Auto-Update: 2025-03-07T07:00:20.221186+00:00

This commit is contained in:
cad-safe-bot 2025-03-07 07:03:48 +00:00
parent 3cba8ee4be
commit dff44bc341
7 changed files with 426 additions and 22 deletions

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1714",
"sourceIdentifier": "security@puppet.com",
"published": "2025-03-05T15:15:15.413",
"lastModified": "2025-03-05T15:15:15.413",
"lastModified": "2025-03-07T05:15:16.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Lack of Rate Limiting in Sign-up workflow in Perforce Gliffy prior to version 4.14.0-7\u00a0on Gliffy online allows attacker to enumerate valid user emails and potentially DOS the server"
},
{
"lang": "es",
"value": "La falta de limitaci\u00f3n de velocidad en el flujo de trabajo de registro en Perforce Gliffy anterior a la versi\u00f3n 4.14.0-7 en Gliffy en l\u00ednea permite al atacante enumerar correos electr\u00f3nicos de usuarios v\u00e1lidos y potencialmente atacar el servidor"
}
],
"metrics": {
@ -75,7 +79,7 @@
],
"references": [
{
"url": "https://perforce1.lightning.force.com/lightning/r/a91PA000001ScY1YAK/view",
"url": "https://portal.perforce.com/s/detail/a91PA000001ScY1YAK",
"source": "security@puppet.com"
}
]

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-2066",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-07T05:15:17.293",
"lastModified": "2025-03-07T05:15:17.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in projectworlds Life Insurance Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /updateAgent.php. The manipulation of the argument agent_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/ubfbuz3/cve/issues/8",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.298822",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298822",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.514759",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-2067",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-07T05:15:17.527",
"lastModified": "2025-03-07T05:15:17.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in projectworlds Life Insurance Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /search.php. The manipulation of the argument key leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/ubfbuz3/cve/issues/9",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.298823",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298823",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.514762",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27795",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-07T06:15:33.273",
"lastModified": "2025-03-07T06:15:33.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "JXL in GraphicsMagick before 1.3.46 lacks image dimension resource limits."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "http://www.graphicsmagick.org/NEWS.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-27796",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-07T06:15:35.620",
"lastModified": "2025-03-07T06:15:35.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WPG in GraphicsMagick before 1.3.46 mishandles palette buffer allocation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.4,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"references": [
{
"url": "http://www.graphicsmagick.org/NEWS.html",
"source": "cve@mitre.org"
},
{
"url": "https://sourceforge.net/p/graphicsmagick/bugs/750/",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-07T05:00:36.321431+00:00
2025-03-07T07:00:20.221186+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-07T04:15:10.447000+00:00
2025-03-07T06:15:35.620000+00:00
```
### Last Data Feed Release
@ -33,26 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
284423
284427
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `4`
- [CVE-2025-2060](CVE-2025/CVE-2025-20xx/CVE-2025-2060.json) (`2025-03-07T03:15:33.457`)
- [CVE-2025-2061](CVE-2025/CVE-2025-20xx/CVE-2025-2061.json) (`2025-03-07T03:15:33.630`)
- [CVE-2025-2062](CVE-2025/CVE-2025-20xx/CVE-2025-2062.json) (`2025-03-07T04:15:08.933`)
- [CVE-2025-2063](CVE-2025/CVE-2025-20xx/CVE-2025-2063.json) (`2025-03-07T04:15:10.060`)
- [CVE-2025-2064](CVE-2025/CVE-2025-20xx/CVE-2025-2064.json) (`2025-03-07T04:15:10.247`)
- [CVE-2025-2065](CVE-2025/CVE-2025-20xx/CVE-2025-2065.json) (`2025-03-07T04:15:10.447`)
- [CVE-2025-26708](CVE-2025/CVE-2025-267xx/CVE-2025-26708.json) (`2025-03-07T03:15:33.307`)
- [CVE-2025-2066](CVE-2025/CVE-2025-20xx/CVE-2025-2066.json) (`2025-03-07T05:15:17.293`)
- [CVE-2025-2067](CVE-2025/CVE-2025-20xx/CVE-2025-2067.json) (`2025-03-07T05:15:17.527`)
- [CVE-2025-27795](CVE-2025/CVE-2025-277xx/CVE-2025-27795.json) (`2025-03-07T06:15:33.273`)
- [CVE-2025-27796](CVE-2025/CVE-2025-277xx/CVE-2025-27796.json) (`2025-03-07T06:15:35.620`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2025-1714](CVE-2025/CVE-2025-17xx/CVE-2025-1714.json) (`2025-03-07T05:15:16.233`)
## Download and Usage

View File

@ -281034,7 +281034,7 @@ CVE-2025-1693,0,0,78bee8ea11b0f84269d8265b773d2949284a15da89c9262684dc7b45646863
CVE-2025-1695,0,0,11ac8a68241490aba1f5f798db0dba9522b478d170bec56bb4dd6fd08e218fb4,2025-03-05T15:18:38.660000
CVE-2025-1696,0,0,e19ce729f319138dda2bbd521ee9f97aba68e3dde2fd97d4281f0a0a35131297,2025-03-06T12:15:36.293000
CVE-2025-1702,0,0,41f2b6913f8c8180797afd2cc2f175ceac2f74f281e62e10b6b473a6add44571,2025-03-05T12:15:35.420000
CVE-2025-1714,0,0,7d464005cc3e2fe8abdf07631689d8f1c4467f8ffe467852e3ced1b0a0be0afa,2025-03-05T15:15:15.413000
CVE-2025-1714,0,1,61e824a1ccdf54ec33bae3dd88565effb2433516529becf60015224f7bb0775a,2025-03-07T05:15:16.233000
CVE-2025-1716,0,0,db3aecae26e7981ab8a106cfd43bc335b9dad5cbc10d04d2c9d637c981434378,2025-03-03T16:15:39.520000
CVE-2025-1717,0,0,531ae6ccf2948d3fb4bab20d73b08fd6766b8bf8893677c6840dec6217d1f072,2025-02-27T08:15:31.130000
CVE-2025-1723,0,0,bd3dc44ce79d918f1eca963344abea138edda86e5a9253ac44f547b43e3ab229,2025-03-03T08:15:15.717000
@ -281284,15 +281284,15 @@ CVE-2025-2054,0,0,ab2a594941b94086fffcf5b37cb53c9b330e51d0f114b5825d0c1aa68d4f07
CVE-2025-2057,0,0,d7d92d6c13bb3b056a662c7a1158142789edd7c088582f23e801cdd24b69629a,2025-03-07T02:15:38.237000
CVE-2025-2058,0,0,b8c0ed4c6c9a30dd784843b19947dfc086e37f9bd6154d2b78254e871b32183f,2025-03-07T02:15:38.413000
CVE-2025-2059,0,0,5b6795d03e7b228aaf929737773f90cae866266639b998d7652a8491cad7d1dc,2025-03-07T02:15:38.600000
CVE-2025-2060,1,1,d01ac5a2e76f95dc006c3de804d9b9de8352f26529c158d0cb75e033b8abb605,2025-03-07T03:15:33.457000
CVE-2025-2061,1,1,1c1aced5f125c86a7f091487720fd95d47e58279f5298eeec0acb353fe0ffe5e,2025-03-07T03:15:33.630000
CVE-2025-2060,0,0,d01ac5a2e76f95dc006c3de804d9b9de8352f26529c158d0cb75e033b8abb605,2025-03-07T03:15:33.457000
CVE-2025-2061,0,0,1c1aced5f125c86a7f091487720fd95d47e58279f5298eeec0acb353fe0ffe5e,2025-03-07T03:15:33.630000
CVE-2025-20615,0,0,246812c21ea1208c6577dd2f9795a7d98215e290c9dd9fcc59c79b81edac8805,2025-02-13T22:15:11.590000
CVE-2025-20617,0,0,c8bfdf3a13c0fef33afce1eb72104d7b2280ba78c5b2dced7cd944ea31c0a2c7,2025-02-20T06:15:20.277000
CVE-2025-2062,1,1,db41a2a17bac6fa9c9820e6c0c2eb675578aa0e4d36f527836b39376c86a28a3,2025-03-07T04:15:08.933000
CVE-2025-2062,0,0,db41a2a17bac6fa9c9820e6c0c2eb675578aa0e4d36f527836b39376c86a28a3,2025-03-07T04:15:08.933000
CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000
CVE-2025-20621,0,0,060306fc4f84916fe909badb69a5829b34e2103b61fada341bb3713a68cfaebc,2025-01-16T19:15:29.960000
CVE-2025-20626,0,0,11d2c1166da72a9729a40d211579b4896bbbd70d36c79dcb79c1739952b5245f,2025-03-04T04:15:13.393000
CVE-2025-2063,1,1,c0b83f6c0c4eb79049083d36c7be5e01446d5f1bf6cd724f412c92558b39d4eb,2025-03-07T04:15:10.060000
CVE-2025-2063,0,0,c0b83f6c0c4eb79049083d36c7be5e01446d5f1bf6cd724f412c92558b39d4eb,2025-03-07T04:15:10.060000
CVE-2025-20630,0,0,0cb6d1c0b91807d74fd49faca2a027b3e775f1213907ee8f88e4e58cb3b78a59,2025-01-16T19:15:30.110000
CVE-2025-20631,0,0,eae48a24cdb26043896339096d80c579b21423122c0cfb7d1789d616416831f6,2025-02-18T19:15:24.347000
CVE-2025-20632,0,0,a969832868dfeb065ef85d46f111fa582b74e32bc8195140bed8e964787add5d,2025-02-18T19:15:24.460000
@ -281303,7 +281303,7 @@ CVE-2025-20636,0,0,53b7c37fe38dde7172ef3ef0f4e80e1b55d45c79cbcdafad69f9ad23a7de5
CVE-2025-20637,0,0,c4c64b7001bd8fc1a5334ed6ff29601eebe878b94ae3c7ef6deb4d59a01f4b6c,2025-02-18T19:15:25.103000
CVE-2025-20638,0,0,08f8240b8781ba529172281ed593ac6a74928a95932c1e6e64c0bd0033c3a922,2025-02-03T19:40:23.927000
CVE-2025-20639,0,0,17768a082d000d8edbb8d765dc2ec03f9c211008cd739454854e21355c649809,2025-02-04T15:24:00.723000
CVE-2025-2064,1,1,f802d84503fc5a7a3113a97c0b6528f9ae90846ccb75d39d5b5f406cc4ee3d3f,2025-03-07T04:15:10.247000
CVE-2025-2064,0,0,f802d84503fc5a7a3113a97c0b6528f9ae90846ccb75d39d5b5f406cc4ee3d3f,2025-03-07T04:15:10.247000
CVE-2025-20640,0,0,19242b4ab5555d3c296c9d663e46f0f6013cbb3b643a9a42576483affee449ec,2025-02-04T15:22:56.603000
CVE-2025-20641,0,0,8f64d7bdc38a4d4d6ffe4b925ecebf51da87177f825fd96d952c3b788cf66055,2025-02-04T15:22:10.670000
CVE-2025-20642,0,0,110f2bb3fd587df7b20a2739b2ed2dbc64fbe49db6605a51a1b388b3e56f194a,2025-02-04T15:20:21.300000
@ -281314,11 +281314,13 @@ CVE-2025-20646,0,0,a6481196a444de54518e6b2858a02b34acb7ed12a172ec1c376727a8e58a1
CVE-2025-20647,0,0,f8b14a260b30296d5521b985721527413454d57f9703d76e8d5f0a3d821d5af3,2025-03-03T15:15:16.880000
CVE-2025-20648,0,0,c46df21f1209c3ff238046d1ba22eabca91fd50b76bec446eef99f2da50f6b27,2025-03-04T17:15:16.960000
CVE-2025-20649,0,0,ad4f0f122ba16e08327b5ecac761a81e21676479957237b3040e3e5a614e3454,2025-03-04T17:15:17.130000
CVE-2025-2065,1,1,e108647b827f5aae79ca8b3a984e39927958d68ced28c0ae9be2ca4a6a7a9f09,2025-03-07T04:15:10.447000
CVE-2025-2065,0,0,e108647b827f5aae79ca8b3a984e39927958d68ced28c0ae9be2ca4a6a7a9f09,2025-03-07T04:15:10.447000
CVE-2025-20650,0,0,4839c3a5cbb4aeb9330b5312101e579111320a345dc24a6ab22be3803767178c,2025-03-04T17:15:17.287000
CVE-2025-20651,0,0,d0b2f57cefd6b14fe4ec9b006d4611fde15e3d9c3f09f4bb055081eee93fabc8,2025-03-03T19:15:34.823000
CVE-2025-20652,0,0,9485bc5abd99cf5824b119c49fe5e9158c152f14429264c67d56a50ce2458755,2025-03-04T17:15:17.497000
CVE-2025-20653,0,0,b2968adfcae86c06be703d17e416c9128a6d8c15cde3e34e7292e056ebacb491,2025-03-03T03:15:10.170000
CVE-2025-2066,1,1,5dca3a37881c3080b5ed7399cf07d794623bec104102f99020f28f3358b971ab,2025-03-07T05:15:17.293000
CVE-2025-2067,1,1,3e39862fd040dc0c3c929624d43984557b3839cb6c47b4edad23eed5ac7ebc44,2025-03-07T05:15:17.527000
CVE-2025-20881,0,0,69e8ec3ffc0d609e9ff0a5c0f14dc382935286a9654ff8a957242175a6264c27,2025-02-12T13:42:58.443000
CVE-2025-20882,0,0,f4193a007427cf2316ed2b8c45d5bf9c15dfb695bfcd22869153b3359f33afd6,2025-02-12T13:43:13.267000
CVE-2025-20883,0,0,cb8cf9b686cdb6300b673deaabe4b9ce5e5f73e6e26d527f21f3d0dcbca2cc19,2025-02-12T13:43:37.743000
@ -284107,7 +284109,7 @@ CVE-2025-26624,0,0,933774cf8883da910c74db2937793adaa8c4da49496d875f26d7c862a7576
CVE-2025-26698,0,0,a84e642c8171fd04684ed37215c90775ce47055c0db39dea2bf9e7638329b9fb,2025-02-26T13:15:41.983000
CVE-2025-26699,0,0,87cf95ca9a4284692cb3c070ce904e940ed4f976fad521177b72ff58a22d0261,2025-03-06T19:15:27.683000
CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000
CVE-2025-26708,1,1,d8e31c1d3ac2ae2d4309442531e3be42990d730d60213fee7cc6165b1cee0645,2025-03-07T03:15:33.307000
CVE-2025-26708,0,0,d8e31c1d3ac2ae2d4309442531e3be42990d730d60213fee7cc6165b1cee0645,2025-03-07T03:15:33.307000
CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000
CVE-2025-26751,0,0,fc2d5649850210570a1c66e7227d2f4e23c5b89d750a00b47264258ce20ebf91,2025-02-25T15:15:23.457000
CVE-2025-26752,0,0,de5f26c0c725b106ce7f39cb1c013f91e7db3ad53711569dd4e04f93f6febcc6,2025-02-25T15:15:23.597000
@ -284422,3 +284424,5 @@ CVE-2025-27682,0,0,713cee0b616020a8bc632e52123afbde5abe74b25723c76da89c300b1c3dc
CVE-2025-27683,0,0,5e723b97c48452065d8f21c52ed204d91618851b4da4b5c4ecec5381466f1b3b,2025-03-05T21:15:23.060000
CVE-2025-27684,0,0,da0fb326353cdf6531a963fb000bd170efcc1fb5ae72750473b8f48179f77ae5,2025-03-05T21:15:23.197000
CVE-2025-27685,0,0,7cac136abd1f6cc9c1c15290fa182233a8c7da8b4083786741590dd32acfb0b7,2025-03-05T21:15:23.337000
CVE-2025-27795,1,1,6c63d0de52e5a5ce88dd4527b7e8b14e866b38ecb9c86e71d93fb66eb57c3f4f,2025-03-07T06:15:33.273000
CVE-2025-27796,1,1,b3f979689e5dbaabbfdb2bf1ea0d456e5639782116f2a087e75a8e0f34304828,2025-03-07T06:15:35.620000

Can't render this file because it is too large.