From b20edaf7204d5d7351bdacef89c989a86b651021 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 22 Mar 2025 15:03:51 +0000 Subject: [PATCH] Auto-Update: 2025-03-22T15:00:20.196709+00:00 --- CVE-2024/CVE-2024-104xx/CVE-2024-10466.json | 32 ++++- CVE-2024/CVE-2024-28xx/CVE-2024-2886.json | 14 +- CVE-2024/CVE-2024-399xx/CVE-2024-39925.json | 39 ++++- CVE-2024/CVE-2024-408xx/CVE-2024-40850.json | 34 ++++- CVE-2024/CVE-2024-441xx/CVE-2024-44136.json | 36 ++++- CVE-2024/CVE-2024-511xx/CVE-2024-51123.json | 39 ++++- CVE-2024/CVE-2024-514xx/CVE-2024-51440.json | 39 ++++- CVE-2024/CVE-2024-568xx/CVE-2024-56898.json | 39 ++++- CVE-2024/CVE-2024-569xx/CVE-2024-56921.json | 39 ++++- CVE-2024/CVE-2024-575xx/CVE-2024-57582.json | 34 ++++- CVE-2024/CVE-2024-576xx/CVE-2024-57606.json | 39 ++++- CVE-2025/CVE-2025-21xx/CVE-2025-2186.json | 64 +++++++++ CVE-2025/CVE-2025-230xx/CVE-2025-23086.json | 39 ++++- CVE-2025/CVE-2025-267xx/CVE-2025-26796.json | 44 ++++++ CVE-2025/CVE-2025-26xx/CVE-2025-2617.json | 137 ++++++++++++++++++ CVE-2025/CVE-2025-26xx/CVE-2025-2618.json | 152 ++++++++++++++++++++ CVE-2025/CVE-2025-26xx/CVE-2025-2619.json | 152 ++++++++++++++++++++ README.md | 33 +++-- _state.csv | 41 +++--- 19 files changed, 993 insertions(+), 53 deletions(-) create mode 100644 CVE-2025/CVE-2025-21xx/CVE-2025-2186.json create mode 100644 CVE-2025/CVE-2025-267xx/CVE-2025-26796.json create mode 100644 CVE-2025/CVE-2025-26xx/CVE-2025-2617.json create mode 100644 CVE-2025/CVE-2025-26xx/CVE-2025-2618.json create mode 100644 CVE-2025/CVE-2025-26xx/CVE-2025-2619.json diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json index 8e23ef16520..20b7fd80054 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10466", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-29T13:15:04.273", - "lastModified": "2025-01-09T18:15:27.253", + "lastModified": "2025-03-22T14:15:13.777", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2886.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2886.json index 1c471b83e59..bdb363a5e72 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2886.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2886.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2886", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-26T21:15:53.260", - "lastModified": "2024-12-19T16:09:30.553", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-22T14:15:14.203", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39925.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39925.json index 12e50a74fd9..3ced2f466e3 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39925.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39925.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39925", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-13T18:15:03.927", - "lastModified": "2025-01-09T18:15:28.117", + "lastModified": "2025-03-22T14:15:14.477", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Carece de un proceso de desvinculaci\u00f3n para los miembros que abandonan una organizaci\u00f3n. Como resultado, la clave de organizaci\u00f3n compartida no se rota cuando un miembro se va. En consecuencia, el miembro que se va, cuyo acceso debe revocarse, conserva una copia de la clave de la organizaci\u00f3n. Adem\u00e1s, la aplicaci\u00f3n no protege adecuadamente algunos datos cifrados almacenados en el servidor. En consecuencia, un usuario autenticado podr\u00eda obtener acceso no autorizado a los datos cifrados de cualquier organizaci\u00f3n, incluso si el usuario no es miembro de la organizaci\u00f3n en cuesti\u00f3n. Sin embargo, el usuario necesitar\u00eda saber el ID de organizaci\u00f3n correspondiente. Por lo tanto, si un usuario (cuyo acceso a una organizaci\u00f3n ha sido revocado) ya posee la clave de la organizaci\u00f3n, ese usuario podr\u00eda usar la clave para descifrar los datos filtrados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/dani-garcia/vaultwarden/releases", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40850.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40850.json index 450e2780365..4476f4a3235 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40850.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40850.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40850", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:49.383", - "lastModified": "2024-09-24T15:41:22.803", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-22T14:15:14.713", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44136.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44136.json index f72983660b7..77f6a2d052b 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44136.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44136.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44136", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:27.923", - "lastModified": "2025-03-04T15:30:49.700", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-22T14:15:14.963", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,19 +36,49 @@ }, "exploitabilityScore": 0.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json index 2cc847b143c..73a9d3952fc 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51123", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.717", - "lastModified": "2025-02-18T18:15:26.130", + "lastModified": "2025-03-22T14:15:15.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Zertificon Z1 SecureMail Z1 SecureMail Gateway 4.44.2-7240-debian12 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del componente /compose-pdf.xhtml?convid=[id]." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/MVRC-ITSEC/CVEs/blob/main/CVE-2024-51123", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json index d962ec12b90..9dc40db2ff5 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51440", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.990", - "lastModified": "2025-02-18T18:15:26.283", + "lastModified": "2025-03-22T14:15:15.390", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Nothing Tech Nothing OS v.2.6 permite que un atacante local escale privilegios a trav\u00e9s del componente NtBpfService." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://sharedobject.blog/posts/nothing-bpf/", diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56898.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56898.json index e59957d8797..0407818df14 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56898.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56898.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56898", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T21:15:14.047", - "lastModified": "2025-03-04T22:15:38.990", + "lastModified": "2025-03-22T14:15:15.590", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El control de acceso incorrecto en Geovision GV-ASWeb versi\u00f3n 6.1.0.0 o anterior permite que atacantes no autorizados con privilegios de bajo nivel administren y creen nuevas cuentas de usuario mediante el suministro de una solicitud HTTP manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/DRAGOWN/CVE-2024-56898", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56921.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56921.json index 235b08eb3a4..7fc49ff48bf 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56921.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56921.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56921", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:33.610", - "lastModified": "2025-02-18T19:15:20.223", + "lastModified": "2025-03-22T14:15:15.787", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Open5gs v2.7.2. InitialUEMessage, la solicitud de registro enviada a una hora espec\u00edfica puede hacer que AMF se bloquee debido a una gesti\u00f3n incorrecta de errores de la funci\u00f3n gmm_state_exception() al recibir la respuesta Nausf_UEAuthentication_Authenticate." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/open5gs/open5gs/commit/f780f9af45c27b6f49987d96ba71dedb3dd85840", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57582.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57582.json index a13ea856d20..a3081d9aac7 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57582.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57582.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57582", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T21:15:17.627", - "lastModified": "2025-03-06T12:45:04.363", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-22T14:15:15.960", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57606.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57606.json index 9f202bd96e9..61566c24503 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57606.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57606.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57606", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-07T22:15:13.707", - "lastModified": "2025-02-18T19:15:22.280", + "lastModified": "2025-03-22T14:15:16.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Beijing Guoju Information Technology Co., Ltd JeecgBoot v.3.7.2 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente getTotalData." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/jeecgboot/JeecgBoot/issues/7665", diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2186.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2186.json new file mode 100644 index 00000000000..ffe5981472f --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2186.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-2186", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-22T13:15:35.683", + "lastModified": "2025-03-22T13:15:35.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to SQL Injection via the \u2018automationId\u2019 parameter in all versions up to, and including, 3.5.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/wp-marketing-automations/trunk/includes/api/wc/class-bwfan-api-get-automation-dynamic-coupon.php#L50", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3257474/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/88f8fa25-e3d5-4dfd-aae5-68b5880ffd53?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23086.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23086.json index 6b6ace69b5b..25dfb443b91 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23086.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23086.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23086", "sourceIdentifier": "support@hackerone.com", "published": "2025-01-21T05:15:07.960", - "lastModified": "2025-02-18T21:15:28.100", + "lastModified": "2025-03-22T14:15:16.360", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En la mayor\u00eda de las plataformas de escritorio, las versiones 1.70.x-1.73.x de Brave Browser inclu\u00edan una funci\u00f3n para mostrar el origen de un sitio en el cuadro de di\u00e1logo de selecci\u00f3n de archivos proporcionado por el sistema operativo cuando un sitio solicita al usuario que cargue o descargue un archivo. Sin embargo, en algunos casos, el origen no se dedujo correctamente. Cuando se combina con una vulnerabilidad de redireccionamiento abierto en un sitio confiable, esto podr\u00eda permitir que un sitio malicioso inicie una descarga cuyo origen en el cuadro de di\u00e1logo de selecci\u00f3n de archivos aparece como el sitio confiable que inici\u00f3 la redirecci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://hackerone.com/reports/2888770", diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26796.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26796.json new file mode 100644 index 00000000000..e708c27aa57 --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26796.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-26796", + "sourceIdentifier": "security@apache.org", + "published": "2025-03-22T13:15:35.513", + "lastModified": "2025-03-22T14:15:16.537", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "security@apache.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Oozie.\n\nThis issue affects Apache Oozie: all versions.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/fzrmsslnrpl0vpp0jr73fosmfjv4omdq", + "source": "security@apache.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/03/21/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2617.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2617.json new file mode 100644 index 00000000000..04b78164b5e --- /dev/null +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2617.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-2617", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-22T13:15:35.837", + "lastModified": "2025-03-22T13:15:35.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in yangyouwang \u6768\u6709\u65fa crud \u7b80\u7ea6\u540e\u53f0\u7ba1\u7406\u7cfb\u7edf 1.0.0. Affected by this vulnerability is an unknown functionality of the component Department Page. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/yangyouwang/crud/issues/IBSPOX", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.300619", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.300619", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2618.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2618.json new file mode 100644 index 00000000000..d8ea340613f --- /dev/null +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2618.json @@ -0,0 +1,152 @@ +{ + "id": "CVE-2025-2618", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-22T14:15:16.650", + "lastModified": "2025-03-22T14:15:16.650", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in D-Link DAP-1620 1.03. Affected by this issue is the function set_ws_action of the file /dws/api/ of the component Path Handler. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.300620", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.300620", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.518963", + "source": "cna@vuldb.com" + }, + { + "url": "https://witty-maiasaura-083.notion.site/D-link-DAP-1620-set_ws_action-Vulnerability-1afb2f2a6361804e86dcde1e78ea2a8e", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2619.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2619.json new file mode 100644 index 00000000000..70d004b7be5 --- /dev/null +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2619.json @@ -0,0 +1,152 @@ +{ + "id": "CVE-2025-2619", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-22T14:15:16.867", + "lastModified": "2025-03-22T14:15:16.867", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.300621", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.300621", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.518968", + "source": "cna@vuldb.com" + }, + { + "url": "https://witty-maiasaura-083.notion.site/D-link-DAP-1620-check_dws_cookie-Vulnerability-1b4b2f2a6361805ca74fdf4949385ade", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 653ee2c96cd..6ca6908c475 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-22T13:00:19.342970+00:00 +2025-03-22T15:00:20.196709+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-22T12:15:27.013000+00:00 +2025-03-22T14:15:16.867000+00:00 ``` ### Last Data Feed Release @@ -33,25 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -286213 +286218 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `5` -- [CVE-2025-1970](CVE-2025/CVE-2025-19xx/CVE-2025-1970.json) (`2025-03-22T12:15:25.797`) -- [CVE-2025-1971](CVE-2025/CVE-2025-19xx/CVE-2025-1971.json) (`2025-03-22T12:15:26.250`) -- [CVE-2025-1972](CVE-2025/CVE-2025-19xx/CVE-2025-1972.json) (`2025-03-22T12:15:26.453`) -- [CVE-2025-1973](CVE-2025/CVE-2025-19xx/CVE-2025-1973.json) (`2025-03-22T12:15:26.653`) -- [CVE-2025-2331](CVE-2025/CVE-2025-23xx/CVE-2025-2331.json) (`2025-03-22T12:15:26.833`) -- [CVE-2025-2577](CVE-2025/CVE-2025-25xx/CVE-2025-2577.json) (`2025-03-22T12:15:27.013`) +- [CVE-2025-2186](CVE-2025/CVE-2025-21xx/CVE-2025-2186.json) (`2025-03-22T13:15:35.683`) +- [CVE-2025-2617](CVE-2025/CVE-2025-26xx/CVE-2025-2617.json) (`2025-03-22T13:15:35.837`) +- [CVE-2025-2618](CVE-2025/CVE-2025-26xx/CVE-2025-2618.json) (`2025-03-22T14:15:16.650`) +- [CVE-2025-2619](CVE-2025/CVE-2025-26xx/CVE-2025-2619.json) (`2025-03-22T14:15:16.867`) +- [CVE-2025-26796](CVE-2025/CVE-2025-267xx/CVE-2025-26796.json) (`2025-03-22T13:15:35.513`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `12` +- [CVE-2024-10466](CVE-2024/CVE-2024-104xx/CVE-2024-10466.json) (`2025-03-22T14:15:13.777`) +- [CVE-2024-2886](CVE-2024/CVE-2024-28xx/CVE-2024-2886.json) (`2025-03-22T14:15:14.203`) +- [CVE-2024-39925](CVE-2024/CVE-2024-399xx/CVE-2024-39925.json) (`2025-03-22T14:15:14.477`) +- [CVE-2024-40850](CVE-2024/CVE-2024-408xx/CVE-2024-40850.json) (`2025-03-22T14:15:14.713`) +- [CVE-2024-44136](CVE-2024/CVE-2024-441xx/CVE-2024-44136.json) (`2025-03-22T14:15:14.963`) +- [CVE-2024-51123](CVE-2024/CVE-2024-511xx/CVE-2024-51123.json) (`2025-03-22T14:15:15.170`) +- [CVE-2024-51440](CVE-2024/CVE-2024-514xx/CVE-2024-51440.json) (`2025-03-22T14:15:15.390`) +- [CVE-2024-56898](CVE-2024/CVE-2024-568xx/CVE-2024-56898.json) (`2025-03-22T14:15:15.590`) +- [CVE-2024-56921](CVE-2024/CVE-2024-569xx/CVE-2024-56921.json) (`2025-03-22T14:15:15.787`) +- [CVE-2024-57582](CVE-2024/CVE-2024-575xx/CVE-2024-57582.json) (`2025-03-22T14:15:15.960`) +- [CVE-2024-57606](CVE-2024/CVE-2024-576xx/CVE-2024-57606.json) (`2025-03-22T14:15:16.170`) +- [CVE-2025-23086](CVE-2025/CVE-2025-230xx/CVE-2025-23086.json) (`2025-03-22T14:15:16.360`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 054a2ac2f5a..b19533f69d8 100644 --- a/_state.csv +++ b/_state.csv @@ -244790,7 +244790,7 @@ CVE-2024-10462,0,0,2786d011829da8771867443f24aa66a7980a2c1c4ede689df85c917119c6e CVE-2024-10463,0,0,3ddfd266b41fd173cebb851d2bc34cbf2c785db4b330494b6a3f4845aa6052a5,2024-11-04T13:31:20.073000 CVE-2024-10464,0,0,fa0fca4ba089b4bc982df15af00e5fe7b90b3385712043456e98d4b150175b15,2024-11-04T13:30:23.513000 CVE-2024-10465,0,0,8955d1f0157719f4fbefe7fae8269c4898adc0f8f926a16acb2d50f72eb39e2b,2024-11-04T13:30:10.847000 -CVE-2024-10466,0,0,56606dd3a844c97b0e77369c2884b635a3f644e0864760575415bc55442ba9d5,2025-01-09T18:15:27.253000 +CVE-2024-10466,0,1,d37780994ce15448788df211d1c90c720a82eab889668623785a34933f069579,2025-03-22T14:15:13.777000 CVE-2024-10467,0,0,e1f34dd6104cfd3e09c5a71b6aa3ee970947971a56a24313d0f901ec95ffb9ce,2024-11-04T13:26:32.343000 CVE-2024-10468,0,0,2e0775a6f7da096b11ed271b6d824dfb524d1f0c9aba0d0194c0beb3e139a796,2024-11-04T13:29:23.937000 CVE-2024-10469,0,0,5ff565379c9cc646c3a0577a3fc586a540310f1f97f93d9364541d739cdc52c2,2025-03-17T17:15:20.267000 @@ -255666,7 +255666,7 @@ CVE-2024-28853,0,0,4174d9fe94e784f7c3c99aec47d682c70c2da871c53d6c4ae537c46c4c434 CVE-2024-28854,0,0,fc72a1af9a4423f23eb1c2bfab5673b3cdf91d9369b066233da617e99e87a321,2024-11-21T09:07:03.207000 CVE-2024-28855,0,0,acb3d3e157cc68dbbea7f5c0e503c2de3d780f240741901169138f093e88a38c,2025-01-08T18:14:28.137000 CVE-2024-28859,0,0,6f026de9f6ccdab17442bfff936b54d3f18997dbcded841f5c04513f5212d2c9,2024-11-21T09:07:03.500000 -CVE-2024-2886,0,0,394d8e95a7c910d17686664af11972d5aee835e493ecc95268e0fb8dd1bffa87,2024-12-19T16:09:30.553000 +CVE-2024-2886,0,1,e685f1bc0205345c0f4a920ffe567af3277e0db261d94786025a410df3a46984,2025-03-22T14:15:14.203000 CVE-2024-28860,0,0,615b0e6dc4018679696c4d7b10ac840d76cd4c01792710452a17c3362532000e,2024-11-21T09:07:03.630000 CVE-2024-28861,0,0,91b8766631083f156e1aa3c97aef0422736858e553cc07c5e68f331bab68b22d,2024-11-21T09:07:03.770000 CVE-2024-28862,0,0,89d0e093402bd6601cb90bf8ad7d51712587ca0c9a18ec4ae831f726f4d4bd6f,2024-11-21T09:07:03.893000 @@ -264422,7 +264422,7 @@ CVE-2024-39920,0,0,2d0ffc6668fc09328c8963241ae091338acc28267b723bf4cce9dfe8a3e96 CVE-2024-39921,0,0,36bf5d750808c8cee840a08fb05bf4c020bb5eda7905a41156147b0de38b82b1,2025-03-13T14:15:29.073000 CVE-2024-39922,0,0,fe52b48aabfd6b21ca5931e383040552b3df966bff80bf5d23fd885e311735af,2024-08-13T12:58:25.437000 CVE-2024-39924,0,0,775d84fe24787256203d85215326581603dd25a3938d9f3efe7e3d3d7a679dd8,2025-03-18T20:15:22.283000 -CVE-2024-39925,0,0,9746dcc58fb8cecc9e1d89cf824e88cac8bc60fdcab25d7646a74784aca525c7,2025-01-09T18:15:28.117000 +CVE-2024-39925,0,1,2dce2b5635f20716f4573e8a9514565ced1083510693ffee5ac173e59be9bed4,2025-03-22T14:15:14.477000 CVE-2024-39926,0,0,62755f8b10d8d8cd0280358f682aebb8f7ee34ebaeb719fb16dd73cfad42b335,2025-03-18T19:15:43.093000 CVE-2024-39927,0,0,d102506d349c6cd661c84f9625100fb5afa84e23351ca69840c038d426e26cb0,2024-11-21T09:28:35.253000 CVE-2024-39928,0,0,36746816d5a179f8dacaec6e67ea9b447cd0145aa354104fbfbe630b6bc05ce0,2024-11-21T09:28:35.457000 @@ -264880,7 +264880,7 @@ CVE-2024-40846,0,0,9b851b4ce2280168886b830fe034334f0fa1485f27e31834954a719ee17a0 CVE-2024-40847,0,0,ee5396e6f19805c5499c62b220104fc60114c82964b16e0b3e6ff332e23edee0,2024-09-24T15:56:35.753000 CVE-2024-40848,0,0,86d3355851a7ddfb425292a80fa877eed599c8da4dfe9e7c1117852b3f5a865a,2024-09-24T15:57:03.893000 CVE-2024-4085,0,0,787927bdbc60dd0adde121aa412a76d92ada213a43fd5512122c43f33043e993,2024-11-21T09:42:09.953000 -CVE-2024-40850,0,0,e801dfe1b5836330a5238e832cf4a665932ae66da89298e09c70965412d21020,2024-09-24T15:41:22.803000 +CVE-2024-40850,0,1,5fd4e1ce89b67cdde96ea8f6e4b8c9b60c6c754c7baeb31ce3f1ef13a57a0421,2025-03-22T14:15:14.713000 CVE-2024-40851,0,0,b958c164114af6b23a2bf7ef2bd1c6335c3be241ec455192784b6b386c9ef358,2024-10-30T15:35:14.883000 CVE-2024-40852,0,0,2b759a1210705870844044ed842e04e851ef9bf743602e800520414310179172,2025-03-19T18:15:21.487000 CVE-2024-40853,0,0,dfc9fa03d8fda58ef712d436e720ae0f21a7fffb74fe4326b57538d3690d7a89,2024-10-30T17:08:42.157000 @@ -267591,7 +267591,7 @@ CVE-2024-44132,0,0,8afd03fa4900bdc815951be587052cdc1902d648f6c0f1c1ad745b8e3479d CVE-2024-44133,0,0,9196ca541ad45474d5d5e36a2a1369fb1dbddc304bb390dd887770a28cf137d9,2024-09-24T18:24:44.733000 CVE-2024-44134,0,0,1612170244774fb2cb867230c7f5140525c8398caef327a950c8a1f1680c0c76,2025-03-13T21:15:41.717000 CVE-2024-44135,0,0,1f924f524e9404eadff6cf55bcdf5ce85faa4ce5abb51a5bd0b4ada1a8260302,2025-03-19T19:15:41.400000 -CVE-2024-44136,0,0,47f88abd6453d6797640eb3202b455efa88abb286d5ec26cab193900882bd1e7,2025-03-04T15:30:49.700000 +CVE-2024-44136,0,1,3f10ba2fc6f9d89689dbedfa47ad2452465bd91d215ce415d8601c8530edd5bd,2025-03-22T14:15:14.963000 CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000 CVE-2024-44139,0,0,be06b795fe6d7868956b3a70d447846cad4f23d9f9a466844492bf3101bd5609,2025-03-20T14:15:20.510000 CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000 @@ -272531,7 +272531,7 @@ CVE-2024-51115,0,0,97924e30f339bc462ccaad1ee3c55c378e15485436cb0bc88676f0cde0303 CVE-2024-51116,0,0,163c0d7988ca5329a27514b03075ee6d2fff2ef84e9d3dc466528f493b745f84,2024-11-06T18:17:17.287000 CVE-2024-5112,0,0,f6f8682deff2408f9f0c77bfeb2725995cf9c58df252da300d15c186fb6583c9,2025-02-21T20:06:52.563000 CVE-2024-51122,0,0,032eda6ef4356c413d34ec64379012302427108464591348425bff48a082f9f1,2025-03-18T21:15:30.977000 -CVE-2024-51123,0,0,2bb1738bbb248351932a54a02f9b972fc09822f7e39c985e25fce10334bbbef8,2025-02-18T18:15:26.130000 +CVE-2024-51123,0,1,7fb96633793369a89316aaa3fa097d3ce7001fefdc75c1abf4ea7cb6c1954e59,2025-03-22T14:15:15.170000 CVE-2024-51127,0,0,5c5f040ac9c1963b030c4696070e1ab6a5b9c29a6f9ce0ae7436199ee45f28e8,2024-11-21T09:45:17.017000 CVE-2024-5113,0,0,52336cb4930088acb460f77d5eb059ecb3d07bd3d2ff421073cdc789c54ac6fd,2025-02-21T20:01:00.100000 CVE-2024-51132,0,0,f5dcb22b7125a1b94089072dd6f184dd6f0e35c20d2f6ced62d92bb6eded7439,2024-11-06T20:35:34.173000 @@ -272662,7 +272662,7 @@ CVE-2024-51431,0,0,828fd39fe0bf7bfec25d83e9c0a08cb7b9c4b5cc6704676ba7781e14660e7 CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a4111b,2024-11-04T22:35:10.037000 CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 -CVE-2024-51440,0,0,203986c75a80a34d889d62b668b90a6f364317185f011a078d8cdc459d4daeba,2025-02-18T18:15:26.283000 +CVE-2024-51440,0,1,06e59d576ccec69ba7fffa18e55bdd3df09904f0f19824a66a13b2c049fe2fa3,2025-03-22T14:15:15.390000 CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000 CVE-2024-51448,0,0,c4c37037bf93a1f94e04f7270f02afe30201acf9ed636bd7a8ba3baefef67f6e,2025-01-18T15:15:08.183000 CVE-2024-5145,0,0,46ac64e27ebb5b10cf08e3fb4f67dd66a2e01ddc2757a70804d55019b5d37c34,2025-02-10T13:57:18.723000 @@ -276282,7 +276282,7 @@ CVE-2024-56883,0,0,f99cbbbe44810ecf20ee9a822aaeeb39d677436c7acf1f70c821dc9769f4f CVE-2024-56889,0,0,5327859a7c5496e1e94f8bb9c02a37e2b8342a40649f534ed6f47845e36ee4d6,2025-03-18T15:15:58.090000 CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000 CVE-2024-56897,0,0,c86a728646b989ba2c34050e6cf558894a483f9e45fac8ad92b270dc1bfac754,2025-03-03T20:15:43.540000 -CVE-2024-56898,0,0,6acb612a6a6d6abd3f207db73f49bdae4c033cc146d6a92b4e551f8b5a4c516d,2025-03-04T22:15:38.990000 +CVE-2024-56898,0,1,8124ee23f832958edf569107c7b288b2df457e1cf5fa891be5bacb4a1456c4c4,2025-03-22T14:15:15.590000 CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000 CVE-2024-56901,0,0,64eb0224a857e749243b1bd7bc2761e2c8263ae6819e4c9704a3b8650c9b496e,2025-03-04T22:15:39.143000 CVE-2024-56902,0,0,3ef5942ce98190c5aa70f63a17781c2e2ea98e203a6427a08886aad5d3b44a9f,2025-03-04T22:15:39.340000 @@ -276291,7 +276291,7 @@ CVE-2024-56908,0,0,bbe0040508ad69151e90ab47c62a14618486e1b0815c01e094680be9e1e71 CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000 CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000 CVE-2024-5692,0,0,4b8f65097356fd8a548c2da4761bef878e098b44587a5b9b21bc347f46db95a8,2024-11-21T09:48:10.633000 -CVE-2024-56921,0,0,ba82c86335d04bad9edbac3e379f7d35c5fbb760088d7e84284ac0abfbc51bcb,2025-02-18T19:15:20.223000 +CVE-2024-56921,0,1,fb030f17d9ca025a22ece745e7ce38e34d1baa5c5f879c2284e94607c9076c35,2025-03-22T14:15:15.787000 CVE-2024-56923,0,0,e2647403e0cf85e5fccf746b53a51e00d5aac61312608ca59ffcd83f3ff65dd9,2025-01-28T23:15:08.067000 CVE-2024-56924,0,0,255fb5d959e1f1b6d9220b28e96e646f40e846b04df600718295ece436269b5a,2025-01-23T17:15:16.710000 CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff3a,2024-11-21T09:48:10.807000 @@ -276570,7 +276570,7 @@ CVE-2024-57579,0,0,9ef3b077a13ee9d7526f1e765503d92542de13cba7b0fad4972ba1a9202a5 CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000 CVE-2024-57580,0,0,ecfed55cf5b358c127e395a3e898c26702966c4825a41b3d33a695e34d0cb776,2025-03-18T19:15:46.850000 CVE-2024-57581,0,0,4a3545198765c6460c9df2bbd8da1004daef02a4f94355754c92d51aeea05e63,2025-03-18T19:15:47.037000 -CVE-2024-57582,0,0,7f0bdbfb20bee47b5db3337db07c31ce48f2668f9c89a58867304315f780738b,2025-03-06T12:45:04.363000 +CVE-2024-57582,0,1,269fcfd2c5396a242690f6c1fdf50c42960a075cd46c2130a0df0e7c00b215ce,2025-03-22T14:15:15.960000 CVE-2024-57583,0,0,ccfb387ff3c30d35babb34dfb2c64006998b94ce941ed7ea8395016f8be83325,2025-02-04T15:15:18.557000 CVE-2024-57587,0,0,69e0c38068f525a5b86457cd182be111c6d82d7686ae8a5f6131539166579a3b,2025-02-07T17:15:30.453000 CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000 @@ -276584,7 +276584,7 @@ CVE-2024-57602,0,0,226d91ed331e63f738fd3b8b845736eb5a7fc570a3a123d5ea996b5176962 CVE-2024-57603,0,0,8818c006a29d6f4bd13b4237aca8900d379684c37788b65eab93543c45a04038,2025-02-13T19:15:13.890000 CVE-2024-57604,0,0,9dc897647370ae27cc2a2fe45d9c565c9d827fa05aa881ae8c05dff72d178677,2025-03-20T15:15:43.980000 CVE-2024-57605,0,0,c41e31bc0c6b4266a22e57b7929d37215234774341d010b325202d9b2f8dc9f2,2025-03-19T15:15:52.740000 -CVE-2024-57606,0,0,282e31e88d82eac2f58eed0179e45942a66af52f2bd7847e92a7866919540d55,2025-02-18T19:15:22.280000 +CVE-2024-57606,0,1,88fff29b8b35a01ed272a18dce87c845eb952014b7761d37d399b66c213e66c6,2025-03-22T14:15:16.170000 CVE-2024-57608,0,0,f13d7092b69ab1bb8b9d9e29e8d71dd51ba622da797972897165fa9f6e4af609,2025-02-25T21:15:17.440000 CVE-2024-57609,0,0,7e89dbfffc522c22f84645f0c7d618897ea46d1866f82abe6573f3d9437ce18a,2025-02-10T22:15:36.660000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 @@ -282069,10 +282069,10 @@ CVE-2025-1965,0,0,94142314decf969cb625fbe5f5173ddc5911c761141f6a49332469100f4ccc CVE-2025-1966,0,0,484790f384757cd860d44d775ad23e95b8fca8bf89b5fa355da6cc99fa836820,2025-03-05T15:15:17.260000 CVE-2025-1967,0,0,f0d59c4ed441992299da9f393860b37f43033720577e761dda371f9ecd7295bf,2025-03-05T15:15:17.410000 CVE-2025-1969,0,0,00a186c236826ccc3fef0cf6a93be58578d3139f3a01ea0f0842aa271ed48f15,2025-03-04T19:15:38.290000 -CVE-2025-1970,1,1,c01adcaf18acac016f78895b73f7486093810b323ebc7285186e86ab961aee74,2025-03-22T12:15:25.797000 -CVE-2025-1971,1,1,4a2b8144dd19911475cb202ad5b0fc41816e2274b0457fd660842d87000a8960,2025-03-22T12:15:26.250000 -CVE-2025-1972,1,1,39a04d69341a0c32b56fe67c505fb16be349bb9aa3087534657e562d73ae342c,2025-03-22T12:15:26.453000 -CVE-2025-1973,1,1,b6ae81035c81acceab2bd5b9863d4f788493d3267f60db7276c8c1b3344b6337,2025-03-22T12:15:26.653000 +CVE-2025-1970,0,0,c01adcaf18acac016f78895b73f7486093810b323ebc7285186e86ab961aee74,2025-03-22T12:15:25.797000 +CVE-2025-1971,0,0,4a2b8144dd19911475cb202ad5b0fc41816e2274b0457fd660842d87000a8960,2025-03-22T12:15:26.250000 +CVE-2025-1972,0,0,39a04d69341a0c32b56fe67c505fb16be349bb9aa3087534657e562d73ae342c,2025-03-22T12:15:26.453000 +CVE-2025-1973,0,0,b6ae81035c81acceab2bd5b9863d4f788493d3267f60db7276c8c1b3344b6337,2025-03-22T12:15:26.653000 CVE-2025-1979,0,0,5cf047efa61126850f2bff74f6db8ba74d6d633b7373b143cc2f515f22996b33,2025-03-06T16:15:54.187000 CVE-2025-1984,0,0,9c3841609345cdbc038774b45498dc390a4f9eba4042b93fef2b069dfe449491,2025-03-14T18:15:31.507000 CVE-2025-2000,0,0,3966b3252f7ea9903e46e4407551ffba5512eba0a2fd5f6e51fd225e0b840ed0,2025-03-14T13:15:40.907000 @@ -282972,6 +282972,7 @@ CVE-2025-21856,0,0,b09c68ce23969b8e4c4ebe578130af0c7fcaa476814ad748e7bff8a78b6b4 CVE-2025-21857,0,0,3e4b4b05242172562d45bfa80d4257741cfbd88b174535be049ad449c2660fc1,2025-03-13T21:15:46.950000 CVE-2025-21858,0,0,66d9ca804eb089b50343b13981639c14692bfbf712b8926853e87f75b6577d63,2025-03-13T21:15:38.600000 CVE-2025-21859,0,0,5a61501b66729f01bab9df64cbc72760c95b1c81ad9a7b8699565186c12dc20c,2025-03-13T21:15:30.040000 +CVE-2025-2186,1,1,afe893c7c50e4e6991ba24a24f04513ebe86e2979c302e20a272eed16c097c1a,2025-03-22T13:15:35.683000 CVE-2025-21860,0,0,7476c13026bd288cabe804eff8c676854d340bd1f590ce0f8ad19ee85a60a573,2025-03-13T21:14:08.347000 CVE-2025-21861,0,0,512ea035cfd08d344857d6a2838b2f5da0a011cdea325d0d3a43a8bdbd21a518,2025-03-13T21:14:01.013000 CVE-2025-21862,0,0,903ae3891f0b02eb2409a29ac67b669381656af60d8ebe4a4187837a3dfc54de,2025-03-13T21:13:53.200000 @@ -283584,7 +283585,7 @@ CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9 CVE-2025-23083,0,0,8794d1163f9c90d3558297e77a843291a9ed4394f361008c98d5897814fbbb44,2025-02-28T13:15:28.213000 CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000 CVE-2025-23085,0,0,889840804db6ae2520e814bb23e4a445ed73b7383c73820abba13ffae74db43d,2025-02-25T13:15:11.103000 -CVE-2025-23086,0,0,4888f5c9ad449f11aff3bd2005f3629d6cccf17b7858fa974396434a1fb1f4d8,2025-02-18T21:15:28.100000 +CVE-2025-23086,0,1,46dcdec6710242421727659f0f9de0b53db2ce8f2873db285d1b397dda7f2559,2025-03-22T14:15:16.360000 CVE-2025-23087,0,0,bfbdb144af271fa0463b1cfacae0c03f133d0c7157b9b6f33c666f41bdde0ea8,2025-03-01T03:15:23.067000 CVE-2025-23088,0,0,369a084c0dac91f467d46a297093ab8c7b697484ff2e61fc017ffe639e3c12ed,2025-03-01T03:15:23.157000 CVE-2025-23089,0,0,8538abc6f83acab58bdcb6440f1e22c462d137c99186166b0dcb3a7a245230db,2025-03-01T03:15:23.210000 @@ -283663,7 +283664,7 @@ CVE-2025-23240,0,0,544a1feaf6fe3c4f1a8295794a4960f2a0fc447d643c5c30d52cfb77d4db3 CVE-2025-23242,0,0,9b20bedcf14352ca9df0a5ecc34f6004c4e1503c511865ff1afa1d3c82eca056,2025-03-11T20:15:16.280000 CVE-2025-23243,0,0,d341dee54207e76092fa73545c292abf7fbfda4eb6567d84dd5238ba2f02d191,2025-03-11T20:15:16.463000 CVE-2025-2325,0,0,3c6b219229dc76a33d78d2ccb8fd1f767d78355c555f30961ca2b7b219af14fc,2025-03-15T07:15:35.107000 -CVE-2025-2331,1,1,b072726b3afe477229f13ce6fa12da5840fde8f6531f821787ad2abd1eb769a5,2025-03-22T12:15:26.833000 +CVE-2025-2331,0,0,b072726b3afe477229f13ce6fa12da5840fde8f6531f821787ad2abd1eb769a5,2025-03-22T12:15:26.833000 CVE-2025-2333,0,0,600470717f73ae989a4e33407be9c331e6223c6ec027e4a7c73886df7950cb72,2025-03-15T12:15:12.610000 CVE-2025-2334,0,0,af1cfc1613b38618f43c910beb17815194cac4ddb461c16fb47f2aba7d734581,2025-03-17T16:15:27.017000 CVE-2025-2335,0,0,706aa2907d4bd291d4dd781e9005e6e8f3456955d568c8d3d9b369e28c0e73aa,2025-03-16T03:15:37.907000 @@ -285225,7 +285226,7 @@ CVE-2025-25766,0,0,f39b595117fd6ac0197008d13a65ac6ad37b800d031e5372f4209ffae8413 CVE-2025-25767,0,0,dfbd9b86591c00c02b0b6c93af6c4513b8035921c944dca23036a1a8ab9e4095,2025-03-03T20:15:46.770000 CVE-2025-25768,0,0,c0ea06537ea4dff0558f2426b2095c6f0d5d7ca5691b12d94a7b7cd0158fea90,2025-03-03T20:15:46.940000 CVE-2025-25769,0,0,c04f243adfab6d0c228896823c1de48d6c8d1554d46e87c10f438472ea98cdce,2025-02-24T18:15:19.487000 -CVE-2025-2577,1,1,929de73a39a3543c29173f273a3d41f338242898e72fad38fbcc81d8274db1d5,2025-03-22T12:15:27.013000 +CVE-2025-2577,0,0,929de73a39a3543c29173f273a3d41f338242898e72fad38fbcc81d8274db1d5,2025-03-22T12:15:27.013000 CVE-2025-25770,0,0,083dca9bf78425b081932176ffd5590f62d2e6b52d7243e21c6da305bd5b4229,2025-02-24T18:15:20.280000 CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000 CVE-2025-25774,0,0,69d43747c15f87af0da05215cab928648fd3e1ba63812309aa7f5e031fa6f50d,2025-03-12T19:15:39.777000 @@ -285343,7 +285344,10 @@ CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872c CVE-2025-2616,0,0,1df0cf877e710fe9be61f38515f018771e2a185b2390858bae14abf7c5bbe46a,2025-03-22T10:15:16.533000 CVE-2025-26163,0,0,1a8da14fd3182531e44fdb492b7c9a837211526283840a4e5bb4333cbf418032,2025-03-19T19:15:46.853000 CVE-2025-26167,0,0,b243267aa31b3c4d3db94db42f2915c63c26a12d7e4452c1efdd061381d17d44,2025-03-07T20:15:38.347000 +CVE-2025-2617,1,1,17ecf2a4afb7fa68080612946426fe6502dcbc52588757f2cad26c1a96015f20,2025-03-22T13:15:35.837000 +CVE-2025-2618,1,1,a0be16c007291a7654dfbd4f2c2eb5cd5612dbfd0d66d1c468dbb0c63d5d84a8,2025-03-22T14:15:16.650000 CVE-2025-26182,0,0,50bc93eea6be4a4f051a5cba8257a428d894f0c81b2a5095709deaa26b1aeef7,2025-03-05T19:15:39.023000 +CVE-2025-2619,1,1,27e06b14b4922e101e410b948b2adbb5b081f3be43d641aabf6c3fa5baa51dc1,2025-03-22T14:15:16.867000 CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000 CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000 CVE-2025-26202,0,0,f8b0cbe65a751dd37df4c2f886b778f4059fbbdee95a620e7d770c31cb87373d,2025-03-14T20:15:14.167000 @@ -285574,6 +285578,7 @@ CVE-2025-26789,0,0,ebea494059b94de49b6b520d5766b69e65af5f122cf9ef029bba111909dc2 CVE-2025-26791,0,0,a7d63ea0959b4846f11cfb3951f45279f457c98157e5d52d56097a5da007bce1,2025-02-14T16:15:37.350000 CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27eec1,2025-02-24T17:15:14.580000 CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000 +CVE-2025-26796,1,1,9dbf889de866ca41ab74b84afcf0d854880b44cea138661c6f19e43b7bc96f29,2025-03-22T14:15:16.537000 CVE-2025-26803,0,0,8c486e737c398ad4bd709101648ff92403877558e051d24af9f92cf436430efd,2025-02-28T17:21:55.827000 CVE-2025-26816,0,0,2ec5a5349b9517d8ba53395229a7b8942acd452c9df91a0b3e2328a764fb96c9,2025-03-20T21:15:23.273000 CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000