Auto-Update: 2025-03-22T15:00:20.196709+00:00

This commit is contained in:
cad-safe-bot 2025-03-22 15:03:51 +00:00
parent 64f76a235b
commit b20edaf720
19 changed files with 993 additions and 53 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-10466", "id": "CVE-2024-10466",
"sourceIdentifier": "security@mozilla.org", "sourceIdentifier": "security@mozilla.org",
"published": "2024-10-29T13:15:04.273", "published": "2024-10-29T13:15:04.273",
"lastModified": "2025-01-09T18:15:27.253", "lastModified": "2025-03-22T14:15:13.777",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2886", "id": "CVE-2024-2886",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-03-26T21:15:53.260", "published": "2024-03-26T21:15:53.260",
"lastModified": "2024-12-19T16:09:30.553", "lastModified": "2025-03-22T14:15:14.203",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -69,6 +69,16 @@
"value": "CWE-416" "value": "CWE-416"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-39925", "id": "CVE-2024-39925",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-09-13T18:15:03.927", "published": "2024-09-13T18:15:03.927",
"lastModified": "2025-01-09T18:15:28.117", "lastModified": "2025-03-22T14:15:14.477",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Carece de un proceso de desvinculaci\u00f3n para los miembros que abandonan una organizaci\u00f3n. Como resultado, la clave de organizaci\u00f3n compartida no se rota cuando un miembro se va. En consecuencia, el miembro que se va, cuyo acceso debe revocarse, conserva una copia de la clave de la organizaci\u00f3n. Adem\u00e1s, la aplicaci\u00f3n no protege adecuadamente algunos datos cifrados almacenados en el servidor. En consecuencia, un usuario autenticado podr\u00eda obtener acceso no autorizado a los datos cifrados de cualquier organizaci\u00f3n, incluso si el usuario no es miembro de la organizaci\u00f3n en cuesti\u00f3n. Sin embargo, el usuario necesitar\u00eda saber el ID de organizaci\u00f3n correspondiente. Por lo tanto, si un usuario (cuyo acceso a una organizaci\u00f3n ha sido revocado) ya posee la clave de la organizaci\u00f3n, ese usuario podr\u00eda usar la clave para descifrar los datos filtrados." "value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Carece de un proceso de desvinculaci\u00f3n para los miembros que abandonan una organizaci\u00f3n. Como resultado, la clave de organizaci\u00f3n compartida no se rota cuando un miembro se va. En consecuencia, el miembro que se va, cuyo acceso debe revocarse, conserva una copia de la clave de la organizaci\u00f3n. Adem\u00e1s, la aplicaci\u00f3n no protege adecuadamente algunos datos cifrados almacenados en el servidor. En consecuencia, un usuario autenticado podr\u00eda obtener acceso no autorizado a los datos cifrados de cualquier organizaci\u00f3n, incluso si el usuario no es miembro de la organizaci\u00f3n en cuesti\u00f3n. Sin embargo, el usuario necesitar\u00eda saber el ID de organizaci\u00f3n correspondiente. Por lo tanto, si un usuario (cuyo acceso a una organizaci\u00f3n ha sido revocado) ya posee la clave de la organizaci\u00f3n, ese usuario podr\u00eda usar la clave para descifrar los datos filtrados."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/dani-garcia/vaultwarden/releases", "url": "https://github.com/dani-garcia/vaultwarden/releases",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40850", "id": "CVE-2024-40850",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:49.383", "published": "2024-09-17T00:15:49.383",
"lastModified": "2024-09-24T15:41:22.803", "lastModified": "2025-03-22T14:15:14.713",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44136", "id": "CVE-2024-44136",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2025-01-15T20:15:27.923", "published": "2025-01-15T20:15:27.923",
"lastModified": "2025-03-04T15:30:49.700", "lastModified": "2025-03-22T14:15:14.963",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,19 +36,49 @@
}, },
"exploitabilityScore": 0.9, "exploitabilityScore": 0.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
} }
] ]
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Primary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51123", "id": "CVE-2024-51123",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-02-12T22:15:39.717", "published": "2025-02-12T22:15:39.717",
"lastModified": "2025-02-18T18:15:26.130", "lastModified": "2025-03-22T14:15:15.170",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en Zertificon Z1 SecureMail Z1 SecureMail Gateway 4.44.2-7240-debian12 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del componente /compose-pdf.xhtml?convid=[id]." "value": "Un problema en Zertificon Z1 SecureMail Z1 SecureMail Gateway 4.44.2-7240-debian12 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del componente /compose-pdf.xhtml?convid=[id]."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/MVRC-ITSEC/CVEs/blob/main/CVE-2024-51123", "url": "https://github.com/MVRC-ITSEC/CVEs/blob/main/CVE-2024-51123",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51440", "id": "CVE-2024-51440",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-02-12T22:15:39.990", "published": "2025-02-12T22:15:39.990",
"lastModified": "2025-02-18T18:15:26.283", "lastModified": "2025-03-22T14:15:15.390",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en Nothing Tech Nothing OS v.2.6 permite que un atacante local escale privilegios a trav\u00e9s del componente NtBpfService." "value": "Un problema en Nothing Tech Nothing OS v.2.6 permite que un atacante local escale privilegios a trav\u00e9s del componente NtBpfService."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://sharedobject.blog/posts/nothing-bpf/", "url": "https://sharedobject.blog/posts/nothing-bpf/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56898", "id": "CVE-2024-56898",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:14.047", "published": "2025-02-03T21:15:14.047",
"lastModified": "2025-03-04T22:15:38.990", "lastModified": "2025-03-22T14:15:15.590",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "El control de acceso incorrecto en Geovision GV-ASWeb versi\u00f3n 6.1.0.0 o anterior permite que atacantes no autorizados con privilegios de bajo nivel administren y creen nuevas cuentas de usuario mediante el suministro de una solicitud HTTP manipulada." "value": "El control de acceso incorrecto en Geovision GV-ASWeb versi\u00f3n 6.1.0.0 o anterior permite que atacantes no autorizados con privilegios de bajo nivel administren y creen nuevas cuentas de usuario mediante el suministro de una solicitud HTTP manipulada."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/DRAGOWN/CVE-2024-56898", "url": "https://github.com/DRAGOWN/CVE-2024-56898",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56921", "id": "CVE-2024-56921",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T20:15:33.610", "published": "2025-02-03T20:15:33.610",
"lastModified": "2025-02-18T19:15:20.223", "lastModified": "2025-03-22T14:15:15.787",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en Open5gs v2.7.2. InitialUEMessage, la solicitud de registro enviada a una hora espec\u00edfica puede hacer que AMF se bloquee debido a una gesti\u00f3n incorrecta de errores de la funci\u00f3n gmm_state_exception() al recibir la respuesta Nausf_UEAuthentication_Authenticate." "value": "Se descubri\u00f3 un problema en Open5gs v2.7.2. InitialUEMessage, la solicitud de registro enviada a una hora espec\u00edfica puede hacer que AMF se bloquee debido a una gesti\u00f3n incorrecta de errores de la funci\u00f3n gmm_state_exception() al recibir la respuesta Nausf_UEAuthentication_Authenticate."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/open5gs/open5gs/commit/f780f9af45c27b6f49987d96ba71dedb3dd85840", "url": "https://github.com/open5gs/open5gs/commit/f780f9af45c27b6f49987d96ba71dedb3dd85840",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57582", "id": "CVE-2024-57582",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T21:15:17.627", "published": "2025-01-16T21:15:17.627",
"lastModified": "2025-03-06T12:45:04.363", "lastModified": "2025-03-22T14:15:15.960",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-787" "value": "CWE-787"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57606", "id": "CVE-2024-57606",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-02-07T22:15:13.707", "published": "2025-02-07T22:15:13.707",
"lastModified": "2025-02-18T19:15:22.280", "lastModified": "2025-03-22T14:15:16.170",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Beijing Guoju Information Technology Co., Ltd JeecgBoot v.3.7.2 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente getTotalData." "value": "Vulnerabilidad de inyecci\u00f3n SQL en Beijing Guoju Information Technology Co., Ltd JeecgBoot v.3.7.2 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente getTotalData."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/jeecgboot/JeecgBoot/issues/7665", "url": "https://github.com/jeecgboot/JeecgBoot/issues/7665",

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-2186",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-22T13:15:35.683",
"lastModified": "2025-03-22T13:15:35.683",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to SQL Injection via the \u2018automationId\u2019 parameter in all versions up to, and including, 3.5.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-marketing-automations/trunk/includes/api/wc/class-bwfan-api-get-automation-dynamic-coupon.php#L50",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3257474/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/88f8fa25-e3d5-4dfd-aae5-68b5880ffd53?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-23086", "id": "CVE-2025-23086",
"sourceIdentifier": "support@hackerone.com", "sourceIdentifier": "support@hackerone.com",
"published": "2025-01-21T05:15:07.960", "published": "2025-01-21T05:15:07.960",
"lastModified": "2025-02-18T21:15:28.100", "lastModified": "2025-03-22T14:15:16.360",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "En la mayor\u00eda de las plataformas de escritorio, las versiones 1.70.x-1.73.x de Brave Browser inclu\u00edan una funci\u00f3n para mostrar el origen de un sitio en el cuadro de di\u00e1logo de selecci\u00f3n de archivos proporcionado por el sistema operativo cuando un sitio solicita al usuario que cargue o descargue un archivo. Sin embargo, en algunos casos, el origen no se dedujo correctamente. Cuando se combina con una vulnerabilidad de redireccionamiento abierto en un sitio confiable, esto podr\u00eda permitir que un sitio malicioso inicie una descarga cuyo origen en el cuadro de di\u00e1logo de selecci\u00f3n de archivos aparece como el sitio confiable que inici\u00f3 la redirecci\u00f3n." "value": "En la mayor\u00eda de las plataformas de escritorio, las versiones 1.70.x-1.73.x de Brave Browser inclu\u00edan una funci\u00f3n para mostrar el origen de un sitio en el cuadro de di\u00e1logo de selecci\u00f3n de archivos proporcionado por el sistema operativo cuando un sitio solicita al usuario que cargue o descargue un archivo. Sin embargo, en algunos casos, el origen no se dedujo correctamente. Cuando se combina con una vulnerabilidad de redireccionamiento abierto en un sitio confiable, esto podr\u00eda permitir que un sitio malicioso inicie una descarga cuyo origen en el cuadro de di\u00e1logo de selecci\u00f3n de archivos aparece como el sitio confiable que inici\u00f3 la redirecci\u00f3n."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://hackerone.com/reports/2888770", "url": "https://hackerone.com/reports/2888770",

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-26796",
"sourceIdentifier": "security@apache.org",
"published": "2025-03-22T13:15:35.513",
"lastModified": "2025-03-22T14:15:16.537",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "security@apache.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Oozie.\n\nThis issue affects Apache Oozie: all versions.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/fzrmsslnrpl0vpp0jr73fosmfjv4omdq",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/03/21/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-2617",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-22T13:15:35.837",
"lastModified": "2025-03-22T13:15:35.837",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in yangyouwang \u6768\u6709\u65fa crud \u7b80\u7ea6\u540e\u53f0\u7ba1\u7406\u7cfb\u7edf 1.0.0. Affected by this vulnerability is an unknown functionality of the component Department Page. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 2.4,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"baseScore": 3.3,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://gitee.com/yangyouwang/crud/issues/IBSPOX",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.300619",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.300619",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,152 @@
{
"id": "CVE-2025-2618",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-22T14:15:16.650",
"lastModified": "2025-03-22T14:15:16.650",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in D-Link DAP-1620 1.03. Affected by this issue is the function set_ws_action of the file /dws/api/ of the component Path Handler. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.300620",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.300620",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.518963",
"source": "cna@vuldb.com"
},
{
"url": "https://witty-maiasaura-083.notion.site/D-link-DAP-1620-set_ws_action-Vulnerability-1afb2f2a6361804e86dcde1e78ea2a8e",
"source": "cna@vuldb.com"
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,152 @@
{
"id": "CVE-2025-2619",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-22T14:15:16.867",
"lastModified": "2025-03-22T14:15:16.867",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.300621",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.300621",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.518968",
"source": "cna@vuldb.com"
},
{
"url": "https://witty-maiasaura-083.notion.site/D-link-DAP-1620-check_dws_cookie-Vulnerability-1b4b2f2a6361805ca74fdf4949385ade",
"source": "cna@vuldb.com"
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-03-22T13:00:19.342970+00:00 2025-03-22T15:00:20.196709+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-03-22T12:15:27.013000+00:00 2025-03-22T14:15:16.867000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,25 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
286213 286218
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `6` Recently added CVEs: `5`
- [CVE-2025-1970](CVE-2025/CVE-2025-19xx/CVE-2025-1970.json) (`2025-03-22T12:15:25.797`) - [CVE-2025-2186](CVE-2025/CVE-2025-21xx/CVE-2025-2186.json) (`2025-03-22T13:15:35.683`)
- [CVE-2025-1971](CVE-2025/CVE-2025-19xx/CVE-2025-1971.json) (`2025-03-22T12:15:26.250`) - [CVE-2025-2617](CVE-2025/CVE-2025-26xx/CVE-2025-2617.json) (`2025-03-22T13:15:35.837`)
- [CVE-2025-1972](CVE-2025/CVE-2025-19xx/CVE-2025-1972.json) (`2025-03-22T12:15:26.453`) - [CVE-2025-2618](CVE-2025/CVE-2025-26xx/CVE-2025-2618.json) (`2025-03-22T14:15:16.650`)
- [CVE-2025-1973](CVE-2025/CVE-2025-19xx/CVE-2025-1973.json) (`2025-03-22T12:15:26.653`) - [CVE-2025-2619](CVE-2025/CVE-2025-26xx/CVE-2025-2619.json) (`2025-03-22T14:15:16.867`)
- [CVE-2025-2331](CVE-2025/CVE-2025-23xx/CVE-2025-2331.json) (`2025-03-22T12:15:26.833`) - [CVE-2025-26796](CVE-2025/CVE-2025-267xx/CVE-2025-26796.json) (`2025-03-22T13:15:35.513`)
- [CVE-2025-2577](CVE-2025/CVE-2025-25xx/CVE-2025-2577.json) (`2025-03-22T12:15:27.013`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `12`
- [CVE-2024-10466](CVE-2024/CVE-2024-104xx/CVE-2024-10466.json) (`2025-03-22T14:15:13.777`)
- [CVE-2024-2886](CVE-2024/CVE-2024-28xx/CVE-2024-2886.json) (`2025-03-22T14:15:14.203`)
- [CVE-2024-39925](CVE-2024/CVE-2024-399xx/CVE-2024-39925.json) (`2025-03-22T14:15:14.477`)
- [CVE-2024-40850](CVE-2024/CVE-2024-408xx/CVE-2024-40850.json) (`2025-03-22T14:15:14.713`)
- [CVE-2024-44136](CVE-2024/CVE-2024-441xx/CVE-2024-44136.json) (`2025-03-22T14:15:14.963`)
- [CVE-2024-51123](CVE-2024/CVE-2024-511xx/CVE-2024-51123.json) (`2025-03-22T14:15:15.170`)
- [CVE-2024-51440](CVE-2024/CVE-2024-514xx/CVE-2024-51440.json) (`2025-03-22T14:15:15.390`)
- [CVE-2024-56898](CVE-2024/CVE-2024-568xx/CVE-2024-56898.json) (`2025-03-22T14:15:15.590`)
- [CVE-2024-56921](CVE-2024/CVE-2024-569xx/CVE-2024-56921.json) (`2025-03-22T14:15:15.787`)
- [CVE-2024-57582](CVE-2024/CVE-2024-575xx/CVE-2024-57582.json) (`2025-03-22T14:15:15.960`)
- [CVE-2024-57606](CVE-2024/CVE-2024-576xx/CVE-2024-57606.json) (`2025-03-22T14:15:16.170`)
- [CVE-2025-23086](CVE-2025/CVE-2025-230xx/CVE-2025-23086.json) (`2025-03-22T14:15:16.360`)
## Download and Usage ## Download and Usage

View File

@ -244790,7 +244790,7 @@ CVE-2024-10462,0,0,2786d011829da8771867443f24aa66a7980a2c1c4ede689df85c917119c6e
CVE-2024-10463,0,0,3ddfd266b41fd173cebb851d2bc34cbf2c785db4b330494b6a3f4845aa6052a5,2024-11-04T13:31:20.073000 CVE-2024-10463,0,0,3ddfd266b41fd173cebb851d2bc34cbf2c785db4b330494b6a3f4845aa6052a5,2024-11-04T13:31:20.073000
CVE-2024-10464,0,0,fa0fca4ba089b4bc982df15af00e5fe7b90b3385712043456e98d4b150175b15,2024-11-04T13:30:23.513000 CVE-2024-10464,0,0,fa0fca4ba089b4bc982df15af00e5fe7b90b3385712043456e98d4b150175b15,2024-11-04T13:30:23.513000
CVE-2024-10465,0,0,8955d1f0157719f4fbefe7fae8269c4898adc0f8f926a16acb2d50f72eb39e2b,2024-11-04T13:30:10.847000 CVE-2024-10465,0,0,8955d1f0157719f4fbefe7fae8269c4898adc0f8f926a16acb2d50f72eb39e2b,2024-11-04T13:30:10.847000
CVE-2024-10466,0,0,56606dd3a844c97b0e77369c2884b635a3f644e0864760575415bc55442ba9d5,2025-01-09T18:15:27.253000 CVE-2024-10466,0,1,d37780994ce15448788df211d1c90c720a82eab889668623785a34933f069579,2025-03-22T14:15:13.777000
CVE-2024-10467,0,0,e1f34dd6104cfd3e09c5a71b6aa3ee970947971a56a24313d0f901ec95ffb9ce,2024-11-04T13:26:32.343000 CVE-2024-10467,0,0,e1f34dd6104cfd3e09c5a71b6aa3ee970947971a56a24313d0f901ec95ffb9ce,2024-11-04T13:26:32.343000
CVE-2024-10468,0,0,2e0775a6f7da096b11ed271b6d824dfb524d1f0c9aba0d0194c0beb3e139a796,2024-11-04T13:29:23.937000 CVE-2024-10468,0,0,2e0775a6f7da096b11ed271b6d824dfb524d1f0c9aba0d0194c0beb3e139a796,2024-11-04T13:29:23.937000
CVE-2024-10469,0,0,5ff565379c9cc646c3a0577a3fc586a540310f1f97f93d9364541d739cdc52c2,2025-03-17T17:15:20.267000 CVE-2024-10469,0,0,5ff565379c9cc646c3a0577a3fc586a540310f1f97f93d9364541d739cdc52c2,2025-03-17T17:15:20.267000
@ -255666,7 +255666,7 @@ CVE-2024-28853,0,0,4174d9fe94e784f7c3c99aec47d682c70c2da871c53d6c4ae537c46c4c434
CVE-2024-28854,0,0,fc72a1af9a4423f23eb1c2bfab5673b3cdf91d9369b066233da617e99e87a321,2024-11-21T09:07:03.207000 CVE-2024-28854,0,0,fc72a1af9a4423f23eb1c2bfab5673b3cdf91d9369b066233da617e99e87a321,2024-11-21T09:07:03.207000
CVE-2024-28855,0,0,acb3d3e157cc68dbbea7f5c0e503c2de3d780f240741901169138f093e88a38c,2025-01-08T18:14:28.137000 CVE-2024-28855,0,0,acb3d3e157cc68dbbea7f5c0e503c2de3d780f240741901169138f093e88a38c,2025-01-08T18:14:28.137000
CVE-2024-28859,0,0,6f026de9f6ccdab17442bfff936b54d3f18997dbcded841f5c04513f5212d2c9,2024-11-21T09:07:03.500000 CVE-2024-28859,0,0,6f026de9f6ccdab17442bfff936b54d3f18997dbcded841f5c04513f5212d2c9,2024-11-21T09:07:03.500000
CVE-2024-2886,0,0,394d8e95a7c910d17686664af11972d5aee835e493ecc95268e0fb8dd1bffa87,2024-12-19T16:09:30.553000 CVE-2024-2886,0,1,e685f1bc0205345c0f4a920ffe567af3277e0db261d94786025a410df3a46984,2025-03-22T14:15:14.203000
CVE-2024-28860,0,0,615b0e6dc4018679696c4d7b10ac840d76cd4c01792710452a17c3362532000e,2024-11-21T09:07:03.630000 CVE-2024-28860,0,0,615b0e6dc4018679696c4d7b10ac840d76cd4c01792710452a17c3362532000e,2024-11-21T09:07:03.630000
CVE-2024-28861,0,0,91b8766631083f156e1aa3c97aef0422736858e553cc07c5e68f331bab68b22d,2024-11-21T09:07:03.770000 CVE-2024-28861,0,0,91b8766631083f156e1aa3c97aef0422736858e553cc07c5e68f331bab68b22d,2024-11-21T09:07:03.770000
CVE-2024-28862,0,0,89d0e093402bd6601cb90bf8ad7d51712587ca0c9a18ec4ae831f726f4d4bd6f,2024-11-21T09:07:03.893000 CVE-2024-28862,0,0,89d0e093402bd6601cb90bf8ad7d51712587ca0c9a18ec4ae831f726f4d4bd6f,2024-11-21T09:07:03.893000
@ -264422,7 +264422,7 @@ CVE-2024-39920,0,0,2d0ffc6668fc09328c8963241ae091338acc28267b723bf4cce9dfe8a3e96
CVE-2024-39921,0,0,36bf5d750808c8cee840a08fb05bf4c020bb5eda7905a41156147b0de38b82b1,2025-03-13T14:15:29.073000 CVE-2024-39921,0,0,36bf5d750808c8cee840a08fb05bf4c020bb5eda7905a41156147b0de38b82b1,2025-03-13T14:15:29.073000
CVE-2024-39922,0,0,fe52b48aabfd6b21ca5931e383040552b3df966bff80bf5d23fd885e311735af,2024-08-13T12:58:25.437000 CVE-2024-39922,0,0,fe52b48aabfd6b21ca5931e383040552b3df966bff80bf5d23fd885e311735af,2024-08-13T12:58:25.437000
CVE-2024-39924,0,0,775d84fe24787256203d85215326581603dd25a3938d9f3efe7e3d3d7a679dd8,2025-03-18T20:15:22.283000 CVE-2024-39924,0,0,775d84fe24787256203d85215326581603dd25a3938d9f3efe7e3d3d7a679dd8,2025-03-18T20:15:22.283000
CVE-2024-39925,0,0,9746dcc58fb8cecc9e1d89cf824e88cac8bc60fdcab25d7646a74784aca525c7,2025-01-09T18:15:28.117000 CVE-2024-39925,0,1,2dce2b5635f20716f4573e8a9514565ced1083510693ffee5ac173e59be9bed4,2025-03-22T14:15:14.477000
CVE-2024-39926,0,0,62755f8b10d8d8cd0280358f682aebb8f7ee34ebaeb719fb16dd73cfad42b335,2025-03-18T19:15:43.093000 CVE-2024-39926,0,0,62755f8b10d8d8cd0280358f682aebb8f7ee34ebaeb719fb16dd73cfad42b335,2025-03-18T19:15:43.093000
CVE-2024-39927,0,0,d102506d349c6cd661c84f9625100fb5afa84e23351ca69840c038d426e26cb0,2024-11-21T09:28:35.253000 CVE-2024-39927,0,0,d102506d349c6cd661c84f9625100fb5afa84e23351ca69840c038d426e26cb0,2024-11-21T09:28:35.253000
CVE-2024-39928,0,0,36746816d5a179f8dacaec6e67ea9b447cd0145aa354104fbfbe630b6bc05ce0,2024-11-21T09:28:35.457000 CVE-2024-39928,0,0,36746816d5a179f8dacaec6e67ea9b447cd0145aa354104fbfbe630b6bc05ce0,2024-11-21T09:28:35.457000
@ -264880,7 +264880,7 @@ CVE-2024-40846,0,0,9b851b4ce2280168886b830fe034334f0fa1485f27e31834954a719ee17a0
CVE-2024-40847,0,0,ee5396e6f19805c5499c62b220104fc60114c82964b16e0b3e6ff332e23edee0,2024-09-24T15:56:35.753000 CVE-2024-40847,0,0,ee5396e6f19805c5499c62b220104fc60114c82964b16e0b3e6ff332e23edee0,2024-09-24T15:56:35.753000
CVE-2024-40848,0,0,86d3355851a7ddfb425292a80fa877eed599c8da4dfe9e7c1117852b3f5a865a,2024-09-24T15:57:03.893000 CVE-2024-40848,0,0,86d3355851a7ddfb425292a80fa877eed599c8da4dfe9e7c1117852b3f5a865a,2024-09-24T15:57:03.893000
CVE-2024-4085,0,0,787927bdbc60dd0adde121aa412a76d92ada213a43fd5512122c43f33043e993,2024-11-21T09:42:09.953000 CVE-2024-4085,0,0,787927bdbc60dd0adde121aa412a76d92ada213a43fd5512122c43f33043e993,2024-11-21T09:42:09.953000
CVE-2024-40850,0,0,e801dfe1b5836330a5238e832cf4a665932ae66da89298e09c70965412d21020,2024-09-24T15:41:22.803000 CVE-2024-40850,0,1,5fd4e1ce89b67cdde96ea8f6e4b8c9b60c6c754c7baeb31ce3f1ef13a57a0421,2025-03-22T14:15:14.713000
CVE-2024-40851,0,0,b958c164114af6b23a2bf7ef2bd1c6335c3be241ec455192784b6b386c9ef358,2024-10-30T15:35:14.883000 CVE-2024-40851,0,0,b958c164114af6b23a2bf7ef2bd1c6335c3be241ec455192784b6b386c9ef358,2024-10-30T15:35:14.883000
CVE-2024-40852,0,0,2b759a1210705870844044ed842e04e851ef9bf743602e800520414310179172,2025-03-19T18:15:21.487000 CVE-2024-40852,0,0,2b759a1210705870844044ed842e04e851ef9bf743602e800520414310179172,2025-03-19T18:15:21.487000
CVE-2024-40853,0,0,dfc9fa03d8fda58ef712d436e720ae0f21a7fffb74fe4326b57538d3690d7a89,2024-10-30T17:08:42.157000 CVE-2024-40853,0,0,dfc9fa03d8fda58ef712d436e720ae0f21a7fffb74fe4326b57538d3690d7a89,2024-10-30T17:08:42.157000
@ -267591,7 +267591,7 @@ CVE-2024-44132,0,0,8afd03fa4900bdc815951be587052cdc1902d648f6c0f1c1ad745b8e3479d
CVE-2024-44133,0,0,9196ca541ad45474d5d5e36a2a1369fb1dbddc304bb390dd887770a28cf137d9,2024-09-24T18:24:44.733000 CVE-2024-44133,0,0,9196ca541ad45474d5d5e36a2a1369fb1dbddc304bb390dd887770a28cf137d9,2024-09-24T18:24:44.733000
CVE-2024-44134,0,0,1612170244774fb2cb867230c7f5140525c8398caef327a950c8a1f1680c0c76,2025-03-13T21:15:41.717000 CVE-2024-44134,0,0,1612170244774fb2cb867230c7f5140525c8398caef327a950c8a1f1680c0c76,2025-03-13T21:15:41.717000
CVE-2024-44135,0,0,1f924f524e9404eadff6cf55bcdf5ce85faa4ce5abb51a5bd0b4ada1a8260302,2025-03-19T19:15:41.400000 CVE-2024-44135,0,0,1f924f524e9404eadff6cf55bcdf5ce85faa4ce5abb51a5bd0b4ada1a8260302,2025-03-19T19:15:41.400000
CVE-2024-44136,0,0,47f88abd6453d6797640eb3202b455efa88abb286d5ec26cab193900882bd1e7,2025-03-04T15:30:49.700000 CVE-2024-44136,0,1,3f10ba2fc6f9d89689dbedfa47ad2452465bd91d215ce415d8601c8530edd5bd,2025-03-22T14:15:14.963000
CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000 CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000
CVE-2024-44139,0,0,be06b795fe6d7868956b3a70d447846cad4f23d9f9a466844492bf3101bd5609,2025-03-20T14:15:20.510000 CVE-2024-44139,0,0,be06b795fe6d7868956b3a70d447846cad4f23d9f9a466844492bf3101bd5609,2025-03-20T14:15:20.510000
CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000 CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000
@ -272531,7 +272531,7 @@ CVE-2024-51115,0,0,97924e30f339bc462ccaad1ee3c55c378e15485436cb0bc88676f0cde0303
CVE-2024-51116,0,0,163c0d7988ca5329a27514b03075ee6d2fff2ef84e9d3dc466528f493b745f84,2024-11-06T18:17:17.287000 CVE-2024-51116,0,0,163c0d7988ca5329a27514b03075ee6d2fff2ef84e9d3dc466528f493b745f84,2024-11-06T18:17:17.287000
CVE-2024-5112,0,0,f6f8682deff2408f9f0c77bfeb2725995cf9c58df252da300d15c186fb6583c9,2025-02-21T20:06:52.563000 CVE-2024-5112,0,0,f6f8682deff2408f9f0c77bfeb2725995cf9c58df252da300d15c186fb6583c9,2025-02-21T20:06:52.563000
CVE-2024-51122,0,0,032eda6ef4356c413d34ec64379012302427108464591348425bff48a082f9f1,2025-03-18T21:15:30.977000 CVE-2024-51122,0,0,032eda6ef4356c413d34ec64379012302427108464591348425bff48a082f9f1,2025-03-18T21:15:30.977000
CVE-2024-51123,0,0,2bb1738bbb248351932a54a02f9b972fc09822f7e39c985e25fce10334bbbef8,2025-02-18T18:15:26.130000 CVE-2024-51123,0,1,7fb96633793369a89316aaa3fa097d3ce7001fefdc75c1abf4ea7cb6c1954e59,2025-03-22T14:15:15.170000
CVE-2024-51127,0,0,5c5f040ac9c1963b030c4696070e1ab6a5b9c29a6f9ce0ae7436199ee45f28e8,2024-11-21T09:45:17.017000 CVE-2024-51127,0,0,5c5f040ac9c1963b030c4696070e1ab6a5b9c29a6f9ce0ae7436199ee45f28e8,2024-11-21T09:45:17.017000
CVE-2024-5113,0,0,52336cb4930088acb460f77d5eb059ecb3d07bd3d2ff421073cdc789c54ac6fd,2025-02-21T20:01:00.100000 CVE-2024-5113,0,0,52336cb4930088acb460f77d5eb059ecb3d07bd3d2ff421073cdc789c54ac6fd,2025-02-21T20:01:00.100000
CVE-2024-51132,0,0,f5dcb22b7125a1b94089072dd6f184dd6f0e35c20d2f6ced62d92bb6eded7439,2024-11-06T20:35:34.173000 CVE-2024-51132,0,0,f5dcb22b7125a1b94089072dd6f184dd6f0e35c20d2f6ced62d92bb6eded7439,2024-11-06T20:35:34.173000
@ -272662,7 +272662,7 @@ CVE-2024-51431,0,0,828fd39fe0bf7bfec25d83e9c0a08cb7b9c4b5cc6704676ba7781e14660e7
CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a4111b,2024-11-04T22:35:10.037000 CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a4111b,2024-11-04T22:35:10.037000
CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000 CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000
CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000
CVE-2024-51440,0,0,203986c75a80a34d889d62b668b90a6f364317185f011a078d8cdc459d4daeba,2025-02-18T18:15:26.283000 CVE-2024-51440,0,1,06e59d576ccec69ba7fffa18e55bdd3df09904f0f19824a66a13b2c049fe2fa3,2025-03-22T14:15:15.390000
CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000 CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000
CVE-2024-51448,0,0,c4c37037bf93a1f94e04f7270f02afe30201acf9ed636bd7a8ba3baefef67f6e,2025-01-18T15:15:08.183000 CVE-2024-51448,0,0,c4c37037bf93a1f94e04f7270f02afe30201acf9ed636bd7a8ba3baefef67f6e,2025-01-18T15:15:08.183000
CVE-2024-5145,0,0,46ac64e27ebb5b10cf08e3fb4f67dd66a2e01ddc2757a70804d55019b5d37c34,2025-02-10T13:57:18.723000 CVE-2024-5145,0,0,46ac64e27ebb5b10cf08e3fb4f67dd66a2e01ddc2757a70804d55019b5d37c34,2025-02-10T13:57:18.723000
@ -276282,7 +276282,7 @@ CVE-2024-56883,0,0,f99cbbbe44810ecf20ee9a822aaeeb39d677436c7acf1f70c821dc9769f4f
CVE-2024-56889,0,0,5327859a7c5496e1e94f8bb9c02a37e2b8342a40649f534ed6f47845e36ee4d6,2025-03-18T15:15:58.090000 CVE-2024-56889,0,0,5327859a7c5496e1e94f8bb9c02a37e2b8342a40649f534ed6f47845e36ee4d6,2025-03-18T15:15:58.090000
CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000 CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000
CVE-2024-56897,0,0,c86a728646b989ba2c34050e6cf558894a483f9e45fac8ad92b270dc1bfac754,2025-03-03T20:15:43.540000 CVE-2024-56897,0,0,c86a728646b989ba2c34050e6cf558894a483f9e45fac8ad92b270dc1bfac754,2025-03-03T20:15:43.540000
CVE-2024-56898,0,0,6acb612a6a6d6abd3f207db73f49bdae4c033cc146d6a92b4e551f8b5a4c516d,2025-03-04T22:15:38.990000 CVE-2024-56898,0,1,8124ee23f832958edf569107c7b288b2df457e1cf5fa891be5bacb4a1456c4c4,2025-03-22T14:15:15.590000
CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000 CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000
CVE-2024-56901,0,0,64eb0224a857e749243b1bd7bc2761e2c8263ae6819e4c9704a3b8650c9b496e,2025-03-04T22:15:39.143000 CVE-2024-56901,0,0,64eb0224a857e749243b1bd7bc2761e2c8263ae6819e4c9704a3b8650c9b496e,2025-03-04T22:15:39.143000
CVE-2024-56902,0,0,3ef5942ce98190c5aa70f63a17781c2e2ea98e203a6427a08886aad5d3b44a9f,2025-03-04T22:15:39.340000 CVE-2024-56902,0,0,3ef5942ce98190c5aa70f63a17781c2e2ea98e203a6427a08886aad5d3b44a9f,2025-03-04T22:15:39.340000
@ -276291,7 +276291,7 @@ CVE-2024-56908,0,0,bbe0040508ad69151e90ab47c62a14618486e1b0815c01e094680be9e1e71
CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000 CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000
CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000 CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000
CVE-2024-5692,0,0,4b8f65097356fd8a548c2da4761bef878e098b44587a5b9b21bc347f46db95a8,2024-11-21T09:48:10.633000 CVE-2024-5692,0,0,4b8f65097356fd8a548c2da4761bef878e098b44587a5b9b21bc347f46db95a8,2024-11-21T09:48:10.633000
CVE-2024-56921,0,0,ba82c86335d04bad9edbac3e379f7d35c5fbb760088d7e84284ac0abfbc51bcb,2025-02-18T19:15:20.223000 CVE-2024-56921,0,1,fb030f17d9ca025a22ece745e7ce38e34d1baa5c5f879c2284e94607c9076c35,2025-03-22T14:15:15.787000
CVE-2024-56923,0,0,e2647403e0cf85e5fccf746b53a51e00d5aac61312608ca59ffcd83f3ff65dd9,2025-01-28T23:15:08.067000 CVE-2024-56923,0,0,e2647403e0cf85e5fccf746b53a51e00d5aac61312608ca59ffcd83f3ff65dd9,2025-01-28T23:15:08.067000
CVE-2024-56924,0,0,255fb5d959e1f1b6d9220b28e96e646f40e846b04df600718295ece436269b5a,2025-01-23T17:15:16.710000 CVE-2024-56924,0,0,255fb5d959e1f1b6d9220b28e96e646f40e846b04df600718295ece436269b5a,2025-01-23T17:15:16.710000
CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff3a,2024-11-21T09:48:10.807000 CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff3a,2024-11-21T09:48:10.807000
@ -276570,7 +276570,7 @@ CVE-2024-57579,0,0,9ef3b077a13ee9d7526f1e765503d92542de13cba7b0fad4972ba1a9202a5
CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000 CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000
CVE-2024-57580,0,0,ecfed55cf5b358c127e395a3e898c26702966c4825a41b3d33a695e34d0cb776,2025-03-18T19:15:46.850000 CVE-2024-57580,0,0,ecfed55cf5b358c127e395a3e898c26702966c4825a41b3d33a695e34d0cb776,2025-03-18T19:15:46.850000
CVE-2024-57581,0,0,4a3545198765c6460c9df2bbd8da1004daef02a4f94355754c92d51aeea05e63,2025-03-18T19:15:47.037000 CVE-2024-57581,0,0,4a3545198765c6460c9df2bbd8da1004daef02a4f94355754c92d51aeea05e63,2025-03-18T19:15:47.037000
CVE-2024-57582,0,0,7f0bdbfb20bee47b5db3337db07c31ce48f2668f9c89a58867304315f780738b,2025-03-06T12:45:04.363000 CVE-2024-57582,0,1,269fcfd2c5396a242690f6c1fdf50c42960a075cd46c2130a0df0e7c00b215ce,2025-03-22T14:15:15.960000
CVE-2024-57583,0,0,ccfb387ff3c30d35babb34dfb2c64006998b94ce941ed7ea8395016f8be83325,2025-02-04T15:15:18.557000 CVE-2024-57583,0,0,ccfb387ff3c30d35babb34dfb2c64006998b94ce941ed7ea8395016f8be83325,2025-02-04T15:15:18.557000
CVE-2024-57587,0,0,69e0c38068f525a5b86457cd182be111c6d82d7686ae8a5f6131539166579a3b,2025-02-07T17:15:30.453000 CVE-2024-57587,0,0,69e0c38068f525a5b86457cd182be111c6d82d7686ae8a5f6131539166579a3b,2025-02-07T17:15:30.453000
CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000 CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000
@ -276584,7 +276584,7 @@ CVE-2024-57602,0,0,226d91ed331e63f738fd3b8b845736eb5a7fc570a3a123d5ea996b5176962
CVE-2024-57603,0,0,8818c006a29d6f4bd13b4237aca8900d379684c37788b65eab93543c45a04038,2025-02-13T19:15:13.890000 CVE-2024-57603,0,0,8818c006a29d6f4bd13b4237aca8900d379684c37788b65eab93543c45a04038,2025-02-13T19:15:13.890000
CVE-2024-57604,0,0,9dc897647370ae27cc2a2fe45d9c565c9d827fa05aa881ae8c05dff72d178677,2025-03-20T15:15:43.980000 CVE-2024-57604,0,0,9dc897647370ae27cc2a2fe45d9c565c9d827fa05aa881ae8c05dff72d178677,2025-03-20T15:15:43.980000
CVE-2024-57605,0,0,c41e31bc0c6b4266a22e57b7929d37215234774341d010b325202d9b2f8dc9f2,2025-03-19T15:15:52.740000 CVE-2024-57605,0,0,c41e31bc0c6b4266a22e57b7929d37215234774341d010b325202d9b2f8dc9f2,2025-03-19T15:15:52.740000
CVE-2024-57606,0,0,282e31e88d82eac2f58eed0179e45942a66af52f2bd7847e92a7866919540d55,2025-02-18T19:15:22.280000 CVE-2024-57606,0,1,88fff29b8b35a01ed272a18dce87c845eb952014b7761d37d399b66c213e66c6,2025-03-22T14:15:16.170000
CVE-2024-57608,0,0,f13d7092b69ab1bb8b9d9e29e8d71dd51ba622da797972897165fa9f6e4af609,2025-02-25T21:15:17.440000 CVE-2024-57608,0,0,f13d7092b69ab1bb8b9d9e29e8d71dd51ba622da797972897165fa9f6e4af609,2025-02-25T21:15:17.440000
CVE-2024-57609,0,0,7e89dbfffc522c22f84645f0c7d618897ea46d1866f82abe6573f3d9437ce18a,2025-02-10T22:15:36.660000 CVE-2024-57609,0,0,7e89dbfffc522c22f84645f0c7d618897ea46d1866f82abe6573f3d9437ce18a,2025-02-10T22:15:36.660000
CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000
@ -282069,10 +282069,10 @@ CVE-2025-1965,0,0,94142314decf969cb625fbe5f5173ddc5911c761141f6a49332469100f4ccc
CVE-2025-1966,0,0,484790f384757cd860d44d775ad23e95b8fca8bf89b5fa355da6cc99fa836820,2025-03-05T15:15:17.260000 CVE-2025-1966,0,0,484790f384757cd860d44d775ad23e95b8fca8bf89b5fa355da6cc99fa836820,2025-03-05T15:15:17.260000
CVE-2025-1967,0,0,f0d59c4ed441992299da9f393860b37f43033720577e761dda371f9ecd7295bf,2025-03-05T15:15:17.410000 CVE-2025-1967,0,0,f0d59c4ed441992299da9f393860b37f43033720577e761dda371f9ecd7295bf,2025-03-05T15:15:17.410000
CVE-2025-1969,0,0,00a186c236826ccc3fef0cf6a93be58578d3139f3a01ea0f0842aa271ed48f15,2025-03-04T19:15:38.290000 CVE-2025-1969,0,0,00a186c236826ccc3fef0cf6a93be58578d3139f3a01ea0f0842aa271ed48f15,2025-03-04T19:15:38.290000
CVE-2025-1970,1,1,c01adcaf18acac016f78895b73f7486093810b323ebc7285186e86ab961aee74,2025-03-22T12:15:25.797000 CVE-2025-1970,0,0,c01adcaf18acac016f78895b73f7486093810b323ebc7285186e86ab961aee74,2025-03-22T12:15:25.797000
CVE-2025-1971,1,1,4a2b8144dd19911475cb202ad5b0fc41816e2274b0457fd660842d87000a8960,2025-03-22T12:15:26.250000 CVE-2025-1971,0,0,4a2b8144dd19911475cb202ad5b0fc41816e2274b0457fd660842d87000a8960,2025-03-22T12:15:26.250000
CVE-2025-1972,1,1,39a04d69341a0c32b56fe67c505fb16be349bb9aa3087534657e562d73ae342c,2025-03-22T12:15:26.453000 CVE-2025-1972,0,0,39a04d69341a0c32b56fe67c505fb16be349bb9aa3087534657e562d73ae342c,2025-03-22T12:15:26.453000
CVE-2025-1973,1,1,b6ae81035c81acceab2bd5b9863d4f788493d3267f60db7276c8c1b3344b6337,2025-03-22T12:15:26.653000 CVE-2025-1973,0,0,b6ae81035c81acceab2bd5b9863d4f788493d3267f60db7276c8c1b3344b6337,2025-03-22T12:15:26.653000
CVE-2025-1979,0,0,5cf047efa61126850f2bff74f6db8ba74d6d633b7373b143cc2f515f22996b33,2025-03-06T16:15:54.187000 CVE-2025-1979,0,0,5cf047efa61126850f2bff74f6db8ba74d6d633b7373b143cc2f515f22996b33,2025-03-06T16:15:54.187000
CVE-2025-1984,0,0,9c3841609345cdbc038774b45498dc390a4f9eba4042b93fef2b069dfe449491,2025-03-14T18:15:31.507000 CVE-2025-1984,0,0,9c3841609345cdbc038774b45498dc390a4f9eba4042b93fef2b069dfe449491,2025-03-14T18:15:31.507000
CVE-2025-2000,0,0,3966b3252f7ea9903e46e4407551ffba5512eba0a2fd5f6e51fd225e0b840ed0,2025-03-14T13:15:40.907000 CVE-2025-2000,0,0,3966b3252f7ea9903e46e4407551ffba5512eba0a2fd5f6e51fd225e0b840ed0,2025-03-14T13:15:40.907000
@ -282972,6 +282972,7 @@ CVE-2025-21856,0,0,b09c68ce23969b8e4c4ebe578130af0c7fcaa476814ad748e7bff8a78b6b4
CVE-2025-21857,0,0,3e4b4b05242172562d45bfa80d4257741cfbd88b174535be049ad449c2660fc1,2025-03-13T21:15:46.950000 CVE-2025-21857,0,0,3e4b4b05242172562d45bfa80d4257741cfbd88b174535be049ad449c2660fc1,2025-03-13T21:15:46.950000
CVE-2025-21858,0,0,66d9ca804eb089b50343b13981639c14692bfbf712b8926853e87f75b6577d63,2025-03-13T21:15:38.600000 CVE-2025-21858,0,0,66d9ca804eb089b50343b13981639c14692bfbf712b8926853e87f75b6577d63,2025-03-13T21:15:38.600000
CVE-2025-21859,0,0,5a61501b66729f01bab9df64cbc72760c95b1c81ad9a7b8699565186c12dc20c,2025-03-13T21:15:30.040000 CVE-2025-21859,0,0,5a61501b66729f01bab9df64cbc72760c95b1c81ad9a7b8699565186c12dc20c,2025-03-13T21:15:30.040000
CVE-2025-2186,1,1,afe893c7c50e4e6991ba24a24f04513ebe86e2979c302e20a272eed16c097c1a,2025-03-22T13:15:35.683000
CVE-2025-21860,0,0,7476c13026bd288cabe804eff8c676854d340bd1f590ce0f8ad19ee85a60a573,2025-03-13T21:14:08.347000 CVE-2025-21860,0,0,7476c13026bd288cabe804eff8c676854d340bd1f590ce0f8ad19ee85a60a573,2025-03-13T21:14:08.347000
CVE-2025-21861,0,0,512ea035cfd08d344857d6a2838b2f5da0a011cdea325d0d3a43a8bdbd21a518,2025-03-13T21:14:01.013000 CVE-2025-21861,0,0,512ea035cfd08d344857d6a2838b2f5da0a011cdea325d0d3a43a8bdbd21a518,2025-03-13T21:14:01.013000
CVE-2025-21862,0,0,903ae3891f0b02eb2409a29ac67b669381656af60d8ebe4a4187837a3dfc54de,2025-03-13T21:13:53.200000 CVE-2025-21862,0,0,903ae3891f0b02eb2409a29ac67b669381656af60d8ebe4a4187837a3dfc54de,2025-03-13T21:13:53.200000
@ -283584,7 +283585,7 @@ CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9
CVE-2025-23083,0,0,8794d1163f9c90d3558297e77a843291a9ed4394f361008c98d5897814fbbb44,2025-02-28T13:15:28.213000 CVE-2025-23083,0,0,8794d1163f9c90d3558297e77a843291a9ed4394f361008c98d5897814fbbb44,2025-02-28T13:15:28.213000
CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000 CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000
CVE-2025-23085,0,0,889840804db6ae2520e814bb23e4a445ed73b7383c73820abba13ffae74db43d,2025-02-25T13:15:11.103000 CVE-2025-23085,0,0,889840804db6ae2520e814bb23e4a445ed73b7383c73820abba13ffae74db43d,2025-02-25T13:15:11.103000
CVE-2025-23086,0,0,4888f5c9ad449f11aff3bd2005f3629d6cccf17b7858fa974396434a1fb1f4d8,2025-02-18T21:15:28.100000 CVE-2025-23086,0,1,46dcdec6710242421727659f0f9de0b53db2ce8f2873db285d1b397dda7f2559,2025-03-22T14:15:16.360000
CVE-2025-23087,0,0,bfbdb144af271fa0463b1cfacae0c03f133d0c7157b9b6f33c666f41bdde0ea8,2025-03-01T03:15:23.067000 CVE-2025-23087,0,0,bfbdb144af271fa0463b1cfacae0c03f133d0c7157b9b6f33c666f41bdde0ea8,2025-03-01T03:15:23.067000
CVE-2025-23088,0,0,369a084c0dac91f467d46a297093ab8c7b697484ff2e61fc017ffe639e3c12ed,2025-03-01T03:15:23.157000 CVE-2025-23088,0,0,369a084c0dac91f467d46a297093ab8c7b697484ff2e61fc017ffe639e3c12ed,2025-03-01T03:15:23.157000
CVE-2025-23089,0,0,8538abc6f83acab58bdcb6440f1e22c462d137c99186166b0dcb3a7a245230db,2025-03-01T03:15:23.210000 CVE-2025-23089,0,0,8538abc6f83acab58bdcb6440f1e22c462d137c99186166b0dcb3a7a245230db,2025-03-01T03:15:23.210000
@ -283663,7 +283664,7 @@ CVE-2025-23240,0,0,544a1feaf6fe3c4f1a8295794a4960f2a0fc447d643c5c30d52cfb77d4db3
CVE-2025-23242,0,0,9b20bedcf14352ca9df0a5ecc34f6004c4e1503c511865ff1afa1d3c82eca056,2025-03-11T20:15:16.280000 CVE-2025-23242,0,0,9b20bedcf14352ca9df0a5ecc34f6004c4e1503c511865ff1afa1d3c82eca056,2025-03-11T20:15:16.280000
CVE-2025-23243,0,0,d341dee54207e76092fa73545c292abf7fbfda4eb6567d84dd5238ba2f02d191,2025-03-11T20:15:16.463000 CVE-2025-23243,0,0,d341dee54207e76092fa73545c292abf7fbfda4eb6567d84dd5238ba2f02d191,2025-03-11T20:15:16.463000
CVE-2025-2325,0,0,3c6b219229dc76a33d78d2ccb8fd1f767d78355c555f30961ca2b7b219af14fc,2025-03-15T07:15:35.107000 CVE-2025-2325,0,0,3c6b219229dc76a33d78d2ccb8fd1f767d78355c555f30961ca2b7b219af14fc,2025-03-15T07:15:35.107000
CVE-2025-2331,1,1,b072726b3afe477229f13ce6fa12da5840fde8f6531f821787ad2abd1eb769a5,2025-03-22T12:15:26.833000 CVE-2025-2331,0,0,b072726b3afe477229f13ce6fa12da5840fde8f6531f821787ad2abd1eb769a5,2025-03-22T12:15:26.833000
CVE-2025-2333,0,0,600470717f73ae989a4e33407be9c331e6223c6ec027e4a7c73886df7950cb72,2025-03-15T12:15:12.610000 CVE-2025-2333,0,0,600470717f73ae989a4e33407be9c331e6223c6ec027e4a7c73886df7950cb72,2025-03-15T12:15:12.610000
CVE-2025-2334,0,0,af1cfc1613b38618f43c910beb17815194cac4ddb461c16fb47f2aba7d734581,2025-03-17T16:15:27.017000 CVE-2025-2334,0,0,af1cfc1613b38618f43c910beb17815194cac4ddb461c16fb47f2aba7d734581,2025-03-17T16:15:27.017000
CVE-2025-2335,0,0,706aa2907d4bd291d4dd781e9005e6e8f3456955d568c8d3d9b369e28c0e73aa,2025-03-16T03:15:37.907000 CVE-2025-2335,0,0,706aa2907d4bd291d4dd781e9005e6e8f3456955d568c8d3d9b369e28c0e73aa,2025-03-16T03:15:37.907000
@ -285225,7 +285226,7 @@ CVE-2025-25766,0,0,f39b595117fd6ac0197008d13a65ac6ad37b800d031e5372f4209ffae8413
CVE-2025-25767,0,0,dfbd9b86591c00c02b0b6c93af6c4513b8035921c944dca23036a1a8ab9e4095,2025-03-03T20:15:46.770000 CVE-2025-25767,0,0,dfbd9b86591c00c02b0b6c93af6c4513b8035921c944dca23036a1a8ab9e4095,2025-03-03T20:15:46.770000
CVE-2025-25768,0,0,c0ea06537ea4dff0558f2426b2095c6f0d5d7ca5691b12d94a7b7cd0158fea90,2025-03-03T20:15:46.940000 CVE-2025-25768,0,0,c0ea06537ea4dff0558f2426b2095c6f0d5d7ca5691b12d94a7b7cd0158fea90,2025-03-03T20:15:46.940000
CVE-2025-25769,0,0,c04f243adfab6d0c228896823c1de48d6c8d1554d46e87c10f438472ea98cdce,2025-02-24T18:15:19.487000 CVE-2025-25769,0,0,c04f243adfab6d0c228896823c1de48d6c8d1554d46e87c10f438472ea98cdce,2025-02-24T18:15:19.487000
CVE-2025-2577,1,1,929de73a39a3543c29173f273a3d41f338242898e72fad38fbcc81d8274db1d5,2025-03-22T12:15:27.013000 CVE-2025-2577,0,0,929de73a39a3543c29173f273a3d41f338242898e72fad38fbcc81d8274db1d5,2025-03-22T12:15:27.013000
CVE-2025-25770,0,0,083dca9bf78425b081932176ffd5590f62d2e6b52d7243e21c6da305bd5b4229,2025-02-24T18:15:20.280000 CVE-2025-25770,0,0,083dca9bf78425b081932176ffd5590f62d2e6b52d7243e21c6da305bd5b4229,2025-02-24T18:15:20.280000
CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000 CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000
CVE-2025-25774,0,0,69d43747c15f87af0da05215cab928648fd3e1ba63812309aa7f5e031fa6f50d,2025-03-12T19:15:39.777000 CVE-2025-25774,0,0,69d43747c15f87af0da05215cab928648fd3e1ba63812309aa7f5e031fa6f50d,2025-03-12T19:15:39.777000
@ -285343,7 +285344,10 @@ CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872c
CVE-2025-2616,0,0,1df0cf877e710fe9be61f38515f018771e2a185b2390858bae14abf7c5bbe46a,2025-03-22T10:15:16.533000 CVE-2025-2616,0,0,1df0cf877e710fe9be61f38515f018771e2a185b2390858bae14abf7c5bbe46a,2025-03-22T10:15:16.533000
CVE-2025-26163,0,0,1a8da14fd3182531e44fdb492b7c9a837211526283840a4e5bb4333cbf418032,2025-03-19T19:15:46.853000 CVE-2025-26163,0,0,1a8da14fd3182531e44fdb492b7c9a837211526283840a4e5bb4333cbf418032,2025-03-19T19:15:46.853000
CVE-2025-26167,0,0,b243267aa31b3c4d3db94db42f2915c63c26a12d7e4452c1efdd061381d17d44,2025-03-07T20:15:38.347000 CVE-2025-26167,0,0,b243267aa31b3c4d3db94db42f2915c63c26a12d7e4452c1efdd061381d17d44,2025-03-07T20:15:38.347000
CVE-2025-2617,1,1,17ecf2a4afb7fa68080612946426fe6502dcbc52588757f2cad26c1a96015f20,2025-03-22T13:15:35.837000
CVE-2025-2618,1,1,a0be16c007291a7654dfbd4f2c2eb5cd5612dbfd0d66d1c468dbb0c63d5d84a8,2025-03-22T14:15:16.650000
CVE-2025-26182,0,0,50bc93eea6be4a4f051a5cba8257a428d894f0c81b2a5095709deaa26b1aeef7,2025-03-05T19:15:39.023000 CVE-2025-26182,0,0,50bc93eea6be4a4f051a5cba8257a428d894f0c81b2a5095709deaa26b1aeef7,2025-03-05T19:15:39.023000
CVE-2025-2619,1,1,27e06b14b4922e101e410b948b2adbb5b081f3be43d641aabf6c3fa5baa51dc1,2025-03-22T14:15:16.867000
CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000 CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000
CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000 CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000
CVE-2025-26202,0,0,f8b0cbe65a751dd37df4c2f886b778f4059fbbdee95a620e7d770c31cb87373d,2025-03-14T20:15:14.167000 CVE-2025-26202,0,0,f8b0cbe65a751dd37df4c2f886b778f4059fbbdee95a620e7d770c31cb87373d,2025-03-14T20:15:14.167000
@ -285574,6 +285578,7 @@ CVE-2025-26789,0,0,ebea494059b94de49b6b520d5766b69e65af5f122cf9ef029bba111909dc2
CVE-2025-26791,0,0,a7d63ea0959b4846f11cfb3951f45279f457c98157e5d52d56097a5da007bce1,2025-02-14T16:15:37.350000 CVE-2025-26791,0,0,a7d63ea0959b4846f11cfb3951f45279f457c98157e5d52d56097a5da007bce1,2025-02-14T16:15:37.350000
CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27eec1,2025-02-24T17:15:14.580000 CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27eec1,2025-02-24T17:15:14.580000
CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000 CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000
CVE-2025-26796,1,1,9dbf889de866ca41ab74b84afcf0d854880b44cea138661c6f19e43b7bc96f29,2025-03-22T14:15:16.537000
CVE-2025-26803,0,0,8c486e737c398ad4bd709101648ff92403877558e051d24af9f92cf436430efd,2025-02-28T17:21:55.827000 CVE-2025-26803,0,0,8c486e737c398ad4bd709101648ff92403877558e051d24af9f92cf436430efd,2025-02-28T17:21:55.827000
CVE-2025-26816,0,0,2ec5a5349b9517d8ba53395229a7b8942acd452c9df91a0b3e2328a764fb96c9,2025-03-20T21:15:23.273000 CVE-2025-26816,0,0,2ec5a5349b9517d8ba53395229a7b8942acd452c9df91a0b3e2328a764fb96c9,2025-03-20T21:15:23.273000
CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000 CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000

Can't render this file because it is too large.