diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36789.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36789.json index b8e16f4fa46..39cb2cfd88e 100644 --- a/CVE-2020/CVE-2020-367xx/CVE-2020-36789.json +++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36789.json @@ -2,8 +2,8 @@ "id": "CVE-2020-36789", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-17T18:15:42.743", - "lastModified": "2025-04-17T20:21:05.203", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:55:11.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,155 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: dev: can_get_echo_skb(): evitar la llamada a kfree_skb() en el contexto de IRQ duro Si un controlador llama a can_get_echo_skb() durante un IRQ de hardware (que es a menudo, pero no siempre, el caso), el 'WARN_ON(in_irq)' en net/core/skbuff.c#skb_release_head_state() podr\u00eda activarse, en circunstancias de congesti\u00f3n de la red, junto con el riesgo potencial de una desreferencia de puntero NULL. La causa ra\u00edz de este problema es la llamada a kfree_skb() en lugar de dev_kfree_skb_irq() en net/core/dev.c#enqueue_to_backlog(). Este parche evita que el skb se libere dentro de la llamada a netif_rx() incrementando su contador de referencias con skb_get(). El skb se libera finalmente mediante una de las funciones seguras en contexto IRQ: dev_consume_skb_any() o dev_kfree_skb_any(). Se utiliza la versi\u00f3n \"any\" porque algunos controladores podr\u00edan llamar a can_get_echo_skb() en un contexto normal. Este problema se debe a que, inicialmente, en la pila de red principal, no se esperaba que los skb de bucle invertido se recibieran en el contexto IRQ de hardware. La pila CAN es una excepci\u00f3n. Este error se report\u00f3 previamente en 2017 en [1], pero el parche propuesto nunca fue aceptado. Si bien [1] modifica directamente net/core/dev.c, aqu\u00ed intentamos proponer una modificaci\u00f3n m\u00e1s fluida local en la pila de red CAN (suponiendo que solo los dispositivos CAN se ven afectados por este problema). [1] http://lore.kernel.org/r/57a3ffb6-3309-3ad5-5a34-e93c3fe3614d@cetitec.com" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.31", + "versionEndExcluding": "4.4.244", + "matchCriteriaId": "BCE79E39-47AC-4822-993E-020CB01414EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.244", + "matchCriteriaId": "5DA13F99-FB5C-48E2-89F8-771B5DA2F0D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.207", + "matchCriteriaId": "DD9E0DA2-567F-4DF2-9A1E-5D22A91FA245" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.158", + "matchCriteriaId": "3DABF800-EF14-41DA-B3D6-4B5DBF148443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.78", + "matchCriteriaId": "DFFC67F2-DDE1-4CA5-A075-32865562DF37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.9.9", + "matchCriteriaId": "8FC7AE04-F63B-4317-8485-E44A13A4CFCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.10:rc1:*:*:*:*:*:*", + "matchCriteriaId": "9DD7EB1D-064C-4DB9-AD34-D8EF78312C17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.10:rc2:*:*:*:*:*:*", + "matchCriteriaId": "12505363-342C-4333-98C0-41F031024348" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2283f79b22684d2812e5c76fc2280aae00390365", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/248b71ce92d4f3a574b2537f9838f48e892618f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3a922a85701939624484e7f2fd07d32beed00d25", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/451187b20431924d13fcfecc500d7cd2d9951bac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7e4cf2ec0ca236c3e5f904239cec6efe1f3baf22", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/87530b557affe01c764de32dbeb58cdf47234574", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ab46748bf98864f9c3f5559060bf8caf9df2b41e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47221.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47221.json index 884965cb32c..6b6decba859 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47221.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47221.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47221", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:11.380", - "lastModified": "2024-11-21T06:35:39.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:07:02.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,140 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mm/slub: en realidad corrige el puntero de lista libre frente a redzoning. Resulta que SLUB redzoning (\"slub_debug=Z\") verifica desde s->object_size en lugar de s->inuse (que normalmente se elimina para dejar espacio para el puntero de lista libre), por lo que un cach\u00e9 creado con un tama\u00f1o de objeto menor a 24 tendr\u00eda el puntero de lista libre escrito m\u00e1s all\u00e1 de s->object_size, causando que el puntero de lista libre corrompa la zona roja. Esto fue muy visible con \"slub_debug=ZF\": prueba de BUG(contaminada: GB): zona roja derecha sobrescrita ---------------------------- ------------------------------------------------- INFORMACI\u00d3N : 0xffff957ead1c05de-0xffff957ead1c05df @offset=1502. Primer byte 0x1a en lugar de 0xbb INFORMACI\u00d3N: slab 0xffffef3950b47000 objetos=170 usados=170 fp=0x0000000000000000 banderas=0x80000000000000200 INFORMACI\u00d3N: Objeto 0xffff957ead1c05d8 @offset=1496 fp=0xffff9 57ead1c0620 Zona roja (____ptrval____): bb bb bb bb bb bb bb bb .... .... Objeto (____ptrval____): 00 00 00 00 00 f6 f4 a5 ........ Redzone (____ptrval____): 40 1d e8 1a aa @.... Relleno (____ptrval____): 00 00 00 00 00 00 00 00 ........ Ajuste el desplazamiento para permanecer dentro de s->object_size. (Tenga en cuenta que actualmente no se sabe que existan cach\u00e9s de este rango de tama\u00f1o en el kernel)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-763" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.7", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "366D4F8F-9C74-4363-B945-AE477F73A08A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/ce6e8bee7a3883e8008b30f5887dbb426aac6a35", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e41a49fadbc80b60b48d3c095d9e2ee7ef7c9a8e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6ed2357541612a13a5841b3af4dc32ed984a25f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ce6e8bee7a3883e8008b30f5887dbb426aac6a35", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e41a49fadbc80b60b48d3c095d9e2ee7ef7c9a8e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6ed2357541612a13a5841b3af4dc32ed984a25f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47222.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47222.json index 4db42f16de3..d33de26b4d8 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47222.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47222.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47222", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:11.453", - "lastModified": "2024-11-21T06:35:39.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:13:04.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,55 +15,203 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: bridge: corrige el refcnt dst del t\u00fanel vlan al salir El c\u00f3digo del t\u00fanel de salida usa dst_clone() y establece directamente el resultado que es incorrecto porque la entrada puede tener 0 refcnt o ya estar eliminada , causando varios problemas. Tambi\u00e9n activa WARN_ON() en dst_hold()[1] cuando no se puede tomar una referencia. Solucionelo usando dst_hold_safe() y verificando si realmente se tom\u00f3 una referencia antes de configurar el dst. [1] Registro dmesg WARN_ON y siguientes errores de referencia ADVERTENCIA: CPU: 5 PID: 38 en include/net/dst.h:230 br_handle_egress_vlan_tunnel+0x10b/0x134 [puente] M\u00f3dulos vinculados en: 8021q garp mrp bridge stp llc bonding ipv6 virtio_net CPU : 5 PID: 38 Comm: ksoftirqd/5 Kdump: cargado Contaminado: GW 5.13.0-rc3+ #360 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 01/04/2014 RIP: 0010:br_handle_egress_vlan_tunnel+0x10b/0x134 [puente] C\u00f3digo: e8 85 bc 01 e1 45 84 f6 74 90 45 31 f6 85 db 48 c7 c7 a0 02 19 a0 41 0f 94 c6 31 c9 31 d2 44 f6 e8 64 a.C. 01 e1 85 db 75 02 <0f> 0b 31 c9 31 d2 44 89 f6 48 c7 c7 70 02 19 a0 e8 4b bc 01 e1 49 RSP: 0018:ffff8881003d39e8 EFLAGS: 00010246 RAX: 00000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffffa01902a0 RBP: ffff8881040c6700 R08: 0000000000000000 R09: 00000000000000001 R10: 2ce93d0054fe0d00 R11: d00000e0000 R12: ffff888109515000 R13: 0000000000000000 R14: 0000000000000001 R15: 00000000000000401 FS: 0000000000000000(0000) 8822bf40000(0000) knlGS:0000000000000000CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f42ba70f030 CR3: 0000000109926000 CR4: 00000000000006e0 Seguimiento de llamadas: br_handle_vlan+0xbc/0xca [puente] _forward+0x23/0x164 [puente] delivery_clone+0x41/0x48 [puente] br_handle_frame_finish+0x36f/ 0x3aa [puente] ? skb_dst+0x2e/0x38 [puente]? br_handle_ingress_vlan_tunnel+0x3e/0x1c8 [puente]? br_handle_frame_finish+0x3aa/0x3aa [puente] br_handle_frame+0x2c3/0x377 [puente]? __skb_pull+0x33/0x51? vlan_do_receive+0x4f/0x36a? br_handle_frame_finish+0x3aa/0x3aa [puente] __netif_receive_skb_core+0x539/0x7c6? __list_del_entry_valid+0x16e/0x1c2 __netif_receive_skb_list_core+0x6d/0xd6 netif_receive_skb_list_internal+0x1d9/0x1fa gro_normal_list+0x22/0x3e dev_gro_receive+0x55b/0x600 ? detach_buf_split+0x58/0x140 napi_gro_receive+0x94/0x12e virtnet_poll+0x15d/0x315 [virtio_net] __napi_poll+0x2c/0x1c9 net_rx_action+0xe6/0x1fb __do_softirq+0x115/0x2d8 run_ksoftirq d+0x18/0x20 smpboot_thread_fn+0x183/0x19c ? smpboot_unregister_percpu_thread+0x66/0x66 kthread+0x10a/0x10f? kthread_mod_delayed_work+0xb6/0xb6 ret_from_fork+0x22/0x30 ---[ end trace 49f61b07f775fd2b ]--- dst_release: dst:00000000c02d677a refcnt:-1 dst_release underflow" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.11", + "versionEndExcluding": "4.14.238", + "matchCriteriaId": "32B54D58-21AF-4B0B-B388-EADE824369F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.196", + "matchCriteriaId": "F3CAB837-7D38-4934-AD4F-195CEFD754E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.128", + "matchCriteriaId": "6267BD4E-BE25-48B5-B850-4B493440DAFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "59455D13-A902-42E1-97F7-5ED579777193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/25053a8404ba17ca48f5553d487afc1882e9f56c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/42020f7f37a90d24b9551f5f7eba3f7c7c102968", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/79855be6445b6592bddb7bd7167083ec8cdbd73f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/84fc1c944e45ab317e2e70a0e7f76fa2a5e43b6e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cfc579f9d89af4ada58c69b03bcaa4887840f3b3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fc7fdd8c5c2ad2fe3e297698be9d4dbe4a4e0579", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/25053a8404ba17ca48f5553d487afc1882e9f56c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/42020f7f37a90d24b9551f5f7eba3f7c7c102968", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/79855be6445b6592bddb7bd7167083ec8cdbd73f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/84fc1c944e45ab317e2e70a0e7f76fa2a5e43b6e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cfc579f9d89af4ada58c69b03bcaa4887840f3b3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fc7fdd8c5c2ad2fe3e297698be9d4dbe4a4e0579", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47226.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47226.json index 893d6524bd1..d2052aa6922 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47226.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47226.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47226", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:11.823", - "lastModified": "2024-11-21T06:35:39.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:26:36.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,140 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/fpu: Invalida el estado de la FPU despu\u00e9s de un XRSTOR fallido desde un b\u00fafer de usuario. Tanto Intel como AMD consideran que es arquitect\u00f3nicamente v\u00e1lido que XRSTOR falle con #PF pero aun as\u00ed cambie el estado del registro. . Las condiciones reales bajo las cuales esto podr\u00eda ocurrir no est\u00e1n claras [1], pero parece plausible que esto pueda desencadenarse si un hilo hermano desasigna una p\u00e1gina e invalida el TLB compartido mientras otro hilo hermano est\u00e1 ejecutando XRSTOR en la p\u00e1gina en cuesti\u00f3n. __fpu__restore_sig() puede ejecutar XRSTOR mientras los registros de hardware se conservan en nombre de una tarea de v\u00edctima diferente (usando el mecanismo fpu_fpregs_owner_ctx) y, en teor\u00eda, XRSTOR podr\u00eda fallar pero modificar los registros. Si esto sucede, entonces hay una ventana en la que __fpu__restore_sig() podr\u00eda programar la salida y la tarea de la v\u00edctima podr\u00eda volver a programarse sin recargar sus propios registros FPU. Esto resultar\u00eda en parte del estado de la FPU en el que __fpu__restore_sig() intentaba cargar una filtraci\u00f3n en el estado visible para el usuario de la tarea de la v\u00edctima. Invalide los registros FPU preservados en caso de falla de XRSTOR para evitar que esta situaci\u00f3n corrompa cualquier estado. [1] Los lectores frecuentes de las listas de erratas podr\u00edan imaginar \"condiciones microarquitect\u00f3nicas complejas\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.2", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "71A9FF74-A7CD-4A97-B822-6302C3124C48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/002665dcba4bbec8c82f0aeb4bd3f44334ed2c14", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a7748e021b9fb7739e3cb88449296539de0b6817", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d8778e393afa421f1f117471144f8ce6deb6953a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/002665dcba4bbec8c82f0aeb4bd3f44334ed2c14", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a7748e021b9fb7739e3cb88449296539de0b6817", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d8778e393afa421f1f117471144f8ce6deb6953a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47227.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47227.json index 4c9f2986b04..acda9953900 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47227.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47227.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47227", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:11.900", - "lastModified": "2024-11-21T06:35:40.087", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:41:06.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,140 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: x86/fpu: evita la corrupci\u00f3n del estado en __fpu__restore_sig() La ruta lenta no compactada usa __copy_from_user() y copia todo el b\u00fafer del usuario en el b\u00fafer del kernel, palabra por palabra. Esto significa que el b\u00fafer del kernel ahora puede contener un estado completamente inv\u00e1lido en el que XRSTOR realizar\u00e1 #GP. validar_user_xstate_header() puede detectar parte de esa corrupci\u00f3n, pero eso deja a las personas que llaman la responsabilidad de borrar el b\u00fafer. Antes de la compatibilidad con XSAVES, era posible simplemente reinicializar el b\u00fafer por completo, pero con los estados del supervisor eso ya no es posible porque la divisi\u00f3n del c\u00f3digo de borrado del b\u00fafer lo hac\u00eda al rev\u00e9s. Arreglar eso es posible, pero no corromper al Estado en primer lugar es m\u00e1s s\u00f3lido. Evite la corrupci\u00f3n del b\u00fafer XSAVE del kernel utilizando copy_user_to_xstate() que valida el contenido del encabezado XSAVE antes de copiar los estados reales al kernel. copy_user_to_xstate() anteriormente solo se llamaba para buffers del kernel en formato compacto, pero funciona tanto para formatos compactos como no compactos. Usarlo para el formato no compacto es m\u00e1s lento debido a m\u00faltiples operaciones __copy_from_user(), pero ese costo es menos importante que el c\u00f3digo robusto en una ruta que ya es lenta. [Registro de cambios pulido por Dave Hansen]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "AD060971-E88B-4295-B40F-7C6C358E1541" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/076f732b16a5bf842686e1b43ab6021a2d98233e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/484cea4f362e1eeb5c869abbfb5f90eae6421b38", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec25ea1f3f05d6f8ee51d1277efea986eafd4f2a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/076f732b16a5bf842686e1b43ab6021a2d98233e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/484cea4f362e1eeb5c869abbfb5f90eae6421b38", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec25ea1f3f05d6f8ee51d1277efea986eafd4f2a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47228.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47228.json index 252f06b283f..9e08048e447 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47228.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47228.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47228", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:12.250", - "lastModified": "2024-11-21T06:35:40.190", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:49:34.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,116 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "FD0C8733-D75B-4E30-9D46-CFE48CF2CC1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/208bb686e7fa7fff16e8fa78ff0db34aa9acdbd7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8d651ee9c71bb12fc0c8eb2786b66cbe5aa3e43b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b7a05aba39f733ec337c5b952e112dd2dc4fc404", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/208bb686e7fa7fff16e8fa78ff0db34aa9acdbd7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8d651ee9c71bb12fc0c8eb2786b66cbe5aa3e43b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b7a05aba39f733ec337c5b952e112dd2dc4fc404", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47229.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47229.json index ebd48152e4c..6953e7a3429 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47229.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47229.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47229", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:12.323", - "lastModified": "2024-11-21T06:35:40.363", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:42:00.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,55 +15,202 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: PCI: aardvark: solucion\u00f3 el p\u00e1nico del kernel durante la transferencia de PIO. Intentar iniciar una nueva transferencia de PIO escribiendo el valor 0 en el registro PIO_START cuando la transferencia anterior a\u00fan no se ha completado (que se indica con el valor 1). en PIO_START) provoca un aborto externo en la CPU, lo que resulta en p\u00e1nico del kernel: Interrupci\u00f3n de SError en CPU0, c\u00f3digo 0xbf000002 - P\u00e1nico del kernel de SError - no se sincroniza: Interrupci\u00f3n de SError asincr\u00f3nica Para evitar el p\u00e1nico del kernel, es necesario rechazar una nueva transferencia de PIO cuando el anterior a\u00fan no ha terminado. Si la transferencia PIO anterior a\u00fan no ha finalizado, el kernel puede emitir una nueva solicitud PIO solo si se agot\u00f3 el tiempo de espera de la transferencia PIO anterior. En el pasado, la causa root de este problema se identific\u00f3 incorrectamente (como sucede a menudo durante el reentrenamiento del enlace o despu\u00e9s de un evento de ca\u00edda del enlace) y se implement\u00f3 un truco especial en Trusted Firmware para detectar todos los eventos de SError en EL3, para ignorar los errores con el c\u00f3digo 0xbf000002 y no reenviar cualquier otro error al kernel y en su lugar generar p\u00e1nico desde el controlador de firmware confiable EL3. Enlaces a discusiones y parches sobre este problema: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=3c7dcdac5c50 https://lore.kernel.org/linux-pci /20190316161243.29517-1-repk@triplefau.lt/ https://lore.kernel.org/linux-pci/971be151d24312cc533989a64bd454b4@www.loen.fr/ https://review.trustedfirmware.org/c/TF-A/trusted -firmware-a/+/1541 Pero la causa real fue el hecho de que durante el reentrenamiento del enlace o despu\u00e9s de un evento de ca\u00edda del enlace, la transferencia de PIO puede tardar m\u00e1s tiempo, hasta 1,44 segundos hasta que se agote el tiempo de espera. Esto aumenta la probabilidad de que el kernel emita una nueva transferencia PIO mientras que la anterior a\u00fan no ha finalizado. Despu\u00e9s de aplicar este cambio en el kernel, es posible revertir el hack de TF-A mencionado y los eventos SError no tienen que detectarse en TF-A EL3." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.14.240", + "matchCriteriaId": "A5B4B002-143F-442C-86E6-8A8B83FEA66E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.198", + "matchCriteriaId": "B93AEDB9-C52B-4222-8F9A-882DAD9EF5B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.128", + "matchCriteriaId": "6267BD4E-BE25-48B5-B850-4B493440DAFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "59455D13-A902-42E1-97F7-5ED579777193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1a1dbc4473974867fe8c5f195c17b341c8e82867", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3d213a4ddf49a860be6e795482c17f87e0c82b2a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/400e6b1860c8be61388d0b77814c53260f96e17a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4c90f90a91d75c3c73dd633827c90e8746d9f54d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b00a9aaa4be20ad6e3311fb78a485eae0899e89a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f18139966d072dab8e4398c95ce955a9742e04f7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1a1dbc4473974867fe8c5f195c17b341c8e82867", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3d213a4ddf49a860be6e795482c17f87e0c82b2a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/400e6b1860c8be61388d0b77814c53260f96e17a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4c90f90a91d75c3c73dd633827c90e8746d9f54d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b00a9aaa4be20ad6e3311fb78a485eae0899e89a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f18139966d072dab8e4398c95ce955a9742e04f7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47234.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47234.json index f1b4c04b350..c5e0921f37f 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47234.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47234.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47234", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:12.710", - "lastModified": "2024-11-21T06:35:41.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:42:29.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,134 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: phy: phy-mtk-tphy: solucione algunas fugas de recursos en mtk_phy_init() Utilice clk_disable_unprepare() en la ruta de error de mtk_phy_init() para solucionar algunas fugas de recursos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "A25A5D99-FC5D-49E5-81AF-33B157EA9B2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6472955af5e88b5489b6d78316082ad56ea3e489", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9a17907946232d01aa2ec109da5f93b8d31dd425", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aaac9a1bd370338ce372669eb9a6059d16b929aa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6472955af5e88b5489b6d78316082ad56ea3e489", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9a17907946232d01aa2ec109da5f93b8d31dd425", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aaac9a1bd370338ce372669eb9a6059d16b929aa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47236.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47236.json index 4f0caf0f820..2d454dd604a 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47236.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47236.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47236", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:12.857", - "lastModified": "2024-11-21T06:35:41.480", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:44:19.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,245 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: cdc_eem: corrige la fuga de skb de reparaci\u00f3n de tx cuando usbnet transmite un skb, eem lo repara en eem_tx_fixup(), si skb_copy_expand() falla, devuelve NULL, usbnet_start_xmit() No tendr\u00e1 posibilidad de liberar el skb original. solucionelo primero con skb original gratuito en eem_tx_fixup(), luego verifique el estado del clon de skb, si falla, devuelva NULL a usbnet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.30", + "versionEndExcluding": "4.4.274", + "matchCriteriaId": "917424B6-D03C-4372-9E06-61D6C13CE591" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.274", + "matchCriteriaId": "0A84D5BC-006F-41C5-A54D-6D45236009B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.238", + "matchCriteriaId": "C3C0DBBF-0923-4D2A-9178-134691F9933F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.196", + "matchCriteriaId": "F3CAB837-7D38-4934-AD4F-195CEFD754E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.128", + "matchCriteriaId": "6267BD4E-BE25-48B5-B850-4B493440DAFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "59455D13-A902-42E1-97F7-5ED579777193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/05b2b9f7d24b5663d9b47427fe1555bdafd3ea02", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/14184ec5c958b589ba934da7363a2877879204df", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1bcacd6088d61c0ac6a990d87975600a81f3247e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/81de2ed06df8b5451e050fe6a318af3263dbff3f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f12554b0ff639e74612cc01b3b4a049e098d2d65", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f4e6a7f19c82f39b1803e91c54718f0d7143767d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/05b2b9f7d24b5663d9b47427fe1555bdafd3ea02", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/14184ec5c958b589ba934da7363a2877879204df", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1bcacd6088d61c0ac6a990d87975600a81f3247e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/81de2ed06df8b5451e050fe6a318af3263dbff3f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f12554b0ff639e74612cc01b3b4a049e098d2d65", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f4e6a7f19c82f39b1803e91c54718f0d7143767d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47246.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47246.json index ffc72d98c22..17b81882018 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47246.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47246.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47246", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:13.623", - "lastModified": "2024-11-21T06:35:42.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:45:28.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,161 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/mlx5e: Reparar la recuperaci\u00f3n de p\u00e1gina para la horquilla del par inactiva. Al agregar un flujo de horquilla, se crea una cola de env\u00edo del lado del firmware para el dispositivo de red del par, que reclama algunas p\u00e1ginas de memoria del host para su buffer de anillo interno. Si el dispositivo peer net se elimina/desvincula antes de eliminar el flujo de horquilla, entonces la cola de env\u00edo no se destruye, lo que genera un seguimiento de la pila en la eliminaci\u00f3n del dispositivo pci: [ 748.005230] mlx5_core 0000:08:00.2: wait_func:1094:(pid 12985): Tiempo de espera de MANAGE_PAGES(0x108). Provocar\u00e1 una fuga de un recurso de comando [748.005231] mlx5_core 0000:08:00.2: reclaim_pages:514:(pid 12985): error al recuperar p\u00e1ginas: err -110 [748.001835] mlx5_core 0000:08:00.2: mlx5_reclaim_root_pages:653:(pid 12985): error al recuperar p\u00e1ginas (-110) para el ID de funci\u00f3n 0x0 [748.002171] ------------[ cortar aqu\u00ed ]------------ [ 748.001177] p\u00e1ginas FW el contador es 4 despu\u00e9s de reclamar todas las p\u00e1ginas [748.001186] ADVERTENCIA: CPU: 1 PID: 12985 en drivers/net/ethernet/mellanox/mlx5/core/pagealloc.c:685 mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core] [+0.002771] M\u00f3dulos vinculados en: cls_flower mlx5_ib mlx5_core ptp pps_core act_mirred sch_ingress openvswitch nsh xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 br_netfilter rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_umad ib_ipoib iw_cm ib_cm ib_uverbs ib_core overlay fuse [\u00faltima descarga: pps_core] [ 748.007225] CPU: 1 PID: 12985 Comm: tee Not tainted 5.12.0+ #1 [ 748.001376] Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 01/04/2014 [748.002315] RIP: 0010:mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core] [748.001679] C\u00f3digo: 28 00 00 00 0f 85 22 01 00 00 48 81 c4 b0 00 00 00 31 c0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 48 c7 c7 40 cc 19 a1 e8 9f 71 0e e2 <0f> 0b e9 30 ff ff ff 48 c7 c7 a0 cc 19 a1 e8 8c 71 0e e2 0f 0b e9 [ 748.003781] RSP: 0018:ffff88815220faf8 GS: 00010286 [748.001149] RAX: 0000000000000000 RBX: ffff8881b4900280 RCX: 0000000000000000 [ 748.001445] RDX: 0000000000000027 RSI: 0000000000000004 RDI: a441f51 [ 748.001614] RBP: 00000000000032b9 R08: 0000000000000001 R09: ffffed1054a15ee8 [ 748.001446] R10: ffff8882a50af73b R11: ee7 R12: ffffbfff07c1e30 [ 748.001447] R13: dffffc0000000000 R14: ffff8881b492cba8 R15: 0000000000000000 [ 748.001429] FS: 00007f58bd08b580(0000) GS:ffff8882a5080000(0000) 000000000000 [ 748.001695] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 748.001309] CR2: 000055a026351740 CR3: 00000001d3b48006 CR4 : 0000000000370ea0 [ 748.001506] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 748.001483] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [748.001654] Seguimiento de llamadas: [748.000576]? mlx5_satisfy_startup_pages+0x290/0x290 [mlx5_core] [748.001416]? mlx5_cmd_teardown_hca+0xa2/0xd0 [mlx5_core] [748.001354]? mlx5_cmd_init_hca+0x280/0x280 [mlx5_core] [ 748.001203] mlx5_function_teardown+0x30/0x60 [mlx5_core] [ 748.001275] mlx5_uninit_one+0xa7/0xc0 [mlx5_core] [ 748.001200] uno+0x5f/0xc0 [mlx5_core] [ 748.001075] pci_device_remove+0x9f/0x1d0 [ 748.000833] device_release_driver_internal+0x1e0/0x490 [ 748.001207] unbind_store+0x19f/0x200 [ 748.000942] ? sysfs_file_ops+0x170/0x170 [ 748.001000] kernfs_fop_write_iter+0x2bc/0x450 [ 748.000970] new_sync_write+0x373/0x610 [ 748.001124] ? new_sync_read+0x600/0x600 [748.001057]? lock_acquire+0x4d6/0x700 [748.000908]? lockdep_hardirqs_on_prepare+0x400/0x400 [748.001126]? fd_install+0x1c9/0x4d0 [ 748.000951] vfs_write+0x4d0/0x800 [ 748.000804] ksys_write+0xf9/0x1d0 [ 748.000868] ? __x64_sys_read+0xb0/0xb0 [748.000811]? filp_open+0x50/0x50 [748.000919]? syscall_enter_from_user_mode+0x1d/0x50 [ 748.001223] do_syscall_64+0x3f/0x80 [ 748.000892] Entry_SYSCALL_64_after_hwframe+0x44/0xae [ 748.00 ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19", + "versionEndExcluding": "5.4.128", + "matchCriteriaId": "84108161-A7EE-4126-A306-8F64E51801C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "59455D13-A902-42E1-97F7-5ED579777193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4b16118665e94c90a3e84a5190486fd0e4eedd74", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a3e5fd9314dfc4314a9567cde96e1aef83a7458a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b374c1304f6d3d4752ad1412427b7bf02bb1fd61", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/be7f3f401d224e1efe8112b2fa8b837eeb8c5e52", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4b16118665e94c90a3e84a5190486fd0e4eedd74", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a3e5fd9314dfc4314a9567cde96e1aef83a7458a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b374c1304f6d3d4752ad1412427b7bf02bb1fd61", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/be7f3f401d224e1efe8112b2fa8b837eeb8c5e52", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-27xx/CVE-2022-2794.json b/CVE-2022/CVE-2022-27xx/CVE-2022-2794.json index c81c7ab66d4..44c9e8fba51 100644 --- a/CVE-2022/CVE-2022-27xx/CVE-2022-2794.json +++ b/CVE-2022/CVE-2022-27xx/CVE-2022-2794.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2794", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2022-12-12T13:15:12.210", - "lastModified": "2024-11-21T07:01:42.430", + "lastModified": "2025-04-29T19:15:50.733", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-383xx/CVE-2022-38395.json b/CVE-2022/CVE-2022-383xx/CVE-2022-38395.json index 48bb9ef41fb..74cea6578e6 100644 --- a/CVE-2022/CVE-2022-383xx/CVE-2022-38395.json +++ b/CVE-2022/CVE-2022-383xx/CVE-2022-38395.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38395", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2022-12-12T13:15:14.420", - "lastModified": "2024-11-21T07:16:23.547", + "lastModified": "2025-04-29T19:15:51.787", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4055.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4055.json index 123675b0619..2014a84a97c 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4055.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4055.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4055", "sourceIdentifier": "secalert@redhat.com", "published": "2022-11-19T00:15:31.003", - "lastModified": "2024-11-21T07:34:31.363", + "lastModified": "2025-04-29T19:15:53.337", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44379.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44379.json index 414febb699f..4404a293dea 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44379.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44379.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44379", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T18:15:10.620", - "lastModified": "2024-11-21T07:27:56.793", + "lastModified": "2025-04-29T19:15:52.057", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-444xx/CVE-2022-44413.json b/CVE-2022/CVE-2022-444xx/CVE-2022-44413.json index f4aed3748de..b2507ff92b1 100644 --- a/CVE-2022/CVE-2022-444xx/CVE-2022-44413.json +++ b/CVE-2022/CVE-2022-444xx/CVE-2022-44413.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44413", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T19:15:32.533", - "lastModified": "2024-11-21T07:27:58.767", + "lastModified": "2025-04-29T19:15:52.243", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-444xx/CVE-2022-44414.json b/CVE-2022/CVE-2022-444xx/CVE-2022-44414.json index 8aa70601902..ec8b99bc505 100644 --- a/CVE-2022/CVE-2022-444xx/CVE-2022-44414.json +++ b/CVE-2022/CVE-2022-444xx/CVE-2022-44414.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44414", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T19:15:32.740", - "lastModified": "2024-11-21T07:27:58.900", + "lastModified": "2025-04-29T19:15:52.423", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-444xx/CVE-2022-44415.json b/CVE-2022/CVE-2022-444xx/CVE-2022-44415.json index d3db2a1be19..71e774d9ae6 100644 --- a/CVE-2022/CVE-2022-444xx/CVE-2022-44415.json +++ b/CVE-2022/CVE-2022-444xx/CVE-2022-44415.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44415", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T19:15:32.937", - "lastModified": "2024-11-21T07:27:59.040", + "lastModified": "2025-04-29T19:15:52.597", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44641.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44641.json index 53fd513020c..7b8d427eb6c 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44641.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44641.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44641", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T21:15:11.787", - "lastModified": "2024-11-21T07:28:15.090", + "lastModified": "2025-04-29T19:15:52.773", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-776" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-776" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-448xx/CVE-2022-44820.json b/CVE-2022/CVE-2022-448xx/CVE-2022-44820.json index 12cb21cee3d..89ed627c64a 100644 --- a/CVE-2022/CVE-2022-448xx/CVE-2022-44820.json +++ b/CVE-2022/CVE-2022-448xx/CVE-2022-44820.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44820", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T19:15:33.130", - "lastModified": "2024-11-21T07:28:29.283", + "lastModified": "2025-04-29T19:15:52.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45474.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45474.json index a2e47f1e95e..8ab6408dfb0 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45474.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45474.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45474", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T18:15:10.767", - "lastModified": "2024-11-21T07:29:18.897", + "lastModified": "2025-04-29T19:15:53.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-115xx/CVE-2024-11503.json b/CVE-2024/CVE-2024-115xx/CVE-2024-11503.json index ae9c8c64af7..8257cc7ff2f 100644 --- a/CVE-2024/CVE-2024-115xx/CVE-2024-11503.json +++ b/CVE-2024/CVE-2024-115xx/CVE-2024-11503.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11503", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:38.720", - "lastModified": "2025-03-27T16:45:46.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T18:11:43.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shapedplugin:wp_tabs:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.7", + "matchCriteriaId": "48030BD7-6097-4D58-92B9-0780CBDDD3BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/25592b6c-b9ab-4d9e-b314-091594ce9189/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11924.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11924.json index e76bfc640aa..b152d9f55db 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11924.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11924.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11924", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-17T06:15:42.460", - "lastModified": "2025-04-17T20:21:48.243", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:10:33.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:icegram:icegram_express:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.7.52", + "matchCriteriaId": "4B4184FB-9873-463D-B242-A29482BB1842" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/70288369-132d-4211-bca0-0411736df747/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13925.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13925.json index a596277734a..6cc8d4aa544 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13925.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13925.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13925", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-17T06:15:43.590", - "lastModified": "2025-04-18T14:15:20.327", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:09:09.200", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:klarna:klarna_checkout_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.13.5", + "matchCriteriaId": "45185EB1-9A55-4BD2-BB2C-FFF6B4E15EAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/6aebb52f-d74a-4043-86c4-c24579f24ef4/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28022.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28022.json index d97b278266b..2c84bfeed18 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28022.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28022.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28022", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-06-11T19:16:06.017", - "lastModified": "2024-11-21T09:05:39.653", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T19:40:10.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3081.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3081.json index 16a3d630cd9..c44a2b700ab 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3081.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3081.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3081", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-29T15:15:14.657", - "lastModified": "2024-11-21T09:28:51.347", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T19:44:58.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,54 +96,116 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:easycorp:easyadmin:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.8.9", + "matchCriteriaId": "EE0AE5AE-72BF-4C77-A3AA-F13E0AC47D2F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/EasyCorp/EasyAdminBundle/commit/127436e4c3f56276d548070f99e61b7234200a11", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/EasyCorp/EasyAdminBundle/pull/5971", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/EasyCorp/EasyAdminBundle/pull/6067", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/EasyCorp/EasyAdminBundle/releases/tag/v4.8.10", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.258613", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258613", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/EasyCorp/EasyAdminBundle/commit/127436e4c3f56276d548070f99e61b7234200a11", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/EasyCorp/EasyAdminBundle/pull/5971", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/EasyCorp/EasyAdminBundle/pull/6067", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/EasyCorp/EasyAdminBundle/releases/tag/v4.8.10", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.258613", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258613", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4877.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4877.json index 52e44ff64db..36d3151d23c 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4877.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4877.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4877", "sourceIdentifier": "security@openvpn.net", "published": "2025-04-03T16:15:32.840", - "lastModified": "2025-04-07T14:18:34.453", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T19:45:07.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,64 @@ "value": "CWE-268" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*", + "versionStartIncluding": "2.4.0", + "versionEndExcluding": "2.6.11", + "matchCriteriaId": "C87B630D-FF25-4172-AE95-D5D93DF2286A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-4877", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Release Notes", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-552xx/CVE-2024-55279.json b/CVE-2024/CVE-2024-552xx/CVE-2024-55279.json index 3393d1d5797..916afd51cf0 100644 --- a/CVE-2024/CVE-2024-552xx/CVE-2024-55279.json +++ b/CVE-2024/CVE-2024-552xx/CVE-2024-55279.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55279", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-24T15:15:15.913", - "lastModified": "2025-04-01T18:15:29.407", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:12:55.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:uguu:uguu:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.8.9", + "matchCriteriaId": "4F7BA162-6B25-4A30-BC6D-FC50B3223375" + } + ] + } + ] + } + ], "references": [ { "url": "https://codeberg.org/zypressen/CVE-2024-55279", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/nokonoko/Uguu/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9053.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9053.json index ec82a7ef27e..ad4ad084384 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9053.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9053.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9053", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:46.327", - "lastModified": "2025-03-20T10:15:46.327", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:14:13.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -49,12 +71,43 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vllm-project:vllm:0.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C21B072B-4EBD-4D1A-B27A-62ED9D7D9170" + } + ] + } + ] } ], "references": [ { "url": "https://huntr.com/bounties/75a544f3-34a3-4da0-b5a3-1495cb031e09", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0716.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0716.json index 3447f5c4dfd..761e4c12055 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0716.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0716.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0716", "sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c", "published": "2025-04-29T17:15:39.790", - "lastModified": "2025-04-29T17:15:39.790", + "lastModified": "2025-04-29T19:15:53.537", "vulnStatus": "Received", "cveTags": [ { @@ -62,6 +62,14 @@ { "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-0716", "source": "36c7be3b-2937-45df-85ea-ca7133ea542c" + }, + { + "url": "https://codepen.io/herodevs/pen/qEWQmpd/a86a0d29310e12c7a3756768e6c7b915", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-0716", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1523.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1523.json index 9d7e96b1974..c3f03dafb3d 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1523.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1523.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1523", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-17T06:15:43.697", - "lastModified": "2025-04-17T20:21:48.243", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:06:48.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:davidvongries:ultimate_dashboard:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.8.6", + "matchCriteriaId": "4E4AA857-6F04-4A2A-ADE9-3D646A622C8C" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/5a20768f-3128-4b0a-a06b-2247f3e02c99/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1976.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1976.json index d5c7d26d3b2..d53282c0936 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1976.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1976.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1976", "sourceIdentifier": "sirt@brocade.com", "published": "2025-04-24T03:15:14.820", - "lastModified": "2025-04-29T13:52:47.470", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:49:59.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } ] }, "cisaExploitAdd": "2025-04-28", @@ -75,12 +97,44 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndExcluding": "9.1.1d7", + "matchCriteriaId": "3ABCC4B4-A839-4988-B850-1788C4EF97D5" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25602", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22031.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22031.json index cc368abb354..6fefc1afd62 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22031.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22031.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22031", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:15:55.710", - "lastModified": "2025-04-17T20:22:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:57:00.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI/bwctrl: Correcci\u00f3n de la desreferencia de puntero nulo al agotar el n\u00famero de bus. Cuando la BIOS no asigna n\u00fameros de bus a los puentes PCI, el kernel intenta corregirlo durante la enumeraci\u00f3n de dispositivos PCI. Si se agotan los n\u00fameros de bus, no se asigna ning\u00fan pci_bus y el puntero \"subordinado\" en el pci_dev del puente permanece nulo. El controlador de ancho de banda PCIe no busca err\u00f3neamente un puntero subordinado nulo y lo desreferencia al sondear. El control del ancho de banda de los dispositivos inutilizables debajo del puente es de dudosa utilidad, por lo que simplemente se genera un error. Esto refleja lo que hace PCIe hotplug desde el commit 62e4492c3063 (\"PCI: Evitar la desreferencia de puntero nulo durante el sondeo pciehp\"). El n\u00facleo PCI emite un mensaje con severidad KERN_INFO si se agotan los n\u00fameros de bus. PCIe hotplug emite un mensaje adicional con severidad KERN_ERR para informar al usuario que la funci\u00f3n hotplug est\u00e1 deshabilitada en el puente. Un mensaje similar para el control del ancho de banda no parece justificado, dado que su \u00fanico prop\u00f3sito hasta ahora es mostrar una velocidad de enlace actualizada en sysfs y limitarla en ciertas computadoras port\u00e1tiles con potencia de dise\u00f1o t\u00e9rmico limitada. Por lo tanto, el error se emite silenciosamente. Mensajes visibles para el usuario: pci 0000:16:02.0: configuraci\u00f3n de puente no v\u00e1lida ([bus 00-00]), reconfigurando [...] pci_bus 0000:45: busn_res: el extremo [bus 45-74] se actualiza a 74 pci 0000:16:02.0: los dispositivos detr\u00e1s del puente no se pueden usar porque no se puede asignar [bus 45-74] para ellos [...] pcieport 0000:16:02.0: pciehp: Puente hot-plug sin bus secundario, ignorando [...] ERROR: desreferencia de puntero NULL del kernel RIP: pcie_update_link_speed pcie_bwnotif_enable pcie_bwnotif_probe pcie_port_probe_service really_probe" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1181924af78e5299ddec6e457789c02dd5966559", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/667f053b05f00a007738cd7ed6fa1901de19dc7e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d93d309013e89631630a12b1770d27e4be78362a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22032.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22032.json index 6f475b7d2d3..15274e69fbf 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22032.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22032.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22032", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:15:55.823", - "lastModified": "2025-04-17T20:22:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:57:24.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mt76: mt7921: correcci\u00f3n de p\u00e1nico del kernel debido a la desreferencia de puntero nulo. Se solucion\u00f3 un p\u00e1nico del kernel causado por una desreferencia de puntero nulo en la funci\u00f3n `mt792x_rx_get_wcid`. El problema surge porque la estructura `deflink` no se inicializa correctamente con el contexto `sta`. Este parche garantiza que la estructura `deflink` est\u00e9 correctamente vinculada al contexto `sta`, lo que evita la desreferencia de puntero nulo. ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 0000000000000400 #PF: acceso de lectura del supervisor en modo kernel #PF: error_code(0x0000) - p\u00e1gina no presente PGD 0 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 0 UID: 0 PID: 470 Comm: mt76-usb-rx phy No contaminado 6.12.13-gentoo-dist #1 Nombre del hardware: /AMD HUDSON-M1, BIOS 4.6.4 15/11/2011 RIP: 0010:mt792x_rx_get_wcid+0x48/0x140 [mt792x_lib] RSP: 0018:ffffa147c055fd98 EFLAGS: 00010202 RAX: 0000000000000000 RBX: ffff8e9ecb652000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8e9ecb652000 RBP: 0000000000000685 R08: ffff8e9ec6570000 R09: 000000000000000 R10: ffff8e9ecd2ca000 R11: ffff8e9f22a217c0 R12: 0000000038010119 R13: 0000000080843801 R14: ffff8e9ec6570000 R15: ffff8e9ecb652000 FS: 0000000000000000(0000) GS:ffff8e9f22a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000400 CR3: 000000000d2ea000 CR4: 00000000000006f0 Seguimiento de llamadas: ? __die_body.cold+0x19/0x27 ? page_fault_oops+0x15a/0x2f0 ? search_module_extables+0x19/0x60 ? search_bpf_extables+0x5f/0x80 ? exc_page_fault+0x7e/0x180 ? asm_exc_page_fault+0x26/0x30 ? mt792x_rx_get_wcid+0x48/0x140 [mt792x_lib] mt7921_queue_rx_skb+0x1c6/0xaa0 [mt7921_common] mt76u_alloc_queues+0x784/0x810 [mt76_usb] ? __pfx___mt76_worker_fn+0x10/0x10 [mt76] __mt76_worker_fn+0x4f/0x80 [mt76] kthread+0xd2/0x100 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x34/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 ---[ fin de seguimiento 0000000000000000 ]---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12.13", + "versionEndExcluding": "6.12.23", + "matchCriteriaId": "84FFB34D-0456-4FA6-8C99-7208954FD3C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13.2", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "65ADC862-CEB2-4959-A2D4-7DAACFE00C8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0cfea60966e4b1239d20bebf02258295e189e82a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a57f8eb2a17d469d65cd1186cea26b798221d4a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/adc3fd2a2277b7cc0b61692463771bf9bd298036", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/effec50381991bc067acf4b3351a57831c74d27f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22033.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22033.json index 24eb3822717..b3e2b5e530f 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22033.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22033.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22033", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:15:55.923", - "lastModified": "2025-04-17T20:22:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:57:42.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: No llamar a NULL en do_compat_alignment_fixup(). do_alignment_t32_to_handler() solo corrige errores de alineaci\u00f3n para instrucciones espec\u00edficas; devuelve NULL en caso contrario (por ejemplo, LDREX). En ese caso, se indica al emisor que debe continuar con la gesti\u00f3n normal de errores de alineaci\u00f3n (por ejemplo, SIGBUS). Sin este parche, el kernel entra en p\u00e1nico: No se puede gestionar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000000 Informaci\u00f3n de aborto de memoria: ESR = 0x0000000086000006 EC = 0x21: IABT (EL actual), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: error de traducci\u00f3n de nivel 2 usuario pgtable: 4k p\u00e1ginas, VAs de 48 bits, pgdp=00000800164aa000 [000000000000000] pgd=0800081fdbd22003, p4d=0800081fdbd22003, pud=08000815d51c6003, pmd=0000000000000000 Error interno: Ups: 0000000086000006 [#1] M\u00f3dulos SMP vinculados en: cfg80211 rfkill xt_nat xt_tcpudp xt_conntrack nft_chain_nat xt_MASQUERADE nf_nat nf_conntrack_netlink nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xfrm_user xfrm_algo xt_addrtype nft_compat br_netfilter veth nvme_fa> libcrc32c crc32c_generic raid0 multipath lineal dm_mod dax raid1 md_mod xhci_pci nvme xhci_hcd nvme_core t10_pi usbcore igb crc64_rocksoft crc64 crc_t10dif crct10dif_generic crct10dif_ce crct10dif_common usb_common i2c_algo_bit i2c> CPU: 2 PID: 3932954 Comm: WPEWebProcess No contaminado 6.1.0-31-arm64 #1 Debian 6.1.128-1 Nombre del hardware: GIGABYTE MP32-AR1-00/MP32-AR1-00, BIOS F18v (SCP: 1.08.20211002) 12/01/2021 pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : 0x0 lr: corregir la alineaci\u00f3n de compatibilidad+0xd8/0x3dc sp: ffff80000f973dd0 x29: ffff80000f973dd0 x28: ffff081b42526180 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000000000004 x22: 0000000000000000 x21: 0000000000000001 x20: 00000000e8551f00 x19: ffff80000f973eb0 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000000 x10: 000000000000000 x9: ffffaebc949bc488 x8: 000000000000000 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 00000000000400000 x4 : 0000ffffffffffffe x3 : 0000000000000000 x2 : ffff80000f973eb0 x1 : 00000000e8551f00 x0 : 0000000000000001 Rastreo de llamadas: 0x0 do_alignment_fault+0x40/0x50 do_mem_abort+0x4c/0xa0 el0_da+0x48/0xf0 el0t_32_sync_handler+0x110/0x140 el0t_32_sync+0x190/0x194 C\u00f3digo: valor de PC incorrecto ---[ fin de seguimiento 0000000000000000 ]---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "6.1.134", + "matchCriteriaId": "10FAA32F-8D33-4A36-8482-01961DD84A84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.87", + "matchCriteriaId": "EFF24260-49B1-4251-9477-C564CFDAD25B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.23", + "matchCriteriaId": "26CAB76D-F00F-43CE-BEAD-7097F8FB1D6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2df8ee605eb6806cd41c2095306db05206633a08", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/617a4b0084a547917669fef2b54253cc9c064990", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c28f31deeacda307acfee2f18c0ad904e5123aac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cf187601053ecaf671ae645edb898901f81d03e9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ecf798573bbe0805803f7764e12a34b4bcc65074", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa2a9f625f185c6acb4ee5be8d71359a567afac9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22036.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22036.json index 816b8d5080d..5652d5d0a81 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22036.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22036.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22036", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:15:56.217", - "lastModified": "2025-04-17T20:22:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:58:37.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,107 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: exfat: corrige la corrupci\u00f3n de pila aleatoria despu\u00e9s de get_block Cuando se llama a get_block con un buffer_head asignado en la pila, como do_mpage_readpage, puede ocurrir una corrupci\u00f3n de pila debido a buffer_head UAF en la siguiente situaci\u00f3n de condici\u00f3n de ejecuci\u00f3n. mpage_read_folio <> do_mpage_readpage exfat_get_block bh_read __bh_read get_bh(bh) submit_bh wait_on_buffer ... end_buffer_read_sync __end_buffer_read_notouch unlock_buffer <> ... ... ... ... <> . . another_function <> put_bh(bh) atomic_dec(bh->b_count) * Corrupci\u00f3n de pila aqu\u00ed * Este parche devuelve -EAGAIN si un folio no tiene b\u00faferes cuando se necesita llamar a bh_read. De esta manera, quien lo llama puede recurrir a funciones como block_read_full_folio(), crear un buffer_head en el folio y luego volver a llamar a get_block. No llamemos a bh_read() con buffer_head en la pila." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.12.23", + "matchCriteriaId": "70C1AA27-E71C-467A-AB28-979034C2B6CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1bb7ff4204b6d4927e982cd256286c09ed4fd8ca", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/49b0a6ab8e528a0c1c50e37cef9b9c7c121365f2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f7447286363dc1e410bf30b87d75168f3519f9cc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f807a6bf2005740fa26b4f59c4a003dc966b9afd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22037.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22037.json index d0cf0002f59..fc32c45f4e6 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22037.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22037.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22037", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:15:56.310", - "lastModified": "2025-04-17T20:22:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T19:03:20.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: se corrige la desreferencia de puntero nulo en alloc_preauth_hash(). El cliente env\u00eda una solicitud de negociaci\u00f3n de SMB2 mal formada. ksmbd devuelve una respuesta de error. Posteriormente, el cliente puede enviar la configuraci\u00f3n de sesi\u00f3n de SMB2 incluso si conn->preauth_info no est\u00e1 asignado. Este parche a\u00f1ade el estado de conexi\u00f3n KSMBD_SESS_NEED_SETUP para ignorar la solicitud de configuraci\u00f3n de sesi\u00f3n si la fase de negociaci\u00f3n de SMB2 no se completa." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.12.23", + "matchCriteriaId": "17B5E5A5-D687-44D7-9EFF-19633C9746A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8f216b33a5e1b3489c073b1ea1b3d7cb63c8dc4d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b8eb243e670ecf30e91524dd12f7260dac07d335", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c8b5b7c5da7d0c31c9b7190b4a7bba5281fc4780", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ca8bed31edf728a662ef9d6f39f50e7a7dc2b5ad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22038.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22038.json index 2a52d99df1e..84b80a1f86f 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22038.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22038.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22038", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:15:56.400", - "lastModified": "2025-04-17T20:22:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T19:04:21.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,130 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: validar num_subauth a cero antes de acceder a sub_auth. Acceder a psid->sub_auth[psid->num_subauth - 1] sin comprobar si num_subauth es distinto de cero provoca una lectura fuera de los l\u00edmites. Este parche a\u00f1ade un paso de validaci\u00f3n para garantizar que num_subauth sea != 0 antes de acceder a sub_auth." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.134", + "matchCriteriaId": "2EFC4C26-A1CE-49FA-98FE-0CF323672E9B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.87", + "matchCriteriaId": "EFF24260-49B1-4251-9477-C564CFDAD25B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.23", + "matchCriteriaId": "26CAB76D-F00F-43CE-BEAD-7097F8FB1D6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0e36a3e080d6d8bd7a34e089345d043da4ac8283", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3ac65de111c686c95316ade660f8ba7aea3cd3cc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/56de7778a48560278c334077ace7b9ac4bfb2fd1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/68c6c3142bfcdb049839d40a9a59ebe8ea865002", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bf21e29d78cd2c2371023953d9c82dfef82ebb36", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c8bfe1954a0b89e7b29b3a3e7f4c5e0ebd295e20", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22051.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22051.json index 89a3de726bb..bb8f7813cec 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22051.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22051.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22051", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:15:58.547", - "lastModified": "2025-04-17T20:22:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T19:03:46.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: staging: gpib: Se corrige el error \"Oops\" tras la desconexi\u00f3n en USB de Agilent. Si se desconecta la llave USB de Agilent, las llamadas posteriores al controlador provocan una desreferencia \"Oops\" nula, ya que bus_interface se establece en nulo al desconectarse. Este problema se origin\u00f3 al configurar \"usb_dev\" desde bus_interface para los mensajes \"dev_xxx\". Anteriormente, bus_interface solo se verificaba para detectar valores nulos en las funciones que invocaban directamente usb_fill_bulk_urb o usb_control_msg. Compruebe que bus_interface sea v\u00e1lido en todos los puntos de entrada de la interfaz y devuelva -ENODEV si es nulo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/50ef6e45bec79da4c5a01fad4dc23466ba255099", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8491e73a5223acb0a4b4d78c3f8b96aa9c5e774d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e88633705078f40391a9afc6cc8ea3025e6f692b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22052.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22052.json index 3cbbd7566e1..39bb54a1df7 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22052.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22052.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22052", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:15:58.650", - "lastModified": "2025-04-17T20:22:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:50:16.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: staging: gpib: Se corrige el error \"Oops\" tras la desconexi\u00f3n en ni_usb. Si la llave USB se desconecta, las llamadas posteriores al controlador provocan una desreferencia \"Oops\" a NULL, ya que bus_interface se establece en NULL al desconectarse. Este problema se introdujo al configurar \"usb_dev\" desde bus_interface para los mensajes \"dev_xxx\". Anteriormente, bus_interface solo se verificaba para NULL en las funciones que llamaban directamente a usb_fill_bulk_urb o usb_control_msg. Compruebe si bus_interface es v\u00e1lido en todos los puntos de entrada de la interfaz y devuelva -ENODEV si es NULL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5dc98ba6f7304c188b267ef481281849638447bf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a239c6e91b665f1837cf57b97fe638ef1baf2e78", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b2d8d7959077c5d4b11d0dc6bd2167791fd1c72e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22054.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22054.json index 47c82c81fd6..a5d314a4aa4 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22054.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22054.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22054", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:15:58.877", - "lastModified": "2025-04-17T20:22:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:50:38.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,180 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arcnet: Se ha a\u00f1adido una comprobaci\u00f3n de valores NULL en com20020pci_probe(). Devm_kasprintf() devuelve NULL cuando falla la asignaci\u00f3n de memoria. Actualmente, com20020pci_probe() no realiza la comprobaci\u00f3n en este caso, lo que provoca una desreferencia de puntero NULL. Se ha a\u00f1adido una comprobaci\u00f3n de valores NULL despu\u00e9s de devm_kasprintf() para evitar este problema y garantizar que no queden recursos asignados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.302", + "versionEndExcluding": "4.20", + "matchCriteriaId": "2AB35967-8241-4BF5-B781-B331B439E208" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.264", + "versionEndExcluding": "5.4.292", + "matchCriteriaId": "466839A4-3C33-47A2-B10A-2E6458F6402B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.204", + "versionEndExcluding": "5.10.236", + "matchCriteriaId": "6D92647B-3F46-4C6E-AF9A-2CF8EB5481CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.143", + "versionEndExcluding": "5.15.180", + "matchCriteriaId": "2B613361-61A7-44A1-A33A-16F2CAE3FC63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.68", + "versionEndExcluding": "6.1.134", + "matchCriteriaId": "A47C1E9A-84FB-4B9B-8BD3-A68A56324DC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.7", + "versionEndExcluding": "6.6.87", + "matchCriteriaId": "2C5C554F-6530-44F2-9591-63A8A54CAF02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.23", + "matchCriteriaId": "26CAB76D-F00F-43CE-BEAD-7097F8FB1D6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/661cf5d102949898c931e81fd4e1c773afcdeafa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/887226163504494ea7e58033a97c2d2ab12e05d4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/905a34dc1ad9a53a8aaaf8a759ea5dbaaa30418d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a654f31b33515d39bb56c75fd8b26bef025ced7e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/be8a0decd0b59a52a07276f9ef3b33ef820b2179", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ebebeb58d48e25525fa654f2c53a24713fe141c3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ececf8eff6c25acc239fa8f0fd837c76bc770547", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ef8b29398ea6061ac8257f3e45c9be45cc004ce2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fda8c491db2a90ff3e6fbbae58e495b4ddddeca3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22056.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22056.json index 3dfd18d7e2e..ba01050cb4e 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22056.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22056.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22056", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:15:59.087", - "lastModified": "2025-04-17T20:22:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:51:14.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nft_tunnel: correcci\u00f3n de la adici\u00f3n por confusi\u00f3n de tipos en geneve_opt. Al gestionar varios atributos NFTA_TUNNEL_KEY_OPTS_GENEVE, la l\u00f3gica de an\u00e1lisis deber\u00eda colocar cada estructura geneve_opt una a una de forma compacta. Por lo tanto, al determinar la siguiente posici\u00f3n de geneve_opt, la adici\u00f3n del puntero deber\u00eda realizarse en unidades de char *. Sin embargo, la implementaci\u00f3n actual realiza err\u00f3neamente la conversi\u00f3n de tipos antes de la adici\u00f3n, lo que provoca escrituras fuera de los l\u00edmites en el mont\u00edculo. [ 6.989857] ======================================================================= [ 6.990293] ERROR: KASAN: slab-out-of-bounds in nft_tunnel_obj_init+0x977/0xa70 [ 6.990725] Write of size 124 at addr ffff888005f18974 by task poc/178 [ 6.991162] [ 6.991259] CPU: 0 PID: 178 Comm: poc-oob-write Not tainted 6.1.132 #1 [ 6.991655] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014 [ 6.992281] Call Trace: [ 6.992423] [ 6.992586] dump_stack_lvl+0x44/0x5c [ 6.992801] print_report+0x184/0x4be [ 6.993790] kasan_report+0xc5/0x100 [ 6.994252] kasan_check_range+0xf3/0x1a0 [ 6.994486] memcpy+0x38/0x60 [ 6.994692] nft_tunnel_obj_init+0x977/0xa70 [ 6.995677] nft_obj_init+0x10c/0x1b0 [ 6.995891] nf_tables_newobj+0x585/0x950 [ 6.996922] nfnetlink_rcv_batch+0xdf9/0x1020 [ 6.998997] nfnetlink_rcv+0x1df/0x220 [ 6.999537] netlink_unicast+0x395/0x530 [ 7.000771] netlink_sendmsg+0x3d0/0x6d0 [ 7.001462] __sock_sendmsg+0x99/0xa0 [ 7.001707] ____sys_sendmsg+0x409/0x450 [ 7.002391] ___sys_sendmsg+0xfd/0x170 [ 7.003145] __sys_sendmsg+0xea/0x170 [ 7.004359] do_syscall_64+0x5e/0x90 [ 7.005817] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 7.006127] RIP: 0033:0x7ec756d4e407 [ 7.006339] Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 faf [ 7.007364] RSP: 002b:00007ffed5d46760 EFLAGS: 00000202 ORIG_RAX: 000000000000002e [ 7.007827] RAX: ffffffffffffffda RBX: 00007ec756cc4740 RCX: 00007ec756d4e407 [ 7.008223] RDX: 0000000000000000 RSI: 00007ffed5d467f0 RDI: 0000000000000003 [ 7.008620] RBP: 00007ffed5d468a0 R08: 0000000000000000 R09: 0000000000000000 [ 7.009039] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [ 7.009429] R13: 00007ffed5d478b0 R14: 00007ec756ee5000 R15: 00005cbd4e655cb8 Corrija este error con la correcta adici\u00f3n y conversi\u00f3n de punteros en el c\u00f3digo de an\u00e1lisis y volcado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.7", + "versionEndExcluding": "5.10.236", + "matchCriteriaId": "1F9686CC-6114-42BE-BA92-079AFF3783A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.180", + "matchCriteriaId": "D19801C8-3D18-405D-9989-E6C9B30255FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.134", + "matchCriteriaId": "3985DEC3-0437-4177-BC42-314AB575285A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.87", + "matchCriteriaId": "EFF24260-49B1-4251-9477-C564CFDAD25B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.23", + "matchCriteriaId": "26CAB76D-F00F-43CE-BEAD-7097F8FB1D6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0a93a710d6df334b828ea064c6d39fda34f901dc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1b755d8eb1ace3870789d48fbd94f386ad6e30be", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/28d88ee1e1cc8ac2d79aeb112717b97c5c833d43", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/31d49eb436f2da61280508d7adf8c9b473b967aa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/446d94898c560ed2f61e26ae445858a4c4830762", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/708e268acb3a446ad2a8a3d2e9bd41cc23660cd6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a263d31c8c92e5919d41af57d9479cfb66323782", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ca2adfc03cd6273f0b589fe65afc6f75e0fe116e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22063.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22063.json index f9db9c9fe68..392b469f3ae 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22063.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22063.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22063", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:15:59.777", - "lastModified": "2025-04-17T20:22:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:51:32.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,173 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netlabel: Se corrige la excepci\u00f3n de puntero nulo causada por CALIPSO en sockets IPv4. Al llamar a netlbl_conn_setattr(), se utiliza addr->sa_family para determinar el comportamiento de la funci\u00f3n. Si sk es un socket IPv4, pero se llama a la funci\u00f3n connect con una direcci\u00f3n IPv6, se activa la funci\u00f3n calipso_sock_setattr(). Dentro de esta funci\u00f3n, se ejecuta el siguiente c\u00f3digo: sk_fullsock(__sk) ? inet_sk(__sk)->pinet6 : NULL; Dado que sk es un socket IPv4, pinet6 es NULL, lo que provoca una desreferencia de puntero nulo. Este parche corrige el problema comprobando si inet6_sk(sk) devuelve un puntero nulo antes de acceder a pinet6." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.8", + "versionEndExcluding": "5.4.292", + "matchCriteriaId": "32BA1759-052A-44B8-BE23-8F8840600FA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.236", + "matchCriteriaId": "1DF46FB0-9163-4ABE-8CCA-32A497D4715B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.180", + "matchCriteriaId": "D19801C8-3D18-405D-9989-E6C9B30255FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.134", + "matchCriteriaId": "3985DEC3-0437-4177-BC42-314AB575285A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.87", + "matchCriteriaId": "EFF24260-49B1-4251-9477-C564CFDAD25B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.23", + "matchCriteriaId": "26CAB76D-F00F-43CE-BEAD-7097F8FB1D6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/078aabd567de3d63d37d7673f714e309d369e6e2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/172a8a996a337206970467e871dd995ac07640b1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1927d0bcd5b81e80971bf6b8eba267508bd1c78b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ad9166cab6a0f5c0b10344a97bdf749ae11dcbf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1e38f7a6cdd68377f8a4189b2fbaec14a6dd5152", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3ba9cf69de50e8abed32b448616c313baa4c5712", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/797e5371cf55463b4530bab3fef5f27f7c6657a8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9fe3839588db7519030377b7dee3f165e654f6c5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a7e89541d05b98c79a51c0f95df020f8e82b62ed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2279.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2279.json index 52f22791e56..0f2349a6c17 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2279.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2279.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2279", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-04T06:15:40.757", - "lastModified": "2025-04-07T14:18:15.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:42:04.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:robosoft:maps:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.6", + "matchCriteriaId": "4CDF96FD-A415-4D31-AC49-D0BE3EE15099" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/cd87d7ba-86e9-45b6-a3cd-11f6486f0bd0/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23134.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23134.json index 0ef17e826d4..5d7685d6c21 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23134.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23134.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23134", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:16:07.797", - "lastModified": "2025-04-17T20:22:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:51:59.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: temporizador: No se utiliza register_mutex con copy_from/to_user(). El infame bloqueo mmap utilizado en copy_from/to_user() puede ser problem\u00e1tico cuando se invoca dentro de otro mutex, ya que podr\u00eda provocar interbloqueos. En el caso del c\u00f3digo del temporizador ALSA, el patr\u00f3n incorrecto se encuentra en guard(mutex)(&register_mutex) que cubre copy_from/to_user(), que se introdujo por error al convertir a guard() y que ya se hab\u00eda solucionado cuidadosamente en el pasado. Este parche corrige estos problemas simplemente sacando copy_from/to_user() del bloqueo mutex de registro." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.12.23", + "matchCriteriaId": "10F3EB18-ACA3-4775-AC8D-C1CC227D2763" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/15291b561d8cc835a2eea76b394070cf8e072771", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/296f7a9e15aab276db11206cbc1e2ae1215d7862", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3424c8f53bc63c87712a7fc22dc13d0cc85fb0d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b074f47e55df93832bbbca1b524c501e6fea1c0d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23136.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23136.json index 4510003d758..7cdd923a05a 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23136.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23136.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23136", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:16:07.970", - "lastModified": "2025-04-17T20:22:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:53:02.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,173 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: t\u00e9rmica: int340x: A\u00f1adir comprobaci\u00f3n de valores nulos para adev. No todos los dispositivos tienen un nodo auxiliar ACPI, por lo que adev podr\u00eda ser nulo. Esto es similar a el commit cd2fd6eab480 (\"plataforma/x86: int3472: Comprobar si adev == NULL\"). A\u00f1adir una comprobaci\u00f3n para comprobar si adev no est\u00e1 configurado y devolver -ENODEV en ese caso para evitar una posible desreferencia de puntero nulo en int3402_thermal_probe(). Cabe destacar que, en el mismo directorio, int3400_thermal_probe() cuenta con dicha comprobaci\u00f3n. [rjw: Edici\u00f3n del tema, correcciones a\u00f1adidas]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.18", + "versionEndExcluding": "5.4.292", + "matchCriteriaId": "32214D12-FD5B-4EDF-B8E3-FC4C2B886603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.236", + "matchCriteriaId": "1DF46FB0-9163-4ABE-8CCA-32A497D4715B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.180", + "matchCriteriaId": "D19801C8-3D18-405D-9989-E6C9B30255FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.134", + "matchCriteriaId": "3985DEC3-0437-4177-BC42-314AB575285A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.87", + "matchCriteriaId": "EFF24260-49B1-4251-9477-C564CFDAD25B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.23", + "matchCriteriaId": "26CAB76D-F00F-43CE-BEAD-7097F8FB1D6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0c49f12c77b77a706fd41370c11910635e491845", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2542a3f70e563a9e70e7ded314286535a3321bdb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3155d5261b518776d1b807d9d922669991bbee56", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6a810c462f099353e908c70619638884cb82229c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8e8f1ddf4186731649df8bc9646017369eb19186", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/953d28a4f459fcbde2d08f51aeca19d6b0f179f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ac2eb7378319e3836cdf3a2c15a0bdf04c50e81d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bc7b5f782d28942dbdfda70df30ce132694a06de", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d0d21c8e44216fa9afdb3809edf213f3c0a8c060", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23137.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23137.json index 675b33f2018..9772457b994 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23137.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23137.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23137", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:16:08.080", - "lastModified": "2025-04-17T20:22:16.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:53:31.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cpufreq/amd-pstate: Agregar comprobaci\u00f3n ptr NULL faltante en amd_pstate_update Verifique si la pol\u00edtica es NULL antes de desreferenciarla en amd_pstate_update." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "87A5D8CD-10C9-4039-BAFF-5E077E407F87" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/426db24d4db2e4f0d6720aeb7795eafcb9e82640", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b99c1c63d88c75a4dc5487c3696cda38697b8d35", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3333.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3333.json index 969d0da3d65..c12016521da 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3333.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3333.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3333", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T03:15:22.307", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:39:40.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_restaurant_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F45638F7-8DDF-4E00-A3D9-C2DE0E726C17" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/47", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303547", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303547", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.551907", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3334.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3334.json index b53a079d0bb..c9e7b36974b 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3334.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3334.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3334", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T04:15:26.117", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:33:04.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_restaurant_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F45638F7-8DDF-4E00-A3D9-C2DE0E726C17" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/48", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303548", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303548", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.551908", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3338.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3338.json index 566c24c5c50..01a3540815f 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3338.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3338.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3338", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T06:15:40.547", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:29:51.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_restaurant_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F45638F7-8DDF-4E00-A3D9-C2DE0E726C17" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/52", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303552", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303552", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.551912", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3339.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3339.json index 3400e7b262f..b04adacf79b 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3339.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3339.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3339", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T06:15:40.823", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:29:05.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_restaurant_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F45638F7-8DDF-4E00-A3D9-C2DE0E726C17" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/53", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303553", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303553", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.551913", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3340.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3340.json index 162267f6493..cd88f4638f6 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3340.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3340.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3340", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T07:15:39.067", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:25:09.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_restaurant_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F45638F7-8DDF-4E00-A3D9-C2DE0E726C17" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/55", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303554", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303554", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.551914", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-37xx/CVE-2025-3729.json b/CVE-2025/CVE-2025-37xx/CVE-2025-3729.json index adafbf7849b..95e8ee7e547 100644 --- a/CVE-2025/CVE-2025-37xx/CVE-2025-3729.json +++ b/CVE-2025/CVE-2025-37xx/CVE-2025-3729.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3729", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-16T21:15:48.537", - "lastModified": "2025-04-17T20:21:48.243", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T19:12:13.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:senior-walter:web-based_pharmacy_product_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DB2DA030-DE10-4DA9-86D7-3E3E9A22DABC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/rce_in_backup.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.305075", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.305075", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.553631", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/rce_in_backup.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3911.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3911.json new file mode 100644 index 00000000000..3c5c5415192 --- /dev/null +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3911.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-3911", + "sourceIdentifier": "security@docker.com", + "published": "2025-04-29T18:15:44.370", + "lastModified": "2025-04-29T18:15:44.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Recording of environment variables, configured for running containers, in Docker Desktop application logs could lead to\u00a0unintentional disclosure of sensitive information such as api keys, passwords, etc.\n\nA malicious actor with read access to these logs could obtain sensitive credentials information and further use it to gain unauthorized access to other systems. Starting with version 4.41.0, Docker Desktop no longer logs environment variables set by the user." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@docker.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@docker.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://docs.docker.com/desktop/troubleshoot-and-support/troubleshoot/#check-the-logs", + "source": "security@docker.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3928.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3928.json index 88aeaf0bc85..19f9478cfc0 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3928.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3928.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3928", "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2025-04-25T16:15:27.817", - "lastModified": "2025-04-29T13:52:28.490", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:48:41.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -87,10 +107,82 @@ "cisaActionDue": "2025-05-17", "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Commvault Web Server Unspecified Vulnerability", + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:commvault:commvault:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.20.0", + "versionEndExcluding": "11.20.217", + "matchCriteriaId": "A0178101-5B30-4072-B014-4562F43074D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:commvault:commvault:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.28.0", + "versionEndExcluding": "11.28.141", + "matchCriteriaId": "4A2914BE-4680-40C4-8AFF-F76393197D84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:commvault:commvault:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.32.0", + "versionEndExcluding": "11.32.89", + "matchCriteriaId": "0F02E229-C8E4-4BB1-821F-16BAB20E8CD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:commvault:commvault:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.36.0", + "versionEndExcluding": "11.36.46", + "matchCriteriaId": "8DB5094F-DED6-4EAF-A06A-C6456F77C76D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://documentation.commvault.com/securityadvisories/CV_2025_03_1.html", - "source": "9119a7d8-5eab-497f-8521-727c672e3725" + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4069.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4069.json index f50770a058d..3267071b277 100644 --- a/CVE-2025/CVE-2025-40xx/CVE-2025-4069.json +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4069.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4069", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-29T16:15:38.350", - "lastModified": "2025-04-29T16:15:38.350", + "lastModified": "2025-04-29T18:15:45.100", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.559516", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zzzxc643/cve/blob/main/PRODUCT_MANAGEMENT_SYSTEM.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4070.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4070.json index 4a2c7ada838..f6befd924ce 100644 --- a/CVE-2025/CVE-2025-40xx/CVE-2025-4070.json +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4070.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4070", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-29T16:15:38.523", - "lastModified": "2025-04-29T16:15:38.523", + "lastModified": "2025-04-29T18:15:45.233", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.559620", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Arcueicl/cve/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4071.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4071.json index f0778ded120..a01994ddb6f 100644 --- a/CVE-2025/CVE-2025-40xx/CVE-2025-4071.json +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4071.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4071", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-29T16:15:38.697", - "lastModified": "2025-04-29T16:15:38.697", + "lastModified": "2025-04-29T18:15:45.357", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.559904", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/2634257398/CVE-/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4072.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4072.json index 64236ea1b01..cbad7b17f83 100644 --- a/CVE-2025/CVE-2025-40xx/CVE-2025-4072.json +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4072.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4072", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-29T17:15:41.500", - "lastModified": "2025-04-29T17:15:41.500", + "lastModified": "2025-04-29T19:15:53.750", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.559939", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Iandweb/CVE/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4073.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4073.json index 926c7452581..71bdf83a3f0 100644 --- a/CVE-2025/CVE-2025-40xx/CVE-2025-4073.json +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4073.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4073", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-29T17:15:41.730", - "lastModified": "2025-04-29T17:15:41.730", + "lastModified": "2025-04-29T19:15:53.880", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.559947", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/bleakTS/myCVE/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4074.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4074.json new file mode 100644 index 00000000000..82b94f39fd3 --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4074.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-4074", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-29T18:15:45.470", + "lastModified": "2025-04-29T18:15:45.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Curfew e-Pass Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/pass-bwdates-report.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/bluechips-zhao/myCVE/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306511", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306511", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.559983", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/bluechips-zhao/myCVE/issues/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4075.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4075.json new file mode 100644 index 00000000000..b32fa9e2de9 --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4075.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-4075", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-29T18:15:45.653", + "lastModified": "2025-04-29T18:15:45.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in VMSMan up to 20250416. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /login.php. The manipulation of the argument Email with the input \"> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.306512", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306512", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.560212", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.560212", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4076.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4076.json new file mode 100644 index 00000000000..1416d0f48d5 --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4076.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4076", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-29T18:15:45.830", + "lastModified": "2025-04-29T18:15:45.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in LB-LINK BL-AC3600 up to 1.0.22. This affects the function easy_uci_set_option_string_0 of the file /cgi-bin/lighttpd.cgi of the component Password Handler. The manipulation of the argument routepwd leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/GrayLxton/BLink_poc", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/GrayLxton/BLink_poc/blob/main/poc.py", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306513", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306513", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.560232", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4077.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4077.json new file mode 100644 index 00000000000..d4a693550e4 --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4077.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4077", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-29T18:15:46.003", + "lastModified": "2025-04-29T18:15:46.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in code-projects School Billing System 1.0. This vulnerability affects the function searchrec. The manipulation of the argument Name leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zzzxc643/cve/blob/main/SCHOOL_BILLING_SYSTEM.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306514", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306514", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.560534", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4079.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4079.json new file mode 100644 index 00000000000..00085c01812 --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4079.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-4079", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-29T19:15:54.130", + "lastModified": "2025-04-29T19:15:54.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in PCMan FTP Server up to 2.0.7. Affected is an unknown function of the component RENAME Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://fitoxs.com/exploit/exploit-9e107d9d372bb6826bd81d3542a419d6.txt", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306516", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306516", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.560541", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4095.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4095.json new file mode 100644 index 00000000000..2ca67ef0f73 --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4095.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-4095", + "sourceIdentifier": "security@docker.com", + "published": "2025-04-29T18:15:46.180", + "lastModified": "2025-04-29T18:15:46.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Registry Access Management (RAM) is a security feature allowing administrators to restrict access for their developers to only allowed registries. When a MacOS configuration profile is used to enforce organization sign-in, the RAM policies are not being applied, which would allow Docker Desktop users to pull down unapproved, and potentially malicious images from any registry." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@docker.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@docker.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://docs.docker.com/security/for-admins/hardened-desktop/registry-access-management", + "source": "security@docker.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-425xx/CVE-2025-42599.json b/CVE-2025/CVE-2025-425xx/CVE-2025-42599.json index f40b1177850..0cc8e30a608 100644 --- a/CVE-2025/CVE-2025-425xx/CVE-2025-42599.json +++ b/CVE-2025/CVE-2025-425xx/CVE-2025-42599.json @@ -2,8 +2,8 @@ "id": "CVE-2025-42599", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-04-18T04:15:30.557", - "lastModified": "2025-04-29T01:00:02.093", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-29T19:46:44.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "vultures@jpcert.or.jp", @@ -55,14 +77,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qualitia:active\\!_mail:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.60.05008562", + "matchCriteriaId": "FEDBA20F-0447-4160-A33C-9AA85CE37B59" + } + ] + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN22348866/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.qualitia.com/jp/news/2025/04/18_1030.html", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46239.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46239.json index 3568cb651a7..a524670c196 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46239.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46239.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46239", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:17.570", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:54:46.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:plugin-planet:theme_switcha:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.4.1", + "matchCriteriaId": "2E1F674E-ADB4-4847-8B1E-10B66EE29A3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/theme-switcha/vulnerability/wordpress-theme-switcha-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46240.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46240.json index 2d66f723e24..4e96b0f9512 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46240.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46240.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46240", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:17.750", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:52:17.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:plugin-planet:simple_download_counter:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.1", + "matchCriteriaId": "A70D1B89-B9AA-431E-B970-69EBE7376CEF" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/simple-download-counter/vulnerability/wordpress-simple-download-counter-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46241.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46241.json index 82c88498b40..78831651e2d 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46241.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46241.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46241", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:17.960", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:48:56.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codepeople:appointment_booking_calendar:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.93", + "matchCriteriaId": "B434B492-CAB9-4E4B-9A92-A3B833A1B092" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/appointment-booking-calendar/vulnerability/wordpress-appointment-booking-calendar-plugin-1-3-92-csrf-to-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46242.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46242.json index c582d042d38..0ff325cb347 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46242.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46242.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46242", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:18.210", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:48:18.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kibokolabs:watu_quiz:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.4.4", + "matchCriteriaId": "CBE2340E-D513-431D-8474-C45D156D91BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/watu/vulnerability/wordpress-watu-quiz-3-4-3-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46243.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46243.json index 74261a63323..12282a6691e 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46243.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46243.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46243", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:18.390", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:45:08.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sktthemes:recover_abandoned_cart_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3", + "matchCriteriaId": "6AC7BD2C-1F0E-4653-A19F-0C4B8ACD1AFF" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/recover-wc-abandoned-cart/vulnerability/wordpress-recover-abandoned-cart-for-woocommerce-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46244.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46244.json index eeae9334493..7943e975c36 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46244.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46244.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46244", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:18.560", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:37:46.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:multidots:advanced_linked_variations_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.4", + "matchCriteriaId": "20567D48-7EB3-499B-9CC0-200F8B93433F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/linked-variation/vulnerability/wordpress-advanced-linked-variations-for-woocommerce-1-0-3-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46245.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46245.json index d753498955c..dcb301186c1 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46245.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46245.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46245", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:18.750", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:27:40.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cminds:cm_ad_changer:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.6", + "matchCriteriaId": "86DC8008-7C87-4C0B-891C-CBE527BFAC1B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/cm-ad-changer/vulnerability/wordpress-cm-ad-changer-2-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46246.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46246.json index d45bd7c47d3..a39ef15d515 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46246.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46246.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46246", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:18.953", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:22:45.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cminds:cm_answers:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.3.4", + "matchCriteriaId": "78FCDEA9-9AA0-4A37-A445-F1A198F5EA89" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/cm-answers/vulnerability/wordpress-cm-answers-3-3-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46247.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46247.json index 8f8bd656f98..612fdd33674 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46247.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46247.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46247", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:19.137", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-29T18:17:58.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codepeople:appointment_booking_calendar:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.93", + "matchCriteriaId": "B434B492-CAB9-4E4B-9A92-A3B833A1B092" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/appointment-booking-calendar/vulnerability/wordpress-appointment-booking-calendar-1-3-92-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-463xx/CVE-2025-46346.json b/CVE-2025/CVE-2025-463xx/CVE-2025-46346.json index 0a1b60e4dad..0a97df4da6f 100644 --- a/CVE-2025/CVE-2025-463xx/CVE-2025-46346.json +++ b/CVE-2025/CVE-2025-463xx/CVE-2025-46346.json @@ -2,7 +2,7 @@ "id": "CVE-2025-46346", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-29T16:15:36.873", - "lastModified": "2025-04-29T16:15:36.873", + "lastModified": "2025-04-29T18:15:44.570", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -77,6 +77,10 @@ { "url": "https://github.com/YesWiki/yeswiki/security/advisories/GHSA-59x8-cvxh-3mm4", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/YesWiki/yeswiki/security/advisories/GHSA-59x8-cvxh-3mm4", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-463xx/CVE-2025-46347.json b/CVE-2025/CVE-2025-463xx/CVE-2025-46347.json new file mode 100644 index 00000000000..cb7de3213d1 --- /dev/null +++ b/CVE-2025/CVE-2025-463xx/CVE-2025-46347.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-46347", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-29T18:15:44.670", + "lastModified": "2025-04-29T19:15:53.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "YesWiki is a wiki system written in PHP. Prior to version 4.5.4, YesWiki vulnerable to remote code execution. An arbitrary file write can be used to write a file with a PHP extension, which then can be browsed to in order to execute arbitrary code on the server, resulting in a full compromise of the server. This could potentially be performed unwittingly by a user. This issue has been patched in version 4.5.4." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/YesWiki/yeswiki/commit/8fe5275a78dc7e0f9c242baa3cbac6b5ac1cc066", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/YesWiki/yeswiki/security/advisories/GHSA-88xg-v53p-fpvf", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/YesWiki/yeswiki/security/advisories/GHSA-88xg-v53p-fpvf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-463xx/CVE-2025-46349.json b/CVE-2025/CVE-2025-463xx/CVE-2025-46349.json new file mode 100644 index 00000000000..b44afc39be2 --- /dev/null +++ b/CVE-2025/CVE-2025-463xx/CVE-2025-46349.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-46349", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-29T18:15:44.803", + "lastModified": "2025-04-29T18:15:44.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "YesWiki is a wiki system written in PHP. Prior to version 4.5.4, YesWiki is vulnerable to reflected XSS in the file upload form. This vulnerability allows any malicious unauthenticated user to create a link that can be clicked on by the victim to perform arbitrary actions. This issue has been patched in version 4.5.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/YesWiki/yeswiki/pull/1264/commits/6edde40eb7eeb5d60619ac4d1e0a0422d92e9524", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/YesWiki/yeswiki/security/advisories/GHSA-2f8p-qqx2-gwr2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/YesWiki/yeswiki/security/advisories/GHSA-2f8p-qqx2-gwr2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-463xx/CVE-2025-46350.json b/CVE-2025/CVE-2025-463xx/CVE-2025-46350.json new file mode 100644 index 00000000000..24b27c87d7e --- /dev/null +++ b/CVE-2025/CVE-2025-463xx/CVE-2025-46350.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-46350", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-29T18:15:44.950", + "lastModified": "2025-04-29T18:15:44.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "YesWiki is a wiki system written in PHP. Prior to version 4.5.4, an attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user\u2019s session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/YesWiki/yeswiki/commit/e2603176a4607b83659635a0c517550d4a171cb9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/YesWiki/yeswiki/security/advisories/GHSA-cg4f-cq8h-3ch8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/YesWiki/yeswiki/security/advisories/GHSA-cg4f-cq8h-3ch8", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 156c2af2c7a..bf30520b7e3 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-29T18:00:20.250098+00:00 +2025-04-29T20:00:20.035203+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-29T17:57:02.620000+00:00 +2025-04-29T19:49:59.680000+00:00 ``` ### Last Data Feed Release @@ -33,67 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -291717 +291727 ``` ### CVEs added in the last Commit -Recently added CVEs: `23` +Recently added CVEs: `10` -- [CVE-2025-0716](CVE-2025/CVE-2025-07xx/CVE-2025-0716.json) (`2025-04-29T17:15:39.790`) -- [CVE-2025-1551](CVE-2025/CVE-2025-15xx/CVE-2025-1551.json) (`2025-04-29T16:15:29.870`) -- [CVE-2025-23177](CVE-2025/CVE-2025-231xx/CVE-2025-23177.json) (`2025-04-29T16:15:30.017`) -- [CVE-2025-23178](CVE-2025/CVE-2025-231xx/CVE-2025-23178.json) (`2025-04-29T16:15:30.157`) -- [CVE-2025-23179](CVE-2025/CVE-2025-231xx/CVE-2025-23179.json) (`2025-04-29T16:15:30.297`) -- [CVE-2025-23180](CVE-2025/CVE-2025-231xx/CVE-2025-23180.json) (`2025-04-29T17:15:40.687`) -- [CVE-2025-23181](CVE-2025/CVE-2025-231xx/CVE-2025-23181.json) (`2025-04-29T17:15:40.907`) -- [CVE-2025-25403](CVE-2025/CVE-2025-254xx/CVE-2025-25403.json) (`2025-04-29T16:15:30.437`) -- [CVE-2025-25962](CVE-2025/CVE-2025-259xx/CVE-2025-25962.json) (`2025-04-29T16:15:30.580`) -- [CVE-2025-32354](CVE-2025/CVE-2025-323xx/CVE-2025-32354.json) (`2025-04-29T16:15:34.770`) -- [CVE-2025-40615](CVE-2025/CVE-2025-406xx/CVE-2025-40615.json) (`2025-04-29T16:15:36.160`) -- [CVE-2025-40616](CVE-2025/CVE-2025-406xx/CVE-2025-40616.json) (`2025-04-29T16:15:36.310`) -- [CVE-2025-40617](CVE-2025/CVE-2025-406xx/CVE-2025-40617.json) (`2025-04-29T16:15:36.450`) -- [CVE-2025-40618](CVE-2025/CVE-2025-406xx/CVE-2025-40618.json) (`2025-04-29T16:15:36.580`) -- [CVE-2025-40619](CVE-2025/CVE-2025-406xx/CVE-2025-40619.json) (`2025-04-29T16:15:36.727`) -- [CVE-2025-4068](CVE-2025/CVE-2025-40xx/CVE-2025-4068.json) (`2025-04-29T16:15:38.163`) -- [CVE-2025-4069](CVE-2025/CVE-2025-40xx/CVE-2025-4069.json) (`2025-04-29T16:15:38.350`) -- [CVE-2025-4070](CVE-2025/CVE-2025-40xx/CVE-2025-4070.json) (`2025-04-29T16:15:38.523`) -- [CVE-2025-4071](CVE-2025/CVE-2025-40xx/CVE-2025-4071.json) (`2025-04-29T16:15:38.697`) -- [CVE-2025-4072](CVE-2025/CVE-2025-40xx/CVE-2025-4072.json) (`2025-04-29T17:15:41.500`) -- [CVE-2025-4073](CVE-2025/CVE-2025-40xx/CVE-2025-4073.json) (`2025-04-29T17:15:41.730`) -- [CVE-2025-45956](CVE-2025/CVE-2025-459xx/CVE-2025-45956.json) (`2025-04-29T17:15:41.317`) -- [CVE-2025-46346](CVE-2025/CVE-2025-463xx/CVE-2025-46346.json) (`2025-04-29T16:15:36.873`) +- [CVE-2025-3911](CVE-2025/CVE-2025-39xx/CVE-2025-3911.json) (`2025-04-29T18:15:44.370`) +- [CVE-2025-4074](CVE-2025/CVE-2025-40xx/CVE-2025-4074.json) (`2025-04-29T18:15:45.470`) +- [CVE-2025-4075](CVE-2025/CVE-2025-40xx/CVE-2025-4075.json) (`2025-04-29T18:15:45.653`) +- [CVE-2025-4076](CVE-2025/CVE-2025-40xx/CVE-2025-4076.json) (`2025-04-29T18:15:45.830`) +- [CVE-2025-4077](CVE-2025/CVE-2025-40xx/CVE-2025-4077.json) (`2025-04-29T18:15:46.003`) +- [CVE-2025-4079](CVE-2025/CVE-2025-40xx/CVE-2025-4079.json) (`2025-04-29T19:15:54.130`) +- [CVE-2025-4095](CVE-2025/CVE-2025-40xx/CVE-2025-4095.json) (`2025-04-29T18:15:46.180`) +- [CVE-2025-46347](CVE-2025/CVE-2025-463xx/CVE-2025-46347.json) (`2025-04-29T18:15:44.670`) +- [CVE-2025-46349](CVE-2025/CVE-2025-463xx/CVE-2025-46349.json) (`2025-04-29T18:15:44.803`) +- [CVE-2025-46350](CVE-2025/CVE-2025-463xx/CVE-2025-46350.json) (`2025-04-29T18:15:44.950`) ### CVEs modified in the last Commit -Recently modified CVEs: `131` +Recently modified CVEs: `69` -- [CVE-2025-31697](CVE-2025/CVE-2025-316xx/CVE-2025-31697.json) (`2025-04-29T16:15:34.633`) -- [CVE-2025-32979](CVE-2025/CVE-2025-329xx/CVE-2025-32979.json) (`2025-04-29T16:15:34.913`) -- [CVE-2025-32980](CVE-2025/CVE-2025-329xx/CVE-2025-32980.json) (`2025-04-29T16:15:35.103`) -- [CVE-2025-32981](CVE-2025/CVE-2025-329xx/CVE-2025-32981.json) (`2025-04-29T16:15:35.280`) -- [CVE-2025-32982](CVE-2025/CVE-2025-329xx/CVE-2025-32982.json) (`2025-04-29T16:15:35.457`) -- [CVE-2025-32985](CVE-2025/CVE-2025-329xx/CVE-2025-32985.json) (`2025-04-29T16:15:35.643`) -- [CVE-2025-32986](CVE-2025/CVE-2025-329xx/CVE-2025-32986.json) (`2025-04-29T16:15:35.820`) -- [CVE-2025-37785](CVE-2025/CVE-2025-377xx/CVE-2025-37785.json) (`2025-04-29T16:56:25.337`) -- [CVE-2025-37860](CVE-2025/CVE-2025-378xx/CVE-2025-37860.json) (`2025-04-29T16:55:17.163`) -- [CVE-2025-37893](CVE-2025/CVE-2025-378xx/CVE-2025-37893.json) (`2025-04-29T16:54:26.433`) -- [CVE-2025-37925](CVE-2025/CVE-2025-379xx/CVE-2025-37925.json) (`2025-04-29T16:44:08.020`) -- [CVE-2025-4086](CVE-2025/CVE-2025-40xx/CVE-2025-4086.json) (`2025-04-29T16:15:38.873`) -- [CVE-2025-4087](CVE-2025/CVE-2025-40xx/CVE-2025-4087.json) (`2025-04-29T16:15:39.017`) -- [CVE-2025-4088](CVE-2025/CVE-2025-40xx/CVE-2025-4088.json) (`2025-04-29T16:15:39.153`) -- [CVE-2025-4089](CVE-2025/CVE-2025-40xx/CVE-2025-4089.json) (`2025-04-29T16:15:39.297`) -- [CVE-2025-4090](CVE-2025/CVE-2025-40xx/CVE-2025-4090.json) (`2025-04-29T16:15:39.440`) -- [CVE-2025-4091](CVE-2025/CVE-2025-40xx/CVE-2025-4091.json) (`2025-04-29T16:15:39.570`) -- [CVE-2025-4092](CVE-2025/CVE-2025-40xx/CVE-2025-4092.json) (`2025-04-29T16:15:39.707`) -- [CVE-2025-4093](CVE-2025/CVE-2025-40xx/CVE-2025-4093.json) (`2025-04-29T16:15:39.850`) -- [CVE-2025-46653](CVE-2025/CVE-2025-466xx/CVE-2025-46653.json) (`2025-04-29T16:15:37.150`) -- [CVE-2025-46654](CVE-2025/CVE-2025-466xx/CVE-2025-46654.json) (`2025-04-29T16:15:37.300`) -- [CVE-2025-46655](CVE-2025/CVE-2025-466xx/CVE-2025-46655.json) (`2025-04-29T16:15:37.440`) -- [CVE-2025-46656](CVE-2025/CVE-2025-466xx/CVE-2025-46656.json) (`2025-04-29T16:15:37.573`) -- [CVE-2025-46672](CVE-2025/CVE-2025-466xx/CVE-2025-46672.json) (`2025-04-29T16:15:37.747`) -- [CVE-2025-46673](CVE-2025/CVE-2025-466xx/CVE-2025-46673.json) (`2025-04-29T16:15:37.900`) +- [CVE-2025-23136](CVE-2025/CVE-2025-231xx/CVE-2025-23136.json) (`2025-04-29T18:53:02.607`) +- [CVE-2025-23137](CVE-2025/CVE-2025-231xx/CVE-2025-23137.json) (`2025-04-29T18:53:31.417`) +- [CVE-2025-3333](CVE-2025/CVE-2025-33xx/CVE-2025-3333.json) (`2025-04-29T19:39:40.330`) +- [CVE-2025-3334](CVE-2025/CVE-2025-33xx/CVE-2025-3334.json) (`2025-04-29T19:33:04.337`) +- [CVE-2025-3338](CVE-2025/CVE-2025-33xx/CVE-2025-3338.json) (`2025-04-29T19:29:51.553`) +- [CVE-2025-3339](CVE-2025/CVE-2025-33xx/CVE-2025-3339.json) (`2025-04-29T19:29:05.240`) +- [CVE-2025-3340](CVE-2025/CVE-2025-33xx/CVE-2025-3340.json) (`2025-04-29T19:25:09.687`) +- [CVE-2025-3729](CVE-2025/CVE-2025-37xx/CVE-2025-3729.json) (`2025-04-29T19:12:13.150`) +- [CVE-2025-3928](CVE-2025/CVE-2025-39xx/CVE-2025-3928.json) (`2025-04-29T19:48:41.463`) +- [CVE-2025-4069](CVE-2025/CVE-2025-40xx/CVE-2025-4069.json) (`2025-04-29T18:15:45.100`) +- [CVE-2025-4070](CVE-2025/CVE-2025-40xx/CVE-2025-4070.json) (`2025-04-29T18:15:45.233`) +- [CVE-2025-4071](CVE-2025/CVE-2025-40xx/CVE-2025-4071.json) (`2025-04-29T18:15:45.357`) +- [CVE-2025-4072](CVE-2025/CVE-2025-40xx/CVE-2025-4072.json) (`2025-04-29T19:15:53.750`) +- [CVE-2025-4073](CVE-2025/CVE-2025-40xx/CVE-2025-4073.json) (`2025-04-29T19:15:53.880`) +- [CVE-2025-42599](CVE-2025/CVE-2025-425xx/CVE-2025-42599.json) (`2025-04-29T19:46:44.310`) +- [CVE-2025-46239](CVE-2025/CVE-2025-462xx/CVE-2025-46239.json) (`2025-04-29T18:54:46.143`) +- [CVE-2025-46240](CVE-2025/CVE-2025-462xx/CVE-2025-46240.json) (`2025-04-29T18:52:17.683`) +- [CVE-2025-46241](CVE-2025/CVE-2025-462xx/CVE-2025-46241.json) (`2025-04-29T18:48:56.777`) +- [CVE-2025-46242](CVE-2025/CVE-2025-462xx/CVE-2025-46242.json) (`2025-04-29T18:48:18.903`) +- [CVE-2025-46243](CVE-2025/CVE-2025-462xx/CVE-2025-46243.json) (`2025-04-29T18:45:08.813`) +- [CVE-2025-46244](CVE-2025/CVE-2025-462xx/CVE-2025-46244.json) (`2025-04-29T18:37:46.840`) +- [CVE-2025-46245](CVE-2025/CVE-2025-462xx/CVE-2025-46245.json) (`2025-04-29T18:27:40.830`) +- [CVE-2025-46246](CVE-2025/CVE-2025-462xx/CVE-2025-46246.json) (`2025-04-29T18:22:45.507`) +- [CVE-2025-46247](CVE-2025/CVE-2025-462xx/CVE-2025-46247.json) (`2025-04-29T18:17:58.223`) +- [CVE-2025-46346](CVE-2025/CVE-2025-463xx/CVE-2025-46346.json) (`2025-04-29T18:15:44.570`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c6a0202b347..b5a03816b69 100644 --- a/_state.csv +++ b/_state.csv @@ -153893,11 +153893,11 @@ CVE-2020-23585,0,0,7c428272596b4ba7ff6db44f4cd54e2a9fe7b3c853f2427b388f0a215f165 CVE-2020-23586,0,0,1e9d7ff38c692943b59c61827312518f9605e618b6773e44c75e5f97e3ad9dfd,2025-04-25T21:15:17.523000 CVE-2020-23587,0,0,9eb6e109e06802bf11bd139acf576ae6b18d299430dc0b0611cd8a4f69f49cde,2025-04-25T21:15:17.670000 CVE-2020-23588,0,0,1a0ee81cdd189aa167c3f001b72e9321af65ea0aeb21abc13eeeaf9fd8d6d3cf,2025-04-25T21:15:17.817000 -CVE-2020-23589,0,1,7576173e52dd8e0390097263ca26c73256ca64d581a4e814396797c91ffbe383,2025-04-29T16:15:22.040000 -CVE-2020-23590,0,1,34f8983d002b58ca9bd2791c4315b8a9ad24348aa0471c413c54bd37c7e970ee,2025-04-29T16:15:22.267000 -CVE-2020-23591,0,1,c2623c32ad9fba84d233b0142ba4937bd0f1dd602de0010b954a521b272ad83e,2025-04-29T16:15:22.467000 -CVE-2020-23592,0,1,b0a6b22cd8683bb1d5678b039ed7bec8813369ddc902aefb85766eba7ee690ac,2025-04-29T16:15:22.650000 -CVE-2020-23593,0,1,0256cac2fa5934ed86ffa5c85075d5e9ac8af6147a159622f1f30937fd300318,2025-04-29T16:15:22.843000 +CVE-2020-23589,0,0,7576173e52dd8e0390097263ca26c73256ca64d581a4e814396797c91ffbe383,2025-04-29T16:15:22.040000 +CVE-2020-23590,0,0,34f8983d002b58ca9bd2791c4315b8a9ad24348aa0471c413c54bd37c7e970ee,2025-04-29T16:15:22.267000 +CVE-2020-23591,0,0,c2623c32ad9fba84d233b0142ba4937bd0f1dd602de0010b954a521b272ad83e,2025-04-29T16:15:22.467000 +CVE-2020-23592,0,0,b0a6b22cd8683bb1d5678b039ed7bec8813369ddc902aefb85766eba7ee690ac,2025-04-29T16:15:22.650000 +CVE-2020-23593,0,0,0256cac2fa5934ed86ffa5c85075d5e9ac8af6147a159622f1f30937fd300318,2025-04-29T16:15:22.843000 CVE-2020-23595,0,0,224b7b9420b6e20c71a7b6328af0de550bc9e4252bc46641d42521b9d902b0d3,2024-11-21T05:13:56.773000 CVE-2020-23617,0,0,f32680730a32d7558b052a7f4f7b3a3381c6047b728e28be15b410810620aece,2024-11-21T05:13:56.910000 CVE-2020-23618,0,0,4609a8579e754f0c91efc1e0695565e919ff9487048fc7290b64d28856081ec4,2024-11-21T05:13:57.067000 @@ -159590,7 +159590,7 @@ CVE-2020-36785,0,0,8abd1aefac894fa31fb9663b853815059d0d596e701ab17d0204178beba87 CVE-2020-36786,0,0,0ea15290adb4074d2af998942543822278a7d5c85d7cd142f1bf61d58786e330,2024-12-06T15:59:30.400000 CVE-2020-36787,0,0,502855373c28ca46357de690f5dc8f8e29c1233e9557b09f461af25c733b38c7,2024-12-11T16:42:29.080000 CVE-2020-36788,0,0,538e84f4cb96c9d3452e4c0d6032a1a5bac616bb875a71e1847cbdf2d7f05dab,2024-12-11T16:37:00.320000 -CVE-2020-36789,0,0,6dd53f25c90048a50e7965887df6eccbb0e72286b6b4d228e8e59a09186e6da9,2025-04-17T20:21:05.203000 +CVE-2020-36789,0,1,f89852dcd35974ed09db2314ec648c563469307157df07d5424fdd6370ef7743,2025-04-29T18:55:11.223000 CVE-2020-3679,0,0,e50c3284f3a657c667bb2bcead40e1009be12a2605501d7af9afc6e97b996914,2024-11-21T05:31:33.770000 CVE-2020-3680,0,0,95ff3ef12f3f63dba119087397217342424c1009d17f182b57cd7668b1d53c18,2024-11-21T05:31:33.890000 CVE-2020-3681,0,0,85c136b131152da20e227debcb5e39b4df76d1ad0d976c7af998638337c03a1e,2024-11-21T05:31:34.023000 @@ -174075,7 +174075,7 @@ CVE-2021-29326,0,0,61052bf798fb52304eae7c2dc21345386b3d6a4a40a569014ebdd4cc000a3 CVE-2021-29327,0,0,94ce3211d4108af4330252b2e915c85f83a43f4a0b519538819789b90fd620b4,2024-11-21T06:00:57.753000 CVE-2021-29328,0,0,98818f8cd69bf6c9c63f6709301d61e66740b04536d6f9121ddd4ed5733676ae,2024-11-21T06:00:57.883000 CVE-2021-29329,0,0,7f0b42a82b110b20da87d90b6c5999563f3ad3c8433dbc9fadc2276d9a832ba5,2024-11-21T06:00:58.017000 -CVE-2021-29334,0,1,0d2b21034c2d7e6b2e2cff619f7b82786a4f3ed4ec7259b7ddd13731b18acfd6,2025-04-29T16:15:23.050000 +CVE-2021-29334,0,0,0d2b21034c2d7e6b2e2cff619f7b82786a4f3ed4ec7259b7ddd13731b18acfd6,2025-04-29T16:15:23.050000 CVE-2021-29337,0,0,183f80df7c722a4f8fb9181fda13cd965b4e5b66e4a779ef392be4c498a4bfa8,2024-11-21T06:00:58.307000 CVE-2021-29338,0,0,b8a66e612e0a0b42b9d49d9b06c28524bebe3fa2f71a88cb9e277c73bc242bb9,2024-11-21T06:00:58.463000 CVE-2021-29343,0,0,5a5a4e220f3024dc32718c419a4b2dca04d9e78df1400df3d49ebaf894a0cb75,2024-11-21T06:00:58.610000 @@ -181600,7 +181600,7 @@ CVE-2021-39185,0,0,44556278c36e4ba396063008ac918c9e321e682362cf6c322dd5e2ee02e8a CVE-2021-39186,0,0,48d6d6db8365bff7b1384028f1e4323fa00abe065a07c48fea6e0493144ae570,2024-11-21T06:18:50.070000 CVE-2021-39187,0,0,9f2b872f237b8f4ce3f87a94f0d0b90fa302243f58e026edb77e02f5c2d2ed8b,2024-11-21T06:18:50.240000 CVE-2021-39189,0,0,f2abe4734455bb5be58172e9ed43badcece60ef49189d827dc6a7065d998b9ef,2024-11-21T06:18:50.407000 -CVE-2021-3919,0,1,b67d6a3da55e4249ada40f4a581beebecd74aaea7b6f43f66f0cdbdfb8c5bdbe,2025-04-29T16:15:23.267000 +CVE-2021-3919,0,0,b67d6a3da55e4249ada40f4a581beebecd74aaea7b6f43f66f0cdbdfb8c5bdbe,2025-04-29T16:15:23.267000 CVE-2021-39190,0,0,f7cd14f5237f5f2bc5a5d85515c787fb36d65b7537ddf0698f401b44e1a6212f,2024-11-21T06:18:50.563000 CVE-2021-39191,0,0,99e37b85f984c4656b23522f9b95b45aaf55fb85c29a2828b05100bd23eaefea,2024-11-21T06:18:50.737000 CVE-2021-39192,0,0,4c4f776cd539c87a24ddec2dbb80f75392e35e90dd7816fdf3b58319e0d6628c,2024-11-21T06:18:50.937000 @@ -187534,22 +187534,22 @@ CVE-2021-47217,0,0,0a489705239b1608b1dac0f9ef137450310d629ac310e04d5fbc0878960cf CVE-2021-47218,0,0,cdeb5c7e6dbdcca4a12e7f3fd8c0c1023ff2d2f036ea1b66236860ff4b09a050,2025-01-14T14:44:55.610000 CVE-2021-47219,0,0,339088e3912c7f0a035be9bbc6f53b27276b668f281d0386b9b98f0f0a3990d4,2025-03-04T15:29:21.270000 CVE-2021-47220,0,0,3b5282a5a78ae38dd9afefd942320359b1e71d1f67c1eff9fa622a893f6cd809,2024-10-03T15:15:13.703000 -CVE-2021-47221,0,0,7afbe582defa95f34b58ec3b4d10fc6db91ded7409ab2f1fde46bee521aabd80,2024-11-21T06:35:39.267000 -CVE-2021-47222,0,0,f0d76d0e2cdb314b19f8094ddd09a2b1cda77d6c5b61bbba0f92f2b58298fbb9,2024-11-21T06:35:39.383000 +CVE-2021-47221,0,1,eb0ca3c260b76106209d946a5872eae0ac20465d994af75c17d5439c8b99bfaf,2025-04-29T19:07:02.250000 +CVE-2021-47222,0,1,795b78b445e3bd57875fb730d8438a68531cbc9c6e3e6eecb3901af9d421cdaf,2025-04-29T19:13:04.043000 CVE-2021-47223,0,0,ee55a5c583baeb5d19b1f17a5fef9758100be306fbb75e1d2068efb4af89c588,2025-02-03T16:11:14.527000 CVE-2021-47224,0,0,41c5745a8d6c9e9f9109630173332c8aebd7d32da5478a97bac31d9712e084f2,2025-04-04T14:32:24.247000 CVE-2021-47225,0,0,1b7df927df61b01088aa3b2518228df0e2e1d8d45219d366971335637d46aec2,2025-04-04T14:31:52.047000 -CVE-2021-47226,0,0,f30b9d87a6a7d557b277d4806b13c6513a498660be0416059b5be5b74e30a49e,2024-11-21T06:35:39.977000 -CVE-2021-47227,0,0,a996429321467fe01689843f15ca4e3a2b5480e0a7bc092dcc5d1e5eb8862a1c,2024-11-21T06:35:40.087000 -CVE-2021-47228,0,0,23c74a2cbc379a427962cdb29bc670329efb60a4d07d6a3abae77ecd15841f63,2024-11-21T06:35:40.190000 -CVE-2021-47229,0,0,7eaf4c4dfd8a0b01ff059e9e140d1f30b6435b38480e86920eedf73b5f29c12c,2024-11-21T06:35:40.363000 +CVE-2021-47226,0,1,ec1eeaf2abbc9690cfae7f43e818b9246bad3e48d64dda0bcd705f4342de9e8c,2025-04-29T19:26:36.690000 +CVE-2021-47227,0,1,eb6e5701392dafceb218d45e26d2eac93bf9794681d22513e0c9d813b434535f,2025-04-29T19:41:06.873000 +CVE-2021-47228,0,1,78e32280c4e1623be9b958f1a046cda932e584a90bd566b41ff284022808075a,2025-04-29T19:49:34.467000 +CVE-2021-47229,0,1,646a1e8917f02920571b80ec4f04b332b8fe1baf9557cf279032ef201fabbc02,2025-04-29T19:42:00.293000 CVE-2021-47230,0,0,2789114f77abd775957b84a83dd9d9f4dabd860f8d518b27baa487f3a576182d,2025-04-04T14:31:41.360000 CVE-2021-47231,0,0,7e273dd72f3ee2b5b12508096d193da03270fae7eb4b5db0dc1e98349a68649c,2025-04-04T14:31:28.430000 CVE-2021-47232,0,0,271dc2f7a1a16535b9d84acb7dda51a32c1eff791a1f21db202e0ed29f34d8c2,2025-04-04T14:31:13.503000 CVE-2021-47233,0,0,49bd84981d757bdeb030b5d808f06c049b1dc1bf9565f1010d44de6f30baa449,2024-12-30T19:51:12.613000 -CVE-2021-47234,0,0,273d7ee3f66e04272422c623c3f10a6131b83f867533db8cd4feea3001cff253,2024-11-21T06:35:41.203000 +CVE-2021-47234,0,1,4390e745a34e841f09566108052760c4f45681eb47b7434c0a7d5c1b41d4c5c9,2025-04-29T19:42:29.477000 CVE-2021-47235,0,0,8b53251b18ef7a00638c8566452347f25d3f12a1756e9c95ca2b9ee9d09320d4,2024-12-30T19:06:05.170000 -CVE-2021-47236,0,0,b87ff6e7bbebf51be21d4b4f1bddb0b9e9f26bf1b1f348eef469192eeef1e5fe,2024-11-21T06:35:41.480000 +CVE-2021-47236,0,1,c93e6e3aa7cff91c3825ea4b2095b0919de5fc2748196fdce874e8ce15e22089,2025-04-29T19:44:19.887000 CVE-2021-47237,0,0,21a5b46828785b47344dfa5d33d76cb4f95f34c264877088c08c9f3183bb0375,2024-12-30T19:05:28.320000 CVE-2021-47238,0,0,ecefa626d382990cb31da0c7a4d6b9054d7d5cf136eeda16be42a49ac9a0f69a,2025-04-04T14:31:03.253000 CVE-2021-47239,0,0,426aab874d3868aa4677b22537307b93d5214463451278a00c2a583e2a8b5c7b,2024-12-30T19:05:15.167000 @@ -187559,7 +187559,7 @@ CVE-2021-47242,0,0,a3ccc6be3463ca45c0d81ad6962dc9c44b58064e6393b651fd86692274376 CVE-2021-47243,0,0,f3ce19b96978056d91cf0a2bc489aea47b0aa209106c9ae341645d6e0a65d4c0,2024-12-30T19:04:26.770000 CVE-2021-47244,0,0,b66d044a83e59f75875eadae88b0ee07100402065cec11a916dc7f6f17841c07,2025-04-04T14:30:24.850000 CVE-2021-47245,0,0,4b0fd78442e693c8c9ad1c36bf34d80eb49c87d890eb02e4e5da728a0703b468,2024-12-30T19:03:58.273000 -CVE-2021-47246,0,0,9f782402bd919affe114e8e45d84ed93cdf78270af91f3168742be0308c7f0f6,2024-11-21T06:35:42.950000 +CVE-2021-47246,0,1,5e139cc160b0f800742cace44b48d1a1295bb88daa9600fd02e045609c4110f6,2025-04-29T19:45:28.480000 CVE-2021-47247,0,0,cf90397ea9a0d803e299cc12d5f4b86d634ea5464c7c4e150ba6bab1f935c450,2024-12-30T19:03:42.583000 CVE-2021-47248,0,0,6815ade5961ff0ed77e72f0840fb9b58804880066f8794fef7922658c81186c7,2024-11-21T06:35:43.190000 CVE-2021-47249,0,0,9df064926874e19baf591bf7503852913c51ff093c8d41822dae8720c5b2ce56,2024-12-30T19:01:43.417000 @@ -196902,7 +196902,7 @@ CVE-2022-27936,0,0,0c224736783d0a8321eed8d61ef5768f2e9e520bdd8306bdcbaf7096277df CVE-2022-27937,0,0,a2a0496cb2ae33c6adbcc28e14d73e9ab1332e842b7e290dd0e42d8155a61536,2024-11-21T06:56:30.203000 CVE-2022-27938,0,0,a180341b3f55571b9bbd560a79415a71c66bde98d52b8e271d55c81c5999798a,2024-11-21T06:56:30.340000 CVE-2022-27939,0,0,6389fd9955e7cd78c92f57310812d86b707f45eec64f4558d3bfe887a1a7760c,2024-11-21T06:56:30.473000 -CVE-2022-2794,0,0,892f6af9c50449f7b583ffcd6d288b0df15e5383201b499fcb02f47373b37cde,2024-11-21T07:01:42.430000 +CVE-2022-2794,0,1,6c21b87a4fa065bc83582293e2688c465acfec485af71e1ac4029705bfd610a3,2025-04-29T19:15:50.733000 CVE-2022-27940,0,0,c19d4aaba248cc2a27b1bb9f6246996e9c259222f62796e5053efbf3dc874c84,2024-11-21T06:56:30.620000 CVE-2022-27941,0,0,6dbb02c86039d88d2e146ed3696af91d4792c94e8888c1e99ceecaf5ba2452ec,2024-11-21T06:56:30.757000 CVE-2022-27942,0,0,d19dd711fdc26ae5d7650590a1c5ac855eb21a137e978200dbb8c5941b4a395f,2024-11-21T06:56:30.893000 @@ -201203,7 +201203,7 @@ CVE-2022-33009,0,0,961dc3091e68387f1449346c9e89e426a33b90b88e1b5108fc95307a11124 CVE-2022-3301,0,0,a809428a3ab00872fef599967bbb35ca2d6cdfd71e19aafd52cea007468363d9,2024-11-21T07:19:15.153000 CVE-2022-33010,0,0,ea2fce48c2e2a00bc0e3522516ebd9313bf4a5796591ee56dc3d74f9624dd7ba,2024-05-03T19:15:07.467000 CVE-2022-33011,0,0,879cc95508d41e2ac3885ae74f7f7384cd076d69a88fd2dc91c8bebd2de0c0b2,2024-11-21T07:07:25.037000 -CVE-2022-33012,0,1,5fbe24151594ec9e8f5dc7338893a3572f365121b1de3c64ef13e2957f478277,2025-04-29T16:15:23.583000 +CVE-2022-33012,0,0,5fbe24151594ec9e8f5dc7338893a3572f365121b1de3c64ef13e2957f478277,2025-04-29T16:15:23.583000 CVE-2022-33014,0,0,29cb55fa11411d0790f9e509b5844fe8a404e9ce60ff76ded0fd5335f0514587,2023-11-07T03:48:16.983000 CVE-2022-33015,0,0,34a127f2726ade2bb82b9e759d889ddc215bc45eeda65adaac5cca36ce783f3e,2023-11-07T03:48:17.013000 CVE-2022-33016,0,0,06d0cb5e160b5c1c3e18dbe14fd902eedc5f51b4a084be7e85152ec8da972b60,2023-11-07T03:48:17.050000 @@ -203000,7 +203000,7 @@ CVE-2022-35403,0,0,849036348b40334e1f2e596003ac2bcbd5b50d152abab43e405d35e392128 CVE-2022-35404,0,0,203a1048ffadcee6936e648bcd736e54857a537b4c1f365745fc84f159a612b5,2024-11-21T07:11:06.367000 CVE-2022-35405,0,0,33dc142b5793bdc5b78473677375d1020008cfb394fa46212f3e9f943faf5742,2025-03-27T13:59:59.140000 CVE-2022-35406,0,0,ac7189fc63277937cf2708f8fda8bbcc522a4dfe62892fa7f9e126afc6d14a6d,2024-11-21T07:11:06.747000 -CVE-2022-35407,0,1,a12925fa5c94c221cb4462ba2a73d8a8f72c37f706eed71c8929bc8ea1fafead,2025-04-29T16:15:23.800000 +CVE-2022-35407,0,0,a12925fa5c94c221cb4462ba2a73d8a8f72c37f706eed71c8929bc8ea1fafead,2025-04-29T16:15:23.800000 CVE-2022-35408,0,0,2e08b21f6dd561ce8f5ccadb442f9faff1b369e6929040173cf254f2f5a06175,2024-11-21T07:11:07.030000 CVE-2022-35409,0,0,0f99c0bbbada30348bd1c142edb4fb0e2381d3489ff48ec6fb47e5fb216e57b1,2024-11-21T07:11:07.183000 CVE-2022-3541,0,0,e5f4f69a5809265ef0df4b56651dfebae484523f9b219d20455c67b4a65c3751,2024-11-21T07:19:43.870000 @@ -203669,9 +203669,9 @@ CVE-2022-36170,0,0,d7527d8f0a1109300d49fce75dfe7d75c782ce5d872bf7eee5156d9dc6316 CVE-2022-36171,0,0,b93c26442fc6277dae829197e5a18c8a2bc106ec3b575edfe59429588bc5b910,2024-11-21T07:12:32.213000 CVE-2022-36173,0,0,15cf58d3650a875d88fc4ac9c91da02c424af3d06336137838682afd8a3cb868,2024-11-21T07:12:32.810000 CVE-2022-36174,0,0,2424a8fd9e6a8cb96482927ed00950c6d91bf2e4f5ef5747c95d05bcaacfcda6,2024-11-21T07:12:33.020000 -CVE-2022-36179,0,1,0e836f2e6108568f5799a7a8350b8b70f350458224f7aae2b4ff4c42cbcaf96a,2025-04-29T16:15:24.090000 -CVE-2022-3618,0,1,305fe4aaa0a4b00cbbf80ccb2ca2b1cc8c8050b1d5e1f3ca772f7d0c278e18e7,2025-04-29T17:15:33.690000 -CVE-2022-36180,0,1,9b07903ef2e02e8c2996caca27e03c45f7405a32f52004b1958e70a21787399a,2025-04-29T16:15:24.310000 +CVE-2022-36179,0,0,0e836f2e6108568f5799a7a8350b8b70f350458224f7aae2b4ff4c42cbcaf96a,2025-04-29T16:15:24.090000 +CVE-2022-3618,0,0,305fe4aaa0a4b00cbbf80ccb2ca2b1cc8c8050b1d5e1f3ca772f7d0c278e18e7,2025-04-29T17:15:33.690000 +CVE-2022-36180,0,0,9b07903ef2e02e8c2996caca27e03c45f7405a32f52004b1958e70a21787399a,2025-04-29T16:15:24.310000 CVE-2022-36182,0,0,09e023c2e74f10cfe6436922b4d7d96cbdb99029374658061160d68f7327b6be,2024-11-21T07:12:33.923000 CVE-2022-36186,0,0,f0060e06a7f6cd71decf23d918f92801a1e8b74ec9d39fe1c8711a22a2a676c5,2024-11-21T07:12:34.110000 CVE-2022-3619,0,0,2a2029295eecca70100b0eb8a75e92a1507dda8a0598a8d8ed9bd01c8a7a7414,2024-11-21T07:19:53.427000 @@ -203787,7 +203787,7 @@ CVE-2022-36336,0,0,ae0549ded627d669ca90239f9ab709275d26a8c094ba432eb10c86032afea CVE-2022-36337,0,0,4ddd525dc78e6cbcfa51d593ad3b43c0e88104a8b98feebc0cbd1b81c1a1395b,2025-04-25T21:15:32.320000 CVE-2022-36338,0,0,65f5759373ea287b0c303f3b9a0cbd178d8bf2cec507a07dd8ea2b03d99285fc,2024-11-21T07:12:49.140000 CVE-2022-36339,0,0,e8b18c2a9b2e079fdf7bd6abc0d72c3bfc9f8ff49c9f2d0d9840f309be0c5825,2024-11-21T07:12:49.300000 -CVE-2022-3634,0,1,92c9a9824cbee09b03075a002e6f22aa32ba9de408914b5cb9897577d671329e,2025-04-29T17:15:35.777000 +CVE-2022-3634,0,0,92c9a9824cbee09b03075a002e6f22aa32ba9de408914b5cb9897577d671329e,2025-04-29T17:15:35.777000 CVE-2022-36340,0,0,fe2e9992e414758ce76e9d53bc6e9f574e8971142887811747818ecccd47eec1,2024-11-21T07:12:49.430000 CVE-2022-36341,0,0,7b3ff5de52ab7056301aa42fab9a7c570c9c0cbf70368060e4d50cdb9a5f06aa,2024-11-21T07:12:49.563000 CVE-2022-36343,0,0,13171260ef1d0ef1c20aa2c2396cbc5419e89154532cc611cde723f46aa9caa4,2024-11-21T07:12:49.700000 @@ -204254,7 +204254,7 @@ CVE-2022-36876,0,0,d606662410a59330e0c8cc62be94129fa63f2148ab75d58da73d12359b00d CVE-2022-36877,0,0,fc1e77bc45add603e7388c5454f90cb6c2463e9a563bb3ffaee3e87fd58fa467,2024-11-21T07:13:57.503000 CVE-2022-36878,0,0,c4844c7f90161b247f41ab6d9a87a279c7db40d0466324ffb5dc8037144b7f2d,2024-11-21T07:13:57.670000 CVE-2022-36879,0,0,3b2f62d1a570f9adbac9aef397926a21fbdb8959fb7196f3d62939d8705b0e44,2024-11-21T07:13:57.873000 -CVE-2022-3688,0,1,ec0ab9eb33df120939ba40c08fd6205b451e765011ff6848ac14fff4da29eee9,2025-04-29T17:15:36 +CVE-2022-3688,0,0,ec0ab9eb33df120939ba40c08fd6205b451e765011ff6848ac14fff4da29eee9,2025-04-29T17:15:36 CVE-2022-36880,0,0,aa6decb7b85bec1d21d529f907939586d7bf17f5e761ceb87daa717f902643a9,2024-11-21T07:13:58.237000 CVE-2022-36881,0,0,80cc7117a73ddc268e6220594f658c50227d8488043c6aa7800e9d16572bdffa,2024-11-21T07:13:58.447000 CVE-2022-36882,0,0,9a7b5a896caa9eeacce84f623addc497728086cb764259bfa28b705bd8012b26,2024-11-21T07:13:58.690000 @@ -204276,7 +204276,7 @@ CVE-2022-36896,0,0,f32a3b3df3096247d9f805b7eb6b3d8e23525ffac454b013032678ee4cc2f CVE-2022-36897,0,0,15aa15f33dde1de86b2ae8ef9ba87e7901a39be262dc2c3814faedbbf4a06bb2,2024-11-21T07:14:01.473000 CVE-2022-36898,0,0,81bba272f5adc1dbedaa23b1ce6f9993653e7f919beece34d46854433b0b82e7,2024-11-21T07:14:01.667000 CVE-2022-36899,0,0,703ad942a0d0f7aa0b3859dcd78ddc2911d68364cdd789f9987df0a02653eb13,2024-11-21T07:14:01.840000 -CVE-2022-3690,0,1,7dc01ec4096afaf561899921c95d9ad80e3474a5306eaf68af331462bf901809,2025-04-29T17:15:36.297000 +CVE-2022-3690,0,0,7dc01ec4096afaf561899921c95d9ad80e3474a5306eaf68af331462bf901809,2025-04-29T17:15:36.297000 CVE-2022-36900,0,0,88a56468b6029812a02c8ad6795d8101fdf0cf2db3a8b1d79d50a2d468315c92,2024-11-21T07:14:02.023000 CVE-2022-36901,0,0,aba33046ba34014635dc15e7e9b9eab2537fbeb8cbc33ccba09f9443de110bed,2024-11-21T07:14:02.200000 CVE-2022-36902,0,0,0485ad46d8ea007759c63e3549a0b3613180745559b87ced5efaa354d3224d54,2024-11-21T07:14:02.390000 @@ -204811,7 +204811,7 @@ CVE-2022-37769,0,0,1131c1c40bba24b38e4f18d6dbf62771797a88c16daef5e5ede55a552aa11 CVE-2022-37770,0,0,e6a24a450b183f3df992b226ca8922d6d9f0cb36612f5d3947aca5fc991c6390,2024-11-21T07:15:07.663000 CVE-2022-37771,0,0,c435c2ea5a08ea9eab77e3228d573bc48051405f1a77aa84938e9427da8fe8fb,2024-11-21T07:15:07.833000 CVE-2022-37772,0,0,a7065c8a3001dba32a8d1815534cec1b7cd963cf097d122f4f75167babf8566a,2025-04-25T21:15:33.393000 -CVE-2022-37773,0,1,27dcdca3e1164caa97b0e2405253d3b42e08e44d4f5c1bc172c25d899b7ef333,2025-04-29T16:15:24.507000 +CVE-2022-37773,0,0,27dcdca3e1164caa97b0e2405253d3b42e08e44d4f5c1bc172c25d899b7ef333,2025-04-29T16:15:24.507000 CVE-2022-37774,0,0,1ab40e8eaaa747ff8591a7d3895c9e57b2b6fc1652e09164fe64ec8e6db212eb,2025-04-29T05:15:41.630000 CVE-2022-37775,0,0,12c965c2a00222ac855331cf81104f7ac0aeda72169817e48cfb150684746494,2024-11-21T07:15:08.507000 CVE-2022-37777,0,0,39e2cc4b78334df67f1f755a61e3b84eca8b7b422b22734749b584814f7a31c4,2024-11-21T07:15:08.673000 @@ -205357,7 +205357,7 @@ CVE-2022-38391,0,0,3eadd82227967409ded972f38af55cd6e4625f44ba32797c9e0834d6e56f1 CVE-2022-38392,0,0,44817e045ae4125d17065a58ef8f1e5622a801f36038183aa5a2149a94ecc78b,2024-11-21T07:16:23.140000 CVE-2022-38393,0,0,2bdea3249244a3db4f2f91fe258364265a350e479ceea575b5846fe18250a149,2024-11-21T07:16:23.300000 CVE-2022-38394,0,0,03a37849033cca43d353bdd3a7434386940bde1e5468aaa908e605c6f788bdef,2024-11-21T07:16:23.430000 -CVE-2022-38395,0,0,cfcb668401bd5813de584737eff8c3891c56785144a5591936ff493fec406fce,2024-11-21T07:16:23.547000 +CVE-2022-38395,0,1,7d3d74d141d4475e0c15473e944327f0180fa0ae48768c4a836186f5f79479a1,2025-04-29T19:15:51.787000 CVE-2022-38396,0,0,ccf65267c7bff1abb00bf62b70955412f3eddde67edb5798b3f7912bcd529939,2025-03-25T21:15:37.403000 CVE-2022-38398,0,0,6a42f93d3fa9024783f093b7fe9aec6a4e04d54ba123711065cff063d6c513ba,2024-11-21T07:16:23.787000 CVE-2022-38399,0,0,fbdab86e47ac4bb6e6d4f4f54a6c9f624ce567cab1c9d585a8c551ba79061925,2024-11-21T07:16:23.913000 @@ -206865,7 +206865,7 @@ CVE-2022-40546,0,0,5f5d3aebcc48cecf47cc7b7407c593b8ac161931a55dcc2d69cdad822a9a5 CVE-2022-40547,0,0,4af42905107d7905ed1d5f4087f6481aa0b19dea82ad11629803276f70c8e947,2023-11-07T03:52:18.233000 CVE-2022-40548,0,0,073250bcfe35f88441b2472b52c16266371ab5d914db145e7fbe04ed4ce179bc,2023-11-07T03:52:18.480000 CVE-2022-40549,0,0,023abcbdf43041948ae12bcbc2bc25aff0061265a579b95a9ba47a8096235ceb,2023-11-07T03:52:18.740000 -CVE-2022-4055,0,0,5df4023bd4c645d6c54e2762ac11d844aefb44b4bb8f49f085e9b551186f9c92,2024-11-21T07:34:31.363000 +CVE-2022-4055,0,1,bdbaced5f5b60e57e98c267724e65f05df4ec4c28d14efd0c2fde8c4569d66f2,2025-04-29T19:15:53.337000 CVE-2022-40550,0,0,8bbb4852d1a106e5998cdb627b83bb3d6d2c8b7fa02599d04ab3a1e3edfa9208,2023-11-07T03:52:18.983000 CVE-2022-40551,0,0,c18bc460bb2ae933b738f64c8089badafc5f2ddd292e47f21ff639550ca42bee,2023-11-07T03:52:19.230000 CVE-2022-40552,0,0,01874a5d4e3675ec0ef92aabb31e513f51a910f9f89c22b17088ca704931890d,2023-11-07T03:52:19.470000 @@ -207129,7 +207129,7 @@ CVE-2022-40839,0,0,9c4f6d71bf8db2d2da608a99b3b7393c339b70195e1a092255f835d34bade CVE-2022-4084,0,0,5e8c548f9ce22b9941bc245d926c432330a219a2fa77854b51062212b7eac5d2,2023-11-07T03:56:53.097000 CVE-2022-40840,0,0,ec8706a480479610557bedfef938ca6e810156033a9c8971d4d9f14b0da640df,2024-11-21T07:22:07.693000 CVE-2022-40841,0,0,6ee65ff1ee7d9d8aa6b06b96e0aec6994b0e5d1376758a4dc9acd6e055c01ce9,2025-04-16T18:15:55.970000 -CVE-2022-40842,0,1,773ad69ed3991ca73cf7c697bc1014c6147905c7e9488de3d9cdc397f2a2bb36,2025-04-29T16:15:24.720000 +CVE-2022-40842,0,0,773ad69ed3991ca73cf7c697bc1014c6147905c7e9488de3d9cdc397f2a2bb36,2025-04-29T16:15:24.720000 CVE-2022-40843,0,0,dbc3b64bbae9e3003cb4a7d3be2b9844f1518f802d99f29951d3ef6d0feafcef,2024-11-21T07:22:08.140000 CVE-2022-40844,0,0,42d431581ef589b315c3d978062dc0a27eb1f8820567e5b1ce0eb85c1a9e98a5,2024-11-21T07:22:08.290000 CVE-2022-40845,0,0,841976951f1c9f397f9693c32bc8758dcc454d39eb41e7e93febd880628d6e4f,2024-11-21T07:22:08.460000 @@ -207152,7 +207152,7 @@ CVE-2022-40867,0,0,042d6541125802adab3964801a8040a0acf2f0f3ef3e1e8b60d734524bf17 CVE-2022-40868,0,0,60c8a80bd0a209e43499707fc870bb1aa8bc3ffaed7f64b1cb69d352610c918a,2024-11-21T07:22:10.717000 CVE-2022-40869,0,0,c5d215d7f397bc7fde518de3c3aa24deb5442f18503136986df6510b2fdc73d8,2024-11-21T07:22:10.860000 CVE-2022-4087,0,0,4cb34faf2eda212f2cbdfd9aede3eef5369c372c941d46f55706893bede0aacd,2024-11-21T07:34:33.490000 -CVE-2022-40870,0,1,012550ccd028219d8ec7e55b274117f285c0a53b31c0485a45568a477c82fbd3,2025-04-29T16:15:24.937000 +CVE-2022-40870,0,0,012550ccd028219d8ec7e55b274117f285c0a53b31c0485a45568a477c82fbd3,2025-04-29T16:15:24.937000 CVE-2022-40871,0,0,d6f22e0bf55ae4ed352247990f50fe4e82c894092780b0864076f05e4d6a85b8,2024-11-21T07:22:11.160000 CVE-2022-40872,0,0,959d4c89216a010bfd212c0037fd18f2e251c15f9577564e36040c3f54e350fb,2024-11-21T07:22:11.300000 CVE-2022-40874,0,0,a36cf756045e4ee0b4e3396dabb925af318be2fb13c30d3dcbb2ffdaeb2344f2,2024-11-21T07:22:11.443000 @@ -207373,7 +207373,7 @@ CVE-2022-41123,0,0,c21f7ec46912883651196d10160a60b8e8210f5760e35c9197740e4c6b410 CVE-2022-41125,0,0,8d8af01c383f5a8f052575c5522ee85b37c5b7b849b33c420f50f1a231868c9b,2025-02-24T15:47:00.947000 CVE-2022-41127,0,0,c5470238c8916101c4c113c61b86334eac0b25796dc9bb1b6c150173f84c4526,2024-11-21T07:22:40.220000 CVE-2022-41128,0,0,d1b2f3b08ec7b10cf790351788c74ae2812bac9abb45cefd77679ea8d280d08f,2025-03-07T20:50:20.163000 -CVE-2022-41131,0,1,eb05352b89fca9b4a7c83743beb0037ba1088b2b73c5215d0da11cf2e27e7d4b,2025-04-29T16:15:25.140000 +CVE-2022-41131,0,0,eb05352b89fca9b4a7c83743beb0037ba1088b2b73c5215d0da11cf2e27e7d4b,2025-04-29T16:15:25.140000 CVE-2022-41132,0,0,0021f0455ec0c801bddfc18c16a84c11f48d6765338ebb1892496f988aa9539f,2024-11-21T07:22:40.620000 CVE-2022-41133,0,0,ab83932016bc2710fa33a83a4af239bea65fc8ffc549c1152d8cb884b7c238a9,2024-11-21T07:22:40.770000 CVE-2022-41134,0,0,d7a8f7b2bc4f726bd651d997603bfed025ceae07c87a53d855f9b2ecd1fa642b,2024-11-21T07:22:40.890000 @@ -207403,7 +207403,7 @@ CVE-2022-41155,0,0,cbc7d25081657531db9110844739e25963a26339ae376602b153d9c074c61 CVE-2022-41156,0,0,56e2e1fa100651186f721e91f6539c4fa3907ca75cb7a858e2d5f83dc8287243,2024-11-21T07:22:43.607000 CVE-2022-41157,0,0,b6428cbc23b858010a51bb15f4c456d5b7f2bba14f7a1cb580020fc82758d5ad,2024-11-21T07:22:43.730000 CVE-2022-41158,0,0,abde9b77c1839d2ea83f9645aa89407334638d1efeafc6d5719b64fe6a852a63,2024-11-21T07:22:43.853000 -CVE-2022-4116,0,1,8bd0f8b2c989fe55a44cb27a730636b34288aecbd24756aa7a0c5cc74e14a05d,2025-04-29T17:15:38.553000 +CVE-2022-4116,0,0,8bd0f8b2c989fe55a44cb27a730636b34288aecbd24756aa7a0c5cc74e14a05d,2025-04-29T17:15:38.553000 CVE-2022-41166,0,0,a76a71b0948f97da4b90ede949cd85c4f503075b34cefdd7ed25e366da0008d5,2024-11-21T07:22:43.977000 CVE-2022-41167,0,0,be372b800f5eb807e33f8f0dba16ef891e6b620251459dce333642808caf7832,2024-11-21T07:22:44.113000 CVE-2022-41168,0,0,f32acecbc45220e30b28b26f06675f9fbaeca50f2651eca40ca67fe674b4177b,2024-11-21T07:22:44.267000 @@ -207564,7 +207564,7 @@ CVE-2022-41322,0,0,7503af9137beececfb5a4ee662aa298e14eef98d6fc4a49428eb7656b0f32 CVE-2022-41323,0,0,e1a5768df6d800eb1ea9486a88e41024d34c051a6ab2b5da499d2fdd6cc241cd,2024-11-21T07:23:02.917000 CVE-2022-41324,0,0,43a4a02f46329791d6d12d6a03f7316ccf999fb568183f73324949202c280615,2025-03-14T01:15:37.990000 CVE-2022-41325,0,0,e624a2921b095904b5114b3c6e98e0cc00296ee3eac1e05962f9fb4924e8a2f5,2025-04-23T20:15:41.417000 -CVE-2022-41326,0,1,c7d984d116efcf71762f2ba2f8f3a0f313335ecef476505d90e0725631d5fca4,2025-04-29T16:15:25.330000 +CVE-2022-41326,0,0,c7d984d116efcf71762f2ba2f8f3a0f313335ecef476505d90e0725631d5fca4,2025-04-29T16:15:25.330000 CVE-2022-41327,0,0,dcb7de65540a5f5035a41930d6615f75291414b7c854058707c94a45bef64fb5,2024-11-21T07:23:03.590000 CVE-2022-41328,0,0,7a04b10cf86922c1d28a494aca63741ad390271903df25c5ebf68f0b665d0df3,2025-02-24T15:45:02.397000 CVE-2022-41329,0,0,1b16c7187db0e7d1a72a4edf56e92688062cfaeada5519fbf5963836dfe109a5,2024-11-21T07:23:03.940000 @@ -208997,7 +208997,7 @@ CVE-2022-43135,0,0,5f52f089226dd60a83b3618a46f3f76a0f0a1b462fd33efd8408bc88757a6 CVE-2022-43138,0,0,76d290a775639434284c4f96d9c851e3f696d343fa7835c0756314b22ca4d30a,2024-11-21T07:25:58.543000 CVE-2022-4314,0,0,b2d7e2c2d34983b5612bbe613ee90b322bcf58c270b648e62d25d8832fa87daf,2024-11-21T07:35:00.987000 CVE-2022-43140,0,0,0f31a8aaf78a97f6aa0f2934b7d57f151d32a54ad6fc5a361944a1acc07369ed,2024-11-21T07:25:58.720000 -CVE-2022-43142,0,1,8a22fc2eb35900f908f884c1ac55d8d632fa2450cacd301c94373997ac788ac6,2025-04-29T16:15:25.667000 +CVE-2022-43142,0,0,8a22fc2eb35900f908f884c1ac55d8d632fa2450cacd301c94373997ac788ac6,2025-04-29T16:15:25.667000 CVE-2022-43143,0,0,868df4c4bb9b71ab79398441260504ea4a2d34397197a776dbb7b3925861a3e4,2024-11-21T07:25:59.070000 CVE-2022-43144,0,0,b4d526f2c0777c15dfcdb374db47406c2f99a3af19d967e0e1257848d30d33f4,2024-11-21T07:25:59.257000 CVE-2022-43146,0,0,84fc36b0fa34c0e6ead69551bc9e1f56df82e44d1b7de7fb090389def45d5436,2024-11-21T07:25:59.457000 @@ -209005,8 +209005,8 @@ CVE-2022-43148,0,0,e88598e3e00227e7df01cb914dc1a11f6419c5e39f486159d9588bf142ad7 CVE-2022-4315,0,0,589cd86586bec174ff140f0732f6950973899f093feb268cbe72598f8fca0d1a,2025-03-04T16:15:33.893000 CVE-2022-43151,0,0,ec89dabd3a8fe8d38444eb7088f65645800c95a944f74fc4a0c9106f179d5e70,2024-11-21T07:25:59.777000 CVE-2022-43152,0,0,7758037884cb4ab135d613748ea4d21af54b5940bb82e54694efe5a64eaf1a18,2024-11-21T07:25:59.940000 -CVE-2022-43162,0,1,1e83104642839144dd52a90380c945e57b1d6916c802f2c102ef2ed3ccac1858,2025-04-29T16:15:25.870000 -CVE-2022-43163,0,1,b03a4a2d858fbcfbf435725b0ee3a045215558d825951d9d7cfec92f5c441303,2025-04-29T16:15:26.073000 +CVE-2022-43162,0,0,1e83104642839144dd52a90380c945e57b1d6916c802f2c102ef2ed3ccac1858,2025-04-29T16:15:25.870000 +CVE-2022-43163,0,0,b03a4a2d858fbcfbf435725b0ee3a045215558d825951d9d7cfec92f5c441303,2025-04-29T16:15:26.073000 CVE-2022-43164,0,0,aa932f0254b24bdb8c9ea4b88d49d3a3e6b61c4baa8551413acabafd524968c0,2024-11-21T07:26:00.420000 CVE-2022-43165,0,0,066ddfbcc2d67a74021b3c4631512d163b791f656895727f00d48f689e374b3f,2024-11-21T07:26:00.610000 CVE-2022-43166,0,0,1413fcd78fe9021f9b7bc1a6e02c10a3d026a9220bb1d99fe54f10e5cf7c36f9,2024-11-21T07:26:00.777000 @@ -209015,13 +209015,13 @@ CVE-2022-43168,0,0,9eba87556e8cbe83fc275de2df812c86336baefda15001944e22ef9c3edcf CVE-2022-43169,0,0,e8429b27238a76e9689091d09bc7aa6b6c359eef4cddbc697b3961225bc9b9d6,2024-11-21T07:26:01.327000 CVE-2022-4317,0,0,129460015c64a06d9c4ecf94aa85ff83dcfc339d9f91f59393a1387de892388b,2024-11-21T07:35:01.367000 CVE-2022-43170,0,0,7632ade3a31daeb570e7b21599965a233dc62211db5f6d20ab030ecf204006d2,2024-11-21T07:26:01.503000 -CVE-2022-43171,0,1,b58c87f50e4673b4757ac1859c2d5ecec9165c56dfe4150391845f3c602b862e,2025-04-29T16:15:26.273000 +CVE-2022-43171,0,0,b58c87f50e4673b4757ac1859c2d5ecec9165c56dfe4150391845f3c602b862e,2025-04-29T16:15:26.273000 CVE-2022-43179,0,0,e65adff0048624c939bd49998f2ff5afd31a5f243b9781b36b3f43459fb81ab5,2024-11-21T07:26:01.870000 CVE-2022-4318,0,0,51eac9125069cd063ad5a0f1abf52be9508b1742f55fa371ebcab2f42175bb9f,2024-11-21T07:35:01.550000 -CVE-2022-43183,0,1,4e1569343d39a630ab0c2ace859379f3bb752f59ab7e2189772e38b961e4a3eb,2025-04-29T16:15:26.473000 +CVE-2022-43183,0,0,4e1569343d39a630ab0c2ace859379f3bb752f59ab7e2189772e38b961e4a3eb,2025-04-29T16:15:26.473000 CVE-2022-43184,0,0,16e81c01274e9b757aa5044d6011ac631b77d16cd6dc7525b14bc8b21cd6a112,2024-11-21T07:26:02.330000 CVE-2022-43185,0,0,c7e068b381f7cefff3e0c90b6430726ab92b680dde480143582234e7f6c623a0,2024-11-21T07:26:02.537000 -CVE-2022-43192,0,1,b5103a836155877ac6dbdbb85ecf5a05cfc4f5fb4aa0cf08ab9bb94cc02d69a3,2025-04-29T16:15:26.667000 +CVE-2022-43192,0,0,b5103a836155877ac6dbdbb85ecf5a05cfc4f5fb4aa0cf08ab9bb94cc02d69a3,2025-04-29T16:15:26.667000 CVE-2022-43196,0,0,d6b4c588b3aaebb946e17154fe0777a7e4070c662db212fe3a1b019ee6cb7866,2025-04-28T18:15:45.030000 CVE-2022-4320,0,0,9b081f913f5eb4a2ca106bf7d0c28a39065b49b49d8418d172f5b052de33da5c,2025-04-04T19:15:42.950000 CVE-2022-4321,0,0,53cca62a0435d9a9909d1296bdaa42a8cdcbc9a693ab7d58ff9d1dc3b5edf5e3,2025-03-26T19:15:21.120000 @@ -209793,12 +209793,12 @@ CVE-2022-44149,0,0,abbc37e8d5bf575402448fd4d68f79d6e4fc8a7b7b407b050e33a4a5b3b23 CVE-2022-4415,0,0,5aa7a66228d5a54f2932bd5226e9325d4768b37a7b4cfcd56dfcfb03950df262,2024-11-21T07:35:13.597000 CVE-2022-44151,0,0,f9ca830389bb5afdea4378ed3bb97a1019c9939cdadadf797bf55e0dde6c4401,2025-04-24T20:15:25.550000 CVE-2022-44153,0,0,e393d7fb7b6d6c7eca80c467cf04bb34b68aa1cdba61ca7bdf21ceb0a1fb706c,2025-04-23T16:15:26.397000 -CVE-2022-44156,0,1,4fa79cb670dc409a60c085a14610acfbe9f9bd45c6a72567de26f8992a34ea42,2025-04-29T17:15:36.917000 -CVE-2022-44158,0,1,22c4db351b1e61064d5c00b97f5e76dc8c7969e55420806c0f8cfff0dc695bea,2025-04-29T17:15:37.350000 +CVE-2022-44156,0,0,4fa79cb670dc409a60c085a14610acfbe9f9bd45c6a72567de26f8992a34ea42,2025-04-29T17:15:36.917000 +CVE-2022-44158,0,0,22c4db351b1e61064d5c00b97f5e76dc8c7969e55420806c0f8cfff0dc695bea,2025-04-29T17:15:37.350000 CVE-2022-4416,0,0,f0dac3986e6803edcb4d8fa6640461c530a241202b562ee9d16a515a45ad1226,2024-11-21T07:35:13.730000 -CVE-2022-44163,0,1,f477958457858860f5399522df1792dcb2791b9356f3d294f7be758e3c2c5bb1,2025-04-29T16:15:26.903000 -CVE-2022-44167,0,1,4d715678f0a13c0cab7b5f50e18c1967e4f0425d4506a5e4e9a2029e47368ee5,2025-04-29T16:15:27.103000 -CVE-2022-44168,0,1,d7f93881df1cff72e0d29c712e58441aea7451c347d25fea5d77c020422bda12,2025-04-29T16:15:27.307000 +CVE-2022-44163,0,0,f477958457858860f5399522df1792dcb2791b9356f3d294f7be758e3c2c5bb1,2025-04-29T16:15:26.903000 +CVE-2022-44167,0,0,4d715678f0a13c0cab7b5f50e18c1967e4f0425d4506a5e4e9a2029e47368ee5,2025-04-29T16:15:27.103000 +CVE-2022-44168,0,0,d7f93881df1cff72e0d29c712e58441aea7451c347d25fea5d77c020422bda12,2025-04-29T16:15:27.307000 CVE-2022-44169,0,0,fcfb67bb00807c15733ec02308009fbc214073a7a4efdc87e30893afb5aaaba5,2024-11-21T07:27:41.317000 CVE-2022-4417,0,0,56fbc4740ad013ee2c4b017a21392ab165c979da6f02a5d7721761fcb6b4a05b,2025-04-10T19:15:54.483000 CVE-2022-44171,0,0,4c02f29348f600d7cbb70cd1bbe104534e7fc50e134a2515fe1f039fbb6c36ed,2024-11-21T07:27:41.463000 @@ -209919,7 +209919,7 @@ CVE-2022-44370,0,0,f4e16b34f6af07c0f639267317406f0d47d22b553c04017ee06c22c15666b CVE-2022-44371,0,0,8764443fb004b13e9f6ecca29e678408b858a6227fbe8e21e4759f842ae1d336,2025-04-23T14:15:23.333000 CVE-2022-44373,0,0,eb0fc8fb06a7ba3c76b5dec82db3df66428056f66d6a00764c87cd18c2889ee8,2025-04-23T14:15:23.517000 CVE-2022-44378,0,0,e154b0a711240813b022f487e9fb8849bb14f762d583084373e5b0982a813edb,2024-11-21T07:27:56.650000 -CVE-2022-44379,0,0,2ce341742e0a0033f20c097d723c61c592c5ba0003d639909558274dce86df52,2024-11-21T07:27:56.793000 +CVE-2022-44379,0,1,84900714b862824db20a17239e0bb32daec84bacdee2b7c6aa11c6fc779f9aff,2025-04-29T19:15:52.057000 CVE-2022-4438,0,0,01a8c55413bf44231b91007a4a9fba71d74f3071782fc299ece34ef0621107b7,2024-11-21T07:35:15.770000 CVE-2022-44380,0,0,d351aaf3ec06429312590456e619ba9c085c0c996ae982a9a0f32f7df13d46ba,2025-04-15T14:15:35.050000 CVE-2022-44381,0,0,6a3a0c5a535890405afcf8f40b18ae4414988866133184bd9fce3f804bf1a2aa,2025-04-15T14:15:35.233000 @@ -209937,9 +209937,9 @@ CVE-2022-44402,0,0,07340ff8c68885b52110a22a1f926c781c10d55207b1c90a4a4f46bdb453e CVE-2022-44403,0,0,413614f2ab0ff58c43b940ec1fb2c132788b43e11d8c3b10fe522a5d47223149,2025-04-29T15:15:51.460000 CVE-2022-4441,0,0,8692545c77d7300ae25e74c8c9458997b63d2a3041fad8384f7de436b4abf3a0,2024-11-21T07:35:16.117000 CVE-2022-44411,0,0,6ddbb2c50b04ecba738b6ce7febcf3b8a9ec7e30097a578c006b13b797e8040a,2025-04-29T15:15:51.657000 -CVE-2022-44413,0,0,6a62ebb5d24cd2de0996250fc6339c605c998d176b623742dab65c51155c67a1,2024-11-21T07:27:58.767000 -CVE-2022-44414,0,0,b71d6403569be8c16e0e037b382af26d2dc1abe034d965988ece41662b9159a3,2024-11-21T07:27:58.900000 -CVE-2022-44415,0,0,178d0be67a325f02fd2c67522d81dd1b7826c40d5252346c500ba9bcbd749950,2024-11-21T07:27:59.040000 +CVE-2022-44413,0,1,6df29576d93cf678030ef7faf5a3a87a99a0d545b1702f0e925d554188875fb7,2025-04-29T19:15:52.243000 +CVE-2022-44414,0,1,f660064df4aebc5471c6d6230713daf05254880d1d95ed818b2df6c8918ba454,2025-04-29T19:15:52.423000 +CVE-2022-44415,0,1,76e0a0e6e52409501aa7e6a44f0dc0e639adb37ea43ac204bddefcd0f95cd7d8,2025-04-29T19:15:52.597000 CVE-2022-44419,0,0,6a727dab633571fe6481c53cd72e4e8c2203bb1cfca28817af1e0d0544a9e61b,2025-01-28T17:15:08.797000 CVE-2022-4442,0,0,420168bcc0a0834b5bb3cbee4401713f23ea4c408f19aeb110bcd2a8d0bb0946,2025-04-04T19:15:43.110000 CVE-2022-44420,0,0,a85fc762ee45f344cf3503d11aa65ca22215f5cf4f451fd29b0f7ac3ae73574e,2025-01-28T17:15:09.023000 @@ -210108,12 +210108,12 @@ CVE-2022-44637,0,0,da7a53295a19af466bc4ca27b53eda2bd51c45808487aea816d1ed7230628 CVE-2022-44638,0,0,cd4dfe11fbb405feccdca7af9c78159d06c16ecbe89ded61e0cc6f9a854d2a6b,2024-11-21T07:28:14.783000 CVE-2022-4464,0,0,259a9f4962efef21c077a96a1ba131ab972940338700bdf9187b508a3513d6c1,2025-04-08T20:15:18.080000 CVE-2022-44640,0,0,94295028d217e3bb0ba173183320ca472590524abf08221d862f20011148710c,2025-04-15T14:15:35.400000 -CVE-2022-44641,0,0,bd2b96429909ff706fa61227d6b2ac49b53ec04af7472e2114c8fb9702398be2,2024-11-21T07:28:15.090000 +CVE-2022-44641,0,1,d75b937fc40957b972663db2ec5dd3dfa090ca4ade618888c0c1a44fca317f39,2025-04-29T19:15:52.773000 CVE-2022-44643,0,0,62a3726819a40e5d0d90636f75929bc30298540ef0461aad727017727c14ed2d,2025-04-15T20:15:37.970000 CVE-2022-44644,0,0,4d7b760cc71922cb9ca36a3bf21d046887baca0d6b380f84ce22fa5a02ddb537,2025-03-27T15:15:37.987000 CVE-2022-44645,0,0,a56d709a99d6658ef46d4957ab493b6561f0fe1e90c01181d5b91337f97e0e4d,2025-03-27T15:15:38.180000 CVE-2022-44646,0,0,d783dbc904347bb1878a4a5a46b20ed6619c1485867a49a7b7f3a5f7cbed555a,2024-11-21T07:28:15.670000 -CVE-2022-44647,0,1,fb9185a5760e7bc25aae11578c352989749b23c9b9a435c47d90b71eb2aca93b,2025-04-29T16:15:27.507000 +CVE-2022-44647,0,0,fb9185a5760e7bc25aae11578c352989749b23c9b9a435c47d90b71eb2aca93b,2025-04-29T16:15:27.507000 CVE-2022-44648,0,0,9369db599ce716124178cb732eeaa81b9d9ffeed7628bfeb3c8d2c9fcc166378,2025-04-29T05:15:45.637000 CVE-2022-44649,0,0,641ab5d3d4e2fa58ecc88d78906c29db49bfe97f6d83172a794f82e185bd9a7f,2025-04-29T05:15:45.977000 CVE-2022-4465,0,0,d2f5d8b44bfb065ded984db03f021ed054b7f882541e456d2861bb3cba845702,2025-04-07T19:15:47.313000 @@ -210214,11 +210214,11 @@ CVE-2022-4476,0,0,467789df039b3f4275ebd3d97e22e25f068e3e55e3f6f7767a7b3e51cf0e33 CVE-2022-44760,0,0,2c3f246a3e21e1097ce37e28cdc279a8a2b8c6ebe3449da0c3b913fcfed6dc44,2025-04-29T13:52:28.490000 CVE-2022-4477,0,0,fa9cba1594aeeaf90cc1ad03c46fb13b02b004d2cd24183c4a9e6f95e00f35b7,2025-04-04T18:15:45.060000 CVE-2022-4478,0,0,4862a5f08f536e92f6721c67992dbdcb92edbf6d65e257b7328382645769c101,2025-04-07T17:15:35.497000 -CVE-2022-44784,0,1,a33b66c50ce511feec9cd211b813f7d1635ece95e3021b2595cac0394c6511de,2025-04-29T16:15:27.690000 -CVE-2022-44785,0,1,3b5e41e5ad9270e2ad0f0c3ae2e70e652da672f8ec2d143a830972d60aea454c,2025-04-29T16:15:27.890000 -CVE-2022-44786,0,1,6027cf06801f1688fbce93552c761e7a4c8ee6b3f89a7e9af640e25f91e0de45,2025-04-29T16:15:28.080000 -CVE-2022-44787,0,1,bf86edd30997888f8785232b7f5f1f51899bee00e24007eb92156a9b68aa4580,2025-04-29T16:15:28.310000 -CVE-2022-44788,0,1,153347ce37268def5144855b0ba701031f4d45693ff7dd1622315b862e1c6f6e,2025-04-29T16:15:28.513000 +CVE-2022-44784,0,0,a33b66c50ce511feec9cd211b813f7d1635ece95e3021b2595cac0394c6511de,2025-04-29T16:15:27.690000 +CVE-2022-44785,0,0,3b5e41e5ad9270e2ad0f0c3ae2e70e652da672f8ec2d143a830972d60aea454c,2025-04-29T16:15:27.890000 +CVE-2022-44786,0,0,6027cf06801f1688fbce93552c761e7a4c8ee6b3f89a7e9af640e25f91e0de45,2025-04-29T16:15:28.080000 +CVE-2022-44787,0,0,bf86edd30997888f8785232b7f5f1f51899bee00e24007eb92156a9b68aa4580,2025-04-29T16:15:28.310000 +CVE-2022-44788,0,0,153347ce37268def5144855b0ba701031f4d45693ff7dd1622315b862e1c6f6e,2025-04-29T16:15:28.513000 CVE-2022-44789,0,0,c2cbbed4386e9a61817deafb41f161fd0868dcf0eae9d0da8d34af92bba1057f,2025-04-25T20:15:35.677000 CVE-2022-4479,0,0,531de5b4547c24cd49254e640831ce039c38e992c04d4f424d7b4a70439979c7,2025-04-09T19:15:46.080000 CVE-2022-44790,0,0,71a7901b8de6c136144b4452f1d70c0ca5c68049086e2189ab53edf7641e1b4e,2025-04-23T15:15:53.120000 @@ -210236,9 +210236,9 @@ CVE-2022-44807,0,0,e3277e96961404031d95179ff291c3e99d342999e7260792925c8ceee019c CVE-2022-44808,0,0,4412ed5ab0df74169f1f268d815ee8157a51e2f2caa8717762f937c621b381ac,2025-04-25T21:15:35.360000 CVE-2022-4481,0,0,da73cddd26c79a78c4f8c7d0b882c57aab6f3141715dbfa6e346cf4c908a1823,2025-04-07T17:15:35.713000 CVE-2022-4482,0,0,148453268811ff6a98c89dbada4ca5bd175fac48f4a07e6ea20e99c247b188d1,2025-04-04T19:15:43.437000 -CVE-2022-44820,0,0,983eb0c0c9ef3521386c511e70613a1e6fc2530624b8e7447286ca7ceb4c9aea,2024-11-21T07:28:29.283000 +CVE-2022-44820,0,1,29754cf83253006416871c19b9e2795d61fc0c3ea6578ac68a44838fdab31e06,2025-04-29T19:15:52.970000 CVE-2022-4483,0,0,7551eba602b372786f7ade92fc3e8f29917a2fb615a80923df06a0f85c40bac2,2025-04-04T18:15:45.227000 -CVE-2022-44830,0,1,9b308b308b1207523e3456c0a2055c4c84aba306edb992bf64c697042112865f,2025-04-29T16:15:28.697000 +CVE-2022-44830,0,0,9b308b308b1207523e3456c0a2055c4c84aba306edb992bf64c697042112865f,2025-04-29T16:15:28.697000 CVE-2022-44832,0,0,a062988e538bfdbfcba1aa70a5f20670d4de33d2420a400b3e0de9b5ef27fb2d,2025-04-22T14:15:22.500000 CVE-2022-44838,0,0,d5cb6dc9dedea86cb9a06f367473df4fcd21f3881ce4720100ea57ac680c62e4,2025-04-23T15:15:53.273000 CVE-2022-4484,0,0,d36f936d86e1490741f7335e2311cd794f3bd9da3ac1c9068866f1b71d251bf4,2025-04-08T20:15:18.410000 @@ -210306,10 +210306,10 @@ CVE-2022-45008,0,0,3127fb4524be6da95c7c394778d50204e85a64a5dfffd7df37d251376e1cc CVE-2022-45009,0,0,5d67f5f2843a663df8296b7a96e471dd06dfcec5bc079422ac473df507c2ed65,2025-04-23T14:15:25.183000 CVE-2022-4501,0,0,8184c5973d6127d321966758a3efd011d2896eda25e506425d4fafdaea3d09cf,2024-11-21T07:35:23.293000 CVE-2022-45010,0,0,68f464e74916729b1e2dc7da8292bdbfebfd642060c0b1b8250d6883e1f8e2c5,2025-04-23T15:15:53.643000 -CVE-2022-45012,0,1,35e21721dc0bdbc6af5268ac170cfd8180db1dd4051523ad5161a7038e24871c,2025-04-29T16:15:28.893000 -CVE-2022-45013,0,1,9ddd541367ad68ebf1cbdd41ea865fc894923fba3cc61f5a3d7a82c664c34c98,2025-04-29T16:15:29.090000 -CVE-2022-45014,0,1,7e19db44c539aa4324eafd8b881d04778ee2ee601800d498280cd6ee85d1805d,2025-04-29T16:15:29.287000 -CVE-2022-45015,0,1,00d5dc8b42256248af88d333288657c2e8f18d35adff96d475c3e07f216bf23b,2025-04-29T16:15:29.483000 +CVE-2022-45012,0,0,35e21721dc0bdbc6af5268ac170cfd8180db1dd4051523ad5161a7038e24871c,2025-04-29T16:15:28.893000 +CVE-2022-45013,0,0,9ddd541367ad68ebf1cbdd41ea865fc894923fba3cc61f5a3d7a82c664c34c98,2025-04-29T16:15:29.090000 +CVE-2022-45014,0,0,7e19db44c539aa4324eafd8b881d04778ee2ee601800d498280cd6ee85d1805d,2025-04-29T16:15:29.287000 +CVE-2022-45015,0,0,00d5dc8b42256248af88d333288657c2e8f18d35adff96d475c3e07f216bf23b,2025-04-29T16:15:29.483000 CVE-2022-45016,0,0,f7504cbfca22df0e262b5abce134b506a43f9722bb168393b60428a2bbc4b5b3,2025-04-29T14:15:26.727000 CVE-2022-45017,0,0,df8688cd3a12746b9a6491845d49864edb5845aa98855793dcb11c03c162d764,2025-04-29T14:15:26.937000 CVE-2022-45019,0,0,52a162ea5e87a7009304a2315999ae4a64825101e69479974d8bdeb41da7da02,2025-04-24T14:15:40.320000 @@ -210661,7 +210661,7 @@ CVE-2022-45470,0,0,80566dceac7a6cec6734ac1bb3128dbc6b7a57cb0e527f8e974f3e0987e2e CVE-2022-45471,0,0,559a6e87408c334e4456c48307db55502b98bc2d1450613e64712caf20994238,2024-11-21T07:29:18.520000 CVE-2022-45472,0,0,21957b961a2b40f75b3b33b39845961d374085e4c6d52e2e3df939569be290a8,2025-04-25T19:15:47.447000 CVE-2022-45473,0,0,950e04aa97a1f2a1b81a40a1e88bed2d0f055b87af1fec2d92866f355f6e6629,2024-11-21T07:29:18.763000 -CVE-2022-45474,0,0,8504c595d6ef5d44bb01da1f073b7e9e23dd9af444fd9da25e25dea9be6df555,2024-11-21T07:29:18.897000 +CVE-2022-45474,0,1,0fad0eee4a1b0a69698057dca62119b05e9cc4a20a282bda1fb9d26bb7d17e91,2025-04-29T19:15:53.150000 CVE-2022-45475,0,0,c0e6bb9934d5d03ca39fa1e399952b5a10260dd300dc1ed11357f59775084fa0,2025-04-29T14:15:27.767000 CVE-2022-45476,0,0,d4fdafe941b37e25ef536e24a579a780d65470e38d4bae2d6e494d4792027e68,2025-04-29T14:15:27.947000 CVE-2022-45477,0,0,20fa9b8bad1e2d07cdd9609eb8dee7adf3db16988d9cc8a8a7214c86df1ae0c2,2025-04-24T14:15:41.243000 @@ -210714,7 +210714,7 @@ CVE-2022-45527,0,0,62d18ee6ddcdae5a65810a9b91c9a6b337423d63cc19d777685022976af01 CVE-2022-45529,0,0,7866dbc454233faff8abb9a422ce99550a6a699a38c827406b34643404d1ed43,2025-04-25T21:15:35.910000 CVE-2022-4553,0,0,9ed4806ed7e3908505e5be76e2948e005ae9f1103ceb96eaa0927ee172c9689d,2025-03-27T20:15:17.530000 CVE-2022-45535,0,0,b669e6f1fe370c5ab0a681b531b5ca9b9040bafd996a1940ecdfc1883cdd9a59,2025-04-25T21:15:36.153000 -CVE-2022-45536,0,1,d2c3775049e3a36613aa7fe2db689b2e563ce6327feaeda13cdfced2d7edbf34,2025-04-29T17:15:38.267000 +CVE-2022-45536,0,0,d2c3775049e3a36613aa7fe2db689b2e563ce6327feaeda13cdfced2d7edbf34,2025-04-29T17:15:38.267000 CVE-2022-45537,0,0,afe4682e430cfc9f110bd2e21bf745f1d20fca53c12f6ac909d65939ae15e7a2,2025-04-03T16:15:23.873000 CVE-2022-45538,0,0,255503c90028dc0e7512b3d5a6d7d521ebc633e6a328dada603f07b7634a3c62,2025-04-03T16:15:24.087000 CVE-2022-45539,0,0,49f6dd5a88685d98a8d048b014f4c8a092918e4c94ee9691b0a8da095726f1ef,2025-04-03T16:15:24.280000 @@ -212813,7 +212813,7 @@ CVE-2022-48623,0,0,36b40d73baf0aa0e574ac39123b25f61f9a9cd0abff90b96d80fc828fe2fe CVE-2022-48624,0,0,fe64ed38fe13a499d25616f11a46f75e98f1158513a0602381fee9bc6ba48442,2025-03-27T15:15:41.153000 CVE-2022-48625,0,0,adeb46aa01e6cd1846fc987b0d61ad8a1bf52c6efe3850b8e7a069a549d88cd1,2025-04-02T20:08:43.673000 CVE-2022-48626,0,0,9d4f63da0a918f51b7c85b0ffa7c98eb3b3f0bdfe14eedcb544bde294c904c2d,2024-11-21T07:33:38.317000 -CVE-2022-48627,0,1,7662abae4f4de6aa8df3abb391a54447b30691fcc7d0ae6f428fbd366658ef95,2025-04-29T16:51:43.093000 +CVE-2022-48627,0,0,7662abae4f4de6aa8df3abb391a54447b30691fcc7d0ae6f428fbd366658ef95,2025-04-29T16:51:43.093000 CVE-2022-48628,0,0,38c6820367758e57858643c90208981922cfb44dfdb56b80c9489f9ea4749b42,2025-01-13T18:26:13.343000 CVE-2022-48629,0,0,61e95796ad26cabbf634a5891e412934a1a901a2d9e6e15e591b6dbf1939873a,2025-02-26T07:00:18.270000 CVE-2022-4863,0,0,d4d829a1beb8e4fd89587644cb89a6f79551c4f0525d6fe5f92668872dbe819d,2024-11-21T07:36:05.650000 @@ -241234,7 +241234,7 @@ CVE-2023-52508,0,0,528f16be09e5d5362602fc12ae9cfda59d8187579acdf48d49ebf8a1d0fe5 CVE-2023-52509,0,0,4c32e1e52d82db6d2e5e667f80062d77bc1fa6b92446d15ee14c1f6c6f544cf4,2024-12-11T15:07:32.760000 CVE-2023-5251,0,0,8e5d86dd8015f5ba5db53e53cb223d5ce43b5c6420566475d898b38e0a2f8a7f,2024-11-21T08:41:22.610000 CVE-2023-52510,0,0,1d4c660454b6d15905273fe738ffaa57f9a8f63fda4125270abeff81f8781f37,2024-12-11T15:11:16.133000 -CVE-2023-52511,0,1,b573b86e975683b561e086726000b6ade170a44ac1b00f8000d4f5805bb99a03,2025-04-29T16:55:09.583000 +CVE-2023-52511,0,0,b573b86e975683b561e086726000b6ade170a44ac1b00f8000d4f5805bb99a03,2025-04-29T16:55:09.583000 CVE-2023-52512,0,0,fd22b463b00293057aed54fd7ecc9bbc309bc9dae2d1cfa341dd2c7e4ed08203,2025-03-19T16:24:13.270000 CVE-2023-52513,0,0,97d7c95c4e6616756fc77008da3a9e34784f63a990f4286e2a5968551625134d,2024-12-11T15:12:45.753000 CVE-2023-52514,0,0,96b3bc37b65a7f0f11caed4828897554155b5e08fde97001434005eb59164e32,2024-03-11T16:15:07.720000 @@ -241361,7 +241361,7 @@ CVE-2023-52623,0,0,1fb9999cffc51a59ae798eb79d8c2a54bea9896e2a18a1ff22d36ea0944a2 CVE-2023-52624,0,0,98e72b581191e29118fa1c89adbf60abd3bebf0b4dbbef333bcc0e53d3126be5,2025-03-17T15:19:42.927000 CVE-2023-52625,0,0,d00ce206402348c1e8dfed55a457bfd186051d322171818247e0064bf0acddbd,2025-03-17T15:19:34.277000 CVE-2023-52626,0,0,dac91148ba6fe2abc0db519a71410013a94a0d9f29901030eede33be206dfdeb,2025-03-17T15:19:21.573000 -CVE-2023-52627,0,1,855f1604ec5de0958cbee40932f5096c2c20efb01a3b672f013d0a49bca7d9be,2025-04-29T16:34:33.813000 +CVE-2023-52627,0,0,855f1604ec5de0958cbee40932f5096c2c20efb01a3b672f013d0a49bca7d9be,2025-04-29T16:34:33.813000 CVE-2023-52628,0,0,3fde007300ab8339b5de4c0f6f892ef6ece799b0d0620cf6d8add943a9905090,2025-03-17T15:18:34.223000 CVE-2023-52629,0,0,eca57741c69ee95a3737f2fcda04a1dec7fc962f6db0548d10d46e36ddc68cc7,2025-04-08T19:28:53.087000 CVE-2023-5263,0,0,cf79e50f0f1b7619076e68c8fb3bbd8b2a6a7fa96228c9cab11bda71fc305d13,2024-11-21T08:41:24.237000 @@ -245455,7 +245455,7 @@ CVE-2024-10914,0,0,39a276f82f36a91e010722502bc5d8886eec360704c501aa8ecfcd8e9ec9a CVE-2024-10915,0,0,68a82fe4b392503ded9d3c9a1a33ecb75b64ce5b9688a8537852822fa25ab8a2,2024-11-08T20:11:10.973000 CVE-2024-10916,0,0,dbbadc49c06c450d0563acbfb5317dafa625bd4633965f94f3c2a276a36cede7,2024-11-08T20:11:37.567000 CVE-2024-10917,0,0,84897b64fd1cc994ca19c4da8d78c402e8655004c7da87e25c0ffb4739accfa2,2025-01-09T18:08:16.097000 -CVE-2024-10918,0,1,509779055ac251b000ac292adadd8471c30061c305c1ebb7e17b39c14ca164a4,2025-04-29T16:58:54.160000 +CVE-2024-10918,0,0,509779055ac251b000ac292adadd8471c30061c305c1ebb7e17b39c14ca164a4,2025-04-29T16:58:54.160000 CVE-2024-10919,0,0,a4fca0ec7b6734cff3fedeb0fb3f65ce81b1ec36f208b75326910d75e57a0ca8,2024-11-08T21:07:58.383000 CVE-2024-1092,0,0,47c9be5ad5d6bfb5c86e50521ea7c7460de8f4234d2b7a56d90fcf159ceb457a,2024-11-21T08:49:46.720000 CVE-2024-10920,0,0,10997ab5881a5c9919878f73260180896111aae5947a3688850b9ce0368be18b,2024-11-22T20:05:52.530000 @@ -246035,7 +246035,7 @@ CVE-2024-11498,0,0,84851bb97905888d6f795318663af36c64e8d0d26ed337ad244473b916cdc CVE-2024-11499,0,0,a966028160491791da709ee5dab2133093b1d72d985c5f69229a93bd1e155ea3,2025-03-27T16:45:46.410000 CVE-2024-1150,0,0,1edff0fc21d5f22172836448fdcc7da772ab8a792f462f53ba0bc1c0fbae9271,2024-11-21T08:49:54.780000 CVE-2024-11501,0,0,6aa155b5e971a466b4f7473002330671c6add4e056433a95089c7dc638a9cf0a,2024-12-07T12:15:19.783000 -CVE-2024-11503,0,0,ccfec7b9e7ee62b0fba4f13aa631b8746a746bacca8dcef766080a60ce07d27c,2025-03-27T16:45:46.410000 +CVE-2024-11503,0,1,3ae0c04581f944ca2a17b090f958bad8a2a522e19afa651f6889426cb90966c2,2025-04-29T18:11:43.417000 CVE-2024-11504,0,0,08041e39ea114511fb2c8f0bd997f2ba562d5b23bd65b19966d39dcea8b037ea,2025-03-28T18:11:40.180000 CVE-2024-11506,0,0,84ff33f5409ba7fdd242f7a002e540f941fbaac1999270cf94d333eb3dd6c642,2024-11-29T16:56:17.683000 CVE-2024-11507,0,0,f51856fd0c1fbab3042c354bc79fded82f076866bf612d2a253f6b3e90cd74a1,2024-11-29T16:55:51.040000 @@ -246476,7 +246476,7 @@ CVE-2024-1192,0,0,5063d16699b3db058d0f99170ded601d82fcfc6f39ec66d01e8a7cebfd4290 CVE-2024-11921,0,0,8d14fd5ac89466ae906ad741ca0367246b772d6837be889940ee25bf6694b61d,2024-12-27T19:15:07.850000 CVE-2024-11922,0,0,2942618a5e14b21f3f6592facd90027730b73a31d8c3edc5e237104115a0b4ee,2025-04-29T13:52:10.697000 CVE-2024-11923,0,0,4d6a80e3f288fbe3ed1bd4a1feabd18394fd01e27066d6fff1deb3858322387f,2025-01-18T00:15:25.823000 -CVE-2024-11924,0,0,b0fade09bdf4e5f73f5d8e0bf8c00c73d4e03700ed218e807b1c32d27e1d7574,2025-04-17T20:21:48.243000 +CVE-2024-11924,0,1,5b1de96e23f9981bac8569eb8ac0a895380896394a0bed875495e8928c627931,2025-04-29T19:10:33.087000 CVE-2024-11925,0,0,77043a2dc07077ec38aa584033543217cc9fb39ce00751159aa83ba0aa54cc6b,2024-11-28T07:15:05.267000 CVE-2024-11926,0,0,12ad1d9fc49995c8eb92feee3b52ec9fafd14557b209a764d700401682560722,2024-12-18T12:15:09.107000 CVE-2024-11928,0,0,4eb81c3b991253e17b093831750d2f60d8030675796e16e7e29cc29429037a0b,2024-12-10T11:15:07.220000 @@ -246661,7 +246661,7 @@ CVE-2024-12105,0,0,652104878b1388acf2a862591967482514a748c9cb01d37e99c6359ca0cc3 CVE-2024-12106,0,0,9e76ee608aca4c651df51a3d1911c7cd5490856624d29775a06f401fa9fe71c0,2025-01-06T16:54:14.560000 CVE-2024-12107,0,0,7da8659dc821ee4f071df4b42d3ae5a3881cc2b8cc55779739dc797df4a302eb,2024-12-04T11:15:05 CVE-2024-12108,0,0,a851d0a44f06acd627e09429b72e15713bd7cb0608174f612b61d76d8c8e9845,2025-01-06T16:51:11.320000 -CVE-2024-12109,0,1,646de59dada03de3d6378e093ce2c2b2bdca2aa0ae2afbd39140d9321facfe70,2025-04-29T17:57:02.620000 +CVE-2024-12109,0,0,646de59dada03de3d6378e093ce2c2b2bdca2aa0ae2afbd39140d9321facfe70,2025-04-29T17:57:02.620000 CVE-2024-1211,0,0,397f0a57816782a149057fa23cdd4cc111bc11210f8241f5a07dde7023689ae7,2025-01-31T00:15:08.863000 CVE-2024-12110,0,0,f266935beaa447960f1dea8d3421db64eefadfd0613c53fd8d2543de02327a47,2024-12-06T09:15:08.270000 CVE-2024-12111,0,0,94cbde89c1eb7b342ad5b2e1b90e676e3d9dc7b09262fa3ba8de5cb41e47a11b,2024-12-19T20:15:06.950000 @@ -247304,7 +247304,7 @@ CVE-2024-12764,0,0,520ef7a415b759131cb40460656f8f00fedd52ee179d3018b43ad66d1c2ea CVE-2024-12765,0,0,f7917c17906425e707a3ca48a19a2a85665883890f2e41423afe14a68f13711c,2025-02-11T02:15:33.873000 CVE-2024-12766,0,0,9649c1c42978a503b019c31f940763a525ea514d4d13ceba23be095167719680,2025-03-20T14:15:18.387000 CVE-2024-12768,0,0,9cdda843811199bf9b0e0359033a7a04598a7735ac6f0240aa5e3d0298e2cb55,2025-02-04T21:15:25.547000 -CVE-2024-12769,0,1,55524fcacc88be74a2aaad2cb01ce12a99e5536d12743064ed3841d6d460e936,2025-04-29T17:54:19.490000 +CVE-2024-12769,0,0,55524fcacc88be74a2aaad2cb01ce12a99e5536d12743064ed3841d6d460e936,2025-04-29T17:54:19.490000 CVE-2024-1277,0,0,2a6d3c94fab76f050717b5ee760be8ca9b7ac565da514f487f74b0cc7aeb5545,2025-03-04T12:34:06.490000 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 CVE-2024-12772,0,0,70f859d44122fb4ca5be07280e50277d8d4fcf200f73d5f17311f294bd9e06f4,2025-03-28T18:08:42.730000 @@ -248400,7 +248400,7 @@ CVE-2024-13857,0,0,46ee278a60377dbc07bab8543c121955c1e55c1b4db20bc16d6c8ff0081c7 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 CVE-2024-13861,0,0,943b4d9e940f881086bfb2c2b6c985590eabda3064bd5b4db698f19a14bb7ce6,2025-04-11T15:39:52.920000 CVE-2024-13862,0,0,ef9402f2508d8f4a3b847027ed1f2b28174cbe980a470d36b73fdaf3bc5aef7f,2025-03-11T15:15:41.180000 -CVE-2024-13863,0,1,c7caee7e5c93d81b9af8b0138e75c688fb9febb3d7538b5b3534c3b224573bb9,2025-04-29T17:35:22.800000 +CVE-2024-13863,0,0,c7caee7e5c93d81b9af8b0138e75c688fb9febb3d7538b5b3534c3b224573bb9,2025-04-29T17:35:22.800000 CVE-2024-13864,0,0,79f2620ac494e185761d80ba8360c70640e563c44b9ecf70b467e4018c0971e3,2025-03-11T14:15:20.570000 CVE-2024-13866,0,0,a701a4a58094c13382e4ccc07ff53f8edcaa8a7b85d65b60e80e37b7129c441c,2025-03-05T09:15:09.587000 CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000 @@ -248461,7 +248461,7 @@ CVE-2024-13921,0,0,193a441dc9f029f8dfe63503f89027443f108220564901261a7674b475c7a CVE-2024-13922,0,0,64d32f8cc001c0208e83a7173628a0ec2ddaa5056ca5adfd73e407425d14914a,2025-03-26T18:05:29.983000 CVE-2024-13923,0,0,64c138e5c400c66f92fa44454bcf781527d96c92fdabf9991413d4506432c205,2025-03-26T18:18:32.280000 CVE-2024-13924,0,0,6771f2a575eb9b234ba437c9c60a2d5807f8aded376287df6e1ca4c3782207e4,2025-03-12T16:23:39.567000 -CVE-2024-13925,0,0,3621ce0ca92e629d36ea5a233b2469a4b6caa68403ea41265aa09dc2eff5844b,2025-04-18T14:15:20.327000 +CVE-2024-13925,0,1,afa8eac4448faa812b1af69c0eb2175e5244d258ee36cbdce72c8dbea754cd2b,2025-04-29T19:09:09.200000 CVE-2024-13926,0,0,abe9c2cd13ede56532288215a47e8b8db2c9e5942c3880faaf48dd1c3d26ced9,2025-04-21T14:23:45.950000 CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000 CVE-2024-13933,0,0,6c1d1592227807572b59c7607e13d58cd1b568936f1ec0b9bb42956c7610a4b0,2025-03-19T12:15:14.003000 @@ -254234,7 +254234,7 @@ CVE-2024-26672,0,0,11deb996bf78e09a068e6a77cfcbd798fea3d714100b89f2b027e392eb2fc CVE-2024-26673,0,0,18126b23ebbb3349e334a596cbd43b765f7378480ff57061c9de666c560fd5b7,2025-03-17T15:43:02.517000 CVE-2024-26674,0,0,a7def8d3d8370efab1d03b5e1019dcbbc48dcc907eeb19f517fd753f34cf6bf5,2025-03-17T15:42:54.880000 CVE-2024-26675,0,0,7cd4d73c762323b0ebcbb68814d648e41354c78f3b87b8e90a5e81ea318a1a58,2025-03-17T15:42:44.150000 -CVE-2024-26676,0,1,1cadea70fb979748e19816efdb3b71a265142a6bff8849fac6cf090bf6c0ce86,2025-04-29T17:03:23.660000 +CVE-2024-26676,0,0,1cadea70fb979748e19816efdb3b71a265142a6bff8849fac6cf090bf6c0ce86,2025-04-29T17:03:23.660000 CVE-2024-26677,0,0,d9b97e6c70d29175f52a47368af2c29686bf8e72808fd873a2343b0a878f1402,2025-03-17T15:42:33.780000 CVE-2024-26678,0,0,6d1cee4cccca21ec965062b991fd7e5ceb91aafdf43ab793aea2f86e126a12a5,2025-03-17T15:42:26.237000 CVE-2024-26679,0,0,7744bfc7d84e85662dad16624343ebbf059e793cfc235c64f91c2fe48f3c909a,2025-03-17T15:42:17.600000 @@ -254418,7 +254418,7 @@ CVE-2024-2684,0,0,a14b026a1301f370e619ed91bf5762f79bbefef8c73866dc993a8358e7f33f CVE-2024-26840,0,0,184a6898c218b037239b30da9b8ff36296b7dddccc7007005850bd631f698139,2025-01-07T17:13:19.863000 CVE-2024-26841,0,0,ae6ce41b5a72dd4021510f2869dc20e1bcafc47b74f538f8bab226112300566e,2025-04-02T13:18:01.743000 CVE-2024-26842,0,0,4370dc54dee9e8c2e9586c2762a2f6dba421629a1c9190c8e42e932dc24283b5,2025-03-04T15:36:04.323000 -CVE-2024-26843,0,1,a5fcd670b59d5add579323f9b97e8292844e9f685f6b8c8fb4276778c9d191ba,2025-04-29T16:30:34.013000 +CVE-2024-26843,0,0,a5fcd670b59d5add579323f9b97e8292844e9f685f6b8c8fb4276778c9d191ba,2025-04-29T16:30:34.013000 CVE-2024-26844,0,0,6c2a3d561678d673e0b3f5e5ec39ad9ab35e38d969f0894d94c51b9b784f7c0d,2025-04-02T13:17:54.900000 CVE-2024-26845,0,0,4cc5fcefbabaa0fc68465fefa356c1fc30362c93331a40df2b20a90dafdbca4e,2025-04-02T13:17:44.657000 CVE-2024-26846,0,0,12a663bc243593f7d12dd5098c5e21d5fe60c68dcdd9ac9ac6ca059a19e8619a,2025-03-21T15:02:58.657000 @@ -255456,7 +255456,7 @@ CVE-2024-28016,0,0,749488d31ac32a9ea2b931fc388c512a146a1ae63d159c28c7a31b47cea37 CVE-2024-2802,0,0,4d7e48fbf79d86b86a336401cd7856f9a2e312e8845717a11d0136644698f700,2024-03-26T15:15:49.677000 CVE-2024-28020,0,0,353857c6f72177d44fa539cd26ab29ac243a888fbe1ba2619943550305df92b7,2024-11-21T09:05:39.310000 CVE-2024-28021,0,0,ef91a2bbc3a7ba80aa4b93dc521740325b47bcd3461fc4ac520536869818ea73,2024-11-21T09:05:39.497000 -CVE-2024-28022,0,0,c6779f751e765b3e78d5f2d6ec80d2cef7d34a51c5b78a4cd4c3ea8b20c4261c,2024-11-21T09:05:39.653000 +CVE-2024-28022,0,1,eaeb93781422f22183335693a72649f4559c6530b5d377a49742dfc3bf5e9d87,2025-04-29T19:40:10.683000 CVE-2024-28023,0,0,d0157ba31cdde31b93cc5b3ea9b3e5aa4023959e24495eacce61ee4592e593b2,2024-11-21T09:05:39.807000 CVE-2024-28024,0,0,b533ea946a2b9639546197a35035dff5d0217f6e0aea06d05e4f885479f7d352,2024-11-21T09:05:39.953000 CVE-2024-28025,0,0,5080270587c662ea85798bbb1c6ff9b9fdce9419797381c30e49b4269db8dcc1,2024-11-21T15:15:28.027000 @@ -257520,7 +257520,7 @@ CVE-2024-30806,0,0,0f10c12cde4cc6e502472d7f26b966e65243b44a483d6743e51bd5b3eca69 CVE-2024-30807,0,0,8dc4af97d0fded2152730e4c2ccef496e4788b3b659eeb3b431f250af542e0c5,2024-11-21T09:12:26.430000 CVE-2024-30808,0,0,b91c22290aba835d5a671ac2bb180e5aedb8eb922e72728b22fc692771258721,2024-11-21T09:12:26.647000 CVE-2024-30809,0,0,f6c000e8632dfcdc60d85d1a037e0708b55c82939d6271041284b7ae686ca6c6,2024-11-21T09:12:26.857000 -CVE-2024-3081,0,0,a14445c7a979f6aa591ff52890a0fc6ede71ae070aa04ef234776c592367ab40,2024-11-21T09:28:51.347000 +CVE-2024-3081,0,1,434fd55c637cdc83dad9826a3a69bbb012147d283db4cd34c2eebf2b439ea1e5,2025-04-29T19:44:58.373000 CVE-2024-3082,0,0,6ef491da5f61eb445c102687ec9bb9fe7371b1b45e2376383bee2e022b96b566,2024-09-30T15:15:05.573000 CVE-2024-3083,0,0,cccc6733810fbf6686c0ea133ef2ddbccb971e5fd28144f1076f18955c8210b0,2024-09-30T14:15:03.317000 CVE-2024-3084,0,0,78e37833e4018c0451a2e57cecfa2983e7634d83093c960a91a3dd3908a13f09,2025-02-14T19:20:29.973000 @@ -262640,7 +262640,7 @@ CVE-2024-37403,0,0,5e662ed809b0b10e6b99aa8c2f4ac8b35c922847c3b6d64b5b20add4d0709 CVE-2024-37404,0,0,cb110a34d87f4812dc406a460298c89dd3f74daf508e6083996d73ed421121f5,2024-10-21T17:10:22.857000 CVE-2024-37405,0,0,3fb82c05472465d4a94ae43ca82eb762e9089f45f86f1b3cd3cb77a2d12c0c24,2024-11-21T09:23:47.573000 CVE-2024-37406,0,0,79dc9c3cb7f74b68ffa4484afe3ff78bdf0a9b7ce01c99b253528603ec914b37,2024-09-20T12:30:17.483000 -CVE-2024-37407,0,1,d53f1324cd302e8055b4ea218966618cf460c4152b143720ed92a0b33a20e578,2025-04-29T16:35:54.687000 +CVE-2024-37407,0,0,d53f1324cd302e8055b4ea218966618cf460c4152b143720ed92a0b33a20e578,2025-04-29T16:35:54.687000 CVE-2024-37408,0,0,09143f97c35eb177ad3c82e546b75297ad347be7e61a439e732398bc04aff01e,2024-11-21T09:23:48.037000 CVE-2024-37409,0,0,fabbde195dc13003934cb1fd7de7bd601084469ff9b04974222b5a010a31ab72,2025-04-15T15:21:26.683000 CVE-2024-3741,0,0,48cb78c67170b87686f3bb8e4941f035eb7350c34f4e35af04243e3f1af30176,2024-11-21T09:30:17.370000 @@ -263396,7 +263396,7 @@ CVE-2024-38308,0,0,1baa56b2e3fdd13244d0b9df4f23464d3904d173da05d6eee250ad40c0e7a CVE-2024-38309,0,0,c1db647894461fb62d3b4308d8d05a2e39c8d0f31c7a0d9ba995ad235729362c,2024-11-29T21:15:05.287000 CVE-2024-3831,0,0,5e708a1e6973c6b70cfbb375324ac255e6a5b9f7cfb486bea916fa269c4f84cf,2025-01-28T03:13:30.017000 CVE-2024-38310,0,0,6659b53a28a05a037a22232686eb9e98f1c5c7d893b655725e2374a7009bc039,2025-02-12T22:15:35.630000 -CVE-2024-38311,0,1,844074ccc615482a832cf120a7aa8a6efa48c65295bdbfe66d71b8371eeea424,2025-04-29T16:34:58.897000 +CVE-2024-38311,0,0,844074ccc615482a832cf120a7aa8a6efa48c65295bdbfe66d71b8371eeea424,2025-04-29T16:34:58.897000 CVE-2024-38312,0,0,26321e7daaa7ff032188a33373df43f0cc582c87b09ed7317e18a3e5ab18b300,2025-03-19T15:15:47.450000 CVE-2024-38313,0,0,79e2f0eba707bdf51fb8bc87dfd5e2175b7033176980ffe48aa4eab619dc57a9,2025-03-14T16:15:32.797000 CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713461,2024-10-25T12:56:07.750000 @@ -271063,7 +271063,7 @@ CVE-2024-48760,0,0,2c515de9d3808545a7fdee77c025d0a4f76a44cfac1a6b1790d2a3a6eabc5 CVE-2024-48761,0,0,8192a1d746e586fb347fede8858deb4679e9f58ebe16044c76f02b9ce1da5a65,2025-04-03T15:15:47.360000 CVE-2024-48768,0,0,20dc94e5053f6f0d8d7caf706bf6fcb813042430158ff64dc7ecde51efb03a2d,2024-10-15T21:35:32.950000 CVE-2024-48769,0,0,881e0b4b29e63d860dc80c7571762519af749fe3f9ba6f317c2855a4a66d7008,2024-10-15T19:35:39.423000 -CVE-2024-4877,0,0,8aa98b74589473d97f7c1d24ed12ab12e407560e768d3bdf7440ef8f522981ea,2025-04-07T14:18:34.453000 +CVE-2024-4877,0,1,8ee4a62119f4539bb72579c9037b385657424188b9828b8e94e3040efd347d3a,2025-04-29T19:45:07.223000 CVE-2024-48770,0,0,3e66352e1521b9d6543412a56ab61f680bed31dc0a12a74770aeefc4f0bcda78,2024-10-15T17:35:07.440000 CVE-2024-48771,0,0,ef084eca4dbd5d4b7e58c7464a6053da196bbe2d27f396e5e5a98bab4e847c3d,2024-10-15T21:35:33.747000 CVE-2024-48772,0,0,5154e4eb5ade804c923c90daed58ff1878c3b3640c66dd4cd99806ab82fae85c,2024-10-15T19:35:40.267000 @@ -274738,7 +274738,7 @@ CVE-2024-53620,0,0,0ec00be95852a0998a14f46021597d58d0eefdd89109b46c5f804a1cf687b CVE-2024-53623,0,0,531ddce100784ec8b317b297b660a260e518e8b80f64012824aac6bf3d8289e3,2024-12-02T20:15:07.917000 CVE-2024-5363,0,0,1a1d04dd62a3d9ceb936776096c694704c071db758e0c336b93f44ac203c6bde,2025-02-10T14:41:03.540000 CVE-2024-53635,0,0,7a67e9e0d9d71b612bd6cfd95f53056a7f326cdca18b0bdba544dd72fd3cefe4,2025-04-04T15:39:01.230000 -CVE-2024-53636,0,1,da115416438bde659865e0fc32668c96f1e4f76947f54ed79dd4f33a08cddf94,2025-04-29T16:15:29.717000 +CVE-2024-53636,0,0,da115416438bde659865e0fc32668c96f1e4f76947f54ed79dd4f33a08cddf94,2025-04-29T16:15:29.717000 CVE-2024-5364,0,0,aa5f84f14464447d90ef8caf1f257dc2f279cb9cd3689bc4d8a6e5bed5923442,2025-02-10T14:41:25.130000 CVE-2024-53647,0,0,cfcb346f723938ad054c8fdc72391827a75db16440dc5160efbbab2c409a3044,2024-12-31T16:15:26.437000 CVE-2024-53648,0,0,45c01bfa5a9acb65ae01f03972d763b96e09818681d1d686dc2d5d5e84b1288c,2025-02-11T11:15:14.460000 @@ -275802,7 +275802,7 @@ CVE-2024-5526,0,0,0c9c91db78cbdd3ff4ee3a189e439a311e3e6928df326db13557ea657472d9 CVE-2024-55268,0,0,5f3c37cf8158a1c44928734f909dc42c1030ecc39541485d8d944019f4ad558f,2024-12-11T17:15:20.920000 CVE-2024-5527,0,0,d332540fc72a82323997817d4e967456b7cfd92130ba717f37312bb67a51dc8a,2024-08-16T20:24:34.470000 CVE-2024-55272,0,0,6e108f0e2cf675b62abdd4438f3d6786bca417f797f9b02de67c6172540f9241,2025-03-15T16:15:13.813000 -CVE-2024-55279,0,0,71f59076922e6b317f09caaf45979b6125f650fc470db1345da460becf36f0ff,2025-04-01T18:15:29.407000 +CVE-2024-55279,0,1,1ac8582dd32514523902f5cd2df863b50e935a2d88ce8684694baf29a57b5cd8,2025-04-29T18:12:55.493000 CVE-2024-5528,0,0,f6c42b7e3780f6a788afad957fbc4af53b8e35d036bf5498b6d14206ce32a452,2025-02-05T20:15:45.090000 CVE-2024-5529,0,0,095ee1b4a7c2e06520a57f410df528bd70394e4035579229461d97ba32a6aca4,2025-03-18T14:15:41.210000 CVE-2024-5530,0,0,2d0b01cc83bfe8893d941d6bfdb13cbbc2a5c286addf6d9a79089f227ed325e3,2024-11-21T09:47:52.657000 @@ -276209,7 +276209,7 @@ CVE-2024-56188,0,0,6099367b09e9f72857828188586bb8eaa038007ca5619c0920db3488b5666 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 CVE-2024-56191,0,0,0fb9d43d2aaaca7bdbedab1ba367e431a3f49390befb6ab3c709e63306a9c5bc,2025-03-11T16:15:16.743000 CVE-2024-56192,0,0,99f5ca3c1a3c284cfc963a8b1ab915badda47daead5c04280c54fa9daf64658c,2025-03-11T16:15:16.900000 -CVE-2024-56195,0,1,117bdee532008d680faa0da635c50d38c0706d233f50ed3ca5625bbe8df3b1c0,2025-04-29T16:42:01.950000 +CVE-2024-56195,0,0,117bdee532008d680faa0da635c50d38c0706d233f50ed3ca5625bbe8df3b1c0,2025-04-29T16:42:01.950000 CVE-2024-56196,0,0,1bf701f06b8ebf5cf73299a8be040af3c0bbd894a2a3c1c7090b593f2de2a6e7,2025-03-06T16:15:49.637000 CVE-2024-56197,0,0,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000 CVE-2024-56198,0,0,3b67ef470891f025afa6af0da137e788f43839b85f759fed43bf437c7d57fc06,2024-12-31T16:15:27.247000 @@ -276217,7 +276217,7 @@ CVE-2024-56199,0,0,b62df53baa8d4848a6f31e2b0b1f49a9a24a4405c740c5c1ac552cd60e35a CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000 CVE-2024-56200,0,0,3879bcf029467f661c4f86f22f421720527f4e18cebe03faa8ac0ac24cb0d998,2024-12-19T19:15:08.280000 CVE-2024-56201,0,0,fcf381b194171b51a5229bbac53f5e329fb502829416a1a37abaece0e20f4002,2025-02-18T22:15:12.910000 -CVE-2024-56202,0,1,1b56399637c2bbf6725d8c01cd6970716a49630810dbc34e6b542fa963f29df7,2025-04-29T16:41:26.503000 +CVE-2024-56202,0,0,1b56399637c2bbf6725d8c01cd6970716a49630810dbc34e6b542fa963f29df7,2025-04-29T16:41:26.503000 CVE-2024-56203,0,0,e99e9de74c83a36dbb17a843377a1378f7cef98ac1909cf2366fcf78cc18f19f,2024-12-31T14:15:25.400000 CVE-2024-56204,0,0,6a6e8f022625febdb1ce3a481d0a8e2bb1f1902592ae6e2bfa4e06cd41426aed,2024-12-31T14:15:25.547000 CVE-2024-56205,0,0,8369f1bc37e0dcf8f712f3109d50a2811210639fc84cb65dbb5b1dd98af12e24,2024-12-31T13:15:08.803000 @@ -276873,7 +276873,7 @@ CVE-2024-57032,0,0,105ef0c77189f00b21a7dcb2bf17ed45ca2b598d3d026e147cb0353f40c23 CVE-2024-57033,0,0,e9278fef113e9d7a12142232100472b33f21dbaad37d799ac83fb8487a1513db,2025-04-09T18:30:54.083000 CVE-2024-57034,0,0,f7b3013f55cfd21edbbb403e8e50ace95b494e7b749f8ed3f7d43b029f40fbbb,2025-03-14T18:15:30.897000 CVE-2024-57035,0,0,fc128f708fa5ccc76197fcb36159086bf6daf8c8d85d358c9d8bafe0fb4b387d,2025-03-18T18:15:27.960000 -CVE-2024-57036,0,1,294e511f9e30b7948e16503f78b4d191862dd753fcf70aa88d3fb1cdba8a1979,2025-04-29T16:22:09.120000 +CVE-2024-57036,0,0,294e511f9e30b7948e16503f78b4d191862dd753fcf70aa88d3fb1cdba8a1979,2025-04-29T16:22:09.120000 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 CVE-2024-57040,0,0,33933917891b5c81929460ab67ed0d7164ee900a0e5137644747b9fb793e41c5,2025-04-07T18:29:36.293000 CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39 @@ -280526,7 +280526,7 @@ CVE-2024-9049,0,0,46f59db09c33626f1d69749abe044e964ccad29cd9d220bcda7c466f92187f CVE-2024-9050,0,0,3010fc5c627c8c1972d6f17910d5cdccb5923b375100e48adbc3d5a72e9ff9bc,2024-12-18T17:15:15.420000 CVE-2024-9051,0,0,c5391680d54c46a0bbf9a1fc0deb0ba09610fc9b3f0482409fd6a0ca17d3cbe1,2024-10-15T12:58:51.050000 CVE-2024-9052,0,0,459b2079fb49e2c9e8bc9746426fb2109d6424dfd6174af84e5ac9525a902671,2025-04-10T16:15:27.670000 -CVE-2024-9053,0,0,ddd8a2ff8d5808874e11d66dc72453a6f018511a876e452bdae2f3fe873b6bcf,2025-03-20T10:15:46.327000 +CVE-2024-9053,0,1,f53379ec0f99300be05446eaf15910c643401237634013e6553cd2746140cb14,2025-04-29T18:14:13.743000 CVE-2024-9054,0,0,fd13ee9fa07c3846f703232928ae0e36919a799f27cd3ce227e9264dd82075f9,2024-10-17T15:19:32.803000 CVE-2024-9055,0,0,639de7f2a01bcffd10e92ac58109a27ce5cde88f92b41a08fbf9e0f140968b80,2025-03-17T14:15:19.820000 CVE-2024-9056,0,0,0e25cec0ff62dfe409f4030fea78c9231762d9f93bfc26d9b13e804dbf8af658,2025-03-20T10:15:46.453000 @@ -280567,7 +280567,7 @@ CVE-2024-9091,0,0,0cf74233b622301d5bd2020b1a208d59ab4093ec0fff76ccc6a738f83c4957 CVE-2024-9092,0,0,200cda92d428c298e2b62ed9da61a40369e1363ff73a535e0f326503fd8e2eee,2024-09-27T16:23:56.710000 CVE-2024-9093,0,0,9f57cb1909234969458dedc6a35ec33e9f3750970160316b827e940615c35cde,2024-09-27T16:26:27.163000 CVE-2024-9094,0,0,8eb9b0e8cefd51f6e0af269bb953b8fae9d6b838a25cb9ea4cffecf072b37d59,2024-09-27T15:54:09.463000 -CVE-2024-9095,0,1,9ac8f6c83ff3c0468e2af4e39ea2311bb9603e65726632b0c98a3d6452c9ed92,2025-04-29T17:23:20.143000 +CVE-2024-9095,0,0,9ac8f6c83ff3c0468e2af4e39ea2311bb9603e65726632b0c98a3d6452c9ed92,2025-04-29T17:23:20.143000 CVE-2024-9096,0,0,2b8c120404985dc49c442e89a03355b7545ec6b05bccea876d145837b3a61ac0,2025-04-10T16:03:46.880000 CVE-2024-9097,0,0,2e88472ef3a11f13a877d42f0790b7b539a4e1e55e149b5b182cec4a98bc4e78,2025-02-05T13:15:23.237000 CVE-2024-9098,0,0,320433c571ff7f2960b136902f883e46f516c4456287c9407279641abcfc610f,2025-04-10T15:53:52.870000 @@ -281170,7 +281170,7 @@ CVE-2024-9766,0,0,ca54e388f5e39d65d186b1353f0fee1774dfd3f91419e0817c5f513c5a6a7c CVE-2024-9767,0,0,80d36f7190a9ee1712fc0bac7af287f8aeae0caf94e9c8386dc03bfd7eb71fb3,2024-11-26T20:57:03.197000 CVE-2024-9768,0,0,904cffc60d5e826fadde1f9279bf1637d0038b817b76c6a013f678cc172cfc96,2024-11-26T17:14:14.327000 CVE-2024-9769,0,0,c2696bf31f1ba7076083554371447a32b4e26b069c06f2ff37292495919c4490,2024-12-06T04:15:05.200000 -CVE-2024-9770,0,1,2cda7fd9f75f6fca68ce4613475fd0459088c1fdf758f04df90f573f49958a4a,2025-04-29T17:24:12.513000 +CVE-2024-9770,0,0,2cda7fd9f75f6fca68ce4613475fd0459088c1fdf758f04df90f573f49958a4a,2025-04-29T17:24:12.513000 CVE-2024-9771,0,0,0ee8015dbe6506a6002cd1e922df2beb8c6565bfa3945d7413a3964d04bd19cf,2025-04-29T13:52:10.697000 CVE-2024-9772,0,0,00de6e2212e38deec5d85dcbb0fb26ecbb8065a78c6c2a56178e317ffc908e8d,2024-11-25T20:03:01.613000 CVE-2024-9773,0,0,9adcbeeba5a2fb018fb9bbbef2f03381fb99e41630ddc906f125617f02106933,2025-03-27T16:45:12.210000 @@ -281867,7 +281867,7 @@ CVE-2025-0708,0,0,659d85452dbea3574dcbf830e77ebd7d9b31a5282c05d0b34b2613bd9e24ca CVE-2025-0709,0,0,23c89f716f0fd87a191508e4ae68aad5a69852006792d2c5e01ea40cdea1d187,2025-01-24T21:15:11.237000 CVE-2025-0710,0,0,81cfa891cdbaa188ea5f0cdc6436388cbcbfc8f589a6588bc197916940231ee9,2025-03-03T14:55:27.487000 CVE-2025-0714,0,0,7a5ace77913ec81f29c63850fa9378895a034df434a64ef2c1dd7b18a728bf62,2025-02-19T09:15:09.863000 -CVE-2025-0716,1,1,269769ed0c37c730ccf941f52f3cd74ce696bd480445b7018c521a582485e7ea,2025-04-29T17:15:39.790000 +CVE-2025-0716,0,1,34b881e35c30cadcfd5aa8b8c569f9d70e25fd8034b47f65fd82a3e21d3c580f,2025-04-29T19:15:53.537000 CVE-2025-0717,0,0,bc274572efa2e268fdf1866571686b9b143ff8084d434e7b8cfe68d6fa973720,2025-03-27T16:45:46.410000 CVE-2025-0718,0,0,dd6e58b1ef7acc78edd1d991f3540a9f746f8f8480eeedc91c0d010299914a52,2025-04-02T14:09:59.780000 CVE-2025-0719,0,0,44927ec8b6afaf34270843fd13dbd3ba0f3f99ce1ef23ab7a0954a7b4854cf52,2025-02-26T14:15:11.587000 @@ -282457,7 +282457,7 @@ CVE-2025-1517,0,0,59f92391aff92edb8f0e2c5d447824bc758e9021eff4b28d2fd46f3db72413 CVE-2025-1520,0,0,d67f464317150898182b413758fbb1b35da6b45607260a101639a8a467e19cc7,2025-04-29T13:52:47.470000 CVE-2025-1521,0,0,c58c6e339d3d072b9154e8ec6f0efe9fcbf05ef2bf1c2ef088a2c3886c5f9b87,2025-04-29T13:52:47.470000 CVE-2025-1522,0,0,a5ced9349a9d1cc30825120d325677e99c4dfef29626ad826fd8b8f0ca23dde8,2025-04-29T13:52:47.470000 -CVE-2025-1523,0,0,ae318e5183a27873dc6cc0d6c7ca9a10da6ad746ff7eeab836cdce779cff0819,2025-04-17T20:21:48.243000 +CVE-2025-1523,0,1,7daa3b55f2e4cb1f6a2f3a191a3e3f9efc3cecb80f9cab3673720bb9cf727d5d,2025-04-29T19:06:48.263000 CVE-2025-1524,0,0,6b7ed59aa55768a97f04972f4e7ca7e6ec0d06a3ca74dba09aa8f8affcbea819,2025-04-17T20:21:48.243000 CVE-2025-1525,0,0,947db4cb7934a3ff926b421049bc6ab4e8779b5ef2c183aae327f5cff02a680e,2025-04-17T20:21:48.243000 CVE-2025-1526,0,0,dc577948525af4962caef0feff11f01d08897db3dd0fe72a79c53b4a55322150,2025-03-24T18:04:40.790000 @@ -282478,7 +282478,7 @@ CVE-2025-1544,0,0,2377ad87743f4fe242650024fb03372701542bc42778ab3d19eda86c524de1 CVE-2025-1546,0,0,51ef3cbc8ac56bb33fe743735a6d072664b6eb44d4e8fe737f496fc69a6fe775,2025-02-21T18:15:21.523000 CVE-2025-1548,0,0,b4982cc9ad63952e27f14406f83e01cf2d0a026e879a91d4c0db8ad73ac71ea6,2025-04-04T16:40:52.380000 CVE-2025-1550,0,0,75c8e2f76fa5dcc08b4c2d337298000f7823f2038d9de13f51ad7331532f5b20,2025-03-11T09:15:25.217000 -CVE-2025-1551,1,1,483767d4fa04d82c745fc451cb82b7d81917d36f412ae8cf809b16d5fee49d49,2025-04-29T16:15:29.870000 +CVE-2025-1551,0,0,483767d4fa04d82c745fc451cb82b7d81917d36f412ae8cf809b16d5fee49d49,2025-04-29T16:15:29.870000 CVE-2025-1553,0,0,d96596568d35a79921cd22eb566581d3e14afd9146a9b30f63868f2535440701,2025-02-24T17:15:13.540000 CVE-2025-1555,0,0,cf4f7ec4c7f22b94f8768d59c9ac2dc8d623655b78ea6887e44ed58b3a34f68a,2025-02-24T15:15:12.810000 CVE-2025-1556,0,0,49cf967daea174b937b57c499bcc0c58b27409b32832009c453b7af5b3d38409,2025-02-22T13:15:12.010000 @@ -282793,7 +282793,7 @@ CVE-2025-1957,0,0,ee1e7eb515d72a2e9fcfbd11acfbe0bf19e43e781862a3df4bad0d0b4d6e8b CVE-2025-1958,0,0,bcb1c0f9f921d2945fb3c18ad14ba54e023ee613791e4353242ad75faf6b45e5,2025-03-05T17:15:13.980000 CVE-2025-1959,0,0,cbce4f993bb7006ed884e3705e64f9dfefa85ebb8f3f6905d4a743a115d8e355,2025-04-03T13:32:36.457000 CVE-2025-1960,0,0,381f23a43636598e3f47e9d259a5c7b38a7841aa1c066388ca8380182afafcbf,2025-03-13T19:15:50.627000 -CVE-2025-1961,0,1,f27d99b4909e5b725c5dda3c7023a5ac38ff2ec3bbd8f34e0d330ca2438661bd,2025-04-29T16:46:00.200000 +CVE-2025-1961,0,0,f27d99b4909e5b725c5dda3c7023a5ac38ff2ec3bbd8f34e0d330ca2438661bd,2025-04-29T16:46:00.200000 CVE-2025-1962,0,0,594bfe8627e5ac63596312e0e11cc2510a0bd61244dd64dfdf7f8de06c5a23b8,2025-04-02T18:24:43.310000 CVE-2025-1963,0,0,908db7c1cde98e320d1a787c648b3ed076eac178762f12c58f5af8ffaf094093,2025-04-02T18:28:02.617000 CVE-2025-1964,0,0,f3200eed952b3d7931f5b0fd0f11005bcbc09bae5c7fe934cfb0e9c7d91d2e66,2025-03-05T01:15:10.020000 @@ -282807,7 +282807,7 @@ CVE-2025-1971,0,0,cad78c38fa0f409118ca3c582b345e2ef699420d4477728568a797f9ee4341 CVE-2025-1972,0,0,a01efd1287cb717f29347c6da0fd2b595ac4ebff31753720bc750584857d6bd7,2025-03-22T12:15:26.453000 CVE-2025-1973,0,0,4fd9223b4c9ec022f5e61bbb2021d12ec059eacb6f9b6adbf31ff8f09b0271d1,2025-03-22T12:15:26.653000 CVE-2025-1974,0,0,4ae7818bf0e5063c4b0765b8cf6efa42d57f35daf1614dde7eb8ae4adb29d290,2025-03-27T16:45:46.410000 -CVE-2025-1976,0,0,cddafb39de405ca17dd1975af63140ae686f988dc423c66fd517efe3ef13a809,2025-04-29T13:52:47.470000 +CVE-2025-1976,0,1,0657629d17c3cc88a707ea5529d8606a27408b934b49f69b712bc854779133bb,2025-04-29T19:49:59.680000 CVE-2025-1979,0,0,5cf047efa61126850f2bff74f6db8ba74d6d633b7373b143cc2f515f22996b33,2025-03-06T16:15:54.187000 CVE-2025-1980,0,0,4c7844c7d2e384f542483edd6a870a9d8d765c3aedc7699eda992a6c0ffc4c13,2025-04-16T13:25:37.340000 CVE-2025-1981,0,0,c6ffe19c12e7ab601ce4c5b72d3b5bdc09ba3ffad92da334b63806049745f9b8,2025-04-16T13:25:37.340000 @@ -284029,14 +284029,14 @@ CVE-2025-22027,0,0,d469e64a687bccb78dbab6b4decd9860fe274900276975e7637ba6f735a48 CVE-2025-22028,0,0,5c05eaf44f2517aa0314cf61cc752bc1841f0af9b8b0722ecbcad4b77a248d0a,2025-04-17T20:22:16.240000 CVE-2025-22029,0,0,9fbce399d361a0143cfb877b746c043dcac5758de7ed4685abdfa635b08531f7,2025-04-17T20:22:16.240000 CVE-2025-22030,0,0,539744ee8dba009b69b24272ee7df40ef10b03dd1a9de382b8cf7df5bed1ee38,2025-04-17T20:22:16.240000 -CVE-2025-22031,0,0,9d216b99fa3cc7f6bcdacf8e09cd2a16945c8d0bec2c5b9797d4653dc4a3395e,2025-04-17T20:22:16.240000 -CVE-2025-22032,0,0,f574ee157bcad9a4e524fe38f36d11ec313f8c034144e95b7fe9b624bff6c2b9,2025-04-17T20:22:16.240000 -CVE-2025-22033,0,0,13f45a3a54c35570246d2690bb06f46434ce2dc0edacce28cf6c3d3a88725790,2025-04-17T20:22:16.240000 +CVE-2025-22031,0,1,8e6ab5a6dae87efdbaedd20d9d2f446f69b064d9e34ad67d574ead1b7fc6b416,2025-04-29T18:57:00.353000 +CVE-2025-22032,0,1,b4de7d5e039832f8ad3d21ffeddab65d9e0fe823a70f076656b879d673fabddf,2025-04-29T18:57:24.340000 +CVE-2025-22033,0,1,1453f1eb5e8bf2f262e5463c8504f535b4c10e9f24627c92d2eea5def63da609,2025-04-29T18:57:42.940000 CVE-2025-22034,0,0,a0d6710ccc671478376ce4e71f8fc9741382a8a11a47c9e68bc843b962ec7852,2025-04-17T20:22:16.240000 CVE-2025-22035,0,0,8d863c07a8fe035c1c87b49562306a59654bd499e6022f52b48f2bc9577f741e,2025-04-25T18:43:50.147000 -CVE-2025-22036,0,0,3f9fed855a4e6b248d6eee44569e1e195db559023d05e6e21772fdc483f6f272,2025-04-17T20:22:16.240000 -CVE-2025-22037,0,0,209de92d4fe34978fd42063c1640eb3316b3ad3af7518b2751222124d16e75be,2025-04-17T20:22:16.240000 -CVE-2025-22038,0,0,fce98169b30adaa5170a89c1fdc899cc46f16397646e67f326860c31b5f29226,2025-04-17T20:22:16.240000 +CVE-2025-22036,0,1,d6d3ace36ef2072b0e99b532a02634826415591be79d746efc8969144dc13fb6,2025-04-29T18:58:37.880000 +CVE-2025-22037,0,1,f44f4a771c5cdc1b3e118d01d32742e04d47dc2aa2e9a4f7a8dcd1c8755f2c49,2025-04-29T19:03:20.673000 +CVE-2025-22038,0,1,1b76945f2b38c14ea05a97ff6fd9b1b15f2f59b6de8a75e48bb3478a16ba8d6e,2025-04-29T19:04:21.897000 CVE-2025-22039,0,0,3bb3e708c8cda27ebbe315586df5804d505340435c5db7f0bcd7148bdc051353,2025-04-17T20:22:16.240000 CVE-2025-22040,0,0,facb6428bab7ff0adc4403e4fdb73ca357b926f3da19061d48bc7f547885fe40,2025-04-25T18:42:54.833000 CVE-2025-22041,0,0,f465946e1f8b020b18dae60195dc1a1341623f37f026561071d6857b92726733,2025-04-25T18:42:20.980000 @@ -284050,12 +284050,12 @@ CVE-2025-22048,0,0,d783c79840ea31703c48b86cdf7fa937ae9910f9389ce19442b71530a0de1 CVE-2025-22049,0,0,e05d60cc57e605d0ddbe4838bc32d7511585a31f866eedc4e7b84a015847bf1c,2025-04-17T20:22:16.240000 CVE-2025-2205,0,0,fbf363faec05dffcfc872bf5b989460ea4958dbb9808068cb2832da5e42818ef,2025-03-12T04:15:19.810000 CVE-2025-22050,0,0,0ac53cf887d279edd9ed33a8ba0a3d9970469b715b8c7760676d19fded46449b,2025-04-17T20:22:16.240000 -CVE-2025-22051,0,0,417ac95c3dc3040ce4c4f51f1b77c3362a686c007ba1c8380877c87039278db8,2025-04-17T20:22:16.240000 -CVE-2025-22052,0,0,bf96be316a3aeaafbf4008c35a8584e6b29c355a652a4a5b5987f6fd48b1dee6,2025-04-17T20:22:16.240000 +CVE-2025-22051,0,1,0afe55602ed8f0dd7d1f64cb4acb2c603e18b9bebd7166684752fa8e6a8314c3,2025-04-29T19:03:46.900000 +CVE-2025-22052,0,1,b5a5dbe2bfeabcee901d6ac286a30cddf20c92f84878ba38e9cb5cfbe1041760,2025-04-29T18:50:16.490000 CVE-2025-22053,0,0,fe535139622954b75617948b065b34adf1220657a9dc15f59ff08d765b91177d,2025-04-17T20:22:16.240000 -CVE-2025-22054,0,0,6b61953cf46b50d4aad1a3a23a4a3383cf7d87cfc8d596ea0491fb676e692680,2025-04-17T20:22:16.240000 +CVE-2025-22054,0,1,c7b78765e0c3b9374c8c006009881cc9ff3c3ba9cb6b819f0222b85099f3c241,2025-04-29T18:50:38.753000 CVE-2025-22055,0,0,b7152d7cb82aae6d60a0e007ba6c3f4ff144ca992469ca38c472554e98c09c53,2025-04-17T20:22:16.240000 -CVE-2025-22056,0,0,c719e562af8b1455f3acf3ce4d23377186c0ff834c45190426166eb458c305a7,2025-04-17T20:22:16.240000 +CVE-2025-22056,0,1,39926423ef9f35c4d89972e3c370428ae0c878401bdf0d6ee36308727235dbcd,2025-04-29T18:51:14.047000 CVE-2025-22057,0,0,790bf3ec367475d267f60b199eafe334efec5fdebe4ed759b36728e0c613b8aa,2025-04-17T20:22:16.240000 CVE-2025-22058,0,0,665c3ae3bfabd045e314660beaf91f020fc41f7385a20117304cf5874a8df425,2025-04-17T20:22:16.240000 CVE-2025-22059,0,0,ef0784b413ac0920ba4550bfe6377c52bab1e59ef096b30d7de134a2b9f0192a,2025-04-17T20:22:16.240000 @@ -284063,7 +284063,7 @@ CVE-2025-2206,0,0,6d4b6e8bdf6b24741a4430972818a20f8052ecfc15f1df2ff630f331c8dbd7 CVE-2025-22060,0,0,b30ff2ef340e7aaf1100e0cbb6819f1365418b732bd52209bad83d8411b33a6e,2025-04-17T20:22:16.240000 CVE-2025-22061,0,0,0d61f9d1dff85687e2258e9b11211ce24cbf32c564582c0f03eb9f7ca63fc5cd,2025-04-17T20:22:16.240000 CVE-2025-22062,0,0,8eed551d7180f167475d2653b636e3a59cf7fa325e5c3947b31afdc05a17fffb,2025-04-17T20:22:16.240000 -CVE-2025-22063,0,0,4692348e6f8ed317ff63efcaef1bc93aa72889a24954be87e2ef246d49e15943,2025-04-17T20:22:16.240000 +CVE-2025-22063,0,1,df6640518bbc984142a6158e4da95054990a44d9099e1730e4f24db60d2c9ba2,2025-04-29T18:51:32.240000 CVE-2025-22064,0,0,7e8b3f508f7baff20aa57579a74df2c2d8da36717766c50090df1724fc877de7,2025-04-17T20:22:16.240000 CVE-2025-22065,0,0,afddaebc8dcc839b8e71065cdb1e0a7721d7dff6837da14ece03172d3efbe208,2025-04-17T20:22:16.240000 CVE-2025-22066,0,0,c8fabc7dc3bcd785d98cbba0a75d342ae61ba4ca9e90d77d34bd5d5d2852a436,2025-04-17T20:22:16.240000 @@ -284664,7 +284664,7 @@ CVE-2025-22785,0,0,aa4353d5806fe5723076a35c33b8891ff3a61998eca5d33194fb5785a62e2 CVE-2025-22786,0,0,b91ca87977dc2162388a9c52b3e5d7929f67ae175cfbed6e892a70ae5f6c7bfc,2025-03-06T19:37:02.493000 CVE-2025-22787,0,0,123539ec0f563d41af7ca03da6e6f99109a8200bc75541fbc478fac310c97242,2025-02-25T15:41:08.223000 CVE-2025-22788,0,0,af55bbe385e5ad19db90f54f67dcad4a6458802599e6dbb5e4a7878a0103b5e0,2025-01-15T16:15:41.750000 -CVE-2025-2279,0,0,28e158e283f84d6a51b53860f0700d64924445ab6d3ee7b9f87c27573ad26f78,2025-04-07T14:18:15.560000 +CVE-2025-2279,0,1,2863238681a097836a46ba826f9c43fc02e0ed2b7aaa92b63ec0dfb7f842939d,2025-04-29T19:42:04.570000 CVE-2025-22793,0,0,1e0903441186396148f438dd4c5bf609b6c2892614e2b8eb44fcfefd5125737c,2025-01-15T16:15:41.897000 CVE-2025-22794,0,0,29518117e4a1792c4e052772321e6d0937ed1ba46c8e343f64999407bc634a6a,2025-02-18T19:15:26.560000 CVE-2025-22795,0,0,6ef875d457c8e19bcf577814595be38d790143627f91775ea895c88416ac9b7c,2025-01-15T16:15:42.053000 @@ -284894,21 +284894,21 @@ CVE-2025-23130,0,0,819a7111943d7abfb751ee262116c4f173109cef1be6809021ede4a5b0f19 CVE-2025-23131,0,0,84e2ac63d60f8f7386e132b0837afd1a45a88d5c7762d2ac68a0b16bcd148390,2025-04-17T20:22:16.240000 CVE-2025-23132,0,0,828d2bf005698acac00cec9323e4cd7443d3dfaafadd3dfacb738c06e9132255,2025-04-17T20:22:16.240000 CVE-2025-23133,0,0,f0c210193e25521018af43b8946839c1ce7ce45d02b90d37f2d5bf5657d799f5,2025-04-17T20:22:16.240000 -CVE-2025-23134,0,0,a437f24bdfcea0c9b65b399f554449af5e5f6e16de2da9fbec2138a7bedf68c2,2025-04-17T20:22:16.240000 +CVE-2025-23134,0,1,668001ac60877a9f02eb6faf7e02487689bbe369e5709ca5677ede462e8bc145,2025-04-29T18:51:59.833000 CVE-2025-23135,0,0,296db62624eee1811a0964c3e1083cb2234b903e7d9b1e51b6bfe253d45346cb,2025-04-17T20:22:16.240000 -CVE-2025-23136,0,0,ec7bc9ad74fc481d0153eb209ef0af9aa8290ca311d20e3740913d96cda273d0,2025-04-17T20:22:16.240000 -CVE-2025-23137,0,0,142136632b53292e4f5b73137fbbbe57471c762471691e5bebb995e072801989,2025-04-17T20:22:16.240000 +CVE-2025-23136,0,1,61005a13c2a63500eb5d16129da64fdcb21418cc16820bec486f0d9a0afaf989,2025-04-29T18:53:02.607000 +CVE-2025-23137,0,1,2f6de023d458cbc94b5a4d2e8590bb7a61b8ca8cbadf5082cac9bed96418b98d,2025-04-29T18:53:31.417000 CVE-2025-23138,0,0,c16db113cdb0a874ec5a72e943048cdb54dff27bc5f98bac6f1f4e8e58ff4fbe,2025-04-17T20:22:16.240000 CVE-2025-2314,0,0,da0d16bd7cdf67126af9cb8b7b9eae653178ef2aa94ef32791352e7cdd49eda9,2025-04-16T13:25:37.340000 CVE-2025-2317,0,0,9ea9ba34615d5bc5ee8806158627db355af143699ea415828af46066a4160dd0,2025-04-07T14:18:15.560000 CVE-2025-23174,0,0,50322119595bff087a12ed6f94f87f583ba40060fccb96eb5cf9c3f3476fa552,2025-04-23T14:08:13.383000 CVE-2025-23175,0,0,d32116b600ac178b1ee720078d8acfc21dc4298d12982e92ae53dd00f4271286,2025-04-23T14:08:13.383000 CVE-2025-23176,0,0,4d8a569d7f8b232199b1ed07a8ee3ee2f1c9e25ade11e06e887257dda42b67cb,2025-04-23T14:08:13.383000 -CVE-2025-23177,1,1,ce514d5b3cc468edf511029eedeadcb9c7b0851387b1e2c9fa122f0ada755de4,2025-04-29T16:15:30.017000 -CVE-2025-23178,1,1,d13d5caf6172d0cd3a88dfb8d43b7ab87d5e9c444013041af308e0982d622b2d,2025-04-29T16:15:30.157000 -CVE-2025-23179,1,1,c2cf1da1e235796174906e5d949096b4ad47e4515c97880edcbd99950209b634,2025-04-29T16:15:30.297000 -CVE-2025-23180,1,1,c159f2324af527e6b923691d276102d35a46ed303f21f4cb8474951a16501e2f,2025-04-29T17:15:40.687000 -CVE-2025-23181,1,1,c25b3fc3860a7678943a759b64a84032d66b7a8f2d2cb84e2dc81568a58da244,2025-04-29T17:15:40.907000 +CVE-2025-23177,0,0,ce514d5b3cc468edf511029eedeadcb9c7b0851387b1e2c9fa122f0ada755de4,2025-04-29T16:15:30.017000 +CVE-2025-23178,0,0,d13d5caf6172d0cd3a88dfb8d43b7ab87d5e9c444013041af308e0982d622b2d,2025-04-29T16:15:30.157000 +CVE-2025-23179,0,0,c2cf1da1e235796174906e5d949096b4ad47e4515c97880edcbd99950209b634,2025-04-29T16:15:30.297000 +CVE-2025-23180,0,0,c159f2324af527e6b923691d276102d35a46ed303f21f4cb8474951a16501e2f,2025-04-29T17:15:40.687000 +CVE-2025-23181,0,0,c25b3fc3860a7678943a759b64a84032d66b7a8f2d2cb84e2dc81568a58da244,2025-04-29T17:15:40.907000 CVE-2025-23184,0,0,d117de9ebd2827a8b285a215a95edfb5f2bc8c36d298a840f4f419212fe8e651,2025-02-15T01:15:11.010000 CVE-2025-23185,0,0,6a8fc3993811d2ce0c7ae31663c2f10b11720d00b7d18acd6d25289de30c4360,2025-03-11T01:15:34.330000 CVE-2025-23186,0,0,e24ff484abfeac0347aa2108d965b5fa2efbb5bbd9e6a6775e16a55a54369d2e,2025-04-08T18:13:53.347000 @@ -286657,7 +286657,7 @@ CVE-2025-25387,0,0,8b1f30ada278980cff112366182e1045802ec3725274b1349a46d716a755f CVE-2025-25388,0,0,fed53807b7da6020368046541547825f245ba9643c2f8971291be1eb79ad608f,2025-03-28T18:35:33.217000 CVE-2025-25389,0,0,371b3f95240b6264fc59e923897a56d5d3224aa7b2c08ea9bdb427a39ad96e68,2025-03-28T19:04:10.523000 CVE-2025-2539,0,0,d08575a7f1943ad408e267113207b31d934ab07db617ed66f8aa571dc440dc3c,2025-03-20T12:15:14.900000 -CVE-2025-25403,1,1,f2feaf61c760814476f2dd8ebd205716a0fc57a90076992cdb0c3ad0dcfe6338,2025-04-29T16:15:30.437000 +CVE-2025-25403,0,0,f2feaf61c760814476f2dd8ebd205716a0fc57a90076992cdb0c3ad0dcfe6338,2025-04-29T16:15:30.437000 CVE-2025-2541,0,0,e8ef833d2e773c509d784681746cd56161055e53254d0acd9cd85848bc331fda,2025-04-11T15:39:52.920000 CVE-2025-2542,0,0,051c9ac38dc3845e54472e78eedda96552f7a8993cf83d4a7f290489b845369f,2025-03-27T16:45:46.410000 CVE-2025-25426,0,0,108c4b754e54717537bad215341cffab6a867457930f1858a7d85368cf0a6951,2025-03-05T17:15:15.320000 @@ -286666,7 +286666,7 @@ CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0ed CVE-2025-25429,0,0,a95bef6ecb2c9e9037f1ebf79f87a2b0c7101933c3f64e22cf3f921f022ed0ed,2025-02-28T23:15:10.903000 CVE-2025-2543,0,0,e89290715b7ff44fef4dfaed136aca0776aa85b6a60156361d49a21cd6e6377f,2025-04-29T13:52:47.470000 CVE-2025-25430,0,0,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000 -CVE-2025-25431,0,1,5e4f6fd5d741dbc0900436294185ed7d3d147620f9b3d44fed0ad3ed88f5b139,2025-04-29T16:48:57.280000 +CVE-2025-25431,0,0,5e4f6fd5d741dbc0900436294185ed7d3d147620f9b3d44fed0ad3ed88f5b139,2025-04-29T16:48:57.280000 CVE-2025-2544,0,0,61f3dad808e2359bbac367a26f479ab656345326f5e769e424e5a0af4077faa5,2025-04-07T14:17:50.220000 CVE-2025-25450,0,0,e3ddffa39d860b594bb74ab98ef16e7416f14ecc887f5721e7943e1b1d73ce80,2025-03-07T17:15:21.640000 CVE-2025-25451,0,0,4c60686324e8dfbebc3bac09932f9dca9715cd901e8b055c1d7eb1acd46fa78d,2025-03-07T17:15:21.803000 @@ -286713,7 +286713,7 @@ CVE-2025-25520,0,0,7751f309da17302454186d82d57de4a352e6861ea976f600feddfdb8a3da9 CVE-2025-25521,0,0,30fbe72fa0e70482bb94d17769901cf0b4a52ac36930127216cb0e1ebd12e0f3,2025-03-28T17:01:49.790000 CVE-2025-25522,0,0,9f2c0bc0a6dbb67154353c2da3969483621b5d35364f73acfaa2a34b0ff5a40b,2025-02-13T17:17:20.517000 CVE-2025-25523,0,0,9c6d5a6c8c747b7673e69ebf58bf535f17db00e0831b58073ddd586410cf36d9,2025-02-13T18:18:23.400000 -CVE-2025-25524,0,1,e5ab191dac3567a0ecb9cd5ee0c956b8028b9ee4f621466df410e9ba84bd67fa,2025-04-29T16:22:26.843000 +CVE-2025-25524,0,0,e5ab191dac3567a0ecb9cd5ee0c956b8028b9ee4f621466df410e9ba84bd67fa,2025-04-29T16:22:26.843000 CVE-2025-25525,0,0,28e6ea18d8b7680922f1b90e9145c1f2397b2ef35fed04798aaa188943c76171,2025-02-13T18:18:23.773000 CVE-2025-25526,0,0,ea54d5d1ec1ba48465999b613bd81e7df7fbbb988e6de51b2728e9a8f0673c4f,2025-02-13T18:18:23.923000 CVE-2025-25527,0,0,c68bc1052cef66b41ddea961ada3d6ffad1b7182b1c7b5d98c868e3b22f09402,2025-02-13T18:18:24.080000 @@ -286875,7 +286875,7 @@ CVE-2025-25907,0,0,042fa44ae3449a91128a4cfdb3781e1176518918252daa0010b67c1143785 CVE-2025-25908,0,0,987339eb0875d89e420a1a58f2b73dd67bac14b8c8cb51aae54988a55163392a,2025-03-11T03:15:39.350000 CVE-2025-2591,0,0,ee87141e12ee943e529b8bb384fb8bdb2408b45f9dddbdaf93fe6f79882786ad,2025-03-21T14:15:16.853000 CVE-2025-25914,0,0,5f56c66d8de9bee616cb1da5ef251af605f05e5d5c498321787e18b7ebe1d356,2025-04-08T13:41:36.747000 -CVE-2025-25916,0,1,05104fa22e007c221705bee4393268c49d270c83d7fd7a5f93422a9208dd198c,2025-04-29T16:53:21.170000 +CVE-2025-25916,0,0,05104fa22e007c221705bee4393268c49d270c83d7fd7a5f93422a9208dd198c,2025-04-29T16:53:21.170000 CVE-2025-2592,0,0,d124ac5754c70fe2abbb856d73095eaa12aea924adec30dffbc20dc6b8f65990,2025-03-21T14:15:17.037000 CVE-2025-25925,0,0,b20168a3d50cf88edd84a566a9242d44f21536b05ff2eb09eadb24dfec7d4ec1,2025-03-12T16:15:23.337000 CVE-2025-25927,0,0,83d098307bb1434929b2c3eb986aaebca3bd185b63f2298cf5cea0f24c66cbeb,2025-03-12T16:15:23.480000 @@ -286902,7 +286902,7 @@ CVE-2025-25957,0,0,b65136edccab78b78b9c909881827ed1ed034886966746fcab259eb6d692a CVE-2025-25958,0,0,177c6eb34465ffc8aac17021df235670914f868dfddc4be469bb5e241da9eab3,2025-04-22T13:09:31.147000 CVE-2025-2596,0,0,95591cddf94618143e623a63fbb26d2f99203e6a4b78fbe2714bba0e0a1ddf6a,2025-03-27T16:45:27.850000 CVE-2025-25960,0,0,479d12f427b04800342d6481b780b7a5628b65f78b0f2b5e249fb2ad41b1c9f5,2025-04-22T13:09:06.197000 -CVE-2025-25962,1,1,ca0fecc775067e59d1b60e2597c83c9b1d14106a3c68b7f97cef613429d1e9f0,2025-04-29T16:15:30.580000 +CVE-2025-25962,0,0,ca0fecc775067e59d1b60e2597c83c9b1d14106a3c68b7f97cef613429d1e9f0,2025-04-29T16:15:30.580000 CVE-2025-25967,0,0,989386a4237cbda80018de244f1663bcd7537e8be154d2ce1f656a6eb97ba253,2025-03-06T12:25:50.837000 CVE-2025-25968,0,0,aa03a40375072b5ed2e0cc97eadb8b6a24b2d3fca5df43f3cc84fd5f8cf62db9,2025-02-20T20:15:46.993000 CVE-2025-2597,0,0,8a0cbd8d0652062d16855875dcb2e41c8d1851bedcf685074602b342e91bb38d,2025-04-01T20:24:03.190000 @@ -288128,23 +288128,23 @@ CVE-2025-28019,0,0,3c98ecf8b7598aaf5d41626998da627c1d554d5e2ae237d8820e47898474f CVE-2025-28020,0,0,afdb9ab4ee0ce1306c82aa72ddca5c28f44774bdaf860c1837f686d69fd7033d,2025-04-29T13:52:47.470000 CVE-2025-28021,0,0,8b99cb31a13bebe4ef84453a8403a2892bdfeb0be3751f4a8e99f484ed1dd5a9,2025-04-29T13:52:47.470000 CVE-2025-28022,0,0,ba52d190d5625c984d4740d3038c106b93ac65b579d9020c930b73000c7be1f3,2025-04-29T13:52:47.470000 -CVE-2025-28024,0,1,c80d64c0f2ecb1360d2217509f9898c6b3a3ba52e2e495be4a4d35f41a1d5e97,2025-04-29T16:21:01.237000 +CVE-2025-28024,0,0,c80d64c0f2ecb1360d2217509f9898c6b3a3ba52e2e495be4a4d35f41a1d5e97,2025-04-29T16:21:01.237000 CVE-2025-28025,0,0,38590c3e6eff5ade28b68cd6716c0bcdd9defc04f0f7dae404e8c076f60f3310,2025-04-29T13:52:47.470000 CVE-2025-28026,0,0,8480b5560153ce72f4425353c574281856fb8091a1e15b194635ef2afb21b90d,2025-04-23T14:15:28.480000 CVE-2025-28027,0,0,b8496ee2e2e521121a326629ec65d970fe783f87e3f18897e673921a88d76ef4,2025-04-23T17:16:53.480000 CVE-2025-28028,0,0,ad1ee88d3e87ad09460a8edd37e0030c5d8a081e4200b61ad93add8acd3e51d2,2025-04-29T13:52:47.470000 CVE-2025-28029,0,0,79e5df2a45af174c5e3177f6dc53635ea28907669182fd30abf57d4bd57982f0,2025-04-23T15:15:59.720000 CVE-2025-2803,0,0,e47ecd50bab8435762f20a0360685d74e0ceaca5cc3e5df3e0509ccc4da5c57f,2025-04-01T20:26:30.593000 -CVE-2025-28030,0,1,b85116e9a674a6c3dcb0aaab519e4a9ba5737df8e4578fa11d520860e4a9088c,2025-04-29T16:21:07.407000 -CVE-2025-28031,0,1,b245f98639a398f123f907ca56744465a0034a4569d9f7d8e22de194f8586af4,2025-04-29T16:21:10.783000 -CVE-2025-28032,0,1,73eb10f52c5cf761cf234de6f37f4aa487fd5770c3e94038b0b6d381d26072ab,2025-04-29T16:19:28.467000 -CVE-2025-28033,0,1,8623a5b0ea542361f60b81998435160fdd648763b3f9f4a14ec8d202e6fc9ea6,2025-04-29T16:19:19.250000 -CVE-2025-28034,0,1,ccc86ed34e930e82fc6979916c3415dfdf016310056135f555ca67635392d139,2025-04-29T16:18:58.493000 -CVE-2025-28035,0,1,2e512937012ab60c2131285f2f4cb5e596d1b70c60c58df86ee6d98b1e00486a,2025-04-29T16:14:17.150000 -CVE-2025-28036,0,1,c421d3f9cc499d682dee5413dc362cffdd2b5ca9887d0c5b619c68b9ffc6ded6,2025-04-29T16:13:29.720000 -CVE-2025-28037,0,1,c9241efc2364b26906dd41e1969a9d9a13f253a8843ca874836bf0af29d1a4a8,2025-04-29T16:03:42.887000 -CVE-2025-28038,0,1,46df29a94614d53d2d4678213bd0ab9a6d3f7530231cbf83b8db2ee8e48a219b,2025-04-29T16:02:01.753000 -CVE-2025-28039,0,1,1b599e06f5a4e23fe6fb163660d4bc70d995f8b2b9997fa65746d32955bcd877,2025-04-29T16:01:14.980000 +CVE-2025-28030,0,0,b85116e9a674a6c3dcb0aaab519e4a9ba5737df8e4578fa11d520860e4a9088c,2025-04-29T16:21:07.407000 +CVE-2025-28031,0,0,b245f98639a398f123f907ca56744465a0034a4569d9f7d8e22de194f8586af4,2025-04-29T16:21:10.783000 +CVE-2025-28032,0,0,73eb10f52c5cf761cf234de6f37f4aa487fd5770c3e94038b0b6d381d26072ab,2025-04-29T16:19:28.467000 +CVE-2025-28033,0,0,8623a5b0ea542361f60b81998435160fdd648763b3f9f4a14ec8d202e6fc9ea6,2025-04-29T16:19:19.250000 +CVE-2025-28034,0,0,ccc86ed34e930e82fc6979916c3415dfdf016310056135f555ca67635392d139,2025-04-29T16:18:58.493000 +CVE-2025-28035,0,0,2e512937012ab60c2131285f2f4cb5e596d1b70c60c58df86ee6d98b1e00486a,2025-04-29T16:14:17.150000 +CVE-2025-28036,0,0,c421d3f9cc499d682dee5413dc362cffdd2b5ca9887d0c5b619c68b9ffc6ded6,2025-04-29T16:13:29.720000 +CVE-2025-28037,0,0,c9241efc2364b26906dd41e1969a9d9a13f253a8843ca874836bf0af29d1a4a8,2025-04-29T16:03:42.887000 +CVE-2025-28038,0,0,46df29a94614d53d2d4678213bd0ab9a6d3f7530231cbf83b8db2ee8e48a219b,2025-04-29T16:02:01.753000 +CVE-2025-28039,0,0,1b599e06f5a4e23fe6fb163660d4bc70d995f8b2b9997fa65746d32955bcd877,2025-04-29T16:01:14.980000 CVE-2025-2804,0,0,05befb6a988325f06e55dd5b0c814f5549862889b3223abfcf82e08eebaa0244,2025-03-28T18:11:40.180000 CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d084,2025-04-11T15:39:52.920000 CVE-2025-28059,0,0,0b528bcd391ca7d8898ab4bd4553bb61f607c8c85b3fa32f1b18963847081036,2025-04-22T15:16:10.627000 @@ -288174,8 +288174,8 @@ CVE-2025-28128,0,0,d4ce6ba0add35bf9556ff4eb9a95adc7931c033d4df5673bdbba8c2e3e90e CVE-2025-28131,0,0,0e6d437e3a9f63309173cfffb683667f8de949bf1baa410130154ac2738212a3,2025-04-01T20:26:01.990000 CVE-2025-28132,0,0,97b47f11d67eb8801e01a6ba8c51fcb6171d404dc753f2ff5e62dc9c1e96c78b,2025-04-01T20:26:01.990000 CVE-2025-28135,0,0,3c4c5b74864d84436149ac901c7ee84cc8a8d394ff1e3314e6ce4d35a081fb42,2025-04-15T14:15:41.103000 -CVE-2025-28136,0,1,4ba9dfb24e16dae37fd8e3115d7b2d99289e93af064e2897992c05393635f48c,2025-04-29T16:22:52.613000 -CVE-2025-28137,0,1,ec40e8ba79e15a404d0b9652afa1eb5e0350ff93ad35f90b5a00c5deffd87322,2025-04-29T16:23:23.197000 +CVE-2025-28136,0,0,4ba9dfb24e16dae37fd8e3115d7b2d99289e93af064e2897992c05393635f48c,2025-04-29T16:22:52.613000 +CVE-2025-28137,0,0,ec40e8ba79e15a404d0b9652afa1eb5e0350ff93ad35f90b5a00c5deffd87322,2025-04-29T16:23:23.197000 CVE-2025-28138,0,0,1b34e50519727583c2509248c4a99e365feb1498de5e5962b10a3a7f43512fae,2025-04-15T15:16:08.067000 CVE-2025-2814,0,0,09edb5ffe7a5c57b1d00366da83ea3795ad0b26d59e02444662429a90a7a208f,2025-04-15T18:39:27.967000 CVE-2025-28142,0,0,a1945e882383a595c06b5d82dd2b4e7c31f831e205baa37e41a4fa5e3d464b8f,2025-04-15T21:15:55.927000 @@ -288394,9 +288394,9 @@ CVE-2025-29058,0,0,7bc50f4cade840847079528b991d483c5848c526d0c824da3719f4b63ecc5 CVE-2025-2906,0,0,a9a7d8b41557888835e1c79dd2617916cc6b4f3c0d6d09861e305343a3b52d6a,2025-04-01T20:26:11.547000 CVE-2025-29062,0,0,cf634246124158ff6da279c0a25858fa36e0953ce98966a9f38c5cffd84c104e,2025-04-29T13:42:54.483000 CVE-2025-29063,0,0,53319713162795fa5af1bba6f6ae7ca1ca4961c65f7a40b22ba40193b32d5e1f,2025-04-29T13:38:03.320000 -CVE-2025-29064,0,1,63a2e77cd24c8af8015f89e4f52086066c5d276c186ea606691a5ed2d32f4038,2025-04-29T16:22:36.443000 +CVE-2025-29064,0,0,63a2e77cd24c8af8015f89e4f52086066c5d276c186ea606691a5ed2d32f4038,2025-04-29T16:22:36.443000 CVE-2025-29069,0,0,1698d40149a4df33ad01a99a20685ac0b1cd77de5d7edd807b36236e8eb2a643,2025-04-04T21:15:44.987000 -CVE-2025-2907,0,1,b1416e990a293c211cd50c19c95875ec3c73907164f4a6a23182f1481d48c208,2025-04-29T16:15:30.733000 +CVE-2025-2907,0,0,b1416e990a293c211cd50c19c95875ec3c73907164f4a6a23182f1481d48c208,2025-04-29T16:15:30.733000 CVE-2025-29070,0,0,01291a5766bf65c1287ee0f6127f3a568879dd8e4b1dbd2e417b1c53e816cdae,2025-04-04T21:15:45.167000 CVE-2025-29072,0,0,fd95fded2fd85d3027eac83af76782f039ae97bbb9711a4bf20a00b195ae0993,2025-04-11T17:20:02.963000 CVE-2025-2908,0,0,79924d3ecfe8650096befc9934447812930496f664f45bff66577cd53948d0ef,2025-03-28T18:11:40.180000 @@ -288426,7 +288426,7 @@ CVE-2025-29189,0,0,acad0707e84ed6f6034c389318c16d4a284ae555c697c4e5480dcb98a0326 CVE-2025-2919,0,0,1d818e3cdb60bc40bbb8474c5c52d97f9dd37ab065859a371a6909ea5f7a7aa2,2025-04-17T14:06:09.157000 CVE-2025-2920,0,0,2401864f099a711f30f8b2d38398a72d7195f85541e7f19ba35b8b1ff663c52a,2025-04-01T20:26:39.627000 CVE-2025-29208,0,0,d4c51c4c9a8edbd427c62b2d7072ece4f095c5ba799606f3181421fe55eec87c,2025-04-29T14:21:13.553000 -CVE-2025-29209,0,1,03225d51f061da6b0fb530c12f1857dffd0dbaee6ce165cccd4b6a4eb4df3c2c,2025-04-29T16:23:36.113000 +CVE-2025-29209,0,0,03225d51f061da6b0fb530c12f1857dffd0dbaee6ce165cccd4b6a4eb4df3c2c,2025-04-29T16:23:36.113000 CVE-2025-2921,0,0,9699494d9e2188360f8bb70978c1473b6fd42ed7b51cafd5be6de03ad5519768,2025-04-17T14:21:41.600000 CVE-2025-29213,0,0,1fb62b4960ceee2f8323143f91cb017f8787c239acca9679cc330c7892094be7,2025-04-25T16:49:30.973000 CVE-2025-29214,0,0,2f3c93fd24943456f370bfa5c5d58e2eb2d54f2259ee734aa123f6beaa43463e,2025-03-25T17:37:42.507000 @@ -288935,7 +288935,7 @@ CVE-2025-30439,0,0,da2ca7ddbba55c6600a20f55dae4819460d11b882f4097a091f5482180051 CVE-2025-30441,0,0,0c04a93a6f174bf42d94b9b28150654c6cdebea87baad1c1bed2a17317c45cac,2025-04-04T19:40:24.640000 CVE-2025-30443,0,0,1fb67cce84049899c0c796e27ca3e5ee74832ab2e8e9be24196d4eab36479a77,2025-04-07T13:33:17.047000 CVE-2025-30444,0,0,7012499cc39e750a77057d8969c8b8cc9bf8b8609bf143b9cc39bc30fc25c076,2025-04-07T13:33:03.150000 -CVE-2025-30445,0,1,e4af0dfae58e3bd577993074be12dfdc35a3a755f2b3fd853ea1f329de78b2b9,2025-04-29T16:15:30.873000 +CVE-2025-30445,0,0,e4af0dfae58e3bd577993074be12dfdc35a3a755f2b3fd853ea1f329de78b2b9,2025-04-29T16:15:30.873000 CVE-2025-30446,0,0,981dffbeeed7b6d0a133a31354b5639e18efeb1f940bfa1a46bd0e35bafba0f8,2025-04-07T13:32:49.590000 CVE-2025-30447,0,0,203471f1d33c3097ff3e7033ccb86976a2135c3fac1bc3d6f9d9447f0c63a815,2025-04-07T13:32:38.797000 CVE-2025-30449,0,0,803f705e11846ad27b3daa6777d882e147b1edc94d42ae75dc7a301c5de3d9af,2025-04-07T13:32:19.277000 @@ -289042,7 +289042,7 @@ CVE-2025-30586,0,0,750e9f0e62701cc7d9f85c333eaf38b162024e41f2640d54806c1fc995663 CVE-2025-30587,0,0,aef2b2bea767d4d028fb9963d47d9ef91d920748cd1348e455c8f98cef841670,2025-03-27T16:44:44.143000 CVE-2025-30588,0,0,5f8ea50c75b9887ae4abe2a7a7e2e691cc44041310b1a21bc03b87349fdc8110,2025-03-27T16:44:44.143000 CVE-2025-30589,0,0,15773cb704becee413a74b6749590284568892c425cef543a7641c3e80da7f5e,2025-04-01T20:26:11.547000 -CVE-2025-3059,0,1,5b2ff77a17c91170c7e68c06b296490c809e637eba8b91b2e94db918f5d8ad1c,2025-04-29T16:15:36.010000 +CVE-2025-3059,0,0,5b2ff77a17c91170c7e68c06b296490c809e637eba8b91b2e94db918f5d8ad1c,2025-04-29T16:15:36.010000 CVE-2025-30590,0,0,6b7d45d9af83ce5a497e5f8e2ad019e5a4ee6dc2d0a2103adeb6fa3f22fe0bcc,2025-03-27T16:44:44.143000 CVE-2025-30591,0,0,014b9e71f3c98abcf2a9b905482b5ac497717af9774ff72e16d99299de3ffcd4,2025-03-27T16:44:44.143000 CVE-2025-30592,0,0,4e34bd1a744c317f2ba8f1569663e07b4a2d3b4092f3fcc51cdc18a9a1768ee2,2025-03-27T16:44:44.143000 @@ -289500,8 +289500,8 @@ CVE-2025-31197,0,0,a7c143bc1fac6ca2870bda139259351fc92b6b7f67a8aaced1f87e7af7855 CVE-2025-3120,0,0,9369db34641ba283515729ba877bacc73b1ed0ebf559ba3490de54e6e6cc3ad7,2025-04-07T14:18:34.453000 CVE-2025-31200,0,0,a74f3af296b68c60f67b1de629944e384bb830a561ceea1f2a5727cedcce4f22,2025-04-18T13:50:15.483000 CVE-2025-31201,0,0,e7a89cad97e6db05e56e18d53afb0ef797d06486568ee4e0af2d0bab9bccd568,2025-04-18T13:47:59.890000 -CVE-2025-31202,0,1,4c25463b023801fd90781701f6c399bf7dd3dd01e9e4fc2c6557d69c3f31babd,2025-04-29T16:15:31.030000 -CVE-2025-31203,0,1,d4a017174a54e0f218f6f763981d71f7fb57026a45d649a35986247b10433f59,2025-04-29T16:15:31.170000 +CVE-2025-31202,0,0,4c25463b023801fd90781701f6c399bf7dd3dd01e9e4fc2c6557d69c3f31babd,2025-04-29T16:15:31.030000 +CVE-2025-31203,0,0,d4a017174a54e0f218f6f763981d71f7fb57026a45d649a35986247b10433f59,2025-04-29T16:15:31.170000 CVE-2025-3121,0,0,0fd3e4db6bab40a1114040fef4157a1f22168b8ff992c2ce90e1de325e42fd49,2025-04-07T14:18:34.453000 CVE-2025-3122,0,0,772110a5ff905b9e06974468fd4d65c9c80b3c7578e83c665aac7f3d07cf62ac,2025-04-07T14:18:34.453000 CVE-2025-3123,0,0,449baa99ae5f8386dedc8c93a29da0c19761ac9b25b48941a87f062412255d46,2025-04-07T14:18:34.453000 @@ -289807,33 +289807,33 @@ CVE-2025-31654,0,0,c85615ab54233a158d1eec4ce7ea5a25d93d07293af602cf9b39c0b8e4488 CVE-2025-3166,0,0,17028d9ea804572df4baaaae9408352ee57c738220a3aec0680e295f0ee3c81b,2025-04-08T19:54:38.830000 CVE-2025-3167,0,0,e58de6ed62e27cca62597484e5b404e43ba55291ae09b2f605cc65279611cd5c,2025-04-08T13:50:05.433000 CVE-2025-31672,0,0,0313b2147a601e97da2e5355f7122e1797d53162196bc2916abf098d82c4064d,2025-04-18T17:15:34.837000 -CVE-2025-31673,0,1,8a6a660ffd37ac4608bd3975649bf05c3058f6c9c325d9d31901c927bd811bf0,2025-04-29T16:15:31.317000 +CVE-2025-31673,0,0,8a6a660ffd37ac4608bd3975649bf05c3058f6c9c325d9d31901c927bd811bf0,2025-04-29T16:15:31.317000 CVE-2025-31674,0,0,979222b86e7709fb6c8879295ca1116ce472e080eaad7506ef2c62f15ca170d3,2025-04-03T18:15:47.417000 -CVE-2025-31675,0,1,cc7d7b7ee8997ff6569ee63e2f8dec876103b0b4b4cee3ea5f760a692a140d1d,2025-04-29T16:15:31.470000 -CVE-2025-31676,0,1,9a9312acedbe68d0b1b4f1e94e5de965f957e3cda70ecf610229c6b209173f12,2025-04-29T16:15:31.617000 -CVE-2025-31677,0,1,33abf7991aee09c2b10fab18adc10dfc5fcd31e5cd89772a09cba8a12472694c,2025-04-29T16:15:31.757000 -CVE-2025-31678,0,1,6ae6d9ee717418f91ae1ece64a8bdef23daf8222bd76393dcf34f21b36350baf,2025-04-29T16:15:31.910000 -CVE-2025-31679,0,1,dca2c2a603308b8a584b70a6744cce62020601c148a2fff1a006282b082ab548,2025-04-29T16:15:32.067000 +CVE-2025-31675,0,0,cc7d7b7ee8997ff6569ee63e2f8dec876103b0b4b4cee3ea5f760a692a140d1d,2025-04-29T16:15:31.470000 +CVE-2025-31676,0,0,9a9312acedbe68d0b1b4f1e94e5de965f957e3cda70ecf610229c6b209173f12,2025-04-29T16:15:31.617000 +CVE-2025-31677,0,0,33abf7991aee09c2b10fab18adc10dfc5fcd31e5cd89772a09cba8a12472694c,2025-04-29T16:15:31.757000 +CVE-2025-31678,0,0,6ae6d9ee717418f91ae1ece64a8bdef23daf8222bd76393dcf34f21b36350baf,2025-04-29T16:15:31.910000 +CVE-2025-31679,0,0,dca2c2a603308b8a584b70a6744cce62020601c148a2fff1a006282b082ab548,2025-04-29T16:15:32.067000 CVE-2025-3168,0,0,fccf3c58c5bc764907e3d9f305bc256bd4eaba2ef08d7e9bbcbcf3366827f593,2025-04-07T14:18:34.453000 -CVE-2025-31680,0,1,2b3c78ec4d11cbdf05da7678b942cc5d07cce5c8ceacb32c98ede81775bcb80c,2025-04-29T16:15:32.230000 -CVE-2025-31681,0,1,f8f1d2030b5b340ff06dd7ee73f021d852da6d6e84f1e31fea85f17abc381b04,2025-04-29T16:15:32.373000 -CVE-2025-31682,0,1,842f346c9a78911feef95711ef9eaeddbf07fc9431258868225dfb3d083c3c21,2025-04-29T16:15:32.527000 -CVE-2025-31683,0,1,0743e62a8e8327be87faa0633ff201358cf699165f866c3f7afffc5d7a123e68,2025-04-29T16:15:32.687000 -CVE-2025-31684,0,1,4bed3e4bd338502b210a176d6e722bb6bb2e9493bfedc7909422eccb8e9e982e,2025-04-29T16:15:32.823000 -CVE-2025-31685,0,1,851b11dc818949efe4485f4cd88312b20cfdd208bca9fa406ccc4bad9c174a3c,2025-04-29T16:15:32.967000 -CVE-2025-31686,0,1,6e80ebebd2a526f2589aef0e00dcdbf57ed85a17beab7a887251b3f132f705ad,2025-04-29T16:15:33.113000 -CVE-2025-31687,0,1,aabc3be8e0548434fdbc1356cddda0a5f01453dd1cab0a33b410800f045fed31,2025-04-29T16:15:33.253000 -CVE-2025-31688,0,1,cc15f5447a83eb55a53a3513b3ee96d80cd60c730a18a49e091741662325b4ee,2025-04-29T16:15:33.397000 -CVE-2025-31689,0,1,c263336ab97b80d62f3560ed43fbca48dc2e287a41af8d5728a382f985c00b0a,2025-04-29T16:15:33.537000 +CVE-2025-31680,0,0,2b3c78ec4d11cbdf05da7678b942cc5d07cce5c8ceacb32c98ede81775bcb80c,2025-04-29T16:15:32.230000 +CVE-2025-31681,0,0,f8f1d2030b5b340ff06dd7ee73f021d852da6d6e84f1e31fea85f17abc381b04,2025-04-29T16:15:32.373000 +CVE-2025-31682,0,0,842f346c9a78911feef95711ef9eaeddbf07fc9431258868225dfb3d083c3c21,2025-04-29T16:15:32.527000 +CVE-2025-31683,0,0,0743e62a8e8327be87faa0633ff201358cf699165f866c3f7afffc5d7a123e68,2025-04-29T16:15:32.687000 +CVE-2025-31684,0,0,4bed3e4bd338502b210a176d6e722bb6bb2e9493bfedc7909422eccb8e9e982e,2025-04-29T16:15:32.823000 +CVE-2025-31685,0,0,851b11dc818949efe4485f4cd88312b20cfdd208bca9fa406ccc4bad9c174a3c,2025-04-29T16:15:32.967000 +CVE-2025-31686,0,0,6e80ebebd2a526f2589aef0e00dcdbf57ed85a17beab7a887251b3f132f705ad,2025-04-29T16:15:33.113000 +CVE-2025-31687,0,0,aabc3be8e0548434fdbc1356cddda0a5f01453dd1cab0a33b410800f045fed31,2025-04-29T16:15:33.253000 +CVE-2025-31688,0,0,cc15f5447a83eb55a53a3513b3ee96d80cd60c730a18a49e091741662325b4ee,2025-04-29T16:15:33.397000 +CVE-2025-31689,0,0,c263336ab97b80d62f3560ed43fbca48dc2e287a41af8d5728a382f985c00b0a,2025-04-29T16:15:33.537000 CVE-2025-3169,0,0,672f52f3293b7b14a23f48d691f3381597361fbb3213b3fd51098cd5f9c0e3a6,2025-04-07T14:18:34.453000 -CVE-2025-31690,0,1,c6caeb938f09f9c6ae703dd30bceeb95518de2c9bcc4f99d827bfb76c51d02d6,2025-04-29T16:15:33.680000 -CVE-2025-31691,0,1,be7eda4c457c528f4da2d67c4259c991b638c6d3d1af376c9dc51d0c0d59c971,2025-04-29T16:15:33.817000 +CVE-2025-31690,0,0,c6caeb938f09f9c6ae703dd30bceeb95518de2c9bcc4f99d827bfb76c51d02d6,2025-04-29T16:15:33.680000 +CVE-2025-31691,0,0,be7eda4c457c528f4da2d67c4259c991b638c6d3d1af376c9dc51d0c0d59c971,2025-04-29T16:15:33.817000 CVE-2025-31692,0,0,245a6b7f228daea56920dd07d4e30337bba7463400e493a8d1e6d2cd86a4762a,2025-04-03T18:15:47.570000 CVE-2025-31693,0,0,3c19c2f02545feb168b224e42ca7595c177603397e07401d95c59cbdb9bc9149,2025-04-15T14:58:25.040000 -CVE-2025-31694,0,1,ca7b6a12f88250e41157726afe1e54fba9ef36ba52e8894f4db4aa7871bd194f,2025-04-29T16:15:33.960000 -CVE-2025-31695,0,1,044b0f435e7672f738ea051c11db83a00ebaff63dbdb68e706b7dcc13acb90b6,2025-04-29T16:15:34.097000 -CVE-2025-31696,0,1,7181c70430e7f11f94551e571b933443a77c74627eab2d3af9d5a2722d8bbb8e,2025-04-29T16:15:34.243000 -CVE-2025-31697,0,1,d2f6e5dae8beddd7adbc933b42660d8199d000a2c4970c75b74c3c6a7e4fd487,2025-04-29T16:15:34.633000 +CVE-2025-31694,0,0,ca7b6a12f88250e41157726afe1e54fba9ef36ba52e8894f4db4aa7871bd194f,2025-04-29T16:15:33.960000 +CVE-2025-31695,0,0,044b0f435e7672f738ea051c11db83a00ebaff63dbdb68e706b7dcc13acb90b6,2025-04-29T16:15:34.097000 +CVE-2025-31696,0,0,7181c70430e7f11f94551e571b933443a77c74627eab2d3af9d5a2722d8bbb8e,2025-04-29T16:15:34.243000 +CVE-2025-31697,0,0,d2f6e5dae8beddd7adbc933b42660d8199d000a2c4970c75b74c3c6a7e4fd487,2025-04-29T16:15:34.633000 CVE-2025-3170,0,0,afb2bda5dd4e3285c33c62d49a05a12fd30d05e815744685a436b70b7583067d,2025-04-08T20:52:02.413000 CVE-2025-3171,0,0,facd85de14a5feadcffd67276b1dd3aaa07eb8c0a878fc188d12f11d57d8217c,2025-04-08T20:43:42.857000 CVE-2025-3172,0,0,30e87904870fb7281a65c37665525acd4a3d1c12b0e1b13d031a33e5fa50c544,2025-04-07T14:18:34.453000 @@ -290298,7 +290298,7 @@ CVE-2025-3229,0,0,601e3d3bbee98b6c8d411bef361231118b9ba6394db4f244736698e0ae8f62 CVE-2025-3231,0,0,e195c9aab4993647d4ae533ad8c6eda5a754cea40d4facd1ebd44795fa6d7640,2025-04-07T14:18:15.560000 CVE-2025-3235,0,0,a65b9c3e5afd8791f2a69a839ed6cf33ae5de1739a6ab17cee2bee89a757709a,2025-04-27T20:15:15.203000 CVE-2025-32352,0,0,14a2251916c9246fc3d185746736b75fd36a375e4aafcddd19d832e612b92a9a,2025-04-07T17:15:37.147000 -CVE-2025-32354,1,1,744a70843c66a4971f47e53ec961f73b92dbc167e1735a9ea70500e564a00d48,2025-04-29T16:15:34.770000 +CVE-2025-32354,0,0,744a70843c66a4971f47e53ec961f73b92dbc167e1735a9ea70500e564a00d48,2025-04-29T16:15:34.770000 CVE-2025-32357,0,0,40a7f1d5c6b84f284e89452f93123e33fcf709d542192697901a2fb84d3fea3e,2025-04-15T16:37:00.857000 CVE-2025-32358,0,0,35ddf5d60f01f12924c71130d21e356ed29ef81b38985bea1a5740abef3cce29,2025-04-15T16:36:06.817000 CVE-2025-32359,0,0,691ae0a78a9f09e570651bfa1c97d8241e2da245cbb7cc39b5c3244e77534bc8,2025-04-15T15:31:20.960000 @@ -290757,15 +290757,15 @@ CVE-2025-32966,0,0,ad89d18bacac49b615f22cd84fc2faeab22cc6074cae40f48dab36328b9fc CVE-2025-32968,0,0,571a9a7aac92637556c2d8a39931874ac725ec1a047714df4d5ca6f6ca333754,2025-04-29T13:52:47.470000 CVE-2025-32969,0,0,ef4541fcdac2aaae5e1da58f8e89707a4fd3aa1103c0df7257cf86f92e08f7f0,2025-04-29T13:52:47.470000 CVE-2025-3297,0,0,f3faf1e3ad604dfa1f7c47fce9497b7cd8333099ba83659c1904627c06ced289,2025-04-08T16:49:12.910000 -CVE-2025-32979,0,1,f1833426290c14e0099e0331e19b62a258cc1db9f3379ed30ba118fcd5db0566,2025-04-29T16:15:34.913000 +CVE-2025-32979,0,0,f1833426290c14e0099e0331e19b62a258cc1db9f3379ed30ba118fcd5db0566,2025-04-29T16:15:34.913000 CVE-2025-3298,0,0,42b3c11a03b3e330acf149137409814de4838d8396b46617a725d88596b9ad1f,2025-04-08T16:49:00.290000 -CVE-2025-32980,0,1,3dd20b282accd80f93457ce23840b74ef7abed775a357a8bccd4dae346a6695e,2025-04-29T16:15:35.103000 -CVE-2025-32981,0,1,627b5f18ee0c7ae54dc8af9304a26af855a87f1ab8b24f57f3611bc3c7acb7f9,2025-04-29T16:15:35.280000 -CVE-2025-32982,0,1,a7e105d11406813e227c7b7d283f058bdc59e281f1c1ec0f2e6915fdf83f1915,2025-04-29T16:15:35.457000 +CVE-2025-32980,0,0,3dd20b282accd80f93457ce23840b74ef7abed775a357a8bccd4dae346a6695e,2025-04-29T16:15:35.103000 +CVE-2025-32981,0,0,627b5f18ee0c7ae54dc8af9304a26af855a87f1ab8b24f57f3611bc3c7acb7f9,2025-04-29T16:15:35.280000 +CVE-2025-32982,0,0,a7e105d11406813e227c7b7d283f058bdc59e281f1c1ec0f2e6915fdf83f1915,2025-04-29T16:15:35.457000 CVE-2025-32983,0,0,2522139221e7d7013dfc392e2fed9d1dfed109ef3fce1454e8225d5853a315e7,2025-04-29T13:52:28.490000 CVE-2025-32984,0,0,091f553bc982279246f62c6b150a74605f21e36588c3195d628a19a61ddc0e50,2025-04-29T13:52:28.490000 -CVE-2025-32985,0,1,154abedff9a400279a6067e3baa48f5ab6c9ee02b9a20659fec462433e0b1a62,2025-04-29T16:15:35.643000 -CVE-2025-32986,0,1,53b636a429aa6857913ee20ec68d7ee7f6657d6b26b25874fa6ddcc85139d8f7,2025-04-29T16:15:35.820000 +CVE-2025-32985,0,0,154abedff9a400279a6067e3baa48f5ab6c9ee02b9a20659fec462433e0b1a62,2025-04-29T16:15:35.643000 +CVE-2025-32986,0,0,53b636a429aa6857913ee20ec68d7ee7f6657d6b26b25874fa6ddcc85139d8f7,2025-04-29T16:15:35.820000 CVE-2025-32987,0,0,22fee82644638daf52e45d25879682a7b8e6315d4283004fcb29ee09fc3f6bc1,2025-04-15T18:39:27.967000 CVE-2025-3299,0,0,4bb68d1a77531b6cf0d60c8ebf8a47f27b8c946ab637bd433e4b42368b67a253,2025-04-08T16:48:45.137000 CVE-2025-32993,0,0,efe10e43b700d805bab5f9cbf4da0d85804a68c5ec719e614ee799809a295233,2025-04-15T18:39:27.967000 @@ -290802,14 +290802,14 @@ CVE-2025-3329,0,0,8ad5df2c79d0da5ba420926e6d97eaf086c9c730d686f4410691f3a41811f2 CVE-2025-3330,0,0,81b91d3415d54487b0e72b874358b0e395945e81f185f09540a57d80adb3d6e2,2025-04-07T18:17:30.230000 CVE-2025-3331,0,0,de8d030e3c6d59904c2434ca0e69c66c8a7881a8abe027c7d0070392fc69af33,2025-04-07T18:17:01.327000 CVE-2025-3332,0,0,8670e415616f56fe491b3a0d92603ef6193b0c5721b561fa689da9e8e9a39b24,2025-04-07T18:16:40.283000 -CVE-2025-3333,0,0,c30adaaf87470712a53c9bd0db6cf065c7d69b4583928c203051d42c86adbc8a,2025-04-07T14:17:50.220000 -CVE-2025-3334,0,0,72954013bee421ea717f67e5d3a8cf6cbc744fe2990dcb4a187e7fc73e4cad1f,2025-04-07T14:17:50.220000 +CVE-2025-3333,0,1,69b28a26f55ea774feab7bfddb46a747bb552e4800fc6336fa57c4a768c9cc48,2025-04-29T19:39:40.330000 +CVE-2025-3334,0,1,01d4b042eb21a3d2978410699b563daf6504d3f5c07091adedb2df8725be7050,2025-04-29T19:33:04.337000 CVE-2025-3335,0,0,87048f57820b9ca5564a2dc1dbd74240c8c73b53c9abbb2e21420efe6a588293,2025-04-11T13:05:02.750000 CVE-2025-3336,0,0,ab5fa15dbcf26cf768067d78abce0423b4b4d7744bc521d84b7edd7330c5dabc,2025-04-11T13:04:49.237000 CVE-2025-3337,0,0,589e3cb49fe4109a80c13566529845d81cb90b9b7d8801bfdb44ce3c03b8b967,2025-04-11T13:03:37.470000 -CVE-2025-3338,0,0,b0a2de3e2e7f7d71881239d4efd25c68430d862d172cd54ddf49ca7d7da29861,2025-04-07T14:17:50.220000 -CVE-2025-3339,0,0,bb3a7caaa25f6d6d62c69c4079763f8fe08536ea372dc55cf6a22586b0cdbc8f,2025-04-07T14:17:50.220000 -CVE-2025-3340,0,0,ec3b6204ded5e905252c266bdd2ec878b2cfc02140270f8520fa5a2e0f10ce09,2025-04-07T14:17:50.220000 +CVE-2025-3338,0,1,bd5063eefe66f9ab179b1562a85f71a5b1f01bf5631c5885e4d10daef8f1fa4d,2025-04-29T19:29:51.553000 +CVE-2025-3339,0,1,c44f98b622f5e762b9fe5c0dd70b6597740a59d8acb5efd00ca2226745a4a82a,2025-04-29T19:29:05.240000 +CVE-2025-3340,0,1,2e3f67761fed17aab7768d1abb18b7f70096f2b8bc6e9e174567733843284de5,2025-04-29T19:25:09.687000 CVE-2025-3341,0,0,ecbb4b64cbd9ccfc432e7f91768245a6eb47625a8c2dbfe1120863298b805df9,2025-04-07T14:17:50.220000 CVE-2025-3342,0,0,a658af572dac36d420f981c7a655bd41788a35b688c79fcb5c0f562141609df7,2025-04-07T14:17:50.220000 CVE-2025-3343,0,0,5bb73d588314dedd5422b69d77e619922b27dd344ad4b6ccb3d4630f3ab563c2,2025-04-07T14:17:50.220000 @@ -291054,7 +291054,7 @@ CVE-2025-3725,0,0,7d232e288544c2824dd15c31c7bd02add4a6f79c1fadf2f899e52b49b6c9c6 CVE-2025-3726,0,0,b3b371cb92082d5129b47ebd1f0b5b26a64d96cbebf1a6a831047b36fd63a38c,2025-04-17T20:21:48.243000 CVE-2025-3727,0,0,0ffb95d65662b520054c5a3d41c324c400ad8b6851b719d3deb6bbb338d5ce1c,2025-04-17T20:21:48.243000 CVE-2025-3728,0,0,39be911a2b9cd3077a6744fa2fb0d264996b83ff915deec6cf158c51237e48a8,2025-04-17T20:21:48.243000 -CVE-2025-3729,0,0,de20c19e120e74843c5fc1bf596496e294ce676250c3f9e81777709a45cfb794,2025-04-17T20:21:48.243000 +CVE-2025-3729,0,1,1d140d72316ac2893230bbc57c80ca4562605a381f9f64d7147d8b013a4b196f,2025-04-29T19:12:13.150000 CVE-2025-3730,0,0,d1b938a4099b4ec3a0cf18f7cbec23cf2c3d9a5942ffae79167fdb3ac15a9ce1,2025-04-17T20:21:48.243000 CVE-2025-3733,0,0,bd2423bfa2e25df8ceaeb08155cbb1c593926d338a8c7df8ac51f3070bbab46d,2025-04-17T20:22:16.240000 CVE-2025-3734,0,0,d5fab3a5a3dbb514dcff3113c48ab9cc1e12a805d114c4f3a68a1acf4832dbe6,2025-04-17T20:22:16.240000 @@ -291075,20 +291075,20 @@ CVE-2025-3765,0,0,68e17786c25a61efd339a22730a89c86209c696f27734ad0227474e202b533 CVE-2025-3767,0,0,292444054f64728a26421e1d4abd19f40fd20bae5ef25e71c0fda7db865359ae,2025-04-23T14:08:13.383000 CVE-2025-3775,0,0,20bc664b0f69129d68331aeb5d33b9dfe8093b6db4e47568c03fcca515e2ea9e,2025-04-29T13:52:28.490000 CVE-2025-3776,0,0,b97851cfd5e91384771b780d4e1c5367c36e39bef30f6566b6d107fa57954dff,2025-04-29T13:52:47.470000 -CVE-2025-37785,0,1,819e98308a2831c55347329c367982a19c0595edc97f14a7607d4771840236ec,2025-04-29T16:56:25.337000 +CVE-2025-37785,0,0,819e98308a2831c55347329c367982a19c0595edc97f14a7607d4771840236ec,2025-04-29T16:56:25.337000 CVE-2025-3783,0,0,08564e7625cce7923d54746f30fbc8f13bf12d9607faa6a7346084b96420b3f3,2025-04-23T18:03:35.193000 CVE-2025-37838,0,0,968d59a8b1b7a4d9c59001f618e4d0716f7f54f25d8140bf09d7fc6cff47bedd,2025-04-25T18:40:30.147000 CVE-2025-3785,0,0,34d9097de5cddb801f390505cfe685b8a98c847bdfd442c3d9a27ba845f11ce9,2025-04-21T14:23:45.950000 CVE-2025-3786,0,0,ef1623c50d812a740179b99f61135828f9278cbc4c5320b64de7a7e4bc416e8d,2025-04-22T16:35:33.920000 -CVE-2025-37860,0,1,8636fb2bcc8e8496c777750ce6f44529f73f0f5e004601634dc8d00395bd09d2,2025-04-29T16:55:17.163000 +CVE-2025-37860,0,0,8636fb2bcc8e8496c777750ce6f44529f73f0f5e004601634dc8d00395bd09d2,2025-04-29T16:55:17.163000 CVE-2025-3787,0,0,3beed123857a653da372b7c8a1c42164041d5977b1dd91112f1404522a8170e5,2025-04-23T17:52:33.120000 CVE-2025-3788,0,0,cdf311291578b63efe8f95343add07fd97c2f4779c659c598fcec26571babece,2025-04-23T17:34:33.343000 CVE-2025-3789,0,0,45bb126f4667ed3adb0e27c72ef15ba951797eb40c6f6ff30eb38b571923593a,2025-04-21T14:23:45.950000 -CVE-2025-37893,0,1,1c7e00a1f138c68a8becda210a2f7f5c050b21926a88bd645a98ecd2f3dbe99c,2025-04-29T16:54:26.433000 +CVE-2025-37893,0,0,1c7e00a1f138c68a8becda210a2f7f5c050b21926a88bd645a98ecd2f3dbe99c,2025-04-29T16:54:26.433000 CVE-2025-3790,0,0,39c61b1ee55263592d1071881b60ce2c68fec2554bf723e98229429d0f50b4cd,2025-04-21T14:23:45.950000 CVE-2025-3791,0,0,d20c33083bfd93e39f5a750d845cd16bd304a896ad925ca36e8b55aad2095ef6,2025-04-21T14:23:45.950000 CVE-2025-3792,0,0,835915d780849fbc874e41c4b7de71b3d488ecd3483cf36e64bf5cb808405969,2025-04-21T14:23:45.950000 -CVE-2025-37925,0,1,f9576aed7c518b4f5aed7f76e7af003aca63baedaee9d9ef54d00e1623484d9b,2025-04-29T16:44:08.020000 +CVE-2025-37925,0,0,f9576aed7c518b4f5aed7f76e7af003aca63baedaee9d9ef54d00e1623484d9b,2025-04-29T16:44:08.020000 CVE-2025-3793,0,0,3fbdfdae3ba2312385d1e55e1013c3bba14ef84080933b19af3e5f161d0c534e,2025-04-29T13:52:47.470000 CVE-2025-3795,0,0,76d259997892e849d7fdd617e0e88fa943927e768558d8d394746f81795a3a48,2025-04-21T14:23:45.950000 CVE-2025-3796,0,0,5bba9717d327179093efb5cc9cef09fed229b949cd8902af2f1c4dc4c6d27773,2025-04-21T14:23:45.950000 @@ -291159,11 +291159,12 @@ CVE-2025-3903,0,0,6fd629d73b6d4872a7ffae56d6c3c0b7253c2c832af05b126210d15454d1d4 CVE-2025-3904,0,0,a15d72d0f1a0535bebf9df4e01b6cfc45c014de0879ce9d249803945f26fce3b,2025-04-29T13:52:47.470000 CVE-2025-3906,0,0,7df8181df29dfc516be3edbe2d2bfb26ce2c1c65dc37aa85eebac37ffd9820bc,2025-04-29T13:52:10.697000 CVE-2025-3907,0,0,a80de78c9c3d1ebab04e1ed8752735e7a3019c19f3ec8149f3413ad730abea82,2025-04-29T13:52:47.470000 +CVE-2025-3911,1,1,1a24a2c4a17b52c6391f72890bdf562a213eb709f696b12655324eeb0cdcfafd,2025-04-29T18:15:44.370000 CVE-2025-3912,0,0,57d1aac638d5ebb58a5040fc8c1c81dae68dc606378b1f0b3ea535593bbf242c,2025-04-29T13:52:28.490000 CVE-2025-3914,0,0,39dc48efa45cfb63bb1da9177bab074344fac91433ba43912e542c027c8ca801,2025-04-29T13:52:10.697000 CVE-2025-3915,0,0,7ef07e3557a0599cd61ae2360c99d37066278383396fda2be6ec28859bbb442d,2025-04-29T13:52:10.697000 CVE-2025-3923,0,0,ee152c7f1a42d63e1ca21cb1c49adcbe2fb8c27f05521d2bf1672c2da0c26904,2025-04-29T13:52:28.490000 -CVE-2025-3928,0,0,285fae613865edf0fd93a788f49c4e6a073b6a8b4d67712b68d1ba70aedb755c,2025-04-29T13:52:28.490000 +CVE-2025-3928,0,1,8d18a12926887d00038aedd8d2f98b009ff1eec893cfd2084aae07aab82f9556,2025-04-29T19:48:41.463000 CVE-2025-3929,0,0,de5bd9ea37e87b389d88e7805d481de3e4f7a35295f779431804939babdded05,2025-04-29T13:52:10.697000 CVE-2025-3935,0,0,80d75d2841d93927d14c762eb28687b5d04ff0b86b4afd1b2a25489128931894,2025-04-29T13:52:28.490000 CVE-2025-39359,0,0,8cade7eb5a0a3d62159777effed30e36c7660bd8375986e1563b0eb49736a1f5,2025-04-29T13:52:47.470000 @@ -291409,39 +291410,45 @@ CVE-2025-4058,0,0,4a79a91979938723ca70ffe620e22ffba6c9528db08c25a9ac2423c9e1ce17 CVE-2025-4059,0,0,d662e310b981e52846bc96441205f994929d50bcb9592db0dca2b3daead21840,2025-04-29T13:52:10.697000 CVE-2025-4060,0,0,dc80343807782bbbbe420c9ef256770f095a190b659ac9505b6491cb783b6067,2025-04-29T13:52:10.697000 CVE-2025-4061,0,0,bc9822866f26fc37655522a74beddbf073408f989c591a88e713b18ca8d7a2a0,2025-04-29T14:15:34.127000 -CVE-2025-40615,1,1,af404916323818f9a60a5a370315ee153d3cc06b1263dc6c454b34db9be803e2,2025-04-29T16:15:36.160000 -CVE-2025-40616,1,1,5d2953ce964a121385c52ab9e833ac29dcd105f3037deea67a73394f19f5a65a,2025-04-29T16:15:36.310000 -CVE-2025-40617,1,1,8d08c93634260e6eb252e9e4feaf81a6dee53f4a1c25bb8bef6ec7720effab30,2025-04-29T16:15:36.450000 -CVE-2025-40618,1,1,502deb729bda294b683f8985c5d4fb42830a7136b72961f961f04f120740b982,2025-04-29T16:15:36.580000 -CVE-2025-40619,1,1,541485f247abe113f04870d7cb1b19cfbf92221d824544abe7a97c02ec75df3b,2025-04-29T16:15:36.727000 +CVE-2025-40615,0,0,af404916323818f9a60a5a370315ee153d3cc06b1263dc6c454b34db9be803e2,2025-04-29T16:15:36.160000 +CVE-2025-40616,0,0,5d2953ce964a121385c52ab9e833ac29dcd105f3037deea67a73394f19f5a65a,2025-04-29T16:15:36.310000 +CVE-2025-40617,0,0,8d08c93634260e6eb252e9e4feaf81a6dee53f4a1c25bb8bef6ec7720effab30,2025-04-29T16:15:36.450000 +CVE-2025-40618,0,0,502deb729bda294b683f8985c5d4fb42830a7136b72961f961f04f120740b982,2025-04-29T16:15:36.580000 +CVE-2025-40619,0,0,541485f247abe113f04870d7cb1b19cfbf92221d824544abe7a97c02ec75df3b,2025-04-29T16:15:36.727000 CVE-2025-4062,0,0,5af3952d550697c604e134682d2977d504b57bf45dd988f537710e3511887c09,2025-04-29T14:15:34.393000 CVE-2025-4063,0,0,7864d306b96d333ccc974a2d29a9b9d701d2a935ad50993304a3ea7498c54a61,2025-04-29T14:15:34.563000 CVE-2025-4064,0,0,0546fcf2196432d638d322e42f2a48abae01d1d4876299095338f3694432aa59,2025-04-29T14:15:34.737000 CVE-2025-4065,0,0,20a6f61fd61fda05ad9826f35f3313276ac65a928292c0a9c36d7a82ffdcb77d,2025-04-29T15:15:54.450000 CVE-2025-4066,0,0,697bc634b02e3dbab88edf8c86f41999457b512281d191fa4a6c07c9ec015298,2025-04-29T15:15:54.627000 CVE-2025-4067,0,0,f5527403b54b44d97935adc504e1d803884f72f6afd176741b57b737b797b16e,2025-04-29T15:15:54.800000 -CVE-2025-4068,1,1,09e929364432125a5b24a48386f5e43ea4efe8aa15b2e4ba0263595d670f265d,2025-04-29T16:15:38.163000 -CVE-2025-4069,1,1,52adf4b875556d3bc85884847b55abf1a01c08e2c6f019e5a2d544c7d91d933d,2025-04-29T16:15:38.350000 -CVE-2025-4070,1,1,c8bb3e46075e6691fb778ece4b6196353fbf90da6a125cdc59d8bbd0929c4eb4,2025-04-29T16:15:38.523000 -CVE-2025-4071,1,1,7188f74120fb41f6c5a143a5943c7960695f1baf95793438a18a9a55582476b9,2025-04-29T16:15:38.697000 -CVE-2025-4072,1,1,57d006c718a2dcc4da363474b0551982d1cd1eca93cecaefb94f3b5500725f83,2025-04-29T17:15:41.500000 -CVE-2025-4073,1,1,cc40eec7907a96cd4c5b232c783b0dd8cc2b979223049fd9c34763c5176350f6,2025-04-29T17:15:41.730000 +CVE-2025-4068,0,0,09e929364432125a5b24a48386f5e43ea4efe8aa15b2e4ba0263595d670f265d,2025-04-29T16:15:38.163000 +CVE-2025-4069,0,1,6d195324c968c09e6c0651e7ffa42333c26c4db54f0daa142f794df3db66fe72,2025-04-29T18:15:45.100000 +CVE-2025-4070,0,1,2cfe1ded2dfbafb7903c7c582f7aed9bb30d4ddac2d92e5da0a4ff841eb47300,2025-04-29T18:15:45.233000 +CVE-2025-4071,0,1,b6bacb40f0fc13ce40a0f4dc83ce522cc2f92a04b4f59643ef245ba6b52d3d6a,2025-04-29T18:15:45.357000 +CVE-2025-4072,0,1,530cd125e8b66c403a461cc38174f54c7bc30006774105ce62c43c0ef98c09e5,2025-04-29T19:15:53.750000 +CVE-2025-4073,0,1,fe5c446bf1904285676cb6673f4a1a52b6ee23419655745029a8ab80c5dae65b,2025-04-29T19:15:53.880000 +CVE-2025-4074,1,1,82fbf5b10bd9fce568cc7fe0e9d8543a0c07a4b254528f56ef2a97bee67429ba,2025-04-29T18:15:45.470000 +CVE-2025-4075,1,1,dc7d9fd6a047a3686d3b3578a801d64db4f5b9f9b2c0f45788e48b754ca9a2ab,2025-04-29T18:15:45.653000 +CVE-2025-4076,1,1,30fee921a377c7e4aeb3bdbbeb0e9af19c3b0b078ac9765db5ef9a5c4fef0a3a,2025-04-29T18:15:45.830000 +CVE-2025-4077,1,1,5662c33e22465b5cd9edd342fa36d6b5928e574c7d6a09c7c8f8f4b4b277655e,2025-04-29T18:15:46.003000 +CVE-2025-4079,1,1,c893a89f4e539f896a7507b17bf60322d7f349e7dc057d586c3553b3be6e7ac0,2025-04-29T19:15:54.130000 CVE-2025-4082,0,0,90e7b89133921d81807e3efe927234ef84a565217feefda402e0b971385b6471,2025-04-29T14:15:34.913000 CVE-2025-4083,0,0,d51d719179ad663d64c60303214fb0b52c22b7599a821fb4041e9ba063122ef6,2025-04-29T14:15:35.003000 CVE-2025-4084,0,0,11a3ccdc685cf369e23ec9e32764decd23954557e20f48f0a86d8cdca29331a0,2025-04-29T14:15:35.097000 CVE-2025-4085,0,0,0b53c08d7349c7451ced0fb99a492d145a2cf0c7e9b051ab37167395bfc79354,2025-04-29T14:15:35.187000 -CVE-2025-4086,0,1,9e6a782aadf1dc316ab051b20dde0085dd689edc1799ecbf3c399fe566eb92a7,2025-04-29T16:15:38.873000 -CVE-2025-4087,0,1,84c7e3521aa97eea6a7e4d5ac8ecb028607bd9762731e593d8038c35ebe53e75,2025-04-29T16:15:39.017000 -CVE-2025-4088,0,1,43e2a0002bfb14f56e31954e7d7a4a08caeb78b0462a6e232a2f3a5e7242b452,2025-04-29T16:15:39.153000 -CVE-2025-4089,0,1,05d37d85132e1585e5746479fecd6f99a4a07cf3620585075d7acc95256305a3,2025-04-29T16:15:39.297000 -CVE-2025-4090,0,1,2f8f97ab95fb000bc4e2e8b471c2fdd9f4ac1f358a0e3083ee3004f13c8cbbc8,2025-04-29T16:15:39.440000 -CVE-2025-4091,0,1,be76f80720d6507adedb56244fc15d9bfa10d0652d1ed50301d66beeacf97342,2025-04-29T16:15:39.570000 -CVE-2025-4092,0,1,200d711ebe2e15156ad0230ced68f0f5a246d532b5d02cde90c654c8fdd064ec,2025-04-29T16:15:39.707000 -CVE-2025-4093,0,1,d891b279ce00073f17d8f58a8ebf719e451cb06357235d1b137c7bf6521fbbb1,2025-04-29T16:15:39.850000 +CVE-2025-4086,0,0,9e6a782aadf1dc316ab051b20dde0085dd689edc1799ecbf3c399fe566eb92a7,2025-04-29T16:15:38.873000 +CVE-2025-4087,0,0,84c7e3521aa97eea6a7e4d5ac8ecb028607bd9762731e593d8038c35ebe53e75,2025-04-29T16:15:39.017000 +CVE-2025-4088,0,0,43e2a0002bfb14f56e31954e7d7a4a08caeb78b0462a6e232a2f3a5e7242b452,2025-04-29T16:15:39.153000 +CVE-2025-4089,0,0,05d37d85132e1585e5746479fecd6f99a4a07cf3620585075d7acc95256305a3,2025-04-29T16:15:39.297000 +CVE-2025-4090,0,0,2f8f97ab95fb000bc4e2e8b471c2fdd9f4ac1f358a0e3083ee3004f13c8cbbc8,2025-04-29T16:15:39.440000 +CVE-2025-4091,0,0,be76f80720d6507adedb56244fc15d9bfa10d0652d1ed50301d66beeacf97342,2025-04-29T16:15:39.570000 +CVE-2025-4092,0,0,200d711ebe2e15156ad0230ced68f0f5a246d532b5d02cde90c654c8fdd064ec,2025-04-29T16:15:39.707000 +CVE-2025-4093,0,0,d891b279ce00073f17d8f58a8ebf719e451cb06357235d1b137c7bf6521fbbb1,2025-04-29T16:15:39.850000 +CVE-2025-4095,1,1,f2539477bf5eaf9485d044b6cf6e79bb8583734ab1b2d0e4b42ac3598cab5848,2025-04-29T18:15:46.180000 CVE-2025-41395,0,0,65b9e3526569f587eb1cd97410ac7325e217f46717fe2bbf0abfe0a9511ead3c,2025-04-29T13:52:47.470000 CVE-2025-41423,0,0,3ae1e637900a2dfc5b6bacaa494e26a0b5d8e1e48accef6073153be61f7a9347,2025-04-29T13:52:47.470000 CVE-2025-42598,0,0,4c400d87dc34a2b74819c41bbdd48bd1c3da0af3c35841d82c2177d30b1cb5f5,2025-04-29T13:52:10.697000 -CVE-2025-42599,0,0,637853bf6957365f8314d744dc865d7b5990f959776be03e1fca36dc91b5c39b,2025-04-29T01:00:02.093000 +CVE-2025-42599,0,1,d39e065342929b05f2b0a2b6fd7615d0e3f6e7c2f605fdbeb3b3bb9e83f12d93,2025-04-29T19:46:44.310000 CVE-2025-42600,0,0,a98a7820b508b5a8b0c7d0f0dd6cbaa5b07d1e37b05a983a49eb79024a0cd435,2025-04-23T14:08:13.383000 CVE-2025-42601,0,0,f4f189a0da2053c5ffad5165ce7407fdad3589baca263238f2b69d54247669fb,2025-04-23T14:08:13.383000 CVE-2025-42602,0,0,342563812386d17a8bb3d54aaa16730170ac3bc84b0785b841a3d936f82320ab,2025-04-23T14:08:13.383000 @@ -291516,7 +291523,7 @@ CVE-2025-45429,0,0,cd6c316eb3e15c4fc2a558603901315982b1b249adda510ded4c9a248c4c6 CVE-2025-45947,0,0,0cd4eb35605e38d6beafe0e5142e00be98e0a9a86813c6e53390cf0e51069caf,2025-04-29T14:15:32.963000 CVE-2025-45949,0,0,ac65e8085ff0434769ff2d9579f4348c0147c0d6253a297e3821367f69e3d27c,2025-04-29T14:15:33.163000 CVE-2025-45953,0,0,b7e4636e223e9443bf4ceb70aa1bfa6bac5a6ca02a24969ead6f03ebd32e187c,2025-04-29T14:15:33.350000 -CVE-2025-45956,1,1,f554eb83add9393ef2e3d1816aec967afe0d1b25afa0291e2f4d455f86a4ffa3,2025-04-29T17:15:41.317000 +CVE-2025-45956,0,0,f554eb83add9393ef2e3d1816aec967afe0d1b25afa0291e2f4d455f86a4ffa3,2025-04-29T17:15:41.317000 CVE-2025-46216,0,0,aeeb168de31af46b00554fe4e8c894f6f952bf91677cd58baacfa2edfa3da131,2025-04-23T03:15:22.333000 CVE-2025-46217,0,0,c0708bfcbcfb8b1f8589ac8ee7b6149158182bec9e1515e0d8ddabb4f9f96f81,2025-04-23T03:15:22.403000 CVE-2025-46218,0,0,b4d34877020ce88bfe5e738c92a5cdebc137bb9b383057afd40e6895a6e2e87c,2025-04-23T03:15:22.457000 @@ -291540,15 +291547,15 @@ CVE-2025-46235,0,0,734efe580cc5e7cd9aef477d65cb11e20214cdaa748049c96675623d232de CVE-2025-46236,0,0,8b8affe299306142f5ddebf9735c0f8b331fbdc704d54dd4ca3bba8a74a23efa,2025-04-23T14:08:13.383000 CVE-2025-46237,0,0,861e8f18c43414bfd07cdcca1d165e11e624d67d97a9de32bdc44c95d856df19,2025-04-23T14:08:13.383000 CVE-2025-46238,0,0,a72ac60414c5163d965e8040051a2b14dd35d0fd78ca88b4c17e08a8e92b7b03,2025-04-23T14:08:13.383000 -CVE-2025-46239,0,0,35da0da332b7f8bbadae74381f3502ff74fe89884a07e376291995e4442b7bd7,2025-04-23T14:08:13.383000 -CVE-2025-46240,0,0,3e4d44287441a40c3ffbf92d09e064c6d6b9e9b8afc0eee297a46f454cc1394e,2025-04-23T14:08:13.383000 -CVE-2025-46241,0,0,88b79679ee37894e88d1d31c3c6bed70cbb8ea54c3db76a9e6191b6b4a888c5d,2025-04-23T14:08:13.383000 -CVE-2025-46242,0,0,3fd0a00b767ba2317f17bed2f4cb03382f432b6685d94bc47d8a7c8fb15446c3,2025-04-23T14:08:13.383000 -CVE-2025-46243,0,0,fd4175bfe4aad5306922b6d26500f3affb1b2e6b0c3883efeb24e2a3d06c0c04,2025-04-23T14:08:13.383000 -CVE-2025-46244,0,0,33936bb168b5f78e0ba54877b84c3848f769a2f506c9631ce0a86e5d1d0ff983,2025-04-23T14:08:13.383000 -CVE-2025-46245,0,0,f32016dfe9f05773ff86a466984b197460fce57c1ce8be31c848060eb0a3a585,2025-04-23T14:08:13.383000 -CVE-2025-46246,0,0,2c0a526c75d162b910bd30bb212101a2f73c8f0b48dd768e44a3fce98fe7e548,2025-04-23T14:08:13.383000 -CVE-2025-46247,0,0,6f628ed6cdce671e1dfcf0e136ffbeeb40bf545b7941aaf530604120048a6f99,2025-04-23T14:08:13.383000 +CVE-2025-46239,0,1,bd231629064215abc4d96eaa38d921cda2cf697934ca0a20ce561acde3320bc8,2025-04-29T18:54:46.143000 +CVE-2025-46240,0,1,9db4e1600e65dd37c7a9e3dc4bfbcec377d46ba7710a17a5108d73cab577189b,2025-04-29T18:52:17.683000 +CVE-2025-46241,0,1,0e246892c63f826ee9efba950dc941d7f60964c3e0c57f82e308fdc7b57a66fb,2025-04-29T18:48:56.777000 +CVE-2025-46242,0,1,42bd5f8071acb1d090c4d11716758a83d2400f18f5303c9a6b4a9f00771f5d0e,2025-04-29T18:48:18.903000 +CVE-2025-46243,0,1,f245c38f16f69effae94ab965282c4014ac15ddd191cefb8ee569c5afe0f92c9,2025-04-29T18:45:08.813000 +CVE-2025-46244,0,1,8b11d696450c862337ec51a98c34b5cf95700c6b61163aad23aca151e7e0a597,2025-04-29T18:37:46.840000 +CVE-2025-46245,0,1,01ba8c0c2dbb11525a4c06abacf443921c722a6598e655f5c45acf3c661b8c2e,2025-04-29T18:27:40.830000 +CVE-2025-46246,0,1,7e766c024b4b26dc6c3ffbc02ed6abdb467bac6d2983c98a5b2b457946fabef6,2025-04-29T18:22:45.507000 +CVE-2025-46247,0,1,e6d6ed24b8fd0054e0a7b1b7b96320dbf1891d65493f038b9f1935e443cf9dcd,2025-04-29T18:17:58.223000 CVE-2025-46248,0,0,3d46838d829b771d84a2100c9abf020cbda99f4a4c58fa6a8434ab8154157bb1,2025-04-29T13:52:28.490000 CVE-2025-46249,0,0,a0263976af3bb1e16fadd8845abd48fb9b6661a9aaac8607503e6b8a62a3343e,2025-04-23T14:08:13.383000 CVE-2025-46250,0,0,feff0b403f69cd58de415cd8153f4d139fc243e6a7c2ee3793f77d0a996b1683,2025-04-23T14:08:13.383000 @@ -291572,7 +291579,10 @@ CVE-2025-46330,0,0,51af3999ada150afbbf505b46b013fc8998be7f881a043ebf16b2f9bf195b CVE-2025-46333,0,0,4ca215b72a98284b0530b719160d5251f8056ccde380184cb21e0e8b208b2507,2025-04-29T13:52:10.697000 CVE-2025-46338,0,0,8dd5ab3bf26120dbbf3d57add19341ad71bb2d2b518d4a3f65a5105f8b059051,2025-04-29T13:52:10.697000 CVE-2025-46343,0,0,52577a02becc74f566d147c93aa34d1201c2aeb60bd9c6b3587e72786d7cfdf1,2025-04-29T13:52:10.697000 -CVE-2025-46346,1,1,a4920cc09c677ea6ab6e3da9d997eb2ff46b4439650e1aad6e109c61719c15ff,2025-04-29T16:15:36.873000 +CVE-2025-46346,0,1,efb4a705dea859f4963def5401db351bc3f21e31297583e9052f4256f9c73a74,2025-04-29T18:15:44.570000 +CVE-2025-46347,1,1,cb06edc7de7f9bb5de1509e59cff9ca8a65435b351fa5c6baf03122bc5d13953,2025-04-29T19:15:53.650000 +CVE-2025-46349,1,1,d828f0cc1d7d021048eb925fc280c5a254bc7b101db9a59aecbe1121461ed35c,2025-04-29T18:15:44.803000 +CVE-2025-46350,1,1,28b5801b72e751d63e33c418c6568d7f1153cb152b9a92a3307db4fdde8a878e,2025-04-29T18:15:44.950000 CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000 CVE-2025-46375,0,0,c7cadd24d0c0ef6263c2e4f0e993c1b14e1cbac838119ad2f4f42dcfb3b1b113,2025-04-24T03:15:15.867000 CVE-2025-46376,0,0,4a4eb88dda9426fffae031e9cc4c1cb39c01ffb8fef76394b4584f59d8624ab6,2025-04-24T03:15:15.917000 @@ -291693,14 +291703,14 @@ CVE-2025-46617,0,0,a067c3a85663b48a7bac38fc9c3c5761c1c7fcff2b5288d6d48d5707712e1 CVE-2025-46618,0,0,c3b67f9c650592ec3402578e92b748c7bba440b755336274cfea73fc21e2f82e,2025-04-29T13:52:28.490000 CVE-2025-46646,0,0,777aacedd29eb87d2f3d4179421a3b07a825895319bd1804480c003b4bbcf895,2025-04-29T13:52:10.697000 CVE-2025-46652,0,0,9d812ecaad689bd29eeb08cd6e51fc2313308ed71660c22dce020d578677f79a,2025-04-29T13:52:10.697000 -CVE-2025-46653,0,1,3b6009fc3a51ec55453aaec5d1f7a19d2114d1ff8e2f811535a6f418b5dab168,2025-04-29T16:15:37.150000 -CVE-2025-46654,0,1,3e5c0a3c4a79c9d9b8076fac65c707d8d6930d0e6d7283094866d4509cce8673,2025-04-29T16:15:37.300000 -CVE-2025-46655,0,1,34630625faf28d1a43b5cdb5fca99ebd8a91139b3a9b9f2e1d3fba1d80e58054,2025-04-29T16:15:37.440000 -CVE-2025-46656,0,1,88d2e959cac4cda5103c704a18b5a278dfdfbb63d41e023dbd311e14a8416d7e,2025-04-29T16:15:37.573000 +CVE-2025-46653,0,0,3b6009fc3a51ec55453aaec5d1f7a19d2114d1ff8e2f811535a6f418b5dab168,2025-04-29T16:15:37.150000 +CVE-2025-46654,0,0,3e5c0a3c4a79c9d9b8076fac65c707d8d6930d0e6d7283094866d4509cce8673,2025-04-29T16:15:37.300000 +CVE-2025-46655,0,0,34630625faf28d1a43b5cdb5fca99ebd8a91139b3a9b9f2e1d3fba1d80e58054,2025-04-29T16:15:37.440000 +CVE-2025-46656,0,0,88d2e959cac4cda5103c704a18b5a278dfdfbb63d41e023dbd311e14a8416d7e,2025-04-29T16:15:37.573000 CVE-2025-46657,0,0,d1241c5837522d2a54bf1e036392c9615fba9a569c50b7602223af1e338fb69f,2025-04-29T13:52:10.697000 CVE-2025-46661,0,0,c96d88898faa46d79f996bc19aa5d7a65a9476aa48c61bdfc9301ee8531cddde,2025-04-29T13:52:10.697000 -CVE-2025-46672,0,1,a0dc914bdb4be06b0f905888a4e9f544e5ba6a28a0748fd251788a5f57b507b2,2025-04-29T16:15:37.747000 -CVE-2025-46673,0,1,0305d5becfbea97f809c0ab036097e16cf3e9c2adce8166a083520987896c80c,2025-04-29T16:15:37.900000 +CVE-2025-46672,0,0,a0dc914bdb4be06b0f905888a4e9f544e5ba6a28a0748fd251788a5f57b507b2,2025-04-29T16:15:37.747000 +CVE-2025-46673,0,0,0305d5becfbea97f809c0ab036097e16cf3e9c2adce8166a083520987896c80c,2025-04-29T16:15:37.900000 CVE-2025-46674,0,0,8acd4f1829345aaf06c7f57ad63d5a68d76f2ee8d3d0c2d66b410cc4840fffef,2025-04-29T13:52:10.697000 CVE-2025-46675,0,0,2019d524024894e7d49f6b421352639dad99a2e697a3206816d3bacd34d8d470,2025-04-29T13:52:10.697000 CVE-2025-46687,0,0,eddf5cab5f4617bf23ba77f1f498dc6dad859b2964b65f78aa174d4bb8f2f0d4,2025-04-29T13:52:10.697000