From 20eab6f7d0166029ea120617181c816420a44f7e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 13 Jan 2025 21:03:46 +0000 Subject: [PATCH] Auto-Update: 2025-01-13T21:00:21.256051+00:00 --- CVE-2020/CVE-2020-90xx/CVE-2020-9085.json | 78 ++++- CVE-2020/CVE-2020-90xx/CVE-2020-9086.json | 78 ++++- CVE-2020/CVE-2020-92xx/CVE-2020-9253.json | 69 ++++- CVE-2021/CVE-2021-472xx/CVE-2021-47207.json | 181 ++++++++++-- CVE-2021/CVE-2021-473xx/CVE-2021-47325.json | 130 +++++++- CVE-2022/CVE-2022-486xx/CVE-2022-48639.json | 161 +++++++++- CVE-2023/CVE-2023-297xx/CVE-2023-29743.json | 32 +- CVE-2023/CVE-2023-297xx/CVE-2023-29745.json | 32 +- CVE-2023/CVE-2023-29xx/CVE-2023-2952.json | 12 +- CVE-2023/CVE-2023-301xx/CVE-2023-30196.json | 12 +- CVE-2023/CVE-2023-337xx/CVE-2023-33734.json | 32 +- CVE-2023/CVE-2023-337xx/CVE-2023-33740.json | 32 +- CVE-2023/CVE-2023-337xx/CVE-2023-33741.json | 32 +- CVE-2023/CVE-2023-341xx/CVE-2023-34152.json | 24 +- CVE-2023/CVE-2023-525xx/CVE-2023-52523.json | 134 ++++++++- CVE-2023/CVE-2023-525xx/CVE-2023-52524.json | 168 ++++++++++- CVE-2023/CVE-2023-525xx/CVE-2023-52525.json | 176 +++++++++-- CVE-2023/CVE-2023-525xx/CVE-2023-52527.json | 202 +++++++++++-- CVE-2023/CVE-2023-527xx/CVE-2023-52718.json | 311 +++++++++++++++++++- CVE-2023/CVE-2023-529xx/CVE-2023-52953.json | 76 ++++- CVE-2023/CVE-2023-529xx/CVE-2023-52954.json | 81 ++++- CVE-2023/CVE-2023-529xx/CVE-2023-52955.json | 81 ++++- CVE-2023/CVE-2023-72xx/CVE-2023-7266.json | 122 +++++++- CVE-2024/CVE-2024-125xx/CVE-2024-12587.json | 31 +- CVE-2024/CVE-2024-267xx/CVE-2024-26709.json | 100 ++++++- CVE-2024/CVE-2024-447xx/CVE-2024-44771.json | 25 ++ CVE-2024/CVE-2024-463xx/CVE-2024-46310.json | 25 ++ CVE-2024/CVE-2024-464xx/CVE-2024-46480.json | 64 ++++ CVE-2024/CVE-2024-464xx/CVE-2024-46481.json | 64 ++++ CVE-2024/CVE-2024-469xx/CVE-2024-46919.json | 39 ++- CVE-2024/CVE-2024-469xx/CVE-2024-46920.json | 39 ++- CVE-2024/CVE-2024-469xx/CVE-2024-46921.json | 25 ++ CVE-2024/CVE-2024-488xx/CVE-2024-48883.json | 39 ++- CVE-2024/CVE-2024-529xx/CVE-2024-52935.json | 31 +- CVE-2024/CVE-2024-532xx/CVE-2024-53204.json | 82 +++++- CVE-2024/CVE-2024-541xx/CVE-2024-54120.json | 56 +++- CVE-2024/CVE-2024-546xx/CVE-2024-54687.json | 43 ++- CVE-2024/CVE-2024-564xx/CVE-2024-56437.json | 56 +++- CVE-2024/CVE-2024-567xx/CVE-2024-56704.json | 154 +++++++++- CVE-2024/CVE-2024-574xx/CVE-2024-57487.json | 39 ++- CVE-2024/CVE-2024-574xx/CVE-2024-57488.json | 39 ++- CVE-2025/CVE-2025-04xx/CVE-2025-0405.json | 16 +- CVE-2025/CVE-2025-221xx/CVE-2025-22142.json | 82 ++++++ CVE-2025/CVE-2025-221xx/CVE-2025-22144.json | 82 ++++++ CVE-2025/CVE-2025-228xx/CVE-2025-22828.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23026.json | 68 +++++ CVE-2025/CVE-2025-230xx/CVE-2025-23027.json | 82 ++++++ CVE-2025/CVE-2025-230xx/CVE-2025-23078.json | 31 +- README.md | 79 +++-- _state.csv | 171 ++++++----- 50 files changed, 3509 insertions(+), 315 deletions(-) create mode 100644 CVE-2024/CVE-2024-447xx/CVE-2024-44771.json create mode 100644 CVE-2024/CVE-2024-463xx/CVE-2024-46310.json create mode 100644 CVE-2024/CVE-2024-464xx/CVE-2024-46480.json create mode 100644 CVE-2024/CVE-2024-464xx/CVE-2024-46481.json create mode 100644 CVE-2024/CVE-2024-469xx/CVE-2024-46921.json create mode 100644 CVE-2025/CVE-2025-221xx/CVE-2025-22142.json create mode 100644 CVE-2025/CVE-2025-221xx/CVE-2025-22144.json create mode 100644 CVE-2025/CVE-2025-230xx/CVE-2025-23026.json create mode 100644 CVE-2025/CVE-2025-230xx/CVE-2025-23027.json diff --git a/CVE-2020/CVE-2020-90xx/CVE-2020-9085.json b/CVE-2020/CVE-2020-90xx/CVE-2020-9085.json index 95a338dae88..92d9139dc9c 100644 --- a/CVE-2020/CVE-2020-90xx/CVE-2020-9085.json +++ b/CVE-2020/CVE-2020-90xx/CVE-2020-9085.json @@ -2,8 +2,8 @@ "id": "CVE-2020-9085", "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-27T10:15:12.217", - "lastModified": "2024-12-27T10:15:12.217", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-13T19:35:55.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,12 +69,64 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:b612_firmware:b612s-25dtcpu-v100r001b192d03sp00c234:*:*:*:*:*:*:*", + "matchCriteriaId": "5DA74362-63EF-402C-8DE4-608BF00B9A22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:b612_firmware:b612s-25dtcpu-v100r001b192d03sp00c287:*:*:*:*:*:*:*", + "matchCriteriaId": "B7B3FDDF-0E22-4778-B4B3-A9E77A7E8D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:b612_firmware:b612s-25dtcpu-v100r001b192d05sp00c00:*:*:*:*:*:*:*", + "matchCriteriaId": "D187A75B-E3D7-4B34-B2E5-F5FA8E557F80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:b612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F304357B-3B8D-49C0-AD8A-DC7F11B586BC" + } + ] + } + ] } ], "references": [ { "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200826-01-pointer_en", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-90xx/CVE-2020-9086.json b/CVE-2020/CVE-2020-90xx/CVE-2020-9086.json index 8a1d105f6b6..74aa06b43d1 100644 --- a/CVE-2020/CVE-2020-90xx/CVE-2020-9086.json +++ b/CVE-2020/CVE-2020-90xx/CVE-2020-9086.json @@ -2,8 +2,8 @@ "id": "CVE-2020-9086", "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-27T10:15:12.800", - "lastModified": "2024-12-27T10:15:12.800", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-13T19:34:15.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,12 +69,64 @@ "value": "CWE-124" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:b612_firmware:b612s-25dtcpu-v100r001b192d03sp00c234:*:*:*:*:*:*:*", + "matchCriteriaId": "5DA74362-63EF-402C-8DE4-608BF00B9A22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:b612_firmware:b612s-25dtcpu-v100r001b192d03sp00c287:*:*:*:*:*:*:*", + "matchCriteriaId": "B7B3FDDF-0E22-4778-B4B3-A9E77A7E8D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:b612_firmware:b612s-25dtcpu-v100r001b192d05sp00c00:*:*:*:*:*:*:*", + "matchCriteriaId": "D187A75B-E3D7-4B34-B2E5-F5FA8E557F80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:b612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F304357B-3B8D-49C0-AD8A-DC7F11B586BC" + } + ] + } + ] } ], "references": [ { "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200826-01-buffer_en", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-92xx/CVE-2020-9253.json b/CVE-2020/CVE-2020-92xx/CVE-2020-9253.json index 58934bdd808..ae441e95d16 100644 --- a/CVE-2020/CVE-2020-92xx/CVE-2020-9253.json +++ b/CVE-2020/CVE-2020-92xx/CVE-2020-9253.json @@ -2,8 +2,8 @@ "id": "CVE-2020-9253", "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-27T10:15:16.610", - "lastModified": "2024-12-27T10:15:16.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-13T19:38:19.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,55 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:lion-al00c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.1.0.150\\(c00e136r5p3\\)", + "matchCriteriaId": "0DECBFA7-FD9F-420C-846C-FA096498AC63" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:lion-al00c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AE20666-6456-48C3-B612-95DC67FA1FE1" + } + ] + } + ] } ], "references": [ { "url": "https://www.huawei.com/en/psirt/security-advisories/2020/huawei-sa-20200715-08-smartphone-en", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47207.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47207.json index 023daad4a21..22d5f69e75a 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47207.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47207.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47207", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.400", - "lastModified": "2024-11-21T06:35:37.800", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-13T20:42:37.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,214 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: gus: corrige la desreferencia de puntero nulo en el bloque de puntero El bloque de puntero devuelto por snd_gf1_dma_next_block podr\u00eda ser nulo, por lo que existe un posible problema de desreferencia de puntero nulo. Solucione esto agregando una verificaci\u00f3n nula antes de la desreferencia." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.293", + "matchCriteriaId": "83024F84-4857-4CAF-957E-C14804BAC4AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.291", + "matchCriteriaId": "8B1EE39E-FE30-4B7D-A26F-631135BCBB3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.256", + "matchCriteriaId": "FCEB92FF-21BF-4F75-ACA1-6AE1D51A79FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.218", + "matchCriteriaId": "4F85F433-5DEA-47D3-B07E-3B1AC474D6E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.162", + "matchCriteriaId": "51A152D8-D5CE-47BD-9041-DEE164DCE99D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.82", + "matchCriteriaId": "AE501832-500C-4EF1-9489-5C13674F619D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "2128A085-4C0C-4C1E-9E9C-0DD868E2170F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/16721797dcef2c7c030ffe73a07f39a65f9323c3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ac6cd87d8ddd36c43620f82c4d65b058f725f0f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e28e083dcdf03a18a083f8a47b6bb6b1604b5be", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/542fa721594a02d2aee0370a764d306ef48d030c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a0d21bb3279476c777434c40d969ea88ca64f9aa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ab4c1ebc40f699f48346f634d7b72b9c5193f315", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c6d2cefdd05c4810c416fb8d384b5c377bd977bc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cb09c760c201f82df83babc92a5ffea0a01807fc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/16721797dcef2c7c030ffe73a07f39a65f9323c3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ac6cd87d8ddd36c43620f82c4d65b058f725f0f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e28e083dcdf03a18a083f8a47b6bb6b1604b5be", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/542fa721594a02d2aee0370a764d306ef48d030c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a0d21bb3279476c777434c40d969ea88ca64f9aa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ab4c1ebc40f699f48346f634d7b72b9c5193f315", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c6d2cefdd05c4810c416fb8d384b5c377bd977bc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cb09c760c201f82df83babc92a5ffea0a01807fc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47325.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47325.json index 1c614fb5433..45ecb6cfd48 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47325.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47325.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47325", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:19.613", - "lastModified": "2024-11-21T06:35:53.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-13T20:04:48.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,151 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iommu/arm-smmu: corrige la fuga de recuento de referencias de arm_smmu_device en la traducci\u00f3n de direcciones. El problema de recuento de referencias ocurre en varias rutas de manejo de excepciones de arm_smmu_iova_to_phys_hard(). Cuando ocurren esos escenarios de error, la funci\u00f3n se olvida de disminuir el recuento de \"smmu\" aumentado en arm_smmu_rpm_get(), lo que provoca una fuga de recuento. Solucione este problema saltando a la etiqueta \"out\" cuando se produzcan esos escenarios de error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.4.134", + "matchCriteriaId": "E8906CE9-ED5B-4D67-A356-65A3B757C7A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.52", + "matchCriteriaId": "7C1E6FB6-53C8-4DC4-8AE5-93094BA39F62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.19", + "matchCriteriaId": "34C1A2F4-DD44-4CF1-8FD4-751A0D746A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.13", + "versionEndExcluding": "5.13.4", + "matchCriteriaId": "F93FA3CC-0C79-410B-A7D7-245C2AA0723A" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0f0c5ea09139777d90729d408b807021f2ea6492", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43d1aaa1965f9b58035196dac49b1e1e6c9c25eb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5f9741a9a91f25c89e04b408cd61e3ab050ce24b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b11220803ad14a2a880cc06d8e01fe2548cc85b0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0f0c5ea09139777d90729d408b807021f2ea6492", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43d1aaa1965f9b58035196dac49b1e1e6c9c25eb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5f9741a9a91f25c89e04b408cd61e3ab050ce24b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b11220803ad14a2a880cc06d8e01fe2548cc85b0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48639.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48639.json index 21760beb1e6..ca8dc314060 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48639.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48639.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48639", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:06.857", - "lastModified": "2024-11-21T07:33:40.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-13T19:58:08.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,182 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: sched: corrige posible fuga de recuento en tc_new_tfilter() Es necesario llamar a tfilter_put para colocar el recuento obtenido mediante tp->ops->get para evitar una posible fuga de recuento cuando se realiza la cadena. >tmplt_ops != NULL y cadena->tmplt_ops != tp->ops." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.4.215", + "matchCriteriaId": "FB86E655-C5BA-4C24-AB8D-C2BC589EA8D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.146", + "matchCriteriaId": "A9C1CF48-9C3A-4236-8546-BD32D742BFB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.71", + "matchCriteriaId": "080C1827-D257-4D5A-9071-779EF7F5EF0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.19.12", + "matchCriteriaId": "03B0F56B-C5CC-4E81-BB51-D07D569DE4CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E8BD11A3-8643-49B6-BADE-5029A0117325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5F0AD220-F6A9-4012-8636-155F1B841FAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*", + "matchCriteriaId": "A46498B3-78E1-4623-AAE1-94D29A42BE4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*", + "matchCriteriaId": "F8446E87-F5F6-41CA-8201-BAE0F0CA6DD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*", + "matchCriteriaId": "8E5FB72F-67CE-43CC-83FE-541604D98182" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3A0A7397-F5F8-4753-82DC-9A11288E696D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0559d91ee3a2cd81b15ad5cd507539d6da867f88", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8844c750eeb03452e2b3319c27a526f447b82596", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/903f7d322c17d8e306d766404b4604e81653902a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c2e1cfefcac35e0eea229e148c8284088ce437b5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f8162aed962be8fa07445b2b5928e84ab40dd8d7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0559d91ee3a2cd81b15ad5cd507539d6da867f88", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8844c750eeb03452e2b3319c27a526f447b82596", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/903f7d322c17d8e306d766404b4604e81653902a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c2e1cfefcac35e0eea229e148c8284088ce437b5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f8162aed962be8fa07445b2b5928e84ab40dd8d7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29743.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29743.json index 93b6e1c7496..c15f05667d7 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29743.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29743.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29743", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T23:15:09.840", - "lastModified": "2024-11-21T07:57:27.740", + "lastModified": "2025-01-13T20:15:25.387", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29745.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29745.json index 6bd54996e03..17728091455 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29745.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29745.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29745", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:10.200", - "lastModified": "2024-11-21T07:57:27.887", + "lastModified": "2025-01-13T20:15:26.130", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2952.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2952.json index a23df49d703..905e6f414a2 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2952.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2952.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2952", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-30T23:15:09.887", - "lastModified": "2024-11-21T07:59:38.173", + "lastModified": "2025-01-13T20:15:26.313", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-835" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30196.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30196.json index 7c53f118965..f01129200d8 100644 --- a/CVE-2023/CVE-2023-301xx/CVE-2023-30196.json +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30196.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30196", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T12:15:09.677", - "lastModified": "2024-11-21T07:59:53.313", + "lastModified": "2025-01-13T20:15:26.557", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33734.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33734.json index 225958f1bba..66ea8e366ae 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33734.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33734.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33734", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T22:15:10.737", - "lastModified": "2024-11-21T08:05:55.107", + "lastModified": "2025-01-13T20:15:26.797", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33740.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33740.json index 94ced0d46d9..fa4d885befb 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33740.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33740.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33740", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T22:15:10.777", - "lastModified": "2024-11-21T08:05:55.560", + "lastModified": "2025-01-13T19:15:09.237", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33741.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33741.json index c83d46fb105..2bc0ae7ef0e 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33741.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33741.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33741", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T22:15:10.820", - "lastModified": "2024-11-21T08:05:55.710", + "lastModified": "2025-01-13T19:15:10.213", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34152.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34152.json index 3b0afbf62a4..97e7d45b37b 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34152.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34152.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34152", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-30T22:15:11.070", - "lastModified": "2024-12-02T14:34:31.887", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-13T19:15:10.400", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52523.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52523.json index 18bd8e72bf9..206c8411e1f 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52523.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52523.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52523", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:48.213", - "lastModified": "2024-11-21T08:39:57.693", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-13T19:57:06.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,151 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf, sockmap: rechaza las redirecciones de salida de sk_msg a sockets que no son TCP. Con un mapa SOCKMAP/SOCKHASH y un programa sk_msg, el usuario puede dirigir los mensajes enviados desde un socket TCP (s1) para que realmente salgan desde otro socket TCP (s2): tcp_bpf_sendmsg(s1) // = sk_prot->sendmsg tcp_bpf_send_verdict(s1) // __SK_REDIRECT caso tcp_bpf_sendmsg_redir(s2) tcp_bpf_push_locked(s2) tcp_bpf_push(s2) tcp_rate_check_ app_limited(s2) // espera tcp_sock tcp_sendmsg_locked(s2 ) // \u00eddem Hay una suposici\u00f3n codificada en la cadena de llamadas de que el socket de salida (s2) es un socket TCP. Sin embargo, en el commit 122e6c79efe1 (\"sock_map: Actualizar comprobaciones de tipo de calcet\u00edn para UDP\") hemos habilitado redirecciones a sockets que no son TCP. Esto se hizo por el bien de los programas BPF sk_skb. No hab\u00eda ninguna sangr\u00eda para admitir el caso de uso de env\u00edo a salida de sk_msg. Como resultado, los intentos de env\u00edo a salida a trav\u00e9s de un socket que no es TCP provocan un bloqueo debido a una conversi\u00f3n no v\u00e1lida de sock a tcp_sock: ERROR: desreferencia del puntero NULL del n\u00facleo, direcci\u00f3n: 0000000000000002f... Seguimiento de llamadas: . mostrar_regs+0x60/0x70? __die+0x1f/0x70 ? page_fault_oops+0x80/0x160? do_user_addr_fault+0x2d7/0x800? rcu_is_watching+0x11/0x50? exc_page_fault+0x70/0x1c0? asm_exc_page_fault+0x27/0x30? tcp_tso_segs+0x14/0xa0 tcp_write_xmit+0x67/0xce0 __tcp_push_pending_frames+0x32/0xf0 tcp_push+0x107/0x140 tcp_sendmsg_locked+0x99f/0xbb0 tcp_bpf_push+0x19d/0x3a0 tcp_bpf_sendmsg_redir+0x55/0xd0 tcp_bpf_send_verdict+0x407/0x550 tcp_bpf_sendmsg+0x1a1/0x390 inet_sendmsg+0x6a/0x70 sock_sendmsg+0x9d/0xc0? sockfd_lookup_light+0x12/0x80 __sys_sendto+0x10e/0x160 ? syscall_enter_from_user_mode+0x20/0x60? __this_cpu_preempt_check+0x13/0x20? lockdep_hardirqs_on+0x82/0x110 __x64_sys_sendto+0x1f/0x30 do_syscall_64+0x38/0x90 Entry_SYSCALL_64_after_hwframe+0x63/0xcd Rechace la selecci\u00f3n de sockets que no sean TCP como destino de redireccionamiento desde un programa BPF sk_msg para evitar el bloqueo. Cuando lo intente, el usuario recibir\u00e1 un error EACCES de la llamada al sistema send/sendto/sendmsg()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.13", + "versionEndExcluding": "5.15.135", + "matchCriteriaId": "0988674C-BFC5-4018-840B-F6E3C9B45A62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.57", + "matchCriteriaId": "8629E5D1-351D-4D4B-8D05-E10BD4A1CFD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.5.7", + "matchCriteriaId": "830A824C-F212-4FDC-ADEF-0EBEC6B2365B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", + "matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", + "matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*", + "matchCriteriaId": "0DC421F1-3D5A-4BEF-BF76-4E468985D20B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*", + "matchCriteriaId": "00AB783B-BE05-40E8-9A55-6AA457D95031" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/b80e31baa43614e086a9d29dc1151932b1bd7fc5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b8f97e47b6fb84fcf2f5a22e725eefb6cf5070c2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bc8b89b6963803a123f64aa9494155a037b3d728", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ded6e448028f0f91b6af35985afca01fa02a9089", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b80e31baa43614e086a9d29dc1151932b1bd7fc5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b8f97e47b6fb84fcf2f5a22e725eefb6cf5070c2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bc8b89b6963803a123f64aa9494155a037b3d728", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ded6e448028f0f91b6af35985afca01fa02a9089", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52524.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52524.json index 6355215d43a..84435667de4 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52524.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52524.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52524", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:48.263", - "lastModified": "2024-11-21T08:39:57.813", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-13T20:00:51.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,55 +15,193 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: nfc: llcp: Agregar bloqueo al modificar la lista de dispositivos La lista de dispositivos necesita mantener su bloqueo asociado al modificarla, o la lista podr\u00eda corromperse, como descubri\u00f3 syzbot." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.251", + "versionEndExcluding": "5.4.258", + "matchCriteriaId": "CEF23E2F-2D7D-429D-9A9D-3C3037DDF337" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.188", + "versionEndExcluding": "5.10.198", + "matchCriteriaId": "7BF9EEBD-3033-41C3-9E3C-16AFB9AF75A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.121", + "versionEndExcluding": "5.15.135", + "matchCriteriaId": "C2FDE0B2-2B57-44AB-9D8B-CB4E865DEB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.39", + "versionEndExcluding": "6.1.57", + "matchCriteriaId": "52806B93-9F14-4809-8A4B-10AC41AC10D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5", + "versionEndExcluding": "6.5.7", + "matchCriteriaId": "237658B4-9F55-44A1-8440-9BFCDD0E6390" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", + "matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", + "matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*", + "matchCriteriaId": "0DC421F1-3D5A-4BEF-BF76-4E468985D20B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*", + "matchCriteriaId": "00AB783B-BE05-40E8-9A55-6AA457D95031" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/191d87a19cf1005ecf41e1ae08d74e17379e8391", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/29c16c2bf5866326d5fbc4a537b3997fcac23391", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4837a192f6d06d5bb2f3f47d6ce5353ab69bf86b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7562780e32b84196731d57dd24563546fcf6d082", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dba849cc98113b145c6e720122942c00b8012bdb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dfc7f7a988dad34c3bf4c053124fb26aa6c5f916", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/191d87a19cf1005ecf41e1ae08d74e17379e8391", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/29c16c2bf5866326d5fbc4a537b3997fcac23391", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4837a192f6d06d5bb2f3f47d6ce5353ab69bf86b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7562780e32b84196731d57dd24563546fcf6d082", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dba849cc98113b145c6e720122942c00b8012bdb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dfc7f7a988dad34c3bf4c053124fb26aa6c5f916", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52525.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52525.json index 94bb2c17546..74903a76417 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52525.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52525.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52525", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:48.313", - "lastModified": "2024-11-21T08:39:57.940", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-13T20:04:04.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,209 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mwifiex: corrige la condici\u00f3n de verificaci\u00f3n de oob en mwifiex_process_rx_packet Solo omita la ruta del c\u00f3digo al intentar acceder a los encabezados rfc1042 cuando el b\u00fafer sea demasiado peque\u00f1o, para que el controlador a\u00fan pueda procesar paquetes sin encabezados rfc1042 ." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.195", + "versionEndExcluding": "5.10.198", + "matchCriteriaId": "473AE17D-E000-42E4-8762-8669D7D816A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.132", + "versionEndExcluding": "5.15.135", + "matchCriteriaId": "227A22A5-7242-489E-9B0A-D42858962A3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.53", + "versionEndExcluding": "6.1.57", + "matchCriteriaId": "9EFECC3D-19B3-431A-B85F-A2926E5DEAD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5.3", + "versionEndExcluding": "6.5.7", + "matchCriteriaId": "E413C8D4-78D9-4BA2-AA27-C686E4D65A09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:4.14.326:*:*:*:*:*:*:*", + "matchCriteriaId": "7D69FD12-238F-4D96-8520-4C77E2B6FB85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:4.19.295:*:*:*:*:*:*:*", + "matchCriteriaId": "67A9EA15-10FD-4821-99DA-139F28267AF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.4.257:*:*:*:*:*:*:*", + "matchCriteriaId": "66DC852D-D687-42FE-B337-455473C3ADFB" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/10a18c8bac7f60d32b7af22da03b66f350beee38", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/16cc18b9080892d1a0200a38e36ae52e464bc555", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5afb996349cb6d1f14d6ba9aaa7aed3bd82534f6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6b706286473db4fd54b5f869faa67f4a8cb18e99", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/71b1d2b57f145c8469aa9346f0fd57bf59b2b89c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aef7a0300047e7b4707ea0411dc9597cba108fc8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b8e260654a29de872e7cb85387d8ab8974694e8e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/be2ff39b1504c5359f4a083c1cfcad21d666e216", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/10a18c8bac7f60d32b7af22da03b66f350beee38", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/16cc18b9080892d1a0200a38e36ae52e464bc555", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5afb996349cb6d1f14d6ba9aaa7aed3bd82534f6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6b706286473db4fd54b5f869faa67f4a8cb18e99", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/71b1d2b57f145c8469aa9346f0fd57bf59b2b89c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aef7a0300047e7b4707ea0411dc9597cba108fc8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b8e260654a29de872e7cb85387d8ab8974694e8e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/be2ff39b1504c5359f4a083c1cfcad21d666e216", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52527.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52527.json index b00d5c1de0c..8571b3642c4 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52527.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52527.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52527", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:48.403", - "lastModified": "2024-11-21T08:39:58.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-13T20:39:56.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,235 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv4, ipv6: se corrigi\u00f3 el manejo de transhdrlen en __ip{,6}_append_data() Incluir el transhdrlen en longitud es un problema cuando el paquete est\u00e1 parcialmente lleno (por ejemplo, algo como enviar(MSG_MORE ) sucedi\u00f3 anteriormente) al agregarlo a un paquete IPv4 o IPv6, ya que no queremos repetir el encabezado de transporte ni contabilizarlo dos veces. Esto puede suceder en algunas circunstancias, como al realizar un empalme en un z\u00f3calo L2TP. El s\u00edntoma observado es una advertencia en __ip6_append_data(): ADVERTENCIA: CPU: 1 PID: 5042 en net/ipv6/ip6_output.c:1800 __ip6_append_data.isra.0+0x1be8/0x47f0 net/ipv6/ip6_output.c:1800 que ocurre cuando MSG_SPLICE_PAGES se utiliza para agregar m\u00e1s datos a un skbuff que ya est\u00e1 parcialmente ocupado. La advertencia se produce cuando 'copiar' es mayor que la cantidad de datos en el iterador del mensaje. Esto se debe a que la longitud solicitada incluye la longitud del encabezado de transporte cuando no deber\u00eda hacerlo. Esto puede desencadenarse, por ejemplo: sfd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_L2TP); enlazar(sfd, ...); // ::1 conectar(sfd, ...); // ::1 puerto 7 enviar(sfd, buffer, 4100, MSG_MORE); enviar archivo (sfd, dfd, NULL, 1024); Solucione este problema agregando solo transhdrlen a la longitud si la cola de escritura est\u00e1 vac\u00eda en l2tp_ip6_sendmsg(), de manera an\u00e1loga a c\u00f3mo hace las cosas UDP. Parece que l2tp_ip_sendmsg() no sufrir\u00e1 este problema ya que construye el paquete UDP por s\u00ed mismo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5", + "versionEndExcluding": "4.14.327", + "matchCriteriaId": "CC009A79-D1F2-492D-AC37-5EF2DECD6C54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.296", + "matchCriteriaId": "78DAD65C-4893-461B-91B2-F4E7C212F140" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.258", + "matchCriteriaId": "1208C905-CEAA-49F2-B357-72A5185B2656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.198", + "matchCriteriaId": "66D916C3-4087-44FF-9CD9-D2826BCC9E3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.135", + "matchCriteriaId": "53447712-3158-498E-A077-9FA1898E6464" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.57", + "matchCriteriaId": "8629E5D1-351D-4D4B-8D05-E10BD4A1CFD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.5.7", + "matchCriteriaId": "830A824C-F212-4FDC-ADEF-0EBEC6B2365B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", + "matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", + "matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*", + "matchCriteriaId": "0DC421F1-3D5A-4BEF-BF76-4E468985D20B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*", + "matchCriteriaId": "00AB783B-BE05-40E8-9A55-6AA457D95031" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1fc793d68d50dee4782ef2e808913d5dd880bcc6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/559d697c5d072593d22b3e0bd8b8081108aeaf59", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7626b9fed53092aa2147978070e610ecb61af844", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/96b2e1090397217839fcd6c9b6d8f5d439e705ed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9d4c75800f61e5d75c1659ba201b6c0c7ead3070", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cd1189956393bf850b2e275e37411855d3bd86bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6a7182179c0ed788e3755ee2ed18c888ddcc33f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe80658c08e3001c80c5533cd41abfbb0e0e28fd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1fc793d68d50dee4782ef2e808913d5dd880bcc6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/559d697c5d072593d22b3e0bd8b8081108aeaf59", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7626b9fed53092aa2147978070e610ecb61af844", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/96b2e1090397217839fcd6c9b6d8f5d439e705ed", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9d4c75800f61e5d75c1659ba201b6c0c7ead3070", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cd1189956393bf850b2e275e37411855d3bd86bb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6a7182179c0ed788e3755ee2ed18c888ddcc33f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe80658c08e3001c80c5533cd41abfbb0e0e28fd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52718.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52718.json index e91139edf34..7daeab37c1c 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52718.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52718.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52718", "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T08:15:04.797", - "lastModified": "2024-12-28T08:15:04.797", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-13T20:50:13.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,12 +69,297 @@ "value": "CWE-420" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:pt9030-15_firmware:3.0.3.266:*:*:*:*:*:*:*", + "matchCriteriaId": "6448BB89-9B6D-4AFD-9E28-23EB03C4AA52" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:pt9030-15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C168F352-DFCD-45F6-AA6D-FFFFE1840FE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:ws7206-10_firmware:11.0.5.19:*:*:*:*:*:*:*", + "matchCriteriaId": "68FA3E83-1970-4500-B3B5-E2F68E178487" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:ws7206-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8153CF45-E1C2-4355-8E99-12B3321A3C28" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:ws7206-10_firmware:2.1.0.203:*:*:*:*:*:*:*", + "matchCriteriaId": "E88C36C8-E477-49AC-9A23-1BE6C87525DE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:ws7206-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8153CF45-E1C2-4355-8E99-12B3321A3C28" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:ws7290-15_firmware:3.0.3.266:*:*:*:*:*:*:*", + "matchCriteriaId": "B9863510-CCE9-47A6-AE6F-B841BE97EC11" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:ws7290-15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "318B5B11-EB95-4729-95BA-603AE2A6821B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:ws8000-10_firmware:3.0.3.236:*:*:*:*:*:*:*", + "matchCriteriaId": "CB91CA3A-6D93-4580-8142-56EFCE325A7A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:ws8000-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "308EC09B-A09D-47A3-8654-F90D80F82100" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:ws8001-10_firmware:3.0.3.242:*:*:*:*:*:*:*", + "matchCriteriaId": "EC637316-8BDD-45D8-ABD0-C7B5A3E9E585" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:ws8001-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC2333EB-3BA5-4EE5-A88A-68A97912F6E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:ws8002-10_firmware:3.0.3.242:*:*:*:*:*:*:*", + "matchCriteriaId": "E55857B5-BDFC-4A8E-A9FD-5509EE05217B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:ws8002-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "177AB0ED-0F61-4345-AA36-E5690CEB6712" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:ws8500-10_firmware:3.0.3.235:*:*:*:*:*:*:*", + "matchCriteriaId": "1FD6B7EB-6D3B-4F1B-A021-474333435A92" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:ws8500-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6603C16-0A98-4EBE-91AC-C0C74DAD6EA8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:ws8502-10_firmware:3.0.3.242:*:*:*:*:*:*:*", + "matchCriteriaId": "858AFE8C-826B-401F-BA0C-445E5B287770" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:ws8502-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16A0BCD5-3293-4860-8B6A-7C224D350223" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:ws8700-10_firmware:3.0.3.251:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EB4588-7370-4743-A262-62BBC62C92DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:ws8700-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6796317F-F4C4-48F8-8495-1AEB2DECFB20" + } + ] + } + ] } ], "references": [ { "url": "https://www.huawei.com/br/psirt/security-advisories/2024/huawei-sa-chvishhr-d50dedde-en", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52953.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52953.json index ab5230f7b8c..0802f50eda6 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52953.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52953.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52953", "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:07.990", - "lastModified": "2025-01-08T03:15:07.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-13T19:08:57.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,12 +69,62 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52954.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52954.json index beef1981d3b..e2f9f90e3a7 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52954.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52954.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52954", "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:08.130", - "lastModified": "2025-01-08T03:15:08.130", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-13T19:09:19.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,67 @@ "value": "CWE-701" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52955.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52955.json index 8eb1128476a..c08e244b955 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52955.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52955.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52955", "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:08.263", - "lastModified": "2025-01-08T03:15:08.263", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-13T19:09:36.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,67 @@ "value": "CWE-264" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7266.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7266.json index 5bb978d473d..3253eef4c3b 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7266.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7266.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7266", "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T07:15:19.967", - "lastModified": "2024-12-28T07:15:19.967", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-13T20:48:22.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,12 +69,108 @@ "value": "CWE-420" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:tc7001-10_firmware:2.0.0.336\\(sp6c300\\):*:*:*:*:*:*:*", + "matchCriteriaId": "34A51E6B-696A-4275-A1CC-18AD400426DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:tc7001-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "291B8DCD-DE45-4834-8F16-2464EB29FD46" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:ws7200-10_firmware:3.0.3.215:*:*:*:*:*:*:*", + "matchCriteriaId": "633DC6F0-E031-4278-8E0B-41AE975F7DD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:ws7200-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CC813CE-339B-4DB6-9920-D64D185FDDD9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:ws7206-10_firmware:4.0.0.16\\(v3r2\\):*:*:*:*:*:*:*", + "matchCriteriaId": "9A6C0416-F770-415C-9013-332A61E4D358" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:ws7206-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8153CF45-E1C2-4355-8E99-12B3321A3C28" + } + ] + } + ] } ], "references": [ { "url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-chvishhr-d616b19e-en", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12587.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12587.json index 068a2574d0c..5404b07da74 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12587.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12587.json @@ -2,16 +2,43 @@ "id": "CVE-2024-12587", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-11T06:15:25.070", - "lastModified": "2025-01-11T06:15:25.070", + "lastModified": "2025-01-13T20:15:27.283", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Contact Form Master WordPress plugin through 1.0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." + }, + { + "lang": "es", + "value": "El complemento Contact Form Master de WordPress hasta la versi\u00f3n 1.0.7 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un error de Cross Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/7cb040f5-d154-48ea-a54e-80451054bad8/", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26709.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26709.json index df900d5f8d8..2f719175368 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26709.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26709.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26709", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:53.440", - "lastModified": "2024-11-21T09:02:53.617", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-13T20:03:28.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,109 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/iommu: corrige el iommu_group_put() que falta durante la conexi\u00f3n del dominio de la plataforma. Falta la funci\u00f3n spapr_tce_platform_iommu_attach_dev() para llamar a iommu_group_put() cuando el dominio ya est\u00e1 configurado. Esta fuga de recuento aparece con BUG_ON() durante la operaci\u00f3n de eliminaci\u00f3n de DLPAR como: KernelBug: Error del kernel en estado 'Ninguno': ERROR del kernel en arch/powerpc/platforms/pseries/iommu.c:100. Vaya: Excepci\u00f3n en modo kernel, sign: 5 [#1] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=8192 NUMA pSeries Nombre de hardware: IBM,9080-HEX POWER10 (sin formato) 0x800200 0xf000006 of:IBM,FW1060. 00 (NH1060_016) hv:phyp pSeries NIP: c0000000000ff4d4 LR: c0000000000ff4cc CTR: 0000000000000000 REGS: c0000013aed5f840 TRAP: 0700 Contaminado: GI (6.8.0-rc3-autotest-g9 9bd3cb0d12e) MSR: 8000000000029033 CR: 44002402 XER: 20040000 CFAR: c000000000a0d170 IRQMASK: 0 ... NIP iommu_reconfig_notifier+0x94/0x200 LR iommu_reconfig_notifier+0x8c/0x200 Seguimiento de llamadas: iommu_reconfig_notifier+0x8c/0x2 00 (no confiable) notifier_call_chain+0xb8/0x19c blocking_notifier_call_chain+ 0x64/0x98 of_reconfig_notify+0x44/0xdc of_detach_node+0x78/0xb0 ofdt_write.part.0+0x86c/0xbb8 proc_reg_write+0xf4/0x150 vfs_write+0xf8/0x488 ksys_write+0x84/0x140 system_call_exception+0x1 38/0x330 system_call_vectored_common+0x15c/0x2ec El parche agrega la llamada faltante a iommu_group_put()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.6", + "matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0846dd77c8349ec92ca0079c9c71d130f34cb192", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c90fdea9cac9eb419fc266e75d625cb60c8f7f6c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0846dd77c8349ec92ca0079c9c71d130f34cb192", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c90fdea9cac9eb419fc266e75d625cb60c8f7f6c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44771.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44771.json new file mode 100644 index 00000000000..54603851e45 --- /dev/null +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44771.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44771", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-13T19:15:10.670", + "lastModified": "2025-01-13T19:15:10.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "BigId PrivacyPortal v179 is vulnerable to Cross Site Scripting (XSS) via the \"Label\" field in the Report template function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bigid.com/privacy/privacy-portal-app/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.appgate.com/blog/cross-site-scripting-xss-in-bigid-privacy-portal", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46310.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46310.json new file mode 100644 index 00000000000..90afdec5b29 --- /dev/null +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46310.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-46310", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-13T19:15:10.803", + "lastModified": "2025-01-13T19:15:10.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Access Control in Cfx.re FXServer v9601 and earlier allows unauthenticated users to modify and read arbitrary user data via exposed API endpoint" + } + ], + "metrics": {}, + "references": [ + { + "url": "http://cfxre.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/PRX5Y/CVE-2024-46310", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46480.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46480.json new file mode 100644 index 00000000000..b378ec41e74 --- /dev/null +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46480.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-46480", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-13T20:15:28.147", + "lastModified": "2025-01-13T20:15:28.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An NTLM hash leak in Venki Supravizio BPM up to 18.0.1 allows authenticated attackers with Application Administrator access to escalate privileges on the underlying host system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Lorenzo-de-Sa/Vulnerability-Research", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Lorenzo-de-Sa/Vulnerability-Research/blob/main/CVE-2024-46480.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.venki.com.br/ferramenta-bpm/supravizio/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46481.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46481.json new file mode 100644 index 00000000000..8ac8ba2557d --- /dev/null +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46481.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-46481", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-13T20:15:28.300", + "lastModified": "2025-01-13T20:15:28.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The login page of Venki Supravizio BPM up to 18.1.1 is vulnerable to open redirect leading to reflected XSS." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Lorenzo-de-Sa/Vulnerability-Research", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Lorenzo-de-Sa/Vulnerability-Research/blob/main/CVE-2024-46481.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.venki.com.br/ferramenta-bpm/supravizio/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46919.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46919.json index deaedd272c4..fe456fbcacc 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46919.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46919.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46919", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T17:15:16.833", - "lastModified": "2025-01-13T17:15:16.833", + "lastModified": "2025-01-13T20:15:28.450", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue was discovered in Samsung Mobile Processor Exynos 9820, 9825, 980, 990, 850, 1080, 2100, and 1280. Lack of a length check leads to a stack out-of-bounds write at loadOutputBuffers." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46920.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46920.json index cff1868c203..171651d9d72 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46920.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46920.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46920", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T18:15:18.517", - "lastModified": "2025-01-13T18:15:18.517", + "lastModified": "2025-01-13T20:15:28.613", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue was discovered in Samsung Mobile Processor Exynos 9820, 9825, 980, 990, 850, 1080, 2100, and 1280. Lack of a length check leads to a stack out-of-bounds write at loadInputBuffers." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46921.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46921.json new file mode 100644 index 00000000000..c60d1096604 --- /dev/null +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46921.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-46921", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-13T19:15:10.903", + "lastModified": "2025-01-13T19:15:10.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Samsung Mobile Processor and Modem Exynos 9820, 9825, 980, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W1000, Modem 5123, Modem 5300, Modem 5400. UE does not limit the number of attempts for the RRC Setup procedure in the 5G SA, leading to a denial of service (battery-drain attack)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-46921/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48883.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48883.json index bc0c55673a8..d3ddb8c9a6d 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48883.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48883.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48883", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T17:15:16.947", - "lastModified": "2025-01-13T17:15:16.947", + "lastModified": "2025-01-13T20:15:28.770", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, and Modem 5300. The UE incorrectly handles a malformed uplink scheduling message, resulting in an information leak of the UE." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52935.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52935.json index bb762ae8f1a..4c6f991ccc8 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52935.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52935.json @@ -2,16 +2,43 @@ "id": "CVE-2024-52935", "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2025-01-13T11:15:08.743", - "lastModified": "2025-01-13T11:15:08.743", + "lastModified": "2025-01-13T19:15:10.993", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory." + }, + { + "lang": "es", + "value": "El software del kernel instalado y ejecut\u00e1ndose dentro de una m\u00e1quina virtual invitada puede explotar la memoria compartida con el firmware de la GPU para escribir datos fuera de la memoria de la GPU virtualizada del invitado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce", diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53204.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53204.json index 89bfe4d9454..52d1166317a 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53204.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53204.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53204", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:28.207", - "lastModified": "2024-12-27T14:15:28.207", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-13T19:51:04.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: phy: realtek: usb: corregir deref NULL en rtk_usb3phy_probe En rtk_usb3phy_probe(), devm_kzalloc() puede devolver NULL, pero este valor devuelto no se comprueba." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "08BD273C-E55F-4F15-94F5-1BF716749C15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/48d52d3168749e10c1c37cd4ceccd18625851741", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/776f13ad1f88485206f1dca5ef138553106950e5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bf373d2919d98f3d1fe1b19a0304f72fe74386d9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54120.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54120.json index 4726f7818ba..e73154b838f 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54120.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54120.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54120", "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:08.707", - "lastModified": "2025-01-08T03:15:08.707", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-13T19:27:15.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -49,12 +69,42 @@ "value": "CWE-362" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-546xx/CVE-2024-54687.json b/CVE-2024/CVE-2024-546xx/CVE-2024-54687.json index 8744878eadb..64c8fea680b 100644 --- a/CVE-2024/CVE-2024-546xx/CVE-2024-54687.json +++ b/CVE-2024/CVE-2024-546xx/CVE-2024-54687.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54687", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T18:15:22.630", - "lastModified": "2025-01-10T18:15:22.630", + "lastModified": "2025-01-13T20:15:28.927", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vtiger CRM v.6.1 and before is vulnerable to Cross Site Scripting (XSS) via the Documents module and function uploadAndSaveFile in CRMEntity.php." + }, + { + "lang": "es", + "value": "Vtiger CRM v.6.1 y anteriores son vulnerables a Cross Site Scripting (XSS) a trav\u00e9s del m\u00f3dulo Documentos y la funci\u00f3n uploadAndSaveFile en CRMEntity.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://andrea0.medium.com", diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56437.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56437.json index b39461347d2..33dc6c7710b 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56437.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56437.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56437", "sourceIdentifier": "psirt@huawei.com", "published": "2025-01-08T03:15:08.840", - "lastModified": "2025-01-08T03:15:08.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-13T19:27:34.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,42 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/1/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56704.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56704.json index 1e2fa3f1d4c..cf322dfaaac 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56704.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56704.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56704", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-28T10:15:18.817", - "lastModified": "2024-12-28T10:15:18.817", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-13T19:55:28.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,173 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: 9p/xen: se corrige la liberaci\u00f3n de IRQ. Los registros del kernel indican que se liber\u00f3 una IRQ dos veces. Se pasa la identificaci\u00f3n del dispositivo correcta durante la liberaci\u00f3n de IRQ. [Dominique: se elimina la variable confusa que se restablece a 0]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.12", + "versionEndExcluding": "4.19.325", + "matchCriteriaId": "D82AB67D-EDD6-4051-90A4-E9E2918056A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.287", + "matchCriteriaId": "E4B15788-D35E-4E5B-A9C0-070AE3729B34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2bb3ee1bf237557daea1d58007d2e1d4a6502ccf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4950408793b118cb8075bcee1f033b543fb719fa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/530bc9f03a102fac95b07cda513bfc16ff69e0ee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/692eb06703afc3e24d889d77e94a0e20229f6a4a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f5a2ed5c1810661e6b03f5a4ebf17682cdea850", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b9e26059664bd9ebc64a0e8f5216266fc9f84265", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d74b4b297097bd361b8a9abfde9b521ff464ea9c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d888f5f5d76b2722c267e6bdf51d445d60647b7b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e43c608f40c065b30964f0a806348062991b802d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57487.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57487.json index c4b068aafd6..e0c544a9946 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57487.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57487.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57487", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T17:15:17.160", - "lastModified": "2025-01-13T17:15:17.160", + "lastModified": "2025-01-13T20:15:29.090", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In Code-Projects Online Car Rental System 1.0, the file upload feature does not validate file extensions or MIME types allowing an attacker to upload a PHP shell without any restrictions and execute commands on the server." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://code-projects.org/online-car-rental-using-php-source-code/", diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57488.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57488.json index f7e9ce4da15..9d27ebb253f 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57488.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57488.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57488", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T17:15:17.263", - "lastModified": "2025-01-13T17:15:17.263", + "lastModified": "2025-01-13T20:15:29.240", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Code-Projects Online Car Rental System 1.0 is vulnerable to Cross Site Scripting (XSS) via the vehicalorcview parameter in /admin/edit-vehicle.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://code-projects.org/online-car-rental-using-php-source-code/", diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0405.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0405.json index c3a37edc3d8..29b9c2d7957 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0405.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0405.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0405", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T01:15:07.430", - "lastModified": "2025-01-13T01:15:07.430", + "lastModified": "2025-01-13T19:15:11.227", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in liujianview gymxmjpa 1.0 and classified as critical. This issue affects the function GoodsDaoImpl of the file src/main/java/com/liujian/gymxmjpa/controller/GoodsController.java. The manipulation of the argument goodsName leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en liujianview gymxmjpa 1.0 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a la funci\u00f3n GoodsDaoImpl del archivo src/main/java/com/liujian/gymxmjpa/controller/GoodsController.java. La manipulaci\u00f3n del argumento goodsName conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,14 @@ { "url": "https://vuldb.com/?submit.473411", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/liujianview/gymxmjpa/issues/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/liujianview/gymxmjpa/issues/3#issue-2765770918", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22142.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22142.json new file mode 100644 index 00000000000..7af51b7cd5d --- /dev/null +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22142.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-22142", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-13T20:15:29.677", + "lastModified": "2025-01-13T20:15:29.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NamelessMC is a free, easy to use & powerful website software for Minecraft servers. In affected versions an admin can add the ability to have users fill out an additional field and users can inject javascript code into it that would be activated once a staffer visits the user's profile on staff panel. As a result an attacker can execute javascript code on the staffer's computer. This issue has been addressed in version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/NamelessMC/Nameless/releases/tag/v2.1.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NamelessMC/Nameless/security/advisories/GHSA-9q22-w64p-g8qm", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22144.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22144.json new file mode 100644 index 00000000000..2a53857f89d --- /dev/null +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22144.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-22144", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-13T20:15:29.817", + "lastModified": "2025-01-13T20:15:29.817", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NamelessMC is a free, easy to use & powerful website software for Minecraft servers. A user with admincp.core.emails or admincp.users.edit permissions can validate users and an attacker can reset their password. When the account is successfully approved by email the reset code is NULL, but when the account is manually validated by a user with admincp.core.emails or admincp.users.edit permissions then the reset_code will no longer be NULL but empty. An attacker can request http://localhost/nameless/index.php?route=/forgot_password/&c= and reset the password. As a result an attacker may compromise another users password and take over their account. This issue has been addressed in release version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-610" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/NamelessMC/Nameless/releases/tag/v2.1.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NamelessMC/Nameless/security/advisories/GHSA-p883-7496-x35p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22828.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22828.json index d9324f1a906..b95c2b30723 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22828.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22828.json @@ -2,7 +2,7 @@ "id": "CVE-2025-22828", "sourceIdentifier": "security@apache.org", "published": "2025-01-13T13:16:12.233", - "lastModified": "2025-01-13T18:15:22.143", + "lastModified": "2025-01-13T19:15:11.373", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://lists.apache.org/thread/bbsm9fdwrgfyostzojh6ghpocgdmx8rs", "source": "security@apache.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/01/13/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23026.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23026.json new file mode 100644 index 00000000000..664435d5e2e --- /dev/null +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23026.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-23026", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-13T20:15:30.003", + "lastModified": "2025-01-13T20:15:30.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "jte (Java Template Engine) is a secure and lightweight template engine for Java and Kotlin. In affected versions Jte HTML templates with `script` tags or script attributes that include a Javascript template string (backticks) are subject to XSS. The `javaScriptBlock` and `javaScriptAttribute` methods in the `Escape` class do not escape backticks, which are used for Javascript template strings. Dollar signs in template strings should also be escaped as well to prevent undesired interpolation. HTML templates rendered by Jte's `OwaspHtmlTemplateOutput` in versions less than or equal to `3.1.15` with `script` tags or script attributes that contain Javascript template strings (backticks) are vulnerable. Users are advised to upgrade to version 3.1.16 or later to resolve this issue. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-150" + } + ] + } + ], + "references": [ + { + "url": "https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Template_literals#description", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/casid/jte/blob/main/jte-runtime/src/main/java/gg/jte/html/escape/Escape.java#L43-L83", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/casid/jte/security/advisories/GHSA-vh22-6c6h-rm8q", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23027.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23027.json new file mode 100644 index 00000000000..8eb28995775 --- /dev/null +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23027.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-23027", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-13T20:15:30.150", + "lastModified": "2025-01-13T20:15:30.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "next-forge is a Next.js project boilerplate for modern web application. The BASEHUB_TOKEN commited in apps/web/.env.example. Users should avoid use of this token and should remove any access it may have in their systems." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/haydenbleasel/next-forge/commit/239a98f2c308a51d626ae0613102917f82603c1c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/haydenbleasel/next-forge/security/advisories/GHSA-wppx-qmqh-9h33", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23078.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23078.json index 8b1574e5256..6d2a4262f0a 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23078.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23078.json @@ -2,16 +2,43 @@ "id": "CVE-2025-23078", "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "published": "2025-01-10T18:15:26.877", - "lastModified": "2025-01-10T18:15:26.877", + "lastModified": "2025-01-13T19:15:11.540", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - Breadcrumbs2 extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Breadcrumbs2 extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.5, from 1.42.X before 1.42.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Wikimedia Foundation Mediawiki - Breadcrumbs2 extension que permite Cross-Site Scripting (XSS). Este problema afecta a la extensi\u00f3n Mediawiki - Breadcrumbs2: desde 1.39.X hasta 1.39.11, desde 1.41.X hasta 1.41.5, desde 1.42.X hasta 1.42.4." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ { "source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", diff --git a/README.md b/README.md index bd0f84b25a8..e229e57a231 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-13T19:00:20.501346+00:00 +2025-01-13T21:00:21.256051+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-13T18:58:56.063000+00:00 +2025-01-13T20:50:13.847000+00:00 ``` ### Last Data Feed Release @@ -33,54 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -276866 +276875 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `9` -- [CVE-2024-12211](CVE-2024/CVE-2024-122xx/CVE-2024-12211.json) (`2025-01-13T17:15:16.243`) -- [CVE-2024-46479](CVE-2024/CVE-2024-464xx/CVE-2024-46479.json) (`2025-01-13T18:15:18.003`) -- [CVE-2024-46919](CVE-2024/CVE-2024-469xx/CVE-2024-46919.json) (`2025-01-13T17:15:16.833`) -- [CVE-2024-46920](CVE-2024/CVE-2024-469xx/CVE-2024-46920.json) (`2025-01-13T18:15:18.517`) -- [CVE-2024-48883](CVE-2024/CVE-2024-488xx/CVE-2024-48883.json) (`2025-01-13T17:15:16.947`) -- [CVE-2024-54999](CVE-2024/CVE-2024-549xx/CVE-2024-54999.json) (`2025-01-13T17:15:17.057`) -- [CVE-2024-5743](CVE-2024/CVE-2024-57xx/CVE-2024-5743.json) (`2025-01-13T18:15:19.517`) -- [CVE-2024-57487](CVE-2024/CVE-2024-574xx/CVE-2024-57487.json) (`2025-01-13T17:15:17.160`) -- [CVE-2024-57488](CVE-2024/CVE-2024-574xx/CVE-2024-57488.json) (`2025-01-13T17:15:17.263`) -- [CVE-2024-6352](CVE-2024/CVE-2024-63xx/CVE-2024-6352.json) (`2025-01-13T17:15:17.367`) +- [CVE-2024-44771](CVE-2024/CVE-2024-447xx/CVE-2024-44771.json) (`2025-01-13T19:15:10.670`) +- [CVE-2024-46310](CVE-2024/CVE-2024-463xx/CVE-2024-46310.json) (`2025-01-13T19:15:10.803`) +- [CVE-2024-46480](CVE-2024/CVE-2024-464xx/CVE-2024-46480.json) (`2025-01-13T20:15:28.147`) +- [CVE-2024-46481](CVE-2024/CVE-2024-464xx/CVE-2024-46481.json) (`2025-01-13T20:15:28.300`) +- [CVE-2024-46921](CVE-2024/CVE-2024-469xx/CVE-2024-46921.json) (`2025-01-13T19:15:10.903`) +- [CVE-2025-22142](CVE-2025/CVE-2025-221xx/CVE-2025-22142.json) (`2025-01-13T20:15:29.677`) +- [CVE-2025-22144](CVE-2025/CVE-2025-221xx/CVE-2025-22144.json) (`2025-01-13T20:15:29.817`) +- [CVE-2025-23026](CVE-2025/CVE-2025-230xx/CVE-2025-23026.json) (`2025-01-13T20:15:30.003`) +- [CVE-2025-23027](CVE-2025/CVE-2025-230xx/CVE-2025-23027.json) (`2025-01-13T20:15:30.150`) ### CVEs modified in the last Commit -Recently modified CVEs: `38` +Recently modified CVEs: `39` -- [CVE-2023-52480](CVE-2023/CVE-2023-524xx/CVE-2023-52480.json) (`2025-01-13T17:05:39.887`) -- [CVE-2023-52482](CVE-2023/CVE-2023-524xx/CVE-2023-52482.json) (`2025-01-13T18:27:10.853`) -- [CVE-2023-52483](CVE-2023/CVE-2023-524xx/CVE-2023-52483.json) (`2025-01-13T17:53:05.157`) -- [CVE-2023-52499](CVE-2023/CVE-2023-524xx/CVE-2023-52499.json) (`2025-01-13T18:29:52.097`) -- [CVE-2023-52500](CVE-2023/CVE-2023-525xx/CVE-2023-52500.json) (`2025-01-13T18:43:18.007`) -- [CVE-2023-52501](CVE-2023/CVE-2023-525xx/CVE-2023-52501.json) (`2025-01-13T18:45:17.817`) -- [CVE-2023-52505](CVE-2023/CVE-2023-525xx/CVE-2023-52505.json) (`2025-01-13T18:48:17.593`) -- [CVE-2023-52506](CVE-2023/CVE-2023-525xx/CVE-2023-52506.json) (`2025-01-13T18:49:25.347`) -- [CVE-2023-52507](CVE-2023/CVE-2023-525xx/CVE-2023-52507.json) (`2025-01-13T18:51:41.030`) -- [CVE-2023-52517](CVE-2023/CVE-2023-525xx/CVE-2023-52517.json) (`2025-01-13T18:54:30.323`) -- [CVE-2023-52519](CVE-2023/CVE-2023-525xx/CVE-2023-52519.json) (`2025-01-13T18:57:26.213`) -- [CVE-2024-20342](CVE-2024/CVE-2024-203xx/CVE-2024-20342.json) (`2025-01-13T18:15:17.057`) -- [CVE-2024-47894](CVE-2024/CVE-2024-478xx/CVE-2024-47894.json) (`2025-01-13T18:15:18.693`) -- [CVE-2024-47895](CVE-2024/CVE-2024-478xx/CVE-2024-47895.json) (`2025-01-13T18:15:18.933`) -- [CVE-2024-47897](CVE-2024/CVE-2024-478xx/CVE-2024-47897.json) (`2025-01-13T18:15:19.310`) -- [CVE-2024-5974](CVE-2024/CVE-2024-59xx/CVE-2024-5974.json) (`2025-01-13T18:15:19.697`) -- [CVE-2025-0406](CVE-2025/CVE-2025-04xx/CVE-2025-0406.json) (`2025-01-13T18:15:20.490`) -- [CVE-2025-0407](CVE-2025/CVE-2025-04xx/CVE-2025-0407.json) (`2025-01-13T18:15:21.023`) -- [CVE-2025-0409](CVE-2025/CVE-2025-04xx/CVE-2025-0409.json) (`2025-01-13T18:15:21.430`) -- [CVE-2025-0410](CVE-2025/CVE-2025-04xx/CVE-2025-0410.json) (`2025-01-13T18:15:21.730`) -- [CVE-2025-22777](CVE-2025/CVE-2025-227xx/CVE-2025-22777.json) (`2025-01-13T18:15:22.000`) -- [CVE-2025-22828](CVE-2025/CVE-2025-228xx/CVE-2025-22828.json) (`2025-01-13T18:15:22.143`) -- [CVE-2025-23079](CVE-2025/CVE-2025-230xx/CVE-2025-23079.json) (`2025-01-13T18:15:22.470`) -- [CVE-2025-23108](CVE-2025/CVE-2025-231xx/CVE-2025-23108.json) (`2025-01-13T18:15:22.680`) -- [CVE-2025-23109](CVE-2025/CVE-2025-231xx/CVE-2025-23109.json) (`2025-01-13T18:15:22.903`) +- [CVE-2023-52523](CVE-2023/CVE-2023-525xx/CVE-2023-52523.json) (`2025-01-13T19:57:06.317`) +- [CVE-2023-52524](CVE-2023/CVE-2023-525xx/CVE-2023-52524.json) (`2025-01-13T20:00:51.600`) +- [CVE-2023-52525](CVE-2023/CVE-2023-525xx/CVE-2023-52525.json) (`2025-01-13T20:04:04.813`) +- [CVE-2023-52527](CVE-2023/CVE-2023-525xx/CVE-2023-52527.json) (`2025-01-13T20:39:56.607`) +- [CVE-2023-52718](CVE-2023/CVE-2023-527xx/CVE-2023-52718.json) (`2025-01-13T20:50:13.847`) +- [CVE-2023-52953](CVE-2023/CVE-2023-529xx/CVE-2023-52953.json) (`2025-01-13T19:08:57.217`) +- [CVE-2023-52954](CVE-2023/CVE-2023-529xx/CVE-2023-52954.json) (`2025-01-13T19:09:19.737`) +- [CVE-2023-52955](CVE-2023/CVE-2023-529xx/CVE-2023-52955.json) (`2025-01-13T19:09:36.110`) +- [CVE-2023-7266](CVE-2023/CVE-2023-72xx/CVE-2023-7266.json) (`2025-01-13T20:48:22.750`) +- [CVE-2024-12587](CVE-2024/CVE-2024-125xx/CVE-2024-12587.json) (`2025-01-13T20:15:27.283`) +- [CVE-2024-26709](CVE-2024/CVE-2024-267xx/CVE-2024-26709.json) (`2025-01-13T20:03:28.797`) +- [CVE-2024-46919](CVE-2024/CVE-2024-469xx/CVE-2024-46919.json) (`2025-01-13T20:15:28.450`) +- [CVE-2024-46920](CVE-2024/CVE-2024-469xx/CVE-2024-46920.json) (`2025-01-13T20:15:28.613`) +- [CVE-2024-48883](CVE-2024/CVE-2024-488xx/CVE-2024-48883.json) (`2025-01-13T20:15:28.770`) +- [CVE-2024-52935](CVE-2024/CVE-2024-529xx/CVE-2024-52935.json) (`2025-01-13T19:15:10.993`) +- [CVE-2024-53204](CVE-2024/CVE-2024-532xx/CVE-2024-53204.json) (`2025-01-13T19:51:04.787`) +- [CVE-2024-54120](CVE-2024/CVE-2024-541xx/CVE-2024-54120.json) (`2025-01-13T19:27:15.427`) +- [CVE-2024-54687](CVE-2024/CVE-2024-546xx/CVE-2024-54687.json) (`2025-01-13T20:15:28.927`) +- [CVE-2024-56437](CVE-2024/CVE-2024-564xx/CVE-2024-56437.json) (`2025-01-13T19:27:34.937`) +- [CVE-2024-56704](CVE-2024/CVE-2024-567xx/CVE-2024-56704.json) (`2025-01-13T19:55:28.720`) +- [CVE-2024-57487](CVE-2024/CVE-2024-574xx/CVE-2024-57487.json) (`2025-01-13T20:15:29.090`) +- [CVE-2024-57488](CVE-2024/CVE-2024-574xx/CVE-2024-57488.json) (`2025-01-13T20:15:29.240`) +- [CVE-2025-0405](CVE-2025/CVE-2025-04xx/CVE-2025-0405.json) (`2025-01-13T19:15:11.227`) +- [CVE-2025-22828](CVE-2025/CVE-2025-228xx/CVE-2025-22828.json) (`2025-01-13T19:15:11.373`) +- [CVE-2025-23078](CVE-2025/CVE-2025-230xx/CVE-2025-23078.json) (`2025-01-13T19:15:11.540`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f8c183c0fc5..f53e87761a8 100644 --- a/_state.csv +++ b/_state.csv @@ -152063,17 +152063,17 @@ CVE-2020-18191,0,0,19c56ae3e2117a539ce0ec995b7d09a93e98a8c51ed958bc18b6f0bfa22fb CVE-2020-18194,0,0,54c713b4f65cc26d43c42b007edc0b4d855084ecf547a1cd30369fa8c8521c58,2024-11-21T05:08:28.907000 CVE-2020-18195,0,0,0060cb677a270d581371d776344f6b9950bdd190d2acbc16b2092c2cd3d548bf,2024-11-21T05:08:29.043000 CVE-2020-18198,0,0,371da80ca3cccdc5d0da8b636ff3e22589e1c4bf74e1b74c12245b968150ecc0,2024-11-21T05:08:29.183000 -CVE-2020-1820,0,1,b9886940566ec92786818daf088c0f24cf984de31418cbe3784f70c56e7a10de,2025-01-13T18:40:36.910000 -CVE-2020-1821,0,1,7c5548ba45b687588f58c7f56285d1ed4415ed6bcd2133bdfc66d487933003a0,2025-01-13T18:40:31.437000 +CVE-2020-1820,0,0,b9886940566ec92786818daf088c0f24cf984de31418cbe3784f70c56e7a10de,2025-01-13T18:40:36.910000 +CVE-2020-1821,0,0,7c5548ba45b687588f58c7f56285d1ed4415ed6bcd2133bdfc66d487933003a0,2025-01-13T18:40:31.437000 CVE-2020-18215,0,0,276eef64aa4a8b79b3a46616d24d133865a5ed2bba973c10957013f5507470ac,2024-11-21T05:08:29.320000 -CVE-2020-1822,0,1,b186bdf767b198e443d41aaa3f0568281de8e0c24d97797cbda09b08449edd09,2025-01-13T18:40:17.893000 +CVE-2020-1822,0,0,b186bdf767b198e443d41aaa3f0568281de8e0c24d97797cbda09b08449edd09,2025-01-13T18:40:17.893000 CVE-2020-18220,0,0,fcadbf12c706c185ba245780ea87b3c85d5c7b487234e5482fa49302b6c3f60b,2024-11-21T05:08:29.460000 CVE-2020-18221,0,0,c828beeb6390a6c9cb50654e2c2b08c43e13791f7c51b611bd9e30e60b2b507f,2024-11-21T05:08:29.610000 CVE-2020-18229,0,0,de9c2971ce3c744dceeb564dc0c669d2d99acde568c9be68f645ea66497b0c74,2024-11-21T05:08:29.760000 -CVE-2020-1823,0,1,78688f05bac37c7a383b6fb4e653235eb880ce3304dbcadfa2dea48970d362a8,2025-01-13T18:39:37.540000 +CVE-2020-1823,0,0,78688f05bac37c7a383b6fb4e653235eb880ce3304dbcadfa2dea48970d362a8,2025-01-13T18:39:37.540000 CVE-2020-18230,0,0,ebe6a5a6a2698552960b0422ae9d0e50a9d70f16138ca3d85f0e7ad4347f523d,2024-11-21T05:08:29.907000 CVE-2020-18232,0,0,5705461e816b6f6694e9ef2f2718b69a045749e869a3533e3ed5283cd8248b1c,2024-11-21T05:08:30.053000 -CVE-2020-1824,0,1,58a8ea64e3ed8a5ec1daebc856765572e8e7f785d09c3ca56b57919941da3c25,2025-01-13T18:39:27.433000 +CVE-2020-1824,0,0,58a8ea64e3ed8a5ec1daebc856765572e8e7f785d09c3ca56b57919941da3c25,2025-01-13T18:39:27.433000 CVE-2020-1825,0,0,a942dde46b900514ca47c8e921ccce8d9844cba45eeb3a931cde0bf330b07fb0,2024-11-21T05:11:26.497000 CVE-2020-18259,0,0,b06cdddd0c60b9cb1417c4294714ea460eb7e87371666ba861010dfe792d37cd,2024-11-21T05:08:30.217000 CVE-2020-1826,0,0,9d793ee12c01e44af13c183cf0b2187da1411c3957dcb1f4bfb4e1b041d3db56,2024-11-21T05:11:26.610000 @@ -164064,10 +164064,10 @@ CVE-2020-9081,0,0,139ec462eaad02a81df0d28c173666bfaa32c021ae89aee5708babc237e9fe CVE-2020-9082,0,0,d6a05506574f6256e17dc7ddb7951771587a0da245df28e03ad97d6f33888ce5,2024-12-27T10:15:11.687000 CVE-2020-9083,0,0,3c67ba6c3c22aed2d55188918dc1f94331e35d4b01a5cc2f0a70002dd81e58ff,2024-11-21T05:39:59.550000 CVE-2020-9084,0,0,3fb7e0a38e1ed1b2f47bc2a7d12484efaeacd91f30486ad7c04c91bf9ed38a27,2024-11-21T05:39:59.720000 -CVE-2020-9085,0,0,5d6b3b014e60c8545bb72a1f6df32fc2d87f683d70c054b5cb73c2d5b19ad485,2024-12-27T10:15:12.217000 -CVE-2020-9086,0,0,f42c35ee65e65225877cbb726ec9053b96f403e3587f18603970d7b51d8fde58,2024-12-27T10:15:12.800000 +CVE-2020-9085,0,1,2e0e3874596d9f8cc419da9d7d9823a3a4ecd8d6d696c46ec2b4a7da166c3774,2025-01-13T19:35:55.387000 +CVE-2020-9086,0,1,c27ca9c50c41ebe5a8d65925985e5e5332f292aff6a3065e44b4dc252261a6cc,2025-01-13T19:34:15.140000 CVE-2020-9087,0,0,dadbb4b83a4b8ec94abd0f2857ea18ae49acc834c93ab896f9adffcec8c83e15,2024-11-21T05:39:59.873000 -CVE-2020-9089,0,1,cf5b86dc242b83b0825d815bda6d425d66a87c85bca5b987222d18b0b4d3af82,2025-01-13T18:58:56.063000 +CVE-2020-9089,0,0,cf5b86dc242b83b0825d815bda6d425d66a87c85bca5b987222d18b0b4d3af82,2025-01-13T18:58:56.063000 CVE-2020-9090,0,0,c50b319bf7c060145234fe1c0d5b88dc3689e5efe15671f86e1c19a5ed9f4539,2024-11-21T05:40:00.040000 CVE-2020-9091,0,0,c0385c8aa8379da17e2b5726a0fb14236b220fb1db6fd0b8cafa9ae38198a379,2024-11-21T05:40:00.187000 CVE-2020-9092,0,0,937b27efff0a9ba6560bff8af3ad978c113b9b104bf96f451356a3188f1cd3a7,2024-11-21T05:40:00.350000 @@ -164129,11 +164129,11 @@ CVE-2020-9206,0,0,66c8d926ce17a8dceebc323e986b82179d3968495f255e5371bdd3850b6a74 CVE-2020-9207,0,0,fd8fb207bf56a082cb8841446e7ede931b036786be53851cfaa1ba39641b71e1,2024-11-21T05:40:10.117000 CVE-2020-9208,0,0,19d6370a98790b39b434b9bdbf16f1b96172dcb41e7e2e6d2e802ec6da2cc463,2024-11-21T05:40:10.257000 CVE-2020-9209,0,0,718a3425df33701055c363309ab66bac95db4d83dd128a7acf2c699263cf87cf,2024-11-21T05:40:10.383000 -CVE-2020-9210,0,1,9675df58b538f3c51e2207eb3caa8a7ae0d32961ff6c3b16376bf7d7f42790bd,2025-01-13T18:57:02.907000 -CVE-2020-9211,0,1,f47ed6f32d19c23f0ad6ef15579f9e58d42f926f24404bd791a71efb16f10919,2025-01-13T18:53:58.603000 +CVE-2020-9210,0,0,9675df58b538f3c51e2207eb3caa8a7ae0d32961ff6c3b16376bf7d7f42790bd,2025-01-13T18:57:02.907000 +CVE-2020-9211,0,0,f47ed6f32d19c23f0ad6ef15579f9e58d42f926f24404bd791a71efb16f10919,2025-01-13T18:53:58.603000 CVE-2020-9212,0,0,ba27fda5a1a83f7c8a9792732635631dbc8f62392155cb4a0ecda41f0eb0c3fe,2024-11-21T05:40:10.563000 CVE-2020-9213,0,0,4cb4f2d9c83e4508a8bf6c989885c005f775d5e8a40a232cc9d6e497bff4cf1e,2024-11-21T05:40:10.703000 -CVE-2020-9222,0,1,d0e9667c7c30f63cd0cd5b42ee49ccaf99d71cc52fb2c34c1ccc912713187f77,2025-01-13T18:49:33.693000 +CVE-2020-9222,0,0,d0e9667c7c30f63cd0cd5b42ee49ccaf99d71cc52fb2c34c1ccc912713187f77,2025-01-13T18:49:33.693000 CVE-2020-9223,0,0,d2caf95754ffa4f54d6c3a94c77e1a52ce9347d87c8c5ee51ea3d1614f384636,2024-11-21T05:40:11.200000 CVE-2020-9225,0,0,26661ec5a217e1ca10ed2eecb9876148cf698b088c73c9df81306b0ca7e34623,2024-11-21T05:40:11.343000 CVE-2020-9226,0,0,4f4dede2041ff04c7e1bc23d10d200b2e9fe8515e3639ca5f3a2aae5391012cd,2024-11-21T05:40:11.470000 @@ -164160,7 +164160,7 @@ CVE-2020-9249,0,0,609764363abccd920effb2bb4981a1b82100be4147729a6eea32d0b2b51486 CVE-2020-9250,0,0,f7f77a70e77b7d3e7da6c17b80f87212212c85455a191473f067bbf159588602,2024-12-20T18:15:23.860000 CVE-2020-9251,0,0,beb705051b54230fec1f0b04aa58d84ce8712d444c3c311bd3fd0ff8818aa691,2024-11-21T05:40:16.453000 CVE-2020-9252,0,0,2e27eed374d3e6d0d74e9cc4bbe3815fab87cc2001c720694ee08405ff819d2a,2024-11-21T05:40:16.590000 -CVE-2020-9253,0,0,c03fdd01d3f6287d21fea5d4bfb7c24087a0d72e0c42831213087c295985d4df,2024-12-27T10:15:16.610000 +CVE-2020-9253,0,1,12ef099407e8fb757b2e85bfaf4886aad952e0e6ddfd9308becbae31b34d9f0e,2025-01-13T19:38:19.563000 CVE-2020-9254,0,0,8e32c6d6bacd3be7a3f1960e97a7c4a004fc1a8bd60e5faabce33423b1584654,2024-11-21T05:40:16.763000 CVE-2020-9255,0,0,d036c0683a7ba9ea33dd8401b86455b8b032eb429d4f3aae3ba5ce1ac0d45705,2024-11-21T05:40:16.913000 CVE-2020-9256,0,0,6668546b9f3d0474a15fb090ad48c8e6a42fc578072b411e8ed96bf814159430,2024-11-21T05:40:17.043000 @@ -187399,7 +187399,7 @@ CVE-2021-47203,0,0,9564d820cb2d93da0a0ae7eda2757d5eef2fa0adaa3776421915d06aab3e5 CVE-2021-47204,0,0,0807d36e06039a60390844a27b9c29f575861e7c311ab45fd65648923120e6f2,2024-11-21T06:35:37.460000 CVE-2021-47205,0,0,18551c172472e25239345747128ada0ccd7cc6fe471b57ef495541cf1516fa26,2024-11-21T06:35:37.577000 CVE-2021-47206,0,0,6c20cc18955b069ca564695979ba4d69e50258ddcc033c348c73d4096f845cb1,2025-01-07T17:12:26.390000 -CVE-2021-47207,0,0,d6e7ebba058fbc26c30ff619791823f11271eab1f7f01abbcae995ea6a305b67,2024-11-21T06:35:37.800000 +CVE-2021-47207,0,1,be89cb642a87a43cfb086c29deaea9f168d7b93104889775861d4b914bc2974c,2025-01-13T20:42:37.580000 CVE-2021-47208,0,0,0aedc6593001cbe298d9e706064e1d980e47bb2fd7444fd7cad250e7521e5eb1,2024-11-21T06:35:37.923000 CVE-2021-47209,0,0,1536c1bef2c14e12d373ca6bd92154342840694d5f784ecde3999106c390f9bf,2024-11-21T06:35:38.130000 CVE-2021-47210,0,0,6f92e3d2c3c1a5d96775ad98a3288fba55e822f3f6095cf6048826173f313db7,2024-11-21T06:35:38.243000 @@ -187517,7 +187517,7 @@ CVE-2021-47321,0,0,921fcc8af7f12123744be42b3a2ba4dd930ac9b98608c2f83dd489392b963 CVE-2021-47322,0,0,3dc7ee4ad2dde4ebc21d7b010403a3fa85239a9262926c7207190f4fa9c5a8f7,2024-11-21T06:35:52.733000 CVE-2021-47323,0,0,633211c6bfdb9dfd1c61a272a06bff1bc021219b77a259623ed56d42817f6c9b,2024-11-21T06:35:52.843000 CVE-2021-47324,0,0,a2ec2dc326c9ec8fc89d4f6bb66519434844384f429a73aeedf7049903a0a0d8,2024-11-21T06:35:53.070000 -CVE-2021-47325,0,0,a56adb27b96cd5f78537024f03fefa8460d3b0b03a903a1db0a5de100805ff34,2024-11-21T06:35:53.273000 +CVE-2021-47325,0,1,ac820df87fa3f3f9e01d4cb9810af0adc82d9d5144eeedc8eb357cc626ea77a1,2025-01-13T20:04:48.480000 CVE-2021-47326,0,0,b7ba3c55754026190b941538095c847ce61badf3c8de85aaf74b716b0ad04037,2024-05-23T14:15:09.033000 CVE-2021-47327,0,0,94fa64a5ce947d155501b62feb0b7f033c99b992efebda5cfad453b0cfed060d,2024-11-21T06:35:53.417000 CVE-2021-47328,0,0,9f3318e77cb63d19039ba11dde4b887a5fd2c747ffb765f73587e9aeb25b9e1e,2024-12-26T19:52:18.833000 @@ -212600,7 +212600,7 @@ CVE-2022-48624,0,0,7d8340193c28814d34deb47e64461c30715aea3f85cdee8a05ab3feef2ca7 CVE-2022-48625,0,0,ad1548e03625a1597bed096d4ae7617552f2279c80077db9d95ac7c5db9b122e,2024-11-21T07:33:38.110000 CVE-2022-48626,0,0,9d4f63da0a918f51b7c85b0ffa7c98eb3b3f0bdfe14eedcb544bde294c904c2d,2024-11-21T07:33:38.317000 CVE-2022-48627,0,0,450773013a86dee085659fbeb135aaa41eee00eb1f2d7ba0c46cf0fcba42ac12,2024-11-21T07:33:38.493000 -CVE-2022-48628,0,1,38c6820367758e57858643c90208981922cfb44dfdb56b80c9489f9ea4749b42,2025-01-13T18:26:13.343000 +CVE-2022-48628,0,0,38c6820367758e57858643c90208981922cfb44dfdb56b80c9489f9ea4749b42,2025-01-13T18:26:13.343000 CVE-2022-48629,0,0,22ed839ae28d9bc6568331788266afa09b73a958ff038fb89be480fe23017988,2024-11-21T07:33:38.803000 CVE-2022-4863,0,0,d4d829a1beb8e4fd89587644cb89a6f79551c4f0525d6fe5f92668872dbe819d,2024-11-21T07:36:05.650000 CVE-2022-48630,0,0,cc35d21a7ef8def8b0a421e82faaa17c2b13a0616e1a81c5178414600588878e,2024-11-21T07:33:38.930000 @@ -212612,7 +212612,7 @@ CVE-2022-48635,0,0,bc742bcda5fe3f51d86129e333f38c25dd591078a136bc3b820e011f54757 CVE-2022-48636,0,0,962ba645cc23077f6c15f60e3f5e6072b075b3fb9f2a1a48ce623b993f24d75d,2024-11-21T07:33:39.763000 CVE-2022-48637,0,0,4c589fcf363271ed2ac45b88ec0b8dd56621a86051947f9406b2bb7350a11cd8,2024-11-21T07:33:39.957000 CVE-2022-48638,0,0,7a36934df459d35a752e9c19975343358bc638b0a6803ab6e929e9511ae19adb,2024-11-21T07:33:40.070000 -CVE-2022-48639,0,0,2bf64fdcd67f028c10f8b9e564b4b89ca3aa02bab5ff7a158a3f571c972d4c15,2024-11-21T07:33:40.237000 +CVE-2022-48639,0,1,471cb299c2f79b95bf203e1bee3acaec19277c53307a0964cefbae99c7b46ef7,2025-01-13T19:58:08.060000 CVE-2022-4864,0,0,59b15f5eec2180ddfa7ce36526893d26fb614ed7bf416e8ac4ed3714bd6e2186,2024-11-21T07:36:05.780000 CVE-2022-48640,0,0,5e756f70cbddf596ac5b8ae586dd2af870a1a48da17b6fd47eabf03f4ed205b8,2024-11-21T07:33:40.350000 CVE-2022-48641,0,0,99cb3d858a92705b7faa733f64ea99edcf4ba5c00c38154dda248e15af991606,2025-01-07T16:57:26.363000 @@ -223076,7 +223076,7 @@ CVE-2023-29516,0,0,e7d5797dca4e594f4b8e85bc38666c27403343cbde62b6c6a9d95fd0c373f CVE-2023-29517,0,0,3c11b94404f4a92e4b3c25dbc0aa3781e95a467cf2e46541b59890cf2387a3c1,2024-11-21T07:57:13.007000 CVE-2023-29518,0,0,e9cc48a2966af7f6a06be670946fae5212378e99b92948f6625ca044794e9874,2024-11-21T07:57:13.127000 CVE-2023-29519,0,0,8ce270b30bb33b136aeea2b7442ade9058989fe73b0ceff5da2070fc8b8a9b83,2024-11-21T07:57:13.240000 -CVE-2023-2952,0,0,034e92a0cc8d2e7ac0dd89a28823b56e0fbf3d72dc5b0ec4c7f361be04172907,2024-11-21T07:59:38.173000 +CVE-2023-2952,0,1,9dd24ee556133ec22dfc6d2085307de8cb5f1480e905d75b4d4a25adf9981ffd,2025-01-13T20:15:26.313000 CVE-2023-29520,0,0,7c4a4448ae7177e50867ad26caa48ad748408ea00040f33e93cc7249049a6d6d,2024-11-21T07:57:13.357000 CVE-2023-29521,0,0,ffbe288104b2de8247d99b0fb8566863ec147576a15601fbd8b2fce5b7430cb2,2024-11-21T07:57:13.470000 CVE-2023-29522,0,0,c8df22ce9e69dc8e0ee0a23bf96959ce333a822ce3ca56091c06f1470473eb25,2024-11-21T07:57:13.580000 @@ -223186,7 +223186,7 @@ CVE-2023-29723,0,0,303fcea14f09e3d0e64d1a961af341a2b88ba23c47ab885ec21656a91d852 CVE-2023-29724,0,0,b957a3fcc2f908978b34709bccb4beaef482657df33bc886f526eec59e4351ea,2025-01-08T21:15:08.470000 CVE-2023-29725,0,0,ab64230b18916f62d493ac57f81dd5cd07baf6987ff2e6626d94f28801370f14,2025-01-08T21:15:08.740000 CVE-2023-29726,0,0,5edc83c46b4a4e4c7f7af4e90e64c34e867ab2e973eaa6365edabd0821085e67,2024-11-21T07:57:25.623000 -CVE-2023-29727,0,1,4294fefbe34dece57b7028bad8ebefd56725bd50d5180d41c9eb35db149357e0,2025-01-13T18:15:13.707000 +CVE-2023-29727,0,0,4294fefbe34dece57b7028bad8ebefd56725bd50d5180d41c9eb35db149357e0,2025-01-13T18:15:13.707000 CVE-2023-29728,0,0,043926f080c8d3e9064c12911e23091eaaad5413dd2bc1fed2dd3453938e1577,2024-11-21T07:57:25.900000 CVE-2023-2973,0,0,dcc6e31eb1a2bbb1b3cbc016cb0dcf0406ed5fb05ab3542fb7e75f1ee7b1d41b,2024-11-21T07:59:40.407000 CVE-2023-29731,0,0,51fa4848d3ed6a45174cf42297b7f528367db7604ae27a5d799b2ee807f39778,2024-11-21T07:57:26.047000 @@ -223202,8 +223202,8 @@ CVE-2023-2974,0,0,c746759a6ca0635395970574fed5d5670a264deef9f431fdc3e7dfe1c5bf8e CVE-2023-29740,0,0,7219fc17e52f74bca95604bc7d6e4d1f42004cd4d64b5588b372a75c89ceaca2,2024-11-21T07:57:27.313000 CVE-2023-29741,0,0,e90784f47c2c289ff982cc544d11ad433711f5ab532840da10762f8d338abb5a,2024-11-21T07:57:27.460000 CVE-2023-29742,0,0,5755d4d4b102043a00beb2bb3773aeefbc935c0f3c8702cc62cea9fb5caef696,2024-11-21T07:57:27.597000 -CVE-2023-29743,0,0,4e343bfe2c90db6c5c6eae7c79e7bbdbef00ae4d945362466d77b4fdbd049d9d,2024-11-21T07:57:27.740000 -CVE-2023-29745,0,0,68e3675b29535613bcb2472df3ab338bd82f6db11be2be773fa63d5dc8c2934c,2024-11-21T07:57:27.887000 +CVE-2023-29743,0,1,fe49ba136bbdeffcb69460027f9568da7b00a21cac299a3fbec238c4c61241bc,2025-01-13T20:15:25.387000 +CVE-2023-29745,0,1,c542af407c0b2a537989cfcde55db8adff6b748cb69e035f86394be8cd6af792,2025-01-13T20:15:26.130000 CVE-2023-29746,0,0,133c031c39348c96f95d9e43b02a0f81b2e172f555bea6970e402c248a23e4a6,2024-11-21T07:57:28.020000 CVE-2023-29747,0,0,88c4138c3c6db30341461853ba2d3a74af8d00bd54721efb094fd003d9030bfb,2025-01-09T22:15:27.130000 CVE-2023-29748,0,0,3bb616611a42918b2d8d55bbdc2fe5b94fea76d10f8313180c5224af166ba7e2,2025-01-09T18:15:25.667000 @@ -223421,7 +223421,7 @@ CVE-2023-30191,0,0,baf991b005d2918b8ace439297debd51f00a880020c2785607144cfbf94e0 CVE-2023-30192,0,0,76ef88ebb30e0eb7a330a15d67abe9acdd9b3732c18c14e5467f80708cef8059,2024-11-21T07:59:52.850000 CVE-2023-30194,0,0,97916a3149d4accd5e7cecee33423a08e2cb7a42bf400ac1c6746cf4b6f8b95a,2024-11-21T07:59:53 CVE-2023-30195,0,0,9f6fd32b889ec86f9e06a9f333ca1033c4dc8bc185606c569140c5f599d8388a,2024-11-21T07:59:53.150000 -CVE-2023-30196,0,0,35e6908f97e6789a4dd0c990aeed48d9ed2d41eab1253c4f2dd81675f70e1287,2024-11-21T07:59:53.313000 +CVE-2023-30196,0,1,d8afa1205a2ac923a0a6e9d60cd8b3febd3d3155dd6bbfd812d986f0a2f4474f,2025-01-13T20:15:26.557000 CVE-2023-30197,0,0,17f3733ff2a8b5b05caf98b060d2a37a716d0eed944dc24c0593a712b78aa10f,2025-01-09T21:15:23.083000 CVE-2023-30198,0,0,7f1941a7741b63aef8b28984f3b14075b64a8d6f6c8b1538f63f22a90dd6b9ff,2025-01-06T18:15:14.143000 CVE-2023-30199,0,0,1f8ebf4c877c0a722d10dbc9b79130c4fc98833d5f788243279b89d19018db31,2024-11-21T07:59:53.783000 @@ -226214,12 +226214,12 @@ CVE-2023-33730,0,0,b4f23543b9c138108da75a03508191752c590ba0289d2c4b2b741b2755c62 CVE-2023-33731,0,0,4e0716e51d797332a35d8cf3e5a52df1f04a68160a9692c084acf7ca25247b33,2025-01-08T20:15:24.840000 CVE-2023-33732,0,0,f39138533032e7e2087c74032650fabd9d1ddfad70653d6ef193b7fe677ec10a,2025-01-10T15:15:13.520000 CVE-2023-33733,0,0,67d14424780e2b2a99fc85cd6e4fd6c08e79d171c16dc23f4a6280281fd3af90,2025-01-08T19:15:30.560000 -CVE-2023-33734,0,0,ce9b6222e7c051206355de817b0fb42912304fcb66294482b08488625c37fe80,2024-11-21T08:05:55.107000 +CVE-2023-33734,0,1,d793371a8f985d4885e0c9db7d0d6babee9fd2d5f6634c2ccd6934e75f8c33fa,2025-01-13T20:15:26.797000 CVE-2023-33735,0,0,82b8398515bddfd6dac3ee1878395a0fd126fa44bed3eddd90cbd91370e7dcc6,2025-01-10T15:15:13.740000 CVE-2023-33736,0,0,a0b290d78fb1dca7aabc3685aefd378b4a38110eea512d324625e6a3d4a5bc11,2025-01-10T15:15:13.960000 CVE-2023-3374,0,0,72d42166146b7c96e033d869d5f45174a0fbde987009f9ab5e93284a1e30de9b,2024-11-21T08:17:07.770000 -CVE-2023-33740,0,0,3287cf2115588e74c8c406328378b87e047ead84082398c251fb05d1f6c6a091,2024-11-21T08:05:55.560000 -CVE-2023-33741,0,0,32c5b64c05e138266539951bcf4d9734e53f50d8838681dcaa7b5c3c51629ec2,2024-11-21T08:05:55.710000 +CVE-2023-33740,0,1,0d3cb5acd8ce1fb6771aaab7ed63bd4078fa9bebd7dd76b5400bb9b80b40279b,2025-01-13T19:15:09.237000 +CVE-2023-33741,0,1,56798fc84b9d3b5f51af1b28c474cd2a62751cf19c512f416fe19f627bf2283a,2025-01-13T19:15:10.213000 CVE-2023-33742,0,0,f85dd65ef5c98d66913323d0d12b231e9374df10f945e44c3dcd86e6b55299a1,2024-11-21T08:05:55.860000 CVE-2023-33743,0,0,983f3c1aa4f6be40ed15ab2c7c310ffbccd5cf2d08e6f97080abd9fca6e72778,2024-11-21T08:05:56.023000 CVE-2023-33744,0,0,6f5dbb519cf2da9fda0db029090d6c6246ba923bbd5601ebe71a839766dd6388,2024-11-21T08:05:56.177000 @@ -226540,7 +226540,7 @@ CVE-2023-34106,0,0,e97ab50fc4c38142521988df08136e16805c9230e755be764c5e069c0c489 CVE-2023-34107,0,0,ea3015f1d7663ba7950e07defefd89d4097dcec5edfce1132a1e77d44640baa8,2024-11-21T08:06:33.697000 CVE-2023-34108,0,0,3402e0701d2c160f2d4947c662e8e780be4c0e3d4786367ea7bc334254eddffd,2024-11-21T08:06:33.837000 CVE-2023-34109,0,0,8b2cb117813e31c52ccd6f3832354ad65c925ebabe85a5db52c0d8c3b906d2a7,2024-11-21T08:06:34.013000 -CVE-2023-3411,0,1,f97a4749568e98aab1e9cd14bc7b98af51885d8c795b6f94060a06b46312b691,2025-01-13T18:27:44.140000 +CVE-2023-3411,0,0,f97a4749568e98aab1e9cd14bc7b98af51885d8c795b6f94060a06b46312b691,2025-01-13T18:27:44.140000 CVE-2023-34110,0,0,63d65df0ba884a1d3d10e2dbb4dec36e374eda14f431bc999df09b736226c75b,2024-11-21T08:06:34.153000 CVE-2023-34111,0,0,2a3997a129f578f5478c2ef53a74e3ee4f9834c1cc8fbb2b974925cb6d221dea,2024-11-21T08:06:34.313000 CVE-2023-34112,0,0,712d77ba93bf90e9e12cec06add8f3da8ce672d2779b0cbb61b7db822c8a6295,2024-11-21T08:06:34.450000 @@ -226551,7 +226551,7 @@ CVE-2023-34116,0,0,eceb5c33a38e02aafa7ffeb47997e090e8ba9fa11e315d409c8eda2ed40a9 CVE-2023-34117,0,0,ca1d05f74d929b655fed396e704d07564375fed7fd05eea2a9bd4e6333b0b01e,2024-11-21T08:06:35.010000 CVE-2023-34118,0,0,766e948b08c7864f7a4a9e712508c91fbd3aae7701080ac7f54d8c0aa81725ee,2024-11-21T08:06:35.147000 CVE-2023-34119,0,0,4fc745241c14fce607b42c04ccfda529b13d7e3888073e648ed96f82e9cfb741,2024-11-21T08:06:35.280000 -CVE-2023-3412,0,1,99a5e411f52d938c2f75f649280e4dcaabc33a0704ee7f7bc87187382aad3e16,2025-01-13T18:27:44.140000 +CVE-2023-3412,0,0,99a5e411f52d938c2f75f649280e4dcaabc33a0704ee7f7bc87187382aad3e16,2025-01-13T18:27:44.140000 CVE-2023-34120,0,0,f656e181bafc2d2961a70ea48fa9c78c0a620ac9ae0a0b3a92a91f375470ad54,2024-11-21T08:06:35.410000 CVE-2023-34121,0,0,972d452d763b0b0879cf757c8d51bedcde4020e9bf8488b9a820e18c09e38e7a,2024-11-21T08:06:35.540000 CVE-2023-34122,0,0,f585e4332bb8bfbbab2b3607d749ecaf3551ff5d2da712c1ba0736863bada1bc,2024-09-04T19:15:29.087000 @@ -226586,7 +226586,7 @@ CVE-2023-34148,0,0,2af8938fefc5e88a696a461cb59e68778c5c3207426d9cb46845aaf384070 CVE-2023-34149,0,0,de98b959d243fc958ea3c56d1c607b497cb887fb462ad341d81b0f69ae39661c,2024-11-21T08:06:39.263000 CVE-2023-34150,0,0,1823fbda35cf4f751cc671a99bacd7ba68664b9a7b88392119b56d4cb5ce916b,2024-11-21T08:06:39.420000 CVE-2023-34151,0,0,99655761750ec80cccabb2190e2dff1e94a4afa7357d176a172dac871102bb71,2024-12-02T14:34:36.813000 -CVE-2023-34152,0,0,334da3b68a0c4bcbcd97713b755f74eb3f582cefd06ffbd3f5072dbe60ebbbcf,2024-12-02T14:34:31.887000 +CVE-2023-34152,0,1,f5093699db674fd6792c311822d72917575e1f2b336ac257cc5faaab1f0e3a25,2025-01-13T19:15:10.400000 CVE-2023-34153,0,0,f13ce0a27b49659263b450601bbd71fe5847ef9a3d85533f16d9fc9563eae877,2025-01-10T21:15:12.310000 CVE-2023-34154,0,0,eafc3fe079370e37ff7df7a88839f07e4ee2c129fb8876ca3732c82414e7476a,2024-11-21T08:06:39.950000 CVE-2023-34155,0,0,18a874ed9abba05c434db529ec7798f406b89d3d8e8e89da1e2b9234231fa020,2024-11-21T08:06:40.070000 @@ -239983,10 +239983,10 @@ CVE-2023-52476,0,0,89c828189d91fd1242960120a533d7e398dfcbfd293ab99f643c622869d76 CVE-2023-52477,0,0,eb5822d237396c41c04f52728d9bf515c950801aef4f539b7f08b45f3cf87079,2024-12-09T18:39:35.613000 CVE-2023-52478,0,0,9e05b88e7feb0641b6ca4e17d4a850f7ec536a2d854a57f1537b6f6a4af9b80f,2025-01-10T18:27:26.213000 CVE-2023-52479,0,0,e0ff4a7b0324404fe79eee53801e5fe13d6f1e2e9c91c97e5dab8f615a1780c2,2024-11-21T08:39:51.897000 -CVE-2023-52480,0,1,d2e7b47e19154d214380376bad33b378aaf81d0a77e7753c5aa4424a4aa22f37,2025-01-13T17:05:39.887000 +CVE-2023-52480,0,0,d2e7b47e19154d214380376bad33b378aaf81d0a77e7753c5aa4424a4aa22f37,2025-01-13T17:05:39.887000 CVE-2023-52481,0,0,c036169f36373e26e323dd8da99dbd8c63f236021e8c8a4a9bb39e20912dc147,2024-11-21T08:39:52.207000 -CVE-2023-52482,0,1,0550d5295ece82b13a420ca7a1fc263c818f23bd27e72e085a819f217f4c7cc8,2025-01-13T18:27:10.853000 -CVE-2023-52483,0,1,ab0109ac100464d057315dfb0c304712e2e9816b3ac72ec181570b14f6298ec8,2025-01-13T17:53:05.157000 +CVE-2023-52482,0,0,0550d5295ece82b13a420ca7a1fc263c818f23bd27e72e085a819f217f4c7cc8,2025-01-13T18:27:10.853000 +CVE-2023-52483,0,0,ab0109ac100464d057315dfb0c304712e2e9816b3ac72ec181570b14f6298ec8,2025-01-13T17:53:05.157000 CVE-2023-52484,0,0,688b7461214e279f98589a82904a607b59c917943fab1d733720294c9192c231,2024-12-10T19:49:58.407000 CVE-2023-52485,0,0,c2b5d4c1676355db8fd79448f87f50421c07ae088ffc2e3215882f350721667a,2025-01-09T20:20:59.593000 CVE-2023-52486,0,0,b08f0dc3ea33f52f41a2f2486e0789d6ae50523a2cf24b902634bff5a67956e9,2024-11-21T08:39:52.863000 @@ -240003,16 +240003,16 @@ CVE-2023-52495,0,0,3848dd6249fb3b0098eceb1e102e5369e6a41e490097d267a2d230f8e731f CVE-2023-52496,0,0,1ceff2e059153d5a5937cc8a150530bebb0b9a38b1ee039de0fbd3b5f63c655e,2024-03-08T11:15:06.913000 CVE-2023-52497,0,0,94fd6b58b926a91cb8098bc30bfcace92de1e085d39a09a073793b0edb7aec8e,2025-01-09T20:20:02.167000 CVE-2023-52498,0,0,065e116d7373a70de6fabe612c4006ae940715deb24209d18d3d1d28ec7bcbda,2024-12-12T17:32:20.050000 -CVE-2023-52499,0,1,37302bb89cfa30e93b1cbecbac108e111f08e5db6682f392802812a67b5db06d,2025-01-13T18:29:52.097000 +CVE-2023-52499,0,0,37302bb89cfa30e93b1cbecbac108e111f08e5db6682f392802812a67b5db06d,2025-01-13T18:29:52.097000 CVE-2023-5250,0,0,58ce2b34b475373736e77e988be92b15eb836a64d3c5382c9b7f18d2986aa016,2024-11-21T08:41:22.493000 -CVE-2023-52500,0,1,bfa61ecc37f81aec9cea0362e8a01c95da4affd97672f73da2dd4a310756b928,2025-01-13T18:43:18.007000 -CVE-2023-52501,0,1,e0a9d69f6462e74071a2ee33115da2d2a25ac8029b39452bc23babb2dd351b70,2025-01-13T18:45:17.817000 +CVE-2023-52500,0,0,bfa61ecc37f81aec9cea0362e8a01c95da4affd97672f73da2dd4a310756b928,2025-01-13T18:43:18.007000 +CVE-2023-52501,0,0,e0a9d69f6462e74071a2ee33115da2d2a25ac8029b39452bc23babb2dd351b70,2025-01-13T18:45:17.817000 CVE-2023-52502,0,0,53b5c7371b4f4373fe848296392853f59d8735375e39195cf54701f13f36c71d,2024-11-21T08:39:54.847000 CVE-2023-52503,0,0,b25829a16f78c14d9235d80b7c332263af083b055661f6466ab49e61a0d35aa6,2024-12-10T21:26:43.377000 CVE-2023-52504,0,0,7b00d7367755902413f54a344d1c934ccd6c5f85e27cba6919cdc853f813017e,2024-12-11T15:05:44.313000 -CVE-2023-52505,0,1,41225aebe6c99f11f4fc4af881fa01b741adf7af69b8905e2862962825201af8,2025-01-13T18:48:17.593000 -CVE-2023-52506,0,1,f85842570a369879a03ab0fd81cffecf740a1deb73712d38b86b3a61185a48bb,2025-01-13T18:49:25.347000 -CVE-2023-52507,0,1,b6b39e1c9de54738cb02270773d5e967ee7dccc41c95e729148ec224d9d00f79,2025-01-13T18:51:41.030000 +CVE-2023-52505,0,0,41225aebe6c99f11f4fc4af881fa01b741adf7af69b8905e2862962825201af8,2025-01-13T18:48:17.593000 +CVE-2023-52506,0,0,f85842570a369879a03ab0fd81cffecf740a1deb73712d38b86b3a61185a48bb,2025-01-13T18:49:25.347000 +CVE-2023-52507,0,0,b6b39e1c9de54738cb02270773d5e967ee7dccc41c95e729148ec224d9d00f79,2025-01-13T18:51:41.030000 CVE-2023-52508,0,0,f8139e600d46dca8f67ecb0a95236952f26c02714cd95adfe0dbbeed166d1ee0,2024-11-21T08:39:55.633000 CVE-2023-52509,0,0,4c32e1e52d82db6d2e5e667f80062d77bc1fa6b92446d15ee14c1f6c6f544cf4,2024-12-11T15:07:32.760000 CVE-2023-5251,0,0,8e5d86dd8015f5ba5db53e53cb223d5ce43b5c6420566475d898b38e0a2f8a7f,2024-11-21T08:41:22.610000 @@ -240023,18 +240023,18 @@ CVE-2023-52513,0,0,97d7c95c4e6616756fc77008da3a9e34784f63a990f4286e2a59685516251 CVE-2023-52514,0,0,96b3bc37b65a7f0f11caed4828897554155b5e08fde97001434005eb59164e32,2024-03-11T16:15:07.720000 CVE-2023-52515,0,0,783d33279e8711f2f53faff3aa4d2bf5a8bc423e48cee26bb25bf599790fc992,2024-12-11T16:41:11.770000 CVE-2023-52516,0,0,c9433424f464a3aefd00d0bda0d407932aea710f1ccd0eb4aed297e697fdac49,2024-12-11T16:34:41.590000 -CVE-2023-52517,0,1,f03e53ea30861610b7c6d848f8adc35648589c7c60cd00ff7feae31935882978,2025-01-13T18:54:30.323000 +CVE-2023-52517,0,0,f03e53ea30861610b7c6d848f8adc35648589c7c60cd00ff7feae31935882978,2025-01-13T18:54:30.323000 CVE-2023-52518,0,0,6033333179ee7065b3ad5a7a294863593028e3c2a534a4a4a5dc1a8ac412775f,2024-11-21T08:39:57.030000 -CVE-2023-52519,0,1,94b7dd9d7bb75a81a63dfbf0888e41d9d06a6f22cdc8c6aaaf3b5c7557f376cc,2025-01-13T18:57:26.213000 +CVE-2023-52519,0,0,94b7dd9d7bb75a81a63dfbf0888e41d9d06a6f22cdc8c6aaaf3b5c7557f376cc,2025-01-13T18:57:26.213000 CVE-2023-5252,0,0,6e866dd390859261cd7659e88d39d09ee87f05ef749374a16d7e16e4e49555fa,2024-11-21T08:41:22.723000 CVE-2023-52520,0,0,d31cd448073f5b764992496529f1ce58fbaec56d048ef04f1b1f5151bc9d73f5,2024-12-11T15:16:55.293000 CVE-2023-52521,0,0,26ba094f0a43e00b237fc666ea879d557b221b56ad6aeee17c07d7717bd0e4ca,2024-03-05T23:15:07.310000 CVE-2023-52522,0,0,c13b0a3176143b06d3ccc87f08706f9245c7cdd589d25b2c0e11f3ccc3613bfc,2024-11-21T08:39:57.493000 -CVE-2023-52523,0,0,c0acfce46ac1517ca8bcbb85593e9ad745512aec00b4863bc2b8f4a234a67929,2024-11-21T08:39:57.693000 -CVE-2023-52524,0,0,3d2a70525cfd480ea47dfbe29cc70243d8b545b6dc30a10d5f6fefc987f46638,2024-11-21T08:39:57.813000 -CVE-2023-52525,0,0,de1c6592edf5374eff5a62a845c9c1ae5d5d38f99effd2a5bc3d3de2256d9afc,2024-11-21T08:39:57.940000 +CVE-2023-52523,0,1,5b8d7d4b352190dfcaca3dfb71df8e86a97c3b5825bdaf56118df9aae20c8466,2025-01-13T19:57:06.317000 +CVE-2023-52524,0,1,a8bdabe41d4b9e145a11e25099c9bf5d837317aba03d38d35c8ca28cefa43f88,2025-01-13T20:00:51.600000 +CVE-2023-52525,0,1,094105902ea19f75f46a0542857de43bf80f42671731aa6ff2be030a7bf1a62b,2025-01-13T20:04:04.813000 CVE-2023-52526,0,0,1438e98d7ebd761d3e4a2b5db47e2999a34f9aed48e4e48ea616537355cbf9b2,2024-12-11T15:19:11.407000 -CVE-2023-52527,0,0,05cf521640d10effa17532f68f36199f87dafd68096c0227670d995e7b60321b,2024-11-21T08:39:58.170000 +CVE-2023-52527,0,1,b6739ba44654e430422e37912f70a9580fd9f479243f1d69136043790d0f2ac0,2025-01-13T20:39:56.607000 CVE-2023-52528,0,0,f8dc1059cdecae7671bbeebfd74b733cc48cc6554467ed082aa97679e394d701,2024-12-11T16:27:49.277000 CVE-2023-52529,0,0,841566603cc3e72b05afcb01b587c6dcd4414a7fe1bc2081929dad3add9a68bb,2024-11-21T08:39:58.437000 CVE-2023-5253,0,0,7ead7effcc406218ae6035d8fe47bb748de44284fb99412a6bbf2042e8def61a,2024-11-21T08:41:22.837000 @@ -240243,7 +240243,7 @@ CVE-2023-52714,0,0,de14f64658c68077a848c9d7169099f947c3064891aa288f876f46274f59a CVE-2023-52715,0,0,40c133c7a650afa62e84d50889abdc2f10bf115a6958fb8619bb9f86fb85544c,2024-12-09T18:05:04.807000 CVE-2023-52716,0,0,e23e556efb2052738135a12d9d714c106a93095e20c11938c358672475db109d,2024-11-21T08:40:25.613000 CVE-2023-52717,0,0,6546ea96ba32ae2b161f65f20c7f1ad531534dcf0b1b8581277b1a6dce31a926,2024-11-21T08:40:25.807000 -CVE-2023-52718,0,0,5d82c4df3e9f6e4ba7fdee40f888db394f7e1d51ac8e44e1a017f9f690669dd7,2024-12-28T08:15:04.797000 +CVE-2023-52718,0,1,160282e24024fb1262e81494757a60f6cabaa9d290ef3102d5896f468341a4f3,2025-01-13T20:50:13.847000 CVE-2023-52719,0,0,e3f86bf719503ae7b09fa3135a17cf10d9dc9b4adbfb57625c3db8b69a7f3a10,2024-12-09T17:56:26.397000 CVE-2023-5272,0,0,4ba2e946788cd695e8caf8b6a2d9a57724a762493fbc909b19d2515ec3b7cb55,2024-12-23T15:18:44.853000 CVE-2023-52720,0,0,1fa5ff90dc57ff4a909c38527eebbb867f48496aaf35189850d5ac665cce26ee,2024-12-09T17:50:44.797000 @@ -240480,9 +240480,9 @@ CVE-2023-52949,0,0,2dc054c34618db3270acf55c911e73637f6c82cdce362693cea11e6d1c410 CVE-2023-5295,0,0,2b5ab72da232f5f5a3ac2b39e98a9c8864bc1570b0eb638a3035ee2c7b09129a,2024-11-21T08:41:28.337000 CVE-2023-52950,0,0,8a52d8bd2da07af53f402b62fdad2a9f6414f85db952ad75359b2aa5d8923041,2024-10-02T15:26:33.837000 CVE-2023-52952,0,0,566ca32b1444148f195c331ac2a9ad38ecb816c7a11faec5b059440b5ddf4458,2024-10-10T12:56:30.817000 -CVE-2023-52953,0,0,937694c1ff4588049245c509a1095e9a72124fa1eb3c2f97166ac1fdda1ba685,2025-01-08T03:15:07.990000 -CVE-2023-52954,0,0,d34aec7b077777c950d019a051d3e933e9929b2b41862f5ef32ad6a30dc31360,2025-01-08T03:15:08.130000 -CVE-2023-52955,0,0,9f60510c8787852e6adfc8ce1befdf406f59d657016071f6a12e787eab28ef05,2025-01-08T03:15:08.263000 +CVE-2023-52953,0,1,505d22422517c509093e20be4fa6cef03d81124377bff73b0554278d7ae4ffe3,2025-01-13T19:08:57.217000 +CVE-2023-52954,0,1,8b4c2bb5bacf8eb27f78e90b0f6b79604ad46840b6b95dc0e1c12132d9665f10,2025-01-13T19:09:19.737000 +CVE-2023-52955,0,1,13e36a7d0105631ad28d1b673d8b8d79157696f3624304a40ce36ea78894df3c,2025-01-13T19:09:36.110000 CVE-2023-5296,0,0,b04d4fbd343c2e856b8ac0aee32ec4da2662cf244be6db174bfbc8064e9c4681,2024-11-21T08:41:28.453000 CVE-2023-5297,0,0,de1f61d8e4cdd3b9b3c94e1a593ca1d09a649ba1f11645b247141deb55a46d5b,2024-11-21T08:41:28.590000 CVE-2023-5298,0,0,f53cf1dcb6f115d92d16e5c66372cdfa06b4033bbcfb51673e0e9ae138cbc0c7,2024-11-21T08:41:28.727000 @@ -242266,7 +242266,7 @@ CVE-2023-7261,0,0,ddac2b275fa7ea517c7dade7545137efdda503fdf2e011abe40181729ccc83 CVE-2023-7263,0,0,cf7920ff5b3068b39e94a13bb6f77d504242e61e7c2b3ec28afdd1a44dce1a82,2024-12-28T07:15:19.580000 CVE-2023-7264,0,0,481a3123c728ee9b31d977e1754c02d6eb9c9d972c045f9b799c0c77e37a60b9,2024-11-21T08:45:37.997000 CVE-2023-7265,0,0,c24118f188412f71957951e5a194c8feaa5aa2870f8d4bad1cae66392f13b12f,2024-09-06T16:38:04.533000 -CVE-2023-7266,0,0,06715857462d7c9870426208c4c44ce95d4afa6874f0a94bc75a0e92e1a6309a,2024-12-28T07:15:19.967000 +CVE-2023-7266,0,1,747c05f24a13b4f02e6fa3179fa6e81dbafd40c7bda44e4a6d968ba0d7b0112a,2025-01-13T20:48:22.750000 CVE-2023-7268,0,0,a007920b048244bad12b3daf0ade65763569e4511640cd0844ab63fc1ad6a18e,2024-11-21T08:45:38.200000 CVE-2023-7269,0,0,808547aae37c3720945cb2e9fb822611d037a6a9f4f70083a54994b35322f068,2024-11-21T08:45:38.383000 CVE-2023-7270,0,0,2cf4371b77ac591f985f4aa4054d5c68cfc25f0a8d757e8da8652827f079b721,2024-11-21T08:45:38.553000 @@ -245057,7 +245057,7 @@ CVE-2024-12208,0,0,853007bc09d49f6c092cb33c65061bfc51c7e3b97e6ede52f3abfcbb92136 CVE-2024-12209,0,0,965d45920161ad8379a478313464ecb572a2b8b8ed1bf056a1646168e0b8105f,2024-12-08T06:15:04.823000 CVE-2024-1221,0,0,c833d2d1840e5e81b3c325295532e3c4cac8ba514abb434d638a7c419bdc43e8,2024-11-21T08:50:04.920000 CVE-2024-12210,0,0,fcdbe73e10e5bb8e25626395e1c0b8dfb21d78601eb91a6e83c928772c0881ff,2024-12-24T06:15:32.973000 -CVE-2024-12211,1,1,4df7fb84efc9fc12f44c758bef0f4a52c867cba7b75d71e208fe1d5fd8aa95de,2025-01-13T18:15:15.157000 +CVE-2024-12211,0,0,4df7fb84efc9fc12f44c758bef0f4a52c867cba7b75d71e208fe1d5fd8aa95de,2025-01-13T18:15:15.157000 CVE-2024-12212,0,0,4068a90166bc858f8bfa4c7fe1dbc180f7e4e033930f31a1b74471c9abd7763b,2024-12-13T01:15:05.810000 CVE-2024-12214,0,0,145b7db175966477886a9ffd7c811efe626794ad8e1d70413662bfa5c01eb691,2025-01-07T05:15:16.470000 CVE-2024-12218,0,0,c54e0970e9fa3f5da91494a744c33c1884c0ee1f4d82830e251b56e753e1af4a,2025-01-09T11:15:12.280000 @@ -245335,7 +245335,7 @@ CVE-2024-12582,0,0,bbfe1aae814f308a85392c13709691d46da248e6458c80cb519b63fa483aa CVE-2024-12583,0,0,18b36426c2246709d6e004bec0c8a5de7c91c679c9d1416c197a6176fa3a08fa,2025-01-04T09:15:06.090000 CVE-2024-12584,0,0,adcd511bb3f4eac61fabd0c77513e0f49514ba8fec705794080ba1b5bd973bc5,2025-01-08T07:15:26.833000 CVE-2024-12585,0,0,5da3be9bc678e425dc481c70b7523d18c5d89e9715457ba9168db2468bb42cc7,2025-01-08T16:15:34.130000 -CVE-2024-12587,0,0,fa0892d68b7bb4f6804fea8fc811eca021bdbb7440a414a14dfb72694409d2c4,2025-01-11T06:15:25.070000 +CVE-2024-12587,0,1,2c2bb6109f838cede19935d42d3fb45b90001a4bd2b3fd87b8ac1f4583f8e25b,2025-01-13T20:15:27.283000 CVE-2024-12588,0,0,9ef4dd85f085f6ba612688cc14a2c49d05248e20e75bd2d7bdd4aff39b5ac0f2,2024-12-21T09:15:06.233000 CVE-2024-1259,0,0,1c6bb100fc9cba505c4d696801bfd3102c508e530bb2e36c86a6685675278bd7,2024-11-21T08:50:10.730000 CVE-2024-12590,0,0,217ef4dab25f45d20c71439c17fd49c4f82558ccd785c0d0a569568075f7d918,2025-01-07T04:15:09.607000 @@ -246730,7 +246730,7 @@ CVE-2024-20338,0,0,ca4843067c4da30bbb3f01525a545fb9de11e060dcc215ecc535aad62ff8f CVE-2024-20339,0,0,94ac06b012520dee95a6ca36fdab6f6b7d2db7e2b8d6560499db3979f111ac8f,2024-10-25T12:56:36.827000 CVE-2024-20340,0,0,b2dbe38c45a22964e4a8be4a5c662f6c83eef54f6dd511860a120842bbafcd85,2024-11-01T17:40:30.980000 CVE-2024-20341,0,0,1cbedc76667b6941a6fb9da7635e5f7b766cf4de7b6265c72e00ce648d8cca2e,2024-11-01T17:22:26.577000 -CVE-2024-20342,0,1,db1d0c21b72dd8c64ae0e3a4a8cf6d0e199d8f767aface3296a1c63ea389af1c,2025-01-13T18:15:17.057000 +CVE-2024-20342,0,0,db1d0c21b72dd8c64ae0e3a4a8cf6d0e199d8f767aface3296a1c63ea389af1c,2025-01-13T18:15:17.057000 CVE-2024-20343,0,0,9009169a3fc35272ca85d4387127dc13ddbde156dae8091d383bb29318a93684,2024-10-07T17:42:40.777000 CVE-2024-20344,0,0,afdf0b6fd6474a87390aca4a2c4b23109b5f07756453a6d0aa3a40e4b8058114,2024-11-21T08:52:25.117000 CVE-2024-20345,0,0,c290f9e3041f6c749f5dac4109f1eede5e1b312ce5a83808ae887ee951a69f81,2024-11-21T08:52:25.243000 @@ -251590,7 +251590,7 @@ CVE-2024-26705,0,0,a308adda031f2eda9cd983e43cb1e8f1e80f61b260a2234635f0d97047565 CVE-2024-26706,0,0,b6e079a708d094b83bb5d7417439ddccf1c4f1876e5690709f65a274752091a0,2024-11-21T09:02:53.200000 CVE-2024-26707,0,0,1806350bbacbb6f76de5db409398dc8a7b1e6f15c7084d9e746c55e2adf05efe,2024-11-21T09:02:53.313000 CVE-2024-26708,0,0,47ec8499304cab94bfbfa9b8a22b56db0f85ef56b77fce5b97de36f3113336c9,2024-11-21T09:02:53.433000 -CVE-2024-26709,0,0,3ddbe105f0576d9f5dea19ac3bdf45f2d1c89955111fcfed85a85208732fc2c4,2024-11-21T09:02:53.617000 +CVE-2024-26709,0,1,84265dc256d943df4540d48ae1b11a8d0310b66ecceaef365d267322aba660bc,2025-01-13T20:03:28.797000 CVE-2024-2671,0,0,7868b0c3d3bca338bc309b82ca1d0b8bd8df4ecbefb4e6a6f37eff750b8ed14c,2024-11-21T09:10:15.420000 CVE-2024-26710,0,0,6ac3ed3e058c9245f76455df758aa5822954706d5927ffde47193e09cb8d8b8c,2024-11-21T09:02:53.723000 CVE-2024-26711,0,0,8dccb84b3c19a8be9b5c23386e56431114b107c936ab5d88e825fada25c33413,2024-11-21T09:02:53.837000 @@ -265139,6 +265139,7 @@ CVE-2024-44761,0,0,f2fbd374c905a05d9df4fb95583dd2553e55188e5ecbb406bb2b5a2754599 CVE-2024-44762,0,0,0252031658b287d2b24f86957e87260de5c6c531326cfec0caf9dfdb500c9354,2024-10-18T12:53:04.627000 CVE-2024-44765,0,0,f81ef15b0a3a61859cb1b17066290c8490ac2adc22a484a3ce700c9973dfd276,2024-11-18T14:35:03.200000 CVE-2024-4477,0,0,f8c8347117fb6def6bdcd4ad9e5293fd63ac62e9258176671603ccdc713d0e8b,2024-11-21T09:42:54.207000 +CVE-2024-44771,1,1,8cc087362def3995bf77f63defb876659e6b0a8af8b94e4a9c30df191cfc0315,2025-01-13T19:15:10.670000 CVE-2024-44775,0,0,011306915a1ccec8a2dc43a0525a6e4c4a138ea71cacacbb4139dc7838ff48fb,2024-10-16T19:35:10.167000 CVE-2024-44776,0,0,4a401f17cb489db8e3a27a309be25f5339458e753f79a473b6f579dab3a5a708,2024-09-03T18:33:26.287000 CVE-2024-44777,0,0,a398edec91d4490afe5ef74579daaf4dd8cf95eb1a91d4125ac3c877af1c7458,2024-09-03T18:33:38.413000 @@ -266084,6 +266085,7 @@ CVE-2024-46300,0,0,6a8d7c1dfb1358af3b6a2d888860f4bd0f51cc893ec305be3d651f975d853 CVE-2024-46304,0,0,f2308ace0e3855c77f0ea6a953a03c48300c28ef52897aa953b7959e459b6f35,2024-10-10T14:15:05.100000 CVE-2024-46307,0,0,354fa930eea3d99eb7fe8341a2ba5a2dbb298d263210ab23b2888816fdb23a54,2024-10-15T14:57:38.387000 CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000 +CVE-2024-46310,1,1,9f2b60253fdc77908806ed65a460ab498a78bf46117a4b71b62f2f6ce487b70e,2025-01-13T19:15:10.803000 CVE-2024-46313,0,0,a4475f21065819107b679f002f45aecb4f6fe3381612a107a4943beedb28de95,2024-10-04T13:51:25.567000 CVE-2024-46316,0,0,f153a1de1b2d63eaa55f7a87805baef45f2c081f83905d6b1651684c54b5dc31,2024-10-10T12:51:56.987000 CVE-2024-4632,0,0,88178c627a2a2444e9a5481c086756a7133c95edfb672bbe2e48b806cabf429a,2024-11-21T09:43:15.227000 @@ -266147,8 +266149,10 @@ CVE-2024-46471,0,0,589331dcf0f8c9c450c6e7b62ea573b2d697ed156abdf0841e50912165e0a CVE-2024-46472,0,0,2bfdd82019e257a999a07f7e7f1ca5ea2cecc586102f438773f3e9b8b73a6851,2024-09-30T12:45:57.823000 CVE-2024-46475,0,0,8de337bf21f8e76ccf4e6b762e2c811bd622fb2d069c67372f969f963e9a513d,2024-10-04T13:51:25.567000 CVE-2024-46478,0,0,f70f3b5c1ce34e91e4141e4b2cfc565865d5d214d85b67dd8586cdb93782907f,2024-10-25T20:35:09.710000 -CVE-2024-46479,1,1,3e0e7af9c97d4ca976ec229743d4a5a327100ebfaf5e59eb638d2dae254cdfc5,2025-01-13T18:15:18.003000 +CVE-2024-46479,0,0,3e0e7af9c97d4ca976ec229743d4a5a327100ebfaf5e59eb638d2dae254cdfc5,2025-01-13T18:15:18.003000 CVE-2024-4648,0,0,212eae539e1c4f9e76bd7794cb06c3cbae5f1a5abb7f9e09441f66d66e134975,2024-11-21T09:43:17.023000 +CVE-2024-46480,1,1,bbd2098c1503933640229cb1fc42c014946e86ba7f2991b7ab4b40c6cffd07dc,2025-01-13T20:15:28.147000 +CVE-2024-46481,1,1,e7e962cef586598466dafbc13f2afbf5ddee2b19c37adec9bfb2f658c837531d,2025-01-13T20:15:28.300000 CVE-2024-46482,0,0,e4c801a2cf34271c78e5d32f990a4d755bf1dcc521ae213f4144174e1d100bef,2024-10-23T18:35:03.670000 CVE-2024-46483,0,0,5f5b506edb7d89b259e9e397ae75c01096f4b3cb3d63773184b27131fe14eeb5,2024-10-23T19:35:11.493000 CVE-2024-46485,0,0,c5c003208e4a28b0ec5c2baa1571cb1aa48ca8b81c90c708a253ed626fdcfd98,2024-09-26T13:32:02.803000 @@ -266504,9 +266508,10 @@ CVE-2024-46909,0,0,23c76f6e1a6ff88eaca1f23c162ae0295380b6a8eaa129068dfbfc189f6b8 CVE-2024-46911,0,0,3d0ee5b10efd83bd968feb73195ce7d2aa3abe80ac847507929e8b55f2484d57,2024-11-21T09:39:07.520000 CVE-2024-46914,0,0,8183f2e81bda981099173d1b49f2e9d3c952a93e63b81e2bd23ce00d12f134f9,2024-10-22T22:15:05.810000 CVE-2024-46918,0,0,4ffbb01b562296291ac13b104d12d655761406982e7cf7d77cad5d9f13d483f1,2024-09-20T18:14:23.897000 -CVE-2024-46919,1,1,111dd7ab38d7b6179b0f989d061819f9bc8dfbb65f85cadc2eb417c674cf8cdb,2025-01-13T17:15:16.833000 +CVE-2024-46919,0,1,1b8f5f4c834e44498c5898c7cba6f4b1a56cdab4d29b49d3eeaa641ef13fac17,2025-01-13T20:15:28.450000 CVE-2024-4692,0,0,23393761d23a527f075ec0ab23d8db8e227006f309d26221ac72121be686a8a6,2024-10-21T16:10:14.873000 -CVE-2024-46920,1,1,04d155604f31acbaf8f66ed25b9906cbc8a1c5e977b7da56ea0beb00e9d62be5,2025-01-13T18:15:18.517000 +CVE-2024-46920,0,1,e4ac6b82e18dfeb2051ce3b7e2456127293ea60f027be0301b5c27e57f1906dd,2025-01-13T20:15:28.613000 +CVE-2024-46921,1,1,bc35bbe8caeb79c9a411f9da2cff91716f1bcdb6338c53291389b1c703ef875f,2025-01-13T19:15:10.903000 CVE-2024-4693,0,0,a9c8482c3ea2d347585fc5de3f7febf7c02e48c514bcd2a505cc67d911f0408a,2024-11-21T09:43:23.560000 CVE-2024-46934,0,0,a6247ccfc7686585f1ad4c13508e51c74923607d7000191b941f9a6c77eca291,2024-09-26T17:41:09.580000 CVE-2024-46935,0,0,5cad8a9a95361aabd63f1624134999baecb2a4cd5a3fdbbc89b1eb92fa778d51,2024-09-26T17:39:33.123000 @@ -267349,9 +267354,9 @@ CVE-2024-47888,0,0,f29473c64160f0d588a7ca069a65eb155d847c3556eac13a0a5e08def2ade CVE-2024-47889,0,0,fbc19ced86c6fe97c19cf36af507f82d2f6cb4f350a639ca6656c9db442c9b66,2024-10-18T12:53:04.627000 CVE-2024-4789,0,0,cb1fce1149cb253592c06cf88232fe30f43f7e24305ca3501b7b2ce5d58908d4,2024-11-21T09:43:36.877000 CVE-2024-47892,0,0,e300db381f4cf7705266e90cba53b1a4b7a7defd036013afcd4a8d8ee5ca06f1,2024-12-16T19:15:08.393000 -CVE-2024-47894,0,1,10cb3fcf43aee84728015caa1ec7ea40b57870fe842fc76e102626be48558b17,2025-01-13T18:15:18.693000 -CVE-2024-47895,0,1,24265746246461ce822ef4f2b8b2e78f2dae4b75e456193756e8e977fda8851a,2025-01-13T18:15:18.933000 -CVE-2024-47897,0,1,4f2e88ecc7c8c00d74363df7285f2e3e9f4702003cb3d2b7f2f87967d3a42b58,2025-01-13T18:15:19.310000 +CVE-2024-47894,0,0,10cb3fcf43aee84728015caa1ec7ea40b57870fe842fc76e102626be48558b17,2025-01-13T18:15:18.693000 +CVE-2024-47895,0,0,24265746246461ce822ef4f2b8b2e78f2dae4b75e456193756e8e977fda8851a,2025-01-13T18:15:18.933000 +CVE-2024-47897,0,0,4f2e88ecc7c8c00d74363df7285f2e3e9f4702003cb3d2b7f2f87967d3a42b58,2025-01-13T18:15:19.310000 CVE-2024-4790,0,0,b9d76a36166d9f8d4bd7b87bb2c3b8f2d1cb59ae69b213b42a13db79aa975016,2024-11-21T09:43:36.990000 CVE-2024-47901,0,0,3165d7a5ba37411c22ef300e066496e43f11ee0c48270295fa8bb2b50803f6e5,2024-10-30T15:39:47.430000 CVE-2024-47902,0,0,fdda8971bba9d387ffd8bac2920cf21627a1eb6b178788f8572a5ebbd51c29b6,2024-10-30T15:48:39.207000 @@ -267800,7 +267805,7 @@ CVE-2024-48876,0,0,e956412c9e67ebab3643a6f85503effdcaec15b67887a62803f066802d153 CVE-2024-48878,0,0,61df8c716ea1a9423d8f98d007fe741d86381fb579c3442ef6d827deee3b213c,2024-11-05T19:44:58.650000 CVE-2024-4888,0,0,133d57bae18b01966145fd4e4ce13e18e7959193dbb6b4323cb9d35593035efb,2024-11-21T09:43:47.830000 CVE-2024-48881,0,0,ebc6f1728ddca45a5c4c77e921d1ab1f076b9c09394d13101391d66674a8d76b,2025-01-11T13:15:23.437000 -CVE-2024-48883,1,1,9cb813a43fefbdcbc9c054fe52073c0bb352ce757d6e83add522337ce4d0f93f,2025-01-13T17:15:16.947000 +CVE-2024-48883,0,1,40a7c06416987571c8a8b08bd952b0491dd531f3479f503fba90cb6ed5c81613,2025-01-13T20:15:28.770000 CVE-2024-48889,0,0,8e1bac12eb50f3243e5ec10f0474e909f75dc6516eb6b1b6cee870377808ea68,2024-12-18T15:15:11.713000 CVE-2024-4889,0,0,54e41cd985dde0162870a1a62b42a9fd40bf90446677bc64ce2d3dd7fe90e1b1,2024-11-21T09:43:47.970000 CVE-2024-48895,0,0,2619cbfc056db229022c601c361879a86e8ef7297a78db8864167658fcd89d44,2024-11-21T13:57:24.187000 @@ -270649,7 +270654,7 @@ CVE-2024-52921,0,0,25b2bda62d23ac11ec224824331b7110da2b691d46f1f7381cfaabb403afc CVE-2024-52922,0,0,6a8e09d1bf0adb255aa582ae6b8ef0e4e406447b917ba92ca194beb3eadfb929,2024-11-18T17:35:09.720000 CVE-2024-52926,0,0,5021ba3f217b734483a326034e850572aad7fe69e34251b753d7998240a26e61,2024-12-24T19:15:06.940000 CVE-2024-5293,0,0,f489071fddfba63fc047e3d21a5cfec46b34b73b22b63f08d456cdba6a84add5,2024-11-21T09:47:22.487000 -CVE-2024-52935,0,0,0b8be60288be553867695875b4253488c0e2b8b8e85a7e60bb58035d7b58a187,2025-01-13T11:15:08.743000 +CVE-2024-52935,0,1,82bee18e7666e3b9627a83dc0a3752879a976f8cdc2c5166681676e372856b87,2025-01-13T19:15:10.993000 CVE-2024-52936,0,0,a1439d337fa72544d7f992bae6abc1ed03039160e6f2b23e57535b986e6ab2f8,2025-01-13T11:15:08.883000 CVE-2024-52937,0,0,5f36e12fe977c800f711f4d25ac90366c60f8b326fa32c674c6a617d8d4a2dc9,2025-01-13T16:15:18.093000 CVE-2024-52938,0,0,5a308697e3bf9106f1daeb9736111ff575bb1eeadbdfeea87a5220423f329ff5,2025-01-13T15:15:09.300000 @@ -270876,7 +270881,7 @@ CVE-2024-53200,0,0,382e2ed7c91ff816c9972e95788547d617ab94e25d45361504cd38a28e7c4 CVE-2024-53201,0,0,c711eb722b8f180d53de7616fe5e83ef81c9c735e27696929f70cbb31bb1797d,2025-01-08T21:26:58.670000 CVE-2024-53202,0,0,7d23e49d3acff80a64d7280021d5b5a203b4ae3822284474ef22a299df0b3198,2024-12-27T14:15:27.970000 CVE-2024-53203,0,0,5b84b307ac617b2733d67355e11a8602cacf08603e863af6ef90308e193fa443,2024-12-27T14:15:28.083000 -CVE-2024-53204,0,0,a67dade237e65bb4a6674739087981fbee3f96204ef4395e1de0111b2e3875f1,2024-12-27T14:15:28.207000 +CVE-2024-53204,0,1,253a86a67cc86d83f5b45b7081fcaef8f54aea697a0bb5732c9f1f31c626c086,2025-01-13T19:51:04.787000 CVE-2024-53205,0,0,310e80c96eec5b9caeb40d4ac42b3fdd15b85eabb0a1c3c5481d29db45eb8c48,2024-12-27T14:15:28.340000 CVE-2024-53206,0,0,d800df8f6d68aaab7abe7c1baba1443a71a7884f9dca1bdd8e5aa1f9928ba79d,2024-12-27T14:15:28.453000 CVE-2024-53207,0,0,eb965d61db6125837dce0de6ef3af14c44ea9331488a35d8508a0d1b2053b009,2025-01-08T21:26:42.470000 @@ -271390,7 +271395,7 @@ CVE-2024-54117,0,0,cd3dd10e2689d8474911355b4c987c7aca3170647fbf603148daa14ddf57f CVE-2024-54118,0,0,3d5435da91a32a7bf2206da2f7e289c3ed3a80b3e8f9d704d669dbbeea24a3de,2024-12-13T02:15:04.770000 CVE-2024-54119,0,0,203b5add8d1c8bb3b99dbd65acf3ec32defd37e324f29074464c74c5f5b42510,2024-12-12T13:15:11.350000 CVE-2024-5412,0,0,c89822b010e86cbcf24c047ef6717bc07af2215177f02665c5af47a090ff2c1c,2024-09-06T18:07:43.940000 -CVE-2024-54120,0,0,86995795087749e9ea55c90e42358214d5d49c83a2730f1e5217425edfcff8b7,2025-01-08T03:15:08.707000 +CVE-2024-54120,0,1,fc37b06b56d95ac60a56b11c7cac808590313ed84b6ecf221e2db0272ea1b080,2025-01-13T19:27:15.427000 CVE-2024-54121,0,0,e6931efeac60887dd7cab166567209b65e0059c8a120215e067e5ec970e9f26d,2025-01-08T04:15:07.120000 CVE-2024-54122,0,0,d40f0694d68115518c21d41b4eee81bc4359d1962c6853404f6547d3c1bd39a1,2024-12-12T13:15:11.527000 CVE-2024-54123,0,0,adb9d810678343393bca99901a3c1b47719ef78df3ca8f4e2f7e11c7b4e0333a,2024-11-29T19:15:10.287000 @@ -271772,7 +271777,7 @@ CVE-2024-5468,0,0,83f1a353a5b95b83c36aafd7fb0e880d8454855ef6bbd816a181cff50dcb42 CVE-2024-54680,0,0,ad61972708bbee5067cb0b02bfec2bac37188f1bcb38ae431510ae7b381f3add,2025-01-11T13:15:27.340000 CVE-2024-54682,0,0,014e168d2df7708ff5f91a3c7e1142a04001293f3734328797e32d8f370d3481,2024-12-16T08:15:05.513000 CVE-2024-54683,0,0,df238e349e4378311580023a0609c980670d89d3758a7a6c6e3c8f96b5a489e6,2025-01-11T13:15:27.490000 -CVE-2024-54687,0,0,4843463d24c47ae2aeb1e26301a5b9502ddc0257784ca9617fcdea7b0634c0f2,2025-01-10T18:15:22.630000 +CVE-2024-54687,0,1,edfa64742c2d4dcf37d41c46572e277e022b38f127cbca49510f62103a2ed788,2025-01-13T20:15:28.927000 CVE-2024-5469,0,0,0593227e51e97383649ced684c68d7aaf013a250af5a8e55d437662843299556,2024-11-21T09:47:44.633000 CVE-2024-5470,0,0,b70339f8a022f56de8d4eb030bd8f5d3563ba0fc9c1634fd55ea697aee92ede9,2024-11-21T09:47:44.787000 CVE-2024-5471,0,0,631b7a50303d6f9a193814092037f29379ca6ca2282e0b67207306f8abcc9ba4,2024-11-21T09:47:44.903000 @@ -271859,7 +271864,7 @@ CVE-2024-54994,0,0,dd824f3cf92f593fb6e4c555cbcac1a5d55f6158ceb4bb766cf564a90f298 CVE-2024-54996,0,0,5d8c07e61eede1603ccdca6f35250f10be0d6813b862e8afc620d73b51073af6,2025-01-13T16:15:18.270000 CVE-2024-54997,0,0,2cf75931623f004a29e91130f12a5a6a3b71132a62cfc94cad60bf173593b41c,2025-01-10T21:15:13.083000 CVE-2024-54998,0,0,8112136503090ac1585a28559857630948b5c08a1a758d7a78460b3db270e978,2025-01-10T21:15:13.203000 -CVE-2024-54999,1,1,0eb16ddbc9ba2791273443a41400d8019c23c0739da45badc9fa587e3ec6eb9e,2025-01-13T17:15:17.057000 +CVE-2024-54999,0,0,0eb16ddbc9ba2791273443a41400d8019c23c0739da45badc9fa587e3ec6eb9e,2025-01-13T17:15:17.057000 CVE-2024-5500,0,0,280f34db2c8783872a68d6daa217e3e1e4614074bb8e8b0a741315b28d98613a,2024-11-21T09:47:49.373000 CVE-2024-55008,0,0,46155f9f511c9f5f76f29eb42e0ab350c4f420855b69bdcc893ca8113faf6544,2025-01-08T20:15:28.467000 CVE-2024-5501,0,0,c16d3f86bb6f5e02795073b49cb84dc8c7e7a5718a6fed025ea914c4721b4cad,2024-11-21T09:47:49.573000 @@ -272422,7 +272427,7 @@ CVE-2024-56433,0,0,41933bdf4cf50f4b61b9a39102f868e297a293e10ec834a2eac62b7879bed CVE-2024-56434,0,0,c38d6bd7111b766e42099f8b17a58e6f95abad7b836f20f54664e2006a55f006,2025-01-08T02:15:25.330000 CVE-2024-56435,0,0,a6b9a986a1657a73fb9f5c59d2598535666faf53ac60b2c834fb1a24f728c95b,2025-01-08T02:15:25.487000 CVE-2024-56436,0,0,47afde40a091b787140b09341604b928e7f41b98d32166125274686ea00202e1,2025-01-08T02:15:25.603000 -CVE-2024-56437,0,0,54ac281d7e990dcfe2ea842216694d1ac65a0135ef120dbbee077631df857172,2025-01-08T03:15:08.840000 +CVE-2024-56437,0,1,c63a52ba38fc488737558848b9c8de8bd97794641864128b0efcbd82692e90d6,2025-01-13T19:27:34.937000 CVE-2024-56438,0,0,a8de726444760abf673229647a141e422b630f203ef45c36c35fc462f477e941,2025-01-08T03:15:08.970000 CVE-2024-56439,0,0,a234176053e19689b53ebcf04737cad7c2a140c3eb3e74de7e619fb842a50ffb,2025-01-08T03:15:09.113000 CVE-2024-5644,0,0,160a368b3a7f8d4e53712fad16fb1094662061822d6ba961b4f309a68658057a,2024-11-21T09:48:04.900000 @@ -272655,7 +272660,7 @@ CVE-2024-56700,0,0,5f62e13bfa0eea45d94c6d5c9bec178b45e7ae92140fc843457a7394c816c CVE-2024-56701,0,0,d79b5e847459e856711b89867e1c2d3c31f0fd02ba1f2893d458ee4445830b89,2024-12-28T10:15:17.620000 CVE-2024-56702,0,0,62ea9ba42e8116e4eaf3d1eb4998b0393a4e76bfd7df3cb54ed07a73ce6799ee,2024-12-28T10:15:17.980000 CVE-2024-56703,0,0,cab66ac2133d81e07560a183ef009a01fd1b4a1df36ac56a390e43408c12a633,2024-12-28T10:15:18.433000 -CVE-2024-56704,0,0,48e5a0d619df270073488e7c19d7903171e1acc92eea5d1ff8f4c9b18c1aff57,2024-12-28T10:15:18.817000 +CVE-2024-56704,0,1,fda84b9585d7fe2d80812e683f9a8bd3675dd599cdc9907d9a45b0ad4a180589,2025-01-13T19:55:28.720000 CVE-2024-56705,0,0,d44dcf1285cd38e1d062c7fb5bdaee01c818db7d4cf87dc2b219ad9bde922d33,2024-12-28T10:15:19.043000 CVE-2024-56706,0,0,a4ba04f2ce7d48f15b7673aaedbcd9366ea8d3ba1e2c788436c2ecc7452df2fb,2024-12-28T10:15:19.400000 CVE-2024-56707,0,0,b05b8792b2b7de0466fe1a56bcfb7d27eb2e048786ee1140fc3035d1622e8c70,2024-12-28T10:15:19.660000 @@ -272825,12 +272830,12 @@ CVE-2024-5737,0,0,fb7afad0bdcad96b29de7c5519f73ad0e5af614975f3cc39b56e0ff717aa63 CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000 CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f02a,2024-11-21T09:48:15.963000 CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba72,2024-11-21T09:48:16.117000 -CVE-2024-5743,1,1,d0e55743955a19a87c824f43f113517e2001f346d7c0d7dc8f98ceb853b6977e,2025-01-13T18:15:19.517000 +CVE-2024-5743,0,0,d0e55743955a19a87c824f43f113517e2001f346d7c0d7dc8f98ceb853b6977e,2025-01-13T18:15:19.517000 CVE-2024-5744,0,0,f08529b05aa9992ca46f071419027f83a7c3d97cd6c27e854ef9ed714ed839f1,2024-11-21T09:48:16.267000 CVE-2024-5745,0,0,f5c2e0226ff1c47168df0c237981cdbe9e1838dc0b6144c20848884be5dc91bf,2024-11-21T09:48:16.423000 CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a172283607,2024-11-21T09:48:16.580000 -CVE-2024-57487,1,1,4a1cb9cd7d48ab7f0cad728c2d066adecd8a42e68531aaa45278aae1d638589c,2025-01-13T17:15:17.160000 -CVE-2024-57488,1,1,0e9fab348abd23a9a407960ab24a4b35fb024cec622a31fca11e299849b55085,2025-01-13T17:15:17.263000 +CVE-2024-57487,0,1,0807b290efd6cc8f6e7e6b31de66036ade21e0044433af00698c818fcbb278ba,2025-01-13T20:15:29.090000 +CVE-2024-57488,0,1,d19c2052fbaefedd169eceeb76f3704e3b884097b8c5ff84fd1ae0a72fa1e299,2025-01-13T20:15:29.240000 CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000 CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000 CVE-2024-5751,0,0,a075ba1bce0283dcf2eb1909116e18ed1aeef6c0cfd6415ef5931a3fb6320c2f,2024-11-21T09:48:16.813000 @@ -273070,7 +273075,7 @@ CVE-2024-5970,0,0,f3015a747bcbfc95b2c2fa4913554bd078558858579cc71fc5d895a9629d9a CVE-2024-5971,0,0,f03f53869694442f097b92cf60ccdd932b1bd24804d85a21f37d5d1a93456535,2024-11-21T09:48:40.127000 CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000 CVE-2024-5973,0,0,5764fe7dba8a714456e598c82d1ba942598616db44809839e67ac1f6bf90f970,2024-11-21T09:48:40.297000 -CVE-2024-5974,0,1,498de258bcf33c56ad60db0f86f98a3aed7e28109adf8bf05e7857a33b2cf79c,2025-01-13T18:15:19.697000 +CVE-2024-5974,0,0,498de258bcf33c56ad60db0f86f98a3aed7e28109adf8bf05e7857a33b2cf79c,2025-01-13T18:15:19.697000 CVE-2024-5975,0,0,1540d9cf16be3cdaab49810d2c22343710e6ed2f67972005f1fcea70f1fac8ea,2024-11-21T09:48:40.623000 CVE-2024-5976,0,0,369569b6461b201198770f0e5df4f7361ae376d78e8d83ac196e5f314df7947e,2024-11-21T09:48:40.793000 CVE-2024-5977,0,0,909876bcbf4f2ad2839dc39ff9f402926337af028be37025b6a8c86d94af7f35,2024-11-21T09:48:40.960000 @@ -273420,7 +273425,7 @@ CVE-2024-6347,0,0,ead9b349654f8c1b56b42b60b3e21504af84ff862f187d8c4f01052391405f CVE-2024-6348,0,0,f8ec53a55d7061e6e616a9d49e72c1cd9f0282aa80090fa0b8e8fbc34eed5872,2024-08-20T16:17:03.810000 CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000 CVE-2024-6350,0,0,1fc124e07d9714607d8d4610b064f72d1361319398d6b6baa75420c813d318c6,2025-01-08T18:15:19.880000 -CVE-2024-6352,1,1,4d147067ca72f1f24736c73c902fef540e6a6e218bee3f4c7ba7242d6936cc0c,2025-01-13T18:15:19.887000 +CVE-2024-6352,0,0,4d147067ca72f1f24736c73c902fef540e6a6e218bee3f4c7ba7242d6936cc0c,2025-01-13T18:15:19.887000 CVE-2024-6353,0,0,d4c4115348071ea0df993e53207fed00124ba29370e36d0bee2aef495fa28299,2024-11-21T09:49:28.547000 CVE-2024-6354,0,0,b2dccb6ff0cf7d4d778c16d437a8f334569c687ad872e701936b9155052ef539,2024-11-21T09:49:28.670000 CVE-2024-6355,0,0,4c7974dc5e52fdaa43d5f5a202a9f019ba0b6401d733645ab7e0c57b90e3af56,2024-11-21T09:49:28.797000 @@ -276594,12 +276599,12 @@ CVE-2025-0401,0,0,387e19a2812b1284381b4c9d44a677a221e0b3ef26759604ce2f59eba2070a CVE-2025-0402,0,0,9535638fcb03e30ea11b5c4b5bbda52e7fa7f3950ffb295da164028bcd69947c,2025-01-13T00:15:07.707000 CVE-2025-0403,0,0,410c24d6d1526a0b93f1cc8d7a91ca28b7a89a1c34c372c6fcb34f8a0ae69847,2025-01-13T00:15:07.873000 CVE-2025-0404,0,0,9c1c31a342a5cece29ac87c84fe863c6f7ea1dc0117f323ba50b5e921bdd430b,2025-01-13T01:15:07.227000 -CVE-2025-0405,0,0,fa7310491d9b035f03a92a039aa8a0993082233b0ddec8e7ad737235e8a8c98d,2025-01-13T01:15:07.430000 -CVE-2025-0406,0,1,9d39f4351b80363b18f117ed5d9911db0718111194c53ca1c3cdbc210fb572d4,2025-01-13T18:15:20.490000 -CVE-2025-0407,0,1,ad3b248e96a0fcb777157f95341630e1089e656ed1e5f38d08eba0350c50a941,2025-01-13T18:15:21.023000 +CVE-2025-0405,0,1,6203d69c2ea9d8b524135de8a7adf37795735b2b486cc69ec882a2a0f5fe34a6,2025-01-13T19:15:11.227000 +CVE-2025-0406,0,0,9d39f4351b80363b18f117ed5d9911db0718111194c53ca1c3cdbc210fb572d4,2025-01-13T18:15:20.490000 +CVE-2025-0407,0,0,ad3b248e96a0fcb777157f95341630e1089e656ed1e5f38d08eba0350c50a941,2025-01-13T18:15:21.023000 CVE-2025-0408,0,0,a96acf9e81a811691f8b520b286233eef15e7059c8d8320ce584a1b7a8c2ed8a,2025-01-13T14:15:10.073000 -CVE-2025-0409,0,1,5b16b7910d2f3bb912034acec9ddfb80ff7cbc22bd69b75269b1a49c27f02634,2025-01-13T18:15:21.430000 -CVE-2025-0410,0,1,5453cf245c45b2e030c2d84dab023e8fd21c521b8dd76be3a4a1bd41b630f4d8,2025-01-13T18:15:21.730000 +CVE-2025-0409,0,0,5b16b7910d2f3bb912034acec9ddfb80ff7cbc22bd69b75269b1a49c27f02634,2025-01-13T18:15:21.430000 +CVE-2025-0410,0,0,5453cf245c45b2e030c2d84dab023e8fd21c521b8dd76be3a4a1bd41b630f4d8,2025-01-13T18:15:21.730000 CVE-2025-0412,0,0,bfbf47e0956b1bfccce4c3a829b70c8095a189edb5636c3ef3ebd81177784d3c,2025-01-13T04:15:06.477000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20123,0,0,54512af23f890abd1fef44213c66523a0b62c1420699fcab5bda08e37f5f4455,2025-01-08T16:15:38.150000 @@ -276643,7 +276648,9 @@ CVE-2025-22137,0,0,500e180482a18b49718c6495441b08426af3ad9db841f00b13a599eecbf00 CVE-2025-22139,0,0,62fc450acdd2ced803ece4801c69c5eb6552f5e1f8d20b6c12e23641dea96fdd,2025-01-08T20:15:29.693000 CVE-2025-22140,0,0,be66f05081c14fb2e0816483c4f45d3f628fc010fe866ea9da650e7ac4d60a3d,2025-01-08T20:15:29.800000 CVE-2025-22141,0,0,a527922fbc8add89576398e2e4e44f71f48d8da972b31e27b0c4985f7420a5dc,2025-01-08T20:15:29.897000 +CVE-2025-22142,1,1,b970fe0f8b64f949fec07b44d4a082526fc7c2b1b36c7be124cc27643683e7e9,2025-01-13T20:15:29.677000 CVE-2025-22143,0,0,535b34000993ab6e069ce70a88afd72eb8046a8f188d22ed6e3f4d9ac657466d,2025-01-08T20:15:30.003000 +CVE-2025-22144,1,1,ae2bb6940ac5435bda49b31c5d0e40c417a32362cc932c353730977d61f5ccb7,2025-01-13T20:15:29.817000 CVE-2025-22145,0,0,88df2b27b4a7796924aa6277caf85bae572e95291858d2eee15b7f4eb271d86c,2025-01-08T21:15:13.480000 CVE-2025-22149,0,0,a38f1d25924ff640550a2206f96377b56b7eb734e7bb1771523eee3ff2dd77f7,2025-01-09T18:15:30.233000 CVE-2025-22151,0,0,21f9e4fddd90599ac45f0514a6d95c5510077d3d9b45eefd94598514744d82c1,2025-01-09T19:15:20.410000 @@ -276819,7 +276826,7 @@ CVE-2025-22598,0,0,e497fe58ac8675da7246094a2662199588779aa650b9c02699534f158225a CVE-2025-22599,0,0,645942d1c7d2f7dd12d8618f2017edf7382a16a018a352b649288462de683267,2025-01-10T16:15:30.737000 CVE-2025-22600,0,0,5bcf7e241f56265340265c8ceca3bc4c44ef112e4d972ba43c49267d66196668,2025-01-10T16:15:30.940000 CVE-2025-22621,0,0,ffd9a82cf8c3aa7daf1fb231064828db28f1c16f80aac0f92c6df757403f534e,2025-01-07T17:15:35.710000 -CVE-2025-22777,0,1,242cf60b2d99589847386f8f1b61f59a4927e791bc9c8d5220d1b9fa42c9eebc,2025-01-13T18:15:22 +CVE-2025-22777,0,0,242cf60b2d99589847386f8f1b61f59a4927e791bc9c8d5220d1b9fa42c9eebc,2025-01-13T18:15:22 CVE-2025-22800,0,0,556018ca5feeb4d9fcefc62c608e69c8352f4bbcf6b60060e80b8843fc3177b7,2025-01-13T14:15:13.067000 CVE-2025-22801,0,0,c83deac6a5c5c2cba0bd79ad3064ebb1b72b5ce6e25705a33f2e1f95b55a8ff2,2025-01-09T16:16:29.323000 CVE-2025-22802,0,0,4ee09a11670407cea09cb459dd4de4a2924f74334017dc53487f4f767d32ad7b,2025-01-09T16:16:29.470000 @@ -276846,16 +276853,18 @@ CVE-2025-22823,0,0,16e8a59cbcc2bfc06c602dd1c4fa5e368ef951a41870f5a6e53ff24ecf09b CVE-2025-22824,0,0,fb201e5b5828770ff11d00a29d3f8e00f0da01f397b44ffb8e7c8ad29623f7e1,2025-01-09T16:16:32.893000 CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000 CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000 -CVE-2025-22828,0,1,28d1c765b7d74d78decce10490e63a055e82f37ae0f240bb1bf2461f2a535ce4,2025-01-13T18:15:22.143000 +CVE-2025-22828,0,1,146919e8038c633aebea97dab991ef56f9be23b958183120e0167c3ba087763b,2025-01-13T19:15:11.373000 CVE-2025-22946,0,0,bbb309333efca2524774885144eccce64002a01a988a38ce2753d9bc51da626f,2025-01-10T15:15:16.710000 CVE-2025-22949,0,0,39d9572a05bfbbbc6c6a7518255a39870f82fdb4f4d926ef9b2339fd79f5588a,2025-01-10T16:15:31.137000 CVE-2025-22963,0,0,ddb005db611e43367f0caf5873d662acfb7b90267f1a87ba259499e665e1b39e,2025-01-13T16:15:19.367000 CVE-2025-23016,0,0,31a93833611c1f04fca5216d55a04a7c92375e0aedfa95a405475196dac4f70b,2025-01-10T12:15:25.480000 CVE-2025-23022,0,0,12b4268af4b5910f707f03dab9877afd2f72e34fc9d11a1b908b3e43ea4035dd,2025-01-10T16:15:31.250000 -CVE-2025-23078,0,0,787208eb125873cdaeda6aad58b913bd32e17a0cac9bf50dcec492f4dc86b139,2025-01-10T18:15:26.877000 -CVE-2025-23079,0,1,688568487a54a31b09fc20fca3268a4665f027f5a20c0e7845588469ec59e859,2025-01-13T18:15:22.470000 -CVE-2025-23108,0,1,bf7d5127026a7b3e24519e57e5514e9c8f61188c4fc8ae46ad1a8e414e8fd737,2025-01-13T18:15:22.680000 -CVE-2025-23109,0,1,b22a40d0cd6f5709ff1c9b97ba4e1adbf7087ff55aed713db176344e389fb640,2025-01-13T18:15:22.903000 +CVE-2025-23026,1,1,6c6c6eea5e4491b52f4f485feac38dea4916b892d0e44aff834ce1fb5e02f83a,2025-01-13T20:15:30.003000 +CVE-2025-23027,1,1,997c996b11a67c7e089e56fbd48e5f5dd49b8616ec28b2fbc8fd53aace203e73,2025-01-13T20:15:30.150000 +CVE-2025-23078,0,1,6e2234483d99611921814b7d4b760ef5cfe8faae35f477da1f41cf4c536bce4f,2025-01-13T19:15:11.540000 +CVE-2025-23079,0,0,688568487a54a31b09fc20fca3268a4665f027f5a20c0e7845588469ec59e859,2025-01-13T18:15:22.470000 +CVE-2025-23108,0,0,bf7d5127026a7b3e24519e57e5514e9c8f61188c4fc8ae46ad1a8e414e8fd737,2025-01-13T18:15:22.680000 +CVE-2025-23109,0,0,b22a40d0cd6f5709ff1c9b97ba4e1adbf7087ff55aed713db176344e389fb640,2025-01-13T18:15:22.903000 CVE-2025-23110,0,0,867db813d57403bbcc6a3d328d580ab49b5acf4f7dd1d1514716e26b355a6df2,2025-01-10T22:15:27.550000 CVE-2025-23111,0,0,1ad7a709e810907fc4a775b3bc42be99357664fb7b9ea9c87353d91f6efcd984,2025-01-10T22:15:27.723000 CVE-2025-23112,0,0,a562dc16cabefbf7dbab5fd0ace202da598b5a780a77bf2dded3f9d697b20716,2025-01-10T22:15:27.863000