diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1944.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1944.json new file mode 100644 index 00000000000..2dae7aaddee --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1944.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-1944", + "sourceIdentifier": "103e4ec9-0a87-450b-af77-479448ddef11", + "published": "2025-03-10T12:15:10.967", + "lastModified": "2025-03-10T12:15:10.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP header while keeping the original filename in the directory listing, an attacker can make PickleScan raise a BadZipFile error. However, PyTorch's more forgiving ZIP implementation still allows the model to be loaded, enabling malicious payloads to bypass detection." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "103e4ec9-0a87-450b-af77-479448ddef11", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "103e4ec9-0a87-450b-af77-479448ddef11", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781", + "source": "103e4ec9-0a87-450b-af77-479448ddef11" + }, + { + "url": "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-7q5r-7gvp-wc82", + "source": "103e4ec9-0a87-450b-af77-479448ddef11" + }, + { + "url": "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1944", + "source": "103e4ec9-0a87-450b-af77-479448ddef11" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1945.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1945.json new file mode 100644 index 00000000000..285d6952134 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1945.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-1945", + "sourceIdentifier": "103e4ec9-0a87-450b-af77-479448ddef11", + "published": "2025-03-10T12:15:12.450", + "lastModified": "2025-03-10T12:15:12.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model archives when certain ZIP file flag bits are modified. By flipping specific bits in the ZIP file headers, an attacker can embed malicious pickle files that remain undetected by PickleScan while still being successfully loaded by PyTorch's torch.load(). This can lead to arbitrary code execution when loading a compromised model." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "103e4ec9-0a87-450b-af77-479448ddef11", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "103e4ec9-0a87-450b-af77-479448ddef11", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781", + "source": "103e4ec9-0a87-450b-af77-479448ddef11" + }, + { + "url": "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-w8jq-xcqf-f792", + "source": "103e4ec9-0a87-450b-af77-479448ddef11" + }, + { + "url": "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1945", + "source": "103e4ec9-0a87-450b-af77-479448ddef11" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2147.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2147.json new file mode 100644 index 00000000000..22ae5397a31 --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2147.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2147", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-10T11:15:38.157", + "lastModified": "2025-03-10T11:15:38.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Beijing Zhide Intelligent Internet Technology Modern Farm Digital Integrated Management System 1.0. It has been classified as problematic. Affected is an unknown function. The manipulation leads to files or directories accessible. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Multiple endpoints are affected. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-425" + }, + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/fubxx/CVE/blob/main/%E7%91%9E%E7%94%B0%E7%8E%B0%E4%BB%A3%E5%86%9C%E5%9C%BA%E6%95%B0%E5%AD%97%E5%8C%96%E7%BB%BC%E5%90%88%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299058", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299058", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.506593", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2148.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2148.json new file mode 100644 index 00000000000..0d4c6a85691 --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2148.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-2148", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-10T12:15:12.617", + "lastModified": "2025-03-10T12:15:12.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PyTorch 2.6.0+cu124. It has been declared as critical. Affected by this vulnerability is the function torch.ops.profiler._call_end_callbacks_on_jit_fut of the component Tuple Handler. The manipulation of the argument None leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 5.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, + "accessVector": "NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 4.9, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pytorch/pytorch/issues/147722", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299059", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299059", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.505959", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index a3cfae5741c..f8feabfb187 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-10T11:00:19.293852+00:00 +2025-03-10T13:00:25.940893+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-10T10:15:14.360000+00:00 +2025-03-10T12:15:12.617000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284597 +284601 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `4` -- [CVE-2024-13918](CVE-2024/CVE-2024-139xx/CVE-2024-13918.json) (`2025-03-10T10:15:10.280`) -- [CVE-2024-13919](CVE-2024/CVE-2024-139xx/CVE-2024-13919.json) (`2025-03-10T10:15:13.890`) -- [CVE-2025-24387](CVE-2025/CVE-2025-243xx/CVE-2025-24387.json) (`2025-03-10T10:15:14.360`) -- [CVE-2025-27253](CVE-2025/CVE-2025-272xx/CVE-2025-27253.json) (`2025-03-10T09:15:10.897`) -- [CVE-2025-27254](CVE-2025/CVE-2025-272xx/CVE-2025-27254.json) (`2025-03-10T09:15:11.167`) -- [CVE-2025-27255](CVE-2025/CVE-2025-272xx/CVE-2025-27255.json) (`2025-03-10T09:15:11.323`) -- [CVE-2025-27256](CVE-2025/CVE-2025-272xx/CVE-2025-27256.json) (`2025-03-10T09:15:11.463`) -- [CVE-2025-27257](CVE-2025/CVE-2025-272xx/CVE-2025-27257.json) (`2025-03-10T09:15:11.613`) +- [CVE-2025-1944](CVE-2025/CVE-2025-19xx/CVE-2025-1944.json) (`2025-03-10T12:15:10.967`) +- [CVE-2025-1945](CVE-2025/CVE-2025-19xx/CVE-2025-1945.json) (`2025-03-10T12:15:12.450`) +- [CVE-2025-2147](CVE-2025/CVE-2025-21xx/CVE-2025-2147.json) (`2025-03-10T11:15:38.157`) +- [CVE-2025-2148](CVE-2025/CVE-2025-21xx/CVE-2025-2148.json) (`2025-03-10T12:15:12.617`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 00a37ca148c..f9e8fcbdc3e 100644 --- a/_state.csv +++ b/_state.csv @@ -247835,8 +247835,8 @@ CVE-2024-13908,0,0,b02feb571c3f56395c71015215fc0c37a39f6c271a94ae36e8f1cf1686537 CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000 CVE-2024-13910,0,0,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1beea02,2025-03-01T09:15:09.517000 CVE-2024-13911,0,0,4ecdacf9340f565972d67d0fd0f16ebfb137c877e410b587b04d73d76789b018,2025-03-01T08:15:33.803000 -CVE-2024-13918,1,1,3dfaff6fdda0e0786f6216d15531770357ea4d2b07bc65bec3033c2d5231e59a,2025-03-10T10:15:10.280000 -CVE-2024-13919,1,1,afce570a31c15e812612ed444d61483c64abe83060562bc67f888bf21790f077,2025-03-10T10:15:13.890000 +CVE-2024-13918,0,0,3dfaff6fdda0e0786f6216d15531770357ea4d2b07bc65bec3033c2d5231e59a,2025-03-10T10:15:10.280000 +CVE-2024-13919,0,0,afce570a31c15e812612ed444d61483c64abe83060562bc67f888bf21790f077,2025-03-10T10:15:13.890000 CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000 CVE-2024-13924,0,0,623f22e67c236278ca920e96a81e7b261b9ec578974ede6c7601d32ce0e02517,2025-03-08T13:15:12.160000 CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000 @@ -281271,6 +281271,8 @@ CVE-2025-1940,0,0,3afeb38944a20fc07b896bfe1f1ad2c69e4bbbb599fa0f218233eafca8c837 CVE-2025-1941,0,0,77bb28988fb79932cc7a6d25527281bccd5e2df757d0288a237c300de86f223d,2025-03-04T16:15:38.457000 CVE-2025-1942,0,0,299e196feae52175634c3230dd9f286f74b073667bc01e303b39d6ba3984f83f,2025-03-05T00:15:37.247000 CVE-2025-1943,0,0,93769e7b2931514f0c8b90f2e9734aa6535ce40ff2146635c764b984a51ce726,2025-03-05T00:15:37.400000 +CVE-2025-1944,1,1,903f4da72413c5194d5677d8a8244e7e935bf491669b33b254aba576c030b213,2025-03-10T12:15:10.967000 +CVE-2025-1945,1,1,5e70b85bbbac84b9a357af1a3040f754458eaacc96df13971070bbe159c4bb9a,2025-03-10T12:15:12.450000 CVE-2025-1946,0,0,0de17715782358449ec68a782d98dcc69ef152eac8394041a60b56a2fa8f0187,2025-03-04T19:15:37.583000 CVE-2025-1947,0,0,73c8778878afaeb22edb06443b6c16c3391f0a9c85f0e77f77cc3c8b1b4eedf7,2025-03-04T19:15:37.760000 CVE-2025-1949,0,0,c8d2667ece9c458e6c08d32deed78599dc8198a4c183e23797d5a5fbed3c959f,2025-03-04T20:15:37.410000 @@ -281781,6 +281783,8 @@ CVE-2025-21418,0,0,286c461de95fba525ffd95fe19188a97b0613df56bf1afe14ca9be4aa494d CVE-2025-21419,0,0,acdb4d37a32faa1cb0f65f0fbb7358475e2deb811438263e59eb8f6bcbeca8e1,2025-02-14T17:32:53.087000 CVE-2025-21420,0,0,32a7e46f27d290c0e9a5b92e079c0424752a30e3cfa9e5d424062d7af6a66d41,2025-02-14T17:36:09.683000 CVE-2025-21424,0,0,8c4f3ff08fcd2bbfe99cfa90d5ebadccaf543f677e49ea14cef06557001215f9,2025-03-03T11:15:15.810000 +CVE-2025-2147,1,1,ddb9ff2fab6cd02e2e5f72966eefcef9573206f3b8726de0ad1c2dc97e3bf31b,2025-03-10T11:15:38.157000 +CVE-2025-2148,1,1,83b03dc78e7cb4bb6ac42db29c01bc2b2e901308e2b013d5a812b1f75118b93b,2025-03-10T12:15:12.617000 CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000 CVE-2025-21490,0,0,7a3c0e9682e0e86e8a6979b8cc982eeb2dbfde70e212f3862711014520efbfca,2025-03-01T13:15:12.020000 CVE-2025-21491,0,0,6076cb457888ed12bac407cf717ae74e21970b3745c710f624ec3aea8e6322c5,2025-01-23T20:15:32.030000 @@ -283376,7 +283380,7 @@ CVE-2025-24372,0,0,d67365bd89db4c3751e20f68485685bbddaa30222f766a46b2792537e2dc9 CVE-2025-24373,0,0,828a96e86ff08b742aa150355f229fc88d281347208da05d776aed19719723da,2025-02-19T15:45:13.197000 CVE-2025-24374,0,0,9d28476f7b9e0a721c68d8f61a3e330d2e4b6e221dde61867e43ef2d95c1b3bb,2025-01-29T16:15:44.090000 CVE-2025-24376,0,0,7e46d4cd45c80d06e2794dedbb8a5a694e79dc599f98b5860f6d746c41079abd,2025-01-30T16:15:31.630000 -CVE-2025-24387,1,1,0d8f51db755296de9621bc69095c7ce1b437a0d2c45d7d8d6e5b857d0efa895d,2025-03-10T10:15:14.360000 +CVE-2025-24387,0,0,0d8f51db755296de9621bc69095c7ce1b437a0d2c45d7d8d6e5b857d0efa895d,2025-03-10T10:15:14.360000 CVE-2025-24389,0,0,1f2059cf3f125eed1b0425e33b29a7475638e7301a1298ff7d6746702fae8f56,2025-01-27T06:15:24.170000 CVE-2025-24390,0,0,53fee9e5767117124ab0c247372dae1e808caf6f2871cdd5b9d8bb2222404390,2025-01-27T06:15:24.313000 CVE-2025-24397,0,0,9ba22bfb54e58957b01d845dc69a58567b508933ed35160174e59b93ecc06487,2025-01-23T17:15:27.643000 @@ -284413,11 +284417,11 @@ CVE-2025-27218,0,0,a1f84aab7c20671025069586dc6eda2e424af576b61d56df1ec2458e5aa40 CVE-2025-27219,0,0,26edee725f061a3765542776ac788c3175c25b1ef75e4fb56599c36f84b19b30,2025-03-05T14:05:15.387000 CVE-2025-27220,0,0,a02d37616d39b53901b34b45fe17d833959193f3655f17498861fe751a8ed44e,2025-03-05T14:05:49.230000 CVE-2025-27221,0,0,a77e2ee5b7be7126d70eb1fc9ecc3c0c9965218d6caa5649ef94dfa24ec52f83,2025-03-05T14:05:49.230000 -CVE-2025-27253,1,1,d857181311c2c4351c632eb4fe3042b9a49bbdca5c6dd8d30fd441bec38c7310,2025-03-10T09:15:10.897000 -CVE-2025-27254,1,1,56a96909ec4992eb3b77fe31ee123372e157ee1e69557e2aa63c36dad9c12684,2025-03-10T09:15:11.167000 -CVE-2025-27255,1,1,444f4d89f14f2f97a40e77ef95e8249c86f229cd00bb769214963f32b39ac1e8,2025-03-10T09:15:11.323000 -CVE-2025-27256,1,1,1eca2745bfa66cd8c552bcf63c53a1a8f33962b2980662b9414ed1bc0a4c3946,2025-03-10T09:15:11.463000 -CVE-2025-27257,1,1,fcbf9edf37885c6d03f99b4a7b2289c36e1e9836a62de8cb571be2965f1e70bc,2025-03-10T09:15:11.613000 +CVE-2025-27253,0,0,d857181311c2c4351c632eb4fe3042b9a49bbdca5c6dd8d30fd441bec38c7310,2025-03-10T09:15:10.897000 +CVE-2025-27254,0,0,56a96909ec4992eb3b77fe31ee123372e157ee1e69557e2aa63c36dad9c12684,2025-03-10T09:15:11.167000 +CVE-2025-27255,0,0,444f4d89f14f2f97a40e77ef95e8249c86f229cd00bb769214963f32b39ac1e8,2025-03-10T09:15:11.323000 +CVE-2025-27256,0,0,1eca2745bfa66cd8c552bcf63c53a1a8f33962b2980662b9414ed1bc0a4c3946,2025-03-10T09:15:11.463000 +CVE-2025-27257,0,0,fcbf9edf37885c6d03f99b4a7b2289c36e1e9836a62de8cb571be2965f1e70bc,2025-03-10T09:15:11.613000 CVE-2025-27263,0,0,0d6473ce6be397da70ae29bc260e636ca3c6169d6fa59d6f77401b8f5578c5c3,2025-03-03T14:15:57.980000 CVE-2025-27264,0,0,57766bee671a71e603c6190f5ecce6b6ab03f589b571849a06d4f3626124f857,2025-03-03T14:15:58.123000 CVE-2025-27265,0,0,064ce13be3b2caa339c06df0a9bbd275da3bf393870e4191cf15429558044c93,2025-02-24T15:15:14.310000