diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2347.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2347.json new file mode 100644 index 00000000000..2f16e71b6a1 --- /dev/null +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2347.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2025-2347", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-16T21:15:37.617", + "lastModified": "2025-03-16T21:15:37.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in IROAD Dash Cam FX2 up to 20250308 and classified as problematic. This issue affects some unknown processing of the component Device Registration. The manipulation of the argument Password with the input qwertyuiop leads to use of default password. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 5.8, + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.5, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1393" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-7-bypass-of-device-pairingregistration-for-iroad-fx2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299813", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299813", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2348.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2348.json new file mode 100644 index 00000000000..284536dd8e3 --- /dev/null +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2348.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-2348", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-16T21:15:37.783", + "lastModified": "2025-03-16T21:15:37.783", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been classified as problematic. Affected is an unknown function of the file /mnt/extsd/event/ of the component HTTP/RTSP. The manipulation leads to information disclosure. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 3.3, + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.5, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-8-dumping-files-over-http-and-rtsp-without-authentication", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299814", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299814", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2349.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2349.json new file mode 100644 index 00000000000..bec9ee8a599 --- /dev/null +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2349.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-2349", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-16T22:15:11.747", + "lastModified": "2025-03-16T22:15:11.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /etc/passwd of the component Password Hash Handler. The manipulation leads to password hash with insufficient computational effort. Access to the local network is required for this attack. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "ADJACENT", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 1.8, + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 3.2, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + }, + { + "lang": "en", + "value": "CWE-916" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-9-exposed-root-password", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299815", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299815", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2350.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2350.json new file mode 100644 index 00000000000..96f4af82c77 --- /dev/null +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2350.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2350", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-16T22:15:13.023", + "lastModified": "2025-03-16T22:15:13.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been rated as critical. Affected by this issue is some unknown functionality of the file /action/upload_file. The manipulation leads to unrestricted upload. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 5.8, + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.5, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-10-unauthenticated-uploads", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-11-unrestricted-webshell", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299816", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299816", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 58c5bbf73df..d2bf0e2c3d3 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-16T21:00:19.269698+00:00 +2025-03-16T23:00:20.116017+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-16T20:15:11.603000+00:00 +2025-03-16T22:15:13.023000+00:00 ``` ### Last Data Feed Release @@ -33,15 +33,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -285354 +285358 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `4` -- [CVE-2025-2345](CVE-2025/CVE-2025-23xx/CVE-2025-2345.json) (`2025-03-16T19:15:36.510`) -- [CVE-2025-2346](CVE-2025/CVE-2025-23xx/CVE-2025-2346.json) (`2025-03-16T20:15:11.603`) +- [CVE-2025-2347](CVE-2025/CVE-2025-23xx/CVE-2025-2347.json) (`2025-03-16T21:15:37.617`) +- [CVE-2025-2348](CVE-2025/CVE-2025-23xx/CVE-2025-2348.json) (`2025-03-16T21:15:37.783`) +- [CVE-2025-2349](CVE-2025/CVE-2025-23xx/CVE-2025-2349.json) (`2025-03-16T22:15:11.747`) +- [CVE-2025-2350](CVE-2025/CVE-2025-23xx/CVE-2025-2350.json) (`2025-03-16T22:15:13.023`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 0d0ff48bf3d..98ecd855196 100644 --- a/_state.csv +++ b/_state.csv @@ -283169,7 +283169,7 @@ CVE-2025-23445,0,0,641133bc0863203a2790eaa4ca8b7599bd8c7c6922be0e426f2e225feec30 CVE-2025-23446,0,0,e6f9e978833a7871e5161c7568ac19d4275eea8b1b6a93cc3e1abd71a8d20aed,2025-03-03T14:15:35.500000 CVE-2025-23447,0,0,eb5ca7ad3f4a8ae4ae11ec7bdaa46eb4cce3b1511628fa2b58ed43f7b495f6df,2025-03-03T14:15:35.637000 CVE-2025-23449,0,0,9861de2bb02130e19fdbef202b482545d141110bfd57643033355d06e9dabdca,2025-01-22T15:15:15.650000 -CVE-2025-2345,1,1,c943899a8d870f03a1e81c0a5654034c46d798fdb4c840b60b2cecc3f70a5bc4,2025-03-16T19:15:36.510000 +CVE-2025-2345,0,0,c943899a8d870f03a1e81c0a5654034c46d798fdb4c840b60b2cecc3f70a5bc4,2025-03-16T19:15:36.510000 CVE-2025-23450,0,0,ffde507d42dc6c5721d5d8f203b57f84d570a6fa59f6007c92ef432b218ca44b,2025-03-03T14:15:35.780000 CVE-2025-23451,0,0,a313555798bd3856c6ce8808f0153b1b43635388cd9badfe1b4d9f9c2ddc80d9,2025-03-03T14:15:35.920000 CVE-2025-23452,0,0,9ae20555b511c9e710c7a052682906033b9071856145809833c544b191d171ae,2025-01-16T20:15:35.730000 @@ -283178,7 +283178,7 @@ CVE-2025-23454,0,0,ace1a82fe5cff36bdca7766343683a02cd2df950eb3a0de3ea36f28eddda7 CVE-2025-23455,0,0,b68e42bf1b83a50e0ae3f133160e0d1ee1a7c47161ff1547208b101f38e9ccf6,2025-01-16T20:15:36.033000 CVE-2025-23456,0,0,b9d69f441ecef487989469cbcdd543bce473422ca06c51c0b02404c7506af3d0,2025-01-16T20:15:36.247000 CVE-2025-23457,0,0,986871805bb278c802f2d565eaf70f336dd71bac5bf52dcdc838d471378e54a5,2025-01-27T14:15:28.373000 -CVE-2025-2346,1,1,ac993a36f4e59fe20b5902ca5479eb0aa7a2a5bfe17081e8b0ad38e0fdb6bfa5,2025-03-16T20:15:11.603000 +CVE-2025-2346,0,0,ac993a36f4e59fe20b5902ca5479eb0aa7a2a5bfe17081e8b0ad38e0fdb6bfa5,2025-03-16T20:15:11.603000 CVE-2025-23461,0,0,98b2580e5c2e45a2882850561564e0c4ed549e275719c2e53782b2517aab4e0b,2025-01-21T18:15:16.387000 CVE-2025-23462,0,0,f1d946acd1b6b97ba142139f225fbf51751f08a101be4aaf7927889e6462f843,2025-01-22T15:15:15.800000 CVE-2025-23463,0,0,98d57f4a46d47d157b5ed19edc615443bfb511b5852b7cb0045c98e9789a1faf,2025-01-16T20:15:36.397000 @@ -283186,6 +283186,7 @@ CVE-2025-23464,0,0,2d2dec24b28420bd0cc62f320b0cd789ea9ec6fe1293ce5d1d92b41bfb20a CVE-2025-23465,0,0,5453b3fbdaaf8a6c6dae1cf225d47e064bf67f3d39cf8a5f667393b17cc9666c,2025-03-03T14:15:36.213000 CVE-2025-23467,0,0,2bf367475f14e1f3924f0a4f22a4aea1a79671e1b9e87972e80793a0f370189e,2025-01-16T20:15:36.547000 CVE-2025-23468,0,0,146612e9c0cde7fecc23e59a0f5a84ad09e5f947fb41b9a85847d1878aa53ed4,2025-03-03T14:15:36.357000 +CVE-2025-2347,1,1,80fc2161ec781f778201d85eae58374e71ef4ba69373c8d0a7a45302d1513fbd,2025-03-16T21:15:37.617000 CVE-2025-23470,0,0,8848375424af5ed790014076bbf48be372e428fab979e2d67fe4f034138fca32,2025-01-16T20:15:36.700000 CVE-2025-23471,0,0,8559e2ce78e3acc0fab057aadfea445292e3f0c4980827d748c143f09c30fffa,2025-01-16T20:15:36.840000 CVE-2025-23472,0,0,6bff6916383e657faa5792ff801452713358809d9c8eb7837e6db20971dbe26b,2025-03-03T14:15:36.497000 @@ -283196,6 +283197,7 @@ CVE-2025-23476,0,0,2e73d00e315595f7a053681ff301d905967319719056a5b9f811682d4d934 CVE-2025-23477,0,0,5c6098808319de4505951baebf1a586e4793ae0be4627c3cf65438e22beac475,2025-01-21T18:15:16.570000 CVE-2025-23478,0,0,7816e5f1a295946efb2ccc23f508bf79e3db4e9b2c3901a72fa3ffbf972b8770,2025-03-03T14:15:36.777000 CVE-2025-23479,0,0,cdcb9a9761a2d09c079e487aee389b609788690d2b6aacadc7127bf962e5326a,2025-03-03T14:15:36.920000 +CVE-2025-2348,1,1,5c2e1dedf4a28feda86b67975957771328f14ff98c3741863bf8339214a82334,2025-03-16T21:15:37.783000 CVE-2025-23480,0,0,da73376d49c59465468f55e3dad692b0ad87164665dc8c174e57f224c1a91b58,2025-03-03T14:15:37.060000 CVE-2025-23481,0,0,7735e60f515443d36a8e8421ee1c9666bc06bd0c0a7fa56464454e844755b02c,2025-03-03T14:15:37.207000 CVE-2025-23482,0,0,c17caebb775970fa58c03f48c04f5b353183bc0a916a66355b8dea35fcb084f2,2025-03-03T14:15:37.367000 @@ -283206,6 +283208,7 @@ CVE-2025-23486,0,0,db15fe8e353e3dbb641397d86d33ed6d64f36b2de802bd430384278f6b43f CVE-2025-23487,0,0,16345e2992279b3ef951f4bbc770e2fed59e7af149e5bf1b0a21dc98e22382df,2025-03-03T14:15:37.787000 CVE-2025-23488,0,0,a39c51053c4ec97bbc9699aebd5caaea319e89cf525bb91db78b6079b8e31071,2025-03-03T14:15:37.930000 CVE-2025-23489,0,0,a8502fb4e83bb7ba28297e2543a85c84c18f12fcd380f120406bbfcdc0815675,2025-01-21T18:15:16.740000 +CVE-2025-2349,1,1,58dc1498d316d95ecaf4e5b480aec251c744828e4006b8088176bbb59ec3f6b9,2025-03-16T22:15:11.747000 CVE-2025-23490,0,0,8b8bb0e45d151766ce75bb2cd7b73b6e4f35c9dbbdf35d395780a7869ad64947,2025-03-03T14:15:38.077000 CVE-2025-23491,0,0,b6e04909bb37731409bf7190d1070864f039d5a61566e683ba212ff3dd649d05,2025-02-03T15:15:20.640000 CVE-2025-23492,0,0,acff49799bed9b05d17cef1cd5fc93691c99856666ac52115fd66570fdfffd16,2025-02-14T13:15:43.573000 @@ -283216,6 +283219,7 @@ CVE-2025-23496,0,0,099f95bf73114288ca27feea3bf546897da191376f2d3f822c90194deb630 CVE-2025-23497,0,0,e94acfea44c4d198d5a805782578eef8be632de6ca980583b81a625d10980e86,2025-01-16T20:15:37.293000 CVE-2025-23498,0,0,636b120a74cbfb3524538ea103d8fb93424975cb4826227d74647c0da497f2d4,2025-01-22T15:15:16.370000 CVE-2025-23499,0,0,18de021795ada6e9003ac109fee0e567e9be54c39a2e050c169b423a62e8fca7,2025-01-16T20:15:37.440000 +CVE-2025-2350,1,1,28e8d685012e5ca9585e626b8a9b487b473d35cd1015656b907354f3cc6fb8ee,2025-03-16T22:15:13.023000 CVE-2025-23500,0,0,194d70a41828aed88d1340c39622c2eea4fe93a355a56d82c66d50fb6a7ee75a,2025-01-22T15:15:16.500000 CVE-2025-23501,0,0,2ca3004ea38a2bebeea912643e9114dc05292b671294dc56e8b3bf1f4edc5f4c,2025-01-16T20:15:37.593000 CVE-2025-23502,0,0,57675ab4eb277e81bf38525805d9f7acfc03203c7f00a1ad5ad7431af0fcaa90,2025-03-03T14:15:38.633000