From a2b94f38b5a8b28c5cda16b67f44a19c76c440d1 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 17 Feb 2025 03:04:15 +0000 Subject: [PATCH] Auto-Update: 2025-02-17T03:00:45.842199+00:00 --- CVE-2025/CVE-2025-13xx/CVE-2025-1366.json | 137 +++++++++++++++++++++ CVE-2025/CVE-2025-13xx/CVE-2025-1367.json | 137 +++++++++++++++++++++ CVE-2025/CVE-2025-13xx/CVE-2025-1368.json | 137 +++++++++++++++++++++ CVE-2025/CVE-2025-13xx/CVE-2025-1369.json | 141 ++++++++++++++++++++++ README.md | 35 ++---- _state.csv | 46 +++---- 6 files changed, 586 insertions(+), 47 deletions(-) create mode 100644 CVE-2025/CVE-2025-13xx/CVE-2025-1366.json create mode 100644 CVE-2025/CVE-2025-13xx/CVE-2025-1367.json create mode 100644 CVE-2025/CVE-2025-13xx/CVE-2025-1368.json create mode 100644 CVE-2025/CVE-2025-13xx/CVE-2025-1369.json diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1366.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1366.json new file mode 100644 index 00000000000..520364e097f --- /dev/null +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1366.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-1366", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-17T01:15:10.280", + "lastModified": "2025-02-17T01:15:10.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux and classified as critical. Affected by this issue is the function strcpy of the component VirusPopUp. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295970", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295970", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1367.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1367.json new file mode 100644 index 00000000000..96e46759f7f --- /dev/null +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1367.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-1367", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-17T01:15:11.090", + "lastModified": "2025-02-17T01:15:11.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux. It has been classified as critical. This affects the function sprintf of the component USB Password Handler. The manipulation leads to buffer overflow. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295971", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295971", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1368.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1368.json new file mode 100644 index 00000000000..470f5ff8699 --- /dev/null +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1368.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-1368", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-17T02:15:08.643", + "lastModified": "2025-02-17T02:15:08.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux. It has been declared as problematic. This vulnerability affects the function ReadConfiguration of the file /opt/MicroWorld/etc/mwav.conf. The manipulation of the argument BasePath leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:M/C:N/I:N/A:P", + "baseScore": 1.4, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 2.5, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295972", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295972", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1369.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1369.json new file mode 100644 index 00000000000..50c1cedb9e7 --- /dev/null +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1369.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1369", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-17T02:15:08.830", + "lastModified": "2025-02-17T02:15:08.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in MicroWord eScan Antivirus 7.0.32 on Linux. Affected by this vulnerability is an unknown functionality of the component USB Password Handler. The manipulation leads to os command injection. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:H/Au:S/C:P/I:P/A:P", + "baseScore": 3.5, + "accessVector": "LOCAL", + "accessComplexity": "HIGH", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 1.5, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295975", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295975", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.496482", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 4a140b68d8f..70741762245 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-17T00:55:19.792855+00:00 +2025-02-17T03:00:45.842199+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-17T00:15:09.140000+00:00 +2025-02-17T02:15:08.830000+00:00 ``` ### Last Data Feed Release @@ -27,40 +27,23 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-02-16T01:00:10.105689+00:00 +2025-02-17T01:00:04.521937+00:00 ``` ### Total Number of included CVEs ```plain -281512 +281516 ``` ### CVEs added in the last Commit -Recently added CVEs: `21` +Recently added CVEs: `4` -- [CVE-2024-44044](CVE-2024/CVE-2024-440xx/CVE-2024-44044.json) (`2025-02-16T23:15:08.907`) -- [CVE-2025-0591](CVE-2025/CVE-2025-05xx/CVE-2025-0591.json) (`2025-02-17T00:15:08.987`) -- [CVE-2025-1364](CVE-2025/CVE-2025-13xx/CVE-2025-1364.json) (`2025-02-16T23:15:09.087`) -- [CVE-2025-1365](CVE-2025/CVE-2025-13xx/CVE-2025-1365.json) (`2025-02-17T00:15:09.140`) -- [CVE-2025-22284](CVE-2025/CVE-2025-222xx/CVE-2025-22284.json) (`2025-02-16T23:15:09.280`) -- [CVE-2025-22286](CVE-2025/CVE-2025-222xx/CVE-2025-22286.json) (`2025-02-16T23:15:09.427`) -- [CVE-2025-22289](CVE-2025/CVE-2025-222xx/CVE-2025-22289.json) (`2025-02-16T23:15:09.567`) -- [CVE-2025-22290](CVE-2025/CVE-2025-222xx/CVE-2025-22290.json) (`2025-02-16T23:15:09.713`) -- [CVE-2025-22291](CVE-2025/CVE-2025-222xx/CVE-2025-22291.json) (`2025-02-16T23:15:09.877`) -- [CVE-2025-22676](CVE-2025/CVE-2025-226xx/CVE-2025-22676.json) (`2025-02-16T23:15:10.037`) -- [CVE-2025-22680](CVE-2025/CVE-2025-226xx/CVE-2025-22680.json) (`2025-02-16T23:15:10.183`) -- [CVE-2025-22689](CVE-2025/CVE-2025-226xx/CVE-2025-22689.json) (`2025-02-16T23:15:10.330`) -- [CVE-2025-23975](CVE-2025/CVE-2025-239xx/CVE-2025-23975.json) (`2025-02-16T23:15:10.477`) -- [CVE-2025-26755](CVE-2025/CVE-2025-267xx/CVE-2025-26755.json) (`2025-02-16T23:15:10.627`) -- [CVE-2025-26759](CVE-2025/CVE-2025-267xx/CVE-2025-26759.json) (`2025-02-16T23:15:10.777`) -- [CVE-2025-26761](CVE-2025/CVE-2025-267xx/CVE-2025-26761.json) (`2025-02-16T23:15:10.920`) -- [CVE-2025-26765](CVE-2025/CVE-2025-267xx/CVE-2025-26765.json) (`2025-02-16T23:15:11.063`) -- [CVE-2025-26766](CVE-2025/CVE-2025-267xx/CVE-2025-26766.json) (`2025-02-16T23:15:11.207`) -- [CVE-2025-26767](CVE-2025/CVE-2025-267xx/CVE-2025-26767.json) (`2025-02-16T23:15:11.350`) -- [CVE-2025-26768](CVE-2025/CVE-2025-267xx/CVE-2025-26768.json) (`2025-02-16T23:15:11.487`) -- [CVE-2025-26779](CVE-2025/CVE-2025-267xx/CVE-2025-26779.json) (`2025-02-16T23:15:11.630`) +- [CVE-2025-1366](CVE-2025/CVE-2025-13xx/CVE-2025-1366.json) (`2025-02-17T01:15:10.280`) +- [CVE-2025-1367](CVE-2025/CVE-2025-13xx/CVE-2025-1367.json) (`2025-02-17T01:15:11.090`) +- [CVE-2025-1368](CVE-2025/CVE-2025-13xx/CVE-2025-1368.json) (`2025-02-17T02:15:08.643`) +- [CVE-2025-1369](CVE-2025/CVE-2025-13xx/CVE-2025-1369.json) (`2025-02-17T02:15:08.830`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 2e78650e04e..7ad6701865f 100644 --- a/_state.csv +++ b/_state.csv @@ -265987,7 +265987,7 @@ CVE-2024-44040,0,0,74b42965e6e3986525fc77deeb0ef094e32ece4aff2cecb84f707822891ab CVE-2024-44041,0,0,40e1db2f65bd9a020f30713b0d9178a6e32ba90a0e086503a110d2a28adbf345,2024-10-07T17:47:48.410000 CVE-2024-44042,0,0,1d7bbe5f51b27e09708cc24f3986a913e72fd98931fb78d44a1cf4aa3f2fbbd6,2024-10-07T17:47:48.410000 CVE-2024-44043,0,0,5a54ccce540366e3100b03336264da52bbe72223a1a384e61c57b8debae86b18,2024-10-07T17:47:48.410000 -CVE-2024-44044,1,1,30d88de66e10ebcca8605da4e27c74f33057a2361f9e858f4983b46086f05c64,2025-02-16T23:15:08.907000 +CVE-2024-44044,0,0,30d88de66e10ebcca8605da4e27c74f33057a2361f9e858f4983b46086f05c64,2025-02-16T23:15:08.907000 CVE-2024-44045,0,0,e30add326efb0689032d9e1291ab1ceb0e7cee7d7cad42f2447eb76eafa4c869,2024-10-07T17:47:48.410000 CVE-2024-44046,0,0,8cb28132dcb52c0f855cf896fc0277479d6e2fdc4d9679affa04a96ae7375ecf,2024-10-07T17:47:48.410000 CVE-2024-44047,0,0,55ccceb367f56cca0478fcf20023ed31752b3102ce8e00f651967b31bd809ce5,2024-09-24T22:05:25.723000 @@ -278950,7 +278950,7 @@ CVE-2025-0586,0,0,c173218ec5f02f93feb0d4cf939be10f56c7035ad9f75a3f6402979497f3b4 CVE-2025-0588,0,0,d2fa85707b0a520f26e49cd106b0316ac9358a5318ae8c21637a975b482ec3aa,2025-02-11T15:15:19.673000 CVE-2025-0589,0,0,011f5314ba330effc1b70ac831c8799f8f01d30011f03d50ea7f87b83c919e4c,2025-02-11T16:15:49.667000 CVE-2025-0590,0,0,95827083638699773bc7292ef6b29aa078951517d7ac26deb9bb9819d19a8b52,2025-01-21T15:15:14.117000 -CVE-2025-0591,1,1,108a322fc8864bf59143171a497126c3fae4b8bc99c96e929cad289a15c67aa9,2025-02-17T00:15:08.987000 +CVE-2025-0591,0,0,108a322fc8864bf59143171a497126c3fae4b8bc99c96e929cad289a15c67aa9,2025-02-17T00:15:08.987000 CVE-2025-0592,0,0,9c3e5d0ff9cc82391565af486c296ae6493bbd4a2a7ae16e355a2a28eaf964e2,2025-02-14T21:15:16.543000 CVE-2025-0593,0,0,c6a547b5cc74d50c18b27627e5aae76ed907e58cd955b960e2bc11cb240d5378,2025-02-14T21:15:16.680000 CVE-2025-0604,0,0,dc946f3b45eac1c2c9970fb51178c4296c8c05d608ff98e71aad731de2b62daa,2025-01-22T15:15:14.827000 @@ -279292,8 +279292,12 @@ CVE-2025-1357,0,0,4433e1005a5e4201fdc796c40c8e7b39186d5a371766813fcd3008d782d857 CVE-2025-1358,0,0,9ec04afb65270064953f92f1f98c94b6c7f923699eb2bc5c685de93fafaa422a,2025-02-16T20:15:07.990000 CVE-2025-1359,0,0,a74490df0bf9cd453b684197a6da2b817f973233464d2e18244cbcb76e58d0cd,2025-02-16T20:15:08.817000 CVE-2025-1360,0,0,fb0d3aa81a9aae261cf8bbfc32f9a1a37cc5f63f6b37722c4b26a02ea0975887,2025-02-16T21:15:09.970000 -CVE-2025-1364,1,1,6c9a498ed4da91fc543c9e0d0bc6b549f91692b353d2222b29ef08d5dcc47090,2025-02-16T23:15:09.087000 -CVE-2025-1365,1,1,266b893d22f80eeaffc950fc5e5107cbf76b85b1dd425ff9e622ab0ee02beb92,2025-02-17T00:15:09.140000 +CVE-2025-1364,0,0,6c9a498ed4da91fc543c9e0d0bc6b549f91692b353d2222b29ef08d5dcc47090,2025-02-16T23:15:09.087000 +CVE-2025-1365,0,0,266b893d22f80eeaffc950fc5e5107cbf76b85b1dd425ff9e622ab0ee02beb92,2025-02-17T00:15:09.140000 +CVE-2025-1366,1,1,27d217412c230d14f7fea472a75295f779bc457c8773cd971395f03e9546e238,2025-02-17T01:15:10.280000 +CVE-2025-1367,1,1,be3e2e7e8bc50994880767084f7efe0b9708429f4c915e622468e6ae36e6b75a,2025-02-17T01:15:11.090000 +CVE-2025-1368,1,1,8de8d22a348a0d6be64b55129b3485441b0f1e6bc73acc4c117f2e997dd51924,2025-02-17T02:15:08.643000 +CVE-2025-1369,1,1,ed44e9f7f84e102627e261ff1b5ad37af5334bc9499494cb5f4f8b1dda618055,2025-02-17T02:15:08.830000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000 @@ -279866,11 +279870,11 @@ CVE-2025-22265,0,0,51006a5fb12dad2a881e7b25e5673794091472c79149c473510be2ae25b43 CVE-2025-22267,0,0,f20afa71bc4d80e805bd92045ab58754dc4544d5a2500dd19c3f675f1704780a,2025-01-21T18:15:15.100000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000 -CVE-2025-22284,1,1,b4bba2f887fee4bfdb2af344b89b13eaf225c237a8dd321f1b42e5bea3b2bd75,2025-02-16T23:15:09.280000 -CVE-2025-22286,1,1,5ba2132f63de2bf6bf17c54a7abd6a97c5204d9dc24b1842120329793c4bb4fe,2025-02-16T23:15:09.427000 -CVE-2025-22289,1,1,e8af2ef048e85afd8c9fcf9616e053c47d8b638d34a72304e5531e6ce2744277,2025-02-16T23:15:09.567000 -CVE-2025-22290,1,1,4c77257ac665fbe18fc587c52e2a8624f9d87a9dc7a3d3829754b7863ff2b7d9,2025-02-16T23:15:09.713000 -CVE-2025-22291,1,1,364f00d902f60116ab8199384bd27f18167d0647d6ccec59e6b0460ad6388b23,2025-02-16T23:15:09.877000 +CVE-2025-22284,0,0,b4bba2f887fee4bfdb2af344b89b13eaf225c237a8dd321f1b42e5bea3b2bd75,2025-02-16T23:15:09.280000 +CVE-2025-22286,0,0,5ba2132f63de2bf6bf17c54a7abd6a97c5204d9dc24b1842120329793c4bb4fe,2025-02-16T23:15:09.427000 +CVE-2025-22289,0,0,e8af2ef048e85afd8c9fcf9616e053c47d8b638d34a72304e5531e6ce2744277,2025-02-16T23:15:09.567000 +CVE-2025-22290,0,0,4c77257ac665fbe18fc587c52e2a8624f9d87a9dc7a3d3829754b7863ff2b7d9,2025-02-16T23:15:09.713000 +CVE-2025-22291,0,0,364f00d902f60116ab8199384bd27f18167d0647d6ccec59e6b0460ad6388b23,2025-02-16T23:15:09.877000 CVE-2025-22292,0,0,0a179a28798372b1354b5887532a0aacfe8816e7abd0dc207ba7b50b06093bc5,2025-02-03T15:15:17.677000 CVE-2025-22293,0,0,0fb85e30408666f4049ff5e391f5eb0edea1a607b8157160cd5e0e00489520e9,2025-01-07T11:15:13.473000 CVE-2025-22294,0,0,fd3c530f54ed4c49be0865300ce0d8ca3b1fb9d97860cd5c24499f717ff48c10,2025-01-07T16:15:41.137000 @@ -280087,10 +280091,10 @@ CVE-2025-22662,0,0,363ea558957e3bdb271052a7801a86f0c9144f81d93f9854d0b61c8e7e038 CVE-2025-22664,0,0,19244507eb29893abee53f2e797f7ecbb2a6d2c1a4728c376e350b0c5fed8013,2025-02-04T15:15:21.003000 CVE-2025-22674,0,0,0c35af0dffe00295a65386d34bb04dddae41b630414ae20c2c18bbe06138c2fe,2025-02-04T15:15:21.227000 CVE-2025-22675,0,0,f84d6dc34bd46b2e548b47dc483c92eb38045e589cc60bf4100137c2e23e2d7f,2025-02-04T15:15:21.433000 -CVE-2025-22676,1,1,48e02aaad355c0bdb0907a6c2df25f41b0f21c07115005edeae3afc845a9abfa,2025-02-16T23:15:10.037000 +CVE-2025-22676,0,0,48e02aaad355c0bdb0907a6c2df25f41b0f21c07115005edeae3afc845a9abfa,2025-02-16T23:15:10.037000 CVE-2025-22677,0,0,56fc462ed8efabd49ce1f0e6a2628b8d9f5f9d1ccf265bfcaae01089635695f7,2025-02-03T15:15:17.827000 CVE-2025-22679,0,0,2f277aaa5fffe9654d22cc8647fce7a692ea020ff267ecc8af7b0ff370e0d5e1,2025-02-03T15:15:17.980000 -CVE-2025-22680,1,1,5cb3ecb75be0eadcbe65062db3cf58ca5282cca85735608b6507a64e06bf2290,2025-02-16T23:15:10.183000 +CVE-2025-22680,0,0,5cb3ecb75be0eadcbe65062db3cf58ca5282cca85735608b6507a64e06bf2290,2025-02-16T23:15:10.183000 CVE-2025-22681,0,0,c6253ce9e47d2abb4a9c5ac568731bc49b4a1189b4d90c246688c3e0c830614f,2025-02-03T15:15:18.127000 CVE-2025-22682,0,0,e77a6f2b7a3ad5225b4f62f23b09f955535ba4028e42f80eba37f5290ba6dd2e,2025-02-03T15:15:18.270000 CVE-2025-22683,0,0,a8b81acc9187a933d45ffdb39d80319520ea252f8849dd50e1ad8e1b88f28b14,2025-02-03T15:15:18.440000 @@ -280098,7 +280102,7 @@ CVE-2025-22684,0,0,4c0faff6a51bf22c6057b965974a65d8b3cdec97cab52f5d2b607780797a5 CVE-2025-22685,0,0,0aca1e462c147586a6ae88d5cff70e9389d5f88504020905ad7bc42c58db56f7,2025-02-03T15:15:18.717000 CVE-2025-22686,0,0,e7aedb7f26c8e953eeabe70988ee957926c38e58630395561780d2b497945e24,2025-02-03T15:15:18.863000 CVE-2025-22688,0,0,92e6b7ae109ab9a018062b886e106633218ca644a2c59e2e57282ed813f67e0b,2025-02-03T15:15:19.007000 -CVE-2025-22689,1,1,cb0acfe4ea0a2d94f2b0e766e86bc956edb4d3dd0cec18126c6c962c45e9e291,2025-02-16T23:15:10.330000 +CVE-2025-22689,0,0,cb0acfe4ea0a2d94f2b0e766e86bc956edb4d3dd0cec18126c6c962c45e9e291,2025-02-16T23:15:10.330000 CVE-2025-22690,0,0,15f7912d818373c9c9ee9191f4c491841a741afc5dc5b966749a324d18e0fcb6,2025-02-03T15:15:19.150000 CVE-2025-22691,0,0,d28916fc3dd8ee07125059b5bcbacce6b8b0e15a257991053ddc23a703d8c5ba,2025-02-03T15:15:19.307000 CVE-2025-22693,0,0,c893eff5f2226b03055b6c9c68aaf4bf3303cc144b5968af874a6d7eb6cb2993,2025-02-03T15:15:19.467000 @@ -280783,7 +280787,7 @@ CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96 CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000 CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000 CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926bedb,2025-01-22T15:15:26.950000 -CVE-2025-23975,1,1,2fb4af907b806c6d7037eda5780ad6979e217794bc41c9a52f4d50b2ce24b7de,2025-02-16T23:15:10.477000 +CVE-2025-23975,0,0,2fb4af907b806c6d7037eda5780ad6979e217794bc41c9a52f4d50b2ce24b7de,2025-02-16T23:15:10.477000 CVE-2025-23976,0,0,a29eb82e0663b02bfaa3596cfe2622c511331a5578d509b2b4b465f1a7a97d91,2025-01-31T09:15:08.530000 CVE-2025-23977,0,0,4d0f94ce84075ba723583d9d09a43737047f5d4a006604c1cf44bad3bcf53c59,2025-01-31T09:15:08.687000 CVE-2025-23978,0,0,12cd27921605bbe68c80af2d7542b500f0b94f840fdfb9147cbd42a4cab4c233,2025-01-31T09:15:08.830000 @@ -281498,14 +281502,14 @@ CVE-2025-26577,0,0,1471b9d6e9fec6c623a663e5500ad54800d22aa03d3125ea0ff8be8b0728f CVE-2025-26578,0,0,1ba1d37a5d1af1d2f76239a6f2ed820c7ad94689f9ccc172f7eecaa56fe90e3f,2025-02-13T14:16:23.990000 CVE-2025-26580,0,0,c808557e22a6d83e87ce5992c6ff2cdddda2d2aa66f5a321875aca0441d9569c,2025-02-13T14:16:24.250000 CVE-2025-26582,0,0,00823840b86fea4d98d4ba8da828de8ef859573fc8d1e89f9ae001b9d6f9a267,2025-02-13T14:16:24.407000 -CVE-2025-26755,1,1,ab55ada10e2471e3f3b6d39ba7098336ac0a1b0769fa3f43fd2c4de0b71599ce,2025-02-16T23:15:10.627000 -CVE-2025-26759,1,1,aa971f4308d9dde025f5e1ad7daa8f065b0641c9cb32130c8a995de32816229c,2025-02-16T23:15:10.777000 -CVE-2025-26761,1,1,130481f4b28cc5ac3e58302d2cdf3485b24296b75bca4ad9bb67ba26ddaffc38,2025-02-16T23:15:10.920000 -CVE-2025-26765,1,1,febe7fb1865b08d6bbec6c81b3ab270dd96207bad5fe3685a198c3b4fb2b2101,2025-02-16T23:15:11.063000 -CVE-2025-26766,1,1,053586fef9ce986be152eb9ae1e7b8892c9f075ba2f907277b1d4763cc12fe70,2025-02-16T23:15:11.207000 -CVE-2025-26767,1,1,187ad69a9eed635c81080502232aaa7de1c87394e8edce49d9a9a4ea1e9e43c7,2025-02-16T23:15:11.350000 -CVE-2025-26768,1,1,de05048edbcd420e1a560f4197db47cf4598333997e8f116de71226c95afb627,2025-02-16T23:15:11.487000 -CVE-2025-26779,1,1,78ae05acb92595d40239dc765a3fe7d78dcaaef138d093b03917a2ce182992b1,2025-02-16T23:15:11.630000 +CVE-2025-26755,0,0,ab55ada10e2471e3f3b6d39ba7098336ac0a1b0769fa3f43fd2c4de0b71599ce,2025-02-16T23:15:10.627000 +CVE-2025-26759,0,0,aa971f4308d9dde025f5e1ad7daa8f065b0641c9cb32130c8a995de32816229c,2025-02-16T23:15:10.777000 +CVE-2025-26761,0,0,130481f4b28cc5ac3e58302d2cdf3485b24296b75bca4ad9bb67ba26ddaffc38,2025-02-16T23:15:10.920000 +CVE-2025-26765,0,0,febe7fb1865b08d6bbec6c81b3ab270dd96207bad5fe3685a198c3b4fb2b2101,2025-02-16T23:15:11.063000 +CVE-2025-26766,0,0,053586fef9ce986be152eb9ae1e7b8892c9f075ba2f907277b1d4763cc12fe70,2025-02-16T23:15:11.207000 +CVE-2025-26767,0,0,187ad69a9eed635c81080502232aaa7de1c87394e8edce49d9a9a4ea1e9e43c7,2025-02-16T23:15:11.350000 +CVE-2025-26768,0,0,de05048edbcd420e1a560f4197db47cf4598333997e8f116de71226c95afb627,2025-02-16T23:15:11.487000 +CVE-2025-26779,0,0,78ae05acb92595d40239dc765a3fe7d78dcaaef138d093b03917a2ce182992b1,2025-02-16T23:15:11.630000 CVE-2025-26788,0,0,1ba864f8ac81a56163abfb386c84050b425d8eb039d7783af9b48ca3d178b538,2025-02-15T16:15:30.090000 CVE-2025-26789,0,0,b98c32efc76bff07b26dd009ea99782108b024ce84abc7d87c0e368d23f6c39a,2025-02-14T08:15:31.357000 CVE-2025-26791,0,0,26890395366e56c551a6ef36e1b66be0cbc180a8be1a68af298b9b716ff6b5e5,2025-02-14T16:15:37.350000