Auto-Update: 2024-03-14T21:00:38.303657+00:00

This commit is contained in:
cad-safe-bot 2024-03-14 21:03:26 +00:00
parent c4cf2a1af3
commit 61774caccc
47 changed files with 3245 additions and 346 deletions

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-2143",
"sourceIdentifier": "secalert@redhat.com",
"published": "2012-07-05T14:55:02.183",
"lastModified": "2023-11-07T02:10:24.710",
"vulnStatus": "Modified",
"evaluatorImpact": "As per: http://git.php.net/?p=php-src.git;a=commitdiff;h=aab49e934de1fff046e659cbec46e3d053b41c34 and http://git.php.net/?p=php-src.git;a=commitdiff_plain;h=aab49e934de1fff046e659cbec46e3d053b41c34\n\nPHP 5.3.13 and earlier are vulnerable.\n",
"lastModified": "2024-03-14T19:59:00.810",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -63,23 +62,31 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A2A705DF-3654-427F-8B11-62DB0B6C9813"
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.19",
"matchCriteriaId": "B0883209-4A15-421B-A7B9-6EA5C51BA2E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8F30CA60-0A82-45CD-8044-CE245393593D"
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4",
"versionEndExcluding": "8.4.12",
"matchCriteriaId": "B0D785B1-6406-422D-9962-A41EE5724A72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2DD4DE67-9E3C-4F79-8AAB-344C1C46C618"
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.8",
"matchCriteriaId": "82089569-18FD-40EB-9EB4-009223F1A535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4796DBEC-FF4F-4749-90D5-AD83D8B5E086"
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.1",
"versionEndExcluding": "9.1.4",
"matchCriteriaId": "193C7F88-26DE-4D6B-ABC9-F79491464143"
}
]
}
@ -433,7 +440,11 @@
"references": [
{
"url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=aab49e934de1fff046e659cbec46e3d053b41c34",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Patch"
]
},
{
"url": "http://git.postgresql.org/gitweb/?p=postgresql.git&a=commit&h=932ded2ed51e8333852e370c7a6dad75d9f236f9",

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-3185",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2014-09-28T10:55:10.283",
"lastModified": "2024-02-15T15:58:06.067",
"lastModified": "2024-03-14T19:58:39.097",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -63,8 +63,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "3.2.63",
"matchCriteriaId": "7C80D391-F3B3-4EFA-AB8D-6AFF448F906C"
"versionEndExcluding": "3.2.63",
"matchCriteriaId": "08F5EF97-E1B9-46F0-979B-E77F62DD8DB1"
},
{
"vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-9529",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-01-09T21:59:00.050",
"lastModified": "2023-11-07T02:23:06.510",
"vulnStatus": "Modified",
"lastModified": "2024-03-14T19:58:34.480",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -63,8 +63,50 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.18.2",
"matchCriteriaId": "6BEF22F9-77C0-4CCB-92B9-8F09C220BFB8"
"versionEndExcluding": "3.2.67",
"matchCriteriaId": "610F4D74-4688-40BE-AB0E-893944B3E9BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.3",
"versionEndExcluding": "3.4.107",
"matchCriteriaId": "E15A5939-878C-4DD2-9BDF-308A9616CAC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.5",
"versionEndExcluding": "3.10.67",
"matchCriteriaId": "60D618AD-AB2D-41B8-B8BD-0EBEB07EA75F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.11",
"versionEndIncluding": "3.12.37",
"matchCriteriaId": "13C6C0F3-DB99-45CE-AEED-691AD9B08540"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.13",
"versionEndIncluding": "3.14.31",
"matchCriteriaId": "74341731-4F87-4EF4-802E-75D97AAD29DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.15",
"versionEndExcluding": "3.16.35",
"matchCriteriaId": "7DC4BA70-B111-4D2E-BC78-6601CED68F08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.17",
"versionEndExcluding": "3.18.5",
"matchCriteriaId": "52FDF7A5-2922-4139-A2C9-5985A2369B5F"
}
]
}
@ -284,7 +326,10 @@
"references": [
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a3a8784454692dd72e5d5d34dcdab17b4420e74c",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-2666",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-05-27T10:59:04.813",
"lastModified": "2023-11-07T02:25:24.123",
"vulnStatus": "Modified",
"lastModified": "2024-03-14T19:59:23.823",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -63,8 +63,52 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.19.8",
"matchCriteriaId": "13BE712D-C8FA-4B87-9A81-D23E0DD30FD3"
"versionStartIncluding": "3.9",
"versionEndExcluding": "3.10.83",
"matchCriteriaId": "E2B0AD58-EA8D-45B5-8904-94271AEC93C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.11",
"versionEndExcluding": "3.12.40",
"matchCriteriaId": "5F50A53F-800B-4B6C-8D9F-15DF58421D96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.13",
"versionEndExcluding": "3.14.47",
"matchCriteriaId": "4424F17D-6AD4-4FE9-A029-143963887D1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.15",
"versionEndExcluding": "3.16.35",
"matchCriteriaId": "7DC4BA70-B111-4D2E-BC78-6601CED68F08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.17",
"versionEndExcluding": "3.18.19",
"matchCriteriaId": "464FCF6E-7FDF-42F9-ABB8-EA4ADD37CD1E"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171"
}
]
}
@ -74,31 +118,53 @@
"references": [
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153329.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1534.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2015/03/20/18",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.securitytracker.com/id/1032414",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204722",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/torvalds/linux/commit/f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-5157",
"sourceIdentifier": "secalert@redhat.com",
"published": "2015-08-31T10:59:11.830",
"lastModified": "2024-02-15T18:55:32.183",
"lastModified": "2024-03-14T19:58:51.427",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -98,8 +98,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "3.12.47",
"matchCriteriaId": "E302C2B5-C78C-4A32-920C-CAF51A9486E9"
"versionEndExcluding": "3.12.47",
"matchCriteriaId": "967C3CF4-381C-4010-9E1D-C350069E6813"
},
{
"vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2016-2143",
"sourceIdentifier": "secalert@redhat.com",
"published": "2016-04-27T17:59:08.867",
"lastModified": "2023-02-12T23:17:31.203",
"vulnStatus": "Modified",
"lastModified": "2024-03-14T19:59:19.913",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,8 +84,38 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:4.4:rc8:*:*:*:*:*:*",
"matchCriteriaId": "AD811782-D76C-4CC9-9F00-BFE7E258362F"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.25",
"versionEndExcluding": "3.2.79",
"matchCriteriaId": "B79A68C4-0BE9-4730-90EF-D994F6E432C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.3",
"versionEndExcluding": "3.12.58",
"matchCriteriaId": "03C048E1-FC04-4CCE-B8FE-247E05A813F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.13",
"versionEndExcluding": "3.16.35",
"matchCriteriaId": "618CC578-24BB-4653-8BFF-A78157E4CA91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.17",
"versionEndExcluding": "4.1.21",
"matchCriteriaId": "36DFEFEA-3B09-488F-915F-73378E43B1C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "4.4.6",
"matchCriteriaId": "920597A9-2E15-4868-BF20-45E5322CE1D9"
}
]
}
@ -97,6 +127,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
@ -110,6 +145,36 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*",
"matchCriteriaId": "D1137279-81F0-4F6B-8E91-95590106BADF"
}
]
}
]
}
],
"references": [
@ -117,56 +182,93 @@
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3446c13b268af86391d06611327006b059b8bab1",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2016-1539.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2016-2766.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2016/dsa-3607",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/torvalds/linux/commit/3446c13b268af86391d06611327006b059b8bab1",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2016-2143",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-10661",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-08-19T18:29:00.257",
"lastModified": "2018-10-31T10:29:04.183",
"vulnStatus": "Modified",
"lastModified": "2024-03-14T19:59:04.977",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@ -85,8 +85,100 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.10.14",
"matchCriteriaId": "FCD21859-C02B-4853-843A-4F88C23EA7C2"
"versionEndExcluding": "3.2.92",
"matchCriteriaId": "21888989-B8CA-4696-9FE4-9CDA1B3B92AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.3",
"versionEndExcluding": "3.16.47",
"matchCriteriaId": "18369FD7-D135-4C78-BA5E-8FF5F4573485"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.17",
"versionEndExcluding": "3.18.52",
"matchCriteriaId": "8104AAC1-9700-4372-8E11-37B09309A76F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.19",
"versionEndExcluding": "4.1.41",
"matchCriteriaId": "9019BEC9-FE77-4506-A019-B8B4D8BCEBAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "4.4.67",
"matchCriteriaId": "168D3A9F-B199-4E02-B791-291B29317EF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.27",
"matchCriteriaId": "922869C5-7B17-4B57-9E84-B746C7ABCFA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.10.15",
"matchCriteriaId": "85F68625-69D9-4FD0-A41C-40383EB29CF1"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CB33390A-F51F-4451-8FEA-7FC31F1AA51C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C81C5D4E-3CAD-43CE-82BC-B0619CA3A74A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
}
]
}
@ -105,7 +197,11 @@
},
{
"url": "http://www.debian.org/security/2017/dsa-3981",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.15",
@ -125,23 +221,38 @@
},
{
"url": "https://access.redhat.com/errata/RHSA-2018:3083",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2018:3096",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:4057",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:4058",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0036",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481136",
@ -169,7 +280,11 @@
},
{
"url": "https://www.exploit-db.com/exploits/43345/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-16527",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-11-04T01:29:36.803",
"lastModified": "2018-08-24T10:29:00.850",
"vulnStatus": "Modified",
"lastModified": "2024-03-14T19:58:25.543",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -85,8 +85,80 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.13.7",
"matchCriteriaId": "11C6B206-8716-4A16-81BD-F3B8C8ACBE19"
"versionEndExcluding": "3.2.95",
"matchCriteriaId": "FE34D8B6-10FA-4EBC-863E-F996C0D35F52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.3",
"versionEndExcluding": "3.16.50",
"matchCriteriaId": "5A53989A-9D64-4F5D-AC0F-115A2A72785A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.17",
"versionEndExcluding": "3.18.76",
"matchCriteriaId": "126AB064-7A35-4C32-BED7-382E0F13F147"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.19",
"versionEndExcluding": "4.1.46",
"matchCriteriaId": "8E07836D-67CD-47C8-9E8C-7AA3DBCAEFF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "4.4.93",
"matchCriteriaId": "C2F83CFA-B098-45DE-9391-BEA047F41BC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.57",
"matchCriteriaId": "D07BF343-265B-4842-9149-E4B7B8943A65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.13.8",
"matchCriteriaId": "0CD397D8-C278-45DC-A0B3-ABBC73A74ED7"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA"
}
]
}
@ -111,11 +183,18 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3754-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-16528",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-11-04T01:29:36.850",
"lastModified": "2018-04-07T01:29:03.030",
"vulnStatus": "Modified",
"lastModified": "2024-03-14T19:58:15.687",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -85,8 +85,50 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.13.3",
"matchCriteriaId": "FA1E2C32-ED0D-4E2B-A313-448CC0545ED2"
"versionStartIncluding": "3.19",
"versionEndExcluding": "4.1.47",
"matchCriteriaId": "8B69ADB4-1D58-48EB-8B97-013FD5D1A7B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "4.4.99",
"matchCriteriaId": "99213BBC-5F34-4CFD-8DB5-818D88641A90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.63",
"matchCriteriaId": "98B1AE8E-C792-42B6-B1CF-6F1F838B3028"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.13.4",
"matchCriteriaId": "5472D318-0478-439F-913A-FEEF5FF59A57"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
}
]
}
@ -111,11 +153,17 @@
},
{
"url": "https://usn.ubuntu.com/3619-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3619-2/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-16529",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-11-04T01:29:36.880",
"lastModified": "2018-08-24T10:29:00.927",
"vulnStatus": "Modified",
"lastModified": "2024-03-14T19:58:06.937",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -85,8 +85,80 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.13.5",
"matchCriteriaId": "8CBA5FF4-3406-4A63-9242-E6597219C011"
"versionEndExcluding": "3.2.95",
"matchCriteriaId": "FE34D8B6-10FA-4EBC-863E-F996C0D35F52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.3",
"versionEndExcluding": "3.16.50",
"matchCriteriaId": "5A53989A-9D64-4F5D-AC0F-115A2A72785A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.17",
"versionEndExcluding": "3.18.75",
"matchCriteriaId": "E04E29B0-31A7-4409-B175-5BA76E2D139A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.19",
"versionEndExcluding": "4.1.46",
"matchCriteriaId": "8E07836D-67CD-47C8-9E8C-7AA3DBCAEFF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "4.4.92",
"matchCriteriaId": "2E3DFF40-9172-40DC-B4F3-ED473E3EF79D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.55",
"matchCriteriaId": "6D4234C0-2CB9-42EA-A1B2-9A2FB26B8ABA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.13.6",
"matchCriteriaId": "5B059C9D-19AF-467F-AA41-2433849FDCA8"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA"
}
]
}
@ -96,7 +168,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/103284",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/torvalds/linux/commit/bfc81a8bc18e3c4ba0cbaa7666ff76be2f998991",
@ -115,11 +191,18 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3754-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-16530",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-11-04T01:29:36.913",
"lastModified": "2017-11-17T13:52:21.493",
"lastModified": "2024-03-14T19:57:49.287",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -85,8 +85,43 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.13.5",
"matchCriteriaId": "8CBA5FF4-3406-4A63-9242-E6597219C011"
"versionEndExcluding": "3.16.50",
"matchCriteriaId": "AF28BC26-3813-4695-A195-FA4113468860"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.17",
"versionEndExcluding": "3.18.75",
"matchCriteriaId": "E04E29B0-31A7-4409-B175-5BA76E2D139A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.19",
"versionEndExcluding": "4.1.46",
"matchCriteriaId": "8E07836D-67CD-47C8-9E8C-7AA3DBCAEFF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "4.4.92",
"matchCriteriaId": "2E3DFF40-9172-40DC-B4F3-ED473E3EF79D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.55",
"matchCriteriaId": "6D4234C0-2CB9-42EA-A1B2-9A2FB26B8ABA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.13.6",
"matchCriteriaId": "5B059C9D-19AF-467F-AA41-2433849FDCA8"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-16532",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-11-04T01:29:37.037",
"lastModified": "2018-08-24T10:29:01.053",
"vulnStatus": "Modified",
"lastModified": "2024-03-14T19:57:34.803",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -85,8 +85,90 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.13.11",
"matchCriteriaId": "3AB470D9-2EFD-4F2C-838A-EF9815166D69"
"versionEndExcluding": "3.2.95",
"matchCriteriaId": "FE34D8B6-10FA-4EBC-863E-F996C0D35F52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.3",
"versionEndExcluding": "3.16.50",
"matchCriteriaId": "5A53989A-9D64-4F5D-AC0F-115A2A72785A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.17",
"versionEndExcluding": "3.18.82",
"matchCriteriaId": "038B2E18-5117-49D3-ADBE-BB89B30E1260"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.19",
"versionEndExcluding": "4.1.47",
"matchCriteriaId": "8B69ADB4-1D58-48EB-8B97-013FD5D1A7B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "4.4.99",
"matchCriteriaId": "99213BBC-5F34-4CFD-8DB5-818D88641A90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.63",
"matchCriteriaId": "98B1AE8E-C792-42B6-B1CF-6F1F838B3028"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.13.14",
"matchCriteriaId": "1DE009D1-12C6-4B66-A783-639F8529DF7D"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886"
}
]
}
@ -111,31 +193,53 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3617-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3617-2/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3617-3/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3619-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3619-2/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3754-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1386",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-05-16T15:15:09.310",
"lastModified": "2022-05-24T19:00:51.517",
"lastModified": "2024-03-14T19:58:30.707",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,15 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:fusion_builder_project:fusion_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.6.2",
"matchCriteriaId": "4C0EFCB3-5303-40D0-960C-1027214683B3"
"matchCriteriaId": "B0114474-BD17-4989-B5E2-C71C0C21A360"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.6.2",
"matchCriteriaId": "16A123A5-181B-4970-836A-D38BADBFD4F7"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-44117",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-23T21:15:11.020",
"lastModified": "2022-11-28T19:34:03.263",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-14T19:15:49.147",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Boa 0.94.14rc21 is vulnerable to SQL Injection via username."
"value": "Boa 0.94.14rc21 is vulnerable to SQL Injection via username. NOTE: the is disputed by multiple third parties because Boa does not ship with any support for SQL."
},
{
"lang": "es",
"value": "Boa 0.94.14rc21 es vulnerable a la inyecci\u00f3n SQL mediante nombre de usuario."
}
],
"metrics": {

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-42938",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-14T19:15:49.270",
"lastModified": "2024-03-14T20:15:07.040",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in iTunes 12.13.1 for Windows. A local attacker may be able to elevate their privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214091",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214091",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,19 +2,79 @@
"id": "CVE-2023-48985",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T09:15:36.073",
"lastModified": "2024-02-14T13:59:35.580",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-14T19:02:42.210",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) vulnerability in CU Solutions Group (CUSG) Content Management System (CMS) before v.7.75 allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted script to the login.php component."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Scripting (XSS) en CU Solutions Group (CUSG) Content Management System (CMS) anterior a v.7.75 permite a un atacante remoto ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un script manipulado para el componente login.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cusg:content_management_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.75",
"matchCriteriaId": "B5825DB0-F08C-4CCE-9816-A94DABF98770"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://www.lmgsecurity.com/news/critical-software-vulnerabilities-impacting-credit-unions-discovered-by-lmg-security-researcher-immediate-action-recommended/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,79 @@
"id": "CVE-2023-48986",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T09:15:36.130",
"lastModified": "2024-02-14T13:59:35.580",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-14T19:02:47.760",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) vulnerability in CU Solutions Group (CUSG) Content Management System (CMS) before v.7.75 allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted script to the users.php component."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Scripting (XSS) en CU Solutions Group (CUSG) Content Management System (CMS) anterior a v.7.75 permite a un atacante remoto ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un script manipulado para el componente users.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cusg:content_management_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.75",
"matchCriteriaId": "B5825DB0-F08C-4CCE-9816-A94DABF98770"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://www.lmgsecurity.com/news/critical-software-vulnerabilities-impacting-credit-unions-discovered-by-lmg-security-researcher-immediate-action-recommended/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,79 @@
"id": "CVE-2023-48987",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T09:15:36.193",
"lastModified": "2024-02-14T13:59:35.580",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-14T19:03:10.113",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Blind SQL Injection vulnerability in CU Solutions Group (CUSG) Content Management System (CMS) before v.7.75 allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted script to the pages.php component."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL ciega en CU Solutions Group (CUSG) Content Management System (CMS) anterior a v.7.75 permite a un atacante remoto ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un script manipulado para el componente pages.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cusg:content_management_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.75",
"matchCriteriaId": "B5825DB0-F08C-4CCE-9816-A94DABF98770"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://www.lmgsecurity.com/news/critical-software-vulnerabilities-impacting-credit-unions-discovered-by-lmg-security-researcher-immediate-action-recommended/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,47 +2,170 @@
"id": "CVE-2023-52443",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-22T17:15:08.377",
"lastModified": "2024-02-22T19:07:27.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-14T20:16:02.947",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: avoid crash when parsed profile name is empty\n\nWhen processing a packed profile in unpack_profile() described like\n\n \"profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}\"\n\na string \":samba-dcerpcd\" is unpacked as a fully-qualified name and then\npassed to aa_splitn_fqname().\n\naa_splitn_fqname() treats \":samba-dcerpcd\" as only containing a namespace.\nThus it returns NULL for tmpname, meanwhile tmpns is non-NULL. Later\naa_alloc_profile() crashes as the new profile name is NULL now.\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 6 PID: 1657 Comm: apparmor_parser Not tainted 6.7.0-rc2-dirty #16\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\nRIP: 0010:strlen+0x1e/0xa0\nCall Trace:\n <TASK>\n ? strlen+0x1e/0xa0\n aa_policy_init+0x1bb/0x230\n aa_alloc_profile+0xb1/0x480\n unpack_profile+0x3bc/0x4960\n aa_unpack+0x309/0x15e0\n aa_replace_profiles+0x213/0x33c0\n policy_update+0x261/0x370\n profile_replace+0x20e/0x2a0\n vfs_write+0x2af/0xe00\n ksys_write+0x126/0x250\n do_syscall_64+0x46/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n </TASK>\n---[ end trace 0000000000000000 ]---\nRIP: 0010:strlen+0x1e/0xa0\n\nIt seems such behaviour of aa_splitn_fqname() is expected and checked in\nother places where it is called (e.g. aa_remove_profiles). Well, there\nis an explicit comment \"a ns name without a following profile is allowed\"\ninside.\n\nAFAICS, nothing can prevent unpacked \"name\" to be in form like\n\":samba-dcerpcd\" - it is passed from userspace.\n\nDeny the whole profile set replacement in such case and inform user with\nEPROTO and an explaining message.\n\nFound by Linux Verification Center (linuxtesting.org)."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: apparmor: evita fallas cuando el nombre del perfil analizado est\u00e1 vac\u00edo Al procesar un perfil empaquetado en unpack_profile() descrito como \"perfil :ns::samba-dcerpcd /usr/lib*/samba/ {,samba/}samba-dcerpcd {...}\" una cadena \":samba-dcerpcd\" se descomprime como un nombre completo y luego se pasa a aa_splitn_fqname(). aa_splitn_fqname() trata \":samba-dcerpcd\" como si solo contuviera un espacio de nombres. Por lo tanto, devuelve NULL para tmpname, mientras que tmpns no es NULL. M\u00e1s tarde, aa_alloc_profile() falla porque el nuevo nombre del perfil ahora es NULL. falla de protecci\u00f3n general, probablemente para direcci\u00f3n no can\u00f3nica 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref en rango [0x00000000000000000-0x0000000000000007] CPU: 6 PID: 1657 Comm: apparmor_parser No contaminado 6.7.0- rc2-dirty #16 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 01/04/2014 RIP: 0010:strlen+0x1e/0xa0 Llamada Seguimiento: ? strlen+0x1e/0xa0 aa_policy_init+0x1bb/0x230 aa_alloc_profile+0xb1/0x480 unpack_profile+0x3bc/0x4960 aa_unpack+0x309/0x15e0 aa_replace_profiles+0x213/0x33c0 Policy_update+0x261/0x370 perfil_replace+ 0x20e/0x2a0 vfs_write+0x2af/0xe00 ksys_write+0x126/0x250 do_syscall_64+0x46/0xf0 Entry_SYSCALL_64_after_hwframe+0x6e/0x76 ---[ end trace 0000000000000000 ]--- RIP: 0010:strlen+0x1e/0xa0 Parece que tal comportamiento de aa_splitn_fqname() se espera y se verifica en otros lugares donde se llama (por ejemplo, aa_remove_profiles). Bueno, hay un comentario expl\u00edcito \"se permite un nombre ns sin un perfil de seguimiento\" dentro. AFAICS, nada puede evitar que el \"nombre\" descomprimido tenga un formato como \":samba-dcerpcd\": se pasa desde el espacio de usuario. En tal caso, rechace el reemplazo completo del conjunto de perfiles e informe al usuario con EPROTO y un mensaje explicativo. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.306",
"matchCriteriaId": "0A7AEFD0-0681-4E8D-9074-27416D3EE94C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.268",
"matchCriteriaId": "991BF737-6083-429B-ACD5-FB27D4143E2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5.0",
"versionEndExcluding": "5.10.209",
"matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionEndExcluding": "5.15.148",
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndExcluding": "6.1.75",
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0a12db736edbb4933e4274932aeea594b5876fa4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1d8e62b5569cc1466ceb8a7e4872cf10160a9dcf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/55a8210c9e7d21ff2644809699765796d4bfb200",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5c0392fdafb0a2321311900be83ffa572bef8203",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5ff00408e5029d3550ee77f62dc15f1e15c47f87",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/77ab09b92f16c8439a948d1af489196953dc4a0e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9286ee97aa4803d99185768735011d0d65827c9e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9d4fa5fe2b1d56662afd14915a73b4d0783ffa45",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,47 +2,171 @@
"id": "CVE-2023-52444",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-22T17:15:08.430",
"lastModified": "2024-02-22T19:07:27.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-14T20:13:28.070",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid dirent corruption\n\nAs Al reported in link[1]:\n\nf2fs_rename()\n...\n\tif (old_dir != new_dir && !whiteout)\n\t\tf2fs_set_link(old_inode, old_dir_entry,\n\t\t\t\t\told_dir_page, new_dir);\n\telse\n\t\tf2fs_put_page(old_dir_page, 0);\n\nYou want correct inumber in the \"..\" link. And cross-directory\nrename does move the source to new parent, even if you'd been asked\nto leave a whiteout in the old place.\n\n[1] https://lore.kernel.org/all/20231017055040.GN800259@ZenIV/\n\nWith below testcase, it may cause dirent corruption, due to it missed\nto call f2fs_set_link() to update \"..\" link to new directory.\n- mkdir -p dir/foo\n- renameat2 -w dir/foo bar\n\n[ASSERT] (__chk_dots_dentries:1421) --> Bad inode number[0x4] for '..', parent parent ino is [0x3]\n[FSCK] other corrupted bugs [Fail]"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n para evitar corrupci\u00f3n directa Como inform\u00f3 Al en link[1]: f2fs_rename() ... if (old_dir != new_dir &amp;&amp; !whiteout) f2fs_set_link(old_inode, old_dir_entry, old_dir_page, new_dir); dem\u00e1s f2fs_put_page(old_dir_page, 0); Quiere el n\u00famero correcto en el enlace \"..\" Y el cambio de nombre entre directorios mueve la fuente al nuevo padre, incluso si le hubieran pedido que dejara un espacio en blanco en el lugar anterior. [1] https://lore.kernel.org/all/20231017055040.GN800259@ZenIV/ Con el siguiente caso de prueba, puede causar corrupci\u00f3n directa, debido a que no llam\u00f3 a f2fs_set_link() para actualizar el enlace \"..\" al nuevo directorio . - mkdir -p dir/foo - renameat2 -w dir/foo bar [ASSERT] (__chk_dots_dentries:1421) --&gt; N\u00famero de inodo incorrecto [0x4] para '..', el ino padre padre es [0x3] [FSCK] otro corrupto errores [falla]"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2.0",
"versionEndExcluding": "4.19.306",
"matchCriteriaId": "70CC102A-02F0-48B6-BEE8-3547C9651B25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.268",
"matchCriteriaId": "991BF737-6083-429B-ACD5-FB27D4143E2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5.0",
"versionEndExcluding": "5.10.209",
"matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionEndExcluding": "5.15.148",
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndExcluding": "6.1.75",
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/02160112e6d45c2610b049df6eb693d7a2e57b46",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2fb4867f4405aea8c0519d7d188207f232a57862",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/53edb549565f55ccd0bdf43be3d66ce4c2d48b28",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5624a3c1b1ebc8991318e1cce2aa719542991024",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6f866885e147d33efc497f1095f35b2ee5ec7310",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d3c0b49aaa12a61d560528f5d605029ab57f0728",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f0145860c20be6bae6785c7a2249577674702ac7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f100ba617d8be6c98a68f3744ef7617082975b77",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,47 +2,170 @@
"id": "CVE-2023-52445",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-22T17:15:08.477",
"lastModified": "2024-02-22T19:07:27.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-14T20:13:50.727",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix use after free on context disconnection\n\nUpon module load, a kthread is created targeting the\npvr2_context_thread_func function, which may call pvr2_context_destroy\nand thus call kfree() on the context object. However, that might happen\nbefore the usb hub_event handler is able to notify the driver. This\npatch adds a sanity check before the invalid read reported by syzbot,\nwithin the context disconnection call stack."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: medios: pvrusb2: corrige el use after free de desconexi\u00f3n de contexto. Al cargar el m\u00f3dulo, se crea un kthread dirigido a la funci\u00f3n pvr2_context_thread_func, que puede llamar a pvr2_context_destroy y, por lo tanto, llamar a kfree() en el objeto de contexto. Sin embargo, eso podr\u00eda suceder antes de que el controlador usb hub_event pueda notificar al controlador. Este parche agrega una verificaci\u00f3n de cordura antes de la lectura no v\u00e1lida reportada por syzbot, dentro de la pila de llamadas de desconexi\u00f3n de contexto."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.306",
"matchCriteriaId": "0A7AEFD0-0681-4E8D-9074-27416D3EE94C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.268",
"matchCriteriaId": "991BF737-6083-429B-ACD5-FB27D4143E2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5.0",
"versionEndExcluding": "5.10.209",
"matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionEndExcluding": "5.15.148",
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndExcluding": "6.1.75",
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3233d8bf7893550045682192cb227af7fa3defeb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/437b5f57732bb4cc32cc9f8895d2010ee9ff521c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ded85b0c0edd8f45fec88783d7555a5b982449c1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ec3634ebe23fc3c44ebc67c6d25917300bc68c08",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ec36c134dd020d28e312c2f1766f85525e747aab",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,27 +2,101 @@
"id": "CVE-2023-52446",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-22T17:15:08.527",
"lastModified": "2024-02-22T19:07:27.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-14T19:47:14.733",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix a race condition between btf_put() and map_free()\n\nWhen running `./test_progs -j` in my local vm with latest kernel,\nI once hit a kasan error like below:\n\n [ 1887.184724] BUG: KASAN: slab-use-after-free in bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.185599] Read of size 4 at addr ffff888106806910 by task kworker/u12:2/2830\n [ 1887.186498]\n [ 1887.186712] CPU: 3 PID: 2830 Comm: kworker/u12:2 Tainted: G OEL 6.7.0-rc3-00699-g90679706d486-dirty #494\n [ 1887.188034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n [ 1887.189618] Workqueue: events_unbound bpf_map_free_deferred\n [ 1887.190341] Call Trace:\n [ 1887.190666] <TASK>\n [ 1887.190949] dump_stack_lvl+0xac/0xe0\n [ 1887.191423] ? nf_tcp_handle_invalid+0x1b0/0x1b0\n [ 1887.192019] ? panic+0x3c0/0x3c0\n [ 1887.192449] print_report+0x14f/0x720\n [ 1887.192930] ? preempt_count_sub+0x1c/0xd0\n [ 1887.193459] ? __virt_addr_valid+0xac/0x120\n [ 1887.194004] ? bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.194572] kasan_report+0xc3/0x100\n [ 1887.195085] ? bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.195668] bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.196183] ? __bpf_obj_drop_impl+0xb0/0xb0\n [ 1887.196736] ? preempt_count_sub+0x1c/0xd0\n [ 1887.197270] ? preempt_count_sub+0x1c/0xd0\n [ 1887.197802] ? _raw_spin_unlock+0x1f/0x40\n [ 1887.198319] bpf_obj_free_fields+0x1d4/0x260\n [ 1887.198883] array_map_free+0x1a3/0x260\n [ 1887.199380] bpf_map_free_deferred+0x7b/0xe0\n [ 1887.199943] process_scheduled_works+0x3a2/0x6c0\n [ 1887.200549] worker_thread+0x633/0x890\n [ 1887.201047] ? __kthread_parkme+0xd7/0xf0\n [ 1887.201574] ? kthread+0x102/0x1d0\n [ 1887.202020] kthread+0x1ab/0x1d0\n [ 1887.202447] ? pr_cont_work+0x270/0x270\n [ 1887.202954] ? kthread_blkcg+0x50/0x50\n [ 1887.203444] ret_from_fork+0x34/0x50\n [ 1887.203914] ? kthread_blkcg+0x50/0x50\n [ 1887.204397] ret_from_fork_asm+0x11/0x20\n [ 1887.204913] </TASK>\n [ 1887.204913] </TASK>\n [ 1887.205209]\n [ 1887.205416] Allocated by task 2197:\n [ 1887.205881] kasan_set_track+0x3f/0x60\n [ 1887.206366] __kasan_kmalloc+0x6e/0x80\n [ 1887.206856] __kmalloc+0xac/0x1a0\n [ 1887.207293] btf_parse_fields+0xa15/0x1480\n [ 1887.207836] btf_parse_struct_metas+0x566/0x670\n [ 1887.208387] btf_new_fd+0x294/0x4d0\n [ 1887.208851] __sys_bpf+0x4ba/0x600\n [ 1887.209292] __x64_sys_bpf+0x41/0x50\n [ 1887.209762] do_syscall_64+0x4c/0xf0\n [ 1887.210222] entry_SYSCALL_64_after_hwframe+0x63/0x6b\n [ 1887.210868]\n [ 1887.211074] Freed by task 36:\n [ 1887.211460] kasan_set_track+0x3f/0x60\n [ 1887.211951] kasan_save_free_info+0x28/0x40\n [ 1887.212485] ____kasan_slab_free+0x101/0x180\n [ 1887.213027] __kmem_cache_free+0xe4/0x210\n [ 1887.213514] btf_free+0x5b/0x130\n [ 1887.213918] rcu_core+0x638/0xcc0\n [ 1887.214347] __do_softirq+0x114/0x37e\n\nThe error happens at bpf_rb_root_free+0x1f8/0x2b0:\n\n 00000000000034c0 <bpf_rb_root_free>:\n ; {\n 34c0: f3 0f 1e fa endbr64\n 34c4: e8 00 00 00 00 callq 0x34c9 <bpf_rb_root_free+0x9>\n 34c9: 55 pushq %rbp\n 34ca: 48 89 e5 movq %rsp, %rbp\n ...\n ; if (rec && rec->refcount_off >= 0 &&\n 36aa: 4d 85 ed testq %r13, %r13\n 36ad: 74 a9 je 0x3658 <bpf_rb_root_free+0x198>\n 36af: 49 8d 7d 10 leaq 0x10(%r13), %rdi\n 36b3: e8 00 00 00 00 callq 0x36b8 <bpf_rb_root_free+0x1f8>\n <==== kasan function\n 36b8: 45 8b 7d 10 movl 0x10(%r13), %r15d\n <==== use-after-free load\n 36bc: 45 85 ff testl %r15d, %r15d\n 36bf: 78 8c js 0x364d <bpf_rb_root_free+0x18d>\n\nSo the problem \n---truncated---"
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: corrige una condici\u00f3n de ejecuci\u00f3n entre btf_put() y map_free() Al ejecutar `./test_progs -j` en mi m\u00e1quina virtual local con el \u00faltimo kernel, una vez encontr\u00e9 un error kasan como a continuaci\u00f3n: [ 1887.184724] ERROR: KASAN: slab-use-after-free en bpf_rb_root_free+0x1f8/0x2b0 [ 1887.185599] Lectura del tama\u00f1o 4 en la direcci\u00f3n ffff888106806910 por tarea kworker/u12:2/2830 [ 1887.186498] [ 1887.186712] CPU: 3 PID: 2830 Comm: kworker/u12:2 Contaminado: G OEL 6.7.0-rc3-00699-g90679706d486-dirty #494 [1887.188034] Nombre de hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0 -0-g155821a1990b-prebuilt.qemu.org 01/04/2014 [1887.189618] Cola de trabajo: events_unbound bpf_map_free_deferred [1887.190341] Seguimiento de llamadas: [1887.190666] [1887.190949] dump_stack_lv l+0xac/0xe0 [ 1887.191423] ? nf_tcp_handle_invalid+0x1b0/0x1b0 [1887.192019]? p\u00e1nico+0x3c0/0x3c0 [ 1887.192449] print_report+0x14f/0x720 [ 1887.192930] ? preempt_count_sub+0x1c/0xd0 [1887.193459]? __virt_addr_valid+0xac/0x120 [1887.194004]? bpf_rb_root_free+0x1f8/0x2b0 [ 1887.194572] kasan_report+0xc3/0x100 [ 1887.195085] ? bpf_rb_root_free+0x1f8/0x2b0 [ 1887.195668] bpf_rb_root_free+0x1f8/0x2b0 [ 1887.196183] ? __bpf_obj_drop_impl+0xb0/0xb0 [1887.196736]? preempt_count_sub+0x1c/0xd0 [1887.197270]? preempt_count_sub+0x1c/0xd0 [1887.197802]? _raw_spin_unlock+0x1f/0x40 [ 1887.198319] bpf_obj_free_fields+0x1d4/0x260 [ 1887.198883] array_map_free+0x1a3/0x260 [ 1887.199380] bpf_map_free_deferred+0x7b/0xe0 [ 18 87.199943] Process_scheduled_works+0x3a2/0x6c0 [1887.200549] trabajador_thread+0x633/0x890 [1887.201047]? __kthread_parkme+0xd7/0xf0 [ 1887.201574] ? kthread+0x102/0x1d0 [ 1887.202020] kthread+0x1ab/0x1d0 [ 1887.202447] ? pr_cont_work+0x270/0x270 [1887.202954]? kthread_blkcg+0x50/0x50 [ 1887.203444] ret_from_fork+0x34/0x50 [ 1887.203914] ? kthread_blkcg+0x50/0x50 [ 1887.204397] ret_from_fork_asm+0x11/0x20 [ 1887.204913] [ 1887.204913] [ 1887.205209] [ 1887.205416] Asignado por tarea 2197: [1887.205881] kasan_set_track+0x3f/0x60 [1887.206366] __kasan_kmalloc +0x6e/0x80 [ 1887.206856] __kmalloc+0xac/0x1a0 [ 1887.207293] btf_parse_fields+0xa15/0x1480 [ 1887.207836] btf_parse_struct_metas+0x566/0x670 [ 1887.208387 ] btf_new_fd+0x294/0x4d0 [ 1887.208851] __sys_bpf+0x4ba/0x600 [ 1887.209292] __x64_sys_bpf+0x41 /0x50 [ 1887.209762] do_syscall_64+0x4c/0xf0 [ 1887.210222] Entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1887.210868] [ 1887.211074] Liberado por la tarea 36: [ 1887.21146 0] kasan_set_track+0x3f/0x60 [ 1887.211951] kasan_save_free_info+0x28/0x40 [ 1887.212485] ____kasan_slab_free+ 0x101/0x180 [ 1887.213027] __kmem_cache_free+0xe4/0x210 [ 1887.213514] btf_free+0x5b/0x130 [ 1887.213918] rcu_core+0x638/0xcc0 [ 1887.214347] __do_ softirq+0x114/0x37e El error ocurre en bpf_rb_root_free+0x1f8/0x2b0: 00000000000034c0 : ; { 34c0: f3 0f 1e fa endbr64 34c4: e8 00 00 00 00 callq 0x34c9 34c9: 55 pushq %rbp 34ca: 48 89 e5 movq %rsp, %rbp ... ; if (rec &amp;&amp; rec-&gt;refcount_off &gt;= 0 &amp;&amp; 36aa: 4d 85 ed testq %r13, %r13 36ad: 74 a9 je 0x3658 36af: 49 8d 7d 10 leaq 0x10(%r13), %rdi 36b3 : e8 00 00 00 00 callq 0x36b8 &lt;==== funci\u00f3n kasan 36b8: 45 8b 7d 10 movl 0x10(%r13), %r15d &lt;==== carga de uso despu\u00e9s de liberaci\u00f3n 36bc: 45 85 ff testl %r15d, %r15d 36bf: 78 8c js 0x364d Entonces el problema ---truncado---"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/59e5791f59dd83e8aa72a4e74217eabb6e8cfd90",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d048dced8ea5eac6723ae873a40567e6f101ea42",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f9ff6ef1c73cd9e1a6bb1ab3e57c5d141a536306",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,31 +2,115 @@
"id": "CVE-2023-52447",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-22T17:15:08.580",
"lastModified": "2024-02-22T19:07:27.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-14T19:46:43.030",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer the free of inner map when necessary\n\nWhen updating or deleting an inner map in map array or map htab, the map\nmay still be accessed by non-sleepable program or sleepable program.\nHowever bpf_map_fd_put_ptr() decreases the ref-counter of the inner map\ndirectly through bpf_map_put(), if the ref-counter is the last one\n(which is true for most cases), the inner map will be freed by\nops->map_free() in a kworker. But for now, most .map_free() callbacks\ndon't use synchronize_rcu() or its variants to wait for the elapse of a\nRCU grace period, so after the invocation of ops->map_free completes,\nthe bpf program which is accessing the inner map may incur\nuse-after-free problem.\n\nFix the free of inner map by invoking bpf_map_free_deferred() after both\none RCU grace period and one tasks trace RCU grace period if the inner\nmap has been removed from the outer map before. The deferment is\naccomplished by using call_rcu() or call_rcu_tasks_trace() when\nreleasing the last ref-counter of bpf map. The newly-added rcu_head\nfield in bpf_map shares the same storage space with work field to\nreduce the size of bpf_map."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: posponer la liberaci\u00f3n del mapa interno cuando sea necesario Al actualizar o eliminar un mapa interno en la matriz de mapas o en el htab de mapas, a\u00fan se puede acceder al mapa mediante un programa que no se puede dormir o un programa que se puede dormir. . Sin embargo, bpf_map_fd_put_ptr() disminuye el contador de referencias del mapa interno directamente a trav\u00e9s de bpf_map_put(), si el contador de referencias es el \u00faltimo (lo cual es cierto en la mayor\u00eda de los casos), el mapa interno ser\u00e1 liberado por ops-&gt;map_free() en un kworker. Pero por ahora, la mayor\u00eda de las devoluciones de llamada .map_free() no usan sincronizar_rcu() o sus variantes para esperar a que transcurra el per\u00edodo de gracia de RCU, por lo que despu\u00e9s de que se completa la invocaci\u00f3n de ops-&gt;map_free, el programa bpf que accede al interior El mapa puede sufrir un problema de uso despu\u00e9s de su liberaci\u00f3n. Corrija la liberaci\u00f3n del mapa interno invocando bpf_map_free_deferred() despu\u00e9s de un per\u00edodo de gracia de RCU y un per\u00edodo de gracia de seguimiento de tareas de RCU si el mapa interno se elimin\u00f3 del mapa externo antes. El aplazamiento se logra utilizando call_rcu() o call_rcu_tasks_trace() al liberar el \u00faltimo contador de referencia del mapa bpf. El campo rcu_head reci\u00e9n agregado en bpf_map comparte el mismo espacio de almacenamiento con el campo de trabajo para reducir el tama\u00f1o de bpf_map."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.9.0",
"versionEndExcluding": "6.1.75",
"matchCriteriaId": "F138E9B6-24E6-403F-97D9-025AE266325F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/62fca83303d608ad4fec3f7428c8685680bb01b0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/876673364161da50eed6b472d746ef88242b2368",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bfd9b20c4862f41d4590fde11d70a5eeae53dcc5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f91cd728b10c51f6d4a39957ccd56d1e802fc8ee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-22346",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-14T19:15:49.333",
"lastModified": "2024-03-14T20:11:36.180",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Db2 for IBM i 7.2, 7.3, 7.4, and 7.5 infrastructure could allow a local user to gain elevated privileges due to an unqualified library call. A malicious actor could cause user-controlled code to run with administrator privilege. IBM X-Force ID: 280203."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280203",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7140499",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23266",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:49.130",
"lastModified": "2024-03-13T23:15:46.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-03-14T19:54:56.477",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,31 +14,117 @@
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.7.4",
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.5",
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.4",
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT214083",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214085",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23267",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:49.177",
"lastModified": "2024-03-13T23:15:47.040",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-03-14T19:05:20.860",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,31 +14,117 @@
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Es posible que una aplicaci\u00f3n pueda omitir ciertas preferencias de privacidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.7.4",
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.5",
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.4",
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT214083",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214085",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23268",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:49.223",
"lastModified": "2024-03-13T23:15:47.090",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-03-14T19:05:36.077",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,31 +14,117 @@
"value": "Se solucion\u00f3 un problema de inyecci\u00f3n con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Es posible que una aplicaci\u00f3n pueda elevar los privilegios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.7.4",
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.5",
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.4",
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT214083",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214085",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23270",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:49.320",
"lastModified": "2024-03-13T23:15:47.197",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-03-14T19:06:02.210",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,43 +14,156 @@
"value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Monterey 12.7.4, macOS Ventura 13.6.5, macOS Sonoma 14.4, iOS 17.4 y iPadOS 17.4, tvOS 17.4. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "CE5413B9-A1A8-499F-B047-163908202E69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.7.4",
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.5",
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.4",
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT214081",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214083",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214085",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214086",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23272",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:49.360",
"lastModified": "2024-03-13T23:15:47.253",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-03-14T19:54:08.100",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,31 +14,117 @@
"value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Un usuario puede obtener acceso a partes protegidas del sistema de archivos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.7.4",
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.5",
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.4",
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT214083",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214085",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23273",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:49.410",
"lastModified": "2024-03-13T21:15:57.747",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-03-14T19:54:26.287",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,27 +14,114 @@
"value": "Esta cuesti\u00f3n se abord\u00f3 mediante una mejor gesti\u00f3n de estado. Este problema se solucion\u00f3 en Safari 17.4, iOS 17.4 y iPadOS 17.4, macOS Sonoma 14.4. Se puede acceder a las pesta\u00f1as de navegaci\u00f3n privada sin autenticaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "DC7753BA-5DF8-4F98-8DA8-69DA473F8307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "CE5413B9-A1A8-499F-B047-163908202E69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.4",
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/20",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT214081",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214089",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23274",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:49.467",
"lastModified": "2024-03-13T23:15:47.310",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-03-14T19:54:38.937",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,31 +14,117 @@
"value": "Se solucion\u00f3 un problema de inyecci\u00f3n con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Es posible que una aplicaci\u00f3n pueda elevar los privilegios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.7.4",
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.5",
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.4",
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT214083",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214085",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23275",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:49.510",
"lastModified": "2024-03-13T23:15:47.363",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-03-14T20:34:02.077",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,31 +14,117 @@
"value": "Se abord\u00f3 una condici\u00f3n de ejecuci\u00f3n con validaci\u00f3n adicional. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Es posible que una aplicaci\u00f3n pueda acceder a datos de usuario protegidos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.7.4",
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.5",
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.4",
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT214083",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214085",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23276",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:49.557",
"lastModified": "2024-03-13T23:15:47.420",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-03-14T20:34:18.527",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,31 +14,117 @@
"value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Es posible que una aplicaci\u00f3n pueda elevar los privilegios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.7.4",
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.5",
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.4",
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT214083",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214085",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23277",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:49.600",
"lastModified": "2024-03-13T21:15:57.963",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-03-14T20:34:31.303",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,19 +14,96 @@
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.4, iOS 17.4 y iPadOS 17.4. Un atacante en una posici\u00f3n privilegiada en la red puede inyectar pulsaciones de teclas falsificando un teclado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionStartExcluding": "17.0",
"versionEndExcluding": "17.4",
"matchCriteriaId": "D7861A7B-8A4A-4FB2-9CBE-8B3CDBC9FFCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.4",
"matchCriteriaId": "C2FE8515-300C-4B6F-92A0-7D1E6D93F907"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.4",
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://support.apple.com/en-us/HT214081",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-23823",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-14T19:15:49.560",
"lastModified": "2024-03-14T20:11:36.180",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "vantage6 is an open source framework built to enable, manage and deploy privacy enhancing technologies like Federated Learning and Multi-Party Computation. The vantage6 server has no restrictions on CORS settings. It should be possible for people to set the allowed origins of the server. The impact is limited because v6 does not use session cookies. This issue has been addressed in commit `70bb4e1d8` and is expected to ship in subsequent releases. Users are advised to upgrade as soon as a new release is available. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
},
{
"lang": "en",
"value": "CWE-942"
}
]
}
],
"references": [
{
"url": "https://github.com/vantage6/vantage6/commit/70bb4e1d889230a841eb364d6c03accd7dd01a41",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-4946-85pr-fvxh",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-24562",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-14T19:15:49.767",
"lastModified": "2024-03-14T20:11:36.180",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "vantage6-UI is the official user interface for the vantage6 server. In affected versions a number of security headers are not set. This issue has been addressed in commit `68dfa6614` which is expected to be included in future releases. Users are advised to upgrade when a new release is made. While an upgrade path is not available users may modify the docker image build to insert the headers into nginx.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-668"
},
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"references": [
{
"url": "https://github.com/vantage6/vantage6-UI/commit/68dfa661415182da0e5717bd58db3d00aedcbd2e",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vantage6/vantage6-UI/security/advisories/GHSA-gwq3-pvwq-4c9w",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-24770",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-14T19:15:49.973",
"lastModified": "2024-03-14T20:11:36.180",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "vantage6 is an open source framework built to enable, manage and deploy privacy enhancing technologies like Federated Learning and Multi-Party Computation. Much like GHSA-45gq-q4xh-cp53, it is possible to find which usernames exist in vantage6 by calling the API routes `/recover/lost` and `/2fa/lost`. These routes send emails to users if they have lost their password or MFA token. This issue has been addressed in commit `aecfd6d0e` and is expected to ship in subsequent releases. Users are advised to upgrade as soon as a new release is available. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-208"
},
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"references": [
{
"url": "https://github.com/vantage6/vantage6/commit/aecfd6d0e83165a41a60ebd52d2287b0217be26b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-45gq-q4xh-cp53",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-5h3x-6gwf-73jm",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26585",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-21T15:15:09.467",
"lastModified": "2024-03-11T18:15:18.553",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-14T20:18:37.957",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,19 +14,89 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: tls: corrige la ejecuci\u00f3n entre la programaci\u00f3n de trabajo de transmisi\u00f3n y el cierre del socket De manera similar a el commit anterior, el hilo de env\u00edo (recvmsg/sendmsg) puede cerrarse tan pronto como el controlador de cifrado as\u00edncrono llame a complete(). Reordene la programaci\u00f3n del trabajo antes de llamar a complete(). En primer lugar, esto parece m\u00e1s l\u00f3gico, ya que es el orden inverso de lo que har\u00e1 el hilo de env\u00edo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20.0",
"versionEndExcluding": "6.6.18",
"matchCriteriaId": "4EC1F1D5-8364-4C12-AB58-595F84A06381"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.6",
"matchCriteriaId": "0C8D1FAD-4D5D-4A25-B058-2AD15082710E"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/6db22d6c7a6dc914b12c0469b94eb639b6a8a146",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e327ed60bff4a991cd7a709c47c4f0c5b4a4fd57",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-27265",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-14T19:15:50.200",
"lastModified": "2024-03-14T20:11:36.180",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Integration Bus for z/OS 10.1 through 10.1.0.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 284564."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284564",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7140678",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-27266",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-14T19:15:50.420",
"lastModified": "2024-03-14T20:11:36.180",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Maximo Application Suite 7.6.1.3 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 284566."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284566",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7141270",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-27301",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-14T19:15:50.680",
"lastModified": "2024-03-14T20:11:36.180",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Support App is an opensource application specialized in managing Apple devices. It's possible to abuse a vulnerability inside the postinstall installer script to make the installer execute arbitrary code as root. The cause of the vulnerability is the fact that the shebang `#!/bin/zsh` is being used. When the installer is executed it asks for the users password to be executed as root. However, it'll still be using the $HOME of the user and therefore loading the file `$HOME/.zshenv` when the `postinstall` script is executed.\nAn attacker could add malicious code to `$HOME/.zshenv` and it will be executed when the app is installed. An attacker may leverage this vulnerability to escalate privilege on the system. This issue has been addressed in version 2.5.1 Rev 2. All users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://github.com/root3nl/SupportApp/commit/e866b2aa4028f6a982977f462c0f7550d952c5d0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/root3nl/SupportApp/security/advisories/GHSA-jr78-247f-rhqc",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28181",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-14T18:15:07.107",
"lastModified": "2024-03-14T18:15:07.107",
"vulnStatus": "Received",
"lastModified": "2024-03-14T20:11:36.180",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-28423",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T19:15:50.877",
"lastModified": "2024-03-14T20:11:36.180",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Airflow-Diagrams v2.1.0 was discovered to contain an arbitrary file upload vulnerability in the unsafe_load function at cli.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted YML file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/bayuncao/vul-cve-15",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-28424",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T19:15:50.930",
"lastModified": "2024-03-14T20:11:36.180",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "zenml v0.55.4 was discovered to contain an arbitrary file upload vulnerability in the load function at /materializers/cloudpickle_materializer.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/bayuncao/vul-cve-18",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-28425",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T19:15:50.980",
"lastModified": "2024-03-14T20:11:36.180",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "greykite v1.0.0 was discovered to contain an arbitrary file upload vulnerability in the load_obj function at /templates/pickle_utils.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/bayuncao/vul-cve-17",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-14T19:00:38.502669+00:00
2024-03-14T21:00:38.303657+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-14T18:15:07.107000+00:00
2024-03-14T20:34:31.303000+00:00
```
### Last Data Feed Release
@ -29,35 +29,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
241515
241526
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `11`
* [CVE-2023-22655](CVE-2023/CVE-2023-226xx/CVE-2023-22655.json) (`2024-03-14T17:15:49.930`)
* [CVE-2023-27502](CVE-2023/CVE-2023-275xx/CVE-2023-27502.json) (`2024-03-14T17:15:50.147`)
* [CVE-2023-28389](CVE-2023/CVE-2023-283xx/CVE-2023-28389.json) (`2024-03-14T17:15:50.333`)
* [CVE-2023-28746](CVE-2023/CVE-2023-287xx/CVE-2023-28746.json) (`2024-03-14T17:15:50.533`)
* [CVE-2023-32282](CVE-2023/CVE-2023-322xx/CVE-2023-32282.json) (`2024-03-14T17:15:50.740`)
* [CVE-2023-32633](CVE-2023/CVE-2023-326xx/CVE-2023-32633.json) (`2024-03-14T17:15:50.917`)
* [CVE-2023-32666](CVE-2023/CVE-2023-326xx/CVE-2023-32666.json) (`2024-03-14T17:15:51.140`)
* [CVE-2023-35191](CVE-2023/CVE-2023-351xx/CVE-2023-35191.json) (`2024-03-14T17:15:51.333`)
* [CVE-2023-38575](CVE-2023/CVE-2023-385xx/CVE-2023-38575.json) (`2024-03-14T17:15:51.527`)
* [CVE-2023-39368](CVE-2023/CVE-2023-393xx/CVE-2023-39368.json) (`2024-03-14T17:15:51.713`)
* [CVE-2023-43490](CVE-2023/CVE-2023-434xx/CVE-2023-43490.json) (`2024-03-14T17:15:51.910`)
* [CVE-2024-1998](CVE-2024/CVE-2024-19xx/CVE-2024-1998.json) (`2024-03-14T18:15:07.003`)
* [CVE-2024-28181](CVE-2024/CVE-2024-281xx/CVE-2024-28181.json) (`2024-03-14T18:15:07.107`)
* [CVE-2024-28849](CVE-2024/CVE-2024-288xx/CVE-2024-28849.json) (`2024-03-14T17:15:52.097`)
* [CVE-2023-42938](CVE-2023/CVE-2023-429xx/CVE-2023-42938.json) (`2024-03-14T19:15:49.270`)
* [CVE-2024-22346](CVE-2024/CVE-2024-223xx/CVE-2024-22346.json) (`2024-03-14T19:15:49.333`)
* [CVE-2024-23823](CVE-2024/CVE-2024-238xx/CVE-2024-23823.json) (`2024-03-14T19:15:49.560`)
* [CVE-2024-24562](CVE-2024/CVE-2024-245xx/CVE-2024-24562.json) (`2024-03-14T19:15:49.767`)
* [CVE-2024-24770](CVE-2024/CVE-2024-247xx/CVE-2024-24770.json) (`2024-03-14T19:15:49.973`)
* [CVE-2024-27265](CVE-2024/CVE-2024-272xx/CVE-2024-27265.json) (`2024-03-14T19:15:50.200`)
* [CVE-2024-27266](CVE-2024/CVE-2024-272xx/CVE-2024-27266.json) (`2024-03-14T19:15:50.420`)
* [CVE-2024-27301](CVE-2024/CVE-2024-273xx/CVE-2024-27301.json) (`2024-03-14T19:15:50.680`)
* [CVE-2024-28423](CVE-2024/CVE-2024-284xx/CVE-2024-28423.json) (`2024-03-14T19:15:50.877`)
* [CVE-2024-28424](CVE-2024/CVE-2024-284xx/CVE-2024-28424.json) (`2024-03-14T19:15:50.930`)
* [CVE-2024-28425](CVE-2024/CVE-2024-284xx/CVE-2024-28425.json) (`2024-03-14T19:15:50.980`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `34`
* [CVE-2023-50168](CVE-2023/CVE-2023-501xx/CVE-2023-50168.json) (`2024-03-14T18:11:35.910`)
* [CVE-2024-25139](CVE-2024/CVE-2024-251xx/CVE-2024-25139.json) (`2024-03-14T18:11:35.910`)
* [CVE-2017-16529](CVE-2017/CVE-2017-165xx/CVE-2017-16529.json) (`2024-03-14T19:58:06.937`)
* [CVE-2017-16530](CVE-2017/CVE-2017-165xx/CVE-2017-16530.json) (`2024-03-14T19:57:49.287`)
* [CVE-2017-16532](CVE-2017/CVE-2017-165xx/CVE-2017-16532.json) (`2024-03-14T19:57:34.803`)
* [CVE-2022-1386](CVE-2022/CVE-2022-13xx/CVE-2022-1386.json) (`2024-03-14T19:58:30.707`)
* [CVE-2022-44117](CVE-2022/CVE-2022-441xx/CVE-2022-44117.json) (`2024-03-14T19:15:49.147`)
* [CVE-2023-48985](CVE-2023/CVE-2023-489xx/CVE-2023-48985.json) (`2024-03-14T19:02:42.210`)
* [CVE-2023-48986](CVE-2023/CVE-2023-489xx/CVE-2023-48986.json) (`2024-03-14T19:02:47.760`)
* [CVE-2023-48987](CVE-2023/CVE-2023-489xx/CVE-2023-48987.json) (`2024-03-14T19:03:10.113`)
* [CVE-2023-52443](CVE-2023/CVE-2023-524xx/CVE-2023-52443.json) (`2024-03-14T20:16:02.947`)
* [CVE-2023-52444](CVE-2023/CVE-2023-524xx/CVE-2023-52444.json) (`2024-03-14T20:13:28.070`)
* [CVE-2023-52445](CVE-2023/CVE-2023-524xx/CVE-2023-52445.json) (`2024-03-14T20:13:50.727`)
* [CVE-2023-52446](CVE-2023/CVE-2023-524xx/CVE-2023-52446.json) (`2024-03-14T19:47:14.733`)
* [CVE-2023-52447](CVE-2023/CVE-2023-524xx/CVE-2023-52447.json) (`2024-03-14T19:46:43.030`)
* [CVE-2024-23266](CVE-2024/CVE-2024-232xx/CVE-2024-23266.json) (`2024-03-14T19:54:56.477`)
* [CVE-2024-23267](CVE-2024/CVE-2024-232xx/CVE-2024-23267.json) (`2024-03-14T19:05:20.860`)
* [CVE-2024-23268](CVE-2024/CVE-2024-232xx/CVE-2024-23268.json) (`2024-03-14T19:05:36.077`)
* [CVE-2024-23270](CVE-2024/CVE-2024-232xx/CVE-2024-23270.json) (`2024-03-14T19:06:02.210`)
* [CVE-2024-23272](CVE-2024/CVE-2024-232xx/CVE-2024-23272.json) (`2024-03-14T19:54:08.100`)
* [CVE-2024-23273](CVE-2024/CVE-2024-232xx/CVE-2024-23273.json) (`2024-03-14T19:54:26.287`)
* [CVE-2024-23274](CVE-2024/CVE-2024-232xx/CVE-2024-23274.json) (`2024-03-14T19:54:38.937`)
* [CVE-2024-23275](CVE-2024/CVE-2024-232xx/CVE-2024-23275.json) (`2024-03-14T20:34:02.077`)
* [CVE-2024-23276](CVE-2024/CVE-2024-232xx/CVE-2024-23276.json) (`2024-03-14T20:34:18.527`)
* [CVE-2024-23277](CVE-2024/CVE-2024-232xx/CVE-2024-23277.json) (`2024-03-14T20:34:31.303`)
* [CVE-2024-26585](CVE-2024/CVE-2024-265xx/CVE-2024-26585.json) (`2024-03-14T20:18:37.957`)
* [CVE-2024-28181](CVE-2024/CVE-2024-281xx/CVE-2024-28181.json) (`2024-03-14T20:11:36.180`)
## Download and Usage

View File

@ -53778,7 +53778,7 @@ CVE-2012-2139,0,0,984c4b7ae0775adb31a02640a89e585f935ababe476d14773d6883dc49bf0a
CVE-2012-2140,0,0,2601668e1527e957894c8bfe9543a12ded146c76969dc9d9beafff73e2f8534c,2012-10-30T04:03:55.957000
CVE-2012-2141,0,0,dc81a2a29f0f4100f436fac3db5d5f4d8d39e66584c79e4d052bc7734c7ab9fb,2017-08-29T01:31:31.320000
CVE-2012-2142,0,0,f8a1101daf60d26197dcb2716c276c5485d5b981f95c821f3062c253b713984f,2020-01-15T18:30:49.553000
CVE-2012-2143,0,0,2ef0b5018700a8b0c5fc9d75acb558f5f821d5612f17c832455d146b86eb0b90,2023-11-07T02:10:24.710000
CVE-2012-2143,0,1,5814b1dd3a2d42b6a88c77b6692f838f1affce05c409407d363ea6453162a0a0,2024-03-14T19:59:00.810000
CVE-2012-2144,0,0,beed0b8d7dcf2c388c3f4b772340fe400bbb31961a586112669f5edda8d42d62,2017-08-29T01:31:31.383000
CVE-2012-2145,0,0,59177855dca47d5a77c50f32cbfd58ac06b41aa8c49d025e5d52bbb66b7a4ab4,2017-08-29T01:31:31.553000
CVE-2012-2146,0,0,5414b071ba62ce0b60733f75698fbfad77b5825d9161c3d19e4d9c4284244ad0,2012-08-27T04:00:00
@ -67384,7 +67384,7 @@ CVE-2014-3181,0,0,aa3e985adec606598f7b1cc70998ebb9f21e7854fed983898ec66ed85a3582
CVE-2014-3182,0,0,1065355378850f0fa4e362c4d6dbdb97ef49237278915fe485f8a8425995ffa6,2023-12-29T15:41:33.040000
CVE-2014-3183,0,0,c53b674df49ab478f14a0c2468570db5a142e871bc11b3809959aa51a0592a01,2023-12-29T15:42:53.263000
CVE-2014-3184,0,0,ffa96254e9f6d46615af3b070fb42b23ed98d088f98ae710abfc16b99aacd19d,2023-11-07T02:19:57.193000
CVE-2014-3185,0,0,7c1829148495d8e58a9357f349d09ad835c1cc3064293c3ff6f8e24ebb36759c,2024-02-15T15:58:06.067000
CVE-2014-3185,0,1,23ae04239913b1938fba67792202f3bdb3295fcd6170e1e73c6805c3c2acd062,2024-03-14T19:58:39.097000
CVE-2014-3186,0,0,7fcf2995a50dd6aeec56ec416821e98cf4d614818f5582242b5be5c09ad187d4,2023-11-07T02:19:57.983000
CVE-2014-3187,0,0,7d76e0a56412c019feea780c3cd87bfe77c21eab45a3e514f795f12f26fbad86,2023-11-07T02:19:58.363000
CVE-2014-3188,0,0,c5fa7bbbabd9906f4431c03ba21f780272afdab5805d2650eb3aa936484cab8c,2023-11-07T02:19:58.767000
@ -73033,7 +73033,7 @@ CVE-2014-9525,0,0,b805d7cdd5fa0487e91d2a2b9a1124a91c3aeba0c63b863d4c911066c6f611
CVE-2014-9526,0,0,435b57edb4972dc90bc966bf8a5bf736ca410523a6562101ca64edff1186087d,2021-07-15T20:42:44.600000
CVE-2014-9527,0,0,8bbf1fa538acbae77c65bd80dac8ef2b9d35bf1088a428f7f1e899b9e23abdd4,2017-02-11T02:59:00.433000
CVE-2014-9528,0,0,1a2572e28e529288c8356a7c5cb5fbc713f6c9f36c1eeb0aefe1cea521591c58,2017-09-08T01:29:35.887000
CVE-2014-9529,0,0,e948acdd842725ffa4fc4587d856f98bc5711b7daaddf4d2ce09f6f9ea3c9ffc,2023-11-07T02:23:06.510000
CVE-2014-9529,0,1,e73b8c73136a150a4cff2bd3bb7e0cb049bbbfafba3261d027208ffc2beff026,2024-03-14T19:58:34.480000
CVE-2014-9530,0,0,c6cba533aeb03c353ee3e1f34d0439055e49c87af9993b4102ff6de13a70dbbe,2020-02-10T15:12:13.393000
CVE-2014-9556,0,0,3e81b637bf4fd278022750c8e13c65da1a98420d830168eae6302f1b05243abd,2018-10-30T16:27:35.843000
CVE-2014-9557,0,0,7c2c09c7267e2717e325be0d8b26074c252400fb8c4cc905b6956e11c2156529,2020-10-02T14:56:02.080000
@ -76081,7 +76081,7 @@ CVE-2015-2662,0,0,fb7494814e746cb389a18cff8011311fa7f3fdca89946200e7802a0415cad4
CVE-2015-2663,0,0,08bb778014c3bff373c7ffaaba33ee8ae5842e53b3c637ad1090df0487a9795f,2016-12-28T02:59:07.760000
CVE-2015-2664,0,0,7cfc84b0c90e27714ade565e96f6a5b7f550a00cc2d941da8d723b886781783f,2022-05-13T14:38:25.750000
CVE-2015-2665,0,0,b3a1f911d90f55463a2e9ab38cb150ab8c63bf470b997b99a24b93fc973f365d,2017-11-04T01:29:03.803000
CVE-2015-2666,0,0,73425351de28000346779f7adb93b6c6a5795654b728d4a4904065b8b3568cae,2023-11-07T02:25:24.123000
CVE-2015-2666,0,1,40ee1ff2b754565647f9e21b25cf98140ca09dca9f9824e19af886acc5356391,2024-03-14T19:59:23.823000
CVE-2015-2667,0,0,a19b9a8fdec094ac9d4367b481edaff5195c43f7ea41f8bd35cfda12b69ade1f,2016-12-03T03:05:35.877000
CVE-2015-2668,0,0,30c183136d9d073618248b860ea36dffff45c62bde6f18d6bad442f969a57cf8,2017-01-03T02:59:53.693000
CVE-2015-2670,0,0,f594eae4d851ee6a69c7b146ceec356a32e042b1867024680a3f582c4aa32c9a,2023-11-07T02:25:24.210000
@ -78117,7 +78117,7 @@ CVE-2015-5153,0,0,0baebbe4098bd372dbffa5b48b3144632fdc40947c30f94e993ae6d4c3f2c2
CVE-2015-5154,0,0,8b36dec783cce421f9dc0825541ba60ffc39b839aa33c080f0f79e04dc076944,2023-02-13T00:50:03.297000
CVE-2015-5155,0,0,8b58c6ea00c2dfd3160e24e0848f50e25245e53a901c884382815a9c80bd67da,2023-11-07T02:26:02.437000
CVE-2015-5156,0,0,593800a6b86edc6bba4a8464098c2b19cd63e936d00c2671dfcc5d23c3bfe16a,2023-02-12T23:15:33.560000
CVE-2015-5157,0,0,c27ac808faeb962d4861a3fe186386b165a9f2c3089dbc8d260cdb84fffe03b8,2024-02-15T18:55:32.183000
CVE-2015-5157,0,1,6b070489ddca8da31523b6124e860ea808626f50604403553c906e969f9a2fc5,2024-03-14T19:58:51.427000
CVE-2015-5158,0,0,d7f67534383c53b250bf278ee0a6febdb78972554338d2b31a19c9cc569a04ee,2020-09-08T13:54:32.183000
CVE-2015-5159,0,0,92467559f1dcf0d7719103578db41b1b6b29f8c706a7c6f0cd0c964bbe606470,2018-12-07T21:25:23.667000
CVE-2015-5160,0,0,cd2a895e9b033861eb1249daf5d62f485366a8ba44a323d0eb8a5a6146db8c94,2020-10-15T13:28:10.487000
@ -85503,7 +85503,7 @@ CVE-2016-2139,0,0,69f1139f7ab0c3863d8413d0ffe94abb6433bbd4ac1e4e47344c5e22efe6dc
CVE-2016-2140,0,0,d9d369535c8f9d8388075f73707385baf9261f68d71db52b49a0455dd7d08123,2023-02-13T04:50:04.637000
CVE-2016-2141,0,0,0832c5fe3c85822ef6448abc6958a68ebca691d6c8426b471fc22ac68caee373,2023-11-07T02:30:59.747000
CVE-2016-2142,0,0,27c8be83ab38d73c93371a22038eecb01023f2d993bc3bfae293379dfeb3f7f3,2023-02-13T04:50:04.830000
CVE-2016-2143,0,0,5b22fb96690c7b1f5e584f692d80f3225439038fbd4dbaffaf7c32ac456cb957,2023-02-12T23:17:31.203000
CVE-2016-2143,0,1,0f5085db5f5d2ca11da53d0177fa962251a1c86e2f92690cb32e4134dcac727c,2024-03-14T19:59:19.913000
CVE-2016-2144,0,0,d66ee59b908303906fa193e77e7a0b06aa3489055b433a35365698c8e666b221,2023-11-07T02:30:59.907000
CVE-2016-2145,0,0,43bfca453101eac0310e5f1682c3945b12a0fd9e6083d1e2ba273468c787fb68,2016-04-25T13:54:12.710000
CVE-2016-2146,0,0,05716eb30fe61a470722509690d5ae279cd2429350021124c321eedc99f2642a,2016-04-25T13:58:22.127000
@ -94628,7 +94628,7 @@ CVE-2017-10658,0,0,1eeea7c117ffe697abfea9e4f0d3080fa2bc998e664738f5c170b913636cc
CVE-2017-10659,0,0,81d51e8dd922fd32e2305a8c164c997d5e23ac88a66a6e86ce8db490ef0d016f,2023-11-07T02:38:05.490000
CVE-2017-1066,0,0,c1246725b7092544fba1e0c71c759cc79d9379ac7e40741f19cd6af795e53f82,2023-11-07T02:42:15.790000
CVE-2017-10660,0,0,2bdd4dffb0b1bef2c244fc01599598a269be6daaf9e1141a9bddb3d4338831b8,2023-11-07T02:38:05.727000
CVE-2017-10661,0,0,ef834c2ce81f5d611c904dd5238a5ecd072f6fc21e9c4b6af4590246b8551cd5,2018-10-31T10:29:04.183000
CVE-2017-10661,0,1,6bab819bfe99671d3159b3845ec59baa36a743b841c38ff97a0beef0b8b526de,2024-03-14T19:59:04.977000
CVE-2017-10662,0,0,77ffb25c18063dc98f0734ed01a4ae033ddc61c74c4650e3a4d142d1f20e8a0e,2023-01-17T21:02:22.613000
CVE-2017-10663,0,0,67c18a2216925903cb511894ac8bc9dcfb4bbe2bde003d656270c522b7012046,2023-01-17T21:02:26.967000
CVE-2017-10664,0,0,6fe180f572f0ea909a2a9b9aaa44d4b082b25b5163b37727a491898fdcfda271,2021-08-04T17:15:35.690000
@ -99892,13 +99892,13 @@ CVE-2017-16523,0,0,d95db1c8062a06299f99280af3cfc0d941caf67e7bbd8d958a71733c17af5
CVE-2017-16524,0,0,05be074c96930d592b147770ef67f41a1267ef4cd3c7c99310c76f297a6a0517,2017-11-29T14:57:17.200000
CVE-2017-16525,0,0,bfdaa413f28d8628a6390c54d10b60a9f78ccedd181cafe305f0df15944a5919,2018-03-16T01:29:06.623000
CVE-2017-16526,0,0,1ed30e68b2105b845afa0d05594a8578ecbb2ac127cefdaa40556442627c8c4b,2023-01-19T15:46:23.587000
CVE-2017-16527,0,0,c7653ce417155493158a5dc0edaf0234c5aaaf7d392c8561fcea30ae80256ac1,2018-08-24T10:29:00.850000
CVE-2017-16528,0,0,64f63475c05b22c6340c38e1e1d8797f954789cd6907537612fbd3d8a2c35eab,2018-04-07T01:29:03.030000
CVE-2017-16529,0,0,b19fca12ff996e2b33ebc8c01469b57d3e4cf66f9f31dd76bd2d241abaaa65d7,2018-08-24T10:29:00.927000
CVE-2017-16527,0,1,ad8dee89187e8cd109dadf20839dd92569bc5eae25c0d1346aa0fb2bcfc8e1fd,2024-03-14T19:58:25.543000
CVE-2017-16528,0,1,9b8d28344fd6b4789eea6decc2a08e00ca9da27f4f464aa3e17e848936ee9649,2024-03-14T19:58:15.687000
CVE-2017-16529,0,1,ebfc5c2f5f9fd2e3f933334b5ef8fc7b3e41251c85921ab64dd70b37124e7fa6,2024-03-14T19:58:06.937000
CVE-2017-1653,0,0,5d155a981912d14a9cf2e8ffc2ee7b3380547c370c8aa338ff87ed78a3e50484,2018-02-09T20:06:20.293000
CVE-2017-16530,0,0,0fd552a24a6bca9d76bb37ff6540a254a32c1c9f8eb9114906a439f7568d7434,2017-11-17T13:52:21.493000
CVE-2017-16530,0,1,18ea7c7a08377727218f1528930a59c889e5d224ce124425ce1db0e7444efff3,2024-03-14T19:57:49.287000
CVE-2017-16531,0,0,c9eff74f8a0d36a29aec6f8c7e8bc4b858867550c8cfd5d1db94212f1831b900,2018-08-24T10:29:00.977000
CVE-2017-16532,0,0,7b23df5ddf25d290d3fec68559a8af7fa119c3808fc38f0d1d51bd2cd65b5fc2,2018-08-24T10:29:01.053000
CVE-2017-16532,0,1,3588934afdf6e5d6017233dcca320337dfd8e0ac3db9a714998040fd7f20b1f0,2024-03-14T19:57:34.803000
CVE-2017-16533,0,0,24719bf582848a36a09a381721c241ea0e9e6114790ea4c87c793de5d175fd79,2024-03-12T17:38:46.927000
CVE-2017-16534,0,0,e4c1911bea10629f65a092172e685b38877cdae370d385b51e016402a251a574,2024-02-16T18:54:37.580000
CVE-2017-16535,0,0,09991051c7784e21613f9dd58873c136258599d0da074e1829329a0901f2ea47,2018-08-24T10:29:01.163000
@ -188090,7 +188090,7 @@ CVE-2022-1382,0,0,1149c104bc49f24408a77430f7a353ca7b0345d958816f968666f92001fdf7
CVE-2022-1383,0,0,b224c08df14908179da8b2e09582b6b81d0ff548250975fb4c9be7d33378554c,2022-04-26T16:26:45.990000
CVE-2022-1384,0,0,1415a295f05328ce23ab8b6877f7d947245a3e6b95489baf35e44a214d14000d,2022-04-27T17:36:56.747000
CVE-2022-1385,0,0,880b0db02f470ff675b6a52cc2cc00f84e11d8751914d004cb784de6fe76e08b,2022-04-27T21:19:41.490000
CVE-2022-1386,0,0,041df00f6943065456d12b5a005b948ce611d454314367fc242bdb4034c2215a,2022-05-24T19:00:51.517000
CVE-2022-1386,0,1,c6a67d1cabd4f6eceb7581bd0db197161f2162ac5d4523e2c10ed37125ba6bad,2024-03-14T19:58:30.707000
CVE-2022-1387,0,0,4d05a825be5f5d8b4d4e31c77cfcc24a716fbde55dcae05615ebf6caa1e9ac6c,2022-06-08T17:15:20.900000
CVE-2022-1388,0,0,05b9bd31c8d6f10cc3cfc115213e30cbbd23ef8946f53024de76f81b9740e5da,2023-11-02T01:54:15.380000
CVE-2022-1389,0,0,a5e0b8b79b52bc114930aa8417a1927ddb5ba1940c11df7e912094ee96fe29db,2022-05-16T14:29:24.527000
@ -208376,7 +208376,7 @@ CVE-2022-44097,0,0,090053ac7942d89c7cdfc6491e7eb2590d1a234bd9cf8bc3d2dd87d1e5b4f
CVE-2022-4410,0,0,e6f9e6f0547a27515851728fcdc51f3af687786161efa4759d7a4cf0bd64134b,2023-11-07T03:57:46.890000
CVE-2022-44108,0,0,88d51803a158689cd614622ac87e63622dd46521607d701b38fe84daddb37322,2022-12-27T19:01:58.520000
CVE-2022-44109,0,0,35885c0768ee48303307107532e137695ddc7b016422d5d1d1ef9066c812cf76,2022-12-27T19:00:39.837000
CVE-2022-44117,0,0,9e29ffc32510e158aeec94707435e3dacea5b9df6c04a654f710a28fe83db5c8,2022-11-28T19:34:03.263000
CVE-2022-44117,0,1,2eff71db5d1d9aefbd1131a734e4007085cc4495bf742674fb9058549794029c,2024-03-14T19:15:49.147000
CVE-2022-44118,0,0,834630b571a7729c42c24c36323d745bada75fd074f1ea71dff397b22ed3a5e0,2022-11-28T19:44:34.507000
CVE-2022-44120,0,0,5dd936fbd3dc1647ab07d4dd0f11263a52430799ff1d6c40ee6f316d7d63e286,2022-11-28T19:38:56.377000
CVE-2022-4413,0,0,1c9971a43499bd143ac88f379ebbdffb378dc29c0fff80a70e51e7ef83d0729e,2022-12-12T20:00:33.070000
@ -215618,7 +215618,7 @@ CVE-2023-22651,0,0,71c4ad22d720a14f556cbdbb0dfeae4cea5ba5bc7c522362e29fd79de49a8
CVE-2023-22652,0,0,f9dae7477af266a4991ad7fcc2726fab2cccec9452bb34792392a945c73e6b19,2023-09-13T03:15:07.693000
CVE-2023-22653,0,0,a51dcac8d7628283af317fae95110ee2fc893a6c8b2b6ebf1624613b419371fc,2023-08-02T15:34:59.683000
CVE-2023-22654,0,0,5b1a8feee98010e65bed848785e61db9d7b8c5ab9fbbb79f8736b9741ba8db64,2023-05-30T22:22:43.403000
CVE-2023-22655,1,1,51900ded8832eb2324f2d36086f3237daae14112befcbe2bab2ea19a2c2fd734,2024-03-14T18:11:35.910000
CVE-2023-22655,0,0,51900ded8832eb2324f2d36086f3237daae14112befcbe2bab2ea19a2c2fd734,2024-03-14T18:11:35.910000
CVE-2023-22657,0,0,cfce11b504d6ee95538294305b0036182e95fb71bc119a8cd123783becc63ea7,2023-11-07T04:07:12.750000
CVE-2023-22659,0,0,71d1f10cbb6b53df610f190613167a6c75fa7f817c0f72a1094380595ddd5133,2023-07-13T17:17:26.230000
CVE-2023-2266,0,0,21c36958639008dc9b075634492f4955ca2430a255612c0db16c56bae462bdf1,2023-12-06T00:35:24.197000
@ -219279,7 +219279,7 @@ CVE-2023-27499,0,0,ce3ef12308c64982399e023f649a859285e20cb1b38943d05a735c64ab7a3
CVE-2023-2750,0,0,ead2b79aafb115882b74edc1fe401c5df2c2f93772e52be543bfb3417b082d26,2023-05-31T20:29:42.987000
CVE-2023-27500,0,0,e761be0897c6f128c5d22bdd519d5df5ecbb799975b0b2a56857eb5e1fafa36b,2024-02-01T02:32:09.317000
CVE-2023-27501,0,0,3a48b7718293713515650d58f8bc503e08b5e0af5cdc2bcacc0d2cec24892060,2023-04-11T04:16:06.350000
CVE-2023-27502,1,1,8e2343a1d7e814d13f786554b3331085de16def8b6f905080017205088f86576,2024-03-14T18:11:35.910000
CVE-2023-27502,0,0,8e2343a1d7e814d13f786554b3331085de16def8b6f905080017205088f86576,2024-03-14T18:11:35.910000
CVE-2023-27505,0,0,84b7757529ffe0786cc24a50b318ee901867e4e6864f02da12a6e54cc6972fc7,2023-11-07T04:09:58.190000
CVE-2023-27506,0,0,1f012013e1966bce73ebafa99cafd6aacbb0cff3da16432bdf425c6a6a56d0fb,2023-11-07T04:09:58.323000
CVE-2023-27507,0,0,eb5451b311d5ea75dd7125a53961aa13d4ef228bed1c763182fec1f0a812744d,2023-05-30T15:33:26.400000
@ -220047,7 +220047,7 @@ CVE-2023-28385,0,0,06b2e0ed9ede3db06b155ff85bcef2657f623d70b80aedda427ba62490112
CVE-2023-28386,0,0,5f6dd7d724610b77ac2c1bcfd50d247a5413c4a4eb8d84b38afbc90ddc6f9114,2023-05-27T01:59:16.440000
CVE-2023-28387,0,0,2bb0ab4d4fc306402b016f1f9cdb4868b82a9f603438a8259bb608ec5bf5a3d1,2023-07-07T18:24:25.427000
CVE-2023-28388,0,0,36db410ef1b32b01aabe7d4cd5466d250ac7f27fc8ac045564d2c4c24772a286,2024-01-10T16:30:56.260000
CVE-2023-28389,1,1,121ae92f8226b4a2957bcb34922a4b942c822aa30192d48d08322bd8190fdfaa,2024-03-14T18:11:35.910000
CVE-2023-28389,0,0,121ae92f8226b4a2957bcb34922a4b942c822aa30192d48d08322bd8190fdfaa,2024-03-14T18:11:35.910000
CVE-2023-2839,0,0,edb09150a8f34d1ed306bf6c484b1a2f2590f2f7df7d63e75a4345c934ac771a,2023-05-27T04:15:25.153000
CVE-2023-28390,0,0,985499e8e05f7b59e3cd4ad36c6e14dc24bad969df6840cdf739006b8a2ce2f8,2023-05-30T16:19:29.097000
CVE-2023-28391,0,0,4283b9ee39c0cb9acc5d9d46f0edd1835c7a124adc48e4b44d9e30ae2799bbd5,2023-11-17T18:25:39.223000
@ -220388,7 +220388,7 @@ CVE-2023-28742,0,0,11bf10eb7cf86a06a042574721f5b6b130e4648b501c7e1966972cd6beeab
CVE-2023-28743,0,0,238bbf9b259df274ba81e67424dffbab46ab9aec9c8d0c6dbba6388c5f5f6634,2024-01-30T15:17:58.250000
CVE-2023-28744,0,0,cb5a4f36306b79a47f1780cb5ccb2cf8f4e1e731e30b27b9339b4dd6e9981cdb,2023-07-26T21:02:26.780000
CVE-2023-28745,0,0,970767670fa87165626793d9cdf3e3c257da5465b4124ca532ef944e6986d546,2024-02-14T15:01:55.963000
CVE-2023-28746,1,1,f459a789ceb18cd484af4a8be5172c81e61d9c6b9fb7e172e7d41a60dd0f382c,2024-03-14T18:11:35.910000
CVE-2023-28746,0,0,f459a789ceb18cd484af4a8be5172c81e61d9c6b9fb7e172e7d41a60dd0f382c,2024-03-14T18:11:35.910000
CVE-2023-28747,0,0,1f8971e91a3c69479baefed61244adab58b4c71337fe087d2b833da8d172bfc7,2023-12-01T03:48:15.443000
CVE-2023-28748,0,0,ed7c6de8a0ffdbec666abde636114e42d7ebd13e048af0d6b7d4fa35920756d2,2023-11-10T04:19:54.407000
CVE-2023-28749,0,0,8c1e27a9f22ac0dd71acbfe984f8107e6c3bc84444315708a6750aea99ae8044,2023-11-27T22:08:00.970000
@ -222844,7 +222844,7 @@ CVE-2023-32279,0,0,7ca0f3be69d291418a8e235f559e48bffb0eacc8d1adce9490c3d8820b7ed
CVE-2023-3228,0,0,eb6409b67a53e6a87ee3b35c6c86c79edf79e7841421507b46731053f0d8a0a3,2023-06-17T03:10:15.150000
CVE-2023-32280,0,0,65c23c31d13fc48d967995bf477468e1d79f1adf33f38fa31fe17e9068c09e69,2024-02-14T15:01:51.137000
CVE-2023-32281,0,0,d199469e0e07df63722d1b0fb9deb26825694a89b7bc3c926712eb33cbe10ec8,2023-06-12T16:38:00.760000
CVE-2023-32282,1,1,524660a7db415417731b26f40e37e3f473ae132e7d10dd93cba1dd5d340e09c3,2024-03-14T18:11:35.910000
CVE-2023-32282,0,0,524660a7db415417731b26f40e37e3f473ae132e7d10dd93cba1dd5d340e09c3,2024-03-14T18:11:35.910000
CVE-2023-32283,0,0,616c5b9249425e5481eafd04e1620c9a4a544ecf6b3da0a6220674a9ae5aea3b,2023-11-21T17:54:43.380000
CVE-2023-32284,0,0,88cadcb4c44564a55805cbeda51567e56117f0699d0ad57db2507ae2d4d8a3a7,2023-09-25T18:41:26.133000
CVE-2023-32285,0,0,54094f56f801494f82e889d7f6490e7a0d2bb29d4a710d2f2b203433cfb010a9,2023-11-07T04:14:31.603000
@ -223188,7 +223188,7 @@ CVE-2023-32628,0,0,541f7cd8854cddced3fbf215ecde920e34f99635d7ae971eebdbb67d9ace0
CVE-2023-32629,0,0,2a9b510613e59b1d0791e7609094d808f41803441654414571345279bd8a52e6,2023-09-11T19:15:42.233000
CVE-2023-3263,0,0,40d9b2be8196618e8ffd2b2daf5e1f9188a2528f6d7a25328a1138e173242c04,2023-08-22T16:24:14.497000
CVE-2023-32632,0,0,e34c3571eff0bd407d8dae7bc7261de893a3ad6909c84ad2b1a0971d12c7b797,2023-10-12T22:26:55.673000
CVE-2023-32633,1,1,208eb22652d0f65f67e012a88d84b0d0f6310e0295f24f5f835a9d94bd6c7d36,2024-03-14T18:11:35.910000
CVE-2023-32633,0,0,208eb22652d0f65f67e012a88d84b0d0f6310e0295f24f5f835a9d94bd6c7d36,2024-03-14T18:11:35.910000
CVE-2023-32634,0,0,ae13f2ab6f823c11364e754ebc00ed530b5755084b143d030cf791a0dc2ec76a,2023-10-18T18:56:33.150000
CVE-2023-32635,0,0,c8cb8d692af3d56e6e0b096944f9dd2b1b44e20fd09b760641a7283ac2335c77,2023-07-28T13:52:39.963000
CVE-2023-32636,0,0,768a214bce0e4727a42083040ca54f6417ad330660d18a0cc1ad5894f3ee206b,2024-01-12T22:09:56.247000
@ -223222,7 +223222,7 @@ CVE-2023-32662,0,0,e6ecfd432d8093b5086df379db0b57cdf40d1685dba2c7fabe307bec0ed72
CVE-2023-32663,0,0,3e7ef52ee8898923e5c75493bfae74a9e09e3258bba72eb62046ef7118b9edb7,2023-08-21T17:15:47.183000
CVE-2023-32664,0,0,618bdb4ac369fcb1a95b33a61563548a0e7093584a2b9e9c5666fd90ad48ae60,2023-09-15T19:15:07.340000
CVE-2023-32665,0,0,31f6fbb04d38e24ef8a8bd7c7b632bd8e055665c900cbecbc4c539e406f2b02a,2023-11-27T14:15:07.820000
CVE-2023-32666,1,1,0b00f08660e37d78e602a5ee0eb683b0ea819394514718b2b63339bddd6e407b,2024-03-14T18:11:35.910000
CVE-2023-32666,0,0,0b00f08660e37d78e602a5ee0eb683b0ea819394514718b2b63339bddd6e407b,2024-03-14T18:11:35.910000
CVE-2023-32668,0,0,6870504f63fd451347fe0c331096f1e45ff8f6811229f296b8ba61f0b4142f10,2023-05-23T17:31:45.217000
CVE-2023-32669,0,0,0f9d4ef16e2f26deb90011f7c395852feb44144b8263c413043ff4187727c7dd,2023-10-04T21:07:05.703000
CVE-2023-3267,0,0,2d4c8daf423de31384ed6303e8fbed7365844c7d43ecaa98d82b4375b3aba328,2023-08-22T16:15:46.067000
@ -225004,7 +225004,7 @@ CVE-2023-35187,0,0,726f3d269c3fc4ab0e4f8bf02f0782a65d9f79c8f65fbe320311a563e2133
CVE-2023-35188,0,0,dc2d51582b0c40a1a991431e82dc96ea83b69d4b6cd75cf2797291ed1d48e8fe,2024-02-13T20:36:01.653000
CVE-2023-35189,0,0,727918a3b8004e51f12292fde6090cd74f994ad6d97365addee6dbdc84715391,2023-07-27T17:43:17.170000
CVE-2023-3519,0,0,7329bec3703bdc39aea3e59a1cc85b2341feb74f79ed91f9be508e94879784da,2023-08-04T18:15:17.077000
CVE-2023-35191,1,1,ce7a7d62bc18b70f4784dbfb0c011ac6715fdb189d5d45cdfda013568cb7d661,2024-03-14T18:11:35.910000
CVE-2023-35191,0,0,ce7a7d62bc18b70f4784dbfb0c011ac6715fdb189d5d45cdfda013568cb7d661,2024-03-14T18:11:35.910000
CVE-2023-35193,0,0,35d999215ee0714de627ba46454d683b144c8672ad7068fc25e9877364a0d4d5,2023-10-18T14:59:29.847000
CVE-2023-35194,0,0,f1422d8c09e7347a9549c0a032c4e17cf30f4016d4503b676ff325c6bb8df1e1,2023-10-18T14:59:10.533000
CVE-2023-3520,0,0,03168a3d34c4551d3f89d5576703d3fa9269c779a40ea50d5fa229233446f0fa,2023-07-12T15:34:13.653000
@ -227293,7 +227293,7 @@ CVE-2023-38571,0,0,59422f4a140d130cd11989d6215360f540ea5ce2d1940f49a1884661bcc08
CVE-2023-38572,0,0,d548f53924cef1c9fed50ca54f02dd79c795d64a5950d4afb21f0974051e6ecc,2024-01-05T14:15:47.123000
CVE-2023-38573,0,0,473858576dcb468ddb455cbd057d8489cb45e9be3d5a82dde3da1329775f6312,2023-12-01T20:52:57.627000
CVE-2023-38574,0,0,08bf6c6c13d11939e1673419af7685695e023a5a2347b1f23980f2505f1fbcc4,2023-09-11T12:50:00.413000
CVE-2023-38575,1,1,347e384cbcd4e05465cd08585ad76ba75cfe3d4e1ec35c66fc6ab0e649301186,2024-03-14T18:11:35.910000
CVE-2023-38575,0,0,347e384cbcd4e05465cd08585ad76ba75cfe3d4e1ec35c66fc6ab0e649301186,2024-03-14T18:11:35.910000
CVE-2023-38576,0,0,e3f65d06ff8b2c2a07fff1f05ff5d589b3e7a54d648a7f31143ebbbf046d0139,2023-08-24T18:26:00.547000
CVE-2023-38579,0,0,d675649c63083678f4f6251f8e7bc0f6b675249c8aaa3432eda8a193ed725f0c,2024-02-13T21:56:17.013000
CVE-2023-3858,0,0,28a65d2dd00f0597640296e7ce5d44a9ad975a92cccd9351bfb9718868369c47,2024-02-29T01:40:48.047000
@ -227874,7 +227874,7 @@ CVE-2023-39363,0,0,3b5e03600cf70b560e94452186ae68035e14537be8e3ab0775f4768bbd4e3
CVE-2023-39364,0,0,0912e57d5cfd34bc2e4e4e2edced8f0b60dbf7166f76bb8617bbffe7593a5908,2023-11-09T05:15:10.093000
CVE-2023-39365,0,0,21bf6fcb85cd83710c44b53d5ed8758363039f7223266aec94530b96b94dfe4a,2023-11-09T05:15:10.213000
CVE-2023-39366,0,0,ec1d63cbca61e10ab8a85d0a3e36a9a8f98189047df6aef06ced93f8760dd051,2023-11-09T05:15:10.317000
CVE-2023-39368,1,1,88e669aad606fc4894fa8fa8208aac4d6b14c8e50c133f6104e01d74864a5f22,2024-03-14T18:11:35.910000
CVE-2023-39368,0,0,88e669aad606fc4894fa8fa8208aac4d6b14c8e50c133f6104e01d74864a5f22,2024-03-14T18:11:35.910000
CVE-2023-39369,0,0,a7133e0339d6578f18ea90b34029606305e458b6c370c69d1e80c0cf5ea43285,2023-09-07T17:44:36.470000
CVE-2023-3937,0,0,816a8fecf88ce14e903f0a8518357bc6a8c385564499d1cc21d7a2f9486d6a58,2023-08-18T14:30:09.183000
CVE-2023-39370,0,0,d8edd93cc537210f9236e7c7d5ca490360b74b59fd87a37c3c0b9a154aa65f18,2023-09-08T06:42:31.750000
@ -230213,6 +230213,7 @@ CVE-2023-42933,0,0,4515d35610e674bb40f9ac6898c27078c01d4ce90705902554e59c696decf
CVE-2023-42934,0,0,9bbd832bbd99920d5b4e7783d7815e5b4e4bfb6335bc1932425966a175c8c3cb,2024-01-16T23:52:48.783000
CVE-2023-42935,0,0,606ee85ca40462fb734cd978403d80127f0d12edae5212a236ef5fd51294018c,2024-01-29T18:38:29.587000
CVE-2023-42937,0,0,c2539e1b6a362c132317285010348324c513a5269588c97c8989267a27c3c96b,2024-01-29T18:33:19.387000
CVE-2023-42938,1,1,462788774e20545d65b9d3f478cd23a7f498f5f04c53cff4fca3aa9542319994,2024-03-14T20:15:07.040000
CVE-2023-42939,0,0,4b0304a240b255af54a2d16f83934322490b0bc4310fde824596ed206eb1503c,2024-02-22T19:07:27.197000
CVE-2023-4294,0,0,f930b584e857cb43ea137e37486281273551f8c9af112eaf7de38edf833a3d6b,2023-11-07T04:22:25.913000
CVE-2023-42940,0,0,497a04296ad312ccf5bf23a1803700acc02bb53e54c938b44bbaaea8533d8224,2024-01-04T14:56:32.530000
@ -230460,7 +230461,7 @@ CVE-2023-43484,0,0,685a1775bdd32f0468af5131678a5a88401ccecf002cd65cdb57f11bcb9b2
CVE-2023-43485,0,0,56e06eecce10771793782bda7486bdc0abaf33406a8b34746335ac307311004e,2023-10-17T20:31:53.560000
CVE-2023-43488,0,0,73963ff8fac3febe7fcf1226608d7faad6241fb5160a15c4381098ef0daabd52,2023-11-06T14:41:18.393000
CVE-2023-4349,0,0,7bcfa9d15cfc992ac2e945aa6e7aec95ce86c568d8f15fb3ba2380084473c42f,2024-01-31T17:15:14.370000
CVE-2023-43490,1,1,157fabb366a0360ae3ff26ac8640a9f017e124922c63d1ff06d2f1fcbe8a0fb1,2024-03-14T18:11:35.910000
CVE-2023-43490,0,0,157fabb366a0360ae3ff26ac8640a9f017e124922c63d1ff06d2f1fcbe8a0fb1,2024-03-14T18:11:35.910000
CVE-2023-43492,0,0,42b5f695dc2a37dd6c1424d01d87bfa34fecc8146eed1f8b9a6b38bb9493ae43,2023-10-30T14:33:25.570000
CVE-2023-43493,0,0,8adb4be7e4d00ab6ac29deee1a8eec611490dc7a45bf7c05ab13586f9fcd691a,2023-09-27T20:51:26.677000
CVE-2023-43494,0,0,a5e1abcb0e0cbdd68150bd25ed5f4171fce3829cb775e04ccec60c9f09070438,2023-09-25T13:43:35.503000
@ -233996,9 +233997,9 @@ CVE-2023-48967,0,0,f8f5a7480cf7568d2aecb26ae0a75990792c8e43ba88fdfc54223d97cce64
CVE-2023-4897,0,0,ebe711a50d43c89f480d656bb23e372caf1ed234b13e09e72f3339def27c6964,2023-09-13T14:41:12.663000
CVE-2023-48974,0,0,3fa8b1b46ce07fbbef554dc807d3d7e61b34d89699e32a4154158f25940e1102,2024-02-29T01:41:35.677000
CVE-2023-4898,0,0,ad58ecc68e0e815727a5f2fa4e7a42cb3a7896f8cd045a23cffee5336cb813ea,2023-09-13T03:47:34.107000
CVE-2023-48985,0,0,5a7825eb95969b50e0c0f67474c86b64db2aca211fb3d1d68f3412b58e726a24,2024-02-14T13:59:35.580000
CVE-2023-48986,0,0,4d60279d236ba63f4f953726c413db500457c83063c15c91606ee5e09bf42ad4,2024-02-14T13:59:35.580000
CVE-2023-48987,0,0,71b60d8d69b58fb2eeb936e6799fa9f510d927875dd072dbe5727af70601fd6b,2024-02-14T13:59:35.580000
CVE-2023-48985,0,1,7aa8d53275f09daf85e397f30a610b1ddc1bb07355b5fbff35c4414fefe7982d,2024-03-14T19:02:42.210000
CVE-2023-48986,0,1,060c5e8a86760f9bfa33c1b499ea122d16725728b0550762ebbbc58c5a8d7860,2024-03-14T19:02:47.760000
CVE-2023-48987,0,1,c38581efda3a8a036b7b72251079a491e56657bc2cdf5613e9fc31bf6d0638b3,2024-03-14T19:03:10.113000
CVE-2023-4899,0,0,17b656e60dfc39f7e934ffddcacbfe41606e238c15abc8da7697628ba52223e4,2023-09-13T03:51:29.183000
CVE-2023-4900,0,0,12a51909a623c2c350dbfbd11538e16af6ed85e4ac221057281489ce5d7108f9,2024-01-31T17:15:16.900000
CVE-2023-49000,0,0,86714416678898480f50f316cc949aa741fd770798b5ca89e913de1d1ec57c18,2024-01-04T18:45:41.737000
@ -234690,7 +234691,7 @@ CVE-2023-50164,0,0,f92257f6f7f7144caea76bc759c9f4d42a26f019d14d79f88dd6d866326a5
CVE-2023-50165,0,0,6cc3fb981fe1805594dc6dd7b4769ed740a92c180ccf644bd37d3b7be89a8960,2024-02-06T17:41:39.480000
CVE-2023-50166,0,0,091a42fcab764067f28f78762f0621b913a8024c017fb2ab90a0fe7398a45003,2024-02-06T17:42:52.830000
CVE-2023-50167,0,0,0ed26f19ef15eb97b824e70233aef1b1704a97ac05faac1b78c7409b4a2600f7,2024-03-06T21:42:54.697000
CVE-2023-50168,0,1,ba65ddab693eda19a5abb3bc0e23770a38a7541d8258fa2017b26ae8c40dd1a4,2024-03-14T18:11:35.910000
CVE-2023-50168,0,0,ba65ddab693eda19a5abb3bc0e23770a38a7541d8258fa2017b26ae8c40dd1a4,2024-03-14T18:11:35.910000
CVE-2023-5017,0,0,780bf04cd6b1b8e13ac917a171328543d714b59c74fb14dbc6719e0425766344,2024-02-29T01:42:09.187000
CVE-2023-50170,0,0,1933563213fc12fd041d8d7f18f883d0e0fb318fa67f3782d779da0456696efa,2024-02-14T18:15:46.610000
CVE-2023-50172,0,0,6289559683bd5bae430bca31e942a947923f7382e49382dd37c6d6a05599756d,2024-01-18T14:28:59.977000
@ -235830,11 +235831,11 @@ CVE-2023-5244,0,0,2d7ccf46570f7a789336019a996859f3eea1c41d32a5a30c878bc5f986cf3b
CVE-2023-52440,0,0,df1d24f58b5780781d166f03e5bbee989af213ed28e43bfb8a74e059b4a6ae50,2024-02-22T19:07:27.197000
CVE-2023-52441,0,0,7349925d74cb6467b47b7b1d276df3eab91f5c1935d4ef85c04b101257863651,2024-02-22T19:07:27.197000
CVE-2023-52442,0,0,f0e32f692f04917f9b44f1a58b9cc67efd1d412e7f16caea29f8d0af9ba07f69,2024-02-22T19:07:27.197000
CVE-2023-52443,0,0,45acd59ed6aebb0ca36caa3fae688964cb001691728416348f03e997dedc3372,2024-02-22T19:07:27.197000
CVE-2023-52444,0,0,219c069e6b9b43e9139d2dadde64d8dbf2283ebb944e313277cb0ef569e97d20,2024-02-22T19:07:27.197000
CVE-2023-52445,0,0,c63473f7fb47441c69ff941dd994b6385f14098c4424eefee584656c7c83c661,2024-02-22T19:07:27.197000
CVE-2023-52446,0,0,8915dee6ace8ffdafc00e42a2e545d0367cfec0de76e3bd1f1f81df4b282e866,2024-02-22T19:07:27.197000
CVE-2023-52447,0,0,6cb1ceef4e0d855ea331a12dcff5cb43f47d94cac92386c56d1303d96a5ec2ae,2024-02-22T19:07:27.197000
CVE-2023-52443,0,1,d2cfc476b089f8fdcf50f50719540af45f0af66b06ea096a3e3bdb089d114cc0,2024-03-14T20:16:02.947000
CVE-2023-52444,0,1,e4e74b636a9119fb1430d59aa25d18b36c2089ded63e3a22c77190c88140fba1,2024-03-14T20:13:28.070000
CVE-2023-52445,0,1,935e18f4f35f2d58044edd90dd7b35f47e4402522601caceac7b2bae2ab24ab7,2024-03-14T20:13:50.727000
CVE-2023-52446,0,1,14bc79a6a49f12d7cdafb16072e7c790691dec958b76a4059d44e85538fb1528,2024-03-14T19:47:14.733000
CVE-2023-52447,0,1,2b483c12b6cae05ce719aef7a32c19c00143135e9924dab08c849516f96b86ad,2024-03-14T19:46:43.030000
CVE-2023-52448,0,0,45ca63d1d83bb662bb921c12f4cb5398e2d83d6740cccaace641a08f5d1cc271,2024-02-22T19:07:27.197000
CVE-2023-52449,0,0,74efd9336ae00efc2cdb415adabbc06030b4dc03749ec08f043888d1bbbd2ce7,2024-02-22T19:07:27.197000
CVE-2023-5245,0,0,7b2229d28f421b6ec6b3502eca0d9057fdb533e58501732c83cf6b2fe100d70b,2023-11-22T22:39:07.763000
@ -238901,7 +238902,7 @@ CVE-2024-1987,0,0,51b6353c7487197fcf85dba32dd0017998b1425a36ba707e32269bf4afb531
CVE-2024-1989,0,0,e603d4bdfbac73448a418c09b573178507e96a797a5be54fa1a78504bbf887da,2024-03-06T15:18:08.093000
CVE-2024-1996,0,0,6df66a0fbd4fb73abd5cd4958b38aa148676375056ace1026758f2dd345915e7,2024-03-13T18:15:58.530000
CVE-2024-1997,0,0,0b3dd4d3dab6ddfdd6d8d42f85a94ba3033320511c0452f126442703735f49d4,2024-03-13T18:15:58.530000
CVE-2024-1998,1,1,a3342ccc0c3061474cbfc167041184af8112bec2c082d20ac42626a5c675b156,2024-03-14T18:15:07.003000
CVE-2024-1998,0,0,a3342ccc0c3061474cbfc167041184af8112bec2c082d20ac42626a5c675b156,2024-03-14T18:15:07.003000
CVE-2024-2000,0,0,152795edb5374bb36090a67fbb4784adea5d8a58ecdfa58a0b08ea6100ccde61,2024-03-13T18:15:58.530000
CVE-2024-20001,0,0,efbe4e49752ddfea997ebdd6c491b74eca19a99884d44def3e33c77345370bb0,2024-02-09T02:02:13.153000
CVE-2024-20002,0,0,46b6afed42316be97368931c2d39434a4c3b4f4412ec2aa11d0d2b3e3bf7e82f,2024-02-09T02:01:37.090000
@ -239710,6 +239711,7 @@ CVE-2024-22332,0,0,b6354137c28f2ada534133af8c402970051810f863118ffa563de8361bb89
CVE-2024-22335,0,0,94b1135a0842e43602bc9fceeeec6f6d8338d5d9b6e931e6a3e1f0f5ed52affb,2024-02-20T19:50:53.960000
CVE-2024-22336,0,0,92b17f3ddf77b7c8a53a41f903603d0d36207de06fae8bd71fc2469777bc3663,2024-02-20T19:50:53.960000
CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e14f0,2024-02-20T19:50:53.960000
CVE-2024-22346,1,1,4d923575a0646f95ef556510f7d609fd41d733f89b7f84b7db0175ed66b96c27,2024-03-14T20:11:36.180000
CVE-2024-22355,0,0,90575169d286b28c7ce02c7d947a264d77a6f25776530138b50b2f2dbc394220,2024-03-04T13:58:23.447000
CVE-2024-2236,0,0,17401211af38608097c003c3b08d6e3d90e3570b70699d89a2e396d5b72c602a,2024-03-07T13:52:27.110000
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
@ -240037,17 +240039,17 @@ CVE-2024-23262,0,0,a3cc71b13c4680e14b673df2b1c613ebe49f9c48b8a03c413fc86e337ee8f
CVE-2024-23263,0,0,1ac0d4fd8c700b61850db67701ef51a909806e7bd38218f04abbd43e377bc0c4,2024-03-13T23:15:46.833000
CVE-2024-23264,0,0,9964a20888e66392c96c48ccf311158160cfbf4ec169d1a0d4c0b8eb5a95ac52,2024-03-13T23:15:46.883000
CVE-2024-23265,0,0,2ede0506b261d93e08a6a8ab0db637e55925e03c20e9a8ae30d3752777087982,2024-03-13T23:15:46.933000
CVE-2024-23266,0,0,da5a9f1a3556e7e1456a920c88f79f6b54c4dd23ee3522ff6c4060ad066d6907,2024-03-13T23:15:46.987000
CVE-2024-23267,0,0,5c83066309671517178112bdab92ea9b2ce42ff399335eff2925a7f503d1c48e,2024-03-13T23:15:47.040000
CVE-2024-23268,0,0,96db6f64f98d21adccd922403c0074d68cefd6926e7551d971b41befa78c4fb6,2024-03-13T23:15:47.090000
CVE-2024-23266,0,1,6815b460f7716d52df98ab436e6b42da2e782eedd3a5d15e033e5ba09801dfb0,2024-03-14T19:54:56.477000
CVE-2024-23267,0,1,d5b27df89e87163c273c4cfdb022944a468171435a4aac14f3c213d699a4a63f,2024-03-14T19:05:20.860000
CVE-2024-23268,0,1,81165c5c09e8474d57b6891cda51eb4f30eab0837f193e7c4798fe99fd2b9a98,2024-03-14T19:05:36.077000
CVE-2024-23269,0,0,b560efe5c2974c123fc7f649e82a050e1990e700d52c94117e9aef09610b87b2,2024-03-13T23:15:47.147000
CVE-2024-23270,0,0,42f8347f8cbc9f51a8592547bb25d568181c4c452b8049d0f8e6802ad03ced23,2024-03-13T23:15:47.197000
CVE-2024-23272,0,0,f445abbebcb40f3109c556f9ecf92f716e31abbf032d3937da971f05894e1ad7,2024-03-13T23:15:47.253000
CVE-2024-23273,0,0,420e5db43bed2125b40892275d0b57c19db75f02c784110b570a264645363a07,2024-03-13T21:15:57.747000
CVE-2024-23274,0,0,91c0be19cdc84d009728fd89f3b34636689c14d22b30e3ee869ffeaf1930db52,2024-03-13T23:15:47.310000
CVE-2024-23275,0,0,2760f9ac430a211de810c6e1c51e2052bb7fab7ff89f63c943e4c8bef298cd00,2024-03-13T23:15:47.363000
CVE-2024-23276,0,0,fde06e5e5c27aa477705814ab2f4d6a72ba5820f31217d5ff5bee960cc22bc80,2024-03-13T23:15:47.420000
CVE-2024-23277,0,0,c906b3dd2a5568cc03ae9dd6d0e7f06a446700daf74ab0e49008ad5ad87214bf,2024-03-13T21:15:57.963000
CVE-2024-23270,0,1,9ffc7392eb2f4eff1860dcb80336f5a8cdd382df1e721d75c8ca7db15331f0ca,2024-03-14T19:06:02.210000
CVE-2024-23272,0,1,c9da5a5a9448d1badcb55f1bb94ecccfda01d4c50c7c75b1140074bcaecd426e,2024-03-14T19:54:08.100000
CVE-2024-23273,0,1,cb1e92b841add9beb7ff32d91364414d10118c43bd74e233718396f3b8460ec5,2024-03-14T19:54:26.287000
CVE-2024-23274,0,1,662fb9b0795cd70eed82bdcf20d41f74676c2f9885c0d27e476a9f0c92a781b5,2024-03-14T19:54:38.937000
CVE-2024-23275,0,1,e0b16d7b7845ff2a21896517216a793e7fb601c54e9fbfa1064465a9fb3129ef,2024-03-14T20:34:02.077000
CVE-2024-23276,0,1,079c95708932d9c77b57c7e37daf6202b28a15d835eb4f9ac3937c0acb8c0899,2024-03-14T20:34:18.527000
CVE-2024-23277,0,1,b8b8680cb3bbc804b90ae335ad6a674884728efc310ccaf590e266267eefad11,2024-03-14T20:34:31.303000
CVE-2024-23278,0,0,37587677fcc59459c6e676e3831afba917f437da8f19a0310452de509033afe9,2024-03-13T22:15:10.883000
CVE-2024-23279,0,0,2f2a4da20a4912b04931b6c0ce417bc3b1be9e1a7b15c13f5c7903e8526354e3,2024-03-13T21:15:58.063000
CVE-2024-23280,0,0,5802b2d7de966c961f62acba594edc16460a2ada3d114036c7e9226aac15caf5,2024-03-13T22:15:10.950000
@ -240286,6 +240288,7 @@ CVE-2024-23816,0,0,d90e5d8a8add5ddfd05a35b38827bbf40e25d6527af0702c0c8e1c123914c
CVE-2024-23817,0,0,5676dff86204ad09bd540c1293c03d4560071d501dafe8dc45434ac4c0137f68,2024-01-31T23:25:58.247000
CVE-2024-23820,0,0,442ce87b6d4e7462abae5349c52b49ec11bd5e7b4d5da07ccb8943cf3cab70fb,2024-02-01T16:30:14.907000
CVE-2024-23822,0,0,ff7d5a10be6620b6d28dd41c7c7d2b88b037de8ed8da0a94d9353eebadc89386,2024-02-05T18:04:52.843000
CVE-2024-23823,1,1,8a6fef324a12d55fbb824ade9c974578fbac8577ab858ffbbb73b1a38a268902,2024-03-14T20:11:36.180000
CVE-2024-23824,0,0,720dd6b8460b3626944881d2146ae362a6c550b94265d7e32de8f62c2158a7f2,2024-02-10T04:04:51.007000
CVE-2024-23825,0,0,e35747afca6ba11a2ac686ab8c59d4a85d195e9a38b322cc31ef9b848c545df6,2024-02-05T18:46:02.203000
CVE-2024-23826,0,0,a1fb22dbd44ac7e3ef4aaa0208a31a95d4f168aff767b351ee50e7d675ba1814,2024-02-08T16:43:13.403000
@ -240536,6 +240539,7 @@ CVE-2024-24558,0,0,e1e4d32f901535a55c2f6412106d8d6d972ab259b4d2d031ab0a6368463e0
CVE-2024-24559,0,0,a0cb86b836a7e79e3e1b100a5872aae73fa30cbfc276547c01a7202600c7c117,2024-02-12T21:40:56.547000
CVE-2024-24560,0,0,d3bc441b7f7323645f1a247e96e6668e58a3a1d0f8c643e79ccfcc74a44eb295,2024-02-12T15:23:42.867000
CVE-2024-24561,0,0,5be80f6a2f32171d39ff2e793460c0d1935dad674bb1256dbd8e583d7f642aab,2024-02-09T20:21:23.980000
CVE-2024-24562,1,1,8bfcac28445b02c157bce1b1e0bb92a5bbec088ce506e386b9107b74a19af7aa,2024-03-14T20:11:36.180000
CVE-2024-24563,0,0,9029543c8c1164531bf0a5fd870593e244dab5241353adb887235fe9579da2cc,2024-02-15T05:02:12.977000
CVE-2024-24564,0,0,be0a637ebc948280561b9eda83902f2962f68eef3543fed436b47cdc70270d2f,2024-02-26T22:10:40.463000
CVE-2024-24565,0,0,2b26f8338c7350a8ca05f2c11acfbc691e7437e014aff92fedde224ab2a14e3a,2024-02-05T20:55:23.270000
@ -240604,6 +240608,7 @@ CVE-2024-24765,0,0,1dcdf5d3f9f009d85c8c4aac801e5e8bd54dddd577aad07bc5c3e80cc9bd8
CVE-2024-24766,0,0,c5cab786b58c3ec2f08fdfa14365ab75620c9bf6ef04c2b72e6996082a25dcdf,2024-03-06T21:42:48.053000
CVE-2024-24767,0,0,35493a546e5589356bb9d9764034569c9b6f7d5938a89535d372f61892403666,2024-03-06T21:42:48.053000
CVE-2024-24768,0,0,27dc306ca48f5aee06593af40ebe843b8735dea3a4f5dec47f36e425a97f3780,2024-02-13T00:36:30.397000
CVE-2024-24770,1,1,63b80bf2be495d5ed1a6a39be10950f417b765ad7151fc2a6ef5f6e4af2d2cbf,2024-03-14T20:11:36.180000
CVE-2024-24771,0,0,1468e3d6e6895bc7a063343d9867e26ba54dfe4d85cca1df09b674770a5ae30a,2024-02-15T05:01:22.213000
CVE-2024-24772,0,0,d30bc8f7beaf17e813aadd03fb1e8a82ab916ac933a92f71e2c08e1ecbc56667,2024-02-28T15:15:09.093000
CVE-2024-24773,0,0,ffb027c910cd93ba912f43ff59fdcdbfeee7e95ade5971f5d0af0e2e97ddd7a5,2024-02-28T15:15:09.177000
@ -240766,7 +240771,7 @@ CVE-2024-25126,0,0,cf0623ed49c8e216f3c8783e084ee8e3db6ece93672a14f8cc0bd9589b91a
CVE-2024-25128,0,0,172c5f0d62603832e5d7859a4a8be0b3217ee5b1e8ffd030ff8a010d7f347059,2024-02-29T13:49:29.390000
CVE-2024-25129,0,0,94b297a9d28866e9e3344e76c82b40cabac4f54bd9e83f1602ef019da71f96a9,2024-02-23T02:42:54.547000
CVE-2024-25130,0,0,9ed6bdd2e0b9e9a9c6f507d6c013b142ff6c3cd551628d5ce4a7cec9082ee81a,2024-02-23T02:42:54.547000
CVE-2024-25139,0,1,434a1a8570432b07a345e2d4d94e9a66656e3c23943681acca2835cd987627db,2024-03-14T18:11:35.910000
CVE-2024-25139,0,0,434a1a8570432b07a345e2d4d94e9a66656e3c23943681acca2835cd987627db,2024-03-14T18:11:35.910000
CVE-2024-25140,0,0,910924059f66fa65d93f5323847e59d03704b67134867a3ac9eb665a02a38fa2,2024-02-14T00:26:27.847000
CVE-2024-25141,0,0,29fa0c24f25cecd1df32a87cb8d97e893df4f50e0ef569f7fd7f97de363aa71b,2024-02-20T22:15:08.670000
CVE-2024-25143,0,0,ed1d5e0e430dd07199fade8c66d12e89ec5dc7886fca4f2d677be809afcc5ced,2024-02-07T17:04:54.407000
@ -241203,7 +241208,7 @@ CVE-2024-26581,0,0,353f24559890ac7b3597bd26d99362ecbfd523a3ec7e2aa7e9d65e75d894e
CVE-2024-26582,0,0,6cdcf6843f79a1ddc4c2cd0c26ad431557beeca360692c49f2a0f6c51a1d288c,2024-03-11T18:15:18.377000
CVE-2024-26583,0,0,4a300c2895f7117869a919f3cccacc96bcc2b42fd06fde7e43015d0dc24ee87c,2024-03-11T18:15:18.453000
CVE-2024-26584,0,0,628c83749212390e734524e43d20fa678834b7ea9755141f8a3b9cd3762087b8,2024-03-11T18:15:18.503000
CVE-2024-26585,0,0,9130e18bfb73c5c548fc7b8110539811cc500726789e8b328cc5ff9f8ae3ddfa,2024-03-11T18:15:18.553000
CVE-2024-26585,0,1,ab0df1121b4a44ad09abca0cf48007274128e339349339533a7e7946a2e72b52,2024-03-14T20:18:37.957000
CVE-2024-26586,0,0,6adf6fee4513357dce3d48353704f433902e35e2bc7d0ba0f94b639c08b43cd1,2024-02-23T09:15:22.820000
CVE-2024-26587,0,0,0efd83186b44039bd1d35d69a1b607d8dbb0ddf97a28b08dcc63546dbb9a7ecb,2024-02-22T19:07:27.197000
CVE-2024-26588,0,0,e28b875fe4ce5483682023926fd2826eb3774745f3f93324b0685c84e6aab78b,2024-02-22T19:07:27.197000
@ -241301,6 +241306,8 @@ CVE-2024-27235,0,0,7945730c880341828744b74178a4130752f96577b7b21da1564dd4f76d2e7
CVE-2024-27236,0,0,050a1052e26047f2e5d0b58d8351e3e856ec1c52f1b2daf95f02084addfb027c,2024-03-12T12:40:13.500000
CVE-2024-27237,0,0,952387726c7567ea2371af0e500cab297b027867a108431eaa82a39745a31338,2024-03-12T12:40:13.500000
CVE-2024-27255,0,0,07d4523d50b3b6ceec1ed85c31e8859376bfd63a9732f2f4d2cf6e5b4c34b76b,2024-03-04T13:58:23.447000
CVE-2024-27265,1,1,330b186390a3cca3ae10bd0b3ee1e39e75a1602b4fcdc860bbc5c6a93a010cfd,2024-03-14T20:11:36.180000
CVE-2024-27266,1,1,6067aa2b57c29a9e769a253e27c10bb2c747c64b936b7eaef7dbc204aa807a96,2024-03-14T20:11:36.180000
CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000
CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000
CVE-2024-27283,0,0,d0d6cc69e38ce7977029c4d3a011dff4f743808fa73bec6f0327124024522ffa,2024-02-22T19:07:27.197000
@ -241314,6 +241321,7 @@ CVE-2024-27295,0,0,7b61bc68a0e7596ec39f45cf16eb56847e1e2291e2b9c36b655d40907b360
CVE-2024-27296,0,0,efeac0d0835ce5e895a91174ac6e0936bc76da32bc1ae41fcb14571a12d2985d,2024-03-01T22:22:25.913000
CVE-2024-27297,0,0,4adef5b6b344504047ea652a2ba40cd8b6a71ad7086f702d549e1a8bda9ad1af,2024-03-12T12:40:13.500000
CVE-2024-27298,0,0,1aaf802a3586818726ce977e3c4d8b52b79c9b45f43876bfaeae085dddddd041,2024-03-01T22:22:25.913000
CVE-2024-27301,1,1,ea4f96db3674e6fe8e03ff7f55175b1f9fdc58c05fa850d93965ca0498d5bb55,2024-03-14T20:11:36.180000
CVE-2024-27302,0,0,f49f7cb8056f6127ae14fec0cfff2d0bf177dfba1318b206d31d7b548bf3e9f5,2024-03-06T21:42:48.053000
CVE-2024-27303,0,0,5bf58561ed507a70ca73108a11218e0be9a2a377c18b42118ebe9af756d8ec79,2024-03-06T21:42:48.053000
CVE-2024-27304,0,0,a58fd7f36bc322ab36f59f23fc0b881917cc0b6bb38909a990d60361c28f67b2,2024-03-06T21:42:48.053000
@ -241444,7 +241452,7 @@ CVE-2024-28174,0,0,fa1674b985861bddf4d0ff5ab075ec0e4328a9665c668bfe339f9f0de580d
CVE-2024-28175,0,0,c8f25bff8e97476e2963865ef2e9cf777aae8f2ef724b2ba6f372c990cea8179,2024-03-14T12:52:16.723000
CVE-2024-28176,0,0,5bb6d329167995170bd276a45554624691bdda8cbb6c83c2d08f42eba9f617aa,2024-03-11T01:32:39.697000
CVE-2024-28180,0,0,1e73ce45496cde15ab7710e8895a9f7d4caf4d2dcdb0d6de4d94afa753e9a64b,2024-03-11T01:32:39.697000
CVE-2024-28181,1,1,9eef168e9b9da4aa84a4cba01a79c67dd2a92582426f82c3a5ad14611a744484,2024-03-14T18:15:07.107000
CVE-2024-28181,0,1,43f0a809bba9c8c0eb02896e0986a3f9ccb9b3e30fc3eda1da963f37d0308dd8,2024-03-14T20:11:36.180000
CVE-2024-28184,0,0,043b0bc7533d0fc96bb6df4be7b21b8477ffe807b0ac6ed0c4b06cf7d8241c3c,2024-03-11T01:32:39.697000
CVE-2024-28186,0,0,bd19020fb98c7e49f4ae9534406a8116ce29f7f2cd9253fb5db74e8880c2331b,2024-03-13T12:33:51.697000
CVE-2024-28187,0,0,ac9aee9b90f5e80eaf35f8c7ff9228de1d46fc7e7981b3ae0d130073676ebc09,2024-03-12T12:40:13.500000
@ -241480,6 +241488,9 @@ CVE-2024-28390,0,0,c59fe44ce5898e034e8253a1c3bd017a5eae7c1708d584b45d3cdcaf6b6ab
CVE-2024-28391,0,0,b1444c24f7ecf1ab52e2ae0fbb735e6665eab4acbe77c214aa4859db21cb1963,2024-03-14T12:52:09.877000
CVE-2024-28417,0,0,af00e2b57e718e054f7e08c6b3b0d384a18688d81735bc5de07f53c08e95bb44,2024-03-14T14:21:20.217000
CVE-2024-28418,0,0,ae238b712a12df26411e78ac0a02714475617bc52923967f2dcd5f99fed7ae88,2024-03-14T14:21:20.217000
CVE-2024-28423,1,1,372e672a227c93e4c17b43a656f1688758e71678c55f13573c7b40701da49f01,2024-03-14T20:11:36.180000
CVE-2024-28424,1,1,05a1d242c621de5dbc7c2cf6c05bc52693076d1555a74835ea1663a11e03c0a9,2024-03-14T20:11:36.180000
CVE-2024-28425,1,1,bdbe12dd875a12ca19b5176fb53ff9c1ceaca5403939e0b8f4cdd10fdb0ff249,2024-03-14T20:11:36.180000
CVE-2024-28429,0,0,caaa64487b84149266e9e941a72e13f93e6070c94b1fe7355fb56db4eb5b2161,2024-03-13T14:28:45.217000
CVE-2024-28430,0,0,bf34fb49e742ebf9176808c1e05b7467ed1662a29a5c18afe29f976454928e37,2024-03-13T14:28:45.217000
CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c418,2024-03-13T14:28:45.217000
@ -241513,4 +241524,4 @@ CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3
CVE-2024-28757,0,0,2ea8a9bd701b62a4c7d927e860f5361b09b4376e3bc3bbb014ff5d4ca725cec6,2024-03-11T01:32:29.610000
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
CVE-2024-28849,1,1,3fd4e14c66f66b904cf6ec0b520762c4afbd3156d6cd6b7fed8cfe38b4a83639,2024-03-14T18:11:35.910000
CVE-2024-28849,0,0,3fd4e14c66f66b904cf6ec0b520762c4afbd3156d6cd6b7fed8cfe38b4a83639,2024-03-14T18:11:35.910000

Can't render this file because it is too large.