diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0114.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0114.json new file mode 100644 index 00000000000..4427987dbde --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0114.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-0114", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-03-05T02:15:35.830", + "lastModified": "2025-03-05T02:15:35.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA Hopper HGX for 8-GPU contains a vulnerability in the HGX Management Controller (HMC) that may allow a malicious actor with administrative access on the BMC to access the HMC as an administrator. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1244" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5561", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0141.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0141.json new file mode 100644 index 00000000000..5373d6b197a --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0141.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-0141", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-03-05T02:15:35.990", + "lastModified": "2025-03-05T02:15:35.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA Hopper HGX for 8-GPU contains a vulnerability in the GPU vBIOS that may allow a malicious actor with tenant level GPU access to write to an unsupported registry causing a bad state. A successful exploit of this vulnerability may lead to denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-782" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5561", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50302.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50302.json index 6c25ea90ce8..e34341259b7 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50302.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50302.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50302", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T02:16:32.320", - "lastModified": "2025-03-04T16:15:35.280", - "vulnStatus": "Modified", + "lastModified": "2025-03-05T02:00:02.390", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -59,6 +59,10 @@ } ] }, + "cisaExploitAdd": "2025-03-04", + "cisaActionDue": "2025-03-25", + "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Linux Kernel Use of Uninitialized Resource Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1964.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1964.json new file mode 100644 index 00000000000..300a88bee99 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1964.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1964", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-05T01:15:10.020", + "lastModified": "2025-03-05T01:15:10.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in projectworlds Online Hotel Booking 1.0. It has been rated as critical. This issue affects some unknown processing of the file /booknow.php?roomname=Duplex. The manipulation of the argument checkin leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ubfbuz3/cve/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298565", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298565", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.511471", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1965.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1965.json new file mode 100644 index 00000000000..9b7718ded19 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1965.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1965", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-05T01:15:11.600", + "lastModified": "2025-03-05T01:15:11.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in projectworlds Online Hotel Booking 1.0. Affected is an unknown function of the file /admin/login.php. The manipulation of the argument emailusername leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ubfbuz3/cve/issues/4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298566", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298566", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.511473", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1966.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1966.json new file mode 100644 index 00000000000..ecfdc8739b9 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1966.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-1966", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-05T02:15:36.157", + "lastModified": "2025-03-05T02:15:36.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in PHPGurukul Pre-School Enrollment System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/SECWG/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298567", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298567", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.512039", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json new file mode 100644 index 00000000000..5a8a2f48f4b --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-1967", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-05T02:15:36.320", + "lastModified": "2025-03-05T02:15:36.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in code-projects Blood Bank Management System 1.0. Affected by this issue is some unknown functionality of the file /user_dashboard/donor.php. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/intercpt/XSS1/blob/main/XSS.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298568", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298568", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.512163", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json index 3bc5ec0dd2e..6faae8bf7d0 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json @@ -2,7 +2,7 @@ "id": "CVE-2025-22224", "sourceIdentifier": "security@vmware.com", "published": "2025-03-04T12:15:33.687", - "lastModified": "2025-03-04T16:15:38.850", + "lastModified": "2025-03-05T02:00:02.390", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -35,6 +35,10 @@ } ] }, + "cisaExploitAdd": "2025-03-04", + "cisaActionDue": "2025-03-25", + "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "VMware ESXi and Workstation TOCTOU Race Condition Vulnerability", "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22225.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22225.json index b4612df8a88..72459b41090 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22225.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22225.json @@ -2,7 +2,7 @@ "id": "CVE-2025-22225", "sourceIdentifier": "security@vmware.com", "published": "2025-03-04T12:15:33.840", - "lastModified": "2025-03-04T16:15:38.970", + "lastModified": "2025-03-05T02:00:02.390", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -35,6 +35,10 @@ } ] }, + "cisaExploitAdd": "2025-03-04", + "cisaActionDue": "2025-03-25", + "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "VMware ESXi Arbitrary Write Vulnerability", "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22226.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22226.json index baabd435660..95556eced65 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22226.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22226.json @@ -2,7 +2,7 @@ "id": "CVE-2025-22226", "sourceIdentifier": "security@vmware.com", "published": "2025-03-04T12:15:33.973", - "lastModified": "2025-03-04T16:15:39.097", + "lastModified": "2025-03-05T02:00:02.390", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -35,6 +35,10 @@ } ] }, + "cisaExploitAdd": "2025-03-04", + "cisaActionDue": "2025-03-25", + "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability", "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/README.md b/README.md index 45fa5d8fee6..d019ea1e43d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-05T00:55:19.985863+00:00 +2025-03-05T03:00:19.823494+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-05T00:15:38.423000+00:00 +2025-03-05T02:15:36.320000+00:00 ``` ### Last Data Feed Release @@ -27,46 +27,35 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-03-04T01:00:04.384237+00:00 +2025-03-05T01:00:04.361326+00:00 ``` ### Total Number of included CVEs ```plain -284128 +284134 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `6` -- [CVE-2025-1316](CVE-2025/CVE-2025-13xx/CVE-2025-1316.json) (`2025-03-05T00:15:35.057`) -- [CVE-2025-1959](CVE-2025/CVE-2025-19xx/CVE-2025-1959.json) (`2025-03-04T23:15:10.507`) -- [CVE-2025-1961](CVE-2025/CVE-2025-19xx/CVE-2025-1961.json) (`2025-03-04T23:15:10.717`) -- [CVE-2025-1962](CVE-2025/CVE-2025-19xx/CVE-2025-1962.json) (`2025-03-05T00:15:37.540`) -- [CVE-2025-1963](CVE-2025/CVE-2025-19xx/CVE-2025-1963.json) (`2025-03-05T00:15:37.723`) -- [CVE-2025-20002](CVE-2025/CVE-2025-200xx/CVE-2025-20002.json) (`2025-03-05T00:15:37.910`) -- [CVE-2025-21092](CVE-2025/CVE-2025-210xx/CVE-2025-21092.json) (`2025-03-05T00:15:38.080`) -- [CVE-2025-23410](CVE-2025/CVE-2025-234xx/CVE-2025-23410.json) (`2025-03-05T00:15:38.250`) -- [CVE-2025-24924](CVE-2025/CVE-2025-249xx/CVE-2025-24924.json) (`2025-03-05T00:15:38.423`) +- [CVE-2024-0114](CVE-2024/CVE-2024-01xx/CVE-2024-0114.json) (`2025-03-05T02:15:35.830`) +- [CVE-2024-0141](CVE-2024/CVE-2024-01xx/CVE-2024-0141.json) (`2025-03-05T02:15:35.990`) +- [CVE-2025-1964](CVE-2025/CVE-2025-19xx/CVE-2025-1964.json) (`2025-03-05T01:15:10.020`) +- [CVE-2025-1965](CVE-2025/CVE-2025-19xx/CVE-2025-1965.json) (`2025-03-05T01:15:11.600`) +- [CVE-2025-1966](CVE-2025/CVE-2025-19xx/CVE-2025-1966.json) (`2025-03-05T02:15:36.157`) +- [CVE-2025-1967](CVE-2025/CVE-2025-19xx/CVE-2025-1967.json) (`2025-03-05T02:15:36.320`) ### CVEs modified in the last Commit -Recently modified CVEs: `12` +Recently modified CVEs: `4` -- [CVE-2025-1930](CVE-2025/CVE-2025-19xx/CVE-2025-1930.json) (`2025-03-05T00:15:36.133`) -- [CVE-2025-1931](CVE-2025/CVE-2025-19xx/CVE-2025-1931.json) (`2025-03-05T00:15:36.227`) -- [CVE-2025-1932](CVE-2025/CVE-2025-19xx/CVE-2025-1932.json) (`2025-03-05T00:15:36.320`) -- [CVE-2025-1933](CVE-2025/CVE-2025-19xx/CVE-2025-1933.json) (`2025-03-05T00:15:36.470`) -- [CVE-2025-1934](CVE-2025/CVE-2025-19xx/CVE-2025-1934.json) (`2025-03-05T00:15:36.617`) -- [CVE-2025-1935](CVE-2025/CVE-2025-19xx/CVE-2025-1935.json) (`2025-03-05T00:15:36.770`) -- [CVE-2025-1936](CVE-2025/CVE-2025-19xx/CVE-2025-1936.json) (`2025-03-05T00:15:36.913`) -- [CVE-2025-1937](CVE-2025/CVE-2025-19xx/CVE-2025-1937.json) (`2025-03-05T00:15:37.010`) -- [CVE-2025-1938](CVE-2025/CVE-2025-19xx/CVE-2025-1938.json) (`2025-03-05T00:15:37.097`) -- [CVE-2025-1942](CVE-2025/CVE-2025-19xx/CVE-2025-1942.json) (`2025-03-05T00:15:37.247`) -- [CVE-2025-1943](CVE-2025/CVE-2025-19xx/CVE-2025-1943.json) (`2025-03-05T00:15:37.400`) -- [CVE-2025-27408](CVE-2025/CVE-2025-274xx/CVE-2025-27408.json) (`2025-03-04T23:15:10.897`) +- [CVE-2024-50302](CVE-2024/CVE-2024-503xx/CVE-2024-50302.json) (`2025-03-05T02:00:02.390`) +- [CVE-2025-22224](CVE-2025/CVE-2025-222xx/CVE-2025-22224.json) (`2025-03-05T02:00:02.390`) +- [CVE-2025-22225](CVE-2025/CVE-2025-222xx/CVE-2025-22225.json) (`2025-03-05T02:00:02.390`) +- [CVE-2025-22226](CVE-2025/CVE-2025-222xx/CVE-2025-22226.json) (`2025-03-05T02:00:02.390`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f88cd56b639..d636067fc7c 100644 --- a/_state.csv +++ b/_state.csv @@ -243428,6 +243428,7 @@ CVE-2024-0110,0,0,f27210557f0c26fcfbedc193e4d0a41f340a75f32164d31e726fe652317f28 CVE-2024-0111,0,0,bdef68470cbe972dbf78a48ee8c036044ad45c278e474af19b34bfbde7237a38,2024-09-18T15:22:14.727000 CVE-2024-0112,0,0,a93867826173d52b069ba4bc756915acbff36c5eb60fb96b794508434a58f379,2025-02-12T00:15:08.263000 CVE-2024-0113,0,0,ddc72489479f075436bf2bede7a3c83b1b0eed041894108c913ed6a4245e286a,2024-12-26T19:21:52.380000 +CVE-2024-0114,1,1,708e24dec8459f8bc67865b836205c7a2e3be17f2289ee1bea615fa4716b15df,2025-03-05T02:15:35.830000 CVE-2024-0115,0,0,04fb8f6e5724a3bbcfb8807084f7db88a3df8dcc171391e4ae1eeafce22d77c1,2024-12-26T19:21:45.613000 CVE-2024-0116,0,0,7e098634cd96469f401e47ab7ff401cb9f2ab3f597905b45f057f27f5d24a16b,2024-10-04T13:51:25.567000 CVE-2024-0117,0,0,84b7d2152c61433ae8112e32e5f606da7b00d4d29b6701eb589483940b681c6f,2024-11-21T08:45:55.250000 @@ -243454,6 +243455,7 @@ CVE-2024-0137,0,0,81bf66fb14b39da555a4d311dc1e072621ee9f6fdd9b89b32897086011f9e7 CVE-2024-0138,0,0,46b8bd281343bee2ec8e5c4452aa2b9e0b3ce4964c0c71b43db0559960702d7e,2024-11-23T00:15:04.367000 CVE-2024-0139,0,0,97175888b963c6f6c4d9af1853169dc46a253002be2bfcb37fc1cbdc17d01939,2024-12-06T20:15:23.763000 CVE-2024-0140,0,0,b1c3d4b9e03087faeab3c6b32b57a2d8e93481139427d7ea4f9e253833a83c15,2025-01-28T04:15:08.730000 +CVE-2024-0141,1,1,84b00f25b6997f819af1aca9f8be51293f801f978ea0baacd055d7bf18cf772d,2025-03-05T02:15:35.990000 CVE-2024-0142,0,0,ab91e4f89023d5fa0e0918df6d387ffb7317705e556bb93dc7ee303e05180788,2025-02-12T01:15:08.230000 CVE-2024-0143,0,0,373bc5cf4b7b47e3878a4267a11415b51c043adff18c18154b4310affb61efbf,2025-02-12T02:15:09.253000 CVE-2024-0144,0,0,62b9924272d497b69906b0eab483f0a669dd3b052ae52931761b3c04972ef923,2025-02-12T18:15:20.557000 @@ -271483,7 +271485,7 @@ CVE-2024-50299,0,0,0c281bf670f28202ecab6b493ed49cc5ea5a6c8ca6e18d28c043e1650410b CVE-2024-5030,0,0,d7a01f140218cc5d3b4d9bb19a90752f3ec5a691714edb3528e20e3690587947,2024-11-18T17:11:17.393000 CVE-2024-50300,0,0,7e61bc5452e3c6bf0816fa7f8abf13f64ca5a49dc8874af50150a20d37ed3a6f,2024-11-21T21:11:32.137000 CVE-2024-50301,0,0,7bf644bb8af063938e3e18dc42072a8ce6618f64a2658105524913b296306adf,2024-11-21T20:53:03.823000 -CVE-2024-50302,0,0,82eea98db766b4db301e733c34485a9be7ab0356b12c0e8570ec165be8b4c59d,2025-03-04T16:15:35.280000 +CVE-2024-50302,0,1,6a030282f4d61849e6392e1644f5568b4bdfbd5968406e9369851a6137e58404,2025-03-05T02:00:02.390000 CVE-2024-50303,0,0,bc6cc55b32c0f00ab508749d7c62fbc3dbe6ae3c9749209c3284b75426b67658,2024-11-27T21:29:30.267000 CVE-2024-50304,0,0,eeeaee5732dfb12e1aae063256882bc4dd20d6bc10a6f629b1d14550d165b8e7,2025-02-02T11:15:11.207000 CVE-2024-50305,0,0,50fd3aee61add01e589f37a9c6d29b7fd91b0375b90c41822a3e9396b3202d7a,2024-11-15T13:58:08.913000 @@ -280752,7 +280754,7 @@ CVE-2025-1300,0,0,8af8030eda5bcffd3329ecb9ab76f19bacf9a248f66c16097998067a1fef5d CVE-2025-1302,0,0,4c600c674f22378513ee28ce145975f04e5b0e89605ff80d937b77394d750b70,2025-02-15T05:15:11.683000 CVE-2025-1306,0,0,c815f9214bfa0f9103e9c9589a2152e369fe587367a69e9ba80dc350749ba81b,2025-03-04T05:15:13.590000 CVE-2025-1307,0,0,772431524fea13dc6d4f62c6ce6ee7e302de8db818ceb219340d02b934bfb44b,2025-03-04T05:15:14.233000 -CVE-2025-1316,1,1,f932f98d5a32b1e0c223e88762610c5952375892982b9e178aa7ca013cbd0ec3,2025-03-05T00:15:35.057000 +CVE-2025-1316,0,0,f932f98d5a32b1e0c223e88762610c5952375892982b9e178aa7ca013cbd0ec3,2025-03-05T00:15:35.057000 CVE-2025-1319,0,0,5e2010b65b7a6bd1939d4ac58e8aeeec8f3a828211b9c76b062b0f9265a18963,2025-02-28T13:15:27.267000 CVE-2025-1321,0,0,fe193fa44353594440aac216be48f78f1d1914788baa79c358bb03fb8eb369f9,2025-03-04T04:15:11.547000 CVE-2025-1328,0,0,e2b9ad996048bde72d17ec9a6affa826b875b275e51ef749199b511eae0ab088,2025-02-25T18:03:46.410000 @@ -281033,20 +281035,20 @@ CVE-2025-1904,0,0,67789ecf25a3a069ead16fcfc4d62d28da2bab19c41d0fefbcf5c0a48757e2 CVE-2025-1905,0,0,96b71a21d0d8fc3a56947eb8c835bfa740c8bb7b678faabc75b6ff6682fc8368,2025-03-04T15:15:24.033000 CVE-2025-1906,0,0,50fb789742a4cb14c8bf4cadc940496288485e869e115b1312bb9ddc6bd1a640,2025-03-04T15:15:24.233000 CVE-2025-1925,0,0,3555443c31b069f7d334eccd429471a153bc502fbca36c5565b567a1b55d2fd9,2025-03-04T14:15:36.717000 -CVE-2025-1930,0,1,89cdd0943883dc9e142ebc3c06e7538620eaf1f97fe6d2da84f7fbe8ac0aedc9,2025-03-05T00:15:36.133000 -CVE-2025-1931,0,1,b5e38c0da3bd8580a8ad8790659a66faed6e8c8f7d9210cfe046349c16f0890a,2025-03-05T00:15:36.227000 -CVE-2025-1932,0,1,3b32c1102832d0715d404745294706e7b7d7e3b874c1ef4c9ed7f047a9dcc442,2025-03-05T00:15:36.320000 -CVE-2025-1933,0,1,04dc26cfd0f75d21b5341faee8a41387b97852f82dfb1cd03c11f7e09550a4b7,2025-03-05T00:15:36.470000 -CVE-2025-1934,0,1,cd5eff38b24f1fa502035f9e79330314aca9fb79b8724cccecf4d68784b92f14,2025-03-05T00:15:36.617000 -CVE-2025-1935,0,1,fb86c9f6eef9a8703fc816d168d1def680a59a027e40e369c2943d2fcdf997f4,2025-03-05T00:15:36.770000 -CVE-2025-1936,0,1,51fc94e6e2a1280fcbb69e822739d7bb32e7846d1325b95219b96459d930c164,2025-03-05T00:15:36.913000 -CVE-2025-1937,0,1,0817cf3af5da44d15b822f9c1b2172d68ca6ebd43919872b944d4488851b0901,2025-03-05T00:15:37.010000 -CVE-2025-1938,0,1,7704ed14aab0b091939626ff0ff752796e4de69d5616ed3955e897aad92c1f35,2025-03-05T00:15:37.097000 +CVE-2025-1930,0,0,89cdd0943883dc9e142ebc3c06e7538620eaf1f97fe6d2da84f7fbe8ac0aedc9,2025-03-05T00:15:36.133000 +CVE-2025-1931,0,0,b5e38c0da3bd8580a8ad8790659a66faed6e8c8f7d9210cfe046349c16f0890a,2025-03-05T00:15:36.227000 +CVE-2025-1932,0,0,3b32c1102832d0715d404745294706e7b7d7e3b874c1ef4c9ed7f047a9dcc442,2025-03-05T00:15:36.320000 +CVE-2025-1933,0,0,04dc26cfd0f75d21b5341faee8a41387b97852f82dfb1cd03c11f7e09550a4b7,2025-03-05T00:15:36.470000 +CVE-2025-1934,0,0,cd5eff38b24f1fa502035f9e79330314aca9fb79b8724cccecf4d68784b92f14,2025-03-05T00:15:36.617000 +CVE-2025-1935,0,0,fb86c9f6eef9a8703fc816d168d1def680a59a027e40e369c2943d2fcdf997f4,2025-03-05T00:15:36.770000 +CVE-2025-1936,0,0,51fc94e6e2a1280fcbb69e822739d7bb32e7846d1325b95219b96459d930c164,2025-03-05T00:15:36.913000 +CVE-2025-1937,0,0,0817cf3af5da44d15b822f9c1b2172d68ca6ebd43919872b944d4488851b0901,2025-03-05T00:15:37.010000 +CVE-2025-1938,0,0,7704ed14aab0b091939626ff0ff752796e4de69d5616ed3955e897aad92c1f35,2025-03-05T00:15:37.097000 CVE-2025-1939,0,0,5423b6d57bde27103afefd0147e6a27b92b6f89c451bc13e8b0c4b336560932e,2025-03-04T14:15:38.837000 CVE-2025-1940,0,0,2da52b7ef01c0ebae181d033a25f813d405367fc27b9ab2f5ece7671de559246,2025-03-04T16:15:38.310000 CVE-2025-1941,0,0,c755e145fc658d9d2d1958c16a11cb393d3d6769dff8808a148cf5adfb9a5e27,2025-03-04T16:15:38.457000 -CVE-2025-1942,0,1,753070f9011342be1a2e87e1c54f2be8ff4b2a8bc333a4cd46301bd2f87bd395,2025-03-05T00:15:37.247000 -CVE-2025-1943,0,1,93769e7b2931514f0c8b90f2e9734aa6535ce40ff2146635c764b984a51ce726,2025-03-05T00:15:37.400000 +CVE-2025-1942,0,0,753070f9011342be1a2e87e1c54f2be8ff4b2a8bc333a4cd46301bd2f87bd395,2025-03-05T00:15:37.247000 +CVE-2025-1943,0,0,93769e7b2931514f0c8b90f2e9734aa6535ce40ff2146635c764b984a51ce726,2025-03-05T00:15:37.400000 CVE-2025-1946,0,0,b26757e80aca8a4f5ec7f4ff9aaba5088b8b42ad89c42ebb5651e188ffb3ed38,2025-03-04T19:15:37.583000 CVE-2025-1947,0,0,9d8514f993785be2f20f4da03dfcd4529cbec458d034f07a472d77128df9bea8,2025-03-04T19:15:37.760000 CVE-2025-1949,0,0,593191d98ebb76e2b2ee9726e4b95d01280d2edb66962598c34919bd2cddb8f0,2025-03-04T20:15:37.410000 @@ -281057,12 +281059,16 @@ CVE-2025-1955,0,0,37a5842ab02dcbdf807bbf6b0629cfaa7bc44f4f542caddab49f2045e2592b CVE-2025-1956,0,0,aabfb638f3cdf7e7d2199087c7d972926788b7e97818ee83eac85710d242b360,2025-03-04T22:15:39.867000 CVE-2025-1957,0,0,7f6f3b45364dccaebd986ed12f67b5d7457c4295eb866cfa685a6fc446d6afb2,2025-03-04T22:15:40.040000 CVE-2025-1958,0,0,619bed4d75a15053f3aac5475d86341822d0cd5f222710eba99a248d83ce8b5d,2025-03-04T22:15:40.210000 -CVE-2025-1959,1,1,9d8676fc512d4ebd32698dcf5e1427729182b6be21e1286eabe5a5fd753c8b41,2025-03-04T23:15:10.507000 -CVE-2025-1961,1,1,9e70e856851ce821d28e595aa7eb232d22a2f1598d80232c2dfbe9955aeb8530,2025-03-04T23:15:10.717000 -CVE-2025-1962,1,1,2f5f3cb494705637cf4dfe7215b0b63905c31e67fe2442f500c19b1fc8e3bec8,2025-03-05T00:15:37.540000 -CVE-2025-1963,1,1,ae4db31776c2043c41d80624a85ed9cdbbe71f48764d851cdd9b83ee7498b17e,2025-03-05T00:15:37.723000 +CVE-2025-1959,0,0,9d8676fc512d4ebd32698dcf5e1427729182b6be21e1286eabe5a5fd753c8b41,2025-03-04T23:15:10.507000 +CVE-2025-1961,0,0,9e70e856851ce821d28e595aa7eb232d22a2f1598d80232c2dfbe9955aeb8530,2025-03-04T23:15:10.717000 +CVE-2025-1962,0,0,2f5f3cb494705637cf4dfe7215b0b63905c31e67fe2442f500c19b1fc8e3bec8,2025-03-05T00:15:37.540000 +CVE-2025-1963,0,0,ae4db31776c2043c41d80624a85ed9cdbbe71f48764d851cdd9b83ee7498b17e,2025-03-05T00:15:37.723000 +CVE-2025-1964,1,1,07710436d9e737e6da480fa71767564d9bba5024aeb8fd1d210868a19af62be9,2025-03-05T01:15:10.020000 +CVE-2025-1965,1,1,4732c5ee4081d479acbc10d6bb941ea388b81420e39e5c81488b45ad9f9bb7ab,2025-03-05T01:15:11.600000 +CVE-2025-1966,1,1,e6e749c04982f30acdf59aade6e0f7c88ccd923cdf2374879c211391ea776872,2025-03-05T02:15:36.157000 +CVE-2025-1967,1,1,b20ac9c31f423689ed3bec468ad68a64b0cde468e389b0543651d57ec4aaed89,2025-03-05T02:15:36.320000 CVE-2025-1969,0,0,06a782c53158bfcfa719a54832f6c914b6b8cf10ad0fb557e3dedb429cf5a384,2025-03-04T19:15:38.290000 -CVE-2025-20002,1,1,2bccd9ef008596859abc4b0349462cb16836a7cb045dcda2e77e2e2faea7a70c,2025-03-05T00:15:37.910000 +CVE-2025-20002,0,0,2bccd9ef008596859abc4b0349462cb16836a7cb045dcda2e77e2e2faea7a70c,2025-03-05T00:15:37.910000 CVE-2025-20011,0,0,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000 CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 @@ -281184,7 +281190,7 @@ CVE-2025-21087,0,0,28561df062c57bddb73cb1503a50933afccce81ed6c2872e01fa7d13e8dbf CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000 CVE-2025-21089,0,0,e738ca8aba977772b86ebd3ae454f771f8037c092c0a97f070d66bd278ffae75,2025-03-04T04:15:13.680000 CVE-2025-21091,0,0,c802a7b25882d42a090b27badb1537fcdda8854c4d36451323648d734d1e16cc,2025-02-05T18:15:30.613000 -CVE-2025-21092,1,1,140b3fe8a31460f6705b94bca92c1cb8e7389d9fdc0b822b07be6f1b43759d3a,2025-03-05T00:15:38.080000 +CVE-2025-21092,0,0,140b3fe8a31460f6705b94bca92c1cb8e7389d9fdc0b822b07be6f1b43759d3a,2025-03-05T00:15:38.080000 CVE-2025-21097,0,0,da0506b0f8f381393fdc99df275174ef6f455eaaace2f30a63e7d5c90c865651,2025-03-04T04:15:13.813000 CVE-2025-21098,0,0,a193a406b493161331e8c0047ba76e17ef891d131b44cddf900c465d6f51a0c8,2025-03-04T04:15:13.953000 CVE-2025-21101,0,0,0410baf8ce887e4bee4e642f5416b4c957a9c2a93d873e61b46c5aa6fe5ccada,2025-02-04T15:50:56.233000 @@ -281797,9 +281803,9 @@ CVE-2025-22219,0,0,b49955fb2ad7bfd00b8dfa99078cc886448cbbcd0b573429971407c26bc29 CVE-2025-22220,0,0,a00b168f73aec469e4c78128ddc9ae91feb9fbb9ddcfb4c72ca05c1c287f029b,2025-02-06T14:15:30.510000 CVE-2025-22221,0,0,9ab8cb2916b1d2add27df50f24514c36d0740b88ba103377a1c3f59422214b6c,2025-01-30T16:15:31.257000 CVE-2025-22222,0,0,f96218f2ce820065976bcd4294c5a9c60e0f54f4e21cd14eff22d95b2b98eb7e,2025-01-30T16:15:31.367000 -CVE-2025-22224,0,0,e21bec5f866401de662166c9a38834c24983344adc02e4da91a31b9bd3dcd08f,2025-03-04T16:15:38.850000 -CVE-2025-22225,0,0,958bcb03393c9157b6f9f2052f0e3673f3a8a9e289593bb7a83203a4421a58c4,2025-03-04T16:15:38.970000 -CVE-2025-22226,0,0,a442f734f8505f20ee7da05274b2e61f3c862a1ce05fbeb66184989e568ab230,2025-03-04T16:15:39.097000 +CVE-2025-22224,0,1,c2403c2742a159c1e2c9973786ad605e2d5c93ca94ab1632e7681ce44569f865,2025-03-05T02:00:02.390000 +CVE-2025-22225,0,1,71cc694e144dc30a95b6d0305971776ba2edb9e51c96b4e9a8d6d9ff16755ab7,2025-03-05T02:00:02.390000 +CVE-2025-22226,0,1,a50659e22e83e1afe376a7ef22a5f190dea0a173759444c6e00ed23a4b662b87,2025-03-05T02:00:02.390000 CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000 CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000 CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000 @@ -282366,7 +282372,7 @@ CVE-2025-23403,0,0,644047de2ce1ffb265b5a42cecfc2f854cd0e7552ab44d86c93242e1e0442 CVE-2025-23405,0,0,1d766bc4849324d5a2aa10241aa29cfa3fa9dddb8599893bc0ba377c47067ae6,2025-02-28T17:15:16.637000 CVE-2025-23406,0,0,38d5c87f4e786637cbc4fcb4a2f7006ad80927b3c7219b037e30cf1414c39e8c,2025-02-14T05:15:12.567000 CVE-2025-23409,0,0,06262ad791ce570937296bcb697070013ba33b5198b3c057b85c061f90b04a2b,2025-03-04T17:12:06.513000 -CVE-2025-23410,1,1,ecd8d3e44f5447663b8e3b5eb2bf22d89443e28b7e8e3ad33afc602f84c50835,2025-03-05T00:15:38.250000 +CVE-2025-23410,0,0,ecd8d3e44f5447663b8e3b5eb2bf22d89443e28b7e8e3ad33afc602f84c50835,2025-03-05T00:15:38.250000 CVE-2025-23411,0,0,873449632c5f07c04f0012ee0ce445b82ec9d7b013c9b4a2a560f053a421fd92,2025-03-04T20:59:05.417000 CVE-2025-23412,0,0,879dc1f233cd1ed0927b887a0c257bb01d6c254311c7a39c5817d5ae0b0fbc54,2025-02-05T18:15:31.580000 CVE-2025-23413,0,0,5d8a681b56b331debf19dc9f08d08646859aabde28ec61411300a927339c1e48,2025-02-05T18:15:31.930000 @@ -283366,7 +283372,7 @@ CVE-2025-24903,0,0,f94c50d2f0574a93b5b48805712360c1af6392fea087d65c2ed61830aedff CVE-2025-24904,0,0,922b25d3a9b426b643b71230fe8a3d6600552e09598c6cd6bc1bcb32f760c1d1,2025-02-13T16:16:49.053000 CVE-2025-24905,0,0,a12cf1d4a84b7dfc2fc6ddf401dddb1af801de5f0e459b8125fad6e258d821aa,2025-02-13T19:00:37.593000 CVE-2025-24906,0,0,c4750456c80f4de3a8d1ced568cbceb00ad477041c107087bb6724cafda48816,2025-02-13T18:59:59.940000 -CVE-2025-24924,1,1,790c4102f7a13d61ef63cf8baa9bb4ffd44208fa79207e81feb3553f3b76b500,2025-03-05T00:15:38.423000 +CVE-2025-24924,0,0,790c4102f7a13d61ef63cf8baa9bb4ffd44208fa79207e81feb3553f3b76b500,2025-03-05T00:15:38.423000 CVE-2025-24928,0,0,8e9335012d42a7d487e5f9921ea54f865e117f9248798a001634be5429fb2b4a,2025-02-18T23:15:10.250000 CVE-2025-24946,0,0,6cbcc6ed12b7350bc1e3ba362180af6c5ebed1ea35a0fb612c7c5af9a1e19fef,2025-02-20T03:15:12.800000 CVE-2025-24947,0,0,0710d5740f5af2ba6f51dfd5917029f75791b75ba51884293887edaa47dfb4bd,2025-02-20T03:15:12.943000 @@ -284099,7 +284105,7 @@ CVE-2025-27399,0,0,2891c688c24ccac3deb5afdb6da61c4526a1d43fbc384fe64492b9e930958 CVE-2025-27400,0,0,cdbf04b984faf2bb61d60f663ecdfdd44190b0515d3b8d47c87701b41ec06666,2025-02-28T16:15:40.237000 CVE-2025-27401,0,0,22ed82e05b27dccaeb90eea83d4f38739be0a524ed60e6011b6797fb1c5104a8,2025-03-04T17:15:19.547000 CVE-2025-27402,0,0,19a0d72c136a10b841041721ff7160479f8f3faf7c693bab048416133a6a67a3,2025-03-04T17:15:19.703000 -CVE-2025-27408,0,1,93737553abae903ea76018e61e22703521d366acf436a7c85e20d8d3f4423a3a,2025-03-04T23:15:10.897000 +CVE-2025-27408,0,0,93737553abae903ea76018e61e22703521d366acf436a7c85e20d8d3f4423a3a,2025-03-04T23:15:10.897000 CVE-2025-27410,0,0,622f5e65362d03d0ed561fcc081614d728b6f23a5af908c6c614a85e8709a2df,2025-03-04T21:15:14.197000 CVE-2025-27413,0,0,66f5e580a6d62dac3e1a8081e71a88e4497308b17c07d32439f0a0f6705b5196,2025-03-04T21:15:14.303000 CVE-2025-27414,0,0,dade89b00ff438afc3d75db3405cd2399cd0f72f2b40e361d9e8e1ad3c96ce6b,2025-02-28T21:15:27.957000