From cf93a7c90d8f76b8391f3722d00c00f1ed70b093 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 4 Mar 2025 15:03:49 +0000 Subject: [PATCH] Auto-Update: 2025-03-04T15:00:20.197668+00:00 --- CVE-2024/CVE-2024-119xx/CVE-2024-11955.json | 71 ++++++++-- CVE-2025/CVE-2025-18xx/CVE-2025-1893.json | 10 +- CVE-2025/CVE-2025-19xx/CVE-2025-1925.json | 141 ++++++++++++++++++++ CVE-2025/CVE-2025-19xx/CVE-2025-1930.json | 33 +++++ CVE-2025/CVE-2025-19xx/CVE-2025-1931.json | 33 +++++ CVE-2025/CVE-2025-19xx/CVE-2025-1932.json | 29 ++++ CVE-2025/CVE-2025-19xx/CVE-2025-1933.json | 33 +++++ CVE-2025/CVE-2025-19xx/CVE-2025-1934.json | 29 ++++ CVE-2025/CVE-2025-19xx/CVE-2025-1935.json | 29 ++++ CVE-2025/CVE-2025-19xx/CVE-2025-1936.json | 29 ++++ CVE-2025/CVE-2025-19xx/CVE-2025-1937.json | 33 +++++ CVE-2025/CVE-2025-19xx/CVE-2025-1938.json | 29 ++++ CVE-2025/CVE-2025-19xx/CVE-2025-1939.json | 25 ++++ CVE-2025/CVE-2025-19xx/CVE-2025-1940.json | 25 ++++ CVE-2025/CVE-2025-19xx/CVE-2025-1941.json | 25 ++++ CVE-2025/CVE-2025-19xx/CVE-2025-1942.json | 25 ++++ CVE-2025/CVE-2025-19xx/CVE-2025-1943.json | 25 ++++ CVE-2025/CVE-2025-216xx/CVE-2025-21626.json | 63 ++++++++- CVE-2025/CVE-2025-216xx/CVE-2025-21627.json | 47 ++++++- CVE-2025/CVE-2025-230xx/CVE-2025-23024.json | 65 ++++++++- CVE-2025/CVE-2025-274xx/CVE-2025-27424.json | 25 ++++ CVE-2025/CVE-2025-274xx/CVE-2025-27425.json | 25 ++++ CVE-2025/CVE-2025-274xx/CVE-2025-27426.json | 25 ++++ README.md | 47 ++++--- _state.csv | 56 +++++--- 25 files changed, 915 insertions(+), 62 deletions(-) create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1925.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1930.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1931.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1932.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1933.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1934.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1935.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1936.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1937.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1938.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1939.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1940.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1941.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1942.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1943.json create mode 100644 CVE-2025/CVE-2025-274xx/CVE-2025-27424.json create mode 100644 CVE-2025/CVE-2025-274xx/CVE-2025-27425.json create mode 100644 CVE-2025/CVE-2025-274xx/CVE-2025-27426.json diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11955.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11955.json index 3b5aadcc29a..a8b0dbfd65b 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11955.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11955.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11955", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-25T16:15:37.303", - "lastModified": "2025-02-25T16:15:37.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T13:49:18.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -120,26 +140,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.85", + "versionEndExcluding": "10.0.18", + "matchCriteriaId": "7E2FC267-04C0-429B-91BD-B5E634AFBC4B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.18", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-g5fm-jq4j-c2c7", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.296809", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.296809", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.451775", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1893.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1893.json index 5101140cb1a..526dec03866 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1893.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1893.json @@ -2,13 +2,13 @@ "id": "CVE-2025-1893", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T01:15:11.327", - "lastModified": "2025-03-04T01:15:11.327", - "vulnStatus": "Received", + "lastModified": "2025-03-04T13:15:10.063", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in Open5GS up to 2.7.2. It has been declared as problematic. Affected by this vulnerability is the function gmm_state_authentication of the file src/amf/gmm-sm.c of the component UDM Subscriber Data Management. The manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named e31e9965f00d9c744a7f728497cb4f3e97744ee8. It is recommended to apply a patch to fix this issue." + "value": "A vulnerability was found in Open5GS up to 2.7.2. It has been declared as problematic. Affected by this vulnerability is the function gmm_state_authentication of the file src/amf/gmm-sm.c of the component AMF. The manipulation leads to denial of service. The attack can be launched remotely. This vulnerability allows a single UE to crash the AMF, resulting in the complete loss of mobility and session management services and causing a network-wide outage. All registered UEs will lose connectivity, and new registrations will be blocked until the AMF is restarted, leading to a high availability impact. The exploit has been disclosed to the public and may be used. The patch is named e31e9965f00d9c744a7f728497cb4f3e97744ee8. It is recommended to apply a patch to fix this issue." } ], "metrics": { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1925.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1925.json new file mode 100644 index 00000000000..1708373aa37 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1925.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1925", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-04T14:15:36.717", + "lastModified": "2025-03-04T14:15:36.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in Open5GS up to 2.7.2. Affected by this vulnerability is the function amf_nsmf_pdusession_handle_update_sm_context of the file src/amf/nsmf-handler.c of the component AMF. The manipulation leads to denial of service. The attack can be launched remotely. This vulnerability allows a single UE to crash the AMF, resulting in the complete loss of mobility and session management services and causing a network-wide outage. All registered UEs will lose connectivity, and new registrations will be blocked until the AMF is restarted, leading to a high availability impact. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/guoweifk/BugReport/blob/main/Open5GS%20AMF%20Denial%20of%20Service%20via%20PDU%20Session%20ID%20Conflict", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/open5gs/open5gs/pull/3711", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298513", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298513", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.506038", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1930.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1930.json new file mode 100644 index 00000000000..a37ea335648 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1930.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-1930", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:37.850", + "lastModified": "2025-03-04T14:15:37.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "On Windows, a compromised content process could use bad StreamData sent over AudioIPC to trigger a use-after-free in the Browser process. This could have led to a sandbox escape. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, and Firefox ESR < 128.8." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902309", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-15/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1931.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1931.json new file mode 100644 index 00000000000..d015e2b662a --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1931.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-1931", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:37.963", + "lastModified": "2025-03-04T14:15:37.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "It was possible to cause a use-after-free in the content process side of a WebTransport connection, leading to a potentially exploitable crash. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, and Firefox ESR < 128.8." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1944126", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-15/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json new file mode 100644 index 00000000000..15abcd21b79 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-1932", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:38.053", + "lastModified": "2025-03-04T14:15:38.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An inconsistent comparator in xslt/txNodeSorter could have resulted in potentially exploitable out-of-bounds access. Only affected version 122 and later. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1944313", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json new file mode 100644 index 00000000000..36ac5c7a197 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-1933", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:38.170", + "lastModified": "2025-03-04T14:15:38.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "On 64-bit CPUs, when the JIT compiles WASM i32 return values they can pick up bits from left over memory. This can potentially cause them to be treated as a different type. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, and Firefox ESR < 128.8." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1946004", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-15/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json new file mode 100644 index 00000000000..72279efe35d --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-1934", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:38.273", + "lastModified": "2025-03-04T14:15:38.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1942881", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json new file mode 100644 index 00000000000..5f4dd04a5e7 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-1935", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:38.390", + "lastModified": "2025-03-04T14:15:38.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A web page could trick a user into setting that site as the default handler for a custom URL protocol. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1866661", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1936.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1936.json new file mode 100644 index 00000000000..ef42c1a9f10 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1936.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-1936", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:38.500", + "lastModified": "2025-03-04T14:15:38.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1940027", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1937.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1937.json new file mode 100644 index 00000000000..feb5e2568ca --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1937.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-1937", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:38.610", + "lastModified": "2025-03-04T14:15:38.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, and Firefox ESR < 128.8." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1938471%2C1940716", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-15/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1938.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1938.json new file mode 100644 index 00000000000..6ef21e6e599 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1938.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-1938", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:38.730", + "lastModified": "2025-03-04T14:15:38.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1922889%2C1935004%2C1943586%2C1943912%2C1948111", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1939.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1939.json new file mode 100644 index 00000000000..2faea1220dd --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1939.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-1939", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:38.837", + "lastModified": "2025-03-04T14:15:38.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Android apps can load web pages using the Custom Tabs feature. This feature supports a transition animation that could have been used to trick a user into granting sensitive permissions by hiding what the user was actually clicking. This vulnerability affects Firefox < 136." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1928334", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json new file mode 100644 index 00000000000..e66539ce8d6 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-1940", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:38.950", + "lastModified": "2025-03-04T14:15:38.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A select option could partially obscure the confirmation prompt shown before launching external apps. This could be used to trick a user in to launching an external app unexpectedly. \n*This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 136." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1908488", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1941.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1941.json new file mode 100644 index 00000000000..dcf61c67795 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1941.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-1941", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:39.063", + "lastModified": "2025-03-04T14:15:39.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed (distinct from CVE-2025-0245). This vulnerability affects Firefox < 136." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1944665", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1942.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1942.json new file mode 100644 index 00000000000..3e2c2da1886 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1942.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-1942", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:39.167", + "lastModified": "2025-03-04T14:15:39.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When String.toUpperCase() caused a string to get longer it was possible for uninitialized memory to be incorporated into the result string This vulnerability affects Firefox < 136." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1947139", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1943.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1943.json new file mode 100644 index 00000000000..1bea7045c8d --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1943.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-1943", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:39.260", + "lastModified": "2025-03-04T14:15:39.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory safety bugs present in Firefox 135 and Thunderbird 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1869650%2C1938451%2C1940326%2C1944052%2C1944063%2C1947281", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21626.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21626.json index 2cc70d40b5f..a9d04842cfb 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21626.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21626.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21626", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-25T16:15:37.663", - "lastModified": "2025-02-25T16:15:37.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T13:49:18.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.71", + "versionEndExcluding": "10.0.18", + "matchCriteriaId": "821C607A-44F6-4781-8AE2-B1B0D6E86437" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.18", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5vvr-pxwf-3w77", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21627.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21627.json index 110bd3b49ec..e27cb0e9baf 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21627.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21627.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21627", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-25T16:15:37.863", - "lastModified": "2025-02-25T16:15:37.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T13:49:18.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.18", + "matchCriteriaId": "233C795E-1AEA-4457-8A7A-22C9C152DCF2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qm8p-jmj2-qfc2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23024.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23024.json index 77523e2e0db..a413e85104e 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23024.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23024.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23024", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-25T16:15:38.053", - "lastModified": "2025-02-25T16:15:38.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T13:49:18.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } ] }, "weaknesses": [ @@ -71,16 +93,51 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.72", + "versionEndExcluding": "10.0.18", + "matchCriteriaId": "3609D284-5D4B-4448-9F13-4E05931CD138" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.18", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-885x-hvp2-85q8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27424.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27424.json new file mode 100644 index 00000000000..a4359f9f46a --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27424.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-27424", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:39.397", + "lastModified": "2025-03-04T14:15:39.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Websites redirecting to a non-HTTP scheme URL could allow a website address to be spoofed for a malicious page This vulnerability affects Firefox for iOS < 136." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1945392", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-13/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json new file mode 100644 index 00000000000..e037abe5d95 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-27425", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:39.493", + "lastModified": "2025-03-04T14:15:39.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Scanning certain QR codes that included text with a website URL could allow the URL to be opened without presenting the user with a confirmation alert first This vulnerability affects Firefox for iOS < 136." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1941525", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-13/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27426.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27426.json new file mode 100644 index 00000000000..65b6613974c --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27426.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-27426", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-04T14:15:39.593", + "lastModified": "2025-03-04T14:15:39.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Malicious websites utilizing a server-side redirect to an internal error page could result in a spoofed website URL This vulnerability affects Firefox for iOS < 136." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933079", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-13/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9ee3d071328..67ffc92772a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-04T13:00:19.828822+00:00 +2025-03-04T15:00:20.197668+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-04T12:25:17.263000+00:00 +2025-03-04T14:15:39.593000+00:00 ``` ### Last Data Feed Release @@ -33,33 +33,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284054 +284072 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `18` -- [CVE-2025-22224](CVE-2025/CVE-2025-222xx/CVE-2025-22224.json) (`2025-03-04T12:15:33.687`) -- [CVE-2025-22225](CVE-2025/CVE-2025-222xx/CVE-2025-22225.json) (`2025-03-04T12:15:33.840`) -- [CVE-2025-22226](CVE-2025/CVE-2025-222xx/CVE-2025-22226.json) (`2025-03-04T12:15:33.973`) +- [CVE-2025-1925](CVE-2025/CVE-2025-19xx/CVE-2025-1925.json) (`2025-03-04T14:15:36.717`) +- [CVE-2025-1930](CVE-2025/CVE-2025-19xx/CVE-2025-1930.json) (`2025-03-04T14:15:37.850`) +- [CVE-2025-1931](CVE-2025/CVE-2025-19xx/CVE-2025-1931.json) (`2025-03-04T14:15:37.963`) +- [CVE-2025-1932](CVE-2025/CVE-2025-19xx/CVE-2025-1932.json) (`2025-03-04T14:15:38.053`) +- [CVE-2025-1933](CVE-2025/CVE-2025-19xx/CVE-2025-1933.json) (`2025-03-04T14:15:38.170`) +- [CVE-2025-1934](CVE-2025/CVE-2025-19xx/CVE-2025-1934.json) (`2025-03-04T14:15:38.273`) +- [CVE-2025-1935](CVE-2025/CVE-2025-19xx/CVE-2025-1935.json) (`2025-03-04T14:15:38.390`) +- [CVE-2025-1936](CVE-2025/CVE-2025-19xx/CVE-2025-1936.json) (`2025-03-04T14:15:38.500`) +- [CVE-2025-1937](CVE-2025/CVE-2025-19xx/CVE-2025-1937.json) (`2025-03-04T14:15:38.610`) +- [CVE-2025-1938](CVE-2025/CVE-2025-19xx/CVE-2025-1938.json) (`2025-03-04T14:15:38.730`) +- [CVE-2025-1939](CVE-2025/CVE-2025-19xx/CVE-2025-1939.json) (`2025-03-04T14:15:38.837`) +- [CVE-2025-1940](CVE-2025/CVE-2025-19xx/CVE-2025-1940.json) (`2025-03-04T14:15:38.950`) +- [CVE-2025-1941](CVE-2025/CVE-2025-19xx/CVE-2025-1941.json) (`2025-03-04T14:15:39.063`) +- [CVE-2025-1942](CVE-2025/CVE-2025-19xx/CVE-2025-1942.json) (`2025-03-04T14:15:39.167`) +- [CVE-2025-1943](CVE-2025/CVE-2025-19xx/CVE-2025-1943.json) (`2025-03-04T14:15:39.260`) +- [CVE-2025-27424](CVE-2025/CVE-2025-274xx/CVE-2025-27424.json) (`2025-03-04T14:15:39.397`) +- [CVE-2025-27425](CVE-2025/CVE-2025-274xx/CVE-2025-27425.json) (`2025-03-04T14:15:39.493`) +- [CVE-2025-27426](CVE-2025/CVE-2025-274xx/CVE-2025-27426.json) (`2025-03-04T14:15:39.593`) ### CVEs modified in the last Commit -Recently modified CVEs: `11` +Recently modified CVEs: `5` -- [CVE-2023-1841](CVE-2023/CVE-2023-18xx/CVE-2023-1841.json) (`2025-03-04T12:25:10.853`) -- [CVE-2023-6132](CVE-2023/CVE-2023-61xx/CVE-2023-6132.json) (`2025-03-04T12:25:10.853`) -- [CVE-2024-0068](CVE-2024/CVE-2024-00xx/CVE-2024-0068.json) (`2025-03-04T12:25:10.853`) -- [CVE-2024-1277](CVE-2024/CVE-2024-12xx/CVE-2024-1277.json) (`2025-03-04T12:24:19.653`) -- [CVE-2024-1282](CVE-2024/CVE-2024-12xx/CVE-2024-1282.json) (`2025-03-04T12:24:19.653`) -- [CVE-2024-1496](CVE-2024/CVE-2024-14xx/CVE-2024-1496.json) (`2025-03-04T12:25:17.263`) -- [CVE-2024-1586](CVE-2024/CVE-2024-15xx/CVE-2024-1586.json) (`2025-03-04T12:25:17.263`) -- [CVE-2024-1619](CVE-2024/CVE-2024-16xx/CVE-2024-1619.json) (`2025-03-04T12:25:10.853`) -- [CVE-2024-2001](CVE-2024/CVE-2024-20xx/CVE-2024-2001.json) (`2025-03-04T12:25:10.853`) -- [CVE-2024-2009](CVE-2024/CVE-2024-20xx/CVE-2024-2009.json) (`2025-03-04T12:25:10.853`) -- [CVE-2025-1889](CVE-2025/CVE-2025-18xx/CVE-2025-1889.json) (`2025-03-04T12:15:32.370`) +- [CVE-2024-11955](CVE-2024/CVE-2024-119xx/CVE-2024-11955.json) (`2025-03-04T13:49:18.880`) +- [CVE-2025-1893](CVE-2025/CVE-2025-18xx/CVE-2025-1893.json) (`2025-03-04T13:15:10.063`) +- [CVE-2025-21626](CVE-2025/CVE-2025-216xx/CVE-2025-21626.json) (`2025-03-04T13:49:18.880`) +- [CVE-2025-21627](CVE-2025/CVE-2025-216xx/CVE-2025-21627.json) (`2025-03-04T13:49:18.880`) +- [CVE-2025-23024](CVE-2025/CVE-2025-230xx/CVE-2025-23024.json) (`2025-03-04T13:49:18.880`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2d38b6f4348..cab5bfa1211 100644 --- a/_state.csv +++ b/_state.csv @@ -215676,7 +215676,7 @@ CVE-2023-1837,0,0,843502960ca6e491ad9accfb6c6ed5c829dbb5bc4eee48104dd1d8febf6d10 CVE-2023-1838,0,0,0a8fbbe5d0029b1b3df61a7a56fe1c380ddaf7b537ba283161ca9d35b1cfa6a5,2024-11-21T07:39:59.817000 CVE-2023-1839,0,0,1563748e63ae4a7b7aa6ee515f7ba6b5d2c596fec26a68793f05c8219a249dbd,2025-01-24T22:15:32.847000 CVE-2023-1840,0,0,2b4571b017989f11905a194979f2a3b3e38633e6833968f41eee44adb840c533,2024-11-21T07:40:00.037000 -CVE-2023-1841,0,1,b1f60dccfb5e24c587de9fd3bca8e91512fb0c8bb8a8473eb2cb7560a6fa8a88,2025-03-04T12:25:10.853000 +CVE-2023-1841,0,0,b1f60dccfb5e24c587de9fd3bca8e91512fb0c8bb8a8473eb2cb7560a6fa8a88,2025-03-04T12:25:10.853000 CVE-2023-1842,0,0,7823b637afff00dcae852589d7e7ca278d53d8ae6240f85cdff16a8b8257733b,2023-11-07T04:05:04.657000 CVE-2023-1843,0,0,46bcdf97a8b4053aec5e646e46be38edf9851a07cef98d532105047515fb2270,2024-11-21T07:40:00.270000 CVE-2023-1844,0,0,70a62885e593f987b4cb298f5e65054e6e1d764eb1cf483c544ff8caf6d73a89,2024-11-21T07:40:00.393000 @@ -242294,7 +242294,7 @@ CVE-2023-6128,0,0,f7aeba8b0887a09bdb76a8dfa2b91736c50ae85b567af0e1b74ee7119fdf57 CVE-2023-6129,0,0,6d50580cbfb5d918e323f39a18aa61345ea143bf0a503a01eb18389da1333d2e,2024-11-21T08:43:11.507000 CVE-2023-6130,0,0,4b075222d07198db6db245f43a565f63f23db6407fa836632ba5d588e06d6054,2024-11-21T08:43:11.660000 CVE-2023-6131,0,0,85399921902195d8561cfaf24773c894de5570e8642a60884166d25bfddd1aa1,2024-11-21T08:43:11.797000 -CVE-2023-6132,0,1,44648d79e11ac6735feba84dc2179ba14995c318abbf28cb8f6fcb83b612c271,2025-03-04T12:25:10.853000 +CVE-2023-6132,0,0,44648d79e11ac6735feba84dc2179ba14995c318abbf28cb8f6fcb83b612c271,2025-03-04T12:25:10.853000 CVE-2023-6133,0,0,0a09221a3d9b3ebba402f8c073e00c8cc69e69b053cdf74ba039ee6e080f843b,2024-11-21T08:43:12.060000 CVE-2023-6134,0,0,02f5c864463b4dea5e59fde525626cec2a9900aba6f69e06d0b7242f0d8df6a9,2024-11-21T08:43:12.193000 CVE-2023-6135,0,0,1f8e012a65e6eeca4456aa6063abc00d29d85d43d7090333000c5dc17c6c098b,2024-11-21T08:43:12.387000 @@ -243378,7 +243378,7 @@ CVE-2024-0056,0,0,d8360f90b74f6700272d6a41f327dccded97d4f47b60c5e947d2cd48410872 CVE-2024-0057,0,0,6911ea0a6f9a974f33a2bfc84d09461fb97baa310549b7b23ec7e50e49e42a98,2024-11-21T08:45:49.400000 CVE-2024-0066,0,0,05604012307c9d015bd9a1531897b8404a84bf60ae836acbab80c90bdfe9713d,2024-11-21T08:45:49.587000 CVE-2024-0067,0,0,122e4a6c98538d37b86233a014d02728b12f029189e1509f4f04f30898bea208,2024-11-08T09:15:07.517000 -CVE-2024-0068,0,1,e81d3c3a38905983fb1e493e973bf4f5a9e831f60e26c84e16caa4d3092b382d,2025-03-04T12:25:10.853000 +CVE-2024-0068,0,0,e81d3c3a38905983fb1e493e973bf4f5a9e831f60e26c84e16caa4d3092b382d,2025-03-04T12:25:10.853000 CVE-2024-0069,0,0,f3ce66513994f3ff028688e20278f0458e6258ba59cf74f690ee7dcc06e666da,2023-11-28T00:15:07.140000 CVE-2024-0070,0,0,cd3a46a295206562a4be32633daf482f59e1d323193385e7677ae8b6c52e190f,2023-11-28T00:15:07.183000 CVE-2024-0071,0,0,808cfb1ed41fb74862eab9e1184017d34215c208a5fcb988910ce14258a73f83,2024-11-21T08:45:49.967000 @@ -246054,7 +246054,7 @@ CVE-2024-1195,0,0,3368bf518c27a729a23598a4bc9bc8456794ebbc8ed421e1b9fb54311a27af CVE-2024-11950,0,0,df36014500ed7b6f7946ef04cfd4a777d6bd62d2ab461c18fe6d382ea2d08354,2024-12-12T01:40:21.820000 CVE-2024-11952,0,0,8be0c69e3107fa6f3273f59b11ff511450df70a157d0236a300dd71a0356b941,2024-12-04T09:15:04.637000 CVE-2024-11954,0,0,4285770ed381cd7f5197033d510494069e724ce14634f9774d473591316f5acd,2025-01-28T15:15:11.130000 -CVE-2024-11955,0,0,754fb44e0628bafffb8d2a71a188942ec8513807f97b79c58ebe8c41ff46dff5,2025-02-25T16:15:37.303000 +CVE-2024-11955,0,1,2af5adda5da26b6323fd1ffc39c86bb8d22bbc8895e47ad587f94331f0b10e55,2025-03-04T13:49:18.880000 CVE-2024-11956,0,0,abf0b1c76c4232559590b835003e8c8289517d48626619c77c54644f8e6e061f,2025-01-28T14:15:29.803000 CVE-2024-11959,0,0,caab75627422c683cea2d1d2168737e0adff93eab9dcc37814cfa2e800769905,2024-12-04T16:52:55.150000 CVE-2024-1196,0,0,4b0eccfc085f9fcf5d1d563f67df6edef95e40ef1d03548e58cd26db6bec54a2,2024-11-21T08:50:00.883000 @@ -246769,7 +246769,7 @@ CVE-2024-12763,0,0,828b2bb544f2e61dd11f51daf4dde3c9326c6a38ab958bf084c901608bda1 CVE-2024-12764,0,0,520ef7a415b759131cb40460656f8f00fedd52ee179d3018b43ad66d1c2ea33c,2025-02-11T02:15:33.817000 CVE-2024-12765,0,0,f7917c17906425e707a3ca48a19a2a85665883890f2e41423afe14a68f13711c,2025-02-11T02:15:33.873000 CVE-2024-12768,0,0,9cdda843811199bf9b0e0359033a7a04598a7735ac6f0240aa5e3d0298e2cb55,2025-02-04T21:15:25.547000 -CVE-2024-1277,0,1,689a839a3a7db10b583a47415b0b9ced4ac1facc3de9b9bff5a5d33a6a1654fa,2025-03-04T12:24:19.653000 +CVE-2024-1277,0,0,689a839a3a7db10b583a47415b0b9ced4ac1facc3de9b9bff5a5d33a6a1654fa,2025-03-04T12:24:19.653000 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 CVE-2024-12772,0,0,e8e2a7e307b24017f1fe59162a8fc87dfcf39277c207b4d15a2a69e2457db255,2025-02-18T19:15:12.523000 CVE-2024-12773,0,0,4a158210ce8f04e63a0cc5644404dce0edf638a1d39d2ff2dbf8f403280ec7de,2025-01-27T17:15:15.290000 @@ -246805,7 +246805,7 @@ CVE-2024-12816,0,0,94a80e9971eaa7e870e47359d4c3d1f8fa9ff5419e2a80ed33d726940db7b CVE-2024-12817,0,0,177c0c1ee17fbeb45fd7a30a85d211f5e3e78b0121812fcf822599a3e7e7f5fa,2025-01-25T08:15:08.300000 CVE-2024-12818,0,0,84584f689c6c77a45a4884a21e812302b20927c35cf898200120c33746d2aaa2,2025-01-15T10:15:07.803000 CVE-2024-12819,0,0,d67b85742967f9e166e23a2e5c4440d086b3b3988f6b73108d4bee255219b06d,2025-01-09T11:15:15.657000 -CVE-2024-1282,0,1,8aae000f2e1b957a732f4d9da1a09c6a0b5f298af774808a4763905b81f69a99,2025-03-04T12:24:19.653000 +CVE-2024-1282,0,0,8aae000f2e1b957a732f4d9da1a09c6a0b5f298af774808a4763905b81f69a99,2025-03-04T12:24:19.653000 CVE-2024-12820,0,0,e360640a03322169bd3f6f06c3ba39e6c3f29a8f90c8d81b8f4979e1e5e53133,2025-02-28T06:15:24.903000 CVE-2024-12821,0,0,2a46264d0849bd4aa7be7fa7af85f41ff809fdd69397422a1eaf78727791d250,2025-02-28T22:16:37.477000 CVE-2024-12822,0,0,eb26dd9b7803b039e119baab2aef259fd718e2137e365ee06147d8eb4d92eb0a,2025-02-28T22:16:37.477000 @@ -247835,7 +247835,7 @@ CVE-2024-1491,0,0,d70967d622773fff19c9093c078311d0c0317938407098534f36b503281d0d CVE-2024-1492,0,0,59343017212ddb64bbe621b975505cb84ad4611a92838c8772b58396c8764654,2024-11-21T08:50:41.923000 CVE-2024-1493,0,0,951758bed46ad6e985cb8d3e1e537f9ab8062a6daa78beef2a278abf219edefe,2024-11-21T08:50:42.043000 CVE-2024-1495,0,0,b3d42a19aa1a62facaef98e7f063ab8c0b4a92d4ea0b89ef5f606fcb4257510d,2024-11-21T08:50:42.197000 -CVE-2024-1496,0,1,859e7e5d8a917a39094959f5e651d557a15d14e7f8da8d3e05e54ad75be23b72,2025-03-04T12:25:17.263000 +CVE-2024-1496,0,0,859e7e5d8a917a39094959f5e651d557a15d14e7f8da8d3e05e54ad75be23b72,2025-03-04T12:25:17.263000 CVE-2024-1497,0,0,bbe3250bf4479120430c0f29b882afc9852aab2e448bf41f0296f987b62a68f0,2025-01-22T21:00:03.030000 CVE-2024-1498,0,0,9cbd92d0f33965fc6126a633cc19db346c78e615eab4dbf18c292d9646196f1d,2025-01-07T18:18:04.250000 CVE-2024-1499,0,0,0633316f47685281ee22de44984ee86e019a3a966e3a05caf35512f407ac2251,2025-01-22T20:58:15.017000 @@ -247918,7 +247918,7 @@ CVE-2024-1580,0,0,b4c85f804f3ce2bebc9a67ff4f8729e521ce8a5ac9e2676ae788d23145f50c CVE-2024-1582,0,0,b464a7d153c2341a87cab438d3cbd89bdc0b71381693f648c2e94a9e1b3f1c2d,2025-02-11T15:57:12.813000 CVE-2024-1584,0,0,cfafdb4f5ffc1319288c510c9224a8cb8c2cc5f346f7b847228043c1ff209e06,2024-11-21T08:50:53.187000 CVE-2024-1585,0,0,1d475b7c85f620c08988c251c2895ab948e7f3ba822cf6ec7f5aba08404a5ef1,2024-11-21T08:50:53.310000 -CVE-2024-1586,0,1,541da7657b20f087f9ba81ec37e77af1ce0070c0f329c6e392de3f525200b8a0,2025-03-04T12:25:17.263000 +CVE-2024-1586,0,0,541da7657b20f087f9ba81ec37e77af1ce0070c0f329c6e392de3f525200b8a0,2025-03-04T12:25:17.263000 CVE-2024-1587,0,0,9d367856c23035719b91ca8cb6ecef3700bc507de87dd872f0f3db6ad94fac7e,2025-02-26T19:15:20.073000 CVE-2024-1588,0,0,064c6c0dd6f975ea15e06fcb223479e78a68292a40c160ed7cd24d23d617f190,2024-11-21T08:50:53.673000 CVE-2024-1589,0,0,1931589006a4c51bc1b5b6052d50e4e25fdb31d7b1487761957f59c98cc0a546,2024-11-21T08:50:53.787000 @@ -247943,7 +247943,7 @@ CVE-2024-1608,0,0,0a57ef7d0ee1c774c7263d04a6788a7f66bae8cf3338ec576b87a084004d24 CVE-2024-1609,0,0,fccce712d5b51d64f058f686add884943b63cc50b1aa573fc5b42dba9ff87c96,2024-12-25T04:15:06.750000 CVE-2024-1610,0,0,d5812a4c168fe77b942e08446c0de47072455d9314c53f81af852c4034bb9f3a,2024-12-18T16:15:12.060000 CVE-2024-1618,0,0,f900010f21bb70b6581fb91ea7ff15d09cd9f4b411eb32fa913b01f49c3af689,2024-11-21T08:50:56.193000 -CVE-2024-1619,0,1,1dc4cae75e6ed8035ddda75fc43d6cd5ea02825d1806a78ac187cc30887cfdd6,2025-03-04T12:25:10.853000 +CVE-2024-1619,0,0,1dc4cae75e6ed8035ddda75fc43d6cd5ea02825d1806a78ac187cc30887cfdd6,2025-03-04T12:25:10.853000 CVE-2024-1621,0,0,4f71e917a983b004200d9504ffd2175f3bc02a73b7994fa10c0feba74dd0181d,2024-09-17T14:12:41.620000 CVE-2024-1622,0,0,6230709226e22321ed94885d3b77124257bb246922a7e40fbe69d0e730121d80,2025-02-27T03:05:58.637000 CVE-2024-1623,0,0,11acc09d0781037d56051debbc6de791211a8b87ba326c3093f5bc85aad229af,2025-01-23T18:10:39.310000 @@ -248319,7 +248319,7 @@ CVE-2024-20005,0,0,81864e6b98bccdaf19cf86faa064f989d3abe91d785c41a769f319bee2d04 CVE-2024-20006,0,0,123690fda6d54b98716f1dcc2adbe49f785d535a185fe9b4159c2360ed88a9ac,2024-11-21T08:51:46.967000 CVE-2024-20007,0,0,ab19a2494b1d096e2862ed93f193d718b58535b709bff75d63ca0c55cebc750e,2024-11-21T08:51:47.180000 CVE-2024-20009,0,0,4a58a52b68097964e7e1bcf696d9da3d868e5ffe4b53e991be80fb6a46e280b2,2024-11-21T08:51:47.310000 -CVE-2024-2001,0,1,b145f3947cfb1e29dada7265c93c9dd24666a55f79102cbd5ad9e7a7be5dd7d8,2025-03-04T12:25:10.853000 +CVE-2024-2001,0,0,b145f3947cfb1e29dada7265c93c9dd24666a55f79102cbd5ad9e7a7be5dd7d8,2025-03-04T12:25:10.853000 CVE-2024-20010,0,0,8edbf766ae1c5f4665b2af7523fb7a6f5200cb0332f487369daeca619902a2ec,2024-11-21T08:51:47.437000 CVE-2024-20011,0,0,87bce25997d86bdef96305e83059e8ef24e00ebd023828f1663236af9db940d9,2024-11-21T08:51:47.577000 CVE-2024-20012,0,0,032eaf44b99fe882a34e6aba7f568f377b39ce8e6869d2f3e491b4a94d24d9c9,2024-11-21T08:51:47.703000 @@ -248402,7 +248402,7 @@ CVE-2024-20086,0,0,5f38d98a412fa8e24f7083fe5b59d81c98c8095fbd38cef9f91b5a2fd78ff CVE-2024-20087,0,0,127fda73dc634b061b298bf97ad3e36651c853da287dbf3edeee880a02dac2e8,2024-09-05T14:26:51.497000 CVE-2024-20088,0,0,799856d2d6a88eb0cbfd91dbeb434761b25f41370ebbfa9762058543c2fbca4b,2024-09-05T14:27:24.840000 CVE-2024-20089,0,0,ab63f2683963fb30bca2be5c703bf1c80e2ef2082975e77e18edca5b61d8b301,2024-09-05T14:28:02.713000 -CVE-2024-2009,0,1,f41104c269d626c0ab9b2253bedae51fb046386d2219528e375dabd255f6c315,2025-03-04T12:25:10.853000 +CVE-2024-2009,0,0,f41104c269d626c0ab9b2253bedae51fb046386d2219528e375dabd255f6c315,2025-03-04T12:25:10.853000 CVE-2024-20090,0,0,a65fed379c4dce4f0c9e874b96968f906ad2b824d77ffe473363a1c9911ded18,2024-10-07T19:36:41.627000 CVE-2024-20091,0,0,52bbd4e5e4ea1b1110e5db08fb1eef905f8b4c771967a4a299c0ee13344532b6,2024-10-27T03:35:01.130000 CVE-2024-20092,0,0,bccf2d6f90e4a3c613ce6cf5daf983cac4e07c4ee3a83bc53222394d67633936,2024-10-07T19:36:41.920000 @@ -280994,11 +280994,11 @@ CVE-2025-1879,0,0,acc64ec8d5a295a37fd36d2847aa407b8c77ad841f38a076dbb5ebaf330d51 CVE-2025-1880,0,0,226f0629ce5edc5a5e9b1fc0edae802ea4130e5a975c21f8005cf570735a0f71,2025-03-03T20:15:45.717000 CVE-2025-1881,0,0,f200a1b35fa04fb1cf756c59d318883b14b2ed22445032eb6d28b374aaf8378d,2025-03-03T21:15:18.097000 CVE-2025-1882,0,0,258c65b462c2d3330a44589b1e6146be14f4578339a6a130d959fe1a0c619c59,2025-03-03T21:15:18.267000 -CVE-2025-1889,0,1,f7cf73293a0ccf1008c443a59d3e7d9e6c3eafe2a69cacf7dd719e71afcc42d7,2025-03-04T12:15:32.370000 +CVE-2025-1889,0,0,f7cf73293a0ccf1008c443a59d3e7d9e6c3eafe2a69cacf7dd719e71afcc42d7,2025-03-04T12:15:32.370000 CVE-2025-1890,0,0,fb180de0a5553a034ff78b5b5a313fe552ef117fe5eb133cd304c74c41bebb8e,2025-03-04T00:15:31.190000 CVE-2025-1891,0,0,ba5dca5f04b0970d036a786c7821b97cb95f51992163656e2d4e884b26749b04,2025-03-04T00:15:31.377000 CVE-2025-1892,0,0,5f521d1356697805c14d8f756f3eea70794c3f1bece498159531e6576bcea5d0,2025-03-04T01:15:11.147000 -CVE-2025-1893,0,0,b806fcf0ee1cc322763c013ece431d9f08f02f9fe7c5cb08cab694221d194f43,2025-03-04T01:15:11.327000 +CVE-2025-1893,0,1,18b5ea0a0ca62226ded1a72e624165d9371800e39e7d7034899a481cc3d8aa6d,2025-03-04T13:15:10.063000 CVE-2025-1894,0,0,164da153e07025ecb72d314d8c9548eaacf5c09d2e168cfb9789d74af94348d8,2025-03-04T02:15:35.380000 CVE-2025-1895,0,0,f7fdb5ea44d811a741cda1ad116677cd04f10a970b0ce5da888f126de44023e4,2025-03-04T02:15:36.163000 CVE-2025-1896,0,0,d6468fd7c73c75a3b36bb29f1c2fee1b2fb32ea5a7c8aea8e3f379d9e7426436,2025-03-04T02:15:36.340000 @@ -281012,6 +281012,21 @@ CVE-2025-1903,0,0,ad39b59b593243038c6c2b3182d79a3798b1c4d73d43fb52278944b7504298 CVE-2025-1904,0,0,c3f8c1fa1d9579c4d82bc617eae230933b987e0aaee6ca3786c17750a6074cf8,2025-03-04T05:15:14.440000 CVE-2025-1905,0,0,544d2a978ea2a42a58a9b1374a4628e0334caacaa4fa4d5b01db57902479138d,2025-03-04T05:15:14.680000 CVE-2025-1906,0,0,459dada4012727e3771610e3a7119b7d5a5efce1dfb2febc2be2da9752686a5c,2025-03-04T05:15:14.903000 +CVE-2025-1925,1,1,3555443c31b069f7d334eccd429471a153bc502fbca36c5565b567a1b55d2fd9,2025-03-04T14:15:36.717000 +CVE-2025-1930,1,1,0af19b309bc3568ec49a2f7143d8beec88c681599fe59a1a151cf4873518a863,2025-03-04T14:15:37.850000 +CVE-2025-1931,1,1,07ca8f72840844f1c7bc6e7707368913732bbd4581c32b3edd89096405e1f0b7,2025-03-04T14:15:37.963000 +CVE-2025-1932,1,1,685d653318d2c61bc7ab512d43423a62e980f639157cec9154a433bde0a8c89f,2025-03-04T14:15:38.053000 +CVE-2025-1933,1,1,af60cb7e54d694102cf1a34b3bf8a3d7b976ad074c5c72afe1edcea9c3030cb9,2025-03-04T14:15:38.170000 +CVE-2025-1934,1,1,defda1fa968f2d1f6b4bab5407943d1f18c163966bf3940bc1ce343e2dc494af,2025-03-04T14:15:38.273000 +CVE-2025-1935,1,1,628d9831cfde3bf6c1721fb5b4eb6426bb6f2fece608e7b61bb7df00efe8d704,2025-03-04T14:15:38.390000 +CVE-2025-1936,1,1,08ee55072dc1440649036276dd782693ec14b6ecbdcc6904219467a7b9af1bb6,2025-03-04T14:15:38.500000 +CVE-2025-1937,1,1,fe96f19485f137b7de4930d8a1c319b5b597161e14b41dc56749602d697c21c3,2025-03-04T14:15:38.610000 +CVE-2025-1938,1,1,9c67affb79189d97fc730ea5b0f939fba8b816b20045f69c914676a7593d8c17,2025-03-04T14:15:38.730000 +CVE-2025-1939,1,1,5423b6d57bde27103afefd0147e6a27b92b6f89c451bc13e8b0c4b336560932e,2025-03-04T14:15:38.837000 +CVE-2025-1940,1,1,5dbf44d5cc7ae5e21d3790ba36646b5bedeb9ad84f1c6a4302111774521a8db2,2025-03-04T14:15:38.950000 +CVE-2025-1941,1,1,e65f467cf8ffb9224f34a01e5cdb113d9511f46ba9c9c07e683575d280ecf13e,2025-03-04T14:15:39.063000 +CVE-2025-1942,1,1,643dcf7b843a42dc9ccb28b7e76a8aa357d034b38c8e0ef0ed7c25ddc2827490,2025-03-04T14:15:39.167000 +CVE-2025-1943,1,1,e9f1827e222fe2c9d54915e014c7896e9d0f61d9e34695a6c9e7975aa52b9e5a,2025-03-04T14:15:39.260000 CVE-2025-20011,0,0,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000 CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 @@ -281507,8 +281522,8 @@ CVE-2025-21620,0,0,aefab78f4e8b7a931e7536d08b17991e6afef83a4bc3ab5d14fb2e61be094 CVE-2025-21622,0,0,f9b304c8cae09855d048ff95696b50613640a9fdc9c30a5aadd5c3b3ce64c9b7,2025-01-07T18:15:21.703000 CVE-2025-21623,0,0,11a3a4b165ac7ea35d006622a2c31920fdd49ec8509c7c0bc152edfb3b703f1b,2025-01-07T17:15:32.313000 CVE-2025-21624,0,0,67d81661ccc165bcb7a2d55cd4301b8865debac4b78d0af97080ff58ad5f038c,2025-01-07T17:15:32.417000 -CVE-2025-21626,0,0,fe55e32bdb91a4def1b404e06fdd045e47450906e5c33813e0ab86174666e08f,2025-02-25T16:15:37.663000 -CVE-2025-21627,0,0,4931e1392434f023531ed8cf25dbc974984e507604b088123090a4cbacd89e07,2025-02-25T16:15:37.863000 +CVE-2025-21626,0,1,e56409ce0f9770c9f60f64484e01c5dc141e09c125b689fb402783ce7def5acd,2025-03-04T13:49:18.880000 +CVE-2025-21627,0,1,a64cbac625de75abb2fb97405740e09eb3c0493dfb277a167ddabd4e32a452ec,2025-03-04T13:49:18.880000 CVE-2025-21628,0,0,0075ad45f4e081e6b1d4b87e45ccf38954b3b032c76d5db5fcb797ed5fc6213f,2025-01-09T18:15:30.070000 CVE-2025-21629,0,0,5bd27bb9a82cb5a5f09a5986e4163e86befaea4298f9b54578a62350a29978a7,2025-01-15T13:15:15.220000 CVE-2025-21630,0,0,b687cde38a98e756a80e569a98743dbd03093e3308ce5058c13044fa43b51e41,2025-01-17T09:15:08 @@ -281745,9 +281760,9 @@ CVE-2025-22219,0,0,b49955fb2ad7bfd00b8dfa99078cc886448cbbcd0b573429971407c26bc29 CVE-2025-22220,0,0,a00b168f73aec469e4c78128ddc9ae91feb9fbb9ddcfb4c72ca05c1c287f029b,2025-02-06T14:15:30.510000 CVE-2025-22221,0,0,9ab8cb2916b1d2add27df50f24514c36d0740b88ba103377a1c3f59422214b6c,2025-01-30T16:15:31.257000 CVE-2025-22222,0,0,f96218f2ce820065976bcd4294c5a9c60e0f54f4e21cd14eff22d95b2b98eb7e,2025-01-30T16:15:31.367000 -CVE-2025-22224,1,1,fd318e5fff77738843cc9b3d3e80d297f64943d387efb764d22c0ea672dc48d8,2025-03-04T12:15:33.687000 -CVE-2025-22225,1,1,f4834648c2f6b2494eb42892bf6d82d8181e27a43ce98b17e9726398b9b9f312,2025-03-04T12:15:33.840000 -CVE-2025-22226,1,1,d90adfb8715bb1e8dc631ffd086928d68c1066ee4e833d32035e4567da2000ca,2025-03-04T12:15:33.973000 +CVE-2025-22224,0,0,fd318e5fff77738843cc9b3d3e80d297f64943d387efb764d22c0ea672dc48d8,2025-03-04T12:15:33.687000 +CVE-2025-22225,0,0,f4834648c2f6b2494eb42892bf6d82d8181e27a43ce98b17e9726398b9b9f312,2025-03-04T12:15:33.840000 +CVE-2025-22226,0,0,d90adfb8715bb1e8dc631ffd086928d68c1066ee4e833d32035e4567da2000ca,2025-03-04T12:15:33.973000 CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000 CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000 CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000 @@ -282193,7 +282208,7 @@ CVE-2025-23019,0,0,d086114380d5b72aae48f2dd063fe423ce3274d7a5a6c9dc170a5da44914e CVE-2025-23020,0,0,ddc02947f0b59a5de6e6a776839dec2cf08c84bac344560dd2b477015ae3c297,2025-02-20T03:15:12.630000 CVE-2025-23022,0,0,bb805305ea96825569d9891ea5d8911d64b95f766e73f0709e01ab6077884661,2025-01-16T21:12:15.537000 CVE-2025-23023,0,0,8d62189672cb787e5081908c4fe2e78759d3475dd1f1ecf661879211c3f1488e,2025-02-04T21:15:28.083000 -CVE-2025-23024,0,0,21715a0809a56a3815c370dd0a8ac8b8532f45642a495e47b03789223350cdd3,2025-02-25T16:15:38.053000 +CVE-2025-23024,0,1,bf0582042501ee44e59b14902a790c188cdc4c2dbc961793adbe006bb8c097af,2025-03-04T13:49:18.880000 CVE-2025-23025,0,0,a430643fad54c298ac56c82186034eeeea39626036838a2f98e7e7672f4b6ffd,2025-01-14T18:16:05.650000 CVE-2025-23026,0,0,b268119f7916ba3a282a082a7a4e3bccaa70c542061d608ad26e1251c19332fd,2025-01-13T21:15:15.897000 CVE-2025-23027,0,0,3d8a20e7f66f71ebfff4348388587603a6ab48265ca2628da8f07052fa639ed0,2025-01-13T20:15:30.150000 @@ -284042,6 +284057,9 @@ CVE-2025-27420,0,0,9d526a7e533e1150de46ca6280cff846925c1fbe0c81b3eaf5526bd6ed1ef CVE-2025-27421,0,0,c5f8cbb8f9ad5af14f93e4ff38fc97a2222c7110d039eea8083f6d3839df358a,2025-03-03T17:15:15.630000 CVE-2025-27422,0,0,bcd8a473455936a2a24238f0c36bf9a7c4201ca34fa1348e7e22e5b4114dc5b5,2025-03-03T17:15:15.787000 CVE-2025-27423,0,0,88e83c39a3504ab732d13ded688593dc0fb5c684cb5e5c6337b81425bc853482,2025-03-03T17:15:15.943000 +CVE-2025-27424,1,1,cc2945756d56b37d88e982abae75015a79e227fff15d34182659ed65557d5d90,2025-03-04T14:15:39.397000 +CVE-2025-27425,1,1,fbc4b3118251230ac7c7affcbb0b3e868553e04992c0c3515adecdf42212f11a,2025-03-04T14:15:39.493000 +CVE-2025-27426,1,1,860f9cbbdf2d294154d869e5bfa7c5c461d73af2f1e84fe2ef0c26777f1a316e,2025-03-04T14:15:39.593000 CVE-2025-27498,0,0,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38ec0,2025-03-03T17:15:16.443000 CVE-2025-27499,0,0,ab06e5a6a9e6a84d5061b8c89a502ae1ba119ec86416a651117e80b7694ffcba,2025-03-03T19:15:36.027000 CVE-2025-27500,0,0,be50dbcb64bc9b0e171440007ce7d77f7cd94b8b10aa18d6f6266491eec37f80,2025-03-03T19:15:36.157000