Auto-Update: 2024-12-09T19:00:25.040126+00:00

This commit is contained in:
cad-safe-bot 2024-12-09 19:03:47 +00:00
parent 1e00b64268
commit 0048e6b503
69 changed files with 5332 additions and 628 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47002",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:38.257",
"lastModified": "2024-11-21T06:35:09.923",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:25:24.200",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,130 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: SUNRPC: corrige la desreferencia del puntero nulo en svc_rqst_free() Cuando alloc_pages_node() devuelve nulo en svc_rqst_alloc(), el puntero nulo rq_scratch_page ser\u00e1 desreferenciado al llamar a put_page() en svc_rqst_free(). Solucionarlo agregando una marca nula. Direcciones-Cobertura: (\"Desreferencia despu\u00e9s de verificaci\u00f3n nula\")"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.221",
"matchCriteriaId": "C6FAA8A5-3F50-4B9F-9EEA-8430F59C03AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.22",
"matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.5",
"matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1e10f58f1c9a6b667b045513c7a4e6111c24fe7c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3de81c1e84bf84803308da3272a829a7655c5336",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b9f83ffaa0c096b4c832a43964fe6bff3acffe10",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c664aaec9aee544538a78ba4893a44bc73a6d742",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1e10f58f1c9a6b667b045513c7a4e6111c24fe7c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3de81c1e84bf84803308da3272a829a7655c5336",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b9f83ffaa0c096b4c832a43964fe6bff3acffe10",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c664aaec9aee544538a78ba4893a44bc73a6d742",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47003",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:38.303",
"lastModified": "2024-11-21T06:35:10.037",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:25:35.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,131 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: dmaengine: idxd: corrige una posible desreferencia nula en el estado del puntero. Hay llamadas a idxd_cmd_exec que pasan un puntero de estado nulo, sin embargo, una confirmaci\u00f3n reciente agreg\u00f3 una asignaci\u00f3n a *status que puede terminar con una desreferencia de puntero nulo. La funci\u00f3n espera un puntero de estado nulo a veces, ya que hay una asignaci\u00f3n posterior a *status donde el estado se verifica por primera vez como nulo. Solucione el problema verificando el estado nulo antes de realizar la asignaci\u00f3n. Direcciones-Cobertura: (\"Nulo expl\u00edcito desreferenciado\")"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.17",
"versionEndExcluding": "5.10.38",
"matchCriteriaId": "3DFCD3AA-21F1-4769-A239-44265F98679F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.22",
"matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.5",
"matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/28ac8e03c43dfc6a703aa420d18222540b801120",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5756f757c72501ef1a16f5f63f940623044180e9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/28ac8e03c43dfc6a703aa420d18222540b801120",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5756f757c72501ef1a16f5f63f940623044180e9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47005",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:38.403",
"lastModified": "2024-11-21T06:35:10.260",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:23:57.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,131 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: PCI: endpoint: corrigi\u00f3 la desreferencia del puntero NULL para ->get_features() las operaciones get_features de pci_epc_ops pueden devolver NULL, lo que provoca la desreferencia del puntero NULL en la funci\u00f3n pci_epf_test_alloc_space. Agreguemos una verificaci\u00f3n del puntero pci_epc_feature en pci_epf_test_bind antes de acceder a \u00e9l para evitar dicha desreferencia del puntero NULL y devolvamos -ENOTSUPP en caso de que no se encuentre pci_epc_feature. Cuando no se aplica el parche y las funciones de EPC no se implementan en el controlador de la plataforma, vemos el siguiente volcado debido a la desreferencia del puntero NULL del kernel. Rastreo de llamadas: pci_epf_test_bind+0xf4/0x388 pci_epf_bind+0x3c/0x80 pci_epc_epf_link+0xa8/0xcc configfs_symlink+0x1a4/0x48c vfs_symlink+0x104/0x184 do_symlinkat+0x80/0xd4 __arm64_sys _symlinkat+0x1c/0x24 el0_svc_common.constprop.3+0xb8/0x170 el0_svc_handler+0x70 /0x88 el0_svc+0x8/0x640 C\u00f3digo: d2800581 b9403ab9 f9404ebb 8b394f60 (f9400400) ---[ final de seguimiento a438e3c5a24f9df0 ]---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1",
"versionEndExcluding": "5.10.38",
"matchCriteriaId": "CAB60547-0A86-466F-A613-4A88E230862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.22",
"matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.5",
"matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0169d4f0bee44fdfef908c13ed21fcb326c38695",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6613bc2301ba291a1c5a90e1dc24cf3edf223c03",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/679ebad058b8168f10e63876d63b0877fd2fe784",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bbed83d7060e07a5d309104d25a00f0a24441428",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0169d4f0bee44fdfef908c13ed21fcb326c38695",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6613bc2301ba291a1c5a90e1dc24cf3edf223c03",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/679ebad058b8168f10e63876d63b0877fd2fe784",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bbed83d7060e07a5d309104d25a00f0a24441428",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47008",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:38.560",
"lastModified": "2024-11-21T06:35:10.763",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:24:06.900",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,110 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: SVM: aseg\u00farese de que GHCB est\u00e9 mapeado antes de actualizar. El acceso al GHCB se encuentra principalmente en la ruta VMGEXIT y se sabe que el GHCB ser\u00e1 mapeado. Pero hay dos caminos en los que es posible que el GHCB no est\u00e9 mapeado. La rutina sev_vcpu_deliver_sipi_vector() actualizar\u00e1 el GHCB para informar a la persona que llama del evento AP Reset Hold NAE que se ha entregado un SIPI. Sin embargo, si se realiza una SIPI sin una retenci\u00f3n de reinicio de AP correspondiente, es posible que el GHCB no se asigne (dependiendo del VMEXIT anterior), lo que resultar\u00e1 en una desreferencia del puntero NULL. La rutina svm_complete_emulated_msr() actualizar\u00e1 el GHCB para informar a la persona que llama de una operaci\u00f3n RDMSR/WRMSR sobre cualquier error. Si bien es probable que el GHCB se asigne en esta situaci\u00f3n, agregue una protecci\u00f3n en esta ruta para asegurarse de que no se encuentre una desreferencia de puntero NULL."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.22",
"matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.5",
"matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/a3ba26ecfb569f4aa3f867e80c02aa65f20aadad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fb9e14f4f8217a0980f8da2c8ff70dee058cbe47",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fd722a57fe0b80133dacae4e1c852ee4212f9b2e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a3ba26ecfb569f4aa3f867e80c02aa65f20aadad",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fb9e14f4f8217a0980f8da2c8ff70dee058cbe47",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fd722a57fe0b80133dacae4e1c852ee4212f9b2e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47009",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:38.610",
"lastModified": "2024-11-21T06:35:10.867",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:24:16.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,136 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: LLAVES: confiable: corrige la p\u00e9rdida de memoria en el objeto td. Dos rutas de retorno de error no liberan el objeto asignado td, lo que provoca una p\u00e9rdida de memoria. Solucione este problema regresando a trav\u00e9s de la ruta de retorno de error que segura el td. Corrige la advertencia de clang scan-build: seguridad/claves/trusted-keys/trusted_tpm1.c:496:10: advertencia: Posible p\u00e9rdida de memoria [unix.Malloc]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.20",
"versionEndExcluding": "5.10.38",
"matchCriteriaId": "F680366A-DA31-428F-A674-7B537D57FB09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.3",
"versionEndExcluding": "5.11.22",
"matchCriteriaId": "C73DB134-2F95-4413-88CE-82009EAAC844"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.5",
"matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "07875739-0CCB-4F48-9330-3D4B6A4064FA"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1c4031014106aff48e1e686e40101c31eab5d44c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/31c9a4b24d86cbb36ff0d7a085725a3b4f0138c8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3e24fbd37e72e8a67b74991970fecc82d14f57af",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/83a775d5f9bfda95b1c295f95a3a041a40c7f321",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1c4031014106aff48e1e686e40101c31eab5d44c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/31c9a4b24d86cbb36ff0d7a085725a3b4f0138c8",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3e24fbd37e72e8a67b74991970fecc82d14f57af",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/83a775d5f9bfda95b1c295f95a3a041a40c7f321",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47012",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:38.753",
"lastModified": "2024-11-21T06:35:11.323",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:24:59.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,47 +15,152 @@
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: RDMA/siw: Corrige un use after free en siw_alloc_mr Nuestro analizador de c\u00f3digo inform\u00f3 un UAF. En siw_alloc_mr(), llama a siw_mr_add_mem(mr,..). En la implementaci\u00f3n de siw_mr_add_mem(), mem se asigna a mr->mem y luego mem se libera mediante kfree(mem) si xa_alloc_ciclic() falla. Aqu\u00ed, mr->mem todav\u00eda apunta a un objeto liberado. Despu\u00e9s, la ejecuci\u00f3n contin\u00faa hasta la rama err_out de siw_alloc_mr, y el mr->mem liberado se usa en siw_mr_drop_mem(mr). Mi parche mueve \"mr->mem = mem\" detr\u00e1s de la secci\u00f3n if (xa_alloc_ciclic(..)<0) {}, para evitar el uaf."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.3",
"versionEndExcluding": "5.4.119",
"matchCriteriaId": "2196F00F-D829-48E9-87B7-31759423D345"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.37",
"matchCriteriaId": "7A4CF5D6-ACBA-4980-ABFD-3D7A53B5BB4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.21",
"matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.4",
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3093ee182f01689b89e9f8797b321603e5de4f63",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/30b9e92d0b5e5d5dc1101ab856c17009537cbca4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3e22b88e02c194f6c80867abfef5cc09383461f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/608a4b90ece039940e9425ee2b39c8beff27e00c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ad9ce7188432650469a6c7625bf479f5ed0b6155",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3093ee182f01689b89e9f8797b321603e5de4f63",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/30b9e92d0b5e5d5dc1101ab856c17009537cbca4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3e22b88e02c194f6c80867abfef5cc09383461f4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/608a4b90ece039940e9425ee2b39c8beff27e00c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ad9ce7188432650469a6c7625bf479f5ed0b6155",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47013",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:38.800",
"lastModified": "2024-11-21T06:35:11.433",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T17:59:07.173",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,71 +15,215 @@
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: net:emac/emac-mac: Se corrige un uso after free en emac_mac_tx_buf_send En emac_mac_tx_buf_send, llama a emac_tx_fill_tpd(..,skb,..). Si ocurre alg\u00fan error en emac_tx_fill_tpd(), el skb se liberar\u00e1 mediante dev_kfree_skb(skb) en la rama de error de emac_tx_fill_tpd(). Pero el skb liberado todav\u00eda se usa a trav\u00e9s de skb->len por netdev_sent_queue(,skb->len). Como observ\u00e9 que emac_tx_fill_tpd() no ha modificado el valor de skb->len, por lo tanto mi parche asigna skb->len a 'len' antes del posible free y usa 'len' en lugar de skb->len m\u00e1s tarde."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.9",
"versionEndExcluding": "4.9.269",
"matchCriteriaId": "5330E43C-47EE-40CA-B1A9-C1AAC143732E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.233",
"matchCriteriaId": "4836AF17-022D-49D0-9A8A-AF66FE8DCEB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.191",
"matchCriteriaId": "5B6E6817-19A8-4C0A-8807-71DA48CF9191"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.119",
"matchCriteriaId": "E07BA880-1043-4674-AC45-266B3B4A44C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.37",
"matchCriteriaId": "7A4CF5D6-ACBA-4980-ABFD-3D7A53B5BB4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.21",
"matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.4",
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47017",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:38.960",
"lastModified": "2024-11-21T06:35:11.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T17:59:26.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,131 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ath10k: corrige un use after free en ath10k_htc_send_bundle En ath10k_htc_send_bundle, el paquete_skb podr\u00eda ser liberado por dev_kfree_skb_any(bundle_skb). Pero el paquete_skb lo utiliza m\u00e1s tarde el paquete_skb->len. Como skb_len = bundle_skb->len, mi parche reemplaza bundle_skb->len por skb_len despu\u00e9s de que se liber\u00f3 el paquete_skb."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8",
"versionEndExcluding": "5.10.37",
"matchCriteriaId": "CD2F1C00-3D81-452B-AE61-0B2C1A536A1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.21",
"matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.4",
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3b1ac40c6012140828caa79e592a438a18ebf71b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5e413c0831ff4700d1739db3fa3ae9f859744676",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8392df5d7e0b6a7d21440da1fc259f9938f4dec3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8bb054fb336f4250002fff4e0b075221c05c3c65",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3b1ac40c6012140828caa79e592a438a18ebf71b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5e413c0831ff4700d1739db3fa3ae9f859744676",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8392df5d7e0b6a7d21440da1fc259f9938f4dec3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8bb054fb336f4250002fff4e0b075221c05c3c65",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47021",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:39.100",
"lastModified": "2024-11-21T06:35:12.360",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T17:59:41.990",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,110 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mt76: mt7915: corrige memleak cuando mt7915_unregister_device() mt7915_tx_token_put() deber\u00eda recibir una llamada antes que mt76_free_pending_txwi()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.4",
"versionEndExcluding": "5.11.21",
"matchCriteriaId": "C39F6A5C-514F-4A49-B46B-CF669936DBB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.4",
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/81483309ce861a9fa7835322787f68a443fea364",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d754c80ae82a662e692a82faad71b8c218cb7f52",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e9d32af478cfc3744a45245c0b126738af4b3ac4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/81483309ce861a9fa7835322787f68a443fea364",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d754c80ae82a662e692a82faad71b8c218cb7f52",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e9d32af478cfc3744a45245c0b126738af4b3ac4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47022",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:39.147",
"lastModified": "2024-11-21T06:35:12.470",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:09:01.507",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,131 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mt76: mt7615: corrige memleak cuando mt7615_unregister_device() mt7615_tx_token_put() deber\u00eda recibir una llamada antes que mt76_free_pending_txwi()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.21",
"versionEndExcluding": "5.10.37",
"matchCriteriaId": "256A490E-1C87-4077-B880-36BC3FAB07AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.4",
"versionEndExcluding": "5.11.21",
"matchCriteriaId": "C39F6A5C-514F-4A49-B46B-CF669936DBB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.4",
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/107bcbb219ac84d885ac63b25246f8d33212bc47",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4fa28c807da54c1d720b3cc12e48eb9bea1e2c8f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6c5b2b0c6e5a6ce2d8f9f85b8b72bfad60eaa506",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8ab31da7b89f71c4c2defcca989fab7b42f87d71",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/107bcbb219ac84d885ac63b25246f8d33212bc47",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4fa28c807da54c1d720b3cc12e48eb9bea1e2c8f",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6c5b2b0c6e5a6ce2d8f9f85b8b72bfad60eaa506",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8ab31da7b89f71c4c2defcca989fab7b42f87d71",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47051",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:40.517",
"lastModified": "2024-11-21T06:35:16.103",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:46:41.483",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,47 +15,152 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: spi: fsl-lpspi: corrige la fuga de referencia de PM en lpspi_prepare_xfer_hardware() pm_runtime_get_sync incrementar\u00e1 el contador de uso de PM incluso si falla. Olvidarse de poner en funcionamiento resultar\u00e1 en una fuga de referencia aqu\u00ed. Solucionelo reemplaz\u00e1ndolo con pm_runtime_resume_and_get para mantener el contador de uso equilibrado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.2",
"versionEndExcluding": "5.4.119",
"matchCriteriaId": "459F61B2-E7E5-43BE-8A31-15469C31F827"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.37",
"matchCriteriaId": "7A4CF5D6-ACBA-4980-ABFD-3D7A53B5BB4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.21",
"matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.4",
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4a01ad002d2e03c399af536562693752af7c81b1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6a2b5cee0d31ab6cc51030c441135b0e31217282",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a03675497970a93fcf25d81d9d92a59c2d7377a7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b8207bfc539cd07d15e753ff2d179c5b61c673b1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ce02e58ddf8658a4c3bed2296f32a5873b3f7cce",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4a01ad002d2e03c399af536562693752af7c81b1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6a2b5cee0d31ab6cc51030c441135b0e31217282",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a03675497970a93fcf25d81d9d92a59c2d7377a7",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b8207bfc539cd07d15e753ff2d179c5b61c673b1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ce02e58ddf8658a4c3bed2296f32a5873b3f7cce",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47052",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:40.567",
"lastModified": "2024-11-21T06:35:16.213",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:46:53.900",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,131 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: crypto: sa2ul - Reparar la p\u00e9rdida de memoria de rxd Hay dos rutas de retorno de error que no liberan rxd y causan p\u00e9rdidas de memoria. Arregla esto. Direcciones-Cobertura: (\"Fuga de recursos\")"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.10.37",
"matchCriteriaId": "4E433B72-3E3A-435E-9A66-80D28868BDF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.21",
"matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.4",
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0e596b3734649041ed77edc86a23c0442bbe062b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/854b7737199848a91f6adfa0a03cf6f0c46c86e8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b7bd0657c2036add71981d88a7fae50188150b6e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dfd6443bf49ac17adf882ca46c40c506a0284bd6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0e596b3734649041ed77edc86a23c0442bbe062b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/854b7737199848a91f6adfa0a03cf6f0c46c86e8",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b7bd0657c2036add71981d88a7fae50188150b6e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dfd6443bf49ac17adf882ca46c40c506a0284bd6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47053",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:40.607",
"lastModified": "2024-11-21T06:35:16.327",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:47:08.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,131 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: crypto: sun8i-ss - Reparar p\u00e9rdida de memoria del pad Parece que hay varias rutas de retorno de fallas que no parecen liberar el pad. Arregla esto. Direcciones-Cobertura: (\"Fuga de recursos\")"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.10.37",
"matchCriteriaId": "4E433B72-3E3A-435E-9A66-80D28868BDF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.21",
"matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.4",
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2c67a9333da9d0a3b87310e0d116b7c9070c7b00",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/50274b01ac1689b1a3f6bc4b5b3dbf361a55dd3a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c633e025bd04f54d7b33331cfcdb71354b08ce59",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d3d702084d125689edb2b9395c707e09b471352e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2c67a9333da9d0a3b87310e0d116b7c9070c7b00",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/50274b01ac1689b1a3f6bc4b5b3dbf361a55dd3a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c633e025bd04f54d7b33331cfcdb71354b08ce59",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d3d702084d125689edb2b9395c707e09b471352e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47079",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-01T22:15:47.387",
"lastModified": "2024-11-21T06:35:21.513",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:41:59.903",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,99 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: plataforma/x86: ideapad-laptop: corrige una desreferencia de puntero NULL El tercer par\u00e1metro de dytc_cql_command no debe ser NULL ya que se desreferenciar\u00e1 inmediatamente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.7",
"matchCriteriaId": "13460FFE-8AA9-4F1C-963C-30982D8858D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/beab753fe3b4e087411a850a64c6cd748544d8a1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ff67dbd554b2aaa22be933eced32610ff90209dd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/beab753fe3b4e087411a850a64c6cd748544d8a1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ff67dbd554b2aaa22be933eced32610ff90209dd",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47080",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-01T22:15:47.433",
"lastModified": "2024-11-21T06:35:21.650",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:45:03.330",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,120 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/core: evita el error de divisi\u00f3n por cero desencadenado por el usuario El usuario proporciona el tama\u00f1o de entrada de usuario y luego lo utiliza como denominador para calcular el n\u00famero de entradas. El cero proporcionado por el usuario activar\u00e1 el siguiente error de divisi\u00f3n por cero: error de divisi\u00f3n: 0000 [#1] SMP KASAN PTI CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281 Nombre de hardware: QEMU PC est\u00e1ndar (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 01/04/2014 RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510 C\u00f3digo: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff <49> f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b RSP: 0018:ffff88810416f828 EFLAGS: 00010246 RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d RDX: 0000000 000000000 RSI: ffff888105f2da00 RDI: 0000000000000000 RBP: ffff88810416fa98 R08: 00000000000000001 R09: ffffed102082df5f R10: ffff88810416faf7 R11: ffffed102082df5e R12 : 0000000000000000 R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0 FS: 00007f5715efa740(0000) GS:ffff88811a700000(0000 ) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0 ib_uverbs_cmd_verbs+0x1546/0x1940 ib_uverbs_ioctl+0x186/0x240 __x64_sys_ioctl+0x38a/0x1220 do_syscall_64+0x3f /0x80 entrada_SYSCALL_64_after_hwframe+0x44/0xae"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.10.40",
"matchCriteriaId": "FAEFD181-62CD-41CD-BFE5-7BC337ADE1CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.12.7",
"matchCriteriaId": "E8F2CE30-38B0-4716-B12B-A139B0F9C5C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/54d87913f147a983589923c7f651f97de9af5be1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/66ab7fcdac34b890017f04f391507ef5b2b89a13",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e6871b4270c05f8b212e7d98aee82b357972c80a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/54d87913f147a983589923c7f651f97de9af5be1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/66ab7fcdac34b890017f04f391507ef5b2b89a13",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e6871b4270c05f8b212e7d98aee82b357972c80a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47081",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-01T22:15:47.483",
"lastModified": "2024-11-21T06:35:21.770",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:45:24.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,99 @@
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: habanalabs/gaudi: Corregir un uso potencial despu\u00e9s de liberar en gaudi_memset_device_memory Nuestro analizador de c\u00f3digo report\u00f3 un uaf. En gaudi_memset_device_memory, cb se obtiene a trav\u00e9s de hl_cb_kernel_create() con 2 refcount. Si hl_cs_allocate_job() falla, la ejecuci\u00f3n se ejecuta en la rama release_cb. hl_cb_put(cb) elimina una referencia de cb y podr\u00eda liberarse si otro hilo tambi\u00e9n elimina una referencia. Luego, cb->id usa cb m\u00e1s tarde, que es un uaf potencial. Mi parche agrega una variable 'id' para aceptar el valor de cb->id antes de llamar a hl_cb_put(cb), para evitar el potencial uaf."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.7",
"matchCriteriaId": "13460FFE-8AA9-4F1C-963C-30982D8858D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/115726c5d312b462c9d9931ea42becdfa838a076",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b49f5af30b0e4064fbd91e83823a4bfcb2c7a3e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/115726c5d312b462c9d9931ea42becdfa838a076",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b49f5af30b0e4064fbd91e83823a4bfcb2c7a3e7",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-23084",
"sourceIdentifier": "secteam@freebsd.org",
"published": "2024-02-15T05:15:08.833",
"lastModified": "2024-12-09T16:43:48.120",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T17:27:41.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.0,
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
"exploitabilityScore": 0.8,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-23085",
"sourceIdentifier": "secteam@freebsd.org",
"published": "2024-02-15T05:15:09.110",
"lastModified": "2024-12-09T16:44:40.813",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T17:27:22.803",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"exploitabilityScore": 1.5,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2022-38946",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-09T17:15:05.280",
"lastModified": "2024-12-09T17:15:05.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Arbitrary File Upload vulnerability in Doctor-Appointment version 1.0 in /Frontend/signup_com.php, allows attackers to execute arbitrary code."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Cosemz/CVE/blob/main/Doctor-Appointment.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-28386",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-05-22T20:15:10.250",
"lastModified": "2024-11-21T07:54:58.190",
"lastModified": "2024-12-09T18:15:19.273",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nSnap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution.\n\n\n\n\n\n"
"value": "Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution."
}
],
"metrics": {
@ -58,17 +58,17 @@
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-345"
"value": "CWE-354"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-28649",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-05-22T20:15:10.417",
"lastModified": "2024-11-21T07:55:44.340",
"lastModified": "2024-12-09T18:15:20.430",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nThe Hub in the Snap One OvrC cloud platform is a device used to centralize and manage nested devices connected to it. A vulnerability exists in which an attacker could impersonate a hub and send device requests to claim already claimed devices. The OvrC cloud platform receives the requests but does not validate if the found devices are already managed by another user.\n\n\n\n\n\n\n"
"value": "The Hub in the Snap One OvrC cloud platform is a device used to centralize and manage nested devices connected to it. A vulnerability exists in which an attacker could impersonate a hub and send device requests to claim already claimed devices. The OvrC cloud platform receives the requests but does not validate if the found devices are already managed by another user."
}
],
"metrics": {
@ -58,17 +58,17 @@
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-413"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-31240",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-05-22T20:15:10.633",
"lastModified": "2024-11-21T08:01:41.497",
"lastModified": "2024-12-09T18:15:20.887",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nSnap One OvrC Pro versions prior to 7.2 have their own locally running web server accessible both from the local network and remotely. OvrC cloud contains a hidden superuser account accessible through hard-coded credentials.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
"value": "Snap One OvrC Pro versions prior to 7.2 have their own locally running web server accessible both from the local network and remotely. OvrC cloud contains a hidden superuser account accessible through hard-coded credentials."
}
],
"metrics": {
@ -58,11 +58,11 @@
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
"value": "CWE-1391"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-31241",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-05-22T20:15:10.720",
"lastModified": "2024-11-21T08:01:41.613",
"lastModified": "2024-12-09T18:15:21.090",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\n\n\n\n\nSnap One OvrC cloud servers contain a route an attacker can use to bypass requirements and claim devices outright.\n\n\n\n\n\n\n\n\n\n"
"value": "Snap One OvrC cloud servers contain a route an attacker can use to bypass requirements and claim devices outright."
}
],
"metrics": {
@ -58,17 +58,17 @@
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
"value": "CWE-420"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42843",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:48.940",
"lastModified": "2024-11-21T08:23:20.760",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T17:31:31.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,54 +81,178 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.1",
"matchCriteriaId": "84250563-E42D-4F36-ACB0-081804E27FA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.2",
"matchCriteriaId": "A8F544A7-7CEB-4A84-992F-58710B229579"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.1",
"matchCriteriaId": "F6AF95A3-F462-498E-848D-C09D0E43ED52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.2",
"matchCriteriaId": "5EB9EAAE-441A-4844-BCB2-1716FD9ACE85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.1",
"matchCriteriaId": "F53A32D0-DB67-40D7-B14E-3963E696A77E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.44.0",
"matchCriteriaId": "EF5BDB2C-7F5F-41B4-87C4-C4B938C7D317"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.44.0",
"matchCriteriaId": "336F9990-F267-4013-8353-5AA10039C515"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/26/1",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT213981",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213986",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/26/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT213981",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213986",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42848",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:49.113",
"lastModified": "2024-11-21T08:23:21.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T17:26:04.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,54 +81,152 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.2",
"matchCriteriaId": "A8F544A7-7CEB-4A84-992F-58710B229579"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.1",
"matchCriteriaId": "F6AF95A3-F462-498E-848D-C09D0E43ED52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.2",
"matchCriteriaId": "5EB9EAAE-441A-4844-BCB2-1716FD9ACE85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.1",
"matchCriteriaId": "F53A32D0-DB67-40D7-B14E-3963E696A77E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.1",
"matchCriteriaId": "85B6F336-AA76-4706-AD68-BCDFFB48358B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.1",
"matchCriteriaId": "6B71C095-CFB3-42E1-8582-0AD365DA7855"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.1",
"matchCriteriaId": "F88E7355-ECFB-4EB0-9579-0C954C25355F"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213981",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213985",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213987",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213988",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213981",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213985",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213987",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213988",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42853",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:49.273",
"lastModified": "2024-11-21T08:23:22.157",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:36:24.873",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,47 +15,142 @@
"value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.7.1",
"matchCriteriaId": "98AADE2D-1E96-4EC2-9413-13A0C1A1F051"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.1",
"matchCriteriaId": "85B6F336-AA76-4706-AD68-BCDFFB48358B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT213983",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213985",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT213983",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213985",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214084",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42873",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:49.997",
"lastModified": "2024-11-21T08:23:24.363",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T17:22:44.073",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,54 +59,165 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.1",
"matchCriteriaId": "0B5787E4-1911-4926-9D81-492EFB438954"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0",
"versionEndExcluding": "16.7.2",
"matchCriteriaId": "BE136BE7-1F9E-4D50-A2A8-3921D4864E13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.1",
"matchCriteriaId": "434A55CA-5660-4F40-B4A2-5ABAF4CA7263"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0",
"versionEndExcluding": "16.7.2",
"matchCriteriaId": "8FF85B13-1D0B-4FAB-A61B-5218154F4C32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7.1",
"matchCriteriaId": "BA796DD3-80AF-4E65-8080-EC309577F00D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.1",
"matchCriteriaId": "85B6F336-AA76-4706-AD68-BCDFFB48358B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.1",
"matchCriteriaId": "6B71C095-CFB3-42E1-8582-0AD365DA7855"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213981",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213983",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213985",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213987",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213981",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213983",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213985",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213987",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42877",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:50.173",
"lastModified": "2024-11-21T08:23:24.737",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T17:13:29.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,30 +59,91 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7.1",
"matchCriteriaId": "BA796DD3-80AF-4E65-8080-EC309577F00D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.1",
"matchCriteriaId": "85B6F336-AA76-4706-AD68-BCDFFB48358B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213983",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213985",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213983",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213985",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42889",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:50.453",
"lastModified": "2024-11-25T16:15:09.197",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T17:10:23.580",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,30 +81,79 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7.1",
"matchCriteriaId": "BA796DD3-80AF-4E65-8080-EC309577F00D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.1",
"matchCriteriaId": "85B6F336-AA76-4706-AD68-BCDFFB48358B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213983",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213985",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213983",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213985",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2023-43962",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-09T17:15:06.057",
"lastModified": "2024-12-09T17:15:06.057",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Xunrui CMS Public Edition v.4.6.1 allows a remote attacker to execute arbitrary code via the project name function in the project settings tab."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Cosemz/CVE/blob/main/xunruicms/XunRuiCms%20Stored%20XSS%20%28Authenticated%29.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52359",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-08T09:15:08.293",
"lastModified": "2024-11-21T08:39:38.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:03:10.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,117 @@
"value": "Vulnerabilidad de verificaci\u00f3n de permisos en algunas API del m\u00f3dulo ActivityTaskManagerService. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/3/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/3/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52365",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-02-18T03:15:08.850",
"lastModified": "2024-11-21T08:39:39.517",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T17:17:30.053",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,30 @@
"value": "Vulnerabilidad de lectura fuera de los l\u00edmites en el m\u00f3dulo de reconocimiento de actividad inteligente. La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar que las funciones funcionen de manera anormal."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
@ -26,24 +49,88 @@
"value": "CWE-120"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52369",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-02-18T04:15:07.760",
"lastModified": "2024-11-21T08:39:40.120",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T17:33:32.693",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,117 @@
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en el m\u00f3dulo NFC. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad e integridad del servicio."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52383",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-14T14:22:04.583",
"lastModified": "2024-11-21T08:39:42.093",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-09T18:08:08.193",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,24 +69,83 @@
"value": "CWE-415"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52384",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-14T14:22:05.750",
"lastModified": "2024-11-21T08:39:42.217",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-09T18:06:50.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,24 +69,83 @@
"value": "CWE-415"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52386",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-08T10:15:08.487",
"lastModified": "2024-11-21T08:39:42.510",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-09T18:01:30.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "Vulnerabilidad de escritura fuera de los l\u00edmites en el m\u00f3dulo RSMC. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/3/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/3/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52387",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-02-18T03:15:08.920",
"lastModified": "2024-11-21T08:39:42.620",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T17:25:51.873",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "Vulnerabilidad de reutilizaci\u00f3n de recursos en el m\u00f3dulo GPU. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52475",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-29T06:15:45.763",
"lastModified": "2024-11-21T08:39:51.377",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:47:44.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,71 +15,239 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Entrada: powermate - corrige el use-after-free en powermate_config_complete syzbot ha encontrado un error de use-after-free [1] en el controlador powermate. Esto sucede cuando el dispositivo est\u00e1 desconectado, lo que genera una memoria libre de la estructura powermate_device. Cuando se completa un mensaje de control asincr\u00f3nico despu\u00e9s de que se invoca kfree y su devoluci\u00f3n de llamada, el bloqueo ya no existe y de ah\u00ed el error. Utilice usb_kill_urb() en pm->config para cancelar cualquier solicitud en curso al desconectar el dispositivo. [1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.14.328",
"matchCriteriaId": "F9EC0B2A-902B-4169-85CD-C137590CC4B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.297",
"matchCriteriaId": "02978144-891F-40EF-83B8-59063740AEF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.259",
"matchCriteriaId": "E9F46843-24C9-4AC7-B6BB-1EF101D05435"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.199",
"matchCriteriaId": "8D886A8D-A6CD-44FA-ACF5-DD260ECA7A1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.136",
"matchCriteriaId": "B1FA5161-3AC0-44DF-B1F7-93A070F2B1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.59",
"matchCriteriaId": "96EA633C-1F3E-41C5-A13A-155C55A1F273"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.5.8",
"matchCriteriaId": "AD4E15B4-2591-4A3A-B2A2-7FEAECD5027D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0DC421F1-3D5A-4BEF-BF76-4E468985D20B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*",
"matchCriteriaId": "00AB783B-BE05-40E8-9A55-6AA457D95031"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*",
"matchCriteriaId": "E7C78D0A-C4A2-4D41-B726-8979E33AD0F9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52477",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-29T06:15:45.870",
"lastModified": "2024-11-21T08:39:51.613",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:39:35.613",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,71 +15,239 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: hub: protege contra accesos a descriptores BOS no inicializados Muchas funciones en drivers/usb/core/hub.c y drivers/usb/core/hub.h acceden a los campos dentro de udev- >bos sin verificar si fue asignado e inicializado. Si usb_get_bos_descriptor() falla por cualquier motivo, udev->bos ser\u00e1 NULL y esos accesos resultar\u00e1n en un bloqueo: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000018 PGD 0 P4D 0 Vaya: 0000 [#1] CPU PREEMPT SMP NOPTI : 5 PID: 17818 Comm: kworker/5:1 Tainted: GW 5.15.108-18910-gab0e1cb584e1 #1 Nombre de hardware: Google Kindred/Kindred, BIOS Google_Kindred.12672.413.0 03/02/2021 Cola de trabajo : usb_hub_wq hub_event RIP: 0010:hub_port_reset+0x193/0x788 C\u00f3digo: 89 f7 e8 20 f7 15 00 48 8b 43 08 80 b8 96 03 00 00 03 75 36 0f b7 88 92 03 00 00 81 f9 10 03 00 00 72 27 48 8b 80 a8 03 00 00 <48> 83 78 18 00 74 19 48 89 df 48 8b 75 b0 ba 02 00 00 00 4c 89 e9 RSP: 0018:ffffab740c53fcf8 EFLAGS: 00010246 RAX: 000000 0000000000 RBX: ffffa1bc5f678000 RCX: 0000000000000310 RDX: ffffffffffffdff RSI: 0000000000000286 RDI: ffffa1be9655b840 RBP: ffffab740c53fd70 R08: 00001b7d5edaa20c R09: ffffffffb005e060 R10: 0000000000000001 R11: 00000000 00000000 R12: 0000000000000000 R13: ffffab740c53fd3e R14: 0000000000000032 R15: 00000000000000000 FS: 0000000000000000(0000) GS:ffffa1be965 40000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000018 CR3: 000000022e80c005 CR4: 00000000003706e0 Seguimiento de llamadas: hub_event+0x73f/0x156e ? hub_activate+0x5b7/0x68f proceso_one_work+0x1a2/0x487 trabajador_thread+0x11a/0x288 kthread+0x13a/0x152 ? proceso_one_work+0x487/0x487? kthread_associate_blkcg+0x70/0x70 ret_from_fork+0x1f/0x30 Vuelva a un comportamiento predeterminado si no se puede acceder al descriptor BOS y omita todas las funcionalidades que dependen de \u00e9l: comprobaciones de compatibilidad con LPM, comprobaciones de capacidad de supervelocidad, configuraci\u00f3n de estados U1/U2."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.14.328",
"matchCriteriaId": "F9EC0B2A-902B-4169-85CD-C137590CC4B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.297",
"matchCriteriaId": "02978144-891F-40EF-83B8-59063740AEF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.259",
"matchCriteriaId": "E9F46843-24C9-4AC7-B6BB-1EF101D05435"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.199",
"matchCriteriaId": "8D886A8D-A6CD-44FA-ACF5-DD260ECA7A1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.136",
"matchCriteriaId": "B1FA5161-3AC0-44DF-B1F7-93A070F2B1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.59",
"matchCriteriaId": "96EA633C-1F3E-41C5-A13A-155C55A1F273"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.5.8",
"matchCriteriaId": "AD4E15B4-2591-4A3A-B2A2-7FEAECD5027D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0DC421F1-3D5A-4BEF-BF76-4E468985D20B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*",
"matchCriteriaId": "00AB783B-BE05-40E8-9A55-6AA457D95031"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*",
"matchCriteriaId": "E7C78D0A-C4A2-4D41-B726-8979E33AD0F9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/136f69a04e71ba3458d137aec3bb2ce1232c0289",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/241f230324337ed5eae3846a554fb6d15169872c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/528f0ba9f7a4bc1b61c9b6eb591ff97ca37cac6b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6ad3e9fd3632106696692232bf7ff88b9f7e1bc3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8e7346bfea56453e31b7421c1c17ca2fb9ed613d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c64e4dca9aefd232b17ac4c779b608b286654e81",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f74a7afc224acd5e922c7a2e52244d891bbe44ee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fb9895ab9533534335fa83d70344b397ac862c81",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/136f69a04e71ba3458d137aec3bb2ce1232c0289",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/241f230324337ed5eae3846a554fb6d15169872c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/528f0ba9f7a4bc1b61c9b6eb591ff97ca37cac6b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6ad3e9fd3632106696692232bf7ff88b9f7e1bc3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8e7346bfea56453e31b7421c1c17ca2fb9ed613d",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c64e4dca9aefd232b17ac4c779b608b286654e81",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f74a7afc224acd5e922c7a2e52244d891bbe44ee",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fb9895ab9533534335fa83d70344b397ac862c81",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52715",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T09:15:08.477",
"lastModified": "2024-11-21T08:40:25.500",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:05:04.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,89 @@
"value": "El m\u00f3dulo SystemUI tiene una vulnerabilidad en la gesti\u00f3n de permisos. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Not Applicable",
"Vendor Advisory"
]
},
{
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Vendor Advisory"
]
},
{
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52719",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-14T14:23:15.680",
"lastModified": "2024-11-21T08:40:26.007",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-09T17:56:26.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,24 +69,93 @@
"value": "CWE-16"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52720",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-14T14:23:16.710",
"lastModified": "2024-11-21T08:40:26.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-09T17:50:44.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
@ -49,24 +69,83 @@
"value": "CWE-362"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52721",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-14T14:23:17.840",
"lastModified": "2024-11-21T08:40:26.253",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-09T17:42:49.477",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,24 +69,73 @@
"value": "CWE-264"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Not Applicable"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-11183",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-12-07T06:15:17.760",
"lastModified": "2024-12-07T06:15:17.760",
"vulnStatus": "Received",
"lastModified": "2024-12-09T17:15:08.327",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Simple Side Tab WordPress plugin before 2.2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
},
{
"lang": "es",
"value": "El complemento Simple Side Tab de WordPress anterior a la versi\u00f3n 2.2.0 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/ff3f2788-d1a1-4a62-a247-39a931308f51/",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11268",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-12-09T18:15:22.120",
"lastModified": "2024-12-09T18:15:22.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted PDF file, when parsed through Autodesk Revit, can force an Out-of-Bounds Read. A malicious actor can leverage this vulnerability to cause a crash or could lead to an arbitrary memory leak."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0024",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11454",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-12-09T18:15:22.400",
"lastModified": "2024-12-09T18:15:22.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted DLL file, when placed in the same directory as an RVT file could be loaded by Autodesk Revit, and execute arbitrary code in the context of the current process due to an untrusted search patch being utilized."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
}
],
"references": [
{
"url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0025",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11608",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-12-09T18:15:22.580",
"lastModified": "2024-12-09T18:15:22.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted SKP file, when linked or imported into Autodesk Revit, can be used to cause a Heap-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0026",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23229",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-05-14T14:58:46.647",
"lastModified": "2024-11-21T08:57:14.660",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T17:37:58.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,62 +81,137 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7.5",
"matchCriteriaId": "03438F98-D6C4-4CA6-840D-2633E8A88F68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.5",
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.4",
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/May/14",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214085",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214105",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214085",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/May/14",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214085",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214105",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214084",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214085",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27816",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-05-14T15:13:04.823",
"lastModified": "2024-11-21T09:05:08.583",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:59:05.477",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,102 +59,229 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.5",
"matchCriteriaId": "68CC48DA-8DB7-4042-8E07-0FE2B822DA1E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.5",
"matchCriteriaId": "E9C4B45E-AF58-4D7C-B73A-618B06AED56E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.5",
"matchCriteriaId": "6AB18623-7D06-4946-99FC-808A4A913ED9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.5",
"matchCriteriaId": "003383BF-F06C-4300-908D-D1C8498C6BCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.5",
"matchCriteriaId": "CC4B1E01-BE73-48F8-9BD5-32F7C57EB45A"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/May/10",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/May/12",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/May/16",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/May/17",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214104",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/May/10",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/May/12",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/May/16",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/May/17",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214104",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27895",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-08T10:15:08.597",
"lastModified": "2024-11-21T09:05:22.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-09T17:59:55.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,91 @@
"value": "Vulnerabilidad del control de permisos en el m\u00f3dulo de ventana. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/3/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Not Applicable",
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/3/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30413",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T08:15:07.227",
"lastModified": "2024-11-21T09:11:51.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:33:13.660",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,97 @@
"value": "Vulnerabilidad de control inadecuado de permisos en el m\u00f3dulo de gesti\u00f3n de ventanas. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30417",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T09:15:08.727",
"lastModified": "2024-11-21T09:11:52.613",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-09T18:04:36.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,30 @@
"value": "Vulnerabilidad de path traversal en el m\u00f3dulo de uso compartido basado en Bluetooth. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
@ -26,24 +49,93 @@
"value": "CWE-22"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32996",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-14T15:37:24.170",
"lastModified": "2024-11-21T09:16:11.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-09T18:58:59.707",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,24 +69,103 @@
"value": "CWE-264"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32997",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-14T15:37:24.823",
"lastModified": "2024-11-21T09:16:11.883",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-09T18:58:20.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
@ -49,24 +69,98 @@
"value": "CWE-362"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32999",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-14T15:37:25.887",
"lastModified": "2024-11-21T09:16:12.177",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-09T18:56:00.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.5,
"impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,24 +69,98 @@
"value": "CWE-840"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45760",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-12-09T17:15:08.830",
"lastModified": "2024-12-09T17:15:08.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell OpenManage Server Administrator, versions 11.0.1.0 and prior, contains an improper access control vulnerability. A remote low privileged user could potentially exploit this vulnerability via the HTTP GET method leading to unauthorized action with elevated privileges."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000258320/dsa-2024-481-security-update-for-dell-openmanage-server-administrator-omsa-vulnerability",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45761",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-12-09T17:15:08.973",
"lastModified": "2024-12-09T17:15:08.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell OpenManage Server Administrator, versions 11.0.1.0 and prior, contains an improper input validation vulnerability. A remote low-privileged malicious user could potentially exploit this vulnerability to load any web plugins or Java class leading to the possibility of altering the behavior of certain apps/OS or Denial of Service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000258320/dsa-2024-481-security-update-for-dell-openmanage-server-administrator-omsa-vulnerability",
"source": "security_alert@emc.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51164",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T16:15:37.057",
"lastModified": "2024-12-03T17:15:11.970",
"lastModified": "2024-12-09T17:15:09.107",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://abcc111.github.io/posts/CVE-2024-51164/",
"source": "cve@mitre.org"
},
{
"url": "https://gitee.com/ketr/jepaas-release",
"source": "cve@mitre.org"

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-53450",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-09T17:15:09.350",
"lastModified": "2024-12-09T17:15:09.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RAGFlow 0.13.0 suffers from improper access control in document-hooks.ts, allowing unauthorized access to user documents."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/infiniflow/ragflow/blob/cec208051f6f5996fefc8f36b6b71231b1807533/web/src/hooks/document-hooks.ts#L23",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/thanhtung4102/Unauthentication-in-Ragflow",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53948",
"sourceIdentifier": "security@apache.org",
"published": "2024-12-09T14:15:12.483",
"lastModified": "2024-12-09T14:15:12.483",
"vulnStatus": "Received",
"lastModified": "2024-12-09T18:15:23.893",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,6 +73,10 @@
{
"url": "https://lists.apache.org/thread/8howpf3png0wrgpls46ggk441oczlfvf",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/12/09/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53949",
"sourceIdentifier": "security@apache.org",
"published": "2024-12-09T14:15:12.647",
"lastModified": "2024-12-09T14:15:12.647",
"vulnStatus": "Received",
"lastModified": "2024-12-09T18:15:24.013",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,6 +73,10 @@
{
"url": "https://lists.apache.org/thread/d3scbwmfpzbpm6npnzdw5y4owtqqyq8d",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/12/09/4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-54922",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-09T18:15:24.153",
"lastModified": "2024-12-09T18:15:24.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL Injection was found in /lms/admin/edit_user.php of kashipara E-learning Management System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the firstname, lastname, and username parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20edit_user.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-54926",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-09T17:15:09.810",
"lastModified": "2024-12-09T17:15:09.810",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL Injection vulnerability was found in /search_class.php of kashipara E-learning Management System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the school_year parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20search_class.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-54930",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-09T18:15:24.267",
"lastModified": "2024-12-09T18:15:24.267",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kashipara E-learning Management System v1.0 is vulnerable to SQL Injection in /admin/delete_student.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20delete%20student.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-54933",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-09T18:15:24.387",
"lastModified": "2024-12-09T18:15:24.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kashipara E-learning Management System v1.0 is vulnerable to SQL Injection in /admin/delete_content.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20delete%20content.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-54935",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-09T18:15:24.493",
"lastModified": "2024-12-09T18:15:24.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /send_message_teacher_to_student.php of kashipara E-learning Management System v1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the my_message parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20student%20message.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9651",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-12-09T06:15:04.397",
"lastModified": "2024-12-09T06:15:04.397",
"vulnStatus": "Received",
"lastModified": "2024-12-09T18:15:24.657",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "The Fluent Forms WordPress plugin before 5.2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/a2c56e42-3b3a-4e23-933f-40cf63e222c0/",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-09T17:00:52.202410+00:00
2024-12-09T19:00:25.040126+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-09T16:58:59.567000+00:00
2024-12-09T18:59:05.477000+00:00
```
### Last Data Feed Release
@ -33,56 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
272840
272853
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `13`
- [CVE-2022-38947](CVE-2022/CVE-2022-389xx/CVE-2022-38947.json) (`2024-12-09T16:15:18.667`)
- [CVE-2023-7298](CVE-2023/CVE-2023-72xx/CVE-2023-7298.json) (`2024-12-09T15:15:11.333`)
- [CVE-2024-11991](CVE-2024/CVE-2024-119xx/CVE-2024-11991.json) (`2024-12-09T15:15:12.203`)
- [CVE-2024-38485](CVE-2024/CVE-2024-384xx/CVE-2024-38485.json) (`2024-12-09T15:15:14.110`)
- [CVE-2024-40582](CVE-2024/CVE-2024-405xx/CVE-2024-40582.json) (`2024-12-09T16:15:22.067`)
- [CVE-2024-40583](CVE-2024/CVE-2024-405xx/CVE-2024-40583.json) (`2024-12-09T16:15:22.200`)
- [CVE-2024-42426](CVE-2024/CVE-2024-424xx/CVE-2024-42426.json) (`2024-12-09T15:15:15.450`)
- [CVE-2024-49600](CVE-2024/CVE-2024-496xx/CVE-2024-49600.json) (`2024-12-09T15:15:17.387`)
- [CVE-2024-49602](CVE-2024/CVE-2024-496xx/CVE-2024-49602.json) (`2024-12-09T15:15:17.540`)
- [CVE-2024-49603](CVE-2024/CVE-2024-496xx/CVE-2024-49603.json) (`2024-12-09T15:15:17.713`)
- [CVE-2024-54919](CVE-2024/CVE-2024-549xx/CVE-2024-54919.json) (`2024-12-09T15:15:21.580`)
- [CVE-2024-54920](CVE-2024/CVE-2024-549xx/CVE-2024-54920.json) (`2024-12-09T15:15:21.717`)
- [CVE-2022-38946](CVE-2022/CVE-2022-389xx/CVE-2022-38946.json) (`2024-12-09T17:15:05.280`)
- [CVE-2023-43962](CVE-2023/CVE-2023-439xx/CVE-2023-43962.json) (`2024-12-09T17:15:06.057`)
- [CVE-2024-11268](CVE-2024/CVE-2024-112xx/CVE-2024-11268.json) (`2024-12-09T18:15:22.120`)
- [CVE-2024-11454](CVE-2024/CVE-2024-114xx/CVE-2024-11454.json) (`2024-12-09T18:15:22.400`)
- [CVE-2024-11608](CVE-2024/CVE-2024-116xx/CVE-2024-11608.json) (`2024-12-09T18:15:22.580`)
- [CVE-2024-45760](CVE-2024/CVE-2024-457xx/CVE-2024-45760.json) (`2024-12-09T17:15:08.830`)
- [CVE-2024-45761](CVE-2024/CVE-2024-457xx/CVE-2024-45761.json) (`2024-12-09T17:15:08.973`)
- [CVE-2024-53450](CVE-2024/CVE-2024-534xx/CVE-2024-53450.json) (`2024-12-09T17:15:09.350`)
- [CVE-2024-54922](CVE-2024/CVE-2024-549xx/CVE-2024-54922.json) (`2024-12-09T18:15:24.153`)
- [CVE-2024-54926](CVE-2024/CVE-2024-549xx/CVE-2024-54926.json) (`2024-12-09T17:15:09.810`)
- [CVE-2024-54930](CVE-2024/CVE-2024-549xx/CVE-2024-54930.json) (`2024-12-09T18:15:24.267`)
- [CVE-2024-54933](CVE-2024/CVE-2024-549xx/CVE-2024-54933.json) (`2024-12-09T18:15:24.387`)
- [CVE-2024-54935](CVE-2024/CVE-2024-549xx/CVE-2024-54935.json) (`2024-12-09T18:15:24.493`)
### CVEs modified in the last Commit
Recently modified CVEs: `36`
Recently modified CVEs: `54`
- [CVE-2024-0011](CVE-2024/CVE-2024-00xx/CVE-2024-0011.json) (`2024-12-09T15:05:57.857`)
- [CVE-2024-0670](CVE-2024/CVE-2024-06xx/CVE-2024-0670.json) (`2024-12-09T15:02:35.320`)
- [CVE-2024-20919](CVE-2024/CVE-2024-209xx/CVE-2024-20919.json) (`2024-12-09T16:42:40.380`)
- [CVE-2024-20923](CVE-2024/CVE-2024-209xx/CVE-2024-20923.json) (`2024-12-09T16:43:24.443`)
- [CVE-2024-20925](CVE-2024/CVE-2024-209xx/CVE-2024-20925.json) (`2024-12-09T16:44:10.737`)
- [CVE-2024-21912](CVE-2024/CVE-2024-219xx/CVE-2024-21912.json) (`2024-12-09T15:13:40.437`)
- [CVE-2024-21913](CVE-2024/CVE-2024-219xx/CVE-2024-21913.json) (`2024-12-09T15:18:28.870`)
- [CVE-2024-21918](CVE-2024/CVE-2024-219xx/CVE-2024-21918.json) (`2024-12-09T15:18:49.257`)
- [CVE-2024-21919](CVE-2024/CVE-2024-219xx/CVE-2024-21919.json) (`2024-12-09T15:19:18.887`)
- [CVE-2024-21920](CVE-2024/CVE-2024-219xx/CVE-2024-21920.json) (`2024-12-09T15:25:59.723`)
- [CVE-2024-23293](CVE-2024/CVE-2024-232xx/CVE-2024-23293.json) (`2024-12-09T16:19:06.307`)
- [CVE-2024-23294](CVE-2024/CVE-2024-232xx/CVE-2024-23294.json) (`2024-12-09T16:16:05.597`)
- [CVE-2024-23295](CVE-2024/CVE-2024-232xx/CVE-2024-23295.json) (`2024-12-09T16:09:27.130`)
- [CVE-2024-23297](CVE-2024/CVE-2024-232xx/CVE-2024-23297.json) (`2024-12-09T15:06:14.650`)
- [CVE-2024-23300](CVE-2024/CVE-2024-233xx/CVE-2024-23300.json) (`2024-12-09T15:00:30.860`)
- [CVE-2024-2929](CVE-2024/CVE-2024-29xx/CVE-2024-2929.json) (`2024-12-09T15:19:43.377`)
- [CVE-2024-33122](CVE-2024/CVE-2024-331xx/CVE-2024-33122.json) (`2024-12-09T16:15:21.853`)
- [CVE-2024-38296](CVE-2024/CVE-2024-382xx/CVE-2024-38296.json) (`2024-12-09T15:15:13.993`)
- [CVE-2024-41713](CVE-2024/CVE-2024-417xx/CVE-2024-41713.json) (`2024-12-09T15:15:14.493`)
- [CVE-2024-44252](CVE-2024/CVE-2024-442xx/CVE-2024-44252.json) (`2024-12-09T15:15:15.750`)
- [CVE-2024-44269](CVE-2024/CVE-2024-442xx/CVE-2024-44269.json) (`2024-12-09T15:15:15.947`)
- [CVE-2024-44273](CVE-2024/CVE-2024-442xx/CVE-2024-44273.json) (`2024-12-09T15:15:16.147`)
- [CVE-2024-54747](CVE-2024/CVE-2024-547xx/CVE-2024-54747.json) (`2024-12-09T15:15:21.320`)
- [CVE-2024-55560](CVE-2024/CVE-2024-555xx/CVE-2024-55560.json) (`2024-12-09T16:15:22.750`)
- [CVE-2024-55564](CVE-2024/CVE-2024-555xx/CVE-2024-55564.json) (`2024-12-09T16:15:22.907`)
- [CVE-2023-52365](CVE-2023/CVE-2023-523xx/CVE-2023-52365.json) (`2024-12-09T17:17:30.053`)
- [CVE-2023-52369](CVE-2023/CVE-2023-523xx/CVE-2023-52369.json) (`2024-12-09T17:33:32.693`)
- [CVE-2023-52383](CVE-2023/CVE-2023-523xx/CVE-2023-52383.json) (`2024-12-09T18:08:08.193`)
- [CVE-2023-52384](CVE-2023/CVE-2023-523xx/CVE-2023-52384.json) (`2024-12-09T18:06:50.143`)
- [CVE-2023-52386](CVE-2023/CVE-2023-523xx/CVE-2023-52386.json) (`2024-12-09T18:01:30.060`)
- [CVE-2023-52387](CVE-2023/CVE-2023-523xx/CVE-2023-52387.json) (`2024-12-09T17:25:51.873`)
- [CVE-2023-52475](CVE-2023/CVE-2023-524xx/CVE-2023-52475.json) (`2024-12-09T18:47:44.757`)
- [CVE-2023-52477](CVE-2023/CVE-2023-524xx/CVE-2023-52477.json) (`2024-12-09T18:39:35.613`)
- [CVE-2023-52715](CVE-2023/CVE-2023-527xx/CVE-2023-52715.json) (`2024-12-09T18:05:04.807`)
- [CVE-2023-52719](CVE-2023/CVE-2023-527xx/CVE-2023-52719.json) (`2024-12-09T17:56:26.397`)
- [CVE-2023-52720](CVE-2023/CVE-2023-527xx/CVE-2023-52720.json) (`2024-12-09T17:50:44.797`)
- [CVE-2023-52721](CVE-2023/CVE-2023-527xx/CVE-2023-52721.json) (`2024-12-09T17:42:49.477`)
- [CVE-2024-11183](CVE-2024/CVE-2024-111xx/CVE-2024-11183.json) (`2024-12-09T17:15:08.327`)
- [CVE-2024-23229](CVE-2024/CVE-2024-232xx/CVE-2024-23229.json) (`2024-12-09T17:37:58.303`)
- [CVE-2024-27816](CVE-2024/CVE-2024-278xx/CVE-2024-27816.json) (`2024-12-09T18:59:05.477`)
- [CVE-2024-27895](CVE-2024/CVE-2024-278xx/CVE-2024-27895.json) (`2024-12-09T17:59:55.000`)
- [CVE-2024-30413](CVE-2024/CVE-2024-304xx/CVE-2024-30413.json) (`2024-12-09T18:33:13.660`)
- [CVE-2024-30417](CVE-2024/CVE-2024-304xx/CVE-2024-30417.json) (`2024-12-09T18:04:36.110`)
- [CVE-2024-32996](CVE-2024/CVE-2024-329xx/CVE-2024-32996.json) (`2024-12-09T18:58:59.707`)
- [CVE-2024-32997](CVE-2024/CVE-2024-329xx/CVE-2024-32997.json) (`2024-12-09T18:58:20.347`)
- [CVE-2024-32999](CVE-2024/CVE-2024-329xx/CVE-2024-32999.json) (`2024-12-09T18:56:00.350`)
- [CVE-2024-51164](CVE-2024/CVE-2024-511xx/CVE-2024-51164.json) (`2024-12-09T17:15:09.107`)
- [CVE-2024-53948](CVE-2024/CVE-2024-539xx/CVE-2024-53948.json) (`2024-12-09T18:15:23.893`)
- [CVE-2024-53949](CVE-2024/CVE-2024-539xx/CVE-2024-53949.json) (`2024-12-09T18:15:24.013`)
- [CVE-2024-9651](CVE-2024/CVE-2024-96xx/CVE-2024-9651.json) (`2024-12-09T18:15:24.657`)
## Download and Usage

View File

@ -187142,27 +187142,27 @@ CVE-2021-46998,0,0,ff4906a7e8c07b0c23bb35c4e304cafbec2df7e7b473dfe12365d5e630a6c
CVE-2021-46999,0,0,51831d9c39f3cb89a8b291d8ff015c1f88bbf8af6cb6470705314f8e84c43809,2024-11-21T06:35:09.490000
CVE-2021-47000,0,0,3002e6f38616a18026c7e04e06bcce3007305ba819808a406d0baa5378bf5d3b,2024-11-21T06:35:09.613000
CVE-2021-47001,0,0,d92aff406e85fa2ff8000c04dda3152b7d464f03c3c71d580d5cece26a1020b6,2024-11-21T06:35:09.803000
CVE-2021-47002,0,0,1c7cb833e9b4a1d8469f0a7e00d740faf13862b8956e56397d51352ad4881786,2024-11-21T06:35:09.923000
CVE-2021-47003,0,0,ee36bf3fc6ad12764739635805fa07e0d5062cc4edc3759b43d67a7d09596d19,2024-11-21T06:35:10.037000
CVE-2021-47002,0,1,8e2e69dd823954645422556b82a8f561e637a960eb547819ec3f275f452f36a9,2024-12-09T18:25:24.200000
CVE-2021-47003,0,1,d04fc40119c75046b1674e0b1232d9883e95a4b2b8d484d76d0bd053931c6730,2024-12-09T18:25:35.537000
CVE-2021-47004,0,0,17d968a7cf8f17dbc4acfb14e05ddc65ee33a172f9d985a74559fa5f0896e603,2024-11-21T06:35:10.143000
CVE-2021-47005,0,0,c28c773f1fb87b239254ffaefb80895641a1a5dae2f04a24b2d9fb00e024482f,2024-11-21T06:35:10.260000
CVE-2021-47005,0,1,3fbd5c5ade061cd7cb91f258c837f64317568fee512c60e0acf3a8e8df4b123d,2024-12-09T18:23:57.377000
CVE-2021-47006,0,0,f918923c1438f63323d78c01b1632043cbbf07a22c40bb73d1f03f7b42828875,2024-11-21T06:35:10.380000
CVE-2021-47007,0,0,7bfdfc36787d426b9c21557fd1799a5ac4fe3ff574194898d1ec34f70a0d8bfe,2024-11-21T06:35:10.633000
CVE-2021-47008,0,0,94a7d2eda32de29c06d232ab6e539553843960ea37390933e07bde93db64089c,2024-11-21T06:35:10.763000
CVE-2021-47009,0,0,cf49c589cfe96535dbeb35ad1819e2e9715f41783c39463419921b2a5b258bce,2024-11-21T06:35:10.867000
CVE-2021-47008,0,1,424b2b46b9ee1112b21b12d194f2ab759ab5ded3180361e3ca8f70ab9520ff7b,2024-12-09T18:24:06.900000
CVE-2021-47009,0,1,5d51ef0833cdc3833bbaef02872b579b5eeb6431b56ac636d07b9c088ca5b5ca,2024-12-09T18:24:16.137000
CVE-2021-47010,0,0,235af084fd2c5444a50c1e5c37283625e99504dc8a1f0cecb93ba28199234916,2024-11-21T06:35:10.970000
CVE-2021-47011,0,0,68f7a7f0e5ba376432d2a7eca97d5fbd2ef8afcd7237a8cff4d4a0800e418e31,2024-11-21T06:35:11.193000
CVE-2021-47012,0,0,d4ba96e6ff45cd3c5d080601ef3d7122380af233e23166bf97a87f225ee835d5,2024-11-21T06:35:11.323000
CVE-2021-47013,0,0,7b0c72a46c7e16692169eddd1535a6fe688fe439c71cb8eea1efe163e88ea5c8,2024-11-21T06:35:11.433000
CVE-2021-47012,0,1,fba655f6ffef7b71f41f61a977b48443c129f69088c655d479bc638b63d7faf1,2024-12-09T18:24:59.420000
CVE-2021-47013,0,1,555035b190f7c450c0069a1d3068ca4aa9da1bda58826deedee5b5b2d27047fa,2024-12-09T17:59:07.173000
CVE-2021-47014,0,0,ef2bf3fe877b92a2252f97e111f65381140809d85f14bd44bab90ce1274b5477,2024-11-21T06:35:11.560000
CVE-2021-47015,0,0,80cdc90b83fc3ac03f66f4dd2e20cc2d017d6baeb49c458f203abcbe4886fb36,2024-11-21T06:35:11.660000
CVE-2021-47016,0,0,ef63df8aacfe0aac043235af5f65625db0ccac9f31d3b00ead028b31e2134d28,2024-11-21T06:35:11.787000
CVE-2021-47017,0,0,8a1b24eff98db32c3a6631b4c8d3e11ac6da3fee6ffc4d85a071e5d0d72794c3,2024-11-21T06:35:11.907000
CVE-2021-47017,0,1,94509a9e3fc8c3a8d66eaa81dcba64f1b5bfe5be436ea76331be590779455880,2024-12-09T17:59:26.630000
CVE-2021-47018,0,0,fc5a5e9839895838dcc67adfe6956b34a5c8e45a76bb1673adc2daae1b844dd1,2024-11-21T06:35:12.030000
CVE-2021-47019,0,0,f5f18a65a734328fc58436102735aa7be9165336e91e61e5583bce78c9f3421a,2024-11-21T06:35:12.143000
CVE-2021-47020,0,0,b8675bf1ae8f549915e8393fc1054e59c8b3bc9a23386790f2bbf4cc8df2ac28,2024-11-21T06:35:12.247000
CVE-2021-47021,0,0,af0b3a1dc61b883aacee90828d0b73a0bfa89630f92d8003572901ba87b2c614,2024-11-21T06:35:12.360000
CVE-2021-47022,0,0,c776ab0f737c84b0a6022161d838b12f82f1c1dc6148067dcf1de3ffeb548793,2024-11-21T06:35:12.470000
CVE-2021-47021,0,1,1a858617f9dd136a6b01cec5532b87bc6ed50c9bb3c6d33f9f5664bfb54943ba,2024-12-09T17:59:41.990000
CVE-2021-47022,0,1,18bd31d392a5c02945109dddde06693773e37865cf00c7d42b9e3940dc4b3d4f,2024-12-09T18:09:01.507000
CVE-2021-47023,0,0,0109eec0b42af28c982167aeb3f0fdd2566bc0de058f24a95337952c27921478,2024-11-21T06:35:12.587000
CVE-2021-47024,0,0,f0888732418df50b2419b52313140681b7bbcdf5356692b89bed55cf02a6c034,2024-12-06T20:53:23.077000
CVE-2021-47025,0,0,ee50fde26af33349414069695c5a3e83e5c39b9aeb74c1620ab0889c7d727001,2024-12-06T18:52:52.237000
@ -187191,9 +187191,9 @@ CVE-2021-47047,0,0,529e825ae7df092e97b7d8dd4ae60e0c8a68de3e8c5df314baafd1cbfe0e3
CVE-2021-47048,0,0,4b334f321fecb3ac635c7cb2f3a1b948d18d8ffa8f9aa309a2dd912c9548fda8,2024-11-21T06:35:15.750000
CVE-2021-47049,0,0,2a18311763c3aa079b12c9a0876e21c0efedb1e2dcccc52ef82223f61c8eda71,2024-11-21T06:35:15.880000
CVE-2021-47050,0,0,04a5ea058befd52f87ad43c2e03daf6677b3925b0c5c56d4524fcba1be3889f4,2024-11-21T06:35:15.997000
CVE-2021-47051,0,0,b757874bb1bfc879782a9c6e1740e1c1529f048e2e3be2e759b9a580563ab483,2024-11-21T06:35:16.103000
CVE-2021-47052,0,0,feaefe9934aaee069ea9a150f0ae61c73e5aca8237f8f2967a389a29d6f97f1d,2024-11-21T06:35:16.213000
CVE-2021-47053,0,0,76000bd0cde56231c0a1dc580e7167247d88a6b84694953d04fcf998bfa5473d,2024-11-21T06:35:16.327000
CVE-2021-47051,0,1,9fdd407364b82f6119278c24e39338806764a45074e27a8865265d141ce16432,2024-12-09T18:46:41.483000
CVE-2021-47052,0,1,4b71437751e645e347a71b404b8bbc1d6fbfffd8664191ea6db3d12143e014e4,2024-12-09T18:46:53.900000
CVE-2021-47053,0,1,dc67adfebafac048d7b7d3afa8764867a036f33476cae5e9a7fc56793f5b22bb,2024-12-09T18:47:08.947000
CVE-2021-47054,0,0,ac6fda63b34561a9259f30a2fcd98428ec1291a58d20349d33541d85e4fee035,2024-11-21T06:35:16.443000
CVE-2021-47055,0,0,b63a01999ed47f7311f9a8e2b96559bb8882e3841e9d395bedcdc4bf7697c42c,2024-11-21T06:35:16.570000
CVE-2021-47056,0,0,b45b88e369390925ea8cc956d89a8046d78e16e4fea049a22946e0c390cb845b,2024-11-21T06:35:16.687000
@ -187219,9 +187219,9 @@ CVE-2021-47075,0,0,36eeb7f2e930817c1b1fe865ad9fae545910e7fd96de6d94f28c455e8e241
CVE-2021-47076,0,0,eb44f78121b9b3561a16c318aaec96c6c6576ae1ed25b0b86867d5e51cb5effd,2024-11-21T06:35:21.103000
CVE-2021-47077,0,0,88a58ca01c20870d26d8d975627c188957386e9af908e0df601d44abf59c2d17,2024-11-21T06:35:21.220000
CVE-2021-47078,0,0,10d2cc255b79f1ae1b2de2b41ed383d0a6ccb70ddfa9cdcb0b129f97f8f6ab93,2024-11-21T06:35:21.327000
CVE-2021-47079,0,0,0837b701bf7d1205140ba005ae0aaee51a2ed6ba052149e888ff0ae71d3ddf6e,2024-11-21T06:35:21.513000
CVE-2021-47080,0,0,a2d5a5ab2886ea3b17f66e5aa63b30f4b759464575c2b8e7d37394c8e48454ca,2024-11-21T06:35:21.650000
CVE-2021-47081,0,0,8c3cbb779863962e89c2c44e0ea5eccf234334aac7b30be77f98c99d3fed8d29,2024-11-21T06:35:21.770000
CVE-2021-47079,0,1,c036a75d1b217059f3eeacf84ba954225baad506d2ec7a3aba1818ec631ba415,2024-12-09T18:41:59.903000
CVE-2021-47080,0,1,b2998f659a4b3e4f9d004f3f3d103d7ee3c84ede27b87e416214f7ed38cac5e7,2024-12-09T18:45:03.330000
CVE-2021-47081,0,1,c79ecd1b9946b285c3884a9a56e60cd0cb09c044ce0d23fa0a81bf00575bd5a3,2024-12-09T18:45:24.617000
CVE-2021-47082,0,0,4aa4964dd1821918c57b50fe99a83efe35e0db971bfb457f7de7f9e1d01adec4,2024-11-21T06:35:21.873000
CVE-2021-47083,0,0,a9c5377e0acab8df7be32358c99d43fc370667635d94d5a05992dc67b1258341,2024-11-21T06:35:22
CVE-2021-47084,0,0,8d21d41f3883696e4e6639e5c99ebe9ddd0bd5818bf039723bb272148d178138,2024-03-19T14:15:07.540000
@ -192609,8 +192609,8 @@ CVE-2022-23080,0,0,4f3841f0406af4d19c669252f5700adcb0208657000a33a0955c5b96eca8a
CVE-2022-23081,0,0,215d0d93a7e13030abc2264c12b25d2394b7f98a3ec769edbceb30f44b4f14a8,2024-11-21T06:47:56.513000
CVE-2022-23082,0,0,37388aef45761e20394d582f107d804cface4f1415daecc4aa7865714e58dda0,2024-11-21T06:47:56.650000
CVE-2022-23083,0,0,ec6bad714e416fd4fa01316b700a1866735ae342f05ea3fa3974cc27ef000f56,2024-11-21T06:47:56.783000
CVE-2022-23084,0,1,855a6e2d3993c6679c5f9ca1790edb304a744a22caa8f4f4b8857da3331c47fa,2024-12-09T16:43:48.120000
CVE-2022-23085,0,1,412e2a534553a6c792f5eb8106f8626b46a220379cb9dd88fad7be6ff8254a34,2024-12-09T16:44:40.813000
CVE-2022-23084,0,1,6a2ae41871be721436e219d7e0389dac1fc31c85838d980f693b5dba1832693e,2024-12-09T17:27:41.437000
CVE-2022-23085,0,1,6412c8372d862dcc0a3cf5bd7c1efba690d9a88863c7674f559c75ca93e49e66,2024-12-09T17:27:22.803000
CVE-2022-23086,0,0,455ef41c5d0b3cb496dddf6eddabce79cb2ea9601c3acf42c736a11fb488d1de,2024-11-21T06:47:57.273000
CVE-2022-23087,0,0,4731402708661c37f9fe03ad280082c7755038f9add685b4f55204fee434f1c0,2024-11-21T06:47:57.457000
CVE-2022-23088,0,0,96df8466b71abafc68549d82f55f9d21c7bbe6efc6480be8b6ca9237a7fa59a8,2024-11-21T06:47:57.560000
@ -205506,7 +205506,8 @@ CVE-2022-38934,0,0,40d670d084123a35b6cf8e015d52100eba55e2e591a681d9be36901d5638d
CVE-2022-38935,0,0,83a6e0251fe0abfddd0911937efa9f1b90021aae2007abd42b72b5f692f374ae,2024-11-21T07:17:16.500000
CVE-2022-38936,0,0,b3e505552a6410e493866b78c37513e198bc95afcfc929838b193c22c9abfd36,2024-11-21T07:17:16.647000
CVE-2022-3894,0,0,33b9420d4c777d74fc9afc14daf43f3a8e5811186e765049c2b0991fd11bd532,2024-11-21T07:20:28.913000
CVE-2022-38947,1,1,bfa40092e2557b05cf82c4239ec44a007554ea293ad1ec1dc07ef6806472823b,2024-12-09T16:15:18.667000
CVE-2022-38946,1,1,41211fbc12112d753f3af7d315f8c1b1a5c1c595080aff6a35608a4aee12f7fb,2024-12-09T17:15:05.280000
CVE-2022-38947,0,0,bfa40092e2557b05cf82c4239ec44a007554ea293ad1ec1dc07ef6806472823b,2024-12-09T16:15:18.667000
CVE-2022-3895,0,0,a9fc841d0237473e1e94e430db8d1fa94b66fa1951ff679c2163fbfb09a98fbf,2024-11-21T07:20:29.067000
CVE-2022-38955,0,0,c67dc1036670bcfb324220053bea90a87f57af5b5b721977df093f2412b93825,2024-11-21T07:17:16.800000
CVE-2022-38956,0,0,aebbd9d93c58bae1388e61045fe497d1212a7d7f7f21427a6c71bed0dad0105b,2024-11-21T07:17:16.953000
@ -221895,7 +221896,7 @@ CVE-2023-28382,0,0,11c90de74ce7ed86190cdbf7debbc57c420636494a12f47f97abae89aa35a
CVE-2023-28383,0,0,48697de1cca90d6b3ae134dc9ce22dcb6a22b4802be54231637854c435aacd58,2024-11-21T07:54:57.887000
CVE-2023-28384,0,0,e957b9384de65ebb6a80a839cb3cd2ea8a514b08919aa116c79524b409a5f376,2024-11-21T07:54:57.990000
CVE-2023-28385,0,0,61bd73f4c07fb2f7be9167196c277434b81452ce75602fd8f2e661a62695b4ea,2024-11-21T07:54:58.083000
CVE-2023-28386,0,0,43fb993c47e5ee14514f315bcd2d3ec235e6ed601cf502c135a5f11f73845719,2024-11-21T07:54:58.190000
CVE-2023-28386,0,1,3d8c94f9f394dc7e85a4ca0e062a20b7cf4b75bb1621666ff00503e30a10da09,2024-12-09T18:15:19.273000
CVE-2023-28387,0,0,f9b7d4deb7119122d0725dd3c3f5ae24a7033492e3de0c64d04b1908eb1395ac,2024-11-21T07:54:58.317000
CVE-2023-28388,0,0,c6e3f76c7146a4a5420346e6b4abc4c602b810d24302c2c2bc9194a7fb16021c,2024-11-21T07:54:58.410000
CVE-2023-28389,0,0,bff9d3c68a6d345a4e7511aeb7a5417443617d3f28ef7e3b6626b492a82cad7f,2024-11-21T07:54:58.520000
@ -222155,7 +222156,7 @@ CVE-2023-28645,0,0,12a23ff59547705a540d6287954239523ab432f1d190ac90b93ce73185f27
CVE-2023-28646,0,0,78e375423f1c86c30bac71c666ca5e9a2addfb7e60c03a3161c8fbbe0c3a6378,2024-11-21T07:55:43.973000
CVE-2023-28647,0,0,6e622e4c8c506d34225481f32977a08d6344f5c37a9e28afb412ed024963a274,2024-11-21T07:55:44.097000
CVE-2023-28648,0,0,858ff9277a18ca9a6568baa82146abca15de5820e777ceee09d8606939c08232,2024-11-21T07:55:44.227000
CVE-2023-28649,0,0,6962900f78161293d83253baaefa9231453a202e9e3e15cb6958db6e32865776,2024-11-21T07:55:44.340000
CVE-2023-28649,0,1,b546ed1247b528c80127d17229ccdf396336cfa9f485e93db64beff6ef3a7373,2024-12-09T18:15:20.430000
CVE-2023-2865,0,0,1a625e385fc8ed1dc6ce3375081827b1641f5b5fbcd7b2fc5b42abb2150ec117,2024-11-21T07:59:27.100000
CVE-2023-28650,0,0,1450dfd4e00e9813b9f852d7a370533d90f4dbe8459b3ea198bdd944c6ccfc68,2024-11-21T07:55:44.473000
CVE-2023-28651,0,0,cdfbdc093597a1d19e6079bf16f8d61dd8930ac896006cc3e15e28043997afa1,2024-11-21T07:55:44.567000
@ -224169,8 +224170,8 @@ CVE-2023-31237,0,0,f9abe03d1554127d9f4e0cd7d1d9114845d4bf3b17867ef8541c54f01581e
CVE-2023-31238,0,0,11a72567041a3076066807dbe48ebaf14ba0774bcbfb5b06972c4cd36c749ae3,2024-11-21T08:01:41.260000
CVE-2023-31239,0,0,a9d6d8122acc103e70585dda3455de0aea16f3c42ffc2fcbf527b189395a7a34,2024-11-21T08:01:41.380000
CVE-2023-3124,0,0,67cc12c86892de6b2248381c3363d0ccd4341fb7a3797b32711efc303565f768,2024-11-21T08:16:30.680000
CVE-2023-31240,0,0,b3e710ace75d7c1bf80987bc9b61a94c626c9cc2c4c9e6817f1db6bc5780cac6,2024-11-21T08:01:41.497000
CVE-2023-31241,0,0,d1ec8cb8c21c5bfd90ef0e892bfece9582da6a2738adb917b87edc44580e6250,2024-11-21T08:01:41.613000
CVE-2023-31240,0,1,353d37d85d0a9b7a55ddbf8bea51a0e809ce76463f66ea7a3065130f5a0e75f6,2024-12-09T18:15:20.887000
CVE-2023-31241,0,1,cbefd93432634453869e3a3854e829d76c88847907d35a3404131afce046c1cd,2024-12-09T18:15:21.090000
CVE-2023-31242,0,0,e1666f62bbb6dcbbaac87e88bf1056ab37ede17566ee8d07705d50c21eb3ce70,2024-11-21T08:01:41.740000
CVE-2023-31244,0,0,c405d772db045a899517201d276eb73efd5df2aaae5923724673ace5d8607693,2024-11-21T08:01:41.860000
CVE-2023-31245,0,0,4c0f4b6f13d0a9e3f044feac2d9498ac42e7a8b8a6f7cf0754d001941d58f501,2024-11-21T08:01:41.973000
@ -232977,16 +232978,16 @@ CVE-2023-4284,0,0,c4ab50dadca066929775b8387ee656a654281631de5770b1cae455ea4ba50f
CVE-2023-42840,0,0,f1f04b9061bdce447f5753f3876abfe458e8bb3d9b95843639858d111f70f4da,2024-12-06T13:28:41.990000
CVE-2023-42841,0,0,65b7e1ad315406896de3c94e87d786f7cf003f4d9bd5ce0d8e6ab6a5e0c24dc0,2024-11-21T08:23:20.427000
CVE-2023-42842,0,0,c8bff024b90962ecc0632c5f07ce14f349a9e38fec2708ad4ebbc5895167d3fd,2024-11-21T08:23:20.637000
CVE-2023-42843,0,0,bcd9816f546ca7291ab81632b28f0814e3bc7a41e5eca68a02b61ccba384da22,2024-11-21T08:23:20.760000
CVE-2023-42843,0,1,eb7dda85dd0de79698a932323d45cadc3d7452f51e1c4b88d908058a3190896b,2024-12-09T17:31:31.750000
CVE-2023-42844,0,0,b14c56b38f14de0982d2e60921993e7ad13c6b5526e78f2606474707256340a8,2024-11-21T08:23:20.950000
CVE-2023-42845,0,0,0af59aa250fce27212394717fcd140d9fbeb3d5e6bbd7746253bd8c574c000ca,2024-11-21T08:23:21.133000
CVE-2023-42846,0,0,e85a971e006b54494c97a425c443df66d497acae54e17226bfcf881e1072711c,2024-11-21T08:23:21.267000
CVE-2023-42847,0,0,ef89253060da56e84de010d612af217bd9549ba60af8cf0fe5c6e39361b0634e,2024-11-21T08:23:21.420000
CVE-2023-42848,0,0,575b91b2a6463018bb2e9838c63227c697962152563fd664ebca88679b0eff92,2024-11-21T08:23:21.547000
CVE-2023-42848,0,1,41afc67e6cb759cc2716081163a61f2a638c7941a8afcd87d6a665a042c5c438,2024-12-09T17:26:04.510000
CVE-2023-42849,0,0,e140a102d19e3920457b017a63e13939e663c6421459d92443489b4f8917d38a,2024-11-21T08:23:21.733000
CVE-2023-42850,0,0,54334b4e9a26e7dda9a6876c5d7b5cbb5e277cfaac46c75c82eb3fcc0f995d70,2024-11-21T08:23:21.897000
CVE-2023-42852,0,0,e6fe4e48ac58948bf63acf9b410268b84a3c7dcdd7372a587847f58bbca01103,2024-11-21T08:23:22.010000
CVE-2023-42853,0,0,62f05bb0d7dbfbbd2623b905e1dedb0adc9300c45139ecfce0da12189187ece9,2024-11-21T08:23:22.157000
CVE-2023-42853,0,1,033d9994b36683207b803307baeb56edefd4783ef2e1853a709666d0241a61bb,2024-12-09T18:36:24.873000
CVE-2023-42854,0,0,1b847ae6b3f536ee06827e6af23c9e69d5c95c7ba7a555e91ccdc4bdf445129d,2024-11-21T08:23:22.260000
CVE-2023-42855,0,0,d73b683210c471439f24418097a00ff275f56fb1ccaca4b4a1db0b2a4b8449aa,2024-12-03T17:32:38.343000
CVE-2023-42856,0,0,8cfb4f8c69ef2c5f7c9c4d31df26081e8ee5f9904b72be274b6fb3a411bbf2c9,2024-11-21T08:23:22.560000
@ -233002,10 +233003,10 @@ CVE-2023-42869,0,0,4b525b2d4d78240e429f6120cff3fbea3a9a62626e791bc07518dbd60f150
CVE-2023-42870,0,0,b052e765ed6b314dbe419b522569170970500fb212cc8d9009eece0ef048ce07,2024-11-21T08:23:23.957000
CVE-2023-42871,0,0,f13ae996b006635f073f8383fb0028141adede656e942393444895575f50667d,2024-11-21T08:23:24.150000
CVE-2023-42872,0,0,f3648f3deeaad97df776a3d1c44a939ca77b2546d7b8c107ac43dbb6270e605d,2024-11-21T08:23:24.257000
CVE-2023-42873,0,0,5b68a0842220375ddb4d6fcd80eebb34766e97f89f183cc58b4ea8576e011c48,2024-11-21T08:23:24.363000
CVE-2023-42873,0,1,c720d6e3e03d83a207785aa1df0cbf0f7cb9cc77542d088a274e60f84557073c,2024-12-09T17:22:44.073000
CVE-2023-42874,0,0,8d97b98bb633cc5493c7ddadbc5a3fcb0aafa4a63566c7b95c55d43990d4043d,2024-11-21T08:23:24.537000
CVE-2023-42876,0,0,37b25b9c642b4cac6eb6d94ea53d367b2768529c56bc4e8a14593b75edb0b4ab,2024-11-21T08:23:24.640000
CVE-2023-42877,0,0,37bdc645ab07817243fba4dcf2db98b3e80efe522095774a616b49f0ad38875e,2024-11-21T08:23:24.737000
CVE-2023-42877,0,1,4dc75ad666df108b4705e6025618ee85d160e3119c62da22b0b7ef71ac91a0a2,2024-12-09T17:13:29.847000
CVE-2023-42878,0,0,5d257e70cffd5eb040ee0fb607130b1e7299ba45d71793ad390ba88b3cfe997d,2024-12-03T17:17:41.227000
CVE-2023-42881,0,0,00000ffd74235932aec31fec9c1c4ff6bdc2f7f4e1ec482b1932b8fb4edc6589,2024-11-21T08:23:24.993000
CVE-2023-42882,0,0,52d3d6e63624b766645b42f6de5717aa4cf8dfd75908cc909fde08039617840c,2024-11-21T08:23:25.093000
@ -233014,7 +233015,7 @@ CVE-2023-42884,0,0,d01c258abe2f31191693baf756d6834dbcdda2258b2733c9855cba366a955
CVE-2023-42886,0,0,c15407d84b2542d842f4506c0cd71a04ba67406423e4c036a717e97c9a72bbe5,2024-11-21T08:23:25.483000
CVE-2023-42887,0,0,279c7aaf5a8352e31fc31fe0a924d389f8e1996fda7969336bfd7c5f0dfca9df,2024-11-21T08:23:25.597000
CVE-2023-42888,0,0,f322faf7f229d4f1923d1bb3c4832170d793bebe9fc8b58840b60a9d1b655152,2024-11-21T08:23:25.703000
CVE-2023-42889,0,0,5624511e9adaa12c58cb19d9b7381779f821bd191d92ca3059ef6fbfbc870a59,2024-11-25T16:15:09.197000
CVE-2023-42889,0,1,a974df235eb2d3c4ac74c2469929bae42468dda315bde0f114e922e68df14623,2024-12-09T17:10:23.580000
CVE-2023-4289,0,0,72194d17a193a4858647b0d9d56fb40ab9902947e15340951a4d133cda960e49,2024-11-21T08:34:47.490000
CVE-2023-42890,0,0,cdd1427bfb0b88413b62acf681089e6eaf25d37e9fe02193ea0bade53fb27d3a,2024-11-21T08:23:25.937000
CVE-2023-42891,0,0,28279c724c6c24777b89ff06dc550f4f1e70a808452627f3205f51650ee0f500,2024-11-21T08:23:26.090000
@ -233048,7 +233049,7 @@ CVE-2023-42917,0,0,839eadd45880760ae51e8540583b7112aaaa67a9dfd11ac955bea10e62b8c
CVE-2023-42918,0,0,00c6853c86ee239988b85bf2b435c905d5fc15533c95ce05ab3a3dd878749a8a,2024-11-21T08:23:30.753000
CVE-2023-42919,0,0,0c3c70bb5f2863412b2b2dd67082465102a85fe428dafa015ca9d7e89c5e148b,2024-11-21T08:23:30.927000
CVE-2023-4292,0,0,d9de54c2172d4a0bd9014f748290f40f3a2200aa50a679e4a1ee0d613f997768,2024-11-21T08:34:47.827000
CVE-2023-42920,0,1,2ecf47dc3dfc5cd7f45e2c32a90253d1855ed723744993725d77b121c3239db1,2024-12-09T16:29:42.707000
CVE-2023-42920,0,0,2ecf47dc3dfc5cd7f45e2c32a90253d1855ed723744993725d77b121c3239db1,2024-12-09T16:29:42.707000
CVE-2023-42922,0,0,e3768a22cedbccbc509185bf4193f89d10bbca8ed1a6de947440d7c7b437f29e,2024-11-21T08:23:31.253000
CVE-2023-42923,0,0,ea0e4518965042afaad975e15144ee74978795b9d34e5a48440648b6fbd68de8,2024-11-21T08:23:31.397000
CVE-2023-42924,0,0,6b99f09dcff0e5a38494359777378c4e0d1701a5bae862f018b23691a1d34ad5,2024-11-21T08:23:31.510000
@ -233083,7 +233084,7 @@ CVE-2023-42950,0,0,186b120c42d16f43046ee6f072fbe7644cd28e6168a9032f4076b275ba82c
CVE-2023-42951,0,0,121a5c0c1d17502bed7317173a1705a78522289256ce9a61da10683dfe7402d1,2024-12-03T20:26:23.957000
CVE-2023-42952,0,0,6891ee256bdc72cf6a4c57b42f33beb2238326aae5a4615a12a4c5ea4a2a6b07,2024-12-05T19:56:22.987000
CVE-2023-42953,0,0,be651a2585df3a4d1b6fbc44895268b21cb745aefd4866e02b3d268354be1ed1,2024-12-05T19:52:16.060000
CVE-2023-42954,0,1,ef997ec1b7ae2a871a1cb4c336cacfe0db7dc99e6ab84fea7160916f83ee81b6,2024-12-09T16:39:29.457000
CVE-2023-42954,0,0,ef997ec1b7ae2a871a1cb4c336cacfe0db7dc99e6ab84fea7160916f83ee81b6,2024-12-09T16:39:29.457000
CVE-2023-42955,0,0,406c21347aab8bf921ce6a1d35cc533396f3982a9570c8f6ab2c0b3a31e2a100,2024-11-21T08:23:35.890000
CVE-2023-42956,0,0,e14db85c5ccfdb5481107fc38c1b5e0c17361ce34fa5986cf4b46fcf512cc789,2024-11-21T08:23:36.070000
CVE-2023-42957,0,0,f030c110e0a0001d394f908c34f4f2bbd027e6916b4a140d52a4471a32c8be09,2024-11-21T08:23:36.690000
@ -233092,7 +233093,7 @@ CVE-2023-42959,0,0,3ca54fedafd3d6c1e65801ed57a9dad31cbff31a3cbb3cb3fbd6d81f9bf1e
CVE-2023-4296,0,0,33ed9dd29ae54896f2c71a35c0cf4e6717a204ccdf2c2895c6a00d7ae9486fbd,2024-11-21T08:34:48.323000
CVE-2023-42962,0,0,eae5b5f8f8786c59ec83e045e5108238e720128cfd3c327cba0cde631527ec1f,2024-11-21T08:23:37.137000
CVE-2023-4297,0,0,aab89ab1490fbae98144b9e8b7a1072e7027356d76454a4a729b99641cbaa65d,2024-11-21T08:34:48.470000
CVE-2023-42974,0,1,252a25f038a640dd8e95a4a1a78e56debc62bdfa87a9891793f33c790cd37bac,2024-12-09T16:46:58.417000
CVE-2023-42974,0,0,252a25f038a640dd8e95a4a1a78e56debc62bdfa87a9891793f33c790cd37bac,2024-12-09T16:46:58.417000
CVE-2023-4298,0,0,4ed5d094ffd5dea0fd4531466e39c4acc00f223f7c93151de436797f2abc86a2,2024-11-21T08:34:48.657000
CVE-2023-4299,0,0,2bb2546e4c2688f5cb6f960f37cc2f67d4a5cfbe4b334ba15f2c1261d771d0fa,2024-11-21T08:34:48.760000
CVE-2023-4300,0,0,723cb43892ca9bbdbe65bce2483f7097fa889e436033f6391408d357e0bbb2e1,2024-11-21T08:34:48.940000
@ -233702,6 +233703,7 @@ CVE-2023-43956,0,0,287c16836b7f2388aafb63c0e9b6832690d16233ba3cdc6bea2100ffdf340
CVE-2023-43959,0,0,83c13aec946e69662beede37eb4228952b206c148c530260e4f264992d519f45,2024-11-21T08:25:00.993000
CVE-2023-43960,0,0,cb9f587c2076d2cc3e6b162d728882e2ca0cc4f582aa12cc86c2ff36accbe2c9,2024-11-21T08:25:01.170000
CVE-2023-43961,0,0,b0da0c9c90e56ee0fb0ab58c3be4a325af3611079aebc3edf7e7e4214416d9b2,2024-11-21T08:25:01.343000
CVE-2023-43962,1,1,3c2e737c86c10db5923d84dded98752fbb682a531615470f2a39ace0be971ae9,2024-12-09T17:15:06.057000
CVE-2023-4397,0,0,b69f4c3d20ab202366757d95f79a88c2f27d0460070fd169b459d8743eb14286,2024-11-21T08:35:03.707000
CVE-2023-43971,0,0,41bdc86e97ea2b1f4563c03f92eb3c37c5cc33cc5c1ad1f7d295374596640d13,2024-11-21T08:25:01.583000
CVE-2023-43976,0,0,4c907705315556b177cdb72974fab7f1e8c606e3978f7955890965d88da55946,2024-11-21T08:25:01.757000
@ -239565,18 +239567,18 @@ CVE-2023-52355,0,0,299969b0386a5d4e00a55f41710eef8d0aae6cae26e8c4438026b903ba2e0
CVE-2023-52356,0,0,e2b4173e3711dff29cdbafe3aee754b4ad46c795b37babed1ee8e0680c17799b,2024-11-21T08:39:38.163000
CVE-2023-52357,0,0,c90b8cf2c9fd4f0bd5f3a1801bd62383f3576028919c434b9e3c4930a49535c4,2024-12-06T19:31:16.340000
CVE-2023-52358,0,0,679e2e237d26dd901e5362e4c57648ec437a5f80d5b79c7c2339a49b15deb0b2,2024-11-21T08:39:38.477000
CVE-2023-52359,0,0,ff18e88b4b58994f12b35c70b87c0864153f5479ca75a34a8e79d0b4d4dd31c6,2024-11-21T08:39:38.647000
CVE-2023-52359,0,1,8ae1056b22034998b04b67b0579601edf1e0c814a8ae597fc84e8da5336dd7a2,2024-12-09T18:03:10.427000
CVE-2023-5236,0,0,fae9024cc39ccab3805ebac406973d2b89825794dc9b312a2a604ded9d2e85e7,2024-11-21T08:41:20.950000
CVE-2023-52360,0,0,2ae6d167aca44c467363cfa116b322e0245a6cc9557f6d280d9db48522845f6b,2024-11-21T08:39:38.753000
CVE-2023-52361,0,1,e8145c184aa1d630e38e5e391cbf0efb13b269936042053c6de8ae608f61a2a3,2024-12-09T16:15:19.790000
CVE-2023-52361,0,0,e8145c184aa1d630e38e5e391cbf0efb13b269936042053c6de8ae608f61a2a3,2024-12-09T16:15:19.790000
CVE-2023-52362,0,0,cca2d71c2da0c2b88807682e84e3c999ea4b262377736cc94dd4e7f823176037,2024-11-21T08:39:39.033000
CVE-2023-52363,0,1,1efc93ff27c9e0ed79ac4263a98c1d302ac42e2af529ed93771693f4205a393d,2024-12-09T16:58:59.567000
CVE-2023-52363,0,0,1efc93ff27c9e0ed79ac4263a98c1d302ac42e2af529ed93771693f4205a393d,2024-12-09T16:58:59.567000
CVE-2023-52364,0,0,8842b05fdf7957284f22a5855579a5e6692c69e5ff63c87d9c145a6fd9002eb8,2024-11-21T08:39:39.330000
CVE-2023-52365,0,0,66b3aa8c202e776c932f573ca74d72fc75fb0fe4e0bc7842918877e028e8a8b7,2024-11-21T08:39:39.517000
CVE-2023-52365,0,1,8249e449c382bf103f593601398f5e898db23ffea4e1d1fc4923f891b092a988,2024-12-09T17:17:30.053000
CVE-2023-52366,0,0,07b6609071ae6cc3b0d3151364230bcfe76160d347b951aef190860f087fc919,2024-11-21T08:39:39.623000
CVE-2023-52367,0,0,a9bbe3a665e4f174b2234005de8806d7ac59286fe024826517a82e2d3c1224b4,2024-11-21T08:39:39.810000
CVE-2023-52368,0,0,5434397324a71463f0e1429dab997190a2aba8bdd8c6ff9feedb95f25b870e03,2024-11-22T19:15:05.250000
CVE-2023-52369,0,0,f0bec373e41e1e213b3999552ddfe941d1423e198db15d9b3412b5a31d1ad17d,2024-11-21T08:39:40.120000
CVE-2023-52369,0,1,e4e935aa65b0636d81711446862ca9d99eb3262109c6d92592111c4fc747347c,2024-12-09T17:33:32.693000
CVE-2023-5237,0,0,bf8b863edcb3c5dbd4e829c0548224833a285d1d6a3f96c65fa64c47ca318a53,2024-11-21T08:41:21.087000
CVE-2023-52370,0,0,46ceca081c2a100f8357cd3d4d4ef85d118d100cea450b5a55d488fc49aa9da8,2024-11-21T08:39:40.217000
CVE-2023-52371,0,0,3ac832a0c7bc01d08055143b4290f71f66ed73b79bd97e7c5b3b8df674620f0e,2024-12-04T17:15:11.513000
@ -239592,11 +239594,11 @@ CVE-2023-5238,0,0,807977fc52d43d4b2d6903903fcb9fad96cc921f84e7018a9ea85ba7ed384c
CVE-2023-52380,0,0,83b95a31ff44bdf020e6c048a01695d485d30044e44bae4cb41a1db8bd136184,2024-11-21T08:39:41.707000
CVE-2023-52381,0,0,363d5b52dd3644e9741f0cd3571af57c4384b2c99b996f4dd270aeaee3193155,2024-11-21T08:39:41.880000
CVE-2023-52382,0,0,ff68df838ff80bf3e32ebfcc4daa22b26645bb5f933b0ba12d2f456af89feb1f,2024-04-17T07:15:07.860000
CVE-2023-52383,0,0,3368b8a3ad0645c447f576a8627b093ef9755657fe80c2d294348a30285c0963,2024-11-21T08:39:42.093000
CVE-2023-52384,0,0,ad0af9af768e7361531e64117411d579e96cc2829682b8ce39844c4181c9f90f,2024-11-21T08:39:42.217000
CVE-2023-52383,0,1,0896518fe62d2dc21b46faade65b82e8d6a73652f759d7c438873c636b9520f9,2024-12-09T18:08:08.193000
CVE-2023-52384,0,1,a0858fe822f434a91ee109c6736810d86d6ed12a68ddf9d7a7cedbb99a49feee,2024-12-09T18:06:50.143000
CVE-2023-52385,0,0,9739dc590724519e2bd8d8b003f602e073e9a142e21357b3fa090fde7fc4814c,2024-11-21T08:39:42.330000
CVE-2023-52386,0,0,d4eddcef7a7ef2dce1cb476b683cf1138765b4df2f8b1c73fc6c13c352f0c904,2024-11-21T08:39:42.510000
CVE-2023-52387,0,0,8a25f0abeb22f987d2e840da346b431b7baf1b15603319208d79fcbe0d65fd82,2024-11-21T08:39:42.620000
CVE-2023-52386,0,1,7667d0ab20f6db0a1dbff02109554234cfbd5a2bd822ae87317ffa5d39405d9c,2024-12-09T18:01:30.060000
CVE-2023-52387,0,1,3d99858bf3c83afc762fdd0cc4d88bdd4bcf84d84fae7111e49cd817cb27f94a,2024-12-09T17:25:51.873000
CVE-2023-52388,0,0,24b262268b0b030ca11111daf98427d0398d848527509105d388ba1d5d3982c2,2024-11-21T08:39:42.763000
CVE-2023-52389,0,0,6eca20129afb6b0ed96b57299f5c69097046d1e5929e1dfcad109a793d1386e3,2024-11-21T08:39:42.947000
CVE-2023-5239,0,0,aa3068c910751efdd4f41d8455464b7a2e0a5af8561bfbc545ec908abd4a5b71,2024-11-21T08:41:21.300000
@ -239663,9 +239665,9 @@ CVE-2023-52471,0,0,94febae6d904829eb2ea0d4f4117155e5c20722b9d185be12cd130b03546a
CVE-2023-52472,0,0,0aa454ee3dc3fefe6e0390121b821dafba7154c91b4be9e5c4a523e7971bd792,2024-11-21T08:39:50.940000
CVE-2023-52473,0,0,4dcb40110b790208d94e9627f9d404ac488e84f847426dceac1d013b1db17730,2024-11-21T08:39:51.060000
CVE-2023-52474,0,0,84c6e644e79a3889fc0501312295e8ad306964d2dd4cfc75f85190c84c22c3c2,2024-11-21T08:39:51.210000
CVE-2023-52475,0,0,de794d10fa41a8b8056d508a9f63b017e4ff9467dc88b7088c0f11e4ba933525,2024-11-21T08:39:51.377000
CVE-2023-52475,0,1,3d9a0141d593fc226f4e01badb44b500fe631edd4140bed3bd76b4436a109466,2024-12-09T18:47:44.757000
CVE-2023-52476,0,0,e53001d01f4b985c1f7dfcc6c7a2188a17e48d6a024269ed895414b1f70b284d,2024-11-21T08:39:51.500000
CVE-2023-52477,0,0,06dc4d14e46f72151efb533b53d2bd48dd2efb032175b2f00bc3f48585503143,2024-11-21T08:39:51.613000
CVE-2023-52477,0,1,eb5822d237396c41c04f52728d9bf515c950801aef4f539b7f08b45f3cf87079,2024-12-09T18:39:35.613000
CVE-2023-52478,0,0,8a3021a109262143f0b35156235ea33c1daeabaac24b71d13e5011c8ce935528,2024-11-21T08:39:51.753000
CVE-2023-52479,0,0,e0ff4a7b0324404fe79eee53801e5fe13d6f1e2e9c91c97e5dab8f615a1780c2,2024-11-21T08:39:51.897000
CVE-2023-52480,0,0,cd04ea370d5bdea950880de8b151eed04d3c469cc9316c033c7f12aa23dc53e4,2024-11-21T08:39:52.090000
@ -239925,13 +239927,13 @@ CVE-2023-52711,0,0,292d4d31416cfc77e1fd0435f09d51ad7a6ee01d5d2c3c9a0958e494f443c
CVE-2023-52712,0,0,1009207ad2894126bd518771cf6dcdfb26dd8c8f96e53106cdeec3e71ba3f490,2024-11-21T08:40:24.993000
CVE-2023-52713,0,0,de6af38550e0c85a611046675f7763ec3d45059f76427f0389872a42693db02b,2024-11-21T08:40:25.107000
CVE-2023-52714,0,0,de14f64658c68077a848c9d7169099f947c3064891aa288f876f46274f59a0ec,2024-11-21T08:40:25.300000
CVE-2023-52715,0,0,b1f3c0f6d1b2497949beddce1eb0f1020a4db201b8aea16350f9507a8b420fba,2024-11-21T08:40:25.500000
CVE-2023-52715,0,1,40c133c7a650afa62e84d50889abdc2f10bf115a6958fb8619bb9f86fb85544c,2024-12-09T18:05:04.807000
CVE-2023-52716,0,0,e23e556efb2052738135a12d9d714c106a93095e20c11938c358672475db109d,2024-11-21T08:40:25.613000
CVE-2023-52717,0,0,6546ea96ba32ae2b161f65f20c7f1ad531534dcf0b1b8581277b1a6dce31a926,2024-11-21T08:40:25.807000
CVE-2023-52719,0,0,1e0cab61b54020fba4d46ec952758cbde553d541bc24a043c91cf37dc9149e50,2024-11-21T08:40:26.007000
CVE-2023-52719,0,1,e3f86bf719503ae7b09fa3135a17cf10d9dc9b4adbfb57625c3db8b69a7f3a10,2024-12-09T17:56:26.397000
CVE-2023-5272,0,0,949130c1d51c167844c00980241387d0dbe626155db80bf8abcfae1c9b6d3a57,2024-11-21T08:41:25.477000
CVE-2023-52720,0,0,fd5ed0984a7e555f484d90b83fe3a9318ce75a53f22f71b204b9d6e0bb9f92de,2024-11-21T08:40:26.130000
CVE-2023-52721,0,0,1b17b2bbe92cd3bfb675e9ec9c78e777219821cd9f394fb7b65d6d70e4c39cc2,2024-11-21T08:40:26.253000
CVE-2023-52720,0,1,1fa5ff90dc57ff4a909c38527eebbb867f48496aaf35189850d5ac665cce26ee,2024-12-09T17:50:44.797000
CVE-2023-52721,0,1,0a6cded3ec2ce0c6e4e86ac86856cd24733911f386bfb541eec02292ce145d80,2024-12-09T17:42:49.477000
CVE-2023-52722,0,0,7fff592201e192d157a623c15011a6628efe93145f4d58466ecb6cb2c367aa05,2024-12-04T21:15:19.983000
CVE-2023-52723,0,0,c2e65fb2b068a5bc13224aa1482e74fedc31b0d1c9ecc1f48361a0bac45c1cbd,2024-11-21T08:40:26.517000
CVE-2023-52724,0,0,88d42293847d2bda1d1e40f9b1423b933839db8ba74e9fdb2c35a76a9d329911,2024-12-04T21:15:20.180000
@ -240117,7 +240119,7 @@ CVE-2023-52887,0,0,0d1286d1fd4209a330667ff98e63ed3e6803035f882912b03256801e2841b
CVE-2023-52888,0,0,18afe284fe05584403ee42000a13b97c70cc514248ecd8ef4e02292acebc021a,2024-11-21T08:40:48.443000
CVE-2023-52889,0,0,34392a52ca43d868e2223bc9f9ecfe78432cb1a2a1e3b9d49e5aab4ac1828a22,2024-08-19T21:19:16.970000
CVE-2023-5289,0,0,825549f43e5069de927ae2e597f2d66761ec9b74bd9c7117ebce48e48ee86b88,2024-11-21T08:41:27.653000
CVE-2023-52890,0,1,3686551c68f4694378f14b24b6ca81d539cd1fa2b958a9aa5e7b1bc562a7d6f7,2024-12-09T16:15:20.003000
CVE-2023-52890,0,0,3686551c68f4694378f14b24b6ca81d539cd1fa2b958a9aa5e7b1bc562a7d6f7,2024-12-09T16:15:20.003000
CVE-2023-52891,0,0,611388b2151bc3596b52f3f17deda4a4cec1c530577cb9c28cadd0aaf4a905de,2024-11-21T08:40:48.800000
CVE-2023-52892,0,0,a2424d1819c23e5829563ff04f14ea59b16e0109c15a6682202cb4ed5ed77346,2024-11-21T08:40:48.920000
CVE-2023-52893,0,0,e254e3d1a410abeb830de8179f5cb0f7f310a208b744c1f05552c875de847393,2024-09-11T16:24:49.853000
@ -241959,7 +241961,7 @@ CVE-2023-7293,0,0,608de922eed5cceda3179193d6b4cf1cedf54328566b4cf84c64170cb80569
CVE-2023-7294,0,0,c39a7545702eccf7324c7475c3431bc7727f3b8eaa89f44e69b9bb7e469e84fd,2024-10-17T17:34:31.020000
CVE-2023-7295,0,0,4a7608f2a2d795efb64c4111b61d35269ed425699008d705c364c26130b3fe7b,2024-10-16T16:38:14.557000
CVE-2023-7296,0,0,5ffec4c2a7c81b387e2e7306010865ffc272336786db444e086a2ff96bd6c35e,2024-10-16T16:38:14.557000
CVE-2023-7298,1,1,5ff0d25d55c95b448074efa3fc34ded204941c0823744d7ac2b4ad42616f6f2b,2024-12-09T15:15:11.333000
CVE-2023-7298,0,0,5ff0d25d55c95b448074efa3fc34ded204941c0823744d7ac2b4ad42616f6f2b,2024-12-09T15:15:11.333000
CVE-2023-7299,0,0,f8ba3831fb16272b6390e22d6eaa25d74661688ce5f857119dc4946c9fdef8e8,2024-11-26T19:12:43.750000
CVE-2024-0001,0,0,a3803d5da55711ef7259e1abe303432c001f8021792dbcb3d58baa5f1fc32304,2024-09-27T14:08:57.327000
CVE-2024-0002,0,0,62be75bb877da347c07ffaf17dbd26e07bdfc8e85f8e86a969ec56eaba9c8a5a,2024-09-27T14:13:24.427000
@ -241968,10 +241970,10 @@ CVE-2024-0004,0,0,1b8c62d2193a196f870552d0383c2356a96fe6d6e879c52a808652dde3e98c
CVE-2024-0005,0,0,c1b46be761daab0f199b2e955db689a7fdce0be33ba22a853a2cd45bcbce581b,2024-09-27T15:25:40.980000
CVE-2024-0006,0,0,e8a9df5fdb359226a97a57b98820cbc8c78921c1c1ae8b0a4ad47a3dcf433c09,2024-11-21T08:45:41.097000
CVE-2024-0007,0,0,86a00a41e3750ffbb1a24b56b57ea25294a9d80fa4cf2f72d99c3a834512b703,2024-11-21T08:45:41.250000
CVE-2024-0008,0,1,f3a0e819c9497c2b0a342098a12d293c5c599f8657da82ca7edaa709641c72ed,2024-12-09T15:18:26.907000
CVE-2024-0009,0,1,2705c70b35d4cbd0491e81eb024f836acd6b6b1ca2b25c3adbf3699cab842c62,2024-12-09T15:13:34.713000
CVE-2024-0010,0,1,31a4fe9c570d054c731419e8dbca609fd313e658d7d97a146536a70ebab80db7,2024-12-09T15:08:43.783000
CVE-2024-0011,0,1,0cdc1a416dec7958965d013c501cb250e08e95b67733c03001a98f99c411ee1c,2024-12-09T15:05:57.857000
CVE-2024-0008,0,0,f3a0e819c9497c2b0a342098a12d293c5c599f8657da82ca7edaa709641c72ed,2024-12-09T15:18:26.907000
CVE-2024-0009,0,0,2705c70b35d4cbd0491e81eb024f836acd6b6b1ca2b25c3adbf3699cab842c62,2024-12-09T15:13:34.713000
CVE-2024-0010,0,0,31a4fe9c570d054c731419e8dbca609fd313e658d7d97a146536a70ebab80db7,2024-12-09T15:08:43.783000
CVE-2024-0011,0,0,0cdc1a416dec7958965d013c501cb250e08e95b67733c03001a98f99c411ee1c,2024-12-09T15:05:57.857000
CVE-2024-0012,0,0,39c96b315f311cf70d7acce2e03df6f2da2b13764db334539ea5108a55d95b48,2024-11-29T16:15:08.167000
CVE-2024-0014,0,0,a514a1950480e7f9bd6d2b0479bdf6d8eabc18062a516167365171d24e340d30,2024-11-21T08:45:42.070000
CVE-2024-0015,0,0,5c292229b8569e23d3bf0bb743f59f8029c87a83140321ff16a9857864d6a668,2024-11-21T08:45:42.267000
@ -242561,7 +242563,7 @@ CVE-2024-0665,0,0,552c8684a2844497147020408e57c622ed81fe7a8cc593078ffc2ead78030b
CVE-2024-0667,0,0,f5f103194b3656d631ab2bfdc1f243308af12a5364e88eca524e4b8d5e4491ec,2024-11-21T08:47:06.217000
CVE-2024-0668,0,0,cf3ce5b6cd15a93b5462ec5dc3c553947f85e8488a4476ed84f1fdafc3644eed,2024-11-21T08:47:06.383000
CVE-2024-0669,0,0,cf41481f5d91785338317ab35c5edc3edd55b112198fb80f380ce0ab680fdf04,2024-11-21T08:47:06.537000
CVE-2024-0670,0,1,f3defca33aa392c91110a18ccd761c9d178c4a8c7e92871d4cb0c526239ab1c7,2024-12-09T15:02:35.320000
CVE-2024-0670,0,0,f3defca33aa392c91110a18ccd761c9d178c4a8c7e92871d4cb0c526239ab1c7,2024-12-09T15:02:35.320000
CVE-2024-0671,0,0,8fa9e2d8b38e9c6028f0684357d97100a6ed4098f84b60d38f0bf0e41674b4bf,2024-11-21T08:47:06.790000
CVE-2024-0672,0,0,03304453a76325920f2b136aeeaea5b128e31d5152b3bd11532994167906dc10,2024-11-21T08:47:06.993000
CVE-2024-0673,0,0,c04a848e9434b3b5f218b17a95e018cbdde6019c99f8f123aedb898dac1be18b,2024-11-21T08:47:07.170000
@ -243778,7 +243780,7 @@ CVE-2024-11178,0,0,88fd37ec83f58799851dee6171e6aa96459a237aab617357fda7452771f05
CVE-2024-11179,0,0,2a87bc62a362e211ae17ea453524a898abcf67a89c893a61d47fd0db253f5242,2024-11-22T16:55:03.947000
CVE-2024-1118,0,0,5892c5cb5035116962f7e30650f1b71bd45f8ad30b4b01eab037a4e1aa660536,2024-11-21T08:49:50.390000
CVE-2024-11182,0,0,839f1685ea34a3c272b2d127eef16ed28a29a569b605edcbd45f80cf77986f43,2024-11-21T17:15:10.683000
CVE-2024-11183,0,0,187fbdbb4171509d71ccef34c529fe0d8935deb2251a1314959bc55e2e7386cc,2024-12-07T06:15:17.760000
CVE-2024-11183,0,1,8282c9e1f772506d9f5acf45e96feaf2b371bed80c8a40149bb54b67928d899c,2024-12-09T17:15:08.327000
CVE-2024-11188,0,0,8070c22ab1552d28f4790f36fbb035b9ddec6883502131d83e84861dfa7e75e7,2024-11-23T06:15:17.570000
CVE-2024-1119,0,0,fd6fae855233e3069d5ad6668474ced6e974623a6a3e8b05b97956b4e3b84a10,2024-11-21T08:49:50.530000
CVE-2024-11192,0,0,622aba98a27076a2a021a04e2ca8d2d8e68f9a0f8f389faf864ac66d01cca101,2024-11-26T09:15:05.563000
@ -243845,6 +243847,7 @@ CVE-2024-11261,0,0,ebd0147e6a6ab1ab0e631a63b82775c203c78389943f8839aa447a17b71fc
CVE-2024-11262,0,0,2fc2d8fe2ec6c0e4d2457bea194bb9fd27c0134f7b30d56376be41870a4428a7,2024-11-21T20:52:29.160000
CVE-2024-11263,0,0,cc23e994a38bc31df951aa6a58125fc0f0777c81e47c57f81b464948cdbf25e8,2024-11-18T17:11:17.393000
CVE-2024-11265,0,0,cd84e375ba34be8f1d8c0a95984eed473f1b4c14b99dc4b41ab53021d7d29454,2024-11-23T06:15:18.310000
CVE-2024-11268,1,1,40373fcd315fe487c851607fe3ac45b00147e2cbb2f06b71a2f20cd5b3490696,2024-12-09T18:15:22.120000
CVE-2024-1127,0,0,156ab4f781dcbea8349dccaf03d8331b37e207b23f13868177d2fc6d72956211,2024-11-21T08:49:51.547000
CVE-2024-11276,0,0,bec6f6d7f70ddc5f33f40077c2ca48024f960e5925873d26e2cd076944abd586,2024-12-06T09:15:05.827000
CVE-2024-11277,0,0,70fa881c494ed4e8a3131fb313821feca0fce09e01d4dad197524b7869b481b5,2024-11-26T20:59:50.643000
@ -243958,6 +243961,7 @@ CVE-2024-1145,0,0,71ba2561916ff383446b1b9365376abadae467a3a4b7425691a59ca4e41768
CVE-2024-11450,0,0,d2ee04496c8c47519fdfbff6c2f51d7916dabba900f086e73e0187f4c8852e0a,2024-12-06T09:15:07.137000
CVE-2024-11451,0,0,d0b7cf969a403cebc755ec34b71b18063f6827d32041fd4d2464975b177b871d,2024-12-07T02:15:18.117000
CVE-2024-11453,0,0,5ddaa320fe1d4d03e381c657f388a7d4f2fbdff28eda17ec4fc3bcaf67d9e87d,2024-12-03T08:15:05.830000
CVE-2024-11454,1,1,11bea57294fa8ddda0d77d91ef3b87154afded20ad3b2f4a4febd301a56d3475,2024-12-09T18:15:22.400000
CVE-2024-11455,0,0,2585d76118af0f8584c93ef70fec17184fe9addb803068b4dbf20f8e44717637,2024-11-21T13:57:24.187000
CVE-2024-11456,0,0,caed410cc4ff433ff7bd202facfe4d5c9fb8adc8fa56de727455be9f30014705,2024-11-21T13:57:24.187000
CVE-2024-11457,0,0,dc958a057e14aaf0bac1d84a97aba310277651470f8b4350a842ac60ecf5d248,2024-12-07T12:15:19.380000
@ -244087,6 +244091,7 @@ CVE-2024-11596,0,0,6343cd2138cc057262127834530bb4e7d4aee6e59c66c3eb257ce4b183831
CVE-2024-11599,0,0,a26c993827526d1af73bfe90f868b9bfb9a722b6b2267b567215827aef919d86,2024-11-28T10:15:06.657000
CVE-2024-1160,0,0,12b04de1fea0a3119efc89b33ba5d2f3d172880f1becfa13297009e56b4efb45,2024-11-21T08:49:55.987000
CVE-2024-11601,0,0,51a555e6d26623f2054da12f000d146e4e1662608f2c3f75f4d4bafe7cada303,2024-11-22T06:15:19.830000
CVE-2024-11608,1,1,6cf5c3e3418a0e4339437177787fdafa44296484ae5ff69442aaa8fb81e4e67d,2024-12-09T18:15:22.580000
CVE-2024-1161,0,0,68cc61ca71a85d6059ad02181ec1fb4a89655dbd3db8900d271e7a26ec14fb67,2024-11-21T08:49:56.127000
CVE-2024-11612,0,0,bb444eed2bab8dc9d7d3d2707a19c782bc9311cf8cab3a2875a904169993bb7a,2024-11-22T21:15:17.387000
CVE-2024-11618,0,0,faa524e213716321f8f8b440fa9593fea7194f824084fdf0ccb0ec4689ef9c66,2024-11-22T19:15:05.437000
@ -244273,7 +244278,7 @@ CVE-2024-11983,0,0,b28164039b0dc59ec068d9e4704804a0da409a26a86a99d005cfe1af9f1df
CVE-2024-11985,0,0,347bd715be95eb6539997f812c032a6ace7cec9111ea8a772c8788473da7f21d,2024-12-04T02:15:04.237000
CVE-2024-1199,0,0,60ffbfb4cdc00bf543d03a59b91efea487f9cf6b0b352d45a15655d219ef20c9,2024-11-21T08:50:01.340000
CVE-2024-11990,0,0,d3429cf8c53343ced24272b548e57b9820685f26a76c9d0b20da4abeed376b1f,2024-11-29T13:15:04.170000
CVE-2024-11991,1,1,49f7be0e41f58e2c5612446deb4753a827a3c48c90ab2a9762a91507592309ad,2024-12-09T15:15:12.203000
CVE-2024-11991,0,0,49f7be0e41f58e2c5612446deb4753a827a3c48c90ab2a9762a91507592309ad,2024-12-09T15:15:12.203000
CVE-2024-11992,0,0,5f6b3fe9a02fed360db85448439236baba3d6f232621fa4adc9c2b6319c7be24,2024-11-29T13:15:05.210000
CVE-2024-11995,0,0,2072ff09f6a8d91ce5a6cb9ddb1c925e662d777c56c3ca9e5422a4217a97baba,2024-12-04T21:37:07.487000
CVE-2024-11996,0,0,c9890e109cbd3473a593b35fd7d1b915d4d2a7a9695a33296844a7786a35e6d8,2024-12-04T21:29:13.483000
@ -245855,14 +245860,14 @@ CVE-2024-20915,0,0,f852f9d621dbe476272a13be7b03d53dc0be6023f688a8a9cb1a698648020
CVE-2024-20916,0,0,03fdcf606ca122e97f7398db4da76adc9fb1859a897695457491997ea033b531,2024-11-21T08:53:25.550000
CVE-2024-20917,0,0,88063e310fdfa917e1b9d40d36604d772b4b7af571f1dc922f92be5dbb09229a,2024-11-27T16:31:52.210000
CVE-2024-20918,0,0,caee60732d5ec26c3cb53b1e9ddba3bd8ee64d2ed22bf47286592898e408bfd4,2024-11-21T08:53:25.790000
CVE-2024-20919,0,1,82615c43cf812687b173b8c21c300cf6f203bc636801eba014a01cfa597e1188,2024-12-09T16:42:40.380000
CVE-2024-20919,0,0,82615c43cf812687b173b8c21c300cf6f203bc636801eba014a01cfa597e1188,2024-12-09T16:42:40.380000
CVE-2024-2092,0,0,6ccee07043e9fc5c881ef6b3ba79c1e86930438661444ebd449ca22634094d1b,2024-11-21T09:09:01.607000
CVE-2024-20920,0,0,32834b70f531497f9ba9fc4347e8cd8ec172418e5337e20657892c1dc66f10fd,2024-11-27T16:07:37.487000
CVE-2024-20921,0,0,a78bdd53686eefe20fbf47b0c909c11dfdcb2d93a73c65578eacdebe191f5d12,2024-11-21T08:53:26.190000
CVE-2024-20922,0,0,ddec93011f35efa6c0100b01606a203b151e676c272b5c6e2c001180fbda7fd3,2024-11-21T08:53:26.313000
CVE-2024-20923,0,1,ad2677eabba824fa6c73ef38bc5220008979761c75cbf06f51eaf994a3653b51,2024-12-09T16:43:24.443000
CVE-2024-20923,0,0,ad2677eabba824fa6c73ef38bc5220008979761c75cbf06f51eaf994a3653b51,2024-12-09T16:43:24.443000
CVE-2024-20924,0,0,6696eb44649258a777624d23cb49fa99280b9707737aa5d67f5a22ba698986fd,2024-11-21T08:53:26.553000
CVE-2024-20925,0,1,79e5a4d99a70464c148e60d5cc68ebbb4aa6f53ab1e00393abd1415cdadf03d3,2024-12-09T16:44:10.737000
CVE-2024-20925,0,0,79e5a4d99a70464c148e60d5cc68ebbb4aa6f53ab1e00393abd1415cdadf03d3,2024-12-09T16:44:10.737000
CVE-2024-20926,0,0,76d4246dcda29824b0116625013c1c020b190258900cddbc68d057b4e3a565fe,2024-11-21T08:53:26.797000
CVE-2024-20927,0,0,ca55ea8249dd6da5bce45be24e758d5916de4e68aac8cb4e1500a7b028f69ab4,2024-11-29T14:08:26.950000
CVE-2024-20928,0,0,f899f7f661fec3b37d33a9edf522b5c93f56abf2b9527ffe59b04e93771f608e,2024-11-21T08:53:27.050000
@ -246786,15 +246791,15 @@ CVE-2024-21909,0,0,5935a0bac56f64a585bf3a5d3a58749af3bd9b1b55e7d4698137044246734
CVE-2024-2191,0,0,2ea7af8dfa3f2d954261631f5f16de3015020c3ac677923869e661d02374a882,2024-11-21T09:09:13.543000
CVE-2024-21910,0,0,cbc277b52828b6f42ba8f990f48e48761bee9669b10721072e9f971531fa5b89,2024-11-21T08:55:15.320000
CVE-2024-21911,0,0,ecf2241468adf940e2c0a2f0db8992eda0c6792ed4a6f3737c2295eb4920e7ae,2024-11-21T08:55:15.477000
CVE-2024-21912,0,1,582ec5203997d71ac0d1056ed47fe2417de67c4c6aa7cffe8ec76cfed2576539,2024-12-09T15:13:40.437000
CVE-2024-21913,0,1,479b5dd08769265b5661e21b75669cce61442e59290ecf0b015bb7ab2058f5f3,2024-12-09T15:18:28.870000
CVE-2024-21912,0,0,582ec5203997d71ac0d1056ed47fe2417de67c4c6aa7cffe8ec76cfed2576539,2024-12-09T15:13:40.437000
CVE-2024-21913,0,0,479b5dd08769265b5661e21b75669cce61442e59290ecf0b015bb7ab2058f5f3,2024-12-09T15:18:28.870000
CVE-2024-21914,0,0,9be91234e3a87100bb31a25430bfb3372edd3b42a557333c44d4254d13220f1f,2024-11-21T08:55:15.933000
CVE-2024-21915,0,0,8c0430bb5e7ac4cc862ad2a195a44bbc5e010c1744697d9d9f20c657c2a55d8a,2024-11-21T08:55:16.073000
CVE-2024-21916,0,0,281122525b18b4c37d709679826f35f553f234e6aca4e9b21e208465570118c1,2024-11-21T08:55:16.243000
CVE-2024-21917,0,0,4596cf747d33ef750330f71a8f984548ddf844a5b7fe1daf92e4333c822c4a23,2024-11-21T08:55:16.427000
CVE-2024-21918,0,1,a67329e256c4a4c8d9d647b0d42114dbaccc94d666d01581e4b8a2c6d540f918,2024-12-09T15:18:49.257000
CVE-2024-21919,0,1,6a2ea2d36bfd9815f995257ec3866a9a00d218f95f358b27ed201742ac4bb1d8,2024-12-09T15:19:18.887000
CVE-2024-21920,0,1,bf2deb075eb15a4c0530be1906a9a5c994a655add6c3a2fee78ba64b2ac87c84,2024-12-09T15:25:59.723000
CVE-2024-21918,0,0,a67329e256c4a4c8d9d647b0d42114dbaccc94d666d01581e4b8a2c6d540f918,2024-12-09T15:18:49.257000
CVE-2024-21919,0,0,6a2ea2d36bfd9815f995257ec3866a9a00d218f95f358b27ed201742ac4bb1d8,2024-12-09T15:19:18.887000
CVE-2024-21920,0,0,bf2deb075eb15a4c0530be1906a9a5c994a655add6c3a2fee78ba64b2ac87c84,2024-12-09T15:25:59.723000
CVE-2024-2193,0,0,d1b5d58eb23650603dde2193fa058a7052b07b528230b86e43f08c6748cd11c1,2024-11-21T09:09:13.693000
CVE-2024-21937,0,0,90d04fbe5cbba2725914398811e0d2326e8d3f32641d17075b562e1968ddb717,2024-11-27T16:20:37.073000
CVE-2024-21938,0,0,e6f1d051234de7989356f79ac1506a864dad401661a64b1d6a053bafbf88e120,2024-11-13T17:01:58.603000
@ -247632,7 +247637,7 @@ CVE-2024-23225,0,0,9dfb819681987b4a5a9414d770000d224347f0f554d029e87276f60932096
CVE-2024-23226,0,0,d35555d4d9166169b2d9ebc0c0d3ddd8a6739dcc9d000507c64ae35e59ee757e,2024-12-05T16:33:06.327000
CVE-2024-23227,0,0,eeded3365b3f5ae72b53b6766c3f1571c46876b65611fd208cdef323d44e0e7e,2024-12-05T16:31:39.383000
CVE-2024-23228,0,0,a67ec93888182560fa3ecedb0d6dbec60120398f3f2564c34886778ff454023e,2024-11-21T08:57:14.487000
CVE-2024-23229,0,0,5df223dfbeb5ecee68adb56684c948ea7faad79b927120be8af74d13fcf42829,2024-11-21T08:57:14.660000
CVE-2024-23229,0,1,b503f4043ad887688ebabe0f99f6dc2e750bec5ee240a1c13bf5cff65542fd4a,2024-12-09T17:37:58.303000
CVE-2024-23230,0,0,156b934172dbb493756c9b28b3091ed6cf989cf09f6556b0519517d3a710f9a9,2024-12-05T16:29:16.003000
CVE-2024-23231,0,0,ba1d2593aea3c4c4a174d2e33b5049749196fa54034828f6beef5b71f462e4b8,2024-12-05T16:27:10.467000
CVE-2024-23232,0,0,2d4ff156fd4bb5acfd4c77537307a7232bbe750b532071870b7076c67ef970f3,2024-12-05T19:50:23.700000
@ -247702,15 +247707,15 @@ CVE-2024-2329,0,0,c472c56af83ede4ff6dbe12bdecc2fd77c4f73580e83ea55ebdd9db6ae395c
CVE-2024-23290,0,0,5f2cb9f63febc3183c4545b31771397a8bd37a4b321ee9286f926f123fca54d5,2024-12-09T14:51:21.537000
CVE-2024-23291,0,0,d99c154998215bddb9fca72a77eb17762f4b5c062f2ea35eac6a14df0d0810cd,2024-12-09T14:41:40.010000
CVE-2024-23292,0,0,bc50b53ba7fc65e1b34d769e31ab336ca0f8e999265f13d76265950343381436,2024-12-09T14:39:31.653000
CVE-2024-23293,0,1,d58b5f27056e68bd03b53bf47f5a1d1e1ad4098d585ea2403d8a798a0b2f0289,2024-12-09T16:19:06.307000
CVE-2024-23294,0,1,cada88db211fe9d398c8417c264ee5745765f39de0ee8dbdd7036758c5310c0f,2024-12-09T16:16:05.597000
CVE-2024-23295,0,1,b9bc21e6e4256230eb4f3c16a88e9c46286188aef9199fc0975ac3a816885626,2024-12-09T16:09:27.130000
CVE-2024-23293,0,0,d58b5f27056e68bd03b53bf47f5a1d1e1ad4098d585ea2403d8a798a0b2f0289,2024-12-09T16:19:06.307000
CVE-2024-23294,0,0,cada88db211fe9d398c8417c264ee5745765f39de0ee8dbdd7036758c5310c0f,2024-12-09T16:16:05.597000
CVE-2024-23295,0,0,b9bc21e6e4256230eb4f3c16a88e9c46286188aef9199fc0975ac3a816885626,2024-12-09T16:09:27.130000
CVE-2024-23296,0,0,a165defb5fb358d9bdbb4a0d0914eb6506b00c6e96be9d339a3b3ffed7f126c7,2024-11-21T08:57:26.477000
CVE-2024-23297,0,1,30f7ae35603cb3fdf468d260c3681252597c2f5392d5a475631d593e531bfaac,2024-12-09T15:06:14.650000
CVE-2024-23297,0,0,30f7ae35603cb3fdf468d260c3681252597c2f5392d5a475631d593e531bfaac,2024-12-09T15:06:14.650000
CVE-2024-23298,0,0,801dc4397d9cb442b2a863f1bc826d70b8fd4009aa54eb2ce4e4f0bf9137623d,2024-12-09T14:44:22.810000
CVE-2024-23299,0,0,a4c59975d9e4debf492651a9710e74c1d53dab4df40f27acc3fdd4d1a0a06c1a,2024-11-21T08:57:27.153000
CVE-2024-2330,0,0,cdcec8973933eb0cc3358dc4fd7944cf2c999cfac8dfe75d740b313d9c04bdc5,2024-11-21T09:09:31.107000
CVE-2024-23300,0,1,92499b814981e53b75c7050bbd8ce71be76456c250b43f7da58ee0c441188ec7,2024-12-09T15:00:30.860000
CVE-2024-23300,0,0,92499b814981e53b75c7050bbd8ce71be76456c250b43f7da58ee0c441188ec7,2024-12-09T15:00:30.860000
CVE-2024-23301,0,0,0736d725ddc84811b8556172b804f1fab47c733216f8f43a8e03e7c70d0a8e99,2024-11-21T08:57:27.587000
CVE-2024-23302,0,0,e8564aad27884281f644150b7460697a2ad50fe269196745d2a8da50b31b486d,2024-11-21T08:57:27.757000
CVE-2024-23304,0,0,92c39ed25142e10292f4cf492619ffe50eef087dc223559e6d3336ffb6a74a4d,2024-11-21T08:57:27.987000
@ -251093,7 +251098,7 @@ CVE-2024-27812,0,0,990107596f1e534025072a9bc1ed03a11b1fa3c1694782e485345ceb7b5df
CVE-2024-27813,0,0,9fd3d78eaadb328fb96d7f9c8d9432d69e9edc72de8ef550fd8fe801449c3430,2024-11-21T09:05:07.850000
CVE-2024-27814,0,0,a8f1c9abd07f6955526f110808053a26f5e88f4fce2a4eb46b087a3616519c3c,2024-11-21T09:05:08.047000
CVE-2024-27815,0,0,193b5220cd8f10dd9ee9ca9a7a47183212b5114c55a334e29aa9c7e47768ef54,2024-11-21T09:05:08.303000
CVE-2024-27816,0,0,35a457ea82386de5c3c57994607da2450e8ca5de7e3cdb79e61b416508519adc,2024-11-21T09:05:08.583000
CVE-2024-27816,0,1,334654513b3404ade23d9a46bafe4c56a1306444c7c3ccc6c50e0d2d5deb8afa,2024-12-09T18:59:05.477000
CVE-2024-27817,0,0,6dd9dd975d0fcfe58238d9ba3ba9e1921b514abadfa496cb71844ef21c201d0f,2024-11-21T09:05:08.793000
CVE-2024-27818,0,0,a7996a2f0384da3aa39e60087bccb8d7a543af628f9ff7118e9ba5e6fd416dd5,2024-11-21T09:05:08.990000
CVE-2024-27819,0,0,af5349cb7fb8018051d3446391b7c541613e37fd1a57a702dbccd3af5f1ae345,2024-11-21T09:05:09.137000
@ -251167,7 +251172,7 @@ CVE-2024-27888,0,0,633b1fd9b17029c1bb97812a74a21435207d5c19ad7127db495ab2f4e8078
CVE-2024-27889,0,0,9baa87884a3e66fc5756c9ced2a8ef947001f8941593056f52c6dadb55724bf9,2024-11-21T09:05:21.780000
CVE-2024-2789,0,0,ea7cc59fd040ec8486f5414eb2adec79c9e64461c463ff35ba3f144bf7febd94,2024-11-21T09:10:31.330000
CVE-2024-27894,0,0,a529ce9447bf5cccdc79592c335a904880367559eca12c605a0c1c557584b199,2024-11-21T09:05:21.910000
CVE-2024-27895,0,0,93af3569dc57b88528d2c5158e90e0c0e3632e2bf9d5b9d087c9e3fbeb51030f,2024-11-21T09:05:22.050000
CVE-2024-27895,0,1,d55175960df25787806e528bf2b5b0b690105cc86f51c145001c192d4b0382fc,2024-12-09T17:59:55
CVE-2024-27896,0,0,cefb57e4fd2360f9ca76121f5d55c0879f2b9778073436f6d450ff9f01865a42,2024-11-29T15:15:16.833000
CVE-2024-27897,0,0,e0fd628e199d1ad9f7d1973d04b30e3b226e987f2d07bcbb58339313ac383abd,2024-11-21T09:05:22.297000
CVE-2024-27898,0,0,af89e17a8df4c3a779fd434e3e11879bb6cd54de374fc7845601631da86da367,2024-11-21T09:05:22.490000
@ -252185,7 +252190,7 @@ CVE-2024-29275,0,0,04d24ec0b09e8992b316d39205c49d05d0ba002c7de004a46972837ba649a
CVE-2024-29276,0,0,e492e2b9f2cab402ec63c3351f8ac901d3688e777b31189c69f2d34536b203c2,2024-11-21T09:07:54.710000
CVE-2024-29278,0,0,810e815ceeacd459126cd2f0be1468e4723065d75f15ecab73f4c892d8b4bcaf,2024-11-21T09:07:54.933000
CVE-2024-2928,0,0,4f9d141452f84e180c0e1f09f7c8fd6e6fdfae447a1da31584938ee63d171ea3,2024-11-21T09:10:51.707000
CVE-2024-2929,0,1,35ed38ef35fc586445744602fbd90e8c5ed2a7792d6373bebc9abdc196f2f9cf,2024-12-09T15:19:43.377000
CVE-2024-2929,0,0,35ed38ef35fc586445744602fbd90e8c5ed2a7792d6373bebc9abdc196f2f9cf,2024-12-09T15:19:43.377000
CVE-2024-29291,0,0,011f8488ffac815fc965cf07e1d05d94882b32dd339c3222247d202650b0be1a,2024-11-21T09:07:55.147000
CVE-2024-29292,0,0,00ea6bc4c302c327c3044fa68f8f423ad9fef8aef7e6a4e9a713883b77891c38,2024-11-27T17:15:10.383000
CVE-2024-29296,0,0,831ce2ec626a36a66b1383a816d653550dc19f16f98ff950995d327391a02479,2024-11-21T09:07:55.420000
@ -253003,11 +253008,11 @@ CVE-2024-30407,0,0,3406d1368ddd83e61968965dc4c4570bf87e9ccfa14bdcb20ff4987c446bc
CVE-2024-30409,0,0,1257bf5cfad34503887faed5a1d0aa49fca3d3bdbc9036665686f682de6a5955,2024-11-21T09:11:51.607000
CVE-2024-3041,0,0,6f2bffc2e1a437822437c063857217532c383d64d6768a16e1a8a163af570748,2024-11-21T09:28:44.667000
CVE-2024-30410,0,0,a909b12a46475b577428947e22bd0155dbc46a7b2ba10e40ec29308d3781e22f,2024-11-21T09:11:51.757000
CVE-2024-30413,0,0,f290b859c5de39c596fecb2deb73827efd40e42cf13ead623cd7fb1884ddf4ed,2024-11-21T09:11:51.913000
CVE-2024-30413,0,1,8b2fcb61d9248313939f7e26b7251e9fe525eb574f922f425a89ae50be45b77f,2024-12-09T18:33:13.660000
CVE-2024-30414,0,0,1cbf0e27f204f782c07469ae5f2be612236272d538f377b4392129fdcb02311a,2024-11-21T09:11:52.047000
CVE-2024-30415,0,0,fd280c5c87e2b4090f2d65136432e219d0920e7ac6771b8b662f7b008a1b9bfa,2024-11-21T09:11:52.227000
CVE-2024-30416,0,0,142a4699c921d39a6a1085b38da457359d5ae8dfbc5ebeccb2654877c0be3f94,2024-11-21T09:11:52.417000
CVE-2024-30417,0,0,902baa1d0c3b596c406d02ecb026e6b4b1c7a260a7ce7bc23d3cd0568d919242,2024-11-21T09:11:52.613000
CVE-2024-30417,0,1,2cf21bb8014d9ec6a1076bf83313210b449483943717552923dc32d6eba112b8,2024-12-09T18:04:36.110000
CVE-2024-30418,0,0,ce97772cc55f1a45081c10537d2ef24ef510491122d6cbf04b45dd6e108ac342,2024-11-21T09:11:52.750000
CVE-2024-30419,0,0,4ce0d791ec8405789a5547d96555f558222fea0d6abb07ca21579b1a05f2e1e4,2024-11-21T09:11:52.950000
CVE-2024-3042,0,0,1035f79872360bc59d8efaa2fba122980688369c23f92dd365edadbcbff99c50,2024-11-21T09:28:44.810000
@ -254976,10 +254981,10 @@ CVE-2024-32991,0,0,2c7277e28c9eb509d66d97becceef965a9e46fd34c0fb24a39e358bb29dac
CVE-2024-32992,0,0,947675130a6687abb743584fccafbdf8771854399c05b5de97b7d2a596785221,2024-11-21T09:16:11.353000
CVE-2024-32993,0,0,9445a6e22189ae927753acf9ddbc712f526d1d91f7da507a5f277906f9a38c00,2024-11-21T09:16:11.490000
CVE-2024-32995,0,0,aeffb768cdf28ffc69a211cdef3f7d51324f033a181f8a3d657abc7b4a568109,2024-11-21T09:16:11.617000
CVE-2024-32996,0,0,ea522bae2119b100e1a611b11f3046ec8d4e60679214e18626e19902c687e192,2024-11-21T09:16:11.750000
CVE-2024-32997,0,0,446e772317494682031276db764fcd3a2414ed0c8380bfe81376c89f15af0713,2024-11-21T09:16:11.883000
CVE-2024-32996,0,1,aee47e292323f0b1ac0f535b43c3a37fca8ac7bf60eafb7a1882f9a9e3e5b511,2024-12-09T18:58:59.707000
CVE-2024-32997,0,1,16b204fc96dade669fd3a53adf13a4e076119183aafbf915ca2694b992d4b857,2024-12-09T18:58:20.347000
CVE-2024-32998,0,0,56c2ea1fe16943c1b06539ce3757809e90b58c744e277dc3131f6232c32c27d8,2024-11-21T09:16:12.010000
CVE-2024-32999,0,0,f1b1c8eab0c29b6ec7dc35fe25e0de97340a0bf45568d64d38ab17a68a13de53,2024-11-21T09:16:12.177000
CVE-2024-32999,0,1,6e959a912329eea6e61320b09e9163efb374fb1fa74fb1dec28b788a4ff0c09c,2024-12-09T18:56:00.350000
CVE-2024-3300,0,0,10b7944727abf580c9c94c5b92a3ae6b06ef8743518dbae298659025a0f586ba,2024-11-21T09:29:21.023000
CVE-2024-33000,0,0,d0e838ba171750e3dd68b72d1943ad9a489b3d26cf99a8e2920acaa7770082e3,2024-11-21T09:16:12.320000
CVE-2024-33001,0,0,c8517307e4a2fe0de658fdf748b66ea42fb0bfce716df6c01db2cf511db1049d,2024-11-21T09:16:12.457000
@ -255067,7 +255072,7 @@ CVE-2024-33118,0,0,01cf7fb9b011c86aa5f92aee373c394da860653f62b9c7477080c66ec6094
CVE-2024-3312,0,0,5f7abfea07e26708b46deb725eba9cf7ab27075e45367056ede9366567e02312,2024-11-21T09:29:22.277000
CVE-2024-33120,0,0,7094ed2e2c8867eed04a8bf7f024020b82201e3116aeac9b73dd9d08316fa332,2024-11-21T09:16:32.870000
CVE-2024-33121,0,0,4d0cdf195b7af822ecf9552669fca899ba17446d26e82e19dc60b2b08d04c551,2024-11-21T16:15:24.297000
CVE-2024-33122,0,1,0868bb01e4bb9981dec89f062640d42956a3e024a237db623c97f8abe8d232bb,2024-12-09T16:15:21.853000
CVE-2024-33122,0,0,0868bb01e4bb9981dec89f062640d42956a3e024a237db623c97f8abe8d232bb,2024-12-09T16:15:21.853000
CVE-2024-33124,0,0,e8e7fc9b3f4c3c20a2f001aad74eca1df30a4dbfa8749113ee0a19aea169d675,2024-11-21T09:16:33.437000
CVE-2024-3313,0,0,6e8cdb5d7eae798bbd013f2c09830c63055cded6e685f9624b5c28fb30bc07d5,2024-11-21T09:29:22.393000
CVE-2024-33139,0,0,3c0cbfdd18d263d342e87e03c7da967e315bb5561cc9eea5bd4103f1b96e3fb6,2024-11-21T09:16:33.657000
@ -258952,7 +258957,7 @@ CVE-2024-3829,0,0,01a0c111086a56df7a8152424dede2af2945ece1419808b25f3a1751a9b175
CVE-2024-38293,0,0,60919199132fd520a1e4f078a9a5c31f13510df36764c4be0738cf814e061e9c,2024-11-21T09:25:18.930000
CVE-2024-38294,0,0,6f3448200c484074d0836c56f5e1c9fe346f248c9334967a8e78fc758b5adfdf,2024-11-21T09:25:19.280000
CVE-2024-38295,0,0,f358c490df2a2504a6d87be69cb330bfbc1382bb00194c4d2ceb8f036013735b,2024-11-21T09:25:19.577000
CVE-2024-38296,0,1,90ff660165a89e7e7467c3f5b8f9b0ba142341c8df2e0e0450da97394e7f8dfb,2024-12-09T15:15:13.993000
CVE-2024-38296,0,0,90ff660165a89e7e7467c3f5b8f9b0ba142341c8df2e0e0450da97394e7f8dfb,2024-12-09T15:15:13.993000
CVE-2024-38301,0,0,4ed3fa9c79b4615c31506838a9d16fce326b29b50510a98765e221d758d5a217,2024-11-21T09:25:19.937000
CVE-2024-38302,0,0,d8283ff5db2008533114a74a6586fae13c7878d55c406849844820c3fd520bfe,2024-11-21T09:25:20.210000
CVE-2024-38303,0,0,cb447c1eb236fdf6c3ebb63e772ed8c2ab41f0d7fe7f35a9ae9a3e7ed5d00539,2024-08-29T13:25:27.537000
@ -259096,7 +259101,7 @@ CVE-2024-38480,0,0,8fa161912c0761a853152d1feac8fbf447a9a2c195060b213f1ea7b76eade
CVE-2024-38481,0,0,56d41073cb8d4421dd941634134e43dc8e7e0bf5b9e1734d515ccd6ff89bda71,2024-08-02T13:54:44.360000
CVE-2024-38482,0,0,23aec5fa68b4dca4b432634d8e07eea61a04bf96b789d1627bdb6ec4b3c1f391,2024-09-05T16:04:53.577000
CVE-2024-38483,0,0,178f813aaa538f36bfe36509f188778c0f04be9869ce4e1261bd547bb7ef5b0d,2024-09-18T19:19:24.453000
CVE-2024-38485,1,1,4b711e79286b7ac72bb9f144f17f69b942959934d2a1b08b06406df54cc75f3c,2024-12-09T15:15:14.110000
CVE-2024-38485,0,0,4b711e79286b7ac72bb9f144f17f69b942959934d2a1b08b06406df54cc75f3c,2024-12-09T15:15:14.110000
CVE-2024-38486,0,0,162797fa4fe83e54a958850481312c3e22e21d3355155fa513a21d76bfbc85d6,2024-09-13T20:36:08.597000
CVE-2024-38489,0,0,c8809c3a3b8dbca7d8ce1d14c39e410a336e30ff83b4df53210b8bbc08792dcd,2024-08-02T13:54:55.697000
CVE-2024-3849,0,0,c4d82e661506a17f61c6a5ea96e76bd4bfb630a3e4a4f00bce2b38979f6f7063,2024-11-21T09:30:32.223000
@ -260412,8 +260417,8 @@ CVE-2024-40575,0,0,a8f75e8e17d1ca3c5cff90298c3440e183032e028e89b6cd5ddda7707efd7
CVE-2024-40576,0,0,8cfb8bd5f4a4277303f3ae5754ca38f6c2227922febe0cad08d341d6250d63a0,2024-11-21T09:31:19.970000
CVE-2024-40579,0,0,da11a1c0f7825d9658796f4408f8973703e2e8887ee02d7fb06e9fa156da18dd,2024-11-15T19:35:07.323000
CVE-2024-4058,0,0,41bd13730a967fba6dfa98e0a473274805b3a9521fbf9427b1f8ca715400dc8e,2024-11-21T09:42:06.270000
CVE-2024-40582,1,1,eb75009379b194e79ac4aa75b00c01d9e55cd6319595c2dcefb67ee28724febf,2024-12-09T16:15:22.067000
CVE-2024-40583,1,1,ee8725121b81f830a03de013897fd6d0eaaed656c9cb3b662df7e1f312144d24,2024-12-09T16:15:22.200000
CVE-2024-40582,0,0,eb75009379b194e79ac4aa75b00c01d9e55cd6319595c2dcefb67ee28724febf,2024-12-09T16:15:22.067000
CVE-2024-40583,0,0,ee8725121b81f830a03de013897fd6d0eaaed656c9cb3b662df7e1f312144d24,2024-12-09T16:15:22.200000
CVE-2024-4059,0,0,2f671c74797f14e6bdcf4372cbe6dfb45567ca4b71a7df62ffe5d87b0fb0b9e0,2024-11-21T09:42:06.517000
CVE-2024-40592,0,0,030f95dd11b97be7786719745764581faaea764968d869fdeeabb2cbceedf44a,2024-11-14T20:37:06.040000
CVE-2024-40594,0,0,bf65899143a2f4c0e93f528c3b9a7873123db8d586300b13b7dc1af3be463ad0,2024-11-21T09:31:20.467000
@ -261204,7 +261209,7 @@ CVE-2024-4171,0,0,1f56b05b395cd02714b648c07b8a801ca2a6b7d7ba94332e3b402d08208eaf
CVE-2024-41710,0,0,837dd028ed039442f3fba358e71963b23cd81e157e2fc72a4188e4393c3eab4e,2024-08-14T18:35:06.257000
CVE-2024-41711,0,0,68dd962f9a2631075d76b0f5dc2808ef613409420c9c9f99aeacaa5e6120b709,2024-08-14T16:35:15.033000
CVE-2024-41712,0,0,2f73817818761739ebd31e3092aab4346b1ccc796b65799081ae94b063a67a15,2024-10-23T21:35:05.607000
CVE-2024-41713,0,1,6d689571e29107fc6a8cf435e7e42652594e98e1d110ea408186022c20ffe560,2024-12-09T15:15:14.493000
CVE-2024-41713,0,0,6d689571e29107fc6a8cf435e7e42652594e98e1d110ea408186022c20ffe560,2024-12-09T15:15:14.493000
CVE-2024-41714,0,0,194b12585502057ff43eb474c8822c4bfff8557ec724eea446f51fa6890f4643,2024-10-23T15:12:34.673000
CVE-2024-41715,0,0,2b361ed47bf6f81c6f17e8f44a6337c83a629e946281f8818c6e5fb6899097f4,2024-10-17T17:15:11.530000
CVE-2024-41716,0,0,ab9b276c3da529c12bb40ef0d240bdb9954f1f4c86c22f5ce809e71a30285125,2024-09-13T19:53:47.723000
@ -261809,7 +261814,7 @@ CVE-2024-42422,0,0,f64eacceb341ef4b768f40ee59a3acc8f645f72652a962c616340fa5fb7a9
CVE-2024-42423,0,0,8264e3551cb249dc1d0a50016c0beecba4be32a4ea61b5936f8d0d7397afda33,2024-09-20T19:42:20.417000
CVE-2024-42424,0,0,c7d91cfcf4f123e7cef1b486d20016afa7f9034f8d44df07e833acb9c09d9a00,2024-09-10T12:09:50.377000
CVE-2024-42425,0,0,4b136399741737f30b4c8074218caee04298fffe4ffb70bb1828268e47340c65,2024-09-16T15:46:03.110000
CVE-2024-42426,1,1,e699effb74b8332405effe59b486e702d6fde9f8a09c3652b19dbd7044a5ad9e,2024-12-09T15:15:15.450000
CVE-2024-42426,0,0,e699effb74b8332405effe59b486e702d6fde9f8a09c3652b19dbd7044a5ad9e,2024-12-09T15:15:15.450000
CVE-2024-42427,0,0,220ff8ae1f26623e9d58a3d067bc9bf4bfab7766d8e2fd5e900ec0145d89f930,2024-09-10T12:09:50.377000
CVE-2024-4243,0,0,fca6a85a4835b49fddf5d0335fd4a7549a8fc3f34d76f463d721c47ebcb74e87,2024-11-21T09:42:27.497000
CVE-2024-42434,0,0,9351c3a6511f8bd4654b992e3a2dc28615806892c5ceb04ccff2f3cbfaf8ce4b,2024-09-04T21:35:50.963000
@ -263208,7 +263213,7 @@ CVE-2024-44244,0,0,573c6be3aefd70d7c10a9a2e90a39d7e9b0481351a0f285c1fb9ad7116e70
CVE-2024-44247,0,0,e5d19c840bb58be3d8febe871a15e2408881be2e884d262abcdad60ec348a828,2024-10-30T17:49:05.693000
CVE-2024-4425,0,0,bc14fc928873bc1e17e20e27bd9ee5c3e6600325b48f8519be3a125c559d0402,2024-11-21T09:42:48.317000
CVE-2024-44251,0,0,efd4484ccf413da27c840a1b5bfcdb39f987aa1d7f3c00dd48ad7085440ccce1,2024-12-06T16:15:20.907000
CVE-2024-44252,0,1,19357bf1f3ceb43a76e701ab6fc651c3f02730dd61b425b2768181790d2c5e48,2024-12-09T15:15:15.750000
CVE-2024-44252,0,0,19357bf1f3ceb43a76e701ab6fc651c3f02730dd61b425b2768181790d2c5e48,2024-12-09T15:15:15.750000
CVE-2024-44253,0,0,6481be49e14c3a7d8ffd87b21f9271402229d1f9425e03aa44cb3a514977fce2,2024-10-30T19:35:20
CVE-2024-44254,0,0,beb27e305b4cfb15e84ebf30e32fbdb106c3c6cfa0540118c6c70570479a47ee,2024-10-30T21:35:08.673000
CVE-2024-44255,0,0,9820b88dd625880139ecea13163fb771ab9d5c255abaf683730d14c11807c906,2024-10-30T18:26:03.767000
@ -263224,10 +263229,10 @@ CVE-2024-44263,0,0,7fd6509dd80cdec6252d77b7edd479f455b3ad9d62656b1c513ca4a00815e
CVE-2024-44264,0,0,ee0924179708704586a947f8cb1bfc3250aa2f192047d549667f366c53b09528,2024-10-30T18:37:01.203000
CVE-2024-44265,0,0,2a35e1f543866e069d19984c92081c66c8b71cadcb6f6181093964e7539adb55,2024-10-30T19:35:20.800000
CVE-2024-44267,0,0,a998007de4d2f37cefd77b01798057f7e8712e22e07027587ff9faa51feecfc5,2024-10-30T18:39:55.167000
CVE-2024-44269,0,1,cd94b5c2b28bd00f6bd3c5bd35107676552800aeee1f867a6d0535ed56a9aee1,2024-12-09T15:15:15.947000
CVE-2024-44269,0,0,cd94b5c2b28bd00f6bd3c5bd35107676552800aeee1f867a6d0535ed56a9aee1,2024-12-09T15:15:15.947000
CVE-2024-4427,0,0,b4bf66b2e009198014a610dfd9745462884232b31fa92086d9d085cb136f3579,2024-11-21T09:42:48.593000
CVE-2024-44270,0,0,51d4b52a115ad2f279bed3a378d4fb4fa92b6583bd4c55801137fe6a87bcf63a,2024-10-30T18:44:35.083000
CVE-2024-44273,0,1,caae658c20ea929becd6a50f15cc5040f32d55f5bf0889d84daca4b410aa6c36,2024-12-09T15:15:16.147000
CVE-2024-44273,0,0,caae658c20ea929becd6a50f15cc5040f32d55f5bf0889d84daca4b410aa6c36,2024-12-09T15:15:16.147000
CVE-2024-44274,0,0,d4611874fae8cf46b4ebeede4c74afb829adabc974787d5151107510971373f7,2024-10-30T21:35:09.203000
CVE-2024-44275,0,0,7b8efec0100e1ec5cfd91292138629777c7c1ae586c0ae77e9224a161ea07bb6,2024-10-29T19:35:17.777000
CVE-2024-44277,0,0,e3d7fcb827430ccea11a5e150b40bf83c792c09d29552d8380f3eef47e352553,2024-10-29T21:35:17.737000
@ -264069,6 +264074,8 @@ CVE-2024-45757,0,0,bf1316f0b7743cc8b2dd152914a491dabcdcc4f499d811d2cff0eb86873ad
CVE-2024-45758,0,0,f0fb5f8c507698836da499cc5b1208e03d29350c5ed4c9f129b68f0a5cb78d3b,2024-09-06T18:35:13.043000
CVE-2024-45759,0,0,96ed0b2a7f9059dba88885e611a5e1fcb866322df76f436717311dca576bf841,2024-11-26T02:10:03.923000
CVE-2024-4576,0,0,5d6e20f8b249755ca9fcbe51fe3fd43fba59ef712e27f2f4bdb5a18fd3b16894,2024-11-21T09:43:08.357000
CVE-2024-45760,1,1,b7e9338c6f46ab40bbb30db826278b35c6d09f5172ddd8947a5ed81c426df988,2024-12-09T17:15:08.830000
CVE-2024-45761,1,1,875d43e2ac7bc8512809de8a0ce6403f8d4b05a870c2041273eeae195e6cb8f8,2024-12-09T17:15:08.973000
CVE-2024-45763,0,0,bc63a0e680f7813ab46c4aa5089e864f91a7048262b874852ab2a9cd12b0e5bf,2024-11-13T16:52:22.340000
CVE-2024-45764,0,0,c353a0fd0c056be8491ccb43ce6ed73b5aa49742ff25bc6f5eb80e348a6c26e2,2024-11-13T19:08:29.580000
CVE-2024-45765,0,0,b76d2a3f27812a7891af258f2d661ceac481749066fabcf1a6d26d48aa9058b2,2024-11-13T19:06:45.377000
@ -266283,9 +266290,9 @@ CVE-2024-49595,0,0,e715f11d06335e1e17eabc9d1389200984cc96f59dfba7f7efb6cf9c5caa0
CVE-2024-49596,0,0,c44795f05db0c2cd91772588b447c01a2c3f26201ecef137956772ef71be6633,2024-11-26T03:15:06.570000
CVE-2024-49597,0,0,c7a0a5f566843e9934d19b1faec35a3f6bb311d359ef0fb8d2db7b87219648cc,2024-11-26T03:15:06.940000
CVE-2024-4960,0,0,cb9d437153604ad93bb6e00104a9b56bfe5e254dbc3e337bc4ad4c4807dc6043,2024-11-21T09:43:57.130000
CVE-2024-49600,1,1,4b68ccd4417e125caa6f13ecf77e0e8e60005745fe872e0ece423e554523afe5,2024-12-09T15:15:17.387000
CVE-2024-49602,1,1,31001238cbca3313a2da24df5ab0218e978e380680b342d7ca92342bc3c3f37c,2024-12-09T15:15:17.540000
CVE-2024-49603,1,1,f52dcd163cc2faed57dac9c02b16be9ea21e35369e9cea01d5e2cbf33d2e8750,2024-12-09T15:15:17.713000
CVE-2024-49600,0,0,4b68ccd4417e125caa6f13ecf77e0e8e60005745fe872e0ece423e554523afe5,2024-12-09T15:15:17.387000
CVE-2024-49602,0,0,31001238cbca3313a2da24df5ab0218e978e380680b342d7ca92342bc3c3f37c,2024-12-09T15:15:17.540000
CVE-2024-49603,0,0,f52dcd163cc2faed57dac9c02b16be9ea21e35369e9cea01d5e2cbf33d2e8750,2024-12-09T15:15:17.713000
CVE-2024-49604,0,0,52d4bcd33cef053b3c621fc8feb1ba701ad78ff56ae956fe76566248ea674eb4,2024-10-23T15:49:25.567000
CVE-2024-49605,0,0,c5c91e50be8f675ec1bfe66aed3cbc7c47404b7d2ed5357f11297356ab5a4c72,2024-10-24T14:57:49.617000
CVE-2024-49606,0,0,42b54ac4e7546cc8b8ce7868fc7b245847f6d4297f62239bfc9200943bc3aaab,2024-10-23T15:49:41.503000
@ -267399,7 +267406,7 @@ CVE-2024-51157,0,0,bbafa78b8a50c8fb1e7d4159721fdaf4c3afe6250954e7dd9b5098d387a20
CVE-2024-5116,0,0,c5d4b1414f08ab8180681382cdebd9ce0ef5c88379a43ca5ef4e39d2558da1ad,2024-11-21T09:47:00.263000
CVE-2024-51162,0,0,aa98991254878ca92d6b685fabb0999d9cd2433fd346cf67581df76b7299d30e,2024-11-22T17:15:09.353000
CVE-2024-51163,0,0,909afcfaa554939e2c78d7e7af80c5c6961aa7c27e1f5cf118fbed2c52564f74,2024-11-27T18:15:17.760000
CVE-2024-51164,0,0,0c621a3e87a6b805f06b17b773059d9ce7e6f4ff79284caa4397b3c188a41c46,2024-12-03T17:15:11.970000
CVE-2024-51164,0,1,d940764ceb362d708d88f9f5a08c2c1f5532b8b37b034d71dff6267e64a0a937,2024-12-09T17:15:09.107000
CVE-2024-5117,0,0,5e271946d97109af9825c50a9b323ef04401bb4942989f9cb9a1e16ac2b2951d,2024-11-21T09:47:00.397000
CVE-2024-51179,0,0,857fcabc550df085f68e65184c598436a379cf4f02ab73f3edfe252d5c778dbf,2024-11-13T20:35:10.303000
CVE-2024-5118,0,0,d1846e4a7219ebf75ef8c1b0d7fa03dde76ecbba746e36b5705002065c1088bf,2024-11-21T09:47:00.520000
@ -268628,6 +268635,7 @@ CVE-2024-53438,0,0,269e7677ace7d9295c53368d7a770c8536638e497558c04303dcd88d3a89e
CVE-2024-5344,0,0,8f458be972a177773c42d8be4d4a2a3285a02690bc775c46c880075a709e9dd2,2024-11-21T09:47:27.763000
CVE-2024-53442,0,0,49e8e8bcc8b7bcaa280093d521e6aff7558296bfd4e322e6b9c1f1a52f419341,2024-12-05T20:15:22.693000
CVE-2024-5345,0,0,c0e9154b8cf6eccc0abbcabbb8ee4621432a41cc6dca94348a2468e667caa563,2024-11-21T09:47:27.883000
CVE-2024-53450,1,1,882d5e53fca75c095dd18590cb2e966eca2014443a8e7595dd9ff670d94205e4,2024-12-09T17:15:09.350000
CVE-2024-53457,0,0,259bd6c076001b05a53a6db7730fb132a1ffa6bcde3e25274effca4e2dc119cf,2024-12-05T22:15:20.247000
CVE-2024-53459,0,0,5f9e5f3a8b33fbe02bdd059bb8fe15cb2eeacdc4f602dd12944ee928044f080b,2024-12-02T18:15:11.123000
CVE-2024-5346,0,0,835e1b7230e6e33db8d8cf7bc9b64a0aa9f43b5b6335773933376ca9c2372d0c,2024-11-21T09:47:28
@ -268874,8 +268882,8 @@ CVE-2024-5394,0,0,04fdfaf576eb17b0d9b483c3599357ed4f0bd1d9cf3555eb1f4cda3cdac583
CVE-2024-53940,0,0,04215bb77d44b273e9849b212da1715e4a88663d0a04d658e8b426292d6b2d3d,2024-12-03T19:15:12.910000
CVE-2024-53941,0,0,958fbab1dcd158d91125ecb71056e34e403404760a1ce78a6e1b2e3ede2a0630,2024-12-03T19:15:13.113000
CVE-2024-53947,0,0,f3f49f507fdd673942647045e7a6129704131798f17f201931ae5ff94b2539cc,2024-12-09T14:15:12.267000
CVE-2024-53948,0,0,2bf672f2a8b7b1f906952cdb41854a87e773420a592672207dba1a730e04cfc2,2024-12-09T14:15:12.483000
CVE-2024-53949,0,0,ca28ec2f88fa8f82be9fbdd7cd1551490715f8ba191cbb329b68f6bb2774aae6,2024-12-09T14:15:12.647000
CVE-2024-53948,0,1,6ea9a9bf9db83504c3565ac4e6f0a87dd0b4b80d29ed015b913925534416c4a7,2024-12-09T18:15:23.893000
CVE-2024-53949,0,1,b536a3aaccc48e4b523395b29ca4495755368005bd7e091272f9f8a953010750,2024-12-09T18:15:24.013000
CVE-2024-5395,0,0,aa518ac6cc2e8e3e116d2e709097641ebff6dab87bd1ab80d2e397c0f6317f19,2024-11-21T09:47:34.290000
CVE-2024-5396,0,0,a2e12a462b12b592c06259ea229afce64d9cb2b529021eb0ae1f63c97dd38d23,2024-11-21T09:47:34.430000
CVE-2024-5397,0,0,1c1b9f46c7fae3545f6c6bff25b88c782d3838975abd0364f3776c48ef8d8b3f,2024-11-21T09:47:34.563000
@ -269033,7 +269041,7 @@ CVE-2024-5472,0,0,5e12957cd076edb077638ab18db3a7202837e8fd64948bba00e3365a85b541
CVE-2024-5473,0,0,fdd6160c6121db618882f16bfc9c17f8c3a2501715cb9519638ef5a1fcd2441d,2024-11-21T09:47:45.190000
CVE-2024-5474,0,0,63893131768de13d83eb37c8075bce21b1c0f49d4d852fdf9f27e69aab8b3e48,2024-11-15T17:00:35.697000
CVE-2024-54745,0,0,149e668d67e2ee220311de22f3198ab71254f215d4a9fda2f3e71cc0870cfc51,2024-12-06T16:15:22.787000
CVE-2024-54747,0,1,9f0fca61fa6eccf9336f8eaa6d72537b4bbb8d5e3fd08e6c628143c0e6117234,2024-12-09T15:15:21.320000
CVE-2024-54747,0,0,9f0fca61fa6eccf9336f8eaa6d72537b4bbb8d5e3fd08e6c628143c0e6117234,2024-12-09T15:15:21.320000
CVE-2024-54749,0,0,9843b013f360d8fb3ff95bfdcdfc0bf5c3f632d1d8b1b0bbd6fc777fe9950e5c,2024-12-07T23:15:34.810000
CVE-2024-5475,0,0,3f93fbbe9009c236ea2c6da72827f7bd871ace2e1ffd3b439453d8900914ef7f,2024-11-21T09:47:45.480000
CVE-2024-54750,0,0,e8c5c7ee4c0815bc9ca8d745cba9ee22458b717920032c223e5c213761edebc0,2024-12-06T17:15:13.300000
@ -269051,11 +269059,16 @@ CVE-2024-5488,0,0,703a569b98e6f1a8130cee58df129e22e6ef47912a99f32d5a452e25c61095
CVE-2024-5489,0,0,6c00a6a2badf83516471ea1d81b619bbe482cb4a54de89ffa7bd06f7fa1ffabd,2024-11-21T09:47:46.807000
CVE-2024-5490,0,0,7e66a0f19af78ba5ab311e474f6c7a834b406cb5857b42d263e55e1190767452,2024-08-27T14:36:10.033000
CVE-2024-5491,0,0,e331b82e31ebdfe13500034914a1c37ca8ae8114dde41994ac12e59a5b4284ca,2024-11-21T09:47:47.017000
CVE-2024-54919,1,1,bf5503c511b0bdeb0d2785fef49caf78c4e74e2df5225c68980b115d655f9c0f,2024-12-09T15:15:21.580000
CVE-2024-54919,0,0,bf5503c511b0bdeb0d2785fef49caf78c4e74e2df5225c68980b115d655f9c0f,2024-12-09T15:15:21.580000
CVE-2024-5492,0,0,bef41c141414e91a737f6b5c4fcaf83f2ee31e6e95a9e2405d6f4dc30a93092c,2024-11-21T09:47:47.140000
CVE-2024-54920,1,1,71f95c093eff75f67c76e1ec75ca6a85fad7305bd0996c4e2eafc878618b4427,2024-12-09T15:15:21.717000
CVE-2024-54920,0,0,71f95c093eff75f67c76e1ec75ca6a85fad7305bd0996c4e2eafc878618b4427,2024-12-09T15:15:21.717000
CVE-2024-54922,1,1,6d15dc878085e2bf3178f6028844375fb4c88eff81b2d1078ce39f80ffccf7d2,2024-12-09T18:15:24.153000
CVE-2024-54926,1,1,d207e0e4e1ea549cf8f234d7654c3876100ab3b038442c8d0dc74fd13d373f87,2024-12-09T17:15:09.810000
CVE-2024-54929,0,0,d94cf7eb96b8426121e4a80e08610af572f918c35c4473b2cc9e9b9437f4d3f3,2024-12-09T14:15:12.957000
CVE-2024-5493,0,0,934df9c05abfa1e1b0f50d724dbce11e7e01bba7d9ae25f41fb3a41d6fcaa53b,2024-11-21T09:47:47.260000
CVE-2024-54930,1,1,a6448590db82b15ece8ba1f5055d06c864c57d09b90a65b1cf9f6eac192d6ab5,2024-12-09T18:15:24.267000
CVE-2024-54933,1,1,57c3f0caa0953bbad2cf65c9df51ab0a561a4ad7be49df764627846d55138e29,2024-12-09T18:15:24.387000
CVE-2024-54935,1,1,7ae3eac8389051a4549c9d290e35df66ff25da1e7eb7eb5c836dc18ddcabc0bc,2024-12-09T18:15:24.493000
CVE-2024-54936,0,0,63a4476ed80c341d8e9fa071a5d0d6ad16e6755f93727892078630b752492e54,2024-12-09T14:15:13.127000
CVE-2024-54937,0,0,312b4a37fa3077036ba5d69390e81c3676cc63d0ee2244761932e8c35d7b3985,2024-12-09T14:15:13.303000
CVE-2024-5494,0,0,8cf1519a61ea4a6a4f006eea5f9156b6b849d9688fc3df3baf2171897301c8ac,2024-11-21T09:47:47.450000
@ -269118,9 +269131,9 @@ CVE-2024-5553,0,0,c6aeec952a2778be27c1792a1d1c97b8ff8c01ca6ed08226c6b506a6f771b7
CVE-2024-5554,0,0,3fb8d13bac6e351fa1470fa96b8178263946ef86d2aae872feb00193d95f3ac4,2024-11-21T09:47:55.160000
CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000
CVE-2024-5556,0,0,f573f07f74091c9ef49ab63e55c790d8f661c071a22a95c82ecfdf6c6886287c,2024-08-27T14:36:53.273000
CVE-2024-55560,0,1,8ded767c4c0f73c31717fdba1e26cc9c22e0d2990356bc72ffccdc44c7980958,2024-12-09T16:15:22.750000
CVE-2024-55560,0,0,8ded767c4c0f73c31717fdba1e26cc9c22e0d2990356bc72ffccdc44c7980958,2024-12-09T16:15:22.750000
CVE-2024-55563,0,0,c66280007d4cae3698737b72d02776bf87f7156bc0d443fcb1212b7ae0d79246,2024-12-09T01:15:06.313000
CVE-2024-55564,0,1,d63ec84a4b0080bce15327cb7be9286ecdaea33638b7b51d1f30d4e1546281b9,2024-12-09T16:15:22.907000
CVE-2024-55564,0,0,d63ec84a4b0080bce15327cb7be9286ecdaea33638b7b51d1f30d4e1546281b9,2024-12-09T16:15:22.907000
CVE-2024-55565,0,0,b2313ae44da999d8fc4520a410050c1fd6fff1d9541329ab2ea86f782d8cd857,2024-12-09T02:15:19.607000
CVE-2024-55566,0,0,cc8f9a9eac78b44e982dc79609c73b93636b40b02e823d798c83261284bf0a10,2024-12-09T02:15:19.720000
CVE-2024-5557,0,0,09bbd8b47f01ef9851d897d35b7273fae6e6c153562df19beb41c55eeb7521a0,2024-11-21T09:47:55.560000
@ -272552,7 +272565,7 @@ CVE-2024-9642,0,0,e785c942bfa480a7574dc49561aef989c60cf4146a0b8eb964f23c4e5169b9
CVE-2024-9647,0,0,fcdcaf92364c0d2df50a52f6773b32a5c3346fda1bdd5380b00168c49162a8b6,2024-10-16T16:38:14.557000
CVE-2024-9649,0,0,aef177183a046c3f046fd6be8c976f15a331c30746d190b980aa15df26ed1b01,2024-10-16T16:38:14.557000
CVE-2024-9650,0,0,2327d0b00f83aa6287d8e0fc737d152f9293bbe0c165388e74c80db5393555e5,2024-10-25T12:56:07.750000
CVE-2024-9651,0,0,536e45c35e04c2256d0d4e91197fb142051ed50ae950fff1974779180122eefd,2024-12-09T06:15:04.397000
CVE-2024-9651,0,1,aedd2b9633b5b54101f346c643f4b36f0a95ba7c151b121e485f72702e97a360,2024-12-09T18:15:24.657000
CVE-2024-9652,0,0,2278cc3d85ab1e64d09ab82bc023556b887dca2b4a3045a553483dbbc6e7952b,2024-10-16T16:38:14.557000
CVE-2024-9653,0,0,f158e4ac0dd55a24d4b3927fa7e93113f3b2a80fd6a1d97e078c1fc3c150282b,2024-11-26T20:37:07.913000
CVE-2024-9655,0,0,f949df8d6e7799757a56c3413a4960a9956ec7f349370b1e9da1784dc8394ce3,2024-11-01T12:57:03.417000

Can't render this file because it is too large.