Auto-Update: 2025-02-17T03:00:45.842199+00:00

This commit is contained in:
cad-safe-bot 2025-02-17 03:04:15 +00:00
parent 9f694d3f67
commit a2b94f38b5
6 changed files with 586 additions and 47 deletions

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-1366",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-17T01:15:10.280",
"lastModified": "2025-02-17T01:15:10.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux and classified as critical. Affected by this issue is the function strcpy of the component VirusPopUp. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 4.3,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.295970",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.295970",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-1367",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-17T01:15:11.090",
"lastModified": "2025-02-17T01:15:11.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux. It has been classified as critical. This affects the function sprintf of the component USB Password Handler. The manipulation leads to buffer overflow. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 4.3,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.295971",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.295971",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-1368",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-17T02:15:08.643",
"lastModified": "2025-02-17T02:15:08.643",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux. It has been declared as problematic. This vulnerability affects the function ReadConfiguration of the file /opt/MicroWorld/etc/mwav.conf. The manipulation of the argument BasePath leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 2.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:M/C:N/I:N/A:P",
"baseScore": 1.4,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "LOW",
"exploitabilityScore": 2.5,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.295972",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.295972",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-1369",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-17T02:15:08.830",
"lastModified": "2025-02-17T02:15:08.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in MicroWord eScan Antivirus 7.0.32 on Linux. Affected by this vulnerability is an unknown functionality of the component USB Password Handler. The manipulation leads to os command injection. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.0,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.0,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:H/Au:S/C:P/I:P/A:P",
"baseScore": 3.5,
"accessVector": "LOCAL",
"accessComplexity": "HIGH",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "LOW",
"exploitabilityScore": 1.5,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
},
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.295975",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.295975",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.496482",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-02-17T00:55:19.792855+00:00 2025-02-17T03:00:45.842199+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-02-17T00:15:09.140000+00:00 2025-02-17T02:15:08.830000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -27,40 +27,23 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain ```plain
2025-02-16T01:00:10.105689+00:00 2025-02-17T01:00:04.521937+00:00
``` ```
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
281512 281516
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `21` Recently added CVEs: `4`
- [CVE-2024-44044](CVE-2024/CVE-2024-440xx/CVE-2024-44044.json) (`2025-02-16T23:15:08.907`) - [CVE-2025-1366](CVE-2025/CVE-2025-13xx/CVE-2025-1366.json) (`2025-02-17T01:15:10.280`)
- [CVE-2025-0591](CVE-2025/CVE-2025-05xx/CVE-2025-0591.json) (`2025-02-17T00:15:08.987`) - [CVE-2025-1367](CVE-2025/CVE-2025-13xx/CVE-2025-1367.json) (`2025-02-17T01:15:11.090`)
- [CVE-2025-1364](CVE-2025/CVE-2025-13xx/CVE-2025-1364.json) (`2025-02-16T23:15:09.087`) - [CVE-2025-1368](CVE-2025/CVE-2025-13xx/CVE-2025-1368.json) (`2025-02-17T02:15:08.643`)
- [CVE-2025-1365](CVE-2025/CVE-2025-13xx/CVE-2025-1365.json) (`2025-02-17T00:15:09.140`) - [CVE-2025-1369](CVE-2025/CVE-2025-13xx/CVE-2025-1369.json) (`2025-02-17T02:15:08.830`)
- [CVE-2025-22284](CVE-2025/CVE-2025-222xx/CVE-2025-22284.json) (`2025-02-16T23:15:09.280`)
- [CVE-2025-22286](CVE-2025/CVE-2025-222xx/CVE-2025-22286.json) (`2025-02-16T23:15:09.427`)
- [CVE-2025-22289](CVE-2025/CVE-2025-222xx/CVE-2025-22289.json) (`2025-02-16T23:15:09.567`)
- [CVE-2025-22290](CVE-2025/CVE-2025-222xx/CVE-2025-22290.json) (`2025-02-16T23:15:09.713`)
- [CVE-2025-22291](CVE-2025/CVE-2025-222xx/CVE-2025-22291.json) (`2025-02-16T23:15:09.877`)
- [CVE-2025-22676](CVE-2025/CVE-2025-226xx/CVE-2025-22676.json) (`2025-02-16T23:15:10.037`)
- [CVE-2025-22680](CVE-2025/CVE-2025-226xx/CVE-2025-22680.json) (`2025-02-16T23:15:10.183`)
- [CVE-2025-22689](CVE-2025/CVE-2025-226xx/CVE-2025-22689.json) (`2025-02-16T23:15:10.330`)
- [CVE-2025-23975](CVE-2025/CVE-2025-239xx/CVE-2025-23975.json) (`2025-02-16T23:15:10.477`)
- [CVE-2025-26755](CVE-2025/CVE-2025-267xx/CVE-2025-26755.json) (`2025-02-16T23:15:10.627`)
- [CVE-2025-26759](CVE-2025/CVE-2025-267xx/CVE-2025-26759.json) (`2025-02-16T23:15:10.777`)
- [CVE-2025-26761](CVE-2025/CVE-2025-267xx/CVE-2025-26761.json) (`2025-02-16T23:15:10.920`)
- [CVE-2025-26765](CVE-2025/CVE-2025-267xx/CVE-2025-26765.json) (`2025-02-16T23:15:11.063`)
- [CVE-2025-26766](CVE-2025/CVE-2025-267xx/CVE-2025-26766.json) (`2025-02-16T23:15:11.207`)
- [CVE-2025-26767](CVE-2025/CVE-2025-267xx/CVE-2025-26767.json) (`2025-02-16T23:15:11.350`)
- [CVE-2025-26768](CVE-2025/CVE-2025-267xx/CVE-2025-26768.json) (`2025-02-16T23:15:11.487`)
- [CVE-2025-26779](CVE-2025/CVE-2025-267xx/CVE-2025-26779.json) (`2025-02-16T23:15:11.630`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit

View File

@ -265987,7 +265987,7 @@ CVE-2024-44040,0,0,74b42965e6e3986525fc77deeb0ef094e32ece4aff2cecb84f707822891ab
CVE-2024-44041,0,0,40e1db2f65bd9a020f30713b0d9178a6e32ba90a0e086503a110d2a28adbf345,2024-10-07T17:47:48.410000 CVE-2024-44041,0,0,40e1db2f65bd9a020f30713b0d9178a6e32ba90a0e086503a110d2a28adbf345,2024-10-07T17:47:48.410000
CVE-2024-44042,0,0,1d7bbe5f51b27e09708cc24f3986a913e72fd98931fb78d44a1cf4aa3f2fbbd6,2024-10-07T17:47:48.410000 CVE-2024-44042,0,0,1d7bbe5f51b27e09708cc24f3986a913e72fd98931fb78d44a1cf4aa3f2fbbd6,2024-10-07T17:47:48.410000
CVE-2024-44043,0,0,5a54ccce540366e3100b03336264da52bbe72223a1a384e61c57b8debae86b18,2024-10-07T17:47:48.410000 CVE-2024-44043,0,0,5a54ccce540366e3100b03336264da52bbe72223a1a384e61c57b8debae86b18,2024-10-07T17:47:48.410000
CVE-2024-44044,1,1,30d88de66e10ebcca8605da4e27c74f33057a2361f9e858f4983b46086f05c64,2025-02-16T23:15:08.907000 CVE-2024-44044,0,0,30d88de66e10ebcca8605da4e27c74f33057a2361f9e858f4983b46086f05c64,2025-02-16T23:15:08.907000
CVE-2024-44045,0,0,e30add326efb0689032d9e1291ab1ceb0e7cee7d7cad42f2447eb76eafa4c869,2024-10-07T17:47:48.410000 CVE-2024-44045,0,0,e30add326efb0689032d9e1291ab1ceb0e7cee7d7cad42f2447eb76eafa4c869,2024-10-07T17:47:48.410000
CVE-2024-44046,0,0,8cb28132dcb52c0f855cf896fc0277479d6e2fdc4d9679affa04a96ae7375ecf,2024-10-07T17:47:48.410000 CVE-2024-44046,0,0,8cb28132dcb52c0f855cf896fc0277479d6e2fdc4d9679affa04a96ae7375ecf,2024-10-07T17:47:48.410000
CVE-2024-44047,0,0,55ccceb367f56cca0478fcf20023ed31752b3102ce8e00f651967b31bd809ce5,2024-09-24T22:05:25.723000 CVE-2024-44047,0,0,55ccceb367f56cca0478fcf20023ed31752b3102ce8e00f651967b31bd809ce5,2024-09-24T22:05:25.723000
@ -278950,7 +278950,7 @@ CVE-2025-0586,0,0,c173218ec5f02f93feb0d4cf939be10f56c7035ad9f75a3f6402979497f3b4
CVE-2025-0588,0,0,d2fa85707b0a520f26e49cd106b0316ac9358a5318ae8c21637a975b482ec3aa,2025-02-11T15:15:19.673000 CVE-2025-0588,0,0,d2fa85707b0a520f26e49cd106b0316ac9358a5318ae8c21637a975b482ec3aa,2025-02-11T15:15:19.673000
CVE-2025-0589,0,0,011f5314ba330effc1b70ac831c8799f8f01d30011f03d50ea7f87b83c919e4c,2025-02-11T16:15:49.667000 CVE-2025-0589,0,0,011f5314ba330effc1b70ac831c8799f8f01d30011f03d50ea7f87b83c919e4c,2025-02-11T16:15:49.667000
CVE-2025-0590,0,0,95827083638699773bc7292ef6b29aa078951517d7ac26deb9bb9819d19a8b52,2025-01-21T15:15:14.117000 CVE-2025-0590,0,0,95827083638699773bc7292ef6b29aa078951517d7ac26deb9bb9819d19a8b52,2025-01-21T15:15:14.117000
CVE-2025-0591,1,1,108a322fc8864bf59143171a497126c3fae4b8bc99c96e929cad289a15c67aa9,2025-02-17T00:15:08.987000 CVE-2025-0591,0,0,108a322fc8864bf59143171a497126c3fae4b8bc99c96e929cad289a15c67aa9,2025-02-17T00:15:08.987000
CVE-2025-0592,0,0,9c3e5d0ff9cc82391565af486c296ae6493bbd4a2a7ae16e355a2a28eaf964e2,2025-02-14T21:15:16.543000 CVE-2025-0592,0,0,9c3e5d0ff9cc82391565af486c296ae6493bbd4a2a7ae16e355a2a28eaf964e2,2025-02-14T21:15:16.543000
CVE-2025-0593,0,0,c6a547b5cc74d50c18b27627e5aae76ed907e58cd955b960e2bc11cb240d5378,2025-02-14T21:15:16.680000 CVE-2025-0593,0,0,c6a547b5cc74d50c18b27627e5aae76ed907e58cd955b960e2bc11cb240d5378,2025-02-14T21:15:16.680000
CVE-2025-0604,0,0,dc946f3b45eac1c2c9970fb51178c4296c8c05d608ff98e71aad731de2b62daa,2025-01-22T15:15:14.827000 CVE-2025-0604,0,0,dc946f3b45eac1c2c9970fb51178c4296c8c05d608ff98e71aad731de2b62daa,2025-01-22T15:15:14.827000
@ -279292,8 +279292,12 @@ CVE-2025-1357,0,0,4433e1005a5e4201fdc796c40c8e7b39186d5a371766813fcd3008d782d857
CVE-2025-1358,0,0,9ec04afb65270064953f92f1f98c94b6c7f923699eb2bc5c685de93fafaa422a,2025-02-16T20:15:07.990000 CVE-2025-1358,0,0,9ec04afb65270064953f92f1f98c94b6c7f923699eb2bc5c685de93fafaa422a,2025-02-16T20:15:07.990000
CVE-2025-1359,0,0,a74490df0bf9cd453b684197a6da2b817f973233464d2e18244cbcb76e58d0cd,2025-02-16T20:15:08.817000 CVE-2025-1359,0,0,a74490df0bf9cd453b684197a6da2b817f973233464d2e18244cbcb76e58d0cd,2025-02-16T20:15:08.817000
CVE-2025-1360,0,0,fb0d3aa81a9aae261cf8bbfc32f9a1a37cc5f63f6b37722c4b26a02ea0975887,2025-02-16T21:15:09.970000 CVE-2025-1360,0,0,fb0d3aa81a9aae261cf8bbfc32f9a1a37cc5f63f6b37722c4b26a02ea0975887,2025-02-16T21:15:09.970000
CVE-2025-1364,1,1,6c9a498ed4da91fc543c9e0d0bc6b549f91692b353d2222b29ef08d5dcc47090,2025-02-16T23:15:09.087000 CVE-2025-1364,0,0,6c9a498ed4da91fc543c9e0d0bc6b549f91692b353d2222b29ef08d5dcc47090,2025-02-16T23:15:09.087000
CVE-2025-1365,1,1,266b893d22f80eeaffc950fc5e5107cbf76b85b1dd425ff9e622ab0ee02beb92,2025-02-17T00:15:09.140000 CVE-2025-1365,0,0,266b893d22f80eeaffc950fc5e5107cbf76b85b1dd425ff9e622ab0ee02beb92,2025-02-17T00:15:09.140000
CVE-2025-1366,1,1,27d217412c230d14f7fea472a75295f779bc457c8773cd971395f03e9546e238,2025-02-17T01:15:10.280000
CVE-2025-1367,1,1,be3e2e7e8bc50994880767084f7efe0b9708429f4c915e622468e6ae36e6b75a,2025-02-17T01:15:11.090000
CVE-2025-1368,1,1,8de8d22a348a0d6be64b55129b3485441b0f1e6bc73acc4c117f2e997dd51924,2025-02-17T02:15:08.643000
CVE-2025-1369,1,1,ed44e9f7f84e102627e261ff1b5ad37af5334bc9499494cb5f4f8b1dda618055,2025-02-17T02:15:08.830000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000 CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
@ -279866,11 +279870,11 @@ CVE-2025-22265,0,0,51006a5fb12dad2a881e7b25e5673794091472c79149c473510be2ae25b43
CVE-2025-22267,0,0,f20afa71bc4d80e805bd92045ab58754dc4544d5a2500dd19c3f675f1704780a,2025-01-21T18:15:15.100000 CVE-2025-22267,0,0,f20afa71bc4d80e805bd92045ab58754dc4544d5a2500dd19c3f675f1704780a,2025-01-21T18:15:15.100000
CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000
CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000 CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000
CVE-2025-22284,1,1,b4bba2f887fee4bfdb2af344b89b13eaf225c237a8dd321f1b42e5bea3b2bd75,2025-02-16T23:15:09.280000 CVE-2025-22284,0,0,b4bba2f887fee4bfdb2af344b89b13eaf225c237a8dd321f1b42e5bea3b2bd75,2025-02-16T23:15:09.280000
CVE-2025-22286,1,1,5ba2132f63de2bf6bf17c54a7abd6a97c5204d9dc24b1842120329793c4bb4fe,2025-02-16T23:15:09.427000 CVE-2025-22286,0,0,5ba2132f63de2bf6bf17c54a7abd6a97c5204d9dc24b1842120329793c4bb4fe,2025-02-16T23:15:09.427000
CVE-2025-22289,1,1,e8af2ef048e85afd8c9fcf9616e053c47d8b638d34a72304e5531e6ce2744277,2025-02-16T23:15:09.567000 CVE-2025-22289,0,0,e8af2ef048e85afd8c9fcf9616e053c47d8b638d34a72304e5531e6ce2744277,2025-02-16T23:15:09.567000
CVE-2025-22290,1,1,4c77257ac665fbe18fc587c52e2a8624f9d87a9dc7a3d3829754b7863ff2b7d9,2025-02-16T23:15:09.713000 CVE-2025-22290,0,0,4c77257ac665fbe18fc587c52e2a8624f9d87a9dc7a3d3829754b7863ff2b7d9,2025-02-16T23:15:09.713000
CVE-2025-22291,1,1,364f00d902f60116ab8199384bd27f18167d0647d6ccec59e6b0460ad6388b23,2025-02-16T23:15:09.877000 CVE-2025-22291,0,0,364f00d902f60116ab8199384bd27f18167d0647d6ccec59e6b0460ad6388b23,2025-02-16T23:15:09.877000
CVE-2025-22292,0,0,0a179a28798372b1354b5887532a0aacfe8816e7abd0dc207ba7b50b06093bc5,2025-02-03T15:15:17.677000 CVE-2025-22292,0,0,0a179a28798372b1354b5887532a0aacfe8816e7abd0dc207ba7b50b06093bc5,2025-02-03T15:15:17.677000
CVE-2025-22293,0,0,0fb85e30408666f4049ff5e391f5eb0edea1a607b8157160cd5e0e00489520e9,2025-01-07T11:15:13.473000 CVE-2025-22293,0,0,0fb85e30408666f4049ff5e391f5eb0edea1a607b8157160cd5e0e00489520e9,2025-01-07T11:15:13.473000
CVE-2025-22294,0,0,fd3c530f54ed4c49be0865300ce0d8ca3b1fb9d97860cd5c24499f717ff48c10,2025-01-07T16:15:41.137000 CVE-2025-22294,0,0,fd3c530f54ed4c49be0865300ce0d8ca3b1fb9d97860cd5c24499f717ff48c10,2025-01-07T16:15:41.137000
@ -280087,10 +280091,10 @@ CVE-2025-22662,0,0,363ea558957e3bdb271052a7801a86f0c9144f81d93f9854d0b61c8e7e038
CVE-2025-22664,0,0,19244507eb29893abee53f2e797f7ecbb2a6d2c1a4728c376e350b0c5fed8013,2025-02-04T15:15:21.003000 CVE-2025-22664,0,0,19244507eb29893abee53f2e797f7ecbb2a6d2c1a4728c376e350b0c5fed8013,2025-02-04T15:15:21.003000
CVE-2025-22674,0,0,0c35af0dffe00295a65386d34bb04dddae41b630414ae20c2c18bbe06138c2fe,2025-02-04T15:15:21.227000 CVE-2025-22674,0,0,0c35af0dffe00295a65386d34bb04dddae41b630414ae20c2c18bbe06138c2fe,2025-02-04T15:15:21.227000
CVE-2025-22675,0,0,f84d6dc34bd46b2e548b47dc483c92eb38045e589cc60bf4100137c2e23e2d7f,2025-02-04T15:15:21.433000 CVE-2025-22675,0,0,f84d6dc34bd46b2e548b47dc483c92eb38045e589cc60bf4100137c2e23e2d7f,2025-02-04T15:15:21.433000
CVE-2025-22676,1,1,48e02aaad355c0bdb0907a6c2df25f41b0f21c07115005edeae3afc845a9abfa,2025-02-16T23:15:10.037000 CVE-2025-22676,0,0,48e02aaad355c0bdb0907a6c2df25f41b0f21c07115005edeae3afc845a9abfa,2025-02-16T23:15:10.037000
CVE-2025-22677,0,0,56fc462ed8efabd49ce1f0e6a2628b8d9f5f9d1ccf265bfcaae01089635695f7,2025-02-03T15:15:17.827000 CVE-2025-22677,0,0,56fc462ed8efabd49ce1f0e6a2628b8d9f5f9d1ccf265bfcaae01089635695f7,2025-02-03T15:15:17.827000
CVE-2025-22679,0,0,2f277aaa5fffe9654d22cc8647fce7a692ea020ff267ecc8af7b0ff370e0d5e1,2025-02-03T15:15:17.980000 CVE-2025-22679,0,0,2f277aaa5fffe9654d22cc8647fce7a692ea020ff267ecc8af7b0ff370e0d5e1,2025-02-03T15:15:17.980000
CVE-2025-22680,1,1,5cb3ecb75be0eadcbe65062db3cf58ca5282cca85735608b6507a64e06bf2290,2025-02-16T23:15:10.183000 CVE-2025-22680,0,0,5cb3ecb75be0eadcbe65062db3cf58ca5282cca85735608b6507a64e06bf2290,2025-02-16T23:15:10.183000
CVE-2025-22681,0,0,c6253ce9e47d2abb4a9c5ac568731bc49b4a1189b4d90c246688c3e0c830614f,2025-02-03T15:15:18.127000 CVE-2025-22681,0,0,c6253ce9e47d2abb4a9c5ac568731bc49b4a1189b4d90c246688c3e0c830614f,2025-02-03T15:15:18.127000
CVE-2025-22682,0,0,e77a6f2b7a3ad5225b4f62f23b09f955535ba4028e42f80eba37f5290ba6dd2e,2025-02-03T15:15:18.270000 CVE-2025-22682,0,0,e77a6f2b7a3ad5225b4f62f23b09f955535ba4028e42f80eba37f5290ba6dd2e,2025-02-03T15:15:18.270000
CVE-2025-22683,0,0,a8b81acc9187a933d45ffdb39d80319520ea252f8849dd50e1ad8e1b88f28b14,2025-02-03T15:15:18.440000 CVE-2025-22683,0,0,a8b81acc9187a933d45ffdb39d80319520ea252f8849dd50e1ad8e1b88f28b14,2025-02-03T15:15:18.440000
@ -280098,7 +280102,7 @@ CVE-2025-22684,0,0,4c0faff6a51bf22c6057b965974a65d8b3cdec97cab52f5d2b607780797a5
CVE-2025-22685,0,0,0aca1e462c147586a6ae88d5cff70e9389d5f88504020905ad7bc42c58db56f7,2025-02-03T15:15:18.717000 CVE-2025-22685,0,0,0aca1e462c147586a6ae88d5cff70e9389d5f88504020905ad7bc42c58db56f7,2025-02-03T15:15:18.717000
CVE-2025-22686,0,0,e7aedb7f26c8e953eeabe70988ee957926c38e58630395561780d2b497945e24,2025-02-03T15:15:18.863000 CVE-2025-22686,0,0,e7aedb7f26c8e953eeabe70988ee957926c38e58630395561780d2b497945e24,2025-02-03T15:15:18.863000
CVE-2025-22688,0,0,92e6b7ae109ab9a018062b886e106633218ca644a2c59e2e57282ed813f67e0b,2025-02-03T15:15:19.007000 CVE-2025-22688,0,0,92e6b7ae109ab9a018062b886e106633218ca644a2c59e2e57282ed813f67e0b,2025-02-03T15:15:19.007000
CVE-2025-22689,1,1,cb0acfe4ea0a2d94f2b0e766e86bc956edb4d3dd0cec18126c6c962c45e9e291,2025-02-16T23:15:10.330000 CVE-2025-22689,0,0,cb0acfe4ea0a2d94f2b0e766e86bc956edb4d3dd0cec18126c6c962c45e9e291,2025-02-16T23:15:10.330000
CVE-2025-22690,0,0,15f7912d818373c9c9ee9191f4c491841a741afc5dc5b966749a324d18e0fcb6,2025-02-03T15:15:19.150000 CVE-2025-22690,0,0,15f7912d818373c9c9ee9191f4c491841a741afc5dc5b966749a324d18e0fcb6,2025-02-03T15:15:19.150000
CVE-2025-22691,0,0,d28916fc3dd8ee07125059b5bcbacce6b8b0e15a257991053ddc23a703d8c5ba,2025-02-03T15:15:19.307000 CVE-2025-22691,0,0,d28916fc3dd8ee07125059b5bcbacce6b8b0e15a257991053ddc23a703d8c5ba,2025-02-03T15:15:19.307000
CVE-2025-22693,0,0,c893eff5f2226b03055b6c9c68aaf4bf3303cc144b5968af874a6d7eb6cb2993,2025-02-03T15:15:19.467000 CVE-2025-22693,0,0,c893eff5f2226b03055b6c9c68aaf4bf3303cc144b5968af874a6d7eb6cb2993,2025-02-03T15:15:19.467000
@ -280783,7 +280787,7 @@ CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96
CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000 CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000
CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000 CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000
CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926bedb,2025-01-22T15:15:26.950000 CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926bedb,2025-01-22T15:15:26.950000
CVE-2025-23975,1,1,2fb4af907b806c6d7037eda5780ad6979e217794bc41c9a52f4d50b2ce24b7de,2025-02-16T23:15:10.477000 CVE-2025-23975,0,0,2fb4af907b806c6d7037eda5780ad6979e217794bc41c9a52f4d50b2ce24b7de,2025-02-16T23:15:10.477000
CVE-2025-23976,0,0,a29eb82e0663b02bfaa3596cfe2622c511331a5578d509b2b4b465f1a7a97d91,2025-01-31T09:15:08.530000 CVE-2025-23976,0,0,a29eb82e0663b02bfaa3596cfe2622c511331a5578d509b2b4b465f1a7a97d91,2025-01-31T09:15:08.530000
CVE-2025-23977,0,0,4d0f94ce84075ba723583d9d09a43737047f5d4a006604c1cf44bad3bcf53c59,2025-01-31T09:15:08.687000 CVE-2025-23977,0,0,4d0f94ce84075ba723583d9d09a43737047f5d4a006604c1cf44bad3bcf53c59,2025-01-31T09:15:08.687000
CVE-2025-23978,0,0,12cd27921605bbe68c80af2d7542b500f0b94f840fdfb9147cbd42a4cab4c233,2025-01-31T09:15:08.830000 CVE-2025-23978,0,0,12cd27921605bbe68c80af2d7542b500f0b94f840fdfb9147cbd42a4cab4c233,2025-01-31T09:15:08.830000
@ -281498,14 +281502,14 @@ CVE-2025-26577,0,0,1471b9d6e9fec6c623a663e5500ad54800d22aa03d3125ea0ff8be8b0728f
CVE-2025-26578,0,0,1ba1d37a5d1af1d2f76239a6f2ed820c7ad94689f9ccc172f7eecaa56fe90e3f,2025-02-13T14:16:23.990000 CVE-2025-26578,0,0,1ba1d37a5d1af1d2f76239a6f2ed820c7ad94689f9ccc172f7eecaa56fe90e3f,2025-02-13T14:16:23.990000
CVE-2025-26580,0,0,c808557e22a6d83e87ce5992c6ff2cdddda2d2aa66f5a321875aca0441d9569c,2025-02-13T14:16:24.250000 CVE-2025-26580,0,0,c808557e22a6d83e87ce5992c6ff2cdddda2d2aa66f5a321875aca0441d9569c,2025-02-13T14:16:24.250000
CVE-2025-26582,0,0,00823840b86fea4d98d4ba8da828de8ef859573fc8d1e89f9ae001b9d6f9a267,2025-02-13T14:16:24.407000 CVE-2025-26582,0,0,00823840b86fea4d98d4ba8da828de8ef859573fc8d1e89f9ae001b9d6f9a267,2025-02-13T14:16:24.407000
CVE-2025-26755,1,1,ab55ada10e2471e3f3b6d39ba7098336ac0a1b0769fa3f43fd2c4de0b71599ce,2025-02-16T23:15:10.627000 CVE-2025-26755,0,0,ab55ada10e2471e3f3b6d39ba7098336ac0a1b0769fa3f43fd2c4de0b71599ce,2025-02-16T23:15:10.627000
CVE-2025-26759,1,1,aa971f4308d9dde025f5e1ad7daa8f065b0641c9cb32130c8a995de32816229c,2025-02-16T23:15:10.777000 CVE-2025-26759,0,0,aa971f4308d9dde025f5e1ad7daa8f065b0641c9cb32130c8a995de32816229c,2025-02-16T23:15:10.777000
CVE-2025-26761,1,1,130481f4b28cc5ac3e58302d2cdf3485b24296b75bca4ad9bb67ba26ddaffc38,2025-02-16T23:15:10.920000 CVE-2025-26761,0,0,130481f4b28cc5ac3e58302d2cdf3485b24296b75bca4ad9bb67ba26ddaffc38,2025-02-16T23:15:10.920000
CVE-2025-26765,1,1,febe7fb1865b08d6bbec6c81b3ab270dd96207bad5fe3685a198c3b4fb2b2101,2025-02-16T23:15:11.063000 CVE-2025-26765,0,0,febe7fb1865b08d6bbec6c81b3ab270dd96207bad5fe3685a198c3b4fb2b2101,2025-02-16T23:15:11.063000
CVE-2025-26766,1,1,053586fef9ce986be152eb9ae1e7b8892c9f075ba2f907277b1d4763cc12fe70,2025-02-16T23:15:11.207000 CVE-2025-26766,0,0,053586fef9ce986be152eb9ae1e7b8892c9f075ba2f907277b1d4763cc12fe70,2025-02-16T23:15:11.207000
CVE-2025-26767,1,1,187ad69a9eed635c81080502232aaa7de1c87394e8edce49d9a9a4ea1e9e43c7,2025-02-16T23:15:11.350000 CVE-2025-26767,0,0,187ad69a9eed635c81080502232aaa7de1c87394e8edce49d9a9a4ea1e9e43c7,2025-02-16T23:15:11.350000
CVE-2025-26768,1,1,de05048edbcd420e1a560f4197db47cf4598333997e8f116de71226c95afb627,2025-02-16T23:15:11.487000 CVE-2025-26768,0,0,de05048edbcd420e1a560f4197db47cf4598333997e8f116de71226c95afb627,2025-02-16T23:15:11.487000
CVE-2025-26779,1,1,78ae05acb92595d40239dc765a3fe7d78dcaaef138d093b03917a2ce182992b1,2025-02-16T23:15:11.630000 CVE-2025-26779,0,0,78ae05acb92595d40239dc765a3fe7d78dcaaef138d093b03917a2ce182992b1,2025-02-16T23:15:11.630000
CVE-2025-26788,0,0,1ba864f8ac81a56163abfb386c84050b425d8eb039d7783af9b48ca3d178b538,2025-02-15T16:15:30.090000 CVE-2025-26788,0,0,1ba864f8ac81a56163abfb386c84050b425d8eb039d7783af9b48ca3d178b538,2025-02-15T16:15:30.090000
CVE-2025-26789,0,0,b98c32efc76bff07b26dd009ea99782108b024ce84abc7d87c0e368d23f6c39a,2025-02-14T08:15:31.357000 CVE-2025-26789,0,0,b98c32efc76bff07b26dd009ea99782108b024ce84abc7d87c0e368d23f6c39a,2025-02-14T08:15:31.357000
CVE-2025-26791,0,0,26890395366e56c551a6ef36e1b66be0cbc180a8be1a68af298b9b716ff6b5e5,2025-02-14T16:15:37.350000 CVE-2025-26791,0,0,26890395366e56c551a6ef36e1b66be0cbc180a8be1a68af298b9b716ff6b5e5,2025-02-14T16:15:37.350000

Can't render this file because it is too large.