Auto-Update: 2024-12-26T19:00:20.361976+00:00

This commit is contained in:
cad-safe-bot 2024-12-26 19:03:43 +00:00
parent edef56460f
commit 4662f8fa62
33 changed files with 1598 additions and 242 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47303",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:18.037",
"lastModified": "2024-11-21T06:35:50.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-26T18:42:15.977",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,115 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: realiza un seguimiento correcto de los descriptores de poke del subprog y corrige el use-after-free. Los subprogramas llaman a map_poke_track(), pero en el lanzamiento del programa no hay ning\u00fan enlace para llamar a map_poke_untrack(). Sin embargo, al lanzar el programa, la memoria auxiliar (y la tabla de descriptores de inserci\u00f3n) se liberan aunque todav\u00eda tengamos una referencia a ella en la lista de elementos de los datos auxiliares del mapa. Cuando ejecutamos map_poke_run(), terminamos accediendo a la memoria liberada, lo que activa KASAN en prog_array_map_poke_run(): [...] [402.824689] ERROR: KASAN: use-after-free en prog_array_map_poke_run+0xc2/0x34e [402.824698] Lectura del tama\u00f1o 4 en la direcci\u00f3n ffff8881905a7940 mediante la tarea hubble-fgs/4337 [402.824705] CPU: 1 PID: 4337 Comm: hubble-fgs Contaminado: GI 5.12.0+ #399 [402.824715] Seguimiento de llamadas: [402.824719] x93/ 0xc2 [402.824727] print_address_description.constprop.0+0x1a/0x140 [402.824736]? prog_array_map_poke_run+0xc2/0x34e [402.824740]? prog_array_map_poke_run+0xc2/0x34e [ 402.824744] kasan_report.cold+0x7c/0xd8 [ 402.824752] ? prog_array_map_poke_run+0xc2/0x34e [ 402.824757] prog_array_map_poke_run+0xc2/0x34e [ 402.824765] bpf_fd_array_map_update_elem+0x124/0x1a0 [...] Los elementos en cuesti\u00f3n se recorren de la siguiente manera: for (i = 0; i < elem-> aux->tama\u00f1o_poke_tab; i++) { empujar = &elem->aux->poke_tab[i]; [...] El acceso a size_poke_tab es una lectura de 4 bytes, verificada verificando las compensaciones en el volcado de KASAN: [402.825004] La direcci\u00f3n con errores pertenece al objeto en ffff8881905a7800 que pertenece al cach\u00e9 kmalloc-1k de tama\u00f1o 1024 [402.825008] La direcci\u00f3n con errores se encuentra a 320 bytes dentro de una regi\u00f3n de 1024 bytes [ffff8881905a7800, ffff8881905a7c00) La salida de error de bpf_prog_aux: struct bpf_prog_aux { [...] /* --- l\u00edmite de cacheline 5 (320 bytes) --- */ u32 tama\u00f1o_poke_tab; /* 320 4 */ [...] En general, los subprogramas no necesariamente gestionan sus propias estructuras de datos. Por ejemplo, BTF func_info y linfo son s\u00f3lo punteros a la estructura principal del programa. Esto permite realizar un recuento de referencias y una sanitizaci\u00f3n de estos \u00faltimos, lo que simplifica un poco su gesti\u00f3n. La estructura aux->poke_tab, sin embargo, no sigui\u00f3 esta l\u00f3gica. La soluci\u00f3n inicial propuesta para este error de use-after-free incorpor\u00f3 a\u00fan m\u00e1s el seguimiento de datos de inserci\u00f3n en el subprograma con un recuento de referencias adecuado. Sin embargo, Daniel y Alexei se preguntaron por qu\u00e9 trat\u00e1bamos a estos objetos de manera especial; Estoy de acuerdo, es innecesario. La soluci\u00f3n aqu\u00ed elimina la asignaci\u00f3n de la tabla de poke por subprograma y el seguimiento del mapa y, en su lugar, simplemente apunta el puntero aux->poke_tab a la tabla de poke del programa principal. De esta manera, el seguimiento de mapas se simplifica al programa principal y no necesitamos gestionarlos por subprograma. Esto tambi\u00e9n significa que bpf_prog_free_deferred(), que desenrolla el recuento de referencias del programa y libera objetos, debe garantizar que no intentemos liberar dos veces el poke_tab al liberar las estructuras de subprog. Esto se resuelve f\u00e1cilmente haciendo NULL en el puntero poke_tab. El segundo detalle es garantizar que la l\u00f3gica JIT por subprograma solo realice correcciones en las entradas poke_tab[] que posee. Para hacer esto, agregamos un puntero en la estructura poke para se\u00f1alar el valor del subprograma para que los JIT puedan verificar f\u00e1cilmente mientras recorren la estructura poke_tab si la entrada actual pertenece al programa actual. El puntero auxiliar es estable y, por tanto, adecuado para dicha comparaci\u00f3n. ---truncado---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.10.53",
"matchCriteriaId": "3DEFC6EF-3F05-496C-9CCD-DF3BDE77EC04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.13.5",
"matchCriteriaId": "808DF8D9-4913-4CC7-B91F-B4146556B7ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "71268287-21A8-4488-AA4F-23C473153131"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/599148d40366bd5d1d504a3a8fcd65e21107e500",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a9f36bf3613c65cb587c70fac655c775d911409b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f263a81451c12da5a342d90572e317e611846f2c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/599148d40366bd5d1d504a3a8fcd65e21107e500",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a9f36bf3613c65cb587c70fac655c775d911409b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f263a81451c12da5a342d90572e317e611846f2c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47306",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:18.250",
"lastModified": "2024-11-21T06:35:50.530",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-26T18:43:39.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,136 @@
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: fddi: corrige UAF en fza_probe fp son datos privados de netdev y no se pueden usar despu\u00e9s de la llamada a free_netdev(). Usar fp despu\u00e9s de free_netdev() puede causar un error UAF. Solucionadlo moviendo free_netdev() despu\u00e9s del mensaje de error. Adaptador de canal TURBO\")"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.135",
"matchCriteriaId": "3EF7BA79-262D-4A55-A0A1-E0D0BCA7C320"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.53",
"matchCriteriaId": "08E2D438-D50E-43C5-AF10-D62FE49B5815"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.13.5",
"matchCriteriaId": "808DF8D9-4913-4CC7-B91F-B4146556B7ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "71268287-21A8-4488-AA4F-23C473153131"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/04b06716838bfc26742dbed3ae1d3697fe5317ee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bdfbb51f7a437ae8ea91317a5c133ec13adf3c47",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/deb7178eb940e2c5caca1b1db084a69b2e59b4c9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f33605908a9b6063525e9f68e62d739948c5fccf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/04b06716838bfc26742dbed3ae1d3697fe5317ee",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bdfbb51f7a437ae8ea91317a5c133ec13adf3c47",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/deb7178eb940e2c5caca1b1db084a69b2e59b4c9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f33605908a9b6063525e9f68e62d739948c5fccf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47307",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:18.320",
"lastModified": "2024-11-21T06:35:50.647",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-26T18:44:19.590",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,130 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: evita la eliminaci\u00f3n de desreferencias NULL en cifs_compose_mount_options() El par\u00e1metro @ref opcional puede contener un nombre de nodo NULL, por lo que se debe evitar eliminar la referencia a \u00e9l en cifs_compose_mount_options(). Direcciones-Cobertura: 1476408 (\"Nulo expl\u00edcito desreferenciado\")"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.135",
"matchCriteriaId": "A710000A-275C-4C73-8384-4FDF4204C682"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.53",
"matchCriteriaId": "08E2D438-D50E-43C5-AF10-D62FE49B5815"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.13.5",
"matchCriteriaId": "808DF8D9-4913-4CC7-B91F-B4146556B7ED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/03313d1c3a2f086bb60920607ab79ac8f8578306",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ae3d181f4e912f51af7776ea165f199b16fc165d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e58c162789becede894d3e94c0ce6695a2ef5796",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f7d1fa65e74263d11f90ddd33b4d4cd905a93759",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/03313d1c3a2f086bb60920607ab79ac8f8578306",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ae3d181f4e912f51af7776ea165f199b16fc165d",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e58c162789becede894d3e94c0ce6695a2ef5796",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f7d1fa65e74263d11f90ddd33b4d4cd905a93759",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47309",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:18.453",
"lastModified": "2024-11-21T06:35:50.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-26T18:44:48.667",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,71 +15,220 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: validar lwtstate->data antes de regresar de skb_tunnel_info() skb_tunnel_info() devuelve un puntero de lwtstate->data como tipo ip_tunnel_info sin validaci\u00f3n. lwtstate->data puede tener varios tipos como mpls_iptunnel_encap, etc. y estos no son compatibles. Entonces skb_tunnel_info() deber\u00eda validarse antes de devolver ese puntero. Splat se ve as\u00ed: BUG: KASAN: slab fuera de los l\u00edmites en vxlan_get_route+0x418/0x4b0 [vxlan] Lectura de tama\u00f1o 2 en la direcci\u00f3n ffff888106ec2698 mediante tarea ping/811 CPU: 1 PID: 811 Comm: ping No contaminado 5.13.0 + #1195 Seguimiento de llamadas: dump_stack_lvl+0x56/0x7b print_address_description.constprop.8.cold.13+0x13/0x2ee? vxlan_get_route+0x418/0x4b0 [vxlan] ? vxlan_get_route+0x418/0x4b0 [vxlan] kasan_report.cold.14+0x83/0xdf? vxlan_get_route+0x418/0x4b0 [vxlan] vxlan_get_route+0x418/0x4b0 [vxlan] [ ... ] vxlan_xmit_one+0x148b/0x32b0 [vxlan] [ ... ] vxlan_xmit+0x25c5/0x4780 [vxlan] [ ... ] +0x1ae /0x6e0 __dev_queue_xmit+0x1f39/0x31a0 [...] veck_xMit+0x2f9/0x940 mpls_xmit+0x911/0x1600 [mpls_iptunnel] lwtunnel_xmit+0x18f/0x450 ip_finish_output2+0x20467/0x2040"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.3",
"versionEndExcluding": "4.4.277",
"matchCriteriaId": "5A6521A3-1CD2-4EFB-B365-323A55C98EE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.277",
"matchCriteriaId": "B543C082-5612-489A-A957-B7F2B8822025"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.241",
"matchCriteriaId": "6A796929-CDBE-45AF-BD44-F357F64AFFCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.199",
"matchCriteriaId": "D1C5B0E1-06E7-4615-AA17-02585202D86E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.135",
"matchCriteriaId": "3EF7BA79-262D-4A55-A0A1-E0D0BCA7C320"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.53",
"matchCriteriaId": "08E2D438-D50E-43C5-AF10-D62FE49B5815"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.13.5",
"matchCriteriaId": "808DF8D9-4913-4CC7-B91F-B4146556B7ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "71268287-21A8-4488-AA4F-23C473153131"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2179d96ec702cc33ead02a9ce40ece599b8538c5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/67a9c94317402b826fc3db32afc8f39336803d97",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/83bdcfbd968bcc91a0632b7b625e4a9b0cba5e0d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8aa13a86964cdec4fd969ef677c6614ff068641a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8bb1589c89e61e3b182dd546f1021928ebb5c2a6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a915379594f1e045421635c6316d8f3ffa018c58",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b61d327cd3cc5ea591f3bf751dd11e034f388bb5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e7f3c9df40515a6c6b46f36c4c94cf48a043f887",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2179d96ec702cc33ead02a9ce40ece599b8538c5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/67a9c94317402b826fc3db32afc8f39336803d97",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/83bdcfbd968bcc91a0632b7b625e4a9b0cba5e0d",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8aa13a86964cdec4fd969ef677c6614ff068641a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8bb1589c89e61e3b182dd546f1021928ebb5c2a6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a915379594f1e045421635c6316d8f3ffa018c58",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b61d327cd3cc5ea591f3bf751dd11e034f388bb5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e7f3c9df40515a6c6b46f36c4c94cf48a043f887",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47362",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:22.357",
"lastModified": "2024-11-21T06:35:58.297",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-26T18:47:14.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,119 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/pm: Actualizar el estado de energ\u00eda intermedio para SI. Actualiza el estado actual como estado de arranque durante la inicializaci\u00f3n de dpm. Durante la inicializaci\u00f3n posterior, se llama a set_power_state para realizar la transici\u00f3n al estado de energ\u00eda final. set_power_state se refiere a valores del estado actual y sin el estado actual poblado, podr\u00eda resultar en una desreferencia del puntero NULL. Por ejemplo: en plataformas donde se admite el cambio de velocidad PCI a trav\u00e9s del m\u00e9todo ACPI ATCS, se debe consultar la velocidad del enlace del estado actual antes de decidir cambiar a la velocidad del enlace del estado de energ\u00eda final. La l\u00f3gica para consultar el soporte ATCS estaba rota en ciertas plataformas. El problema se hizo visible cuando la l\u00f3gica de soporte ATCS rota se solucion\u00f3 con la confirmaci\u00f3n f9b7f3703ff9 (\"drm/amdgpu/acpi: hacer que las estructuras ATPX/ATCS sean globales (v2)\"). Error: https://gitlab.freedesktop.org/drm/amd/-/issues/1698"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.70",
"matchCriteriaId": "8ECC9806-1A88-441B-9504-CD4A53C66847"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.14.9",
"matchCriteriaId": "1B31D6C1-A751-438D-906B-0C56B789D498"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E46C74C6-B76B-4C94-A6A4-FD2FFF62D644"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*",
"matchCriteriaId": "60134C3A-06E4-48C1-B04F-2903732A4E56"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/06a18e64256f7aecb5a27df02faa3568fcd3c105",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/68d4fbe6220cd1f3d07cab0a4901e62f8c12cc68",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ab39d3cef526ba09c4c6923b4cd7e6ec1c5d4faa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/06a18e64256f7aecb5a27df02faa3568fcd3c105",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/68d4fbe6220cd1f3d07cab0a4901e62f8c12cc68",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ab39d3cef526ba09c4c6923b4cd7e6ec1c5d4faa",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47363",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:22.430",
"lastModified": "2024-11-21T06:35:58.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-26T17:56:27.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,99 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nexthop: corrige la divisi\u00f3n por cero mientras se reemplaza un grupo resistente Las pruebas de tortura del grupo resiliente de nexthop en fib_nexthop.sh expusieron una posible divisi\u00f3n por cero mientras se reemplaza un grupo resistente [1]. La divisi\u00f3n por cero ocurre cuando la ruta de datos ve un grupo de nexthop resistente con cero dep\u00f3sitos. Las pruebas reemplazan un grupo nexthop resistente en un bucle mientras el tr\u00e1fico se reenv\u00eda a trav\u00e9s de \u00e9l. Las pruebas no especifican la cantidad de dep\u00f3sitos mientras se realiza el reemplazo, lo que da como resultado que el kernel asigne una tabla resistente a resguardos (es decir, 'struct nh_res_table') con cero dep\u00f3sitos. Esta tabla nunca deber\u00eda ser visible para la ruta de datos, pero la ruta de datos a\u00fan podr\u00eda usar el antiguo grupo nexthop (es decir, 'oldg') cuando se le asigna la tabla auxiliar. Solucione este problema asignando \u00fanicamente la tabla auxiliar al antiguo grupo de nexthop despu\u00e9s de asegurarse de que la ruta de datos ya no utilice el grupo. Probado con fib_nexthops.sh: Pruebas aprobadas: 222 Pruebas fallidas: 0 [1] error de divisi\u00f3n: 0000 [#1] CPU PREEMPT SMP KASAN: 0 PID: 1850 Comunicaciones: ping No contaminado 5.14.0-custom-10271-ga86eb53057fe #1107 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 01/04/2014 RIP: 0010:nexthop_select_path+0x2d2/0x1a80 [...] Seguimiento de llamadas: fib_select_multipath+0x79b/0x1530 fib_select_path +0x8fb/0x1c10 ip_route_output_key_hash_rcu+0x1198/0x2da0 ip_route_output_key_hash+0x190/0x340 ip_route_output_flow+0x21/0x120 raw_sendmsg+0x91d/0x2e10 inet_sendmsg+0x9e/0 xe0 __sys_sendto+0x23d/0x360 __x64_sys_sendto+0xe1/0x1b0 do_syscall_64+0x35/0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xae"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.13",
"versionEndExcluding": "5.14.9",
"matchCriteriaId": "9DE2DB5B-20F3-4653-801E-20BF261486BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E46C74C6-B76B-4C94-A6A4-FD2FFF62D644"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*",
"matchCriteriaId": "60134C3A-06E4-48C1-B04F-2903732A4E56"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/563f23b002534176f49524b5ca0e1d94d8906c40",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e9d32ec26e7f01d1af13bdc687f586362546aa25",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/563f23b002534176f49524b5ca0e1d94d8906c40",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e9d32ec26e7f01d1af13bdc687f586362546aa25",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47364",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:22.497",
"lastModified": "2024-11-21T06:35:58.530",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-26T17:56:47.957",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,120 @@
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: comedi: Reparar p\u00e9rdida de memoria en compat_insnlist() `compat_insnlist()` maneja la versi\u00f3n de 32 bits del ioctl `COMEDI_INSNLIST` (cuando `CONFIG_COMPAT` est\u00e1 habilitado). Asigna memoria para almacenar temporalmente una matriz de `struct comedi_insn` convertida desde la versi\u00f3n de 32 bits en el espacio de usuario. Esta memoria solo se libera si hay una falla al llenar la matriz; de lo contrario, se pierde. Agregue una llamada a `kfree()` para solucionar la fuga."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8",
"versionEndExcluding": "5.10.70",
"matchCriteriaId": "4B70A168-6AA0-4245-A2DB-5A1E491E45B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.14.9",
"matchCriteriaId": "1B31D6C1-A751-438D-906B-0C56B789D498"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E46C74C6-B76B-4C94-A6A4-FD2FFF62D644"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*",
"matchCriteriaId": "60134C3A-06E4-48C1-B04F-2903732A4E56"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/8d6a21e4cd6a319b0662cbe4ad6199e276ac776a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bb509a6ffed2c8b0950f637ab5779aa818ed1596",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f217b6c1e28ed0b353634ce4d92a155b80bd1671",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8d6a21e4cd6a319b0662cbe4ad6199e276ac776a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bb509a6ffed2c8b0950f637ab5779aa818ed1596",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f217b6c1e28ed0b353634ce4d92a155b80bd1671",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47372",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:23.087",
"lastModified": "2024-11-21T06:36:00.373",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-26T17:57:10.690",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,55 +15,177 @@
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: macb: corrige el use after free en rmmod plat_dev->dev->platform_data es publicado por platform_device_unregister(), el uso de pclk y hclk es un use after free. Dado que la cancelaci\u00f3n del registro del dispositivo no necesitar\u00e1 un dispositivo clk, ajustamos la secuencia de llamada a la funci\u00f3n para solucionar este problema. [31.261225] ERROR: KASAN: use after free en macb_remove+0x77/0xc6 [macb_pci] [31.275563] Liberado por la tarea 306: [30.276782] platform_device_release+0x25/0x80"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.14.249",
"matchCriteriaId": "79890A90-0A92-4B80-83D6-017AD5D48FDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.209",
"matchCriteriaId": "21C23429-F802-4256-B3C2-9EEA76AC11FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.150",
"matchCriteriaId": "87771E47-210D-48FA-95BC-48A86225B30F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.70",
"matchCriteriaId": "A2A50090-4483-4F44-9147-BF0B012FBF7E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.14.9",
"matchCriteriaId": "1B31D6C1-A751-438D-906B-0C56B789D498"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E46C74C6-B76B-4C94-A6A4-FD2FFF62D644"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1da750d1e2140ef43d64d17f301ff6f41b45541e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/46670fb832ee80943715df618632ca13c2e96f2b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4ad6f2d23b0f6ac0d3e5f3102a4256d1c86c90f5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7721221e87d25c9840d9ca6b986dbdc410d5ce2b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a7d521cc726f30b8e679a6f36d04b18a8ab3c536",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d82d5303c4c539db86588ffb5dc5b26c3f1513e8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1da750d1e2140ef43d64d17f301ff6f41b45541e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/46670fb832ee80943715df618632ca13c2e96f2b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4ad6f2d23b0f6ac0d3e5f3102a4256d1c86c90f5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7721221e87d25c9840d9ca6b986dbdc410d5ce2b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a7d521cc726f30b8e679a6f36d04b18a8ab3c536",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d82d5303c4c539db86588ffb5dc5b26c3f1513e8",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47373",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:23.157",
"lastModified": "2024-11-21T06:36:00.500",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-26T17:57:35.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,55 +15,183 @@
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: irqchip/gic-v3-its: soluciona una posible fuga de VPE en caso de error. En its_vpe_irq_domain_alloc, cuando its_vpe_init() devuelve un error, hay un error de uno en uno en el n\u00famero de VPE. para ser liberado. Solucionelo simplemente pasando el n\u00famero de VPE asignados, que es el \u00edndice del bucle que se itera sobre los VPE. [maz: mensaje de confirmaci\u00f3n fijo]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-193"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14",
"versionEndExcluding": "4.14.249",
"matchCriteriaId": "C9BA2B8D-3D51-420A-8307-752B0F4519FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.209",
"matchCriteriaId": "21C23429-F802-4256-B3C2-9EEA76AC11FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.150",
"matchCriteriaId": "87771E47-210D-48FA-95BC-48A86225B30F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.70",
"matchCriteriaId": "A2A50090-4483-4F44-9147-BF0B012FBF7E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.14.9",
"matchCriteriaId": "1B31D6C1-A751-438D-906B-0C56B789D498"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E46C74C6-B76B-4C94-A6A4-FD2FFF62D644"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*",
"matchCriteriaId": "60134C3A-06E4-48C1-B04F-2903732A4E56"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/280bef512933b2dda01d681d8cbe499b98fc5bdd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/42d3711c23781045e7a5cd28536c774b9a66d20b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/568662e37f927e3dc3e475f3ff7cf4ab7719c5e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5701e8bff314c155e7afdc467b1e0389d86853d0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7d39992d45acd6f2d6b2f62389c55b61fb3d486b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e0c1c2e5da19685a20557a50f10c6aa4fa26aa84",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/280bef512933b2dda01d681d8cbe499b98fc5bdd",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/42d3711c23781045e7a5cd28536c774b9a66d20b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/568662e37f927e3dc3e475f3ff7cf4ab7719c5e7",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5701e8bff314c155e7afdc467b1e0389d86853d0",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7d39992d45acd6f2d6b2f62389c55b61fb3d486b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e0c1c2e5da19685a20557a50f10c6aa4fa26aa84",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12931",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T03:15:05.493",
"lastModified": "2024-12-26T03:15:05.493",
"lastModified": "2024-12-26T18:15:06.663",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.468122",
"source": "cna@vuldb.com"
},
{
"url": "https://code-projects.org/simple-admin-panel-in-php-with-source-code/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12932",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T03:15:05.840",
"lastModified": "2024-12-26T03:15:05.840",
"lastModified": "2024-12-26T18:15:09.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.468123",
"source": "cna@vuldb.com"
},
{
"url": "https://code-projects.org/simple-admin-panel-in-php-with-source-code/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12933",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T04:15:05.840",
"lastModified": "2024-12-26T04:15:05.840",
"lastModified": "2024-12-26T18:15:11.783",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.468124",
"source": "cna@vuldb.com"
},
{
"url": "https://code-projects.org/simple-admin-panel-in-php-with-source-code/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12934",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T04:15:06.180",
"lastModified": "2024-12-26T04:15:06.180",
"lastModified": "2024-12-26T18:15:14.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.468128",
"source": "cna@vuldb.com"
},
{
"url": "https://code-projects.org/simple-admin-panel-in-php-with-source-code/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12935",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T05:15:05.837",
"lastModified": "2024-12-26T05:15:05.837",
"lastModified": "2024-12-26T18:15:17.483",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.468129",
"source": "cna@vuldb.com"
},
{
"url": "https://code-projects.org/simple-admin-panel-in-php-with-source-code/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12936",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T05:15:06.557",
"lastModified": "2024-12-26T05:15:06.557",
"lastModified": "2024-12-26T17:15:06.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.468130",
"source": "cna@vuldb.com"
},
{
"url": "https://code-projects.org/simple-admin-panel-in-php-with-source-code/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12937",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T06:15:05.720",
"lastModified": "2024-12-26T06:15:05.720",
"lastModified": "2024-12-26T17:15:06.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.468134",
"source": "cna@vuldb.com"
},
{
"url": "https://code-projects.org/simple-admin-panel-in-php-with-source-code/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12945",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T10:15:05.527",
"lastModified": "2024-12-26T10:15:05.527",
"lastModified": "2024-12-26T17:15:07.017",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.468378",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Wind-liberty/CVE/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12946",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T10:15:05.777",
"lastModified": "2024-12-26T10:15:05.777",
"lastModified": "2024-12-26T17:15:07.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.468392",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/vicleet/CVE/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12947",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T11:15:05.790",
"lastModified": "2024-12-26T11:15:05.790",
"lastModified": "2024-12-26T17:15:07.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.468522",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/alc9700jmo/CVE/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12948",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T11:15:07.173",
"lastModified": "2024-12-26T11:15:07.173",
"lastModified": "2024-12-26T17:15:07.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.468538",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.468538",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12950",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T12:15:06.870",
"lastModified": "2024-12-26T12:15:06.870",
"lastModified": "2024-12-26T17:15:07.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.468543",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.468543",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-12960",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T18:15:21.027",
"lastModified": "2024-12-26T18:15:21.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in 1000 Projects Portfolio Management System MCA 1.0. This issue affects some unknown processing of the file /update_edu_details.php. The manipulation of the argument q leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://1000projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README8.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.289325",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.289325",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.468804",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-12961",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T18:15:23.463",
"lastModified": "2024-12-26T18:15:23.463",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in 1000 Projects Portfolio Management System MCA 1.0. Affected is an unknown function of the file /update_ach_details.php. The manipulation of the argument q leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://1000projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README9.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.289326",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.289326",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.468805",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47148",
"sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
"published": "2024-12-26T12:15:07.063",
"lastModified": "2024-12-26T12:15:07.063",
"lastModified": "2024-12-26T17:15:07.687",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.honor.com/global/security/cve-2024-47148/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47149",
"sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
"published": "2024-12-26T13:15:07.007",
"lastModified": "2024-12-26T13:15:07.007",
"lastModified": "2024-12-26T17:15:07.810",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"references": [
{
"url": "https://www.honor.com/global/security/cve-2024-47149/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47150",
"sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
"published": "2024-12-26T13:15:07.140",
"lastModified": "2024-12-26T13:15:07.140",
"lastModified": "2024-12-26T17:15:07.923",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"references": [
{
"url": "https://www.honor.com/global/security/cve-2024-47150/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47151",
"sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
"published": "2024-12-26T11:15:07.387",
"lastModified": "2024-12-26T11:15:07.387",
"lastModified": "2024-12-26T17:15:08.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://www.honor.com/global/security/cve-2024-47151/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47156",
"sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
"published": "2024-12-26T11:15:07.517",
"lastModified": "2024-12-26T11:15:07.517",
"lastModified": "2024-12-26T17:15:08.150",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"references": [
{
"url": "https://www.honor.com/global/security/cve-2024-47156/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8992",
"sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
"published": "2024-12-26T12:15:07.660",
"lastModified": "2024-12-26T12:15:07.660",
"lastModified": "2024-12-26T17:15:08.267",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"references": [
{
"url": "https://www.honor.com/global/security/cve-2024-8992/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8993",
"sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
"published": "2024-12-26T12:15:07.783",
"lastModified": "2024-12-26T12:15:07.783",
"lastModified": "2024-12-26T17:15:08.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"references": [
{
"url": "https://www.honor.com/global/security/cve-2024-8993/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8994",
"sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
"published": "2024-12-26T12:15:07.897",
"lastModified": "2024-12-26T12:15:07.897",
"lastModified": "2024-12-26T17:15:08.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"references": [
{
"url": "https://www.honor.com/global/security/cve-2024-8994/",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-26T17:00:20.628288+00:00
2024-12-26T19:00:20.361976+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-26T16:43:44.433000+00:00
2024-12-26T18:47:14.357000+00:00
```
### Last Data Feed Release
@ -33,50 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
274723
274725
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `2`
- [CVE-2024-12908](CVE-2024/CVE-2024-129xx/CVE-2024-12908.json) (`2024-12-26T16:15:06.050`)
- [CVE-2024-12955](CVE-2024/CVE-2024-129xx/CVE-2024-12955.json) (`2024-12-26T15:15:06.767`)
- [CVE-2024-12956](CVE-2024/CVE-2024-129xx/CVE-2024-12956.json) (`2024-12-26T15:15:06.953`)
- [CVE-2024-12958](CVE-2024/CVE-2024-129xx/CVE-2024-12958.json) (`2024-12-26T16:15:25.667`)
- [CVE-2024-12959](CVE-2024/CVE-2024-129xx/CVE-2024-12959.json) (`2024-12-26T16:15:27.643`)
- [CVE-2024-51540](CVE-2024/CVE-2024-515xx/CVE-2024-51540.json) (`2024-12-26T16:15:29.640`)
- [CVE-2024-12960](CVE-2024/CVE-2024-129xx/CVE-2024-12960.json) (`2024-12-26T18:15:21.027`)
- [CVE-2024-12961](CVE-2024/CVE-2024-129xx/CVE-2024-12961.json) (`2024-12-26T18:15:23.463`)
### CVEs modified in the last Commit
Recently modified CVEs: `34`
Recently modified CVEs: `29`
- [CVE-2024-12746](CVE-2024/CVE-2024-127xx/CVE-2024-12746.json) (`2024-12-26T15:15:06.650`)
- [CVE-2024-12951](CVE-2024/CVE-2024-129xx/CVE-2024-12951.json) (`2024-12-26T16:15:06.730`)
- [CVE-2024-12952](CVE-2024/CVE-2024-129xx/CVE-2024-12952.json) (`2024-12-26T16:15:10.540`)
- [CVE-2024-12953](CVE-2024/CVE-2024-129xx/CVE-2024-12953.json) (`2024-12-26T16:15:14.487`)
- [CVE-2024-12954](CVE-2024/CVE-2024-129xx/CVE-2024-12954.json) (`2024-12-26T16:15:17.510`)
- [CVE-2024-1694](CVE-2024/CVE-2024-16xx/CVE-2024-1694.json) (`2024-12-26T16:09:24.467`)
- [CVE-2024-5493](CVE-2024/CVE-2024-54xx/CVE-2024-5493.json) (`2024-12-26T16:36:54.357`)
- [CVE-2024-5494](CVE-2024/CVE-2024-54xx/CVE-2024-5494.json) (`2024-12-26T16:38:51.957`)
- [CVE-2024-5495](CVE-2024/CVE-2024-54xx/CVE-2024-5495.json) (`2024-12-26T16:42:57.383`)
- [CVE-2024-5496](CVE-2024/CVE-2024-54xx/CVE-2024-5496.json) (`2024-12-26T16:43:17.607`)
- [CVE-2024-5497](CVE-2024/CVE-2024-54xx/CVE-2024-5497.json) (`2024-12-26T16:43:33.383`)
- [CVE-2024-5498](CVE-2024/CVE-2024-54xx/CVE-2024-5498.json) (`2024-12-26T16:43:44.433`)
- [CVE-2024-5499](CVE-2024/CVE-2024-54xx/CVE-2024-5499.json) (`2024-12-26T16:07:06.693`)
- [CVE-2024-6290](CVE-2024/CVE-2024-62xx/CVE-2024-6290.json) (`2024-12-26T16:26:22.763`)
- [CVE-2024-6291](CVE-2024/CVE-2024-62xx/CVE-2024-6291.json) (`2024-12-26T16:26:31.473`)
- [CVE-2024-6292](CVE-2024/CVE-2024-62xx/CVE-2024-6292.json) (`2024-12-26T16:26:46.207`)
- [CVE-2024-6293](CVE-2024/CVE-2024-62xx/CVE-2024-6293.json) (`2024-12-26T16:02:51.103`)
- [CVE-2024-6772](CVE-2024/CVE-2024-67xx/CVE-2024-6772.json) (`2024-12-26T16:02:45.563`)
- [CVE-2024-6773](CVE-2024/CVE-2024-67xx/CVE-2024-6773.json) (`2024-12-26T16:03:48.013`)
- [CVE-2024-6774](CVE-2024/CVE-2024-67xx/CVE-2024-6774.json) (`2024-12-26T16:04:06.250`)
- [CVE-2024-6775](CVE-2024/CVE-2024-67xx/CVE-2024-6775.json) (`2024-12-26T16:05:07.670`)
- [CVE-2024-6776](CVE-2024/CVE-2024-67xx/CVE-2024-6776.json) (`2024-12-26T16:05:20.450`)
- [CVE-2024-6778](CVE-2024/CVE-2024-67xx/CVE-2024-6778.json) (`2024-12-26T15:36:56.463`)
- [CVE-2024-6779](CVE-2024/CVE-2024-67xx/CVE-2024-6779.json) (`2024-12-26T15:41:39.910`)
- [CVE-2024-8975](CVE-2024/CVE-2024-89xx/CVE-2024-8975.json) (`2024-12-26T15:00:26.180`)
- [CVE-2021-47362](CVE-2021/CVE-2021-473xx/CVE-2021-47362.json) (`2024-12-26T18:47:14.357`)
- [CVE-2021-47363](CVE-2021/CVE-2021-473xx/CVE-2021-47363.json) (`2024-12-26T17:56:27.117`)
- [CVE-2021-47364](CVE-2021/CVE-2021-473xx/CVE-2021-47364.json) (`2024-12-26T17:56:47.957`)
- [CVE-2021-47372](CVE-2021/CVE-2021-473xx/CVE-2021-47372.json) (`2024-12-26T17:57:10.690`)
- [CVE-2021-47373](CVE-2021/CVE-2021-473xx/CVE-2021-47373.json) (`2024-12-26T17:57:35.547`)
- [CVE-2024-12931](CVE-2024/CVE-2024-129xx/CVE-2024-12931.json) (`2024-12-26T18:15:06.663`)
- [CVE-2024-12932](CVE-2024/CVE-2024-129xx/CVE-2024-12932.json) (`2024-12-26T18:15:09.233`)
- [CVE-2024-12933](CVE-2024/CVE-2024-129xx/CVE-2024-12933.json) (`2024-12-26T18:15:11.783`)
- [CVE-2024-12934](CVE-2024/CVE-2024-129xx/CVE-2024-12934.json) (`2024-12-26T18:15:14.550`)
- [CVE-2024-12935](CVE-2024/CVE-2024-129xx/CVE-2024-12935.json) (`2024-12-26T18:15:17.483`)
- [CVE-2024-12936](CVE-2024/CVE-2024-129xx/CVE-2024-12936.json) (`2024-12-26T17:15:06.487`)
- [CVE-2024-12937](CVE-2024/CVE-2024-129xx/CVE-2024-12937.json) (`2024-12-26T17:15:06.873`)
- [CVE-2024-12945](CVE-2024/CVE-2024-129xx/CVE-2024-12945.json) (`2024-12-26T17:15:07.017`)
- [CVE-2024-12946](CVE-2024/CVE-2024-129xx/CVE-2024-12946.json) (`2024-12-26T17:15:07.153`)
- [CVE-2024-12947](CVE-2024/CVE-2024-129xx/CVE-2024-12947.json) (`2024-12-26T17:15:07.293`)
- [CVE-2024-12948](CVE-2024/CVE-2024-129xx/CVE-2024-12948.json) (`2024-12-26T17:15:07.427`)
- [CVE-2024-12950](CVE-2024/CVE-2024-129xx/CVE-2024-12950.json) (`2024-12-26T17:15:07.553`)
- [CVE-2024-47148](CVE-2024/CVE-2024-471xx/CVE-2024-47148.json) (`2024-12-26T17:15:07.687`)
- [CVE-2024-47149](CVE-2024/CVE-2024-471xx/CVE-2024-47149.json) (`2024-12-26T17:15:07.810`)
- [CVE-2024-47150](CVE-2024/CVE-2024-471xx/CVE-2024-47150.json) (`2024-12-26T17:15:07.923`)
- [CVE-2024-47151](CVE-2024/CVE-2024-471xx/CVE-2024-47151.json) (`2024-12-26T17:15:08.037`)
- [CVE-2024-47156](CVE-2024/CVE-2024-471xx/CVE-2024-47156.json) (`2024-12-26T17:15:08.150`)
- [CVE-2024-8992](CVE-2024/CVE-2024-89xx/CVE-2024-8992.json) (`2024-12-26T17:15:08.267`)
- [CVE-2024-8993](CVE-2024/CVE-2024-89xx/CVE-2024-8993.json) (`2024-12-26T17:15:08.387`)
- [CVE-2024-8994](CVE-2024/CVE-2024-89xx/CVE-2024-8994.json) (`2024-12-26T17:15:08.500`)
## Download and Usage

View File

@ -187154,9 +187154,9 @@ CVE-2021-46984,0,0,d9cce9d726ee3d6403e2144a0618518d03488b8f6aa8580231d506cf0d7c3
CVE-2021-46985,0,0,b55f7da4d8af6b538e5342c699879b38a7eac54f39c8d2da26b510610f029cd8,2024-12-06T15:02:17.187000
CVE-2021-46986,0,0,e8bf96e7d68a0a39498049c9247d2d34f593bd8c73d1f880d85fb602a45b9951,2024-11-21T06:35:07.760000
CVE-2021-46987,0,0,8b30e27b6b209d80685bed3bea9ab3c4c2b966757291dae1784881a91a36c579,2024-12-06T15:07:49.483000
CVE-2021-46988,0,1,de8d73a57494caab48e725962c4418d3d631d0723f1dc9c9f4d6cd417f6dc70a,2024-12-26T15:01:37.110000
CVE-2021-46988,0,0,de8d73a57494caab48e725962c4418d3d631d0723f1dc9c9f4d6cd417f6dc70a,2024-12-26T15:01:37.110000
CVE-2021-46989,0,0,600337192eb6414d45bda3482618305f3b218774e0cae5d5e975853340f7b41b,2024-11-21T06:35:08.167000
CVE-2021-46990,0,1,ce8555ace2bf3a1f14f5c2122c041f8c05ea4411a5757642319b18f33f58c34e,2024-12-26T15:01:41.753000
CVE-2021-46990,0,0,ce8555ace2bf3a1f14f5c2122c041f8c05ea4411a5757642319b18f33f58c34e,2024-12-26T15:01:41.753000
CVE-2021-46991,0,0,2f6445f008d8252daec57a306462580e4e81cb2e8269cb435b7460491da39731,2024-12-06T15:27:56.500000
CVE-2021-46992,0,0,19c99c300bb6998a5850e0973feda19b3c49096e5600119628f0575bd055a56f,2024-12-24T14:34:12.700000
CVE-2021-46993,0,0,4174cc77477502e59614df8d700469da9d9c4c2c348540bb8233d1949572daef,2024-12-24T14:40:13.420000
@ -187469,13 +187469,13 @@ CVE-2021-47299,0,0,8c9619e9adff7374b5157f37beb700722799f12f37a412397c40d10b3cae7
CVE-2021-47300,0,0,ce5136fdfafce412191edc3356c42ceda417369fd2e43819f434170b6a1ec715,2024-11-21T06:35:49.787000
CVE-2021-47301,0,0,c7fd3245a39638e65ab5fa6f63f1b0150a0c9abf53cda771d9a8300b5fab22e2,2024-11-21T06:35:49.917000
CVE-2021-47302,0,0,177ecedec4d5c4d981654c9f9302651e4e931d960c1a81661a572ebb8f8f31d0,2024-11-21T06:35:50.047000
CVE-2021-47303,0,0,030f21987e601725f3dcad18453e0d4d8b4b00b2f895844c3cca06c0ba9237fb,2024-11-21T06:35:50.163000
CVE-2021-47303,0,1,33d269b1bf454cdcb5fcabcdf05cf44438dc5f0306829f1b3c6c9404c6c9efa1,2024-12-26T18:42:15.977000
CVE-2021-47304,0,0,620a586e9d1a589123fcf3a9177f942d33c036d5a8782c0f708b9f486f2517ae,2024-11-21T06:35:50.293000
CVE-2021-47305,0,0,1c65a92c62fed48ba7c1c402a8f2a2238757a9a90648c82e68ca9f3d847b1837,2024-11-21T06:35:50.407000
CVE-2021-47306,0,0,5c3758c170cd40b5484f11b1bddc53623a148a848b20eeee5fa65cbebd00ce0d,2024-11-21T06:35:50.530000
CVE-2021-47307,0,0,839c42709178e08b1b5e58c1c5fbf24a186f8cc22759fc926a5776991160ec52,2024-11-21T06:35:50.647000
CVE-2021-47306,0,1,bb438d172dc2f30c8b997ded9e10636ca48a0d8b4294a15375456ecfdb0f010e,2024-12-26T18:43:39.927000
CVE-2021-47307,0,1,6d3f1e22663071a79dcd22f014d0bec38bc02ba2108c7bb1b94cd5ac9e451cbf,2024-12-26T18:44:19.590000
CVE-2021-47308,0,0,35935370c28d2898c9878fd683d15cb883788da4704ea822cda7ca44e54143f1,2024-11-21T06:35:50.800000
CVE-2021-47309,0,0,a68f74d49ccd16706feca25abd46a7fb98812901ea651bed61f914e55bf439ef,2024-11-21T06:35:50.990000
CVE-2021-47309,0,1,e23eb4c6b7b7423f185e3c780fa9bf811012de9ad34596296ab8912b37eba81b,2024-12-26T18:44:48.667000
CVE-2021-47310,0,0,3ae749fda9ec456310fc4e7a2f1189042525415e69757e229d99417c58244fc5,2024-11-21T06:35:51.107000
CVE-2021-47311,0,0,78d42a252462dda1640eb7365fe87e80305daeb702c553a4457fbbbce3e6f75d,2024-11-21T06:35:51.230000
CVE-2021-47312,0,0,ff86c9dd2d16a622215b4ad8e9480ff3358e2ff4844e931b7513ca3679660ed3,2024-11-21T06:35:51.343000
@ -187528,9 +187528,9 @@ CVE-2021-47358,0,0,7250c3dc75c0a0a285f37a2d8100fbf3e8878a3828ac60bdbb0d5ad4ff602
CVE-2021-47359,0,0,a8c3865355adf01802d101a119abd31bae543d6b22d119f810adee65d5b14521,2024-12-24T16:10:44.130000
CVE-2021-47360,0,0,a3aa7c12dbf442e168ae03d62d9e61f529b43482d63c231e1211c6b40ef61f85,2024-11-21T06:35:58.053000
CVE-2021-47361,0,0,d763e86c7ca549ff2cb304adc7a4bbef4bc48cd16f32467bb5c635695be9ca25,2024-11-21T06:35:58.173000
CVE-2021-47362,0,0,00c744101153cf7fe09584a9cda87a9d30c1d29d97b6ffead1a8a2c07efaabd5,2024-11-21T06:35:58.297000
CVE-2021-47363,0,0,f1309625509a66c01de1df0ed54d03e916ffd0cf3ff33ac586897e0e90ee6da6,2024-11-21T06:35:58.417000
CVE-2021-47364,0,0,e26d2d9167e8afe1577632a29c0e80212670df61e93e5eeab6c0e32c9be9d318,2024-11-21T06:35:58.530000
CVE-2021-47362,0,1,50cbb0258c5b85bcefedd80bcc9790ca88e42e66641ca62e91207b1863d9ce50,2024-12-26T18:47:14.357000
CVE-2021-47363,0,1,e85f65072bbb894a2be83914e1a1127db3b8e9b992973b095df4477e0b02639c,2024-12-26T17:56:27.117000
CVE-2021-47364,0,1,f5b3ad69e5ab5594bb333fdbcdc887413286e8842574519360707e033b549df4,2024-12-26T17:56:47.957000
CVE-2021-47365,0,0,4f2e5348e5d6a41d5b4ddabf134d3ea3a29f98f3167e0d41eeac1b9aebc2fc8e,2024-11-21T06:35:59.227000
CVE-2021-47366,0,0,0166025d356afe5282a1e86a537474c1847d92c0c9124d71ca21f209be59ae16,2024-11-21T06:35:59.473000
CVE-2021-47367,0,0,77d1c6c1c90528adec6ba171d9063ea94b0138b95e16a6efc04ebb17f91a4136,2024-11-21T06:35:59.577000
@ -187538,8 +187538,8 @@ CVE-2021-47368,0,0,d76a0dfcf3c0ab9d3fd63c0d2c7b91860c63a4be2672597c9ff9bfe51037c
CVE-2021-47369,0,0,bf6b55a9e0ae358e260ebbf6944faaa15d7b8ff8391bd0d47d54ddc2f893fbc0,2024-11-21T06:35:59.913000
CVE-2021-47370,0,0,fc6d07621192b8b655730f81c4c95176eb2de08eb83061cab0fb5f8143ee4df9,2024-11-21T06:36:00.093000
CVE-2021-47371,0,0,4d8314647e403cc4fd45f4ccfeeefc0e24e491605541d4fdb703ea684db80d56,2024-11-21T06:36:00.197000
CVE-2021-47372,0,0,6544accd6e8c0e62f2008dde53ef4b7b229c3500c6a48d19c0834201914014f2,2024-11-21T06:36:00.373000
CVE-2021-47373,0,0,801f88ac2ddc9467244602dcd222d39b3e708dd5a69220174e82e1070ba28b62,2024-11-21T06:36:00.500000
CVE-2021-47372,0,1,0ce4f68d2ef5ee1532898222948501be7d3a88241a391a98a79a0bfd35d568b9,2024-12-26T17:57:10.690000
CVE-2021-47373,0,1,e8950542d9e9b736cb4f33eeb6e6f914784149ee2bc33f0cf40eac5de5491073,2024-12-26T17:57:35.547000
CVE-2021-47374,0,0,f7248771c8bea57ed87c3d7b6a32a299b4123595c1e116eab4d99253e2d63bd3,2024-11-21T06:36:00.700000
CVE-2021-47375,0,0,daa5fe7e4d3964a12e2bcd9af03cc7eb715f55d9fdd17eb4077e638abf8acbe0,2024-11-21T06:36:00.920000
CVE-2021-47376,0,0,e4e2e91a48ccc0e7be03f9d0eb65fe1705fa52f5bac1244bd9675e31930ce773,2024-11-21T06:36:01.090000
@ -237153,7 +237153,7 @@ CVE-2023-48596,0,0,de08592d3c71d66e59070351ea26bea49dadd868fefc66b0ba4179500db4a
CVE-2023-48597,0,0,d7f1a246225086d83b69935e58dc4602f3fcef4594d168c1020a717a6330da0d,2024-11-21T08:32:03.953000
CVE-2023-48598,0,0,e8d794c913b8e3983f097f457cda3379e1c61e97cc0adfeffae883de31f69e55,2024-11-21T08:32:04.093000
CVE-2023-48599,0,0,2e70e7ae46aac224c87d96857ac466f4705439e2d232e872500f1dc94b2797af,2024-11-21T08:32:04.223000
CVE-2023-4860,0,1,f2ee8c7cca80ea10fb37f13bebd387b0e199932343c0dc789987081100e260ff,2024-12-26T15:43:44.150000
CVE-2023-4860,0,0,f2ee8c7cca80ea10fb37f13bebd387b0e199932343c0dc789987081100e260ff,2024-12-26T15:43:44.150000
CVE-2023-48600,0,0,d32c28faf1b061d90525ebf3fcefd5b4bf1d95a6546e384c00c0ea07ba201078,2024-11-21T08:32:04.370000
CVE-2023-48601,0,0,718c0fad2dc83a633754363917e13665aa08eac2ce50ddc16b559b12bd57ba32,2024-11-21T08:32:04.503000
CVE-2023-48602,0,0,000bbe97c4e7face9425dfe9ca9eac2ba3e71df3f28a04e84d479d0912285850,2024-11-21T08:32:04.650000
@ -241903,9 +241903,9 @@ CVE-2023-7006,0,0,4ed87f24fa2ac772a2f7b727b0e300912c42583637b6187ad692e5891d6c66
CVE-2023-7007,0,0,f5e78178645c6c2c5f772707ce2e5c5b75e98e2d2f30a88b209671633b387a46,2024-11-21T08:45:00.997000
CVE-2023-7008,0,0,8f61c119937be8edfdf7101f886737120021ea2a8349db9b1b71fa74e2a2c59a,2024-11-22T12:15:17.590000
CVE-2023-7009,0,0,b57b77e1725b8b8c49b556ed32701d8b8151b9088182b93e7a5fa2f75ef52569,2024-11-21T08:45:01.307000
CVE-2023-7010,0,1,da19a0c9c77d04e9464a81f2adb102f21022724548788d306dd9e3bba9553117,2024-12-26T15:41:50.507000
CVE-2023-7011,0,1,6d4b7c148a188ea77758cea520edfe0357813276fd6d84006cbfa3ca6c8f0f4b,2024-12-26T15:43:13.963000
CVE-2023-7012,0,1,5c1ae12587a689695a3c07cc39f89391bb45d6735687677ab3130a98835fea9b,2024-12-26T15:43:32.457000
CVE-2023-7010,0,0,da19a0c9c77d04e9464a81f2adb102f21022724548788d306dd9e3bba9553117,2024-12-26T15:41:50.507000
CVE-2023-7011,0,0,6d4b7c148a188ea77758cea520edfe0357813276fd6d84006cbfa3ca6c8f0f4b,2024-12-26T15:43:13.963000
CVE-2023-7012,0,0,5c1ae12587a689695a3c07cc39f89391bb45d6735687677ab3130a98835fea9b,2024-12-26T15:43:32.457000
CVE-2023-7013,0,0,7b6b201772be0aba336e92b627046a6ba51720df3756a6d97030ef66c2c200f0,2024-11-25T19:15:07.563000
CVE-2023-7014,0,0,653f0c93c2effce325dc59ce969f80644077c8f621b768b2909654e991fcf9ec,2024-11-21T08:45:02.353000
CVE-2023-7015,0,0,224517b57b37d699b3731a5510aaff638d6368c6c45ae4b54b5bcb3d097873b1,2024-11-21T08:45:02.537000
@ -242127,7 +242127,7 @@ CVE-2023-7256,0,0,0ac9480edfa78672f3e48d67b957e1b408f0f4794e53e1735d22587fc0a9d3
CVE-2023-7258,0,0,19eded96602052a8819eafc5cc41ffac2509a4daaba91945398147ff28a3094a,2024-11-21T08:45:37.347000
CVE-2023-7259,0,0,1c611eaee9f33d7ccd17c89183f492baf0d1cbca8df2084f000fb54a7cc465c0,2024-11-21T08:45:37.483000
CVE-2023-7260,0,0,5b13b64738d9f99d38b36ccafd3664ce3af226a3295d006866426dd31c7dada4,2024-10-16T12:53:08.807000
CVE-2023-7261,0,1,ddac2b275fa7ea517c7dade7545137efdda503fdf2e011abe40181729ccc83f3,2024-12-26T16:07:39.820000
CVE-2023-7261,0,0,ddac2b275fa7ea517c7dade7545137efdda503fdf2e011abe40181729ccc83f3,2024-12-26T16:07:39.820000
CVE-2023-7264,0,0,481a3123c728ee9b31d977e1754c02d6eb9c9d972c045f9b799c0c77e37a60b9,2024-11-21T08:45:37.997000
CVE-2023-7265,0,0,c24118f188412f71957951e5a194c8feaa5aa2870f8d4bad1cae66392f13b12f,2024-09-06T16:38:04.533000
CVE-2023-7268,0,0,a007920b048244bad12b3daf0ade65763569e4511640cd0844ab63fc1ad6a18e,2024-11-21T08:45:38.200000
@ -245059,9 +245059,9 @@ CVE-2024-12729,0,0,e884fbf395061cc739fddc55aa58e43dec46aecaf3403889ecea11d1206a1
CVE-2024-1273,0,0,e8464b176bd39036e0f45e4b49d8110f84d3d3960c826bc9710c36200b4f5e6c,2024-11-21T08:50:12.557000
CVE-2024-1274,0,0,8b1ee7c9f6e7817a23a525a715cd0c1ef18c567c26c711e49e1e872df04cda9a,2024-11-21T08:50:12.730000
CVE-2024-12741,0,0,c9f183fb88063863d511dd9a34a59e6fd50d2f3a53a8fd3b665d83eeabe6e5e3,2024-12-18T20:15:22.390000
CVE-2024-12744,0,1,d625183b591eae0673573781c90eb9abca36c8d2b82dff7d8b06b69720375ac1,2024-12-26T15:15:06.290000
CVE-2024-12745,0,1,20a5217461f53528351644b440cb21786d595c714b2ef84b0f71065c6f46f5a0,2024-12-26T15:15:06.527000
CVE-2024-12746,0,1,26339eaaadb22cdf91e2f6744dc4d14eac5494ac390adaedafd2918e4b3da3f7,2024-12-26T15:15:06.650000
CVE-2024-12744,0,0,d625183b591eae0673573781c90eb9abca36c8d2b82dff7d8b06b69720375ac1,2024-12-26T15:15:06.290000
CVE-2024-12745,0,0,20a5217461f53528351644b440cb21786d595c714b2ef84b0f71065c6f46f5a0,2024-12-26T15:15:06.527000
CVE-2024-12746,0,0,26339eaaadb22cdf91e2f6744dc4d14eac5494ac390adaedafd2918e4b3da3f7,2024-12-26T15:15:06.650000
CVE-2024-1275,0,0,55e303d499b7cd70146b064f11442ebd0ad45cafbb26b305d69871c04faa255a,2024-11-21T08:50:12.913000
CVE-2024-1276,0,0,342e07ea1475f57185158b84be14279572eebbc1b91e4c07c491730599e6701d,2024-11-21T08:50:13.050000
CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000
@ -245124,7 +245124,7 @@ CVE-2024-12900,0,0,1012b3733f239b410a68b2041572702d5a7f787259c3b8be862ffc1a0d536
CVE-2024-12901,0,0,7438bb24c69768569f04db263b25be4e855460433a924b6dad82e02e6b0c486b,2024-12-23T02:15:06.613000
CVE-2024-12902,0,0,dc8ea62d5500cfba347f51f27017c7c034c6314a6ca11a7df4d8bb8555d9de85,2024-12-23T11:15:06.153000
CVE-2024-12903,0,0,bc4a71a13a64e9c0d45e023c2f146d73439b3078b2350002a42c4be342765e96,2024-12-23T13:15:06.390000
CVE-2024-12908,1,1,b6b5f22116dfcb3666f4cb811c1a3f7e5747b47443d62abc367bbed55ab61bde,2024-12-26T16:15:06.050000
CVE-2024-12908,0,0,b6b5f22116dfcb3666f4cb811c1a3f7e5747b47443d62abc367bbed55ab61bde,2024-12-26T16:15:06.050000
CVE-2024-1291,0,0,52c4840726a3cf584db63abe3d1006ff575604ba403c25fca89470816948ce5e,2024-11-21T08:50:14.863000
CVE-2024-1292,0,0,38d9bc6a557167174bf37c6662c68d5de6a783380fb5a30941c923054e3f2f16,2024-11-21T08:50:14.983000
CVE-2024-12926,0,0,e218ff80ac001bcdc288d778a26371bdd41dd905c42a161e5fc197e8c4673bb2,2024-12-25T20:15:22.147000
@ -245133,13 +245133,13 @@ CVE-2024-12928,0,0,000c9232b0026a751fd78ebe571857611c04cc2288300f44734b8380aad9d
CVE-2024-12929,0,0,8b4ad9e2d5f7ae6ffc421134389555160c900b397c62b70258ebb0b7477370cb,2024-12-26T00:15:22.300000
CVE-2024-1293,0,0,a122e9ddbaac35fa4b5b33d2b10cf37b4d4e3a3677cea83da66723805eec222b,2024-11-21T08:50:15.167000
CVE-2024-12930,0,0,31e95b7cb48d02fb9532fdd75b88b036b1acacc2654bb60cd04aed6b027ebbbd,2024-12-26T02:15:23.210000
CVE-2024-12931,0,0,becf1869b5db37acbc189f5d6d1d4586c82bc17d691205a9b61018923b494cc4,2024-12-26T03:15:05.493000
CVE-2024-12932,0,0,ebc5e94e1c88c7a12e7ecf9d25650f1e90df3d2533e49c799243ee930e654061,2024-12-26T03:15:05.840000
CVE-2024-12933,0,0,e40cafc3ee87debe3ee04945911982628e6d73046f6327f529b6c33ba8b3e115,2024-12-26T04:15:05.840000
CVE-2024-12934,0,0,cbb052d87752f6d6cd081f6e2430b558a0f4b659862c15cfb414bb947f4af399,2024-12-26T04:15:06.180000
CVE-2024-12935,0,0,303d83f83f72e9c71b6e460f2f4378566ff4d233a78d5b4681aa11ea94219325,2024-12-26T05:15:05.837000
CVE-2024-12936,0,0,65645b52539d3904272ded9f6e9927f895666fd8dc5d1570f58b17fa4e0a0152,2024-12-26T05:15:06.557000
CVE-2024-12937,0,0,28e9eaeefc5568306fb5d02be75e5cbc408278c9090462ad6116d73f84c65a89,2024-12-26T06:15:05.720000
CVE-2024-12931,0,1,6b882517c2a0aa1351abe5ba78e4ecf4a2af7e368b8073360ec648ee10add50d,2024-12-26T18:15:06.663000
CVE-2024-12932,0,1,81ec75deb70d1ce3a840264810c61f612efb59eb6151538363851d7e866367b7,2024-12-26T18:15:09.233000
CVE-2024-12933,0,1,9af20e5f81ecf2f25b3c4dee70c4e1c77e8eddf90d945f16067ea8c441c99619,2024-12-26T18:15:11.783000
CVE-2024-12934,0,1,bd5f2e373e349cc8c2cefe3ce30887c4ea4d73d0002b6e447502291e30052cc2,2024-12-26T18:15:14.550000
CVE-2024-12935,0,1,89b785f922bd381d1b4fd661c0a176bfb06dc34e744d6e8e970165a856177bcb,2024-12-26T18:15:17.483000
CVE-2024-12936,0,1,e0c2882e99bf6bff47f22eeb7c69ee83f0c4b11e4aa9aad5bbd4981dff87cb46,2024-12-26T17:15:06.487000
CVE-2024-12937,0,1,561720c3cba1bd5bb70a8befa375029c579c78cc7317991a30ddc5d9d2c820d3,2024-12-26T17:15:06.873000
CVE-2024-12938,0,0,241f9cedf0d4f9b9e857e8f6720eec95e3249457c1827feaf469612c63ac35f3,2024-12-26T06:15:05.987000
CVE-2024-12939,0,0,be0dc3a9983c8502fdf3116a33aea4627f46b9807329126b093457c0e502a013,2024-12-26T07:15:10.967000
CVE-2024-1294,0,0,b71ea2285980093702250bdd703066da616a4eac45cb0506e646936d244fcc0f,2024-11-21T08:50:15.277000
@ -245148,22 +245148,24 @@ CVE-2024-12941,0,0,81d66ceba288cafeac8e4b6f922f500756cbe0105cfa165f8fb1332807b03
CVE-2024-12942,0,0,777d8ad0d37f683335fc4ffee46b00086a2d1edb297e09b262dc4388586a1f65,2024-12-26T08:15:05.540000
CVE-2024-12943,0,0,0e0352c3cdfb6c94c92b061e0c57fc94486d90b8be968f83a37598213c129c83,2024-12-26T09:15:06.747000
CVE-2024-12944,0,0,94ac533f69831e0792eddb5df819ea87ca6f4e8141ed76c926ecab8ac06efc51,2024-12-26T09:15:07.030000
CVE-2024-12945,0,0,6a75b3c16371295f70d4017ebe5efbf29d0cac38a65db0a501645e045cb67e8e,2024-12-26T10:15:05.527000
CVE-2024-12946,0,0,400d236b9f0cab3ccac13b217edebb50440dfd55bfcf1455987e627b6887d888,2024-12-26T10:15:05.777000
CVE-2024-12947,0,0,a403450fa2bbc578a8fcf83d306b673ae1cf0b372f48568ef42b885bfb717aa4,2024-12-26T11:15:05.790000
CVE-2024-12948,0,0,9ed039ff2046d0bd52c0232ea595bbbab01c59fd1089b82b348419f43d74c4c7,2024-12-26T11:15:07.173000
CVE-2024-12945,0,1,bb203015455df487cf9786180bf2361288934f93cb529565b060259c4a0972e6,2024-12-26T17:15:07.017000
CVE-2024-12946,0,1,7f66dbd6e787ab963effcb1cee71eadb44b5e7e4446b208eadabbde79a97b50c,2024-12-26T17:15:07.153000
CVE-2024-12947,0,1,36dfb235c1324fb0ab34ed74a2f1c5cd0a98e6ca9c233605a7bfd37bd66992cd,2024-12-26T17:15:07.293000
CVE-2024-12948,0,1,1411dc28cc8ad85d0e4600276fbd63c3737adb47866325d019941fd1987754be,2024-12-26T17:15:07.427000
CVE-2024-12949,0,0,86d3ebeba0868e6b562019ec87488552d967c5cd5ccaf8d01f425a8fe584af62,2024-12-26T12:15:05.997000
CVE-2024-1295,0,0,58e65e331ff11f824ceffb79237c2ca705e423c379ee489ababaab58413247e4,2024-11-21T08:50:15.410000
CVE-2024-12950,0,0,ca4cbf7c69d996ce2bfd33f152e0fb62d216c9cea2edc40017131b89bad1e400,2024-12-26T12:15:06.870000
CVE-2024-12951,0,1,0a12db8b7c5fc4ae5da0ad4788be58d750d64838f93d7574048d431978efeae4,2024-12-26T16:15:06.730000
CVE-2024-12952,0,1,bebb703b529a136680b3d159fa57c325a3b9aee1ad512e84decac68c414e89ad,2024-12-26T16:15:10.540000
CVE-2024-12953,0,1,b6658fb4c7ce816c34d17982ad9065b1b2273c2711dd83d876543af9deecca01,2024-12-26T16:15:14.487000
CVE-2024-12954,0,1,5b3615740107f6cda64b7337a871541f03c27d10081cdea2daacf61f08c096ca,2024-12-26T16:15:17.510000
CVE-2024-12955,1,1,a8777044c9076e12b90807fbb55d952d1381d25a2406bca0f486e11fcc4343f9,2024-12-26T16:15:20.320000
CVE-2024-12956,1,1,277dbeee2c836d1ea7f61c74b6cd65abb129ed40587a3a4d389474be190962ee,2024-12-26T16:15:22.847000
CVE-2024-12958,1,1,750f2f464b0d44b3315b5a0380e86b50db9852ce8f322705c4d405807c7053b6,2024-12-26T16:15:25.667000
CVE-2024-12959,1,1,ad9ab3bb035c04c7413feef8cc4008dc338f6f3f3a2985de139ec649d8ab5665,2024-12-26T16:15:27.643000
CVE-2024-12950,0,1,8f7dbac8ca59122eeeb24a115a877f36f5293f5fafac4cf4c861baf46c7b8121,2024-12-26T17:15:07.553000
CVE-2024-12951,0,0,0a12db8b7c5fc4ae5da0ad4788be58d750d64838f93d7574048d431978efeae4,2024-12-26T16:15:06.730000
CVE-2024-12952,0,0,bebb703b529a136680b3d159fa57c325a3b9aee1ad512e84decac68c414e89ad,2024-12-26T16:15:10.540000
CVE-2024-12953,0,0,b6658fb4c7ce816c34d17982ad9065b1b2273c2711dd83d876543af9deecca01,2024-12-26T16:15:14.487000
CVE-2024-12954,0,0,5b3615740107f6cda64b7337a871541f03c27d10081cdea2daacf61f08c096ca,2024-12-26T16:15:17.510000
CVE-2024-12955,0,0,a8777044c9076e12b90807fbb55d952d1381d25a2406bca0f486e11fcc4343f9,2024-12-26T16:15:20.320000
CVE-2024-12956,0,0,277dbeee2c836d1ea7f61c74b6cd65abb129ed40587a3a4d389474be190962ee,2024-12-26T16:15:22.847000
CVE-2024-12958,0,0,750f2f464b0d44b3315b5a0380e86b50db9852ce8f322705c4d405807c7053b6,2024-12-26T16:15:25.667000
CVE-2024-12959,0,0,ad9ab3bb035c04c7413feef8cc4008dc338f6f3f3a2985de139ec649d8ab5665,2024-12-26T16:15:27.643000
CVE-2024-1296,0,0,2c8681669a40b4c1355bcd3bfff211c08a874ea1e31940665fa8f736883bd89e,2024-11-21T08:50:15.633000
CVE-2024-12960,1,1,40350317db5cdb5cbb22695ae55056b69f50a7afc4d85cc53b16ab138e8da154,2024-12-26T18:15:21.027000
CVE-2024-12961,1,1,a62f93c612a71df17447a1d081f7f4fa52eba74f4383595e0ae3fd6b425b6bfa,2024-12-26T18:15:23.463000
CVE-2024-1297,0,0,0d9e22e56ecef1715a16e9d7809dba48ba55def0e741f79f7098027ea7ebc7ff,2024-11-21T08:50:15.770000
CVE-2024-1298,0,0,04246e35362f6f4b760051526529d0b042d99f56b78c06a26d303553264d4594,2024-11-21T08:50:15.890000
CVE-2024-1299,0,0,c7f245e662ec35ddd87c48ae29ff03e74531f9ba7973bf15293ed4e82f111599,2024-12-11T20:23:27.497000
@ -245535,7 +245537,7 @@ CVE-2024-1690,0,0,7e2e3e4c0dc45c7e10c6184fa4180e4340b05f725f49212c634f18d52aeb86
CVE-2024-1691,0,0,ad75487233977609d54ff16305491e716d553be8d688024aabeec1b1b5cb10e2,2024-11-21T08:51:05.807000
CVE-2024-1692,0,0,5fa0283571cfae8981e25dc13b8f934367b33cb6ea11e8e0322c3f47d4b7acd9,2024-11-21T08:51:05.923000
CVE-2024-1693,0,0,85dfb1783111a4af6d6e255e664bea0a4079aa4a5e8289750dc03e9681499a21,2024-11-21T08:51:06.053000
CVE-2024-1694,0,1,1ad1c113a0675747298a00caec017307a26a01e7bc61dba367bdee9ea6f88f87,2024-12-26T16:09:24.467000
CVE-2024-1694,0,0,1ad1c113a0675747298a00caec017307a26a01e7bc61dba367bdee9ea6f88f87,2024-12-26T16:09:24.467000
CVE-2024-1695,0,0,1c5d560e9ce5c3fae0cb5230e680f68a2aeca2413e77781d5be99ab374e41559,2024-11-21T08:51:06.360000
CVE-2024-1696,0,0,96c8303e535001c6c5d3b6e14d30079b9651c70dc730972b738df81a8696b09e,2024-11-21T08:51:06.550000
CVE-2024-1697,0,0,c470a81452f09db0e40146053a7ca6ac44c10328d8eb381864ced3a9cc5f2c2e,2024-11-21T08:51:06.673000
@ -265772,15 +265774,15 @@ CVE-2024-4714,0,0,0d524d117aabf03780c7be3f44074976485dfc4d101c0f965f441387c1ce48
CVE-2024-47142,0,0,3b160aeed892b3de0fae2f0bd942190d42286dfc37500bd913fc0a3b0770ad8c,2024-11-22T02:15:21.280000
CVE-2024-47145,0,0,060f9bb9a43b25110359917405fc9bc4bfa91006f8a71471b803c37bd9f0df18,2024-09-26T18:42:33.550000
CVE-2024-47146,0,0,4c1ec2fd77a55fc12a380140e8b75abce8b99c7554038e5bb49a8e56f7893728,2024-12-10T19:45:51.023000
CVE-2024-47148,0,0,b2b201e492cb219881350a4ee656b7e0714f48f06b1efeb7497e58f4cfc34dd3,2024-12-26T12:15:07.063000
CVE-2024-47149,0,0,777275743f5865f3be6f0f8246f16b564657bd5cc036e3b2daa732b3eb5c4d7d,2024-12-26T13:15:07.007000
CVE-2024-47148,0,1,25d529d7048c43e324b1b1bb5246ad8fd0671cb70d9bd1485e019313e02684e3,2024-12-26T17:15:07.687000
CVE-2024-47149,0,1,5261609e1b3b04bc96a5ac1deae0807182848625a77e72b8f4b1f85416cfa8fc,2024-12-26T17:15:07.810000
CVE-2024-4715,0,0,cfdee50dbf680b557a3c5935dd446958982a7767348e746e1514b6a87d45fd32,2024-11-21T09:43:26.243000
CVE-2024-47150,0,0,d34bb8def30ddd1e10efd6b15266d2eac0ad62d8addf9f44a21ce79578e09f5e,2024-12-26T13:15:07.140000
CVE-2024-47151,0,0,32ffda1955b6441bb63553c91b7088d99e558c2a2a144674b8b411a9369261be,2024-12-26T11:15:07.387000
CVE-2024-47150,0,1,80a76ab25794ed4af6b0e0579fc0dab72665d62124264c7819ef61bd2275f848,2024-12-26T17:15:07.923000
CVE-2024-47151,0,1,a6a7ac643bbd0fc16f84ae7176a31ab79ca5310cba9b802f09343b0fc969b713,2024-12-26T17:15:08.037000
CVE-2024-47153,0,0,3c9ddb156d4838ab4dd50ad2be03036f905c4748cf151f06b44931abbf5374c8,2024-12-26T12:15:07.183000
CVE-2024-47154,0,0,91109d991ba96e992fa2e33be15597c37ea7cea8c8a483406508c60a9929a172,2024-12-26T12:15:07.303000
CVE-2024-47155,0,0,6e65506a0eb90f835c2c554e3bfb26aa486643f08e76807e5aa35a34c35f9533,2024-12-26T12:15:07.433000
CVE-2024-47156,0,0,129b4d08361f8cc9a55f077783887ffdf655fece2a1580fba2b541389971a541,2024-12-26T11:15:07.517000
CVE-2024-47156,0,1,3602194834e974cb1386b0e928ae8c9b1627d25842118fa8a727b8376eac6cbf,2024-12-26T17:15:08.150000
CVE-2024-47157,0,0,ac92958500bb1c8504ede364fb0734e8d324168e5026a932d89c148f0239dca6,2024-12-26T12:15:07.547000
CVE-2024-47158,0,0,b0c240c01999f96b32d54a0c5d41b1284741ebcdb34e1f30df025b02e60124f4,2024-11-06T17:10:03.857000
CVE-2024-47159,0,0,dc6f344db4381cf6189daa37a80d59a488ca43c446da4d79e165921cf750d139,2024-09-24T18:09:50.877000
@ -268675,7 +268677,7 @@ CVE-2024-5153,0,0,5201b5401d401becd44a1317581445bf8929de090e1718378b23c7f68f95a1
CVE-2024-51530,0,0,7cd040cc53d7ba42e6f6d453f4d18993a534b39a2754ee99e99110d754af3ffe,2024-11-07T19:56:10.187000
CVE-2024-51532,0,0,4490c7d316879473ce06299341d463d32f4cb580470042766196dc8d1e940618,2024-12-19T02:15:23
CVE-2024-5154,0,0,2b204ac4cfe5700aeb8fd234238f6495b194bb11d4ab3c09549ae293c9be6a35,2024-12-11T04:15:04.990000
CVE-2024-51540,1,1,e5d60701916d41d767ba92f7413eb5609f3540c0c601b97a5ed7d1e29cd79006,2024-12-26T16:15:29.640000
CVE-2024-51540,0,0,e5d60701916d41d767ba92f7413eb5609f3540c0c601b97a5ed7d1e29cd79006,2024-12-26T16:15:29.640000
CVE-2024-51541,0,0,142a418f59528ceed12160c8666a0df4712069c8f2391d18e7017db83feff322,2024-12-05T13:15:07.303000
CVE-2024-51542,0,0,8c33b38999354a42a1903c24f67205a8ad9fd22f1d54e4dcd4d2cd4e47336759,2024-12-05T13:15:07.453000
CVE-2024-51543,0,0,2e5257f71ed91dbe805d033e4a6755a3128eea835afba16fb7592fead3d316f3,2024-12-05T13:15:07.613000
@ -270669,7 +270671,7 @@ CVE-2024-54926,0,0,99308ee0c7bdb2555270e9769b907fdbadfdbd27447c982cce941529cd8db
CVE-2024-54927,0,0,743cd5f75576f93b89277c4c4bd309f2a9d5d44818b55b3d4433a9a3e5ce11c7,2024-12-11T16:15:16.360000
CVE-2024-54928,0,0,c0b3aee5ee0c3359e1bdf75741044319f3b2ae90c5d6a8fa2f4c6b96dad60fe9,2024-12-11T16:15:16.590000
CVE-2024-54929,0,0,028424391bfd0e6e1a80decba8ca8422fb184a112971073f186a5d0b3e71e96b,2024-12-10T15:47:10.800000
CVE-2024-5493,0,1,e28052dbe6c7953505a06f636383a79eb3b96ef55b7ca08e8ed256a1f6ab6ea0,2024-12-26T16:36:54.357000
CVE-2024-5493,0,0,e28052dbe6c7953505a06f636383a79eb3b96ef55b7ca08e8ed256a1f6ab6ea0,2024-12-26T16:36:54.357000
CVE-2024-54930,0,0,59137406324a26fde678f077cfa8b27bd914be08b6757bd42247e4c52270e1f7,2024-12-12T18:15:26.440000
CVE-2024-54931,0,0,ef3fc2dbe9a46d49c1248bd262a192fe17792d64b5abf18c5cb4f9afa4b62ded,2024-12-11T16:15:16.820000
CVE-2024-54932,0,0,8a514ce426faf4a02b37c1044e879c28a2d4841edec0cfb7f7fd39bffdd5ab3f,2024-12-12T18:15:26.673000
@ -270679,15 +270681,15 @@ CVE-2024-54935,0,0,61185b20f382be4d3639bac7ef1593b440e8859a1d371e482182cb5ef4251
CVE-2024-54936,0,0,f21b1da20346f5f757f77e403c54bbd170034aa987896c1a2a9c5ceb1fff38da,2024-12-10T18:15:43.233000
CVE-2024-54937,0,0,197a7c9b3b72f036ddf287711fb28635bb9463140aa1361b9ca00a7c51b672cd,2024-12-11T17:15:20.790000
CVE-2024-54938,0,0,5376f91bdc16b2e02af9854f224acaa97d8eeeea6e39c3277fbe6d2d4b3c3ddd,2024-12-11T16:15:17.033000
CVE-2024-5494,0,1,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cff0,2024-12-26T16:38:51.957000
CVE-2024-5495,0,1,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000
CVE-2024-5496,0,1,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000
CVE-2024-5497,0,1,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000
CVE-2024-5498,0,1,9ecbba4511623233a33c3c81181005b0976c38a133da4d6811e96531fd97f158,2024-12-26T16:43:44.433000
CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cff0,2024-12-26T16:38:51.957000
CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000
CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000
CVE-2024-5497,0,0,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000
CVE-2024-5498,0,0,9ecbba4511623233a33c3c81181005b0976c38a133da4d6811e96531fd97f158,2024-12-26T16:43:44.433000
CVE-2024-54982,0,0,e8c74eec51cce9de539b00c3292b4abecd40a032af1c51a9e260f51659b60214,2024-12-19T22:15:06.197000
CVE-2024-54983,0,0,b2ad246b10b45dd7cfc17926ea56de4773d20508323adacbed126b6796329cde,2024-12-19T22:15:06.387000
CVE-2024-54984,0,0,babb2b33ae3b96a3432a944bca85ec3b312a6220922b7f6f4cd42fd71ea663cf,2024-12-19T22:15:06.563000
CVE-2024-5499,0,1,bbe4dd69894f0f98fba609f59dfd6e7af7f9cec1f980c4939ff30b774a53a4b5,2024-12-26T16:07:06.693000
CVE-2024-5499,0,0,bbe4dd69894f0f98fba609f59dfd6e7af7f9cec1f980c4939ff30b774a53a4b5,2024-12-26T16:07:06.693000
CVE-2024-5500,0,0,280f34db2c8783872a68d6daa217e3e1e4614074bb8e8b0a741315b28d98613a,2024-11-21T09:47:49.373000
CVE-2024-5501,0,0,c16d3f86bb6f5e02795073b49cb84dc8c7e7a5718a6fed025ea914c4721b4cad,2024-11-21T09:47:49.573000
CVE-2024-5502,0,0,5a18d45bd85121e2ecc06d05133613fd7aff163eb02902343f6ea41930ef607b,2024-09-12T21:05:37.880000
@ -271621,10 +271623,10 @@ CVE-2024-6286,0,0,b554a948fc06c2eb91239ea46a179afa609033e182a5f9aab369b4b7b31cea
CVE-2024-6287,0,0,40f3c985baea6ec05334f3fce731768f0d81911c304f1a2e44209c982888aaa6,2024-11-21T09:49:21.517000
CVE-2024-6288,0,0,40bbc38b68a450631f0e9175185c8ad76d9776d4b142273208983180f4c09b3f,2024-11-21T09:49:21.653000
CVE-2024-6289,0,0,e3b1da7f78c07c932415d923ac9d2fd6e2073e4f22fe5d996bf5052a37e49819,2024-11-21T09:49:21.773000
CVE-2024-6290,0,1,ecbdc53f91b6c561a5db09710186acd2b3f3ef9b51205410ab3ba731edcf64a9,2024-12-26T16:26:22.763000
CVE-2024-6291,0,1,66d2b2d54c02e96dc13691c90aaf7f945837bdc6a98aacbc87b63c22a02825cb,2024-12-26T16:26:31.473000
CVE-2024-6292,0,1,1ac566fb41655f5c37f2bd78fc339ae1a5e7248a5c374fffe68269359e07bea7,2024-12-26T16:26:46.207000
CVE-2024-6293,0,1,9cb6114f1cfcae8ae7287cd7ca0141f7af5d15fb9c45578f1bda519f5f7ce75e,2024-12-26T16:02:51.103000
CVE-2024-6290,0,0,ecbdc53f91b6c561a5db09710186acd2b3f3ef9b51205410ab3ba731edcf64a9,2024-12-26T16:26:22.763000
CVE-2024-6291,0,0,66d2b2d54c02e96dc13691c90aaf7f945837bdc6a98aacbc87b63c22a02825cb,2024-12-26T16:26:31.473000
CVE-2024-6292,0,0,1ac566fb41655f5c37f2bd78fc339ae1a5e7248a5c374fffe68269359e07bea7,2024-12-26T16:26:46.207000
CVE-2024-6293,0,0,9cb6114f1cfcae8ae7287cd7ca0141f7af5d15fb9c45578f1bda519f5f7ce75e,2024-12-26T16:02:51.103000
CVE-2024-6294,0,0,502447c197a08738d3dcd348b035883f55795c98c8a8453d4fc4e46065c26673,2024-11-21T09:49:22.657000
CVE-2024-6295,0,0,a37d39737ca398b822e686c19248b2da7cb8fddd0eff6235ded59a7b44ef41a3,2024-11-21T09:49:22.777000
CVE-2024-6296,0,0,abffd4826c09735f90bdf20b5659c634be724f2d335a4180be0afc939510aed5,2024-11-21T09:49:22.900000
@ -272046,14 +272048,14 @@ CVE-2024-6767,0,0,f769e30490d66d8fac295ebcef2fe317bfce217d66064d303b66800281e266
CVE-2024-6768,0,0,b0c2adf1378e129f3c2fa9f6619403600641c44acc0ae447bd533a4b6adedd5a,2024-08-13T12:58:25.437000
CVE-2024-6769,0,0,b0714003f1bf6cd2be4063e321f555651e3b2ab352e349c019ed51506a9392ee,2024-11-21T09:50:16.560000
CVE-2024-6770,0,0,245271887342f9e17dd751c91a668b9b2365e973cc52173695152644e765b2e0,2024-07-31T12:57:02.300000
CVE-2024-6772,0,1,08bece7a609ae5c256191220df37bfb7787faad66b3cbbcc7d4346f3923e9178,2024-12-26T16:02:45.563000
CVE-2024-6773,0,1,65ae8e2289d672ddf0c4386153a69914491d30ca4214f30bcdbc26db45c55c63,2024-12-26T16:03:48.013000
CVE-2024-6774,0,1,1665894a3ed006ccb5f2db0018f065d507e3e2654d18204239c4f6f55183d1be,2024-12-26T16:04:06.250000
CVE-2024-6775,0,1,ba45af092937d8fb5c31317d336492f36d2631e4ebc8525322d8e7449a0f71c5,2024-12-26T16:05:07.670000
CVE-2024-6776,0,1,a8c015e90f08f6134c54834c322d65ea474ba1ec2af7cdf5fb0885e06ec14506,2024-12-26T16:05:20.450000
CVE-2024-6772,0,0,08bece7a609ae5c256191220df37bfb7787faad66b3cbbcc7d4346f3923e9178,2024-12-26T16:02:45.563000
CVE-2024-6773,0,0,65ae8e2289d672ddf0c4386153a69914491d30ca4214f30bcdbc26db45c55c63,2024-12-26T16:03:48.013000
CVE-2024-6774,0,0,1665894a3ed006ccb5f2db0018f065d507e3e2654d18204239c4f6f55183d1be,2024-12-26T16:04:06.250000
CVE-2024-6775,0,0,ba45af092937d8fb5c31317d336492f36d2631e4ebc8525322d8e7449a0f71c5,2024-12-26T16:05:07.670000
CVE-2024-6776,0,0,a8c015e90f08f6134c54834c322d65ea474ba1ec2af7cdf5fb0885e06ec14506,2024-12-26T16:05:20.450000
CVE-2024-6777,0,0,043fbce92e733c3dc4ffda017908d058956bd68e3286cb190e277117396f8b7f,2024-12-26T14:55:39.437000
CVE-2024-6778,0,1,4c9f0f8db5b035fb15c580d04205b5e01054cdeca86ea5adabc82fd945298cba,2024-12-26T15:36:56.463000
CVE-2024-6779,0,1,a7902d5ec74d01877c4af55bf0533a1a0a1af67408306a7de93bffdc44560978,2024-12-26T15:41:39.910000
CVE-2024-6778,0,0,4c9f0f8db5b035fb15c580d04205b5e01054cdeca86ea5adabc82fd945298cba,2024-12-26T15:36:56.463000
CVE-2024-6779,0,0,a7902d5ec74d01877c4af55bf0533a1a0a1af67408306a7de93bffdc44560978,2024-12-26T15:41:39.910000
CVE-2024-6780,0,0,4db2765824e08317655513c06e959ab5619d487ccfa2efc1d7c86120a66859df,2024-11-21T09:50:19.137000
CVE-2024-6781,0,0,47a24b53fb6b9fd8c09af1c57dcfaa9c67d275ac691fc2f4c15d2dc0980fd1d6,2024-08-19T17:15:34.797000
CVE-2024-6782,0,0,718e1d79780261b60c359e19d0776a8dde2ec8da1b3bbbef9c2b08242f327e82,2024-08-06T16:30:24.547000
@ -273909,7 +273911,7 @@ CVE-2024-8969,0,0,e0103db8ff55ccbf745d9bad3dc6e3e89e30b3ef3eab823189cb0a38ab3041
CVE-2024-8970,0,0,32d2ab1ad1bb8df91d143f8ca284d1a616bc1563b70e0f2f9520d488fbae118b,2024-12-13T01:20:14.813000
CVE-2024-8972,0,0,f92dc947552b410f0979548c7a5f91eedd60185a26a1399ffa98cc212dfdc7dd,2024-12-17T14:15:20.110000
CVE-2024-8974,0,0,9dfe7c1e1fc096d25206dd031b2e4236d5ec5630433070bbc83f3c7af62bcf85,2024-10-04T17:30:18.803000
CVE-2024-8975,0,1,6fdd60e4ac8e82514dad4ab3d13b10cc453141d483b967a0f088dd2001919391,2024-12-26T15:00:26.180000
CVE-2024-8975,0,0,6fdd60e4ac8e82514dad4ab3d13b10cc453141d483b967a0f088dd2001919391,2024-12-26T15:00:26.180000
CVE-2024-8977,0,0,cb8e4225cbeae27a4d5cd5a6caff3e78c74f90a4a117f3ebee8859bf0cf66b60,2024-10-16T17:10:13.220000
CVE-2024-8978,0,0,d27b973a30e145b038f4aa46488a1a73c5d80a05af06996c64c589eb06d82073,2024-11-19T17:04:38.903000
CVE-2024-8979,0,0,c8d7a454a2e21b5a6419915f563e8d188611a09ebbbeb9864f16825c369f1ca3,2024-11-19T17:05:08.270000
@ -273922,9 +273924,9 @@ CVE-2024-8987,0,0,79ba228dec5ca0fbae93e303f34dbdd56a4716dc6d9e552cfa2102ec47e7c1
CVE-2024-8989,0,0,357992e2ce66eee3f7c953860741894a33603e2d489573cb57a026d2c2a2d1e9,2024-10-04T13:51:25.567000
CVE-2024-8990,0,0,3370c28f297fd80b172f4e292abaacd02f3a1c4a8cb79acb64f1c13bbbbfa3d6,2024-10-04T13:51:25.567000
CVE-2024-8991,0,0,b6a63b7dc29d31f5a9e8816722bd5be42812012697196ec8caabd5b43893932f,2024-10-04T18:56:30.583000
CVE-2024-8992,0,0,dffd7ef09720d7bfd16807fb500f024a6a06ab4a3d5dd17e2497a1a1c340a56d,2024-12-26T12:15:07.660000
CVE-2024-8993,0,0,48776a82a24ff3f8336cfadd851bfc7f8ebbbb910491da12819b1db33e69afb4,2024-12-26T12:15:07.783000
CVE-2024-8994,0,0,06ece939091150688bf8c7cedf3349a4de0c1d940628f5635dc7703ed52ca211,2024-12-26T12:15:07.897000
CVE-2024-8992,0,1,c2ebb27e6764c9f9fe806153e0f5db62a49a64861bd9d2de918107abc54519ec,2024-12-26T17:15:08.267000
CVE-2024-8993,0,1,f9efe3e3d1b381eeed436bb3ede3d175e475b66017a35659d54769a9bb290f11,2024-12-26T17:15:08.387000
CVE-2024-8994,0,1,da30ee4cb6fee41e409a3bfa40e6a0e2851ef1130c15620f9f969fe0adc878a2,2024-12-26T17:15:08.500000
CVE-2024-8996,0,0,cd0b990817d2076a00b5e7fddb7f69f718917b5a243671e20171ba3b0c170ebd,2024-10-01T19:16:02.793000
CVE-2024-9001,0,0,0872fd49b5b6a794c95c6b45ab7ebb22635740627417ff87596d735c1ddbcba9,2024-09-24T16:14:30.190000
CVE-2024-9002,0,0,07bab80a5647df4577409503b6679799b5fed9b76f517f2c308405ac5c2a7ffe,2024-10-15T12:58:51.050000

Can't render this file because it is too large.