Auto-Update: 2025-03-10T13:00:25.940893+00:00

This commit is contained in:
cad-safe-bot 2025-03-10 13:03:57 +00:00
parent e25843e0db
commit f0e0b05909
6 changed files with 470 additions and 20 deletions

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-1944",
"sourceIdentifier": "103e4ec9-0a87-450b-af77-479448ddef11",
"published": "2025-03-10T12:15:10.967",
"lastModified": "2025-03-10T12:15:10.967",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP header while keeping the original filename in the directory listing, an attacker can make PickleScan raise a BadZipFile error. However, PyTorch's more forgiving ZIP implementation still allows the model to be loaded, enabling malicious payloads to bypass detection."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "103e4ec9-0a87-450b-af77-479448ddef11",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "103e4ec9-0a87-450b-af77-479448ddef11",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"references": [
{
"url": "https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781",
"source": "103e4ec9-0a87-450b-af77-479448ddef11"
},
{
"url": "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-7q5r-7gvp-wc82",
"source": "103e4ec9-0a87-450b-af77-479448ddef11"
},
{
"url": "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1944",
"source": "103e4ec9-0a87-450b-af77-479448ddef11"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-1945",
"sourceIdentifier": "103e4ec9-0a87-450b-af77-479448ddef11",
"published": "2025-03-10T12:15:12.450",
"lastModified": "2025-03-10T12:15:12.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model archives when certain ZIP file flag bits are modified. By flipping specific bits in the ZIP file headers, an attacker can embed malicious pickle files that remain undetected by PickleScan while still being successfully loaded by PyTorch's torch.load(). This can lead to arbitrary code execution when loading a compromised model."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "103e4ec9-0a87-450b-af77-479448ddef11",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "103e4ec9-0a87-450b-af77-479448ddef11",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"references": [
{
"url": "https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781",
"source": "103e4ec9-0a87-450b-af77-479448ddef11"
},
{
"url": "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-w8jq-xcqf-f792",
"source": "103e4ec9-0a87-450b-af77-479448ddef11"
},
{
"url": "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1945",
"source": "103e4ec9-0a87-450b-af77-479448ddef11"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-2147",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-10T11:15:38.157",
"lastModified": "2025-03-10T11:15:38.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Beijing Zhide Intelligent Internet Technology Modern Farm Digital Integrated Management System 1.0. It has been classified as problematic. Affected is an unknown function. The manipulation leads to files or directories accessible. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Multiple endpoints are affected. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-425"
},
{
"lang": "en",
"value": "CWE-552"
}
]
}
],
"references": [
{
"url": "https://github.com/fubxx/CVE/blob/main/%E7%91%9E%E7%94%B0%E7%8E%B0%E4%BB%A3%E5%86%9C%E5%9C%BA%E6%95%B0%E5%AD%97%E5%8C%96%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299058",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299058",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.506593",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-2148",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-10T12:15:12.617",
"lastModified": "2025-03-10T12:15:12.617",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PyTorch 2.6.0+cu124. It has been declared as critical. Affected by this vulnerability is the function torch.ops.profiler._call_end_callbacks_on_jit_fut of the component Tuple Handler. The manipulation of the argument None leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.3,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"baseScore": 5.1,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://github.com/pytorch/pytorch/issues/147722",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299059",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299059",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.505959",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-10T11:00:19.293852+00:00
2025-03-10T13:00:25.940893+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-10T10:15:14.360000+00:00
2025-03-10T12:15:12.617000+00:00
```
### Last Data Feed Release
@ -33,21 +33,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
284597
284601
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `4`
- [CVE-2024-13918](CVE-2024/CVE-2024-139xx/CVE-2024-13918.json) (`2025-03-10T10:15:10.280`)
- [CVE-2024-13919](CVE-2024/CVE-2024-139xx/CVE-2024-13919.json) (`2025-03-10T10:15:13.890`)
- [CVE-2025-24387](CVE-2025/CVE-2025-243xx/CVE-2025-24387.json) (`2025-03-10T10:15:14.360`)
- [CVE-2025-27253](CVE-2025/CVE-2025-272xx/CVE-2025-27253.json) (`2025-03-10T09:15:10.897`)
- [CVE-2025-27254](CVE-2025/CVE-2025-272xx/CVE-2025-27254.json) (`2025-03-10T09:15:11.167`)
- [CVE-2025-27255](CVE-2025/CVE-2025-272xx/CVE-2025-27255.json) (`2025-03-10T09:15:11.323`)
- [CVE-2025-27256](CVE-2025/CVE-2025-272xx/CVE-2025-27256.json) (`2025-03-10T09:15:11.463`)
- [CVE-2025-27257](CVE-2025/CVE-2025-272xx/CVE-2025-27257.json) (`2025-03-10T09:15:11.613`)
- [CVE-2025-1944](CVE-2025/CVE-2025-19xx/CVE-2025-1944.json) (`2025-03-10T12:15:10.967`)
- [CVE-2025-1945](CVE-2025/CVE-2025-19xx/CVE-2025-1945.json) (`2025-03-10T12:15:12.450`)
- [CVE-2025-2147](CVE-2025/CVE-2025-21xx/CVE-2025-2147.json) (`2025-03-10T11:15:38.157`)
- [CVE-2025-2148](CVE-2025/CVE-2025-21xx/CVE-2025-2148.json) (`2025-03-10T12:15:12.617`)
### CVEs modified in the last Commit

View File

@ -247835,8 +247835,8 @@ CVE-2024-13908,0,0,b02feb571c3f56395c71015215fc0c37a39f6c271a94ae36e8f1cf1686537
CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000
CVE-2024-13910,0,0,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1beea02,2025-03-01T09:15:09.517000
CVE-2024-13911,0,0,4ecdacf9340f565972d67d0fd0f16ebfb137c877e410b587b04d73d76789b018,2025-03-01T08:15:33.803000
CVE-2024-13918,1,1,3dfaff6fdda0e0786f6216d15531770357ea4d2b07bc65bec3033c2d5231e59a,2025-03-10T10:15:10.280000
CVE-2024-13919,1,1,afce570a31c15e812612ed444d61483c64abe83060562bc67f888bf21790f077,2025-03-10T10:15:13.890000
CVE-2024-13918,0,0,3dfaff6fdda0e0786f6216d15531770357ea4d2b07bc65bec3033c2d5231e59a,2025-03-10T10:15:10.280000
CVE-2024-13919,0,0,afce570a31c15e812612ed444d61483c64abe83060562bc67f888bf21790f077,2025-03-10T10:15:13.890000
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
CVE-2024-13924,0,0,623f22e67c236278ca920e96a81e7b261b9ec578974ede6c7601d32ce0e02517,2025-03-08T13:15:12.160000
CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000
@ -281271,6 +281271,8 @@ CVE-2025-1940,0,0,3afeb38944a20fc07b896bfe1f1ad2c69e4bbbb599fa0f218233eafca8c837
CVE-2025-1941,0,0,77bb28988fb79932cc7a6d25527281bccd5e2df757d0288a237c300de86f223d,2025-03-04T16:15:38.457000
CVE-2025-1942,0,0,299e196feae52175634c3230dd9f286f74b073667bc01e303b39d6ba3984f83f,2025-03-05T00:15:37.247000
CVE-2025-1943,0,0,93769e7b2931514f0c8b90f2e9734aa6535ce40ff2146635c764b984a51ce726,2025-03-05T00:15:37.400000
CVE-2025-1944,1,1,903f4da72413c5194d5677d8a8244e7e935bf491669b33b254aba576c030b213,2025-03-10T12:15:10.967000
CVE-2025-1945,1,1,5e70b85bbbac84b9a357af1a3040f754458eaacc96df13971070bbe159c4bb9a,2025-03-10T12:15:12.450000
CVE-2025-1946,0,0,0de17715782358449ec68a782d98dcc69ef152eac8394041a60b56a2fa8f0187,2025-03-04T19:15:37.583000
CVE-2025-1947,0,0,73c8778878afaeb22edb06443b6c16c3391f0a9c85f0e77f77cc3c8b1b4eedf7,2025-03-04T19:15:37.760000
CVE-2025-1949,0,0,c8d2667ece9c458e6c08d32deed78599dc8198a4c183e23797d5a5fbed3c959f,2025-03-04T20:15:37.410000
@ -281781,6 +281783,8 @@ CVE-2025-21418,0,0,286c461de95fba525ffd95fe19188a97b0613df56bf1afe14ca9be4aa494d
CVE-2025-21419,0,0,acdb4d37a32faa1cb0f65f0fbb7358475e2deb811438263e59eb8f6bcbeca8e1,2025-02-14T17:32:53.087000
CVE-2025-21420,0,0,32a7e46f27d290c0e9a5b92e079c0424752a30e3cfa9e5d424062d7af6a66d41,2025-02-14T17:36:09.683000
CVE-2025-21424,0,0,8c4f3ff08fcd2bbfe99cfa90d5ebadccaf543f677e49ea14cef06557001215f9,2025-03-03T11:15:15.810000
CVE-2025-2147,1,1,ddb9ff2fab6cd02e2e5f72966eefcef9573206f3b8726de0ad1c2dc97e3bf31b,2025-03-10T11:15:38.157000
CVE-2025-2148,1,1,83b03dc78e7cb4bb6ac42db29c01bc2b2e901308e2b013d5a812b1f75118b93b,2025-03-10T12:15:12.617000
CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000
CVE-2025-21490,0,0,7a3c0e9682e0e86e8a6979b8cc982eeb2dbfde70e212f3862711014520efbfca,2025-03-01T13:15:12.020000
CVE-2025-21491,0,0,6076cb457888ed12bac407cf717ae74e21970b3745c710f624ec3aea8e6322c5,2025-01-23T20:15:32.030000
@ -283376,7 +283380,7 @@ CVE-2025-24372,0,0,d67365bd89db4c3751e20f68485685bbddaa30222f766a46b2792537e2dc9
CVE-2025-24373,0,0,828a96e86ff08b742aa150355f229fc88d281347208da05d776aed19719723da,2025-02-19T15:45:13.197000
CVE-2025-24374,0,0,9d28476f7b9e0a721c68d8f61a3e330d2e4b6e221dde61867e43ef2d95c1b3bb,2025-01-29T16:15:44.090000
CVE-2025-24376,0,0,7e46d4cd45c80d06e2794dedbb8a5a694e79dc599f98b5860f6d746c41079abd,2025-01-30T16:15:31.630000
CVE-2025-24387,1,1,0d8f51db755296de9621bc69095c7ce1b437a0d2c45d7d8d6e5b857d0efa895d,2025-03-10T10:15:14.360000
CVE-2025-24387,0,0,0d8f51db755296de9621bc69095c7ce1b437a0d2c45d7d8d6e5b857d0efa895d,2025-03-10T10:15:14.360000
CVE-2025-24389,0,0,1f2059cf3f125eed1b0425e33b29a7475638e7301a1298ff7d6746702fae8f56,2025-01-27T06:15:24.170000
CVE-2025-24390,0,0,53fee9e5767117124ab0c247372dae1e808caf6f2871cdd5b9d8bb2222404390,2025-01-27T06:15:24.313000
CVE-2025-24397,0,0,9ba22bfb54e58957b01d845dc69a58567b508933ed35160174e59b93ecc06487,2025-01-23T17:15:27.643000
@ -284413,11 +284417,11 @@ CVE-2025-27218,0,0,a1f84aab7c20671025069586dc6eda2e424af576b61d56df1ec2458e5aa40
CVE-2025-27219,0,0,26edee725f061a3765542776ac788c3175c25b1ef75e4fb56599c36f84b19b30,2025-03-05T14:05:15.387000
CVE-2025-27220,0,0,a02d37616d39b53901b34b45fe17d833959193f3655f17498861fe751a8ed44e,2025-03-05T14:05:49.230000
CVE-2025-27221,0,0,a77e2ee5b7be7126d70eb1fc9ecc3c0c9965218d6caa5649ef94dfa24ec52f83,2025-03-05T14:05:49.230000
CVE-2025-27253,1,1,d857181311c2c4351c632eb4fe3042b9a49bbdca5c6dd8d30fd441bec38c7310,2025-03-10T09:15:10.897000
CVE-2025-27254,1,1,56a96909ec4992eb3b77fe31ee123372e157ee1e69557e2aa63c36dad9c12684,2025-03-10T09:15:11.167000
CVE-2025-27255,1,1,444f4d89f14f2f97a40e77ef95e8249c86f229cd00bb769214963f32b39ac1e8,2025-03-10T09:15:11.323000
CVE-2025-27256,1,1,1eca2745bfa66cd8c552bcf63c53a1a8f33962b2980662b9414ed1bc0a4c3946,2025-03-10T09:15:11.463000
CVE-2025-27257,1,1,fcbf9edf37885c6d03f99b4a7b2289c36e1e9836a62de8cb571be2965f1e70bc,2025-03-10T09:15:11.613000
CVE-2025-27253,0,0,d857181311c2c4351c632eb4fe3042b9a49bbdca5c6dd8d30fd441bec38c7310,2025-03-10T09:15:10.897000
CVE-2025-27254,0,0,56a96909ec4992eb3b77fe31ee123372e157ee1e69557e2aa63c36dad9c12684,2025-03-10T09:15:11.167000
CVE-2025-27255,0,0,444f4d89f14f2f97a40e77ef95e8249c86f229cd00bb769214963f32b39ac1e8,2025-03-10T09:15:11.323000
CVE-2025-27256,0,0,1eca2745bfa66cd8c552bcf63c53a1a8f33962b2980662b9414ed1bc0a4c3946,2025-03-10T09:15:11.463000
CVE-2025-27257,0,0,fcbf9edf37885c6d03f99b4a7b2289c36e1e9836a62de8cb571be2965f1e70bc,2025-03-10T09:15:11.613000
CVE-2025-27263,0,0,0d6473ce6be397da70ae29bc260e636ca3c6169d6fa59d6f77401b8f5578c5c3,2025-03-03T14:15:57.980000
CVE-2025-27264,0,0,57766bee671a71e603c6190f5ecce6b6ab03f589b571849a06d4f3626124f857,2025-03-03T14:15:58.123000
CVE-2025-27265,0,0,064ce13be3b2caa339c06df0a9bbd275da3bf393870e4191cf15429558044c93,2025-02-24T15:15:14.310000

Can't render this file because it is too large.