,0,0,41ad2c3a0cd14fabc2d82c1eb5d81c11af2ccc9f81f9390b031e63a9eafa7739,2024-11-21T09:47:03.080000 -CVE-2024-51376,0,1,f700ac102ba582e72dbdc7fed72c59b433027ff0357273ca7f73e1576035ebe0,2025-02-13T21:15:15.083000 +CVE-2024-51376,0,0,f700ac102ba582e72dbdc7fed72c59b433027ff0357273ca7f73e1576035ebe0,2025-02-13T21:15:15.083000 CVE-2024-51377,0,0,454a574f7d41cec5c0e5592441622f9e1eef9cc67c58f07bfdfa7571c5635b7b,2024-11-14T23:23:52.997000 CVE-2024-51378,0,0,60b518476e0f52f1f42de1d9edd060a172f8f183ad7a51b636d39c5e7781b145,2024-12-06T18:17:17.377000 CVE-2024-51379,0,0,13c494ffdbcfebeae28d4137631165977c5751c7591d4d79351ef75570cbecdb,2024-11-06T18:17:17.287000 @@ -272414,7 +272424,10 @@ CVE-2024-53295,0,0,b8e985a8e27bd0c49159e8a0c89472687e5b7e5449b7c5ba70064bf994d36 CVE-2024-53296,0,0,be682d3eb2a02cb859d07bb38fd2cdf79c5c9c446624f27b1fefa1f7d7732c2c,2025-02-07T19:54:50.490000 CVE-2024-53299,0,0,2311d06f0f8179bedcf518ce1bde420954fcc87b5db6c467bb518cf92e75888f,2025-02-04T19:15:31.877000 CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000 +CVE-2024-53309,1,1,fbd192ebe8ddc3ba7c6c8bca9f108e5de178d036f56947c6f5d14ea2aed01d0d,2025-02-13T23:15:10.400000 CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000 +CVE-2024-53310,1,1,bb9e3e768922d5b2c6f52d290405822e84f0ba0511a6111a2bc22311f7f3fa04,2025-02-13T23:15:10.493000 +CVE-2024-53311,1,1,1d95306049f15b3ba580c1cb4607e72763bc84a9d8705b243ef89765e2a00bb4,2025-02-13T23:15:10.587000 CVE-2024-53319,0,0,504250b0f69d16a3cc3801c2bbde4ee72d07fdb764bdfafa75eaa85885381de2,2025-02-03T20:15:33.430000 CVE-2024-5332,0,0,1bf02601401a5cfa3a271a75853b96cdcfd3e0b6b58677457c39ef4ba15b4069,2024-11-21T09:47:26.403000 CVE-2024-53320,0,0,c0ab61e5ad040dc2e73e2a9c67587cf91fdaf7884054cb7c117a2b735a98de10,2025-02-03T21:15:13.373000 @@ -273396,6 +273409,7 @@ CVE-2024-54937,0,0,197a7c9b3b72f036ddf287711fb28635bb9463140aa1361b9ca00a7c51b67 CVE-2024-54938,0,0,5376f91bdc16b2e02af9854f224acaa97d8eeeea6e39c3277fbe6d2d4b3c3ddd,2024-12-11T16:15:17.033000 CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cff0,2024-12-26T16:38:51.957000 CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000 +CVE-2024-54951,1,1,a2306e7c3868313e0c3e4349c435a20c45c14ebd21b4714e4c34697848fd3c8c,2025-02-13T23:15:10.677000 CVE-2024-54954,0,0,250bc145ec3f51ab356a556d3d29ab0cef21c9b82ddd8fae33865ef33a929590,2025-02-10T18:15:29.663000 CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000 CVE-2024-5497,0,0,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000 @@ -274400,6 +274414,7 @@ CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b2 CVE-2024-56901,0,0,6d3fbd070e3d1e938268fa85659056edc11eed45889b8e3be3e844885855df5f,2025-02-04T16:15:38.687000 CVE-2024-56902,0,0,5bc241ca860cc70d4907c4f9287830a987c40db50a399ecf7dc53f6afa5ba16c,2025-02-04T15:15:18.163000 CVE-2024-56903,0,0,ae8a42ff86d56e0afca1c5364c916f572bc5dbf89afdb88962064980d81030e3,2025-02-04T15:15:18.387000 +CVE-2024-56908,1,1,5432237ac8b7fb042a60e387b8cd04a7f17a411a13db8c6306624d4d5eeb87a5,2025-02-13T23:15:10.773000 CVE-2024-5691,0,0,0824a888e7eb71279259f37f9283a4aa7c8605aa9b71698472cf4ea15ee83b3c,2024-11-21T09:48:10.503000 CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000 CVE-2024-5692,0,0,4b8f65097356fd8a548c2da4761bef878e098b44587a5b9b21bc347f46db95a8,2024-11-21T09:48:10.633000 @@ -274569,7 +274584,7 @@ CVE-2024-57370,0,0,dba61003ac0742f925ea5ff1cc95bfbaed4369615ca108aeba895cf60279f CVE-2024-57372,0,0,359f6085d50456f0eac4043a58ce1cc9b440df64af0e5401b40a68976c846ffa,2025-01-17T22:15:28.957000 CVE-2024-57373,0,0,55b5a66e1a93744a164d63416378de309c1b9a5faab6102e8edbf1875b843e8d,2025-02-06T17:15:20.213000 CVE-2024-57376,0,0,1b43a3e4a8037a8c708d6024b6d292337bbf71fefc30954ed4f4a8b250f57ff1,2025-01-29T16:15:43.367000 -CVE-2024-57378,1,1,60220413d47246cdaebafb55bd59c289f14acd59650a423e904224ff431c74c9,2025-02-13T22:15:11.167000 +CVE-2024-57378,0,0,60220413d47246cdaebafb55bd59c289f14acd59650a423e904224ff431c74c9,2025-02-13T22:15:11.167000 CVE-2024-5738,0,0,ed407989160bc277c57b88c071485c42bcb76c7891fe4c3b678e4f981038b562,2025-02-11T02:15:35.480000 CVE-2024-57386,0,0,ad9377994dc2b991f013b227dbedd5251f54c47616d12069f6305d876047b1bb,2025-01-31T16:13:06.540000 CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000 @@ -274782,6 +274797,7 @@ CVE-2024-57775,0,0,d443a466195113d1df55f765112263e4c5993950dd535868322856b101590 CVE-2024-57776,0,0,3f1d44a7df34cf026fef540e7df11379f7f5ec930fc80f9b9e89c0c1941674ac,2025-02-03T20:15:36.390000 CVE-2024-57777,0,0,e81fdc551542b79f75c8f99f496223d9b803cf79f3ada1cc2529ab07650b1016,2025-02-11T22:15:29.680000 CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000 +CVE-2024-57782,1,1,f31398c7dbcd08990fe3a679c70778cb11745fc0c1d7fcafad9b4fe318340130,2025-02-13T23:15:10.863000 CVE-2024-57784,0,0,a0ffa91a6d1336afb59f42e28acde5cce54240c902b605d9b18af65e76eeccc4,2025-02-03T21:15:15.133000 CVE-2024-57785,0,0,da53710abc0b38f1f9720d31a7383037ac10a091073d73f356e9f0e15e997042,2025-02-04T15:15:18.943000 CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46fc9,2024-06-12T08:15:51.240000 @@ -279088,7 +279104,7 @@ CVE-2025-1083,0,0,4afa513b3fc8f95cd8d4d20b3ed0046d9430183e58afbd31ad82dd599bd8fd CVE-2025-1084,0,0,b0d508f1ab3a1d3dc65fb5a374e03ada5ac495226151bdcc4d5b2ac7850ddb9c,2025-02-07T00:15:28.180000 CVE-2025-1085,0,0,f584db130967758b77431e11a5f469d25699b86ea49d2e400bcb605050e5a113,2025-02-07T01:15:07.930000 CVE-2025-1086,0,0,939f922cf83473192b0b258783d5ca641c4443176d820dcd2d3b84e692405303,2025-02-07T02:15:30.523000 -CVE-2025-1094,0,1,1f35385685029241a25445869883c4349971e28c47ea61140019459a47b4eb93,2025-02-13T22:15:11.300000 +CVE-2025-1094,0,0,1f35385685029241a25445869883c4349971e28c47ea61140019459a47b4eb93,2025-02-13T22:15:11.300000 CVE-2025-1096,0,0,f369ee58dbaa6e142f3d975d8711cac15a0a303facd75e898c558f3e454cc535,2025-02-08T01:15:07.947000 CVE-2025-1099,0,0,bf17eec112b497da534e01d8cb5eb20bbffb3f16a9e8841ea572781479eb3e5f,2025-02-10T11:15:21.147000 CVE-2025-1100,0,0,caabd467f14edf71ead8d61afba156fa4f48c60c81aecb9cb29d5d2ddb691e7f,2025-02-12T14:15:31.647000 @@ -279190,7 +279206,7 @@ CVE-2025-1244,0,0,3a7066df433eb03dbb1a5156667b9922c9a48d520391bb584a7af3176d35b7 CVE-2025-1247,0,0,c04092dcf345103badb80fdd95e22fac8a6844256bbf5405f306402957fc9ebb,2025-02-13T14:16:18.400000 CVE-2025-1270,0,0,236281c7e2f02c32874e4e3709dfb4e8e9ebb69fe161a8786e8aa1222fe115b8,2025-02-13T13:15:09.273000 CVE-2025-1271,0,0,5d817e390688ef07b23033305a3d61b54ec7909b543740a3f3f14f0970450461,2025-02-13T13:15:09.433000 -CVE-2025-1283,1,1,e0bfe5d939a3d4bf1cd2099051e27f05a10fae661af34307090edba35da62446,2025-02-13T22:15:11.413000 +CVE-2025-1283,0,0,e0bfe5d939a3d4bf1cd2099051e27f05a10fae661af34307090edba35da62446,2025-02-13T22:15:11.413000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,58d0a26aacf6cc700c9707f22937d4a9fd06e9e8ac5a17ed011c7efb874a7f40,2025-02-05T18:15:29.573000 @@ -279231,7 +279247,7 @@ CVE-2025-20185,0,0,491fde53e83dcec798e13e2d9a67fb94569c05a8d72f92415306e757631fd CVE-2025-20204,0,0,ff147e6ad933304bf983a313f5a9204649ab468e5d74d3bafd7e71cfd1556e46,2025-02-05T17:15:26.077000 CVE-2025-20205,0,0,1b69fdf9f7e74393787a2750d8687a735cb03e08811413756b75aeaf71635da5,2025-02-05T17:15:26.243000 CVE-2025-20207,0,0,a5546524bd462a4b1c071578f9c02045541f6e2568f015c12b4f48db03f810aa,2025-02-05T17:15:26.410000 -CVE-2025-20615,1,1,6a75b2784e00d2f0092410fd2c8fee687111dbb32ed4616e80f66b6bfc8c4f66,2025-02-13T22:15:11.590000 +CVE-2025-20615,0,0,6a75b2784e00d2f0092410fd2c8fee687111dbb32ed4616e80f66b6bfc8c4f66,2025-02-13T22:15:11.590000 CVE-2025-20617,0,0,5e5337fea3f32f18b26cd8ba8dd17d3809fb24229b1710efe951151848f1eb60,2025-01-22T06:15:14.170000 CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000 CVE-2025-20621,0,0,060306fc4f84916fe909badb69a5829b34e2103b61fada341bb3713a68cfaebc,2025-01-16T19:15:29.960000 @@ -280104,7 +280120,7 @@ CVE-2025-22880,0,0,cf4835bedc790305bfcac8a1a1a919d45f11f6a6f0ec4b92baca3d41dfc38 CVE-2025-22890,0,0,db1d7eabf24b7e7d8b1b42d9869917c9793a935b6519f68f4ac1886abeb24e6f,2025-02-06T07:15:17.113000 CVE-2025-22891,0,0,b6f8f5a3cdd97b175e2aad8e0e81733236d6c7ca889113c44c583bb0210e6ae2,2025-02-05T18:15:31.190000 CVE-2025-22894,0,0,ac034cee2489b93651779dfcdd1d9a53e653fd8ed132b5fec5e2ed1fcc8856c1,2025-02-06T08:15:30.027000 -CVE-2025-22896,1,1,be4a55f33e527166c5f10efba2723b4fac6834eff35e9f31b028132ab4b137e8,2025-02-13T22:15:11.737000 +CVE-2025-22896,0,0,be4a55f33e527166c5f10efba2723b4fac6834eff35e9f31b028132ab4b137e8,2025-02-13T22:15:11.737000 CVE-2025-22904,0,0,3807d1b49b562c393e5518dc0bf4d49fb4416192083246d9de79c75349f8fe79,2025-01-17T18:15:31.870000 CVE-2025-22905,0,0,382cf7f3f8f5eadd5df6d2c876d6a159bbdf9a76601b3d1844a11a83da840be1,2025-01-16T15:15:15.180000 CVE-2025-22906,0,0,84179e13ef31a8a27c56f765914741b8d10c6e2d6fee9b4fe45e261f98203a95,2025-01-16T15:15:15.357000 @@ -280118,6 +280134,9 @@ CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6 CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000 CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000 CVE-2025-22957,0,0,916201be55856fe17638195010411f5f5b49ee491e16fc0f0d0d9fe711b69be4,2025-02-03T17:15:26.677000 +CVE-2025-22960,1,1,909fd4543561b179cf19e362db8b8b06eacc11dd2ff530093e36ef46d4e67f11,2025-02-13T23:15:10.960000 +CVE-2025-22961,1,1,977c2fe378865dcb0b1e64b0c10fc2188b8a7bb82cfb2af8a0d422ceddc01711,2025-02-13T23:15:11.047000 +CVE-2025-22962,1,1,11cacc28ac51a133f30d8f5be6b02eda0da61cb7393367b6128a68160ae95816,2025-02-13T23:15:11.140000 CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000 CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000 CVE-2025-22968,0,0,41c7a798ef1cac51f67409788e09403bf1c73ade164309e1bf03d8de0a22a69b,2025-01-16T16:15:35.917000 @@ -280249,12 +280268,12 @@ CVE-2025-23369,0,0,3d547a50b40d16b552809387aa654ff4614f9ee138b9c9b23c533e36ce07a CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000 CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000 CVE-2025-23403,0,0,6d407c3e99373ae4903bfa5d6d7fa08d06d40485486c2ac644fbc1bd23d41148,2025-02-11T11:15:16.420000 -CVE-2025-23411,1,1,f1aae55185556b21d8e0c24272337daecb9be6df1974e1404054d93277defe14,2025-02-13T22:15:11.913000 +CVE-2025-23411,0,0,f1aae55185556b21d8e0c24272337daecb9be6df1974e1404054d93277defe14,2025-02-13T22:15:11.913000 CVE-2025-23412,0,0,ff772db46e84a8229b30da8226c3ba3ad9fc7920b08b4af19acab47bd1c2d2d6,2025-02-05T18:15:31.580000 CVE-2025-23413,0,0,0d307b1166a05846ecd25a2b94e745105afb47dc17ea7dedca05f511b414c7de,2025-02-05T18:15:31.930000 CVE-2025-23415,0,0,4c0256f2397ff6f22f96f8778d52ee55813f2a1944a2056311990c8aab282c58,2025-02-05T18:15:32.573000 CVE-2025-23419,0,0,9931bce39336c9647788aebceaf6072233b0cffc8035c7bc13a0c7205e0176f9,2025-02-05T20:15:45.717000 -CVE-2025-23421,1,1,31d9e0bf02f259a27176eee791d237316c18e99df700a64323c30ab77b514d24,2025-02-13T22:15:12.073000 +CVE-2025-23421,0,0,31d9e0bf02f259a27176eee791d237316c18e99df700a64323c30ab77b514d24,2025-02-13T22:15:12.073000 CVE-2025-23422,0,0,02fa1caf24a4eabe3a7a82363ae4ebce4a671b3054c1ebfa03694d43e05e5f21,2025-01-24T11:15:09.987000 CVE-2025-23423,0,0,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb398,2025-01-16T20:15:33.573000 CVE-2025-23424,0,0,1257350394b4c232bb2fdb6b8eb342a15971b1159fa19176ca3462575142791d,2025-01-16T20:15:33.723000 @@ -281039,12 +281058,12 @@ CVE-2025-24828,0,0,d6c7252c68dc48223ad23e8fe02a63238ede39167f9cb9fd8d861384db181 CVE-2025-24829,0,0,ca820c15f81c2d9533d0e35b5e9ae251c4458d25ef994b8ce2c2028dfde11883,2025-01-31T16:15:36.170000 CVE-2025-24830,0,0,e5e3ddd057bd01ca95f7c00a7286edb5ae4fbf2a7516a5daaf16a92524651ed9,2025-01-31T16:15:36.327000 CVE-2025-24831,0,0,76c0f53ba7a5b958c42589ba4ec89e6cdb3f20971cbf64204b6a1a874d34c8a2,2025-01-31T16:15:36.487000 -CVE-2025-24836,1,1,7d6640e53d488e4a8518eb9a7696c5007d9b1a60158b80a832071b3c2565c39b,2025-02-13T22:15:12.270000 +CVE-2025-24836,0,0,7d6640e53d488e4a8518eb9a7696c5007d9b1a60158b80a832071b3c2565c39b,2025-02-13T22:15:12.270000 CVE-2025-24845,0,0,c191a19dd89d489cf004f2053d6318da393b69a73424e805527f0cb35d2f088a,2025-02-06T08:15:30.673000 CVE-2025-24858,0,0,3b82f7da2305463da0ac5aea20b0458ff46f3b144923110e5153f9a34733f4c3,2025-01-26T07:15:09.237000 CVE-2025-24860,0,0,42b3b38d6d024182d8b5dc0fc36a681aa7d4abf967f4c7b6aca3952d970e3eba,2025-02-06T20:15:41.030000 -CVE-2025-24861,1,1,12379dfddeeb91a24bd31cefa119eb737ed33ae5f489ea9055a6373e1ed282bf,2025-02-13T22:15:12.457000 -CVE-2025-24865,1,1,7664de25ca85bc77d9188866eb96c66df0fda1d700c24f6808889946717d1511,2025-02-13T22:15:12.613000 +CVE-2025-24861,0,0,12379dfddeeb91a24bd31cefa119eb737ed33ae5f489ea9055a6373e1ed282bf,2025-02-13T22:15:12.457000 +CVE-2025-24865,0,0,7664de25ca85bc77d9188866eb96c66df0fda1d700c24f6808889946717d1511,2025-02-13T22:15:12.613000 CVE-2025-24867,0,0,c4fd6e246160d29aa382cef3499dbaf6fc81e12e3c74418ac63da8711ee9ec32,2025-02-11T01:15:10.847000 CVE-2025-24868,0,0,8ee24a9a34fad703f89f3defa2904d51acc20ad10ef817b45da7bfa8a7f5e321,2025-02-11T01:15:10.990000 CVE-2025-24869,0,0,b6cd80e5bae1c894e0e6b555b0b2146ceab5fc28716a5af55b9f3bc5b2028f1e,2025-02-11T06:15:22.913000 @@ -281098,8 +281117,8 @@ CVE-2025-25063,0,0,fe8d3efef171b62a11b34e6bca9a7ce9094019d5a41cf3cdaf3675f4485df CVE-2025-25064,0,0,6dceec11fd59119aed7d408b3f6402c7bd962bb609f5c09b6f193840bd49f8e7,2025-02-06T20:15:41.190000 CVE-2025-25065,0,0,598af3d544a73dc058197b8a6b4d451883a362d398e6a9f9f23664e6dc813c35,2025-02-04T16:15:43.830000 CVE-2025-25066,0,0,bfac3442efe119c58d1253bccaa4b523ef1872eec5be8616734787a2e6e2eb4f,2025-02-03T06:15:11.373000 -CVE-2025-25067,1,1,48635577f720f65b54e59fdfccc15d6041cb2f427d01df6df84ce3f8ccecae2e,2025-02-13T22:15:12.780000 -CVE-2025-25069,0,1,3ac7d43aa5f66d76ca4f47d340594454f3b8efd5492158fbebd7f38cfb3d56c4,2025-02-13T22:15:12.930000 +CVE-2025-25067,0,0,48635577f720f65b54e59fdfccc15d6041cb2f427d01df6df84ce3f8ccecae2e,2025-02-13T22:15:12.780000 +CVE-2025-25069,0,0,3ac7d43aa5f66d76ca4f47d340594454f3b8efd5492158fbebd7f38cfb3d56c4,2025-02-13T22:15:12.930000 CVE-2025-25071,0,0,213b8fc33b3d471865d580a8fd827347f8efe6be1aa881cce0010783c682aa92,2025-02-07T10:15:11.840000 CVE-2025-25072,0,0,02b74129718b0754e0f05cc9644f74acaf0742f3dcba59563afca00f32b5a1da,2025-02-07T10:15:12.023000 CVE-2025-25073,0,0,848202a502252b3ee0d62d6fc1336dd4e0a1f103511c0d674c97b7dcb10ddc3d,2025-02-07T10:15:12.197000 @@ -281172,7 +281191,7 @@ CVE-2025-25189,0,0,d83847fe96d00072b7a8190c91ae5b2afdfef2e676164ac0785259c0f2731 CVE-2025-25190,0,0,e0da5cc0fc69e9aeec609eb916069649e239fce8ec02b2e1997642ab3a06ba52,2025-02-11T16:15:52.420000 CVE-2025-25193,0,0,6313f18b0cc99557f7bb698f851fc47bc1114c9ea466bbb50c1e509a16b993db,2025-02-11T16:15:52.523000 CVE-2025-25194,0,0,3cfb92d0adf1aa48727a5bef815057c2df69f4fc0b8dbd2b306994cdf6b88680,2025-02-10T23:15:16.067000 -CVE-2025-25195,1,1,4eaa19fc37095ed0b6f6b72a1aad3914027d6a3ba6d1818c903f884ae192c5c8,2025-02-13T22:15:13.100000 +CVE-2025-25195,0,0,4eaa19fc37095ed0b6f6b72a1aad3914027d6a3ba6d1818c903f884ae192c5c8,2025-02-13T22:15:13.100000 CVE-2025-25198,0,0,d4f423b8575a2b0e0c47d1cd874c15fb2da6a6a46ceaec62c0bfc272e6cf57b7,2025-02-12T18:15:27.757000 CVE-2025-25199,0,0,55e40815cd021635d25d7610751f977ce7b772f67293cccb8c9a688735660385,2025-02-12T18:15:27.933000 CVE-2025-25200,0,0,d6d93214f4d6798953c0e0fa47b183b15bf44476b4a6776cbce9ace0bba1be52,2025-02-12T18:15:28.110000 @@ -281184,7 +281203,7 @@ CVE-2025-25241,0,0,3f1a5e9f52cb19b464445ba11bc8902290ee3de6281565f07fab135133fb7 CVE-2025-25243,0,0,4a1fb2a2f647dbb24d92bc1eec2013806163e245973af288dc8e801924ea4b36,2025-02-11T06:15:24.330000 CVE-2025-25246,0,0,0ae0916aaea4283fe6ce79729127d0aa8edfdf07242f3416b5c2d5ec885c2c98,2025-02-05T05:15:11.663000 CVE-2025-25247,0,0,2690485555121cc3195beb93ff27e2a62b28c4f65e937f10f15ef11f9c4f824a,2025-02-10T15:15:13.333000 -CVE-2025-25281,1,1,a94115e60627663bdcd98fb9e70426ac178c38adbb6a5330093c36633c24cfe4,2025-02-13T22:15:13.263000 +CVE-2025-25281,0,0,a94115e60627663bdcd98fb9e70426ac178c38adbb6a5330093c36633c24cfe4,2025-02-13T22:15:13.263000 CVE-2025-25283,0,0,418e2966a3d119d4f87e4a326f631343b9aaeb0f00ae68b4b613b17ef82e0256,2025-02-12T19:15:21.863000 CVE-2025-25286,0,0,d02a516e334a3f6a031f551547a6cf5db3f84dd4e0c98c8429bacf5acc75be44,2025-02-13T01:15:25.280000 CVE-2025-25287,0,0,990f1bef848f5cb0ec832e1dc9fa9d35b18b0435a224d0f576726f1fa2e52a18,2025-02-13T16:16:49.187000 @@ -281262,14 +281281,14 @@ CVE-2025-26408,0,0,33b8ab1d964eed8374cf2895d0fb5039e22b031ca552fb49290499a2fa382 CVE-2025-26409,0,0,ca13ca3a8e4796bfb9010cd7417af6b477b812c777fc3763439360034c7a9481,2025-02-11T15:15:21.537000 CVE-2025-26410,0,0,7436cf38115e526a16ee35c34809d408cd39f53af45b718ca00b110673ee34d1,2025-02-11T15:15:21.700000 CVE-2025-26411,0,0,9ef32a253b731b2ff18f782496eaf6c296b220e67d96855234ab4a5147a58482,2025-02-11T15:15:21.847000 -CVE-2025-26473,1,1,afdee1379c99d4f6b07907ea17580be8453e0aee18d47bd8de4ab55ed06e520b,2025-02-13T22:15:13.417000 +CVE-2025-26473,0,0,afdee1379c99d4f6b07907ea17580be8453e0aee18d47bd8de4ab55ed06e520b,2025-02-13T22:15:13.417000 CVE-2025-26490,0,0,b7b4921a5e7ebc8aa8e9b3ebfb385a49a963240b92f186756eca675a6c877147,2025-02-11T15:15:21.993000 CVE-2025-26491,0,0,0e03bb492b5be045a20d72d7beaeb2d269957ba490b9886936bd524fd4160612,2025-02-11T15:15:22.100000 CVE-2025-26492,0,0,5b41311733a5614d57ba5ee7777fd90be55aaaf83f70eb2ee27bd92694b6e86b,2025-02-11T14:15:31.260000 CVE-2025-26493,0,0,1099023a6dd0784f561a6e33a794f1b6b69f51c22042510a0826814d283df5c1,2025-02-11T14:15:31.473000 CVE-2025-26494,0,0,fbc26c80357160dc793881bb81bca8973032cb78045f64dc3903e7fb3d3f359e,2025-02-11T18:15:47.060000 CVE-2025-26495,0,0,0731ad2cc6d733334de4696008327b6e5ee6279ed8bc678e0a689b6be160a2fa,2025-02-11T18:15:47.237000 -CVE-2025-26511,0,0,3539874a9906ef1c6dcca91725c7051cb46878cc702ae6b254df1d60e3316495,2025-02-13T16:16:50.270000 +CVE-2025-26511,0,1,f60d5b8ed6462b3636b1bec6d86421fa2447443d87dddccbff41a72a635be633,2025-02-14T00:15:07.667000 CVE-2025-26520,0,0,b83a456ccd02c927137ed430a7b7666fceb0cc753b6c14f6ee5654a1a893266c,2025-02-12T07:15:08.617000 CVE-2025-26538,0,0,9ea4ca612e90cce9189b8bae07fa04997f24224417b26ca364e9d1ce2abc0564,2025-02-13T14:16:19.100000 CVE-2025-26539,0,0,9e24ab5af3835adb18f91dd2d1f793e969f13bc3aa31bd06f752764eeee8db3e,2025-02-13T14:16:19.383000