mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-03-14T21:00:38.303657+00:00
This commit is contained in:
parent
c4cf2a1af3
commit
61774caccc
@ -2,9 +2,8 @@
|
||||
"id": "CVE-2012-2143",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2012-07-05T14:55:02.183",
|
||||
"lastModified": "2023-11-07T02:10:24.710",
|
||||
"vulnStatus": "Modified",
|
||||
"evaluatorImpact": "As per: http://git.php.net/?p=php-src.git;a=commitdiff;h=aab49e934de1fff046e659cbec46e3d053b41c34 and http://git.php.net/?p=php-src.git;a=commitdiff_plain;h=aab49e934de1fff046e659cbec46e3d053b41c34\n\nPHP 5.3.13 and earlier are vulnerable.\n",
|
||||
"lastModified": "2024-03-14T19:59:00.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -63,23 +62,31 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2A705DF-3654-427F-8B11-62DB0B6C9813"
|
||||
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.3",
|
||||
"versionEndExcluding": "8.3.19",
|
||||
"matchCriteriaId": "B0883209-4A15-421B-A7B9-6EA5C51BA2E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F30CA60-0A82-45CD-8044-CE245393593D"
|
||||
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4",
|
||||
"versionEndExcluding": "8.4.12",
|
||||
"matchCriteriaId": "B0D785B1-6406-422D-9962-A41EE5724A72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2DD4DE67-9E3C-4F79-8AAB-344C1C46C618"
|
||||
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0",
|
||||
"versionEndExcluding": "9.0.8",
|
||||
"matchCriteriaId": "82089569-18FD-40EB-9EB4-009223F1A535"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4796DBEC-FF4F-4749-90D5-AD83D8B5E086"
|
||||
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1",
|
||||
"versionEndExcluding": "9.1.4",
|
||||
"matchCriteriaId": "193C7F88-26DE-4D6B-ABC9-F79491464143"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -433,7 +440,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=aab49e934de1fff046e659cbec46e3d053b41c34",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://git.postgresql.org/gitweb/?p=postgresql.git&a=commit&h=932ded2ed51e8333852e370c7a6dad75d9f236f9",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-3185",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2014-09-28T10:55:10.283",
|
||||
"lastModified": "2024-02-15T15:58:06.067",
|
||||
"lastModified": "2024-03-14T19:58:39.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,8 +63,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "3.2.63",
|
||||
"matchCriteriaId": "7C80D391-F3B3-4EFA-AB8D-6AFF448F906C"
|
||||
"versionEndExcluding": "3.2.63",
|
||||
"matchCriteriaId": "08F5EF97-E1B9-46F0-979B-E77F62DD8DB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2014-9529",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2015-01-09T21:59:00.050",
|
||||
"lastModified": "2023-11-07T02:23:06.510",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-03-14T19:58:34.480",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -63,8 +63,50 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.18.2",
|
||||
"matchCriteriaId": "6BEF22F9-77C0-4CCB-92B9-8F09C220BFB8"
|
||||
"versionEndExcluding": "3.2.67",
|
||||
"matchCriteriaId": "610F4D74-4688-40BE-AB0E-893944B3E9BB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.3",
|
||||
"versionEndExcluding": "3.4.107",
|
||||
"matchCriteriaId": "E15A5939-878C-4DD2-9BDF-308A9616CAC2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.5",
|
||||
"versionEndExcluding": "3.10.67",
|
||||
"matchCriteriaId": "60D618AD-AB2D-41B8-B8BD-0EBEB07EA75F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.11",
|
||||
"versionEndIncluding": "3.12.37",
|
||||
"matchCriteriaId": "13C6C0F3-DB99-45CE-AEED-691AD9B08540"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.13",
|
||||
"versionEndIncluding": "3.14.31",
|
||||
"matchCriteriaId": "74341731-4F87-4EF4-802E-75D97AAD29DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.15",
|
||||
"versionEndExcluding": "3.16.35",
|
||||
"matchCriteriaId": "7DC4BA70-B111-4D2E-BC78-6601CED68F08"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.17",
|
||||
"versionEndExcluding": "3.18.5",
|
||||
"matchCriteriaId": "52FDF7A5-2922-4139-A2C9-5985A2369B5F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -284,7 +326,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a3a8784454692dd72e5d5d34dcdab17b4420e74c",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-2666",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2015-05-27T10:59:04.813",
|
||||
"lastModified": "2023-11-07T02:25:24.123",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-03-14T19:59:23.823",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -63,8 +63,52 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.19.8",
|
||||
"matchCriteriaId": "13BE712D-C8FA-4B87-9A81-D23E0DD30FD3"
|
||||
"versionStartIncluding": "3.9",
|
||||
"versionEndExcluding": "3.10.83",
|
||||
"matchCriteriaId": "E2B0AD58-EA8D-45B5-8904-94271AEC93C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.11",
|
||||
"versionEndExcluding": "3.12.40",
|
||||
"matchCriteriaId": "5F50A53F-800B-4B6C-8D9F-15DF58421D96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.13",
|
||||
"versionEndExcluding": "3.14.47",
|
||||
"matchCriteriaId": "4424F17D-6AD4-4FE9-A029-143963887D1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.15",
|
||||
"versionEndExcluding": "3.16.35",
|
||||
"matchCriteriaId": "7DC4BA70-B111-4D2E-BC78-6601CED68F08"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.17",
|
||||
"versionEndExcluding": "3.18.19",
|
||||
"matchCriteriaId": "464FCF6E-7FDF-42F9-ABB8-EA4ADD37CD1E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -74,31 +118,53 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153329.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1534.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/03/20/18",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1032414",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204722",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/torvalds/linux/commit/f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2015-5157",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2015-08-31T10:59:11.830",
|
||||
"lastModified": "2024-02-15T18:55:32.183",
|
||||
"lastModified": "2024-03-14T19:58:51.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -98,8 +98,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "3.12.47",
|
||||
"matchCriteriaId": "E302C2B5-C78C-4A32-920C-CAF51A9486E9"
|
||||
"versionEndExcluding": "3.12.47",
|
||||
"matchCriteriaId": "967C3CF4-381C-4010-9E1D-C350069E6813"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2016-2143",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2016-04-27T17:59:08.867",
|
||||
"lastModified": "2023-02-12T23:17:31.203",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-03-14T19:59:19.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -84,8 +84,38 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:4.4:rc8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD811782-D76C-4CC9-9F00-BFE7E258362F"
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.25",
|
||||
"versionEndExcluding": "3.2.79",
|
||||
"matchCriteriaId": "B79A68C4-0BE9-4730-90EF-D994F6E432C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.3",
|
||||
"versionEndExcluding": "3.12.58",
|
||||
"matchCriteriaId": "03C048E1-FC04-4CCE-B8FE-247E05A813F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.13",
|
||||
"versionEndExcluding": "3.16.35",
|
||||
"matchCriteriaId": "618CC578-24BB-4653-8BFF-A78157E4CA91"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.17",
|
||||
"versionEndExcluding": "4.1.21",
|
||||
"matchCriteriaId": "36DFEFEA-3B09-488F-915F-73378E43B1C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "4.4.6",
|
||||
"matchCriteriaId": "920597A9-2E15-4868-BF20-45E5322CE1D9"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -97,6 +127,11 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
|
||||
@ -110,6 +145,36 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1137279-81F0-4F6B-8E91-95590106BADF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -117,56 +182,93 @@
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3446c13b268af86391d06611327006b059b8bab1",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-1539.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2766.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2016/dsa-3607",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/torvalds/linux/commit/3446c13b268af86391d06611327006b059b8bab1",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security-tracker.debian.org/tracker/CVE-2016-2143",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-10661",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-08-19T18:29:00.257",
|
||||
"lastModified": "2018-10-31T10:29:04.183",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-03-14T19:59:04.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,100 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.10.14",
|
||||
"matchCriteriaId": "FCD21859-C02B-4853-843A-4F88C23EA7C2"
|
||||
"versionEndExcluding": "3.2.92",
|
||||
"matchCriteriaId": "21888989-B8CA-4696-9FE4-9CDA1B3B92AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.3",
|
||||
"versionEndExcluding": "3.16.47",
|
||||
"matchCriteriaId": "18369FD7-D135-4C78-BA5E-8FF5F4573485"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.17",
|
||||
"versionEndExcluding": "3.18.52",
|
||||
"matchCriteriaId": "8104AAC1-9700-4372-8E11-37B09309A76F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.19",
|
||||
"versionEndExcluding": "4.1.41",
|
||||
"matchCriteriaId": "9019BEC9-FE77-4506-A019-B8B4D8BCEBAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "4.4.67",
|
||||
"matchCriteriaId": "168D3A9F-B199-4E02-B791-291B29317EF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "4.9.27",
|
||||
"matchCriteriaId": "922869C5-7B17-4B57-9E84-B746C7ABCFA6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.10.15",
|
||||
"matchCriteriaId": "85F68625-69D9-4FD0-A41C-40383EB29CF1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB33390A-F51F-4451-8FEA-7FC31F1AA51C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C81C5D4E-3CAD-43CE-82BC-B0619CA3A74A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -105,7 +197,11 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2017/dsa-3981",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.15",
|
||||
@ -125,23 +221,38 @@
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3083",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3096",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:4057",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:4058",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0036",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481136",
|
||||
@ -169,7 +280,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/43345/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-16527",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-11-04T01:29:36.803",
|
||||
"lastModified": "2018-08-24T10:29:00.850",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-03-14T19:58:25.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,8 +85,80 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.13.7",
|
||||
"matchCriteriaId": "11C6B206-8716-4A16-81BD-F3B8C8ACBE19"
|
||||
"versionEndExcluding": "3.2.95",
|
||||
"matchCriteriaId": "FE34D8B6-10FA-4EBC-863E-F996C0D35F52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.3",
|
||||
"versionEndExcluding": "3.16.50",
|
||||
"matchCriteriaId": "5A53989A-9D64-4F5D-AC0F-115A2A72785A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.17",
|
||||
"versionEndExcluding": "3.18.76",
|
||||
"matchCriteriaId": "126AB064-7A35-4C32-BED7-382E0F13F147"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.19",
|
||||
"versionEndExcluding": "4.1.46",
|
||||
"matchCriteriaId": "8E07836D-67CD-47C8-9E8C-7AA3DBCAEFF2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "4.4.93",
|
||||
"matchCriteriaId": "C2F83CFA-B098-45DE-9391-BEA047F41BC4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "4.9.57",
|
||||
"matchCriteriaId": "D07BF343-265B-4842-9149-E4B7B8943A65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.13.8",
|
||||
"matchCriteriaId": "0CD397D8-C278-45DC-A0B3-ABBC73A74ED7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
|
||||
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -111,11 +183,18 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3754-1/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-16528",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-11-04T01:29:36.850",
|
||||
"lastModified": "2018-04-07T01:29:03.030",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-03-14T19:58:15.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,8 +85,50 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.13.3",
|
||||
"matchCriteriaId": "FA1E2C32-ED0D-4E2B-A313-448CC0545ED2"
|
||||
"versionStartIncluding": "3.19",
|
||||
"versionEndExcluding": "4.1.47",
|
||||
"matchCriteriaId": "8B69ADB4-1D58-48EB-8B97-013FD5D1A7B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "4.4.99",
|
||||
"matchCriteriaId": "99213BBC-5F34-4CFD-8DB5-818D88641A90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "4.9.63",
|
||||
"matchCriteriaId": "98B1AE8E-C792-42B6-B1CF-6F1F838B3028"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.13.4",
|
||||
"matchCriteriaId": "5472D318-0478-439F-913A-FEEF5FF59A57"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
|
||||
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
|
||||
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -111,11 +153,17 @@
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3619-1/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3619-2/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-16529",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-11-04T01:29:36.880",
|
||||
"lastModified": "2018-08-24T10:29:00.927",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-03-14T19:58:06.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,8 +85,80 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.13.5",
|
||||
"matchCriteriaId": "8CBA5FF4-3406-4A63-9242-E6597219C011"
|
||||
"versionEndExcluding": "3.2.95",
|
||||
"matchCriteriaId": "FE34D8B6-10FA-4EBC-863E-F996C0D35F52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.3",
|
||||
"versionEndExcluding": "3.16.50",
|
||||
"matchCriteriaId": "5A53989A-9D64-4F5D-AC0F-115A2A72785A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.17",
|
||||
"versionEndExcluding": "3.18.75",
|
||||
"matchCriteriaId": "E04E29B0-31A7-4409-B175-5BA76E2D139A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.19",
|
||||
"versionEndExcluding": "4.1.46",
|
||||
"matchCriteriaId": "8E07836D-67CD-47C8-9E8C-7AA3DBCAEFF2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "4.4.92",
|
||||
"matchCriteriaId": "2E3DFF40-9172-40DC-B4F3-ED473E3EF79D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "4.9.55",
|
||||
"matchCriteriaId": "6D4234C0-2CB9-42EA-A1B2-9A2FB26B8ABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.13.6",
|
||||
"matchCriteriaId": "5B059C9D-19AF-467F-AA41-2433849FDCA8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
|
||||
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -96,7 +168,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/103284",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/torvalds/linux/commit/bfc81a8bc18e3c4ba0cbaa7666ff76be2f998991",
|
||||
@ -115,11 +191,18 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3754-1/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-16530",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-11-04T01:29:36.913",
|
||||
"lastModified": "2017-11-17T13:52:21.493",
|
||||
"lastModified": "2024-03-14T19:57:49.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,8 +85,43 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.13.5",
|
||||
"matchCriteriaId": "8CBA5FF4-3406-4A63-9242-E6597219C011"
|
||||
"versionEndExcluding": "3.16.50",
|
||||
"matchCriteriaId": "AF28BC26-3813-4695-A195-FA4113468860"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.17",
|
||||
"versionEndExcluding": "3.18.75",
|
||||
"matchCriteriaId": "E04E29B0-31A7-4409-B175-5BA76E2D139A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.19",
|
||||
"versionEndExcluding": "4.1.46",
|
||||
"matchCriteriaId": "8E07836D-67CD-47C8-9E8C-7AA3DBCAEFF2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "4.4.92",
|
||||
"matchCriteriaId": "2E3DFF40-9172-40DC-B4F3-ED473E3EF79D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "4.9.55",
|
||||
"matchCriteriaId": "6D4234C0-2CB9-42EA-A1B2-9A2FB26B8ABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.13.6",
|
||||
"matchCriteriaId": "5B059C9D-19AF-467F-AA41-2433849FDCA8"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-16532",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-11-04T01:29:37.037",
|
||||
"lastModified": "2018-08-24T10:29:01.053",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-03-14T19:57:34.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,8 +85,90 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.13.11",
|
||||
"matchCriteriaId": "3AB470D9-2EFD-4F2C-838A-EF9815166D69"
|
||||
"versionEndExcluding": "3.2.95",
|
||||
"matchCriteriaId": "FE34D8B6-10FA-4EBC-863E-F996C0D35F52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.3",
|
||||
"versionEndExcluding": "3.16.50",
|
||||
"matchCriteriaId": "5A53989A-9D64-4F5D-AC0F-115A2A72785A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.17",
|
||||
"versionEndExcluding": "3.18.82",
|
||||
"matchCriteriaId": "038B2E18-5117-49D3-ADBE-BB89B30E1260"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.19",
|
||||
"versionEndExcluding": "4.1.47",
|
||||
"matchCriteriaId": "8B69ADB4-1D58-48EB-8B97-013FD5D1A7B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "4.4.99",
|
||||
"matchCriteriaId": "99213BBC-5F34-4CFD-8DB5-818D88641A90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "4.9.63",
|
||||
"matchCriteriaId": "98B1AE8E-C792-42B6-B1CF-6F1F838B3028"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.13.14",
|
||||
"matchCriteriaId": "1DE009D1-12C6-4B66-A783-639F8529DF7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
|
||||
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
|
||||
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -111,31 +193,53 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3617-1/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3617-2/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3617-3/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3619-1/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3619-2/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3754-1/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1386",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-05-16T15:15:09.310",
|
||||
"lastModified": "2022-05-24T19:00:51.517",
|
||||
"lastModified": "2024-03-14T19:58:30.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,9 +84,15 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:fusion_builder_project:fusion_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.6.2",
|
||||
"matchCriteriaId": "4C0EFCB3-5303-40D0-960C-1027214683B3"
|
||||
"matchCriteriaId": "B0114474-BD17-4989-B5E2-C71C0C21A360"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "7.6.2",
|
||||
"matchCriteriaId": "16A123A5-181B-4970-836A-D38BADBFD4F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2022-44117",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-23T21:15:11.020",
|
||||
"lastModified": "2022-11-28T19:34:03.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-14T19:15:49.147",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Boa 0.94.14rc21 is vulnerable to SQL Injection via username."
|
||||
"value": "Boa 0.94.14rc21 is vulnerable to SQL Injection via username. NOTE: the is disputed by multiple third parties because Boa does not ship with any support for SQL."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Boa 0.94.14rc21 es vulnerable a la inyecci\u00f3n SQL mediante nombre de usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
24
CVE-2023/CVE-2023-429xx/CVE-2023-42938.json
Normal file
24
CVE-2023/CVE-2023-429xx/CVE-2023-42938.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-42938",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-14T19:15:49.270",
|
||||
"lastModified": "2024-03-14T20:15:07.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved checks. This issue is fixed in iTunes 12.13.1 for Windows. A local attacker may be able to elevate their privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214091",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214091",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,79 @@
|
||||
"id": "CVE-2023-48985",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-14T09:15:36.073",
|
||||
"lastModified": "2024-02-14T13:59:35.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-14T19:02:42.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting (XSS) vulnerability in CU Solutions Group (CUSG) Content Management System (CMS) before v.7.75 allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted script to the login.php component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Cross-Site Scripting (XSS) en CU Solutions Group (CUSG) Content Management System (CMS) anterior a v.7.75 permite a un atacante remoto ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un script manipulado para el componente login.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cusg:content_management_system:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.75",
|
||||
"matchCriteriaId": "B5825DB0-F08C-4CCE-9816-A94DABF98770"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.lmgsecurity.com/news/critical-software-vulnerabilities-impacting-credit-unions-discovered-by-lmg-security-researcher-immediate-action-recommended/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,79 @@
|
||||
"id": "CVE-2023-48986",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-14T09:15:36.130",
|
||||
"lastModified": "2024-02-14T13:59:35.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-14T19:02:47.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting (XSS) vulnerability in CU Solutions Group (CUSG) Content Management System (CMS) before v.7.75 allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted script to the users.php component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Cross-Site Scripting (XSS) en CU Solutions Group (CUSG) Content Management System (CMS) anterior a v.7.75 permite a un atacante remoto ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un script manipulado para el componente users.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cusg:content_management_system:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.75",
|
||||
"matchCriteriaId": "B5825DB0-F08C-4CCE-9816-A94DABF98770"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.lmgsecurity.com/news/critical-software-vulnerabilities-impacting-credit-unions-discovered-by-lmg-security-researcher-immediate-action-recommended/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,79 @@
|
||||
"id": "CVE-2023-48987",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-14T09:15:36.193",
|
||||
"lastModified": "2024-02-14T13:59:35.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-14T19:03:10.113",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Blind SQL Injection vulnerability in CU Solutions Group (CUSG) Content Management System (CMS) before v.7.75 allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted script to the pages.php component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL ciega en CU Solutions Group (CUSG) Content Management System (CMS) anterior a v.7.75 permite a un atacante remoto ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de un script manipulado para el componente pages.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cusg:content_management_system:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.75",
|
||||
"matchCriteriaId": "B5825DB0-F08C-4CCE-9816-A94DABF98770"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.lmgsecurity.com/news/critical-software-vulnerabilities-impacting-credit-unions-discovered-by-lmg-security-researcher-immediate-action-recommended/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,47 +2,170 @@
|
||||
"id": "CVE-2023-52443",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-22T17:15:08.377",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-14T20:16:02.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: avoid crash when parsed profile name is empty\n\nWhen processing a packed profile in unpack_profile() described like\n\n \"profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}\"\n\na string \":samba-dcerpcd\" is unpacked as a fully-qualified name and then\npassed to aa_splitn_fqname().\n\naa_splitn_fqname() treats \":samba-dcerpcd\" as only containing a namespace.\nThus it returns NULL for tmpname, meanwhile tmpns is non-NULL. Later\naa_alloc_profile() crashes as the new profile name is NULL now.\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 6 PID: 1657 Comm: apparmor_parser Not tainted 6.7.0-rc2-dirty #16\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\nRIP: 0010:strlen+0x1e/0xa0\nCall Trace:\n <TASK>\n ? strlen+0x1e/0xa0\n aa_policy_init+0x1bb/0x230\n aa_alloc_profile+0xb1/0x480\n unpack_profile+0x3bc/0x4960\n aa_unpack+0x309/0x15e0\n aa_replace_profiles+0x213/0x33c0\n policy_update+0x261/0x370\n profile_replace+0x20e/0x2a0\n vfs_write+0x2af/0xe00\n ksys_write+0x126/0x250\n do_syscall_64+0x46/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n </TASK>\n---[ end trace 0000000000000000 ]---\nRIP: 0010:strlen+0x1e/0xa0\n\nIt seems such behaviour of aa_splitn_fqname() is expected and checked in\nother places where it is called (e.g. aa_remove_profiles). Well, there\nis an explicit comment \"a ns name without a following profile is allowed\"\ninside.\n\nAFAICS, nothing can prevent unpacked \"name\" to be in form like\n\":samba-dcerpcd\" - it is passed from userspace.\n\nDeny the whole profile set replacement in such case and inform user with\nEPROTO and an explaining message.\n\nFound by Linux Verification Center (linuxtesting.org)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: apparmor: evita fallas cuando el nombre del perfil analizado est\u00e1 vac\u00edo Al procesar un perfil empaquetado en unpack_profile() descrito como \"perfil :ns::samba-dcerpcd /usr/lib*/samba/ {,samba/}samba-dcerpcd {...}\" una cadena \":samba-dcerpcd\" se descomprime como un nombre completo y luego se pasa a aa_splitn_fqname(). aa_splitn_fqname() trata \":samba-dcerpcd\" como si solo contuviera un espacio de nombres. Por lo tanto, devuelve NULL para tmpname, mientras que tmpns no es NULL. M\u00e1s tarde, aa_alloc_profile() falla porque el nuevo nombre del perfil ahora es NULL. falla de protecci\u00f3n general, probablemente para direcci\u00f3n no can\u00f3nica 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref en rango [0x00000000000000000-0x0000000000000007] CPU: 6 PID: 1657 Comm: apparmor_parser No contaminado 6.7.0- rc2-dirty #16 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 01/04/2014 RIP: 0010:strlen+0x1e/0xa0 Llamada Seguimiento: ? strlen+0x1e/0xa0 aa_policy_init+0x1bb/0x230 aa_alloc_profile+0xb1/0x480 unpack_profile+0x3bc/0x4960 aa_unpack+0x309/0x15e0 aa_replace_profiles+0x213/0x33c0 Policy_update+0x261/0x370 perfil_replace+ 0x20e/0x2a0 vfs_write+0x2af/0xe00 ksys_write+0x126/0x250 do_syscall_64+0x46/0xf0 Entry_SYSCALL_64_after_hwframe+0x6e/0x76 ---[ end trace 0000000000000000 ]--- RIP: 0010:strlen+0x1e/0xa0 Parece que tal comportamiento de aa_splitn_fqname() se espera y se verifica en otros lugares donde se llama (por ejemplo, aa_remove_profiles). Bueno, hay un comentario expl\u00edcito \"se permite un nombre ns sin un perfil de seguimiento\" dentro. AFAICS, nada puede evitar que el \"nombre\" descomprimido tenga un formato como \":samba-dcerpcd\": se pasa desde el espacio de usuario. En tal caso, rechace el reemplazo completo del conjunto de perfiles e informe al usuario con EPROTO y un mensaje explicativo. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.19.306",
|
||||
"matchCriteriaId": "0A7AEFD0-0681-4E8D-9074-27416D3EE94C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.268",
|
||||
"matchCriteriaId": "991BF737-6083-429B-ACD5-FB27D4143E2F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5.0",
|
||||
"versionEndExcluding": "5.10.209",
|
||||
"matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11.0",
|
||||
"versionEndExcluding": "5.15.148",
|
||||
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16.0",
|
||||
"versionEndExcluding": "6.1.75",
|
||||
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndExcluding": "6.6.14",
|
||||
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionEndExcluding": "6.7.2",
|
||||
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0a12db736edbb4933e4274932aeea594b5876fa4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1d8e62b5569cc1466ceb8a7e4872cf10160a9dcf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/55a8210c9e7d21ff2644809699765796d4bfb200",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5c0392fdafb0a2321311900be83ffa572bef8203",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5ff00408e5029d3550ee77f62dc15f1e15c47f87",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/77ab09b92f16c8439a948d1af489196953dc4a0e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9286ee97aa4803d99185768735011d0d65827c9e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9d4fa5fe2b1d56662afd14915a73b4d0783ffa45",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,47 +2,171 @@
|
||||
"id": "CVE-2023-52444",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-22T17:15:08.430",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-14T20:13:28.070",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid dirent corruption\n\nAs Al reported in link[1]:\n\nf2fs_rename()\n...\n\tif (old_dir != new_dir && !whiteout)\n\t\tf2fs_set_link(old_inode, old_dir_entry,\n\t\t\t\t\told_dir_page, new_dir);\n\telse\n\t\tf2fs_put_page(old_dir_page, 0);\n\nYou want correct inumber in the \"..\" link. And cross-directory\nrename does move the source to new parent, even if you'd been asked\nto leave a whiteout in the old place.\n\n[1] https://lore.kernel.org/all/20231017055040.GN800259@ZenIV/\n\nWith below testcase, it may cause dirent corruption, due to it missed\nto call f2fs_set_link() to update \"..\" link to new directory.\n- mkdir -p dir/foo\n- renameat2 -w dir/foo bar\n\n[ASSERT] (__chk_dots_dentries:1421) --> Bad inode number[0x4] for '..', parent parent ino is [0x3]\n[FSCK] other corrupted bugs [Fail]"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n para evitar corrupci\u00f3n directa Como inform\u00f3 Al en link[1]: f2fs_rename() ... if (old_dir != new_dir && !whiteout) f2fs_set_link(old_inode, old_dir_entry, old_dir_page, new_dir); dem\u00e1s f2fs_put_page(old_dir_page, 0); Quiere el n\u00famero correcto en el enlace \"..\" Y el cambio de nombre entre directorios mueve la fuente al nuevo padre, incluso si le hubieran pedido que dejara un espacio en blanco en el lugar anterior. [1] https://lore.kernel.org/all/20231017055040.GN800259@ZenIV/ Con el siguiente caso de prueba, puede causar corrupci\u00f3n directa, debido a que no llam\u00f3 a f2fs_set_link() para actualizar el enlace \"..\" al nuevo directorio . - mkdir -p dir/foo - renameat2 -w dir/foo bar [ASSERT] (__chk_dots_dentries:1421) --> N\u00famero de inodo incorrecto [0x4] para '..', el ino padre padre es [0x3] [FSCK] otro corrupto errores [falla]"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2.0",
|
||||
"versionEndExcluding": "4.19.306",
|
||||
"matchCriteriaId": "70CC102A-02F0-48B6-BEE8-3547C9651B25"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.268",
|
||||
"matchCriteriaId": "991BF737-6083-429B-ACD5-FB27D4143E2F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5.0",
|
||||
"versionEndExcluding": "5.10.209",
|
||||
"matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11.0",
|
||||
"versionEndExcluding": "5.15.148",
|
||||
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16.0",
|
||||
"versionEndExcluding": "6.1.75",
|
||||
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndExcluding": "6.6.14",
|
||||
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionEndExcluding": "6.7.2",
|
||||
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/02160112e6d45c2610b049df6eb693d7a2e57b46",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2fb4867f4405aea8c0519d7d188207f232a57862",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/53edb549565f55ccd0bdf43be3d66ce4c2d48b28",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5624a3c1b1ebc8991318e1cce2aa719542991024",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6f866885e147d33efc497f1095f35b2ee5ec7310",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d3c0b49aaa12a61d560528f5d605029ab57f0728",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f0145860c20be6bae6785c7a2249577674702ac7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f100ba617d8be6c98a68f3744ef7617082975b77",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,47 +2,170 @@
|
||||
"id": "CVE-2023-52445",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-22T17:15:08.477",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-14T20:13:50.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix use after free on context disconnection\n\nUpon module load, a kthread is created targeting the\npvr2_context_thread_func function, which may call pvr2_context_destroy\nand thus call kfree() on the context object. However, that might happen\nbefore the usb hub_event handler is able to notify the driver. This\npatch adds a sanity check before the invalid read reported by syzbot,\nwithin the context disconnection call stack."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: medios: pvrusb2: corrige el use after free de desconexi\u00f3n de contexto. Al cargar el m\u00f3dulo, se crea un kthread dirigido a la funci\u00f3n pvr2_context_thread_func, que puede llamar a pvr2_context_destroy y, por lo tanto, llamar a kfree() en el objeto de contexto. Sin embargo, eso podr\u00eda suceder antes de que el controlador usb hub_event pueda notificar al controlador. Este parche agrega una verificaci\u00f3n de cordura antes de la lectura no v\u00e1lida reportada por syzbot, dentro de la pila de llamadas de desconexi\u00f3n de contexto."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.19.306",
|
||||
"matchCriteriaId": "0A7AEFD0-0681-4E8D-9074-27416D3EE94C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.268",
|
||||
"matchCriteriaId": "991BF737-6083-429B-ACD5-FB27D4143E2F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5.0",
|
||||
"versionEndExcluding": "5.10.209",
|
||||
"matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11.0",
|
||||
"versionEndExcluding": "5.15.148",
|
||||
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16.0",
|
||||
"versionEndExcluding": "6.1.75",
|
||||
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndExcluding": "6.6.14",
|
||||
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionEndExcluding": "6.7.2",
|
||||
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3233d8bf7893550045682192cb227af7fa3defeb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/437b5f57732bb4cc32cc9f8895d2010ee9ff521c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ded85b0c0edd8f45fec88783d7555a5b982449c1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ec3634ebe23fc3c44ebc67c6d25917300bc68c08",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ec36c134dd020d28e312c2f1766f85525e747aab",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,27 +2,101 @@
|
||||
"id": "CVE-2023-52446",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-22T17:15:08.527",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-14T19:47:14.733",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix a race condition between btf_put() and map_free()\n\nWhen running `./test_progs -j` in my local vm with latest kernel,\nI once hit a kasan error like below:\n\n [ 1887.184724] BUG: KASAN: slab-use-after-free in bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.185599] Read of size 4 at addr ffff888106806910 by task kworker/u12:2/2830\n [ 1887.186498]\n [ 1887.186712] CPU: 3 PID: 2830 Comm: kworker/u12:2 Tainted: G OEL 6.7.0-rc3-00699-g90679706d486-dirty #494\n [ 1887.188034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n [ 1887.189618] Workqueue: events_unbound bpf_map_free_deferred\n [ 1887.190341] Call Trace:\n [ 1887.190666] <TASK>\n [ 1887.190949] dump_stack_lvl+0xac/0xe0\n [ 1887.191423] ? nf_tcp_handle_invalid+0x1b0/0x1b0\n [ 1887.192019] ? panic+0x3c0/0x3c0\n [ 1887.192449] print_report+0x14f/0x720\n [ 1887.192930] ? preempt_count_sub+0x1c/0xd0\n [ 1887.193459] ? __virt_addr_valid+0xac/0x120\n [ 1887.194004] ? bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.194572] kasan_report+0xc3/0x100\n [ 1887.195085] ? bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.195668] bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.196183] ? __bpf_obj_drop_impl+0xb0/0xb0\n [ 1887.196736] ? preempt_count_sub+0x1c/0xd0\n [ 1887.197270] ? preempt_count_sub+0x1c/0xd0\n [ 1887.197802] ? _raw_spin_unlock+0x1f/0x40\n [ 1887.198319] bpf_obj_free_fields+0x1d4/0x260\n [ 1887.198883] array_map_free+0x1a3/0x260\n [ 1887.199380] bpf_map_free_deferred+0x7b/0xe0\n [ 1887.199943] process_scheduled_works+0x3a2/0x6c0\n [ 1887.200549] worker_thread+0x633/0x890\n [ 1887.201047] ? __kthread_parkme+0xd7/0xf0\n [ 1887.201574] ? kthread+0x102/0x1d0\n [ 1887.202020] kthread+0x1ab/0x1d0\n [ 1887.202447] ? pr_cont_work+0x270/0x270\n [ 1887.202954] ? kthread_blkcg+0x50/0x50\n [ 1887.203444] ret_from_fork+0x34/0x50\n [ 1887.203914] ? kthread_blkcg+0x50/0x50\n [ 1887.204397] ret_from_fork_asm+0x11/0x20\n [ 1887.204913] </TASK>\n [ 1887.204913] </TASK>\n [ 1887.205209]\n [ 1887.205416] Allocated by task 2197:\n [ 1887.205881] kasan_set_track+0x3f/0x60\n [ 1887.206366] __kasan_kmalloc+0x6e/0x80\n [ 1887.206856] __kmalloc+0xac/0x1a0\n [ 1887.207293] btf_parse_fields+0xa15/0x1480\n [ 1887.207836] btf_parse_struct_metas+0x566/0x670\n [ 1887.208387] btf_new_fd+0x294/0x4d0\n [ 1887.208851] __sys_bpf+0x4ba/0x600\n [ 1887.209292] __x64_sys_bpf+0x41/0x50\n [ 1887.209762] do_syscall_64+0x4c/0xf0\n [ 1887.210222] entry_SYSCALL_64_after_hwframe+0x63/0x6b\n [ 1887.210868]\n [ 1887.211074] Freed by task 36:\n [ 1887.211460] kasan_set_track+0x3f/0x60\n [ 1887.211951] kasan_save_free_info+0x28/0x40\n [ 1887.212485] ____kasan_slab_free+0x101/0x180\n [ 1887.213027] __kmem_cache_free+0xe4/0x210\n [ 1887.213514] btf_free+0x5b/0x130\n [ 1887.213918] rcu_core+0x638/0xcc0\n [ 1887.214347] __do_softirq+0x114/0x37e\n\nThe error happens at bpf_rb_root_free+0x1f8/0x2b0:\n\n 00000000000034c0 <bpf_rb_root_free>:\n ; {\n 34c0: f3 0f 1e fa endbr64\n 34c4: e8 00 00 00 00 callq 0x34c9 <bpf_rb_root_free+0x9>\n 34c9: 55 pushq %rbp\n 34ca: 48 89 e5 movq %rsp, %rbp\n ...\n ; if (rec && rec->refcount_off >= 0 &&\n 36aa: 4d 85 ed testq %r13, %r13\n 36ad: 74 a9 je 0x3658 <bpf_rb_root_free+0x198>\n 36af: 49 8d 7d 10 leaq 0x10(%r13), %rdi\n 36b3: e8 00 00 00 00 callq 0x36b8 <bpf_rb_root_free+0x1f8>\n <==== kasan function\n 36b8: 45 8b 7d 10 movl 0x10(%r13), %r15d\n <==== use-after-free load\n 36bc: 45 85 ff testl %r15d, %r15d\n 36bf: 78 8c js 0x364d <bpf_rb_root_free+0x18d>\n\nSo the problem \n---truncated---"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: corrige una condici\u00f3n de ejecuci\u00f3n entre btf_put() y map_free() Al ejecutar `./test_progs -j` en mi m\u00e1quina virtual local con el \u00faltimo kernel, una vez encontr\u00e9 un error kasan como a continuaci\u00f3n: [ 1887.184724] ERROR: KASAN: slab-use-after-free en bpf_rb_root_free+0x1f8/0x2b0 [ 1887.185599] Lectura del tama\u00f1o 4 en la direcci\u00f3n ffff888106806910 por tarea kworker/u12:2/2830 [ 1887.186498] [ 1887.186712] CPU: 3 PID: 2830 Comm: kworker/u12:2 Contaminado: G OEL 6.7.0-rc3-00699-g90679706d486-dirty #494 [1887.188034] Nombre de hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0 -0-g155821a1990b-prebuilt.qemu.org 01/04/2014 [1887.189618] Cola de trabajo: events_unbound bpf_map_free_deferred [1887.190341] Seguimiento de llamadas: [1887.190666] [1887.190949] dump_stack_lv l+0xac/0xe0 [ 1887.191423] ? nf_tcp_handle_invalid+0x1b0/0x1b0 [1887.192019]? p\u00e1nico+0x3c0/0x3c0 [ 1887.192449] print_report+0x14f/0x720 [ 1887.192930] ? preempt_count_sub+0x1c/0xd0 [1887.193459]? __virt_addr_valid+0xac/0x120 [1887.194004]? bpf_rb_root_free+0x1f8/0x2b0 [ 1887.194572] kasan_report+0xc3/0x100 [ 1887.195085] ? bpf_rb_root_free+0x1f8/0x2b0 [ 1887.195668] bpf_rb_root_free+0x1f8/0x2b0 [ 1887.196183] ? __bpf_obj_drop_impl+0xb0/0xb0 [1887.196736]? preempt_count_sub+0x1c/0xd0 [1887.197270]? preempt_count_sub+0x1c/0xd0 [1887.197802]? _raw_spin_unlock+0x1f/0x40 [ 1887.198319] bpf_obj_free_fields+0x1d4/0x260 [ 1887.198883] array_map_free+0x1a3/0x260 [ 1887.199380] bpf_map_free_deferred+0x7b/0xe0 [ 18 87.199943] Process_scheduled_works+0x3a2/0x6c0 [1887.200549] trabajador_thread+0x633/0x890 [1887.201047]? __kthread_parkme+0xd7/0xf0 [ 1887.201574] ? kthread+0x102/0x1d0 [ 1887.202020] kthread+0x1ab/0x1d0 [ 1887.202447] ? pr_cont_work+0x270/0x270 [1887.202954]? kthread_blkcg+0x50/0x50 [ 1887.203444] ret_from_fork+0x34/0x50 [ 1887.203914] ? kthread_blkcg+0x50/0x50 [ 1887.204397] ret_from_fork_asm+0x11/0x20 [ 1887.204913] [ 1887.204913] [ 1887.205209] [ 1887.205416] Asignado por tarea 2197: [1887.205881] kasan_set_track+0x3f/0x60 [1887.206366] __kasan_kmalloc +0x6e/0x80 [ 1887.206856] __kmalloc+0xac/0x1a0 [ 1887.207293] btf_parse_fields+0xa15/0x1480 [ 1887.207836] btf_parse_struct_metas+0x566/0x670 [ 1887.208387 ] btf_new_fd+0x294/0x4d0 [ 1887.208851] __sys_bpf+0x4ba/0x600 [ 1887.209292] __x64_sys_bpf+0x41 /0x50 [ 1887.209762] do_syscall_64+0x4c/0xf0 [ 1887.210222] Entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1887.210868] [ 1887.211074] Liberado por la tarea 36: [ 1887.21146 0] kasan_set_track+0x3f/0x60 [ 1887.211951] kasan_save_free_info+0x28/0x40 [ 1887.212485] ____kasan_slab_free+ 0x101/0x180 [ 1887.213027] __kmem_cache_free+0xe4/0x210 [ 1887.213514] btf_free+0x5b/0x130 [ 1887.213918] rcu_core+0x638/0xcc0 [ 1887.214347] __do_ softirq+0x114/0x37e El error ocurre en bpf_rb_root_free+0x1f8/0x2b0: 00000000000034c0 : ; { 34c0: f3 0f 1e fa endbr64 34c4: e8 00 00 00 00 callq 0x34c9 34c9: 55 pushq %rbp 34ca: 48 89 e5 movq %rsp, %rbp ... ; if (rec && rec->refcount_off >= 0 && 36aa: 4d 85 ed testq %r13, %r13 36ad: 74 a9 je 0x3658 36af: 49 8d 7d 10 leaq 0x10(%r13), %rdi 36b3 : e8 00 00 00 00 callq 0x36b8 <==== funci\u00f3n kasan 36b8: 45 8b 7d 10 movl 0x10(%r13), %r15d <==== carga de uso despu\u00e9s de liberaci\u00f3n 36bc: 45 85 ff testl %r15d, %r15d 36bf: 78 8c js 0x364d Entonces el problema ---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndExcluding": "6.6.14",
|
||||
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionEndExcluding": "6.7.2",
|
||||
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/59e5791f59dd83e8aa72a4e74217eabb6e8cfd90",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d048dced8ea5eac6723ae873a40567e6f101ea42",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f9ff6ef1c73cd9e1a6bb1ab3e57c5d141a536306",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,31 +2,115 @@
|
||||
"id": "CVE-2023-52447",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-22T17:15:08.580",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-14T19:46:43.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer the free of inner map when necessary\n\nWhen updating or deleting an inner map in map array or map htab, the map\nmay still be accessed by non-sleepable program or sleepable program.\nHowever bpf_map_fd_put_ptr() decreases the ref-counter of the inner map\ndirectly through bpf_map_put(), if the ref-counter is the last one\n(which is true for most cases), the inner map will be freed by\nops->map_free() in a kworker. But for now, most .map_free() callbacks\ndon't use synchronize_rcu() or its variants to wait for the elapse of a\nRCU grace period, so after the invocation of ops->map_free completes,\nthe bpf program which is accessing the inner map may incur\nuse-after-free problem.\n\nFix the free of inner map by invoking bpf_map_free_deferred() after both\none RCU grace period and one tasks trace RCU grace period if the inner\nmap has been removed from the outer map before. The deferment is\naccomplished by using call_rcu() or call_rcu_tasks_trace() when\nreleasing the last ref-counter of bpf map. The newly-added rcu_head\nfield in bpf_map shares the same storage space with work field to\nreduce the size of bpf_map."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: posponer la liberaci\u00f3n del mapa interno cuando sea necesario Al actualizar o eliminar un mapa interno en la matriz de mapas o en el htab de mapas, a\u00fan se puede acceder al mapa mediante un programa que no se puede dormir o un programa que se puede dormir. . Sin embargo, bpf_map_fd_put_ptr() disminuye el contador de referencias del mapa interno directamente a trav\u00e9s de bpf_map_put(), si el contador de referencias es el \u00faltimo (lo cual es cierto en la mayor\u00eda de los casos), el mapa interno ser\u00e1 liberado por ops->map_free() en un kworker. Pero por ahora, la mayor\u00eda de las devoluciones de llamada .map_free() no usan sincronizar_rcu() o sus variantes para esperar a que transcurra el per\u00edodo de gracia de RCU, por lo que despu\u00e9s de que se completa la invocaci\u00f3n de ops->map_free, el programa bpf que accede al interior El mapa puede sufrir un problema de uso despu\u00e9s de su liberaci\u00f3n. Corrija la liberaci\u00f3n del mapa interno invocando bpf_map_free_deferred() despu\u00e9s de un per\u00edodo de gracia de RCU y un per\u00edodo de gracia de seguimiento de tareas de RCU si el mapa interno se elimin\u00f3 del mapa externo antes. El aplazamiento se logra utilizando call_rcu() o call_rcu_tasks_trace() al liberar el \u00faltimo contador de referencia del mapa bpf. El campo rcu_head reci\u00e9n agregado en bpf_map comparte el mismo espacio de almacenamiento con el campo de trabajo para reducir el tama\u00f1o de bpf_map."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.9.0",
|
||||
"versionEndExcluding": "6.1.75",
|
||||
"matchCriteriaId": "F138E9B6-24E6-403F-97D9-025AE266325F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndExcluding": "6.6.14",
|
||||
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionEndExcluding": "6.7.2",
|
||||
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/62fca83303d608ad4fec3f7428c8685680bb01b0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/876673364161da50eed6b472d746ef88242b2368",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bfd9b20c4862f41d4590fde11d70a5eeae53dcc5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f91cd728b10c51f6d4a39957ccd56d1e802fc8ee",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-223xx/CVE-2024-22346.json
Normal file
59
CVE-2024/CVE-2024-223xx/CVE-2024-22346.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-22346",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-14T19:15:49.333",
|
||||
"lastModified": "2024-03-14T20:11:36.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Db2 for IBM i 7.2, 7.3, 7.4, and 7.5 infrastructure could allow a local user to gain elevated privileges due to an unqualified library call. A malicious actor could cause user-controlled code to run with administrator privilege. IBM X-Force ID: 280203."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280203",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7140499",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23266",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:49.130",
|
||||
"lastModified": "2024-03-13T23:15:46.987",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-03-14T19:54:56.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,31 +14,117 @@
|
||||
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.0",
|
||||
"versionEndExcluding": "12.7.4",
|
||||
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.6.5",
|
||||
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214083",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214085",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23267",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:49.177",
|
||||
"lastModified": "2024-03-13T23:15:47.040",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-03-14T19:05:20.860",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,31 +14,117 @@
|
||||
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Es posible que una aplicaci\u00f3n pueda omitir ciertas preferencias de privacidad."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.0",
|
||||
"versionEndExcluding": "12.7.4",
|
||||
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.6.5",
|
||||
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214083",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214085",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23268",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:49.223",
|
||||
"lastModified": "2024-03-13T23:15:47.090",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-03-14T19:05:36.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,31 +14,117 @@
|
||||
"value": "Se solucion\u00f3 un problema de inyecci\u00f3n con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Es posible que una aplicaci\u00f3n pueda elevar los privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.0",
|
||||
"versionEndExcluding": "12.7.4",
|
||||
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.6.5",
|
||||
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214083",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214085",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23270",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:49.320",
|
||||
"lastModified": "2024-03-13T23:15:47.197",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-03-14T19:06:02.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,43 +14,156 @@
|
||||
"value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Monterey 12.7.4, macOS Ventura 13.6.5, macOS Sonoma 14.4, iOS 17.4 y iPadOS 17.4, tvOS 17.4. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "CE5413B9-A1A8-499F-B047-163908202E69"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.0",
|
||||
"versionEndExcluding": "12.7.4",
|
||||
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.6.5",
|
||||
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214081",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214083",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214085",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214086",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23272",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:49.360",
|
||||
"lastModified": "2024-03-13T23:15:47.253",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-03-14T19:54:08.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,31 +14,117 @@
|
||||
"value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Un usuario puede obtener acceso a partes protegidas del sistema de archivos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.0",
|
||||
"versionEndExcluding": "12.7.4",
|
||||
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.6.5",
|
||||
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214083",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214085",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23273",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:49.410",
|
||||
"lastModified": "2024-03-13T21:15:57.747",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-03-14T19:54:26.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,27 +14,114 @@
|
||||
"value": "Esta cuesti\u00f3n se abord\u00f3 mediante una mejor gesti\u00f3n de estado. Este problema se solucion\u00f3 en Safari 17.4, iOS 17.4 y iPadOS 17.4, macOS Sonoma 14.4. Se puede acceder a las pesta\u00f1as de navegaci\u00f3n privada sin autenticaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "DC7753BA-5DF8-4F98-8DA8-69DA473F8307"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "CE5413B9-A1A8-499F-B047-163908202E69"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/20",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214081",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214089",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23274",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:49.467",
|
||||
"lastModified": "2024-03-13T23:15:47.310",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-03-14T19:54:38.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,31 +14,117 @@
|
||||
"value": "Se solucion\u00f3 un problema de inyecci\u00f3n con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Es posible que una aplicaci\u00f3n pueda elevar los privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.0",
|
||||
"versionEndExcluding": "12.7.4",
|
||||
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.6.5",
|
||||
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214083",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214085",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23275",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:49.510",
|
||||
"lastModified": "2024-03-13T23:15:47.363",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-03-14T20:34:02.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,31 +14,117 @@
|
||||
"value": "Se abord\u00f3 una condici\u00f3n de ejecuci\u00f3n con validaci\u00f3n adicional. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Es posible que una aplicaci\u00f3n pueda acceder a datos de usuario protegidos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.0",
|
||||
"versionEndExcluding": "12.7.4",
|
||||
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.6.5",
|
||||
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214083",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214085",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23276",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:49.557",
|
||||
"lastModified": "2024-03-13T23:15:47.420",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-03-14T20:34:18.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,31 +14,117 @@
|
||||
"value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Es posible que una aplicaci\u00f3n pueda elevar los privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.0",
|
||||
"versionEndExcluding": "12.7.4",
|
||||
"matchCriteriaId": "079C046D-9CEF-4B49-B1BB-D0376801198D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.6.5",
|
||||
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214083",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214085",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23277",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:49.600",
|
||||
"lastModified": "2024-03-13T21:15:57.963",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-03-14T20:34:31.303",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,19 +14,96 @@
|
||||
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.4, iOS 17.4 y iPadOS 17.4. Un atacante en una posici\u00f3n privilegiada en la red puede inyectar pulsaciones de teclas falsificando un teclado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "17.0",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "D7861A7B-8A4A-4FB2-9CBE-8B3CDBC9FFCE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "C2FE8515-300C-4B6F-92A0-7D1E6D93F907"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214081",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-238xx/CVE-2024-23823.json
Normal file
63
CVE-2024/CVE-2024-238xx/CVE-2024-23823.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-23823",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-14T19:15:49.560",
|
||||
"lastModified": "2024-03-14T20:11:36.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "vantage6 is an open source framework built to enable, manage and deploy privacy enhancing technologies like Federated Learning and Multi-Party Computation. The vantage6 server has no restrictions on CORS settings. It should be possible for people to set the allowed origins of the server. The impact is limited because v6 does not use session cookies. This issue has been addressed in commit `70bb4e1d8` and is expected to ship in subsequent releases. Users are advised to upgrade as soon as a new release is available. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-942"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vantage6/vantage6/commit/70bb4e1d889230a841eb364d6c03accd7dd01a41",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-4946-85pr-fvxh",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-245xx/CVE-2024-24562.json
Normal file
63
CVE-2024/CVE-2024-245xx/CVE-2024-24562.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-24562",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-14T19:15:49.767",
|
||||
"lastModified": "2024-03-14T20:11:36.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "vantage6-UI is the official user interface for the vantage6 server. In affected versions a number of security headers are not set. This issue has been addressed in commit `68dfa6614` which is expected to be included in future releases. Users are advised to upgrade when a new release is made. While an upgrade path is not available users may modify the docker image build to insert the headers into nginx.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vantage6/vantage6-UI/commit/68dfa661415182da0e5717bd58db3d00aedcbd2e",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vantage6/vantage6-UI/security/advisories/GHSA-gwq3-pvwq-4c9w",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-247xx/CVE-2024-24770.json
Normal file
67
CVE-2024/CVE-2024-247xx/CVE-2024-24770.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-24770",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-14T19:15:49.973",
|
||||
"lastModified": "2024-03-14T20:11:36.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "vantage6 is an open source framework built to enable, manage and deploy privacy enhancing technologies like Federated Learning and Multi-Party Computation. Much like GHSA-45gq-q4xh-cp53, it is possible to find which usernames exist in vantage6 by calling the API routes `/recover/lost` and `/2fa/lost`. These routes send emails to users if they have lost their password or MFA token. This issue has been addressed in commit `aecfd6d0e` and is expected to ship in subsequent releases. Users are advised to upgrade as soon as a new release is available. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-208"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vantage6/vantage6/commit/aecfd6d0e83165a41a60ebd52d2287b0217be26b",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-45gq-q4xh-cp53",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-5h3x-6gwf-73jm",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26585",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-21T15:15:09.467",
|
||||
"lastModified": "2024-03-11T18:15:18.553",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-03-14T20:18:37.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,19 +14,89 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: tls: corrige la ejecuci\u00f3n entre la programaci\u00f3n de trabajo de transmisi\u00f3n y el cierre del socket De manera similar a el commit anterior, el hilo de env\u00edo (recvmsg/sendmsg) puede cerrarse tan pronto como el controlador de cifrado as\u00edncrono llame a complete(). Reordene la programaci\u00f3n del trabajo antes de llamar a complete(). En primer lugar, esto parece m\u00e1s l\u00f3gico, ya que es el orden inverso de lo que har\u00e1 el hilo de env\u00edo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20.0",
|
||||
"versionEndExcluding": "6.6.18",
|
||||
"matchCriteriaId": "4EC1F1D5-8364-4C12-AB58-595F84A06381"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionEndExcluding": "6.7.6",
|
||||
"matchCriteriaId": "0C8D1FAD-4D5D-4A25-B058-2AD15082710E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6db22d6c7a6dc914b12c0469b94eb639b6a8a146",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e327ed60bff4a991cd7a709c47c4f0c5b4a4fd57",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-272xx/CVE-2024-27265.json
Normal file
59
CVE-2024/CVE-2024-272xx/CVE-2024-27265.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-27265",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-14T19:15:50.200",
|
||||
"lastModified": "2024-03-14T20:11:36.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Integration Bus for z/OS 10.1 through 10.1.0.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 284564."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284564",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7140678",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-272xx/CVE-2024-27266.json
Normal file
59
CVE-2024/CVE-2024-272xx/CVE-2024-27266.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-27266",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-14T19:15:50.420",
|
||||
"lastModified": "2024-03-14T20:11:36.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Maximo Application Suite 7.6.1.3 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 284566."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284566",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7141270",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-273xx/CVE-2024-27301.json
Normal file
59
CVE-2024/CVE-2024-273xx/CVE-2024-27301.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-27301",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-14T19:15:50.680",
|
||||
"lastModified": "2024-03-14T20:11:36.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Support App is an opensource application specialized in managing Apple devices. It's possible to abuse a vulnerability inside the postinstall installer script to make the installer execute arbitrary code as root. The cause of the vulnerability is the fact that the shebang `#!/bin/zsh` is being used. When the installer is executed it asks for the users password to be executed as root. However, it'll still be using the $HOME of the user and therefore loading the file `$HOME/.zshenv` when the `postinstall` script is executed.\nAn attacker could add malicious code to `$HOME/.zshenv` and it will be executed when the app is installed. An attacker may leverage this vulnerability to escalate privilege on the system. This issue has been addressed in version 2.5.1 Rev 2. All users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/root3nl/SupportApp/commit/e866b2aa4028f6a982977f462c0f7550d952c5d0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/root3nl/SupportApp/security/advisories/GHSA-jr78-247f-rhqc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28181",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-14T18:15:07.107",
|
||||
"lastModified": "2024-03-14T18:15:07.107",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-03-14T20:11:36.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2024/CVE-2024-284xx/CVE-2024-28423.json
Normal file
20
CVE-2024/CVE-2024-284xx/CVE-2024-28423.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-28423",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-14T19:15:50.877",
|
||||
"lastModified": "2024-03-14T20:11:36.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Airflow-Diagrams v2.1.0 was discovered to contain an arbitrary file upload vulnerability in the unsafe_load function at cli.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted YML file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/bayuncao/vul-cve-15",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-284xx/CVE-2024-28424.json
Normal file
20
CVE-2024/CVE-2024-284xx/CVE-2024-28424.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-28424",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-14T19:15:50.930",
|
||||
"lastModified": "2024-03-14T20:11:36.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "zenml v0.55.4 was discovered to contain an arbitrary file upload vulnerability in the load function at /materializers/cloudpickle_materializer.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/bayuncao/vul-cve-18",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-284xx/CVE-2024-28425.json
Normal file
20
CVE-2024/CVE-2024-284xx/CVE-2024-28425.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-28425",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-14T19:15:50.980",
|
||||
"lastModified": "2024-03-14T20:11:36.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "greykite v1.0.0 was discovered to contain an arbitrary file upload vulnerability in the load_obj function at /templates/pickle_utils.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/bayuncao/vul-cve-17",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
62
README.md
62
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-14T19:00:38.502669+00:00
|
||||
2024-03-14T21:00:38.303657+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-14T18:15:07.107000+00:00
|
||||
2024-03-14T20:34:31.303000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,35 +29,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
241515
|
||||
241526
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
* [CVE-2023-22655](CVE-2023/CVE-2023-226xx/CVE-2023-22655.json) (`2024-03-14T17:15:49.930`)
|
||||
* [CVE-2023-27502](CVE-2023/CVE-2023-275xx/CVE-2023-27502.json) (`2024-03-14T17:15:50.147`)
|
||||
* [CVE-2023-28389](CVE-2023/CVE-2023-283xx/CVE-2023-28389.json) (`2024-03-14T17:15:50.333`)
|
||||
* [CVE-2023-28746](CVE-2023/CVE-2023-287xx/CVE-2023-28746.json) (`2024-03-14T17:15:50.533`)
|
||||
* [CVE-2023-32282](CVE-2023/CVE-2023-322xx/CVE-2023-32282.json) (`2024-03-14T17:15:50.740`)
|
||||
* [CVE-2023-32633](CVE-2023/CVE-2023-326xx/CVE-2023-32633.json) (`2024-03-14T17:15:50.917`)
|
||||
* [CVE-2023-32666](CVE-2023/CVE-2023-326xx/CVE-2023-32666.json) (`2024-03-14T17:15:51.140`)
|
||||
* [CVE-2023-35191](CVE-2023/CVE-2023-351xx/CVE-2023-35191.json) (`2024-03-14T17:15:51.333`)
|
||||
* [CVE-2023-38575](CVE-2023/CVE-2023-385xx/CVE-2023-38575.json) (`2024-03-14T17:15:51.527`)
|
||||
* [CVE-2023-39368](CVE-2023/CVE-2023-393xx/CVE-2023-39368.json) (`2024-03-14T17:15:51.713`)
|
||||
* [CVE-2023-43490](CVE-2023/CVE-2023-434xx/CVE-2023-43490.json) (`2024-03-14T17:15:51.910`)
|
||||
* [CVE-2024-1998](CVE-2024/CVE-2024-19xx/CVE-2024-1998.json) (`2024-03-14T18:15:07.003`)
|
||||
* [CVE-2024-28181](CVE-2024/CVE-2024-281xx/CVE-2024-28181.json) (`2024-03-14T18:15:07.107`)
|
||||
* [CVE-2024-28849](CVE-2024/CVE-2024-288xx/CVE-2024-28849.json) (`2024-03-14T17:15:52.097`)
|
||||
* [CVE-2023-42938](CVE-2023/CVE-2023-429xx/CVE-2023-42938.json) (`2024-03-14T19:15:49.270`)
|
||||
* [CVE-2024-22346](CVE-2024/CVE-2024-223xx/CVE-2024-22346.json) (`2024-03-14T19:15:49.333`)
|
||||
* [CVE-2024-23823](CVE-2024/CVE-2024-238xx/CVE-2024-23823.json) (`2024-03-14T19:15:49.560`)
|
||||
* [CVE-2024-24562](CVE-2024/CVE-2024-245xx/CVE-2024-24562.json) (`2024-03-14T19:15:49.767`)
|
||||
* [CVE-2024-24770](CVE-2024/CVE-2024-247xx/CVE-2024-24770.json) (`2024-03-14T19:15:49.973`)
|
||||
* [CVE-2024-27265](CVE-2024/CVE-2024-272xx/CVE-2024-27265.json) (`2024-03-14T19:15:50.200`)
|
||||
* [CVE-2024-27266](CVE-2024/CVE-2024-272xx/CVE-2024-27266.json) (`2024-03-14T19:15:50.420`)
|
||||
* [CVE-2024-27301](CVE-2024/CVE-2024-273xx/CVE-2024-27301.json) (`2024-03-14T19:15:50.680`)
|
||||
* [CVE-2024-28423](CVE-2024/CVE-2024-284xx/CVE-2024-28423.json) (`2024-03-14T19:15:50.877`)
|
||||
* [CVE-2024-28424](CVE-2024/CVE-2024-284xx/CVE-2024-28424.json) (`2024-03-14T19:15:50.930`)
|
||||
* [CVE-2024-28425](CVE-2024/CVE-2024-284xx/CVE-2024-28425.json) (`2024-03-14T19:15:50.980`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `34`
|
||||
|
||||
* [CVE-2023-50168](CVE-2023/CVE-2023-501xx/CVE-2023-50168.json) (`2024-03-14T18:11:35.910`)
|
||||
* [CVE-2024-25139](CVE-2024/CVE-2024-251xx/CVE-2024-25139.json) (`2024-03-14T18:11:35.910`)
|
||||
* [CVE-2017-16529](CVE-2017/CVE-2017-165xx/CVE-2017-16529.json) (`2024-03-14T19:58:06.937`)
|
||||
* [CVE-2017-16530](CVE-2017/CVE-2017-165xx/CVE-2017-16530.json) (`2024-03-14T19:57:49.287`)
|
||||
* [CVE-2017-16532](CVE-2017/CVE-2017-165xx/CVE-2017-16532.json) (`2024-03-14T19:57:34.803`)
|
||||
* [CVE-2022-1386](CVE-2022/CVE-2022-13xx/CVE-2022-1386.json) (`2024-03-14T19:58:30.707`)
|
||||
* [CVE-2022-44117](CVE-2022/CVE-2022-441xx/CVE-2022-44117.json) (`2024-03-14T19:15:49.147`)
|
||||
* [CVE-2023-48985](CVE-2023/CVE-2023-489xx/CVE-2023-48985.json) (`2024-03-14T19:02:42.210`)
|
||||
* [CVE-2023-48986](CVE-2023/CVE-2023-489xx/CVE-2023-48986.json) (`2024-03-14T19:02:47.760`)
|
||||
* [CVE-2023-48987](CVE-2023/CVE-2023-489xx/CVE-2023-48987.json) (`2024-03-14T19:03:10.113`)
|
||||
* [CVE-2023-52443](CVE-2023/CVE-2023-524xx/CVE-2023-52443.json) (`2024-03-14T20:16:02.947`)
|
||||
* [CVE-2023-52444](CVE-2023/CVE-2023-524xx/CVE-2023-52444.json) (`2024-03-14T20:13:28.070`)
|
||||
* [CVE-2023-52445](CVE-2023/CVE-2023-524xx/CVE-2023-52445.json) (`2024-03-14T20:13:50.727`)
|
||||
* [CVE-2023-52446](CVE-2023/CVE-2023-524xx/CVE-2023-52446.json) (`2024-03-14T19:47:14.733`)
|
||||
* [CVE-2023-52447](CVE-2023/CVE-2023-524xx/CVE-2023-52447.json) (`2024-03-14T19:46:43.030`)
|
||||
* [CVE-2024-23266](CVE-2024/CVE-2024-232xx/CVE-2024-23266.json) (`2024-03-14T19:54:56.477`)
|
||||
* [CVE-2024-23267](CVE-2024/CVE-2024-232xx/CVE-2024-23267.json) (`2024-03-14T19:05:20.860`)
|
||||
* [CVE-2024-23268](CVE-2024/CVE-2024-232xx/CVE-2024-23268.json) (`2024-03-14T19:05:36.077`)
|
||||
* [CVE-2024-23270](CVE-2024/CVE-2024-232xx/CVE-2024-23270.json) (`2024-03-14T19:06:02.210`)
|
||||
* [CVE-2024-23272](CVE-2024/CVE-2024-232xx/CVE-2024-23272.json) (`2024-03-14T19:54:08.100`)
|
||||
* [CVE-2024-23273](CVE-2024/CVE-2024-232xx/CVE-2024-23273.json) (`2024-03-14T19:54:26.287`)
|
||||
* [CVE-2024-23274](CVE-2024/CVE-2024-232xx/CVE-2024-23274.json) (`2024-03-14T19:54:38.937`)
|
||||
* [CVE-2024-23275](CVE-2024/CVE-2024-232xx/CVE-2024-23275.json) (`2024-03-14T20:34:02.077`)
|
||||
* [CVE-2024-23276](CVE-2024/CVE-2024-232xx/CVE-2024-23276.json) (`2024-03-14T20:34:18.527`)
|
||||
* [CVE-2024-23277](CVE-2024/CVE-2024-232xx/CVE-2024-23277.json) (`2024-03-14T20:34:31.303`)
|
||||
* [CVE-2024-26585](CVE-2024/CVE-2024-265xx/CVE-2024-26585.json) (`2024-03-14T20:18:37.957`)
|
||||
* [CVE-2024-28181](CVE-2024/CVE-2024-281xx/CVE-2024-28181.json) (`2024-03-14T20:11:36.180`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
109
_state.csv
109
_state.csv
@ -53778,7 +53778,7 @@ CVE-2012-2139,0,0,984c4b7ae0775adb31a02640a89e585f935ababe476d14773d6883dc49bf0a
|
||||
CVE-2012-2140,0,0,2601668e1527e957894c8bfe9543a12ded146c76969dc9d9beafff73e2f8534c,2012-10-30T04:03:55.957000
|
||||
CVE-2012-2141,0,0,dc81a2a29f0f4100f436fac3db5d5f4d8d39e66584c79e4d052bc7734c7ab9fb,2017-08-29T01:31:31.320000
|
||||
CVE-2012-2142,0,0,f8a1101daf60d26197dcb2716c276c5485d5b981f95c821f3062c253b713984f,2020-01-15T18:30:49.553000
|
||||
CVE-2012-2143,0,0,2ef0b5018700a8b0c5fc9d75acb558f5f821d5612f17c832455d146b86eb0b90,2023-11-07T02:10:24.710000
|
||||
CVE-2012-2143,0,1,5814b1dd3a2d42b6a88c77b6692f838f1affce05c409407d363ea6453162a0a0,2024-03-14T19:59:00.810000
|
||||
CVE-2012-2144,0,0,beed0b8d7dcf2c388c3f4b772340fe400bbb31961a586112669f5edda8d42d62,2017-08-29T01:31:31.383000
|
||||
CVE-2012-2145,0,0,59177855dca47d5a77c50f32cbfd58ac06b41aa8c49d025e5d52bbb66b7a4ab4,2017-08-29T01:31:31.553000
|
||||
CVE-2012-2146,0,0,5414b071ba62ce0b60733f75698fbfad77b5825d9161c3d19e4d9c4284244ad0,2012-08-27T04:00:00
|
||||
@ -67384,7 +67384,7 @@ CVE-2014-3181,0,0,aa3e985adec606598f7b1cc70998ebb9f21e7854fed983898ec66ed85a3582
|
||||
CVE-2014-3182,0,0,1065355378850f0fa4e362c4d6dbdb97ef49237278915fe485f8a8425995ffa6,2023-12-29T15:41:33.040000
|
||||
CVE-2014-3183,0,0,c53b674df49ab478f14a0c2468570db5a142e871bc11b3809959aa51a0592a01,2023-12-29T15:42:53.263000
|
||||
CVE-2014-3184,0,0,ffa96254e9f6d46615af3b070fb42b23ed98d088f98ae710abfc16b99aacd19d,2023-11-07T02:19:57.193000
|
||||
CVE-2014-3185,0,0,7c1829148495d8e58a9357f349d09ad835c1cc3064293c3ff6f8e24ebb36759c,2024-02-15T15:58:06.067000
|
||||
CVE-2014-3185,0,1,23ae04239913b1938fba67792202f3bdb3295fcd6170e1e73c6805c3c2acd062,2024-03-14T19:58:39.097000
|
||||
CVE-2014-3186,0,0,7fcf2995a50dd6aeec56ec416821e98cf4d614818f5582242b5be5c09ad187d4,2023-11-07T02:19:57.983000
|
||||
CVE-2014-3187,0,0,7d76e0a56412c019feea780c3cd87bfe77c21eab45a3e514f795f12f26fbad86,2023-11-07T02:19:58.363000
|
||||
CVE-2014-3188,0,0,c5fa7bbbabd9906f4431c03ba21f780272afdab5805d2650eb3aa936484cab8c,2023-11-07T02:19:58.767000
|
||||
@ -73033,7 +73033,7 @@ CVE-2014-9525,0,0,b805d7cdd5fa0487e91d2a2b9a1124a91c3aeba0c63b863d4c911066c6f611
|
||||
CVE-2014-9526,0,0,435b57edb4972dc90bc966bf8a5bf736ca410523a6562101ca64edff1186087d,2021-07-15T20:42:44.600000
|
||||
CVE-2014-9527,0,0,8bbf1fa538acbae77c65bd80dac8ef2b9d35bf1088a428f7f1e899b9e23abdd4,2017-02-11T02:59:00.433000
|
||||
CVE-2014-9528,0,0,1a2572e28e529288c8356a7c5cb5fbc713f6c9f36c1eeb0aefe1cea521591c58,2017-09-08T01:29:35.887000
|
||||
CVE-2014-9529,0,0,e948acdd842725ffa4fc4587d856f98bc5711b7daaddf4d2ce09f6f9ea3c9ffc,2023-11-07T02:23:06.510000
|
||||
CVE-2014-9529,0,1,e73b8c73136a150a4cff2bd3bb7e0cb049bbbfafba3261d027208ffc2beff026,2024-03-14T19:58:34.480000
|
||||
CVE-2014-9530,0,0,c6cba533aeb03c353ee3e1f34d0439055e49c87af9993b4102ff6de13a70dbbe,2020-02-10T15:12:13.393000
|
||||
CVE-2014-9556,0,0,3e81b637bf4fd278022750c8e13c65da1a98420d830168eae6302f1b05243abd,2018-10-30T16:27:35.843000
|
||||
CVE-2014-9557,0,0,7c2c09c7267e2717e325be0d8b26074c252400fb8c4cc905b6956e11c2156529,2020-10-02T14:56:02.080000
|
||||
@ -76081,7 +76081,7 @@ CVE-2015-2662,0,0,fb7494814e746cb389a18cff8011311fa7f3fdca89946200e7802a0415cad4
|
||||
CVE-2015-2663,0,0,08bb778014c3bff373c7ffaaba33ee8ae5842e53b3c637ad1090df0487a9795f,2016-12-28T02:59:07.760000
|
||||
CVE-2015-2664,0,0,7cfc84b0c90e27714ade565e96f6a5b7f550a00cc2d941da8d723b886781783f,2022-05-13T14:38:25.750000
|
||||
CVE-2015-2665,0,0,b3a1f911d90f55463a2e9ab38cb150ab8c63bf470b997b99a24b93fc973f365d,2017-11-04T01:29:03.803000
|
||||
CVE-2015-2666,0,0,73425351de28000346779f7adb93b6c6a5795654b728d4a4904065b8b3568cae,2023-11-07T02:25:24.123000
|
||||
CVE-2015-2666,0,1,40ee1ff2b754565647f9e21b25cf98140ca09dca9f9824e19af886acc5356391,2024-03-14T19:59:23.823000
|
||||
CVE-2015-2667,0,0,a19b9a8fdec094ac9d4367b481edaff5195c43f7ea41f8bd35cfda12b69ade1f,2016-12-03T03:05:35.877000
|
||||
CVE-2015-2668,0,0,30c183136d9d073618248b860ea36dffff45c62bde6f18d6bad442f969a57cf8,2017-01-03T02:59:53.693000
|
||||
CVE-2015-2670,0,0,f594eae4d851ee6a69c7b146ceec356a32e042b1867024680a3f582c4aa32c9a,2023-11-07T02:25:24.210000
|
||||
@ -78117,7 +78117,7 @@ CVE-2015-5153,0,0,0baebbe4098bd372dbffa5b48b3144632fdc40947c30f94e993ae6d4c3f2c2
|
||||
CVE-2015-5154,0,0,8b36dec783cce421f9dc0825541ba60ffc39b839aa33c080f0f79e04dc076944,2023-02-13T00:50:03.297000
|
||||
CVE-2015-5155,0,0,8b58c6ea00c2dfd3160e24e0848f50e25245e53a901c884382815a9c80bd67da,2023-11-07T02:26:02.437000
|
||||
CVE-2015-5156,0,0,593800a6b86edc6bba4a8464098c2b19cd63e936d00c2671dfcc5d23c3bfe16a,2023-02-12T23:15:33.560000
|
||||
CVE-2015-5157,0,0,c27ac808faeb962d4861a3fe186386b165a9f2c3089dbc8d260cdb84fffe03b8,2024-02-15T18:55:32.183000
|
||||
CVE-2015-5157,0,1,6b070489ddca8da31523b6124e860ea808626f50604403553c906e969f9a2fc5,2024-03-14T19:58:51.427000
|
||||
CVE-2015-5158,0,0,d7f67534383c53b250bf278ee0a6febdb78972554338d2b31a19c9cc569a04ee,2020-09-08T13:54:32.183000
|
||||
CVE-2015-5159,0,0,92467559f1dcf0d7719103578db41b1b6b29f8c706a7c6f0cd0c964bbe606470,2018-12-07T21:25:23.667000
|
||||
CVE-2015-5160,0,0,cd2a895e9b033861eb1249daf5d62f485366a8ba44a323d0eb8a5a6146db8c94,2020-10-15T13:28:10.487000
|
||||
@ -85503,7 +85503,7 @@ CVE-2016-2139,0,0,69f1139f7ab0c3863d8413d0ffe94abb6433bbd4ac1e4e47344c5e22efe6dc
|
||||
CVE-2016-2140,0,0,d9d369535c8f9d8388075f73707385baf9261f68d71db52b49a0455dd7d08123,2023-02-13T04:50:04.637000
|
||||
CVE-2016-2141,0,0,0832c5fe3c85822ef6448abc6958a68ebca691d6c8426b471fc22ac68caee373,2023-11-07T02:30:59.747000
|
||||
CVE-2016-2142,0,0,27c8be83ab38d73c93371a22038eecb01023f2d993bc3bfae293379dfeb3f7f3,2023-02-13T04:50:04.830000
|
||||
CVE-2016-2143,0,0,5b22fb96690c7b1f5e584f692d80f3225439038fbd4dbaffaf7c32ac456cb957,2023-02-12T23:17:31.203000
|
||||
CVE-2016-2143,0,1,0f5085db5f5d2ca11da53d0177fa962251a1c86e2f92690cb32e4134dcac727c,2024-03-14T19:59:19.913000
|
||||
CVE-2016-2144,0,0,d66ee59b908303906fa193e77e7a0b06aa3489055b433a35365698c8e666b221,2023-11-07T02:30:59.907000
|
||||
CVE-2016-2145,0,0,43bfca453101eac0310e5f1682c3945b12a0fd9e6083d1e2ba273468c787fb68,2016-04-25T13:54:12.710000
|
||||
CVE-2016-2146,0,0,05716eb30fe61a470722509690d5ae279cd2429350021124c321eedc99f2642a,2016-04-25T13:58:22.127000
|
||||
@ -94628,7 +94628,7 @@ CVE-2017-10658,0,0,1eeea7c117ffe697abfea9e4f0d3080fa2bc998e664738f5c170b913636cc
|
||||
CVE-2017-10659,0,0,81d51e8dd922fd32e2305a8c164c997d5e23ac88a66a6e86ce8db490ef0d016f,2023-11-07T02:38:05.490000
|
||||
CVE-2017-1066,0,0,c1246725b7092544fba1e0c71c759cc79d9379ac7e40741f19cd6af795e53f82,2023-11-07T02:42:15.790000
|
||||
CVE-2017-10660,0,0,2bdd4dffb0b1bef2c244fc01599598a269be6daaf9e1141a9bddb3d4338831b8,2023-11-07T02:38:05.727000
|
||||
CVE-2017-10661,0,0,ef834c2ce81f5d611c904dd5238a5ecd072f6fc21e9c4b6af4590246b8551cd5,2018-10-31T10:29:04.183000
|
||||
CVE-2017-10661,0,1,6bab819bfe99671d3159b3845ec59baa36a743b841c38ff97a0beef0b8b526de,2024-03-14T19:59:04.977000
|
||||
CVE-2017-10662,0,0,77ffb25c18063dc98f0734ed01a4ae033ddc61c74c4650e3a4d142d1f20e8a0e,2023-01-17T21:02:22.613000
|
||||
CVE-2017-10663,0,0,67c18a2216925903cb511894ac8bc9dcfb4bbe2bde003d656270c522b7012046,2023-01-17T21:02:26.967000
|
||||
CVE-2017-10664,0,0,6fe180f572f0ea909a2a9b9aaa44d4b082b25b5163b37727a491898fdcfda271,2021-08-04T17:15:35.690000
|
||||
@ -99892,13 +99892,13 @@ CVE-2017-16523,0,0,d95db1c8062a06299f99280af3cfc0d941caf67e7bbd8d958a71733c17af5
|
||||
CVE-2017-16524,0,0,05be074c96930d592b147770ef67f41a1267ef4cd3c7c99310c76f297a6a0517,2017-11-29T14:57:17.200000
|
||||
CVE-2017-16525,0,0,bfdaa413f28d8628a6390c54d10b60a9f78ccedd181cafe305f0df15944a5919,2018-03-16T01:29:06.623000
|
||||
CVE-2017-16526,0,0,1ed30e68b2105b845afa0d05594a8578ecbb2ac127cefdaa40556442627c8c4b,2023-01-19T15:46:23.587000
|
||||
CVE-2017-16527,0,0,c7653ce417155493158a5dc0edaf0234c5aaaf7d392c8561fcea30ae80256ac1,2018-08-24T10:29:00.850000
|
||||
CVE-2017-16528,0,0,64f63475c05b22c6340c38e1e1d8797f954789cd6907537612fbd3d8a2c35eab,2018-04-07T01:29:03.030000
|
||||
CVE-2017-16529,0,0,b19fca12ff996e2b33ebc8c01469b57d3e4cf66f9f31dd76bd2d241abaaa65d7,2018-08-24T10:29:00.927000
|
||||
CVE-2017-16527,0,1,ad8dee89187e8cd109dadf20839dd92569bc5eae25c0d1346aa0fb2bcfc8e1fd,2024-03-14T19:58:25.543000
|
||||
CVE-2017-16528,0,1,9b8d28344fd6b4789eea6decc2a08e00ca9da27f4f464aa3e17e848936ee9649,2024-03-14T19:58:15.687000
|
||||
CVE-2017-16529,0,1,ebfc5c2f5f9fd2e3f933334b5ef8fc7b3e41251c85921ab64dd70b37124e7fa6,2024-03-14T19:58:06.937000
|
||||
CVE-2017-1653,0,0,5d155a981912d14a9cf2e8ffc2ee7b3380547c370c8aa338ff87ed78a3e50484,2018-02-09T20:06:20.293000
|
||||
CVE-2017-16530,0,0,0fd552a24a6bca9d76bb37ff6540a254a32c1c9f8eb9114906a439f7568d7434,2017-11-17T13:52:21.493000
|
||||
CVE-2017-16530,0,1,18ea7c7a08377727218f1528930a59c889e5d224ce124425ce1db0e7444efff3,2024-03-14T19:57:49.287000
|
||||
CVE-2017-16531,0,0,c9eff74f8a0d36a29aec6f8c7e8bc4b858867550c8cfd5d1db94212f1831b900,2018-08-24T10:29:00.977000
|
||||
CVE-2017-16532,0,0,7b23df5ddf25d290d3fec68559a8af7fa119c3808fc38f0d1d51bd2cd65b5fc2,2018-08-24T10:29:01.053000
|
||||
CVE-2017-16532,0,1,3588934afdf6e5d6017233dcca320337dfd8e0ac3db9a714998040fd7f20b1f0,2024-03-14T19:57:34.803000
|
||||
CVE-2017-16533,0,0,24719bf582848a36a09a381721c241ea0e9e6114790ea4c87c793de5d175fd79,2024-03-12T17:38:46.927000
|
||||
CVE-2017-16534,0,0,e4c1911bea10629f65a092172e685b38877cdae370d385b51e016402a251a574,2024-02-16T18:54:37.580000
|
||||
CVE-2017-16535,0,0,09991051c7784e21613f9dd58873c136258599d0da074e1829329a0901f2ea47,2018-08-24T10:29:01.163000
|
||||
@ -188090,7 +188090,7 @@ CVE-2022-1382,0,0,1149c104bc49f24408a77430f7a353ca7b0345d958816f968666f92001fdf7
|
||||
CVE-2022-1383,0,0,b224c08df14908179da8b2e09582b6b81d0ff548250975fb4c9be7d33378554c,2022-04-26T16:26:45.990000
|
||||
CVE-2022-1384,0,0,1415a295f05328ce23ab8b6877f7d947245a3e6b95489baf35e44a214d14000d,2022-04-27T17:36:56.747000
|
||||
CVE-2022-1385,0,0,880b0db02f470ff675b6a52cc2cc00f84e11d8751914d004cb784de6fe76e08b,2022-04-27T21:19:41.490000
|
||||
CVE-2022-1386,0,0,041df00f6943065456d12b5a005b948ce611d454314367fc242bdb4034c2215a,2022-05-24T19:00:51.517000
|
||||
CVE-2022-1386,0,1,c6a67d1cabd4f6eceb7581bd0db197161f2162ac5d4523e2c10ed37125ba6bad,2024-03-14T19:58:30.707000
|
||||
CVE-2022-1387,0,0,4d05a825be5f5d8b4d4e31c77cfcc24a716fbde55dcae05615ebf6caa1e9ac6c,2022-06-08T17:15:20.900000
|
||||
CVE-2022-1388,0,0,05b9bd31c8d6f10cc3cfc115213e30cbbd23ef8946f53024de76f81b9740e5da,2023-11-02T01:54:15.380000
|
||||
CVE-2022-1389,0,0,a5e0b8b79b52bc114930aa8417a1927ddb5ba1940c11df7e912094ee96fe29db,2022-05-16T14:29:24.527000
|
||||
@ -208376,7 +208376,7 @@ CVE-2022-44097,0,0,090053ac7942d89c7cdfc6491e7eb2590d1a234bd9cf8bc3d2dd87d1e5b4f
|
||||
CVE-2022-4410,0,0,e6f9e6f0547a27515851728fcdc51f3af687786161efa4759d7a4cf0bd64134b,2023-11-07T03:57:46.890000
|
||||
CVE-2022-44108,0,0,88d51803a158689cd614622ac87e63622dd46521607d701b38fe84daddb37322,2022-12-27T19:01:58.520000
|
||||
CVE-2022-44109,0,0,35885c0768ee48303307107532e137695ddc7b016422d5d1d1ef9066c812cf76,2022-12-27T19:00:39.837000
|
||||
CVE-2022-44117,0,0,9e29ffc32510e158aeec94707435e3dacea5b9df6c04a654f710a28fe83db5c8,2022-11-28T19:34:03.263000
|
||||
CVE-2022-44117,0,1,2eff71db5d1d9aefbd1131a734e4007085cc4495bf742674fb9058549794029c,2024-03-14T19:15:49.147000
|
||||
CVE-2022-44118,0,0,834630b571a7729c42c24c36323d745bada75fd074f1ea71dff397b22ed3a5e0,2022-11-28T19:44:34.507000
|
||||
CVE-2022-44120,0,0,5dd936fbd3dc1647ab07d4dd0f11263a52430799ff1d6c40ee6f316d7d63e286,2022-11-28T19:38:56.377000
|
||||
CVE-2022-4413,0,0,1c9971a43499bd143ac88f379ebbdffb378dc29c0fff80a70e51e7ef83d0729e,2022-12-12T20:00:33.070000
|
||||
@ -215618,7 +215618,7 @@ CVE-2023-22651,0,0,71c4ad22d720a14f556cbdbb0dfeae4cea5ba5bc7c522362e29fd79de49a8
|
||||
CVE-2023-22652,0,0,f9dae7477af266a4991ad7fcc2726fab2cccec9452bb34792392a945c73e6b19,2023-09-13T03:15:07.693000
|
||||
CVE-2023-22653,0,0,a51dcac8d7628283af317fae95110ee2fc893a6c8b2b6ebf1624613b419371fc,2023-08-02T15:34:59.683000
|
||||
CVE-2023-22654,0,0,5b1a8feee98010e65bed848785e61db9d7b8c5ab9fbbb79f8736b9741ba8db64,2023-05-30T22:22:43.403000
|
||||
CVE-2023-22655,1,1,51900ded8832eb2324f2d36086f3237daae14112befcbe2bab2ea19a2c2fd734,2024-03-14T18:11:35.910000
|
||||
CVE-2023-22655,0,0,51900ded8832eb2324f2d36086f3237daae14112befcbe2bab2ea19a2c2fd734,2024-03-14T18:11:35.910000
|
||||
CVE-2023-22657,0,0,cfce11b504d6ee95538294305b0036182e95fb71bc119a8cd123783becc63ea7,2023-11-07T04:07:12.750000
|
||||
CVE-2023-22659,0,0,71d1f10cbb6b53df610f190613167a6c75fa7f817c0f72a1094380595ddd5133,2023-07-13T17:17:26.230000
|
||||
CVE-2023-2266,0,0,21c36958639008dc9b075634492f4955ca2430a255612c0db16c56bae462bdf1,2023-12-06T00:35:24.197000
|
||||
@ -219279,7 +219279,7 @@ CVE-2023-27499,0,0,ce3ef12308c64982399e023f649a859285e20cb1b38943d05a735c64ab7a3
|
||||
CVE-2023-2750,0,0,ead2b79aafb115882b74edc1fe401c5df2c2f93772e52be543bfb3417b082d26,2023-05-31T20:29:42.987000
|
||||
CVE-2023-27500,0,0,e761be0897c6f128c5d22bdd519d5df5ecbb799975b0b2a56857eb5e1fafa36b,2024-02-01T02:32:09.317000
|
||||
CVE-2023-27501,0,0,3a48b7718293713515650d58f8bc503e08b5e0af5cdc2bcacc0d2cec24892060,2023-04-11T04:16:06.350000
|
||||
CVE-2023-27502,1,1,8e2343a1d7e814d13f786554b3331085de16def8b6f905080017205088f86576,2024-03-14T18:11:35.910000
|
||||
CVE-2023-27502,0,0,8e2343a1d7e814d13f786554b3331085de16def8b6f905080017205088f86576,2024-03-14T18:11:35.910000
|
||||
CVE-2023-27505,0,0,84b7757529ffe0786cc24a50b318ee901867e4e6864f02da12a6e54cc6972fc7,2023-11-07T04:09:58.190000
|
||||
CVE-2023-27506,0,0,1f012013e1966bce73ebafa99cafd6aacbb0cff3da16432bdf425c6a6a56d0fb,2023-11-07T04:09:58.323000
|
||||
CVE-2023-27507,0,0,eb5451b311d5ea75dd7125a53961aa13d4ef228bed1c763182fec1f0a812744d,2023-05-30T15:33:26.400000
|
||||
@ -220047,7 +220047,7 @@ CVE-2023-28385,0,0,06b2e0ed9ede3db06b155ff85bcef2657f623d70b80aedda427ba62490112
|
||||
CVE-2023-28386,0,0,5f6dd7d724610b77ac2c1bcfd50d247a5413c4a4eb8d84b38afbc90ddc6f9114,2023-05-27T01:59:16.440000
|
||||
CVE-2023-28387,0,0,2bb0ab4d4fc306402b016f1f9cdb4868b82a9f603438a8259bb608ec5bf5a3d1,2023-07-07T18:24:25.427000
|
||||
CVE-2023-28388,0,0,36db410ef1b32b01aabe7d4cd5466d250ac7f27fc8ac045564d2c4c24772a286,2024-01-10T16:30:56.260000
|
||||
CVE-2023-28389,1,1,121ae92f8226b4a2957bcb34922a4b942c822aa30192d48d08322bd8190fdfaa,2024-03-14T18:11:35.910000
|
||||
CVE-2023-28389,0,0,121ae92f8226b4a2957bcb34922a4b942c822aa30192d48d08322bd8190fdfaa,2024-03-14T18:11:35.910000
|
||||
CVE-2023-2839,0,0,edb09150a8f34d1ed306bf6c484b1a2f2590f2f7df7d63e75a4345c934ac771a,2023-05-27T04:15:25.153000
|
||||
CVE-2023-28390,0,0,985499e8e05f7b59e3cd4ad36c6e14dc24bad969df6840cdf739006b8a2ce2f8,2023-05-30T16:19:29.097000
|
||||
CVE-2023-28391,0,0,4283b9ee39c0cb9acc5d9d46f0edd1835c7a124adc48e4b44d9e30ae2799bbd5,2023-11-17T18:25:39.223000
|
||||
@ -220388,7 +220388,7 @@ CVE-2023-28742,0,0,11bf10eb7cf86a06a042574721f5b6b130e4648b501c7e1966972cd6beeab
|
||||
CVE-2023-28743,0,0,238bbf9b259df274ba81e67424dffbab46ab9aec9c8d0c6dbba6388c5f5f6634,2024-01-30T15:17:58.250000
|
||||
CVE-2023-28744,0,0,cb5a4f36306b79a47f1780cb5ccb2cf8f4e1e731e30b27b9339b4dd6e9981cdb,2023-07-26T21:02:26.780000
|
||||
CVE-2023-28745,0,0,970767670fa87165626793d9cdf3e3c257da5465b4124ca532ef944e6986d546,2024-02-14T15:01:55.963000
|
||||
CVE-2023-28746,1,1,f459a789ceb18cd484af4a8be5172c81e61d9c6b9fb7e172e7d41a60dd0f382c,2024-03-14T18:11:35.910000
|
||||
CVE-2023-28746,0,0,f459a789ceb18cd484af4a8be5172c81e61d9c6b9fb7e172e7d41a60dd0f382c,2024-03-14T18:11:35.910000
|
||||
CVE-2023-28747,0,0,1f8971e91a3c69479baefed61244adab58b4c71337fe087d2b833da8d172bfc7,2023-12-01T03:48:15.443000
|
||||
CVE-2023-28748,0,0,ed7c6de8a0ffdbec666abde636114e42d7ebd13e048af0d6b7d4fa35920756d2,2023-11-10T04:19:54.407000
|
||||
CVE-2023-28749,0,0,8c1e27a9f22ac0dd71acbfe984f8107e6c3bc84444315708a6750aea99ae8044,2023-11-27T22:08:00.970000
|
||||
@ -222844,7 +222844,7 @@ CVE-2023-32279,0,0,7ca0f3be69d291418a8e235f559e48bffb0eacc8d1adce9490c3d8820b7ed
|
||||
CVE-2023-3228,0,0,eb6409b67a53e6a87ee3b35c6c86c79edf79e7841421507b46731053f0d8a0a3,2023-06-17T03:10:15.150000
|
||||
CVE-2023-32280,0,0,65c23c31d13fc48d967995bf477468e1d79f1adf33f38fa31fe17e9068c09e69,2024-02-14T15:01:51.137000
|
||||
CVE-2023-32281,0,0,d199469e0e07df63722d1b0fb9deb26825694a89b7bc3c926712eb33cbe10ec8,2023-06-12T16:38:00.760000
|
||||
CVE-2023-32282,1,1,524660a7db415417731b26f40e37e3f473ae132e7d10dd93cba1dd5d340e09c3,2024-03-14T18:11:35.910000
|
||||
CVE-2023-32282,0,0,524660a7db415417731b26f40e37e3f473ae132e7d10dd93cba1dd5d340e09c3,2024-03-14T18:11:35.910000
|
||||
CVE-2023-32283,0,0,616c5b9249425e5481eafd04e1620c9a4a544ecf6b3da0a6220674a9ae5aea3b,2023-11-21T17:54:43.380000
|
||||
CVE-2023-32284,0,0,88cadcb4c44564a55805cbeda51567e56117f0699d0ad57db2507ae2d4d8a3a7,2023-09-25T18:41:26.133000
|
||||
CVE-2023-32285,0,0,54094f56f801494f82e889d7f6490e7a0d2bb29d4a710d2f2b203433cfb010a9,2023-11-07T04:14:31.603000
|
||||
@ -223188,7 +223188,7 @@ CVE-2023-32628,0,0,541f7cd8854cddced3fbf215ecde920e34f99635d7ae971eebdbb67d9ace0
|
||||
CVE-2023-32629,0,0,2a9b510613e59b1d0791e7609094d808f41803441654414571345279bd8a52e6,2023-09-11T19:15:42.233000
|
||||
CVE-2023-3263,0,0,40d9b2be8196618e8ffd2b2daf5e1f9188a2528f6d7a25328a1138e173242c04,2023-08-22T16:24:14.497000
|
||||
CVE-2023-32632,0,0,e34c3571eff0bd407d8dae7bc7261de893a3ad6909c84ad2b1a0971d12c7b797,2023-10-12T22:26:55.673000
|
||||
CVE-2023-32633,1,1,208eb22652d0f65f67e012a88d84b0d0f6310e0295f24f5f835a9d94bd6c7d36,2024-03-14T18:11:35.910000
|
||||
CVE-2023-32633,0,0,208eb22652d0f65f67e012a88d84b0d0f6310e0295f24f5f835a9d94bd6c7d36,2024-03-14T18:11:35.910000
|
||||
CVE-2023-32634,0,0,ae13f2ab6f823c11364e754ebc00ed530b5755084b143d030cf791a0dc2ec76a,2023-10-18T18:56:33.150000
|
||||
CVE-2023-32635,0,0,c8cb8d692af3d56e6e0b096944f9dd2b1b44e20fd09b760641a7283ac2335c77,2023-07-28T13:52:39.963000
|
||||
CVE-2023-32636,0,0,768a214bce0e4727a42083040ca54f6417ad330660d18a0cc1ad5894f3ee206b,2024-01-12T22:09:56.247000
|
||||
@ -223222,7 +223222,7 @@ CVE-2023-32662,0,0,e6ecfd432d8093b5086df379db0b57cdf40d1685dba2c7fabe307bec0ed72
|
||||
CVE-2023-32663,0,0,3e7ef52ee8898923e5c75493bfae74a9e09e3258bba72eb62046ef7118b9edb7,2023-08-21T17:15:47.183000
|
||||
CVE-2023-32664,0,0,618bdb4ac369fcb1a95b33a61563548a0e7093584a2b9e9c5666fd90ad48ae60,2023-09-15T19:15:07.340000
|
||||
CVE-2023-32665,0,0,31f6fbb04d38e24ef8a8bd7c7b632bd8e055665c900cbecbc4c539e406f2b02a,2023-11-27T14:15:07.820000
|
||||
CVE-2023-32666,1,1,0b00f08660e37d78e602a5ee0eb683b0ea819394514718b2b63339bddd6e407b,2024-03-14T18:11:35.910000
|
||||
CVE-2023-32666,0,0,0b00f08660e37d78e602a5ee0eb683b0ea819394514718b2b63339bddd6e407b,2024-03-14T18:11:35.910000
|
||||
CVE-2023-32668,0,0,6870504f63fd451347fe0c331096f1e45ff8f6811229f296b8ba61f0b4142f10,2023-05-23T17:31:45.217000
|
||||
CVE-2023-32669,0,0,0f9d4ef16e2f26deb90011f7c395852feb44144b8263c413043ff4187727c7dd,2023-10-04T21:07:05.703000
|
||||
CVE-2023-3267,0,0,2d4c8daf423de31384ed6303e8fbed7365844c7d43ecaa98d82b4375b3aba328,2023-08-22T16:15:46.067000
|
||||
@ -225004,7 +225004,7 @@ CVE-2023-35187,0,0,726f3d269c3fc4ab0e4f8bf02f0782a65d9f79c8f65fbe320311a563e2133
|
||||
CVE-2023-35188,0,0,dc2d51582b0c40a1a991431e82dc96ea83b69d4b6cd75cf2797291ed1d48e8fe,2024-02-13T20:36:01.653000
|
||||
CVE-2023-35189,0,0,727918a3b8004e51f12292fde6090cd74f994ad6d97365addee6dbdc84715391,2023-07-27T17:43:17.170000
|
||||
CVE-2023-3519,0,0,7329bec3703bdc39aea3e59a1cc85b2341feb74f79ed91f9be508e94879784da,2023-08-04T18:15:17.077000
|
||||
CVE-2023-35191,1,1,ce7a7d62bc18b70f4784dbfb0c011ac6715fdb189d5d45cdfda013568cb7d661,2024-03-14T18:11:35.910000
|
||||
CVE-2023-35191,0,0,ce7a7d62bc18b70f4784dbfb0c011ac6715fdb189d5d45cdfda013568cb7d661,2024-03-14T18:11:35.910000
|
||||
CVE-2023-35193,0,0,35d999215ee0714de627ba46454d683b144c8672ad7068fc25e9877364a0d4d5,2023-10-18T14:59:29.847000
|
||||
CVE-2023-35194,0,0,f1422d8c09e7347a9549c0a032c4e17cf30f4016d4503b676ff325c6bb8df1e1,2023-10-18T14:59:10.533000
|
||||
CVE-2023-3520,0,0,03168a3d34c4551d3f89d5576703d3fa9269c779a40ea50d5fa229233446f0fa,2023-07-12T15:34:13.653000
|
||||
@ -227293,7 +227293,7 @@ CVE-2023-38571,0,0,59422f4a140d130cd11989d6215360f540ea5ce2d1940f49a1884661bcc08
|
||||
CVE-2023-38572,0,0,d548f53924cef1c9fed50ca54f02dd79c795d64a5950d4afb21f0974051e6ecc,2024-01-05T14:15:47.123000
|
||||
CVE-2023-38573,0,0,473858576dcb468ddb455cbd057d8489cb45e9be3d5a82dde3da1329775f6312,2023-12-01T20:52:57.627000
|
||||
CVE-2023-38574,0,0,08bf6c6c13d11939e1673419af7685695e023a5a2347b1f23980f2505f1fbcc4,2023-09-11T12:50:00.413000
|
||||
CVE-2023-38575,1,1,347e384cbcd4e05465cd08585ad76ba75cfe3d4e1ec35c66fc6ab0e649301186,2024-03-14T18:11:35.910000
|
||||
CVE-2023-38575,0,0,347e384cbcd4e05465cd08585ad76ba75cfe3d4e1ec35c66fc6ab0e649301186,2024-03-14T18:11:35.910000
|
||||
CVE-2023-38576,0,0,e3f65d06ff8b2c2a07fff1f05ff5d589b3e7a54d648a7f31143ebbbf046d0139,2023-08-24T18:26:00.547000
|
||||
CVE-2023-38579,0,0,d675649c63083678f4f6251f8e7bc0f6b675249c8aaa3432eda8a193ed725f0c,2024-02-13T21:56:17.013000
|
||||
CVE-2023-3858,0,0,28a65d2dd00f0597640296e7ce5d44a9ad975a92cccd9351bfb9718868369c47,2024-02-29T01:40:48.047000
|
||||
@ -227874,7 +227874,7 @@ CVE-2023-39363,0,0,3b5e03600cf70b560e94452186ae68035e14537be8e3ab0775f4768bbd4e3
|
||||
CVE-2023-39364,0,0,0912e57d5cfd34bc2e4e4e2edced8f0b60dbf7166f76bb8617bbffe7593a5908,2023-11-09T05:15:10.093000
|
||||
CVE-2023-39365,0,0,21bf6fcb85cd83710c44b53d5ed8758363039f7223266aec94530b96b94dfe4a,2023-11-09T05:15:10.213000
|
||||
CVE-2023-39366,0,0,ec1d63cbca61e10ab8a85d0a3e36a9a8f98189047df6aef06ced93f8760dd051,2023-11-09T05:15:10.317000
|
||||
CVE-2023-39368,1,1,88e669aad606fc4894fa8fa8208aac4d6b14c8e50c133f6104e01d74864a5f22,2024-03-14T18:11:35.910000
|
||||
CVE-2023-39368,0,0,88e669aad606fc4894fa8fa8208aac4d6b14c8e50c133f6104e01d74864a5f22,2024-03-14T18:11:35.910000
|
||||
CVE-2023-39369,0,0,a7133e0339d6578f18ea90b34029606305e458b6c370c69d1e80c0cf5ea43285,2023-09-07T17:44:36.470000
|
||||
CVE-2023-3937,0,0,816a8fecf88ce14e903f0a8518357bc6a8c385564499d1cc21d7a2f9486d6a58,2023-08-18T14:30:09.183000
|
||||
CVE-2023-39370,0,0,d8edd93cc537210f9236e7c7d5ca490360b74b59fd87a37c3c0b9a154aa65f18,2023-09-08T06:42:31.750000
|
||||
@ -230213,6 +230213,7 @@ CVE-2023-42933,0,0,4515d35610e674bb40f9ac6898c27078c01d4ce90705902554e59c696decf
|
||||
CVE-2023-42934,0,0,9bbd832bbd99920d5b4e7783d7815e5b4e4bfb6335bc1932425966a175c8c3cb,2024-01-16T23:52:48.783000
|
||||
CVE-2023-42935,0,0,606ee85ca40462fb734cd978403d80127f0d12edae5212a236ef5fd51294018c,2024-01-29T18:38:29.587000
|
||||
CVE-2023-42937,0,0,c2539e1b6a362c132317285010348324c513a5269588c97c8989267a27c3c96b,2024-01-29T18:33:19.387000
|
||||
CVE-2023-42938,1,1,462788774e20545d65b9d3f478cd23a7f498f5f04c53cff4fca3aa9542319994,2024-03-14T20:15:07.040000
|
||||
CVE-2023-42939,0,0,4b0304a240b255af54a2d16f83934322490b0bc4310fde824596ed206eb1503c,2024-02-22T19:07:27.197000
|
||||
CVE-2023-4294,0,0,f930b584e857cb43ea137e37486281273551f8c9af112eaf7de38edf833a3d6b,2023-11-07T04:22:25.913000
|
||||
CVE-2023-42940,0,0,497a04296ad312ccf5bf23a1803700acc02bb53e54c938b44bbaaea8533d8224,2024-01-04T14:56:32.530000
|
||||
@ -230460,7 +230461,7 @@ CVE-2023-43484,0,0,685a1775bdd32f0468af5131678a5a88401ccecf002cd65cdb57f11bcb9b2
|
||||
CVE-2023-43485,0,0,56e06eecce10771793782bda7486bdc0abaf33406a8b34746335ac307311004e,2023-10-17T20:31:53.560000
|
||||
CVE-2023-43488,0,0,73963ff8fac3febe7fcf1226608d7faad6241fb5160a15c4381098ef0daabd52,2023-11-06T14:41:18.393000
|
||||
CVE-2023-4349,0,0,7bcfa9d15cfc992ac2e945aa6e7aec95ce86c568d8f15fb3ba2380084473c42f,2024-01-31T17:15:14.370000
|
||||
CVE-2023-43490,1,1,157fabb366a0360ae3ff26ac8640a9f017e124922c63d1ff06d2f1fcbe8a0fb1,2024-03-14T18:11:35.910000
|
||||
CVE-2023-43490,0,0,157fabb366a0360ae3ff26ac8640a9f017e124922c63d1ff06d2f1fcbe8a0fb1,2024-03-14T18:11:35.910000
|
||||
CVE-2023-43492,0,0,42b5f695dc2a37dd6c1424d01d87bfa34fecc8146eed1f8b9a6b38bb9493ae43,2023-10-30T14:33:25.570000
|
||||
CVE-2023-43493,0,0,8adb4be7e4d00ab6ac29deee1a8eec611490dc7a45bf7c05ab13586f9fcd691a,2023-09-27T20:51:26.677000
|
||||
CVE-2023-43494,0,0,a5e1abcb0e0cbdd68150bd25ed5f4171fce3829cb775e04ccec60c9f09070438,2023-09-25T13:43:35.503000
|
||||
@ -233996,9 +233997,9 @@ CVE-2023-48967,0,0,f8f5a7480cf7568d2aecb26ae0a75990792c8e43ba88fdfc54223d97cce64
|
||||
CVE-2023-4897,0,0,ebe711a50d43c89f480d656bb23e372caf1ed234b13e09e72f3339def27c6964,2023-09-13T14:41:12.663000
|
||||
CVE-2023-48974,0,0,3fa8b1b46ce07fbbef554dc807d3d7e61b34d89699e32a4154158f25940e1102,2024-02-29T01:41:35.677000
|
||||
CVE-2023-4898,0,0,ad58ecc68e0e815727a5f2fa4e7a42cb3a7896f8cd045a23cffee5336cb813ea,2023-09-13T03:47:34.107000
|
||||
CVE-2023-48985,0,0,5a7825eb95969b50e0c0f67474c86b64db2aca211fb3d1d68f3412b58e726a24,2024-02-14T13:59:35.580000
|
||||
CVE-2023-48986,0,0,4d60279d236ba63f4f953726c413db500457c83063c15c91606ee5e09bf42ad4,2024-02-14T13:59:35.580000
|
||||
CVE-2023-48987,0,0,71b60d8d69b58fb2eeb936e6799fa9f510d927875dd072dbe5727af70601fd6b,2024-02-14T13:59:35.580000
|
||||
CVE-2023-48985,0,1,7aa8d53275f09daf85e397f30a610b1ddc1bb07355b5fbff35c4414fefe7982d,2024-03-14T19:02:42.210000
|
||||
CVE-2023-48986,0,1,060c5e8a86760f9bfa33c1b499ea122d16725728b0550762ebbbc58c5a8d7860,2024-03-14T19:02:47.760000
|
||||
CVE-2023-48987,0,1,c38581efda3a8a036b7b72251079a491e56657bc2cdf5613e9fc31bf6d0638b3,2024-03-14T19:03:10.113000
|
||||
CVE-2023-4899,0,0,17b656e60dfc39f7e934ffddcacbfe41606e238c15abc8da7697628ba52223e4,2023-09-13T03:51:29.183000
|
||||
CVE-2023-4900,0,0,12a51909a623c2c350dbfbd11538e16af6ed85e4ac221057281489ce5d7108f9,2024-01-31T17:15:16.900000
|
||||
CVE-2023-49000,0,0,86714416678898480f50f316cc949aa741fd770798b5ca89e913de1d1ec57c18,2024-01-04T18:45:41.737000
|
||||
@ -234690,7 +234691,7 @@ CVE-2023-50164,0,0,f92257f6f7f7144caea76bc759c9f4d42a26f019d14d79f88dd6d866326a5
|
||||
CVE-2023-50165,0,0,6cc3fb981fe1805594dc6dd7b4769ed740a92c180ccf644bd37d3b7be89a8960,2024-02-06T17:41:39.480000
|
||||
CVE-2023-50166,0,0,091a42fcab764067f28f78762f0621b913a8024c017fb2ab90a0fe7398a45003,2024-02-06T17:42:52.830000
|
||||
CVE-2023-50167,0,0,0ed26f19ef15eb97b824e70233aef1b1704a97ac05faac1b78c7409b4a2600f7,2024-03-06T21:42:54.697000
|
||||
CVE-2023-50168,0,1,ba65ddab693eda19a5abb3bc0e23770a38a7541d8258fa2017b26ae8c40dd1a4,2024-03-14T18:11:35.910000
|
||||
CVE-2023-50168,0,0,ba65ddab693eda19a5abb3bc0e23770a38a7541d8258fa2017b26ae8c40dd1a4,2024-03-14T18:11:35.910000
|
||||
CVE-2023-5017,0,0,780bf04cd6b1b8e13ac917a171328543d714b59c74fb14dbc6719e0425766344,2024-02-29T01:42:09.187000
|
||||
CVE-2023-50170,0,0,1933563213fc12fd041d8d7f18f883d0e0fb318fa67f3782d779da0456696efa,2024-02-14T18:15:46.610000
|
||||
CVE-2023-50172,0,0,6289559683bd5bae430bca31e942a947923f7382e49382dd37c6d6a05599756d,2024-01-18T14:28:59.977000
|
||||
@ -235830,11 +235831,11 @@ CVE-2023-5244,0,0,2d7ccf46570f7a789336019a996859f3eea1c41d32a5a30c878bc5f986cf3b
|
||||
CVE-2023-52440,0,0,df1d24f58b5780781d166f03e5bbee989af213ed28e43bfb8a74e059b4a6ae50,2024-02-22T19:07:27.197000
|
||||
CVE-2023-52441,0,0,7349925d74cb6467b47b7b1d276df3eab91f5c1935d4ef85c04b101257863651,2024-02-22T19:07:27.197000
|
||||
CVE-2023-52442,0,0,f0e32f692f04917f9b44f1a58b9cc67efd1d412e7f16caea29f8d0af9ba07f69,2024-02-22T19:07:27.197000
|
||||
CVE-2023-52443,0,0,45acd59ed6aebb0ca36caa3fae688964cb001691728416348f03e997dedc3372,2024-02-22T19:07:27.197000
|
||||
CVE-2023-52444,0,0,219c069e6b9b43e9139d2dadde64d8dbf2283ebb944e313277cb0ef569e97d20,2024-02-22T19:07:27.197000
|
||||
CVE-2023-52445,0,0,c63473f7fb47441c69ff941dd994b6385f14098c4424eefee584656c7c83c661,2024-02-22T19:07:27.197000
|
||||
CVE-2023-52446,0,0,8915dee6ace8ffdafc00e42a2e545d0367cfec0de76e3bd1f1f81df4b282e866,2024-02-22T19:07:27.197000
|
||||
CVE-2023-52447,0,0,6cb1ceef4e0d855ea331a12dcff5cb43f47d94cac92386c56d1303d96a5ec2ae,2024-02-22T19:07:27.197000
|
||||
CVE-2023-52443,0,1,d2cfc476b089f8fdcf50f50719540af45f0af66b06ea096a3e3bdb089d114cc0,2024-03-14T20:16:02.947000
|
||||
CVE-2023-52444,0,1,e4e74b636a9119fb1430d59aa25d18b36c2089ded63e3a22c77190c88140fba1,2024-03-14T20:13:28.070000
|
||||
CVE-2023-52445,0,1,935e18f4f35f2d58044edd90dd7b35f47e4402522601caceac7b2bae2ab24ab7,2024-03-14T20:13:50.727000
|
||||
CVE-2023-52446,0,1,14bc79a6a49f12d7cdafb16072e7c790691dec958b76a4059d44e85538fb1528,2024-03-14T19:47:14.733000
|
||||
CVE-2023-52447,0,1,2b483c12b6cae05ce719aef7a32c19c00143135e9924dab08c849516f96b86ad,2024-03-14T19:46:43.030000
|
||||
CVE-2023-52448,0,0,45ca63d1d83bb662bb921c12f4cb5398e2d83d6740cccaace641a08f5d1cc271,2024-02-22T19:07:27.197000
|
||||
CVE-2023-52449,0,0,74efd9336ae00efc2cdb415adabbc06030b4dc03749ec08f043888d1bbbd2ce7,2024-02-22T19:07:27.197000
|
||||
CVE-2023-5245,0,0,7b2229d28f421b6ec6b3502eca0d9057fdb533e58501732c83cf6b2fe100d70b,2023-11-22T22:39:07.763000
|
||||
@ -238901,7 +238902,7 @@ CVE-2024-1987,0,0,51b6353c7487197fcf85dba32dd0017998b1425a36ba707e32269bf4afb531
|
||||
CVE-2024-1989,0,0,e603d4bdfbac73448a418c09b573178507e96a797a5be54fa1a78504bbf887da,2024-03-06T15:18:08.093000
|
||||
CVE-2024-1996,0,0,6df66a0fbd4fb73abd5cd4958b38aa148676375056ace1026758f2dd345915e7,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1997,0,0,0b3dd4d3dab6ddfdd6d8d42f85a94ba3033320511c0452f126442703735f49d4,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1998,1,1,a3342ccc0c3061474cbfc167041184af8112bec2c082d20ac42626a5c675b156,2024-03-14T18:15:07.003000
|
||||
CVE-2024-1998,0,0,a3342ccc0c3061474cbfc167041184af8112bec2c082d20ac42626a5c675b156,2024-03-14T18:15:07.003000
|
||||
CVE-2024-2000,0,0,152795edb5374bb36090a67fbb4784adea5d8a58ecdfa58a0b08ea6100ccde61,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20001,0,0,efbe4e49752ddfea997ebdd6c491b74eca19a99884d44def3e33c77345370bb0,2024-02-09T02:02:13.153000
|
||||
CVE-2024-20002,0,0,46b6afed42316be97368931c2d39434a4c3b4f4412ec2aa11d0d2b3e3bf7e82f,2024-02-09T02:01:37.090000
|
||||
@ -239710,6 +239711,7 @@ CVE-2024-22332,0,0,b6354137c28f2ada534133af8c402970051810f863118ffa563de8361bb89
|
||||
CVE-2024-22335,0,0,94b1135a0842e43602bc9fceeeec6f6d8338d5d9b6e931e6a3e1f0f5ed52affb,2024-02-20T19:50:53.960000
|
||||
CVE-2024-22336,0,0,92b17f3ddf77b7c8a53a41f903603d0d36207de06fae8bd71fc2469777bc3663,2024-02-20T19:50:53.960000
|
||||
CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e14f0,2024-02-20T19:50:53.960000
|
||||
CVE-2024-22346,1,1,4d923575a0646f95ef556510f7d609fd41d733f89b7f84b7db0175ed66b96c27,2024-03-14T20:11:36.180000
|
||||
CVE-2024-22355,0,0,90575169d286b28c7ce02c7d947a264d77a6f25776530138b50b2f2dbc394220,2024-03-04T13:58:23.447000
|
||||
CVE-2024-2236,0,0,17401211af38608097c003c3b08d6e3d90e3570b70699d89a2e396d5b72c602a,2024-03-07T13:52:27.110000
|
||||
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
|
||||
@ -240037,17 +240039,17 @@ CVE-2024-23262,0,0,a3cc71b13c4680e14b673df2b1c613ebe49f9c48b8a03c413fc86e337ee8f
|
||||
CVE-2024-23263,0,0,1ac0d4fd8c700b61850db67701ef51a909806e7bd38218f04abbd43e377bc0c4,2024-03-13T23:15:46.833000
|
||||
CVE-2024-23264,0,0,9964a20888e66392c96c48ccf311158160cfbf4ec169d1a0d4c0b8eb5a95ac52,2024-03-13T23:15:46.883000
|
||||
CVE-2024-23265,0,0,2ede0506b261d93e08a6a8ab0db637e55925e03c20e9a8ae30d3752777087982,2024-03-13T23:15:46.933000
|
||||
CVE-2024-23266,0,0,da5a9f1a3556e7e1456a920c88f79f6b54c4dd23ee3522ff6c4060ad066d6907,2024-03-13T23:15:46.987000
|
||||
CVE-2024-23267,0,0,5c83066309671517178112bdab92ea9b2ce42ff399335eff2925a7f503d1c48e,2024-03-13T23:15:47.040000
|
||||
CVE-2024-23268,0,0,96db6f64f98d21adccd922403c0074d68cefd6926e7551d971b41befa78c4fb6,2024-03-13T23:15:47.090000
|
||||
CVE-2024-23266,0,1,6815b460f7716d52df98ab436e6b42da2e782eedd3a5d15e033e5ba09801dfb0,2024-03-14T19:54:56.477000
|
||||
CVE-2024-23267,0,1,d5b27df89e87163c273c4cfdb022944a468171435a4aac14f3c213d699a4a63f,2024-03-14T19:05:20.860000
|
||||
CVE-2024-23268,0,1,81165c5c09e8474d57b6891cda51eb4f30eab0837f193e7c4798fe99fd2b9a98,2024-03-14T19:05:36.077000
|
||||
CVE-2024-23269,0,0,b560efe5c2974c123fc7f649e82a050e1990e700d52c94117e9aef09610b87b2,2024-03-13T23:15:47.147000
|
||||
CVE-2024-23270,0,0,42f8347f8cbc9f51a8592547bb25d568181c4c452b8049d0f8e6802ad03ced23,2024-03-13T23:15:47.197000
|
||||
CVE-2024-23272,0,0,f445abbebcb40f3109c556f9ecf92f716e31abbf032d3937da971f05894e1ad7,2024-03-13T23:15:47.253000
|
||||
CVE-2024-23273,0,0,420e5db43bed2125b40892275d0b57c19db75f02c784110b570a264645363a07,2024-03-13T21:15:57.747000
|
||||
CVE-2024-23274,0,0,91c0be19cdc84d009728fd89f3b34636689c14d22b30e3ee869ffeaf1930db52,2024-03-13T23:15:47.310000
|
||||
CVE-2024-23275,0,0,2760f9ac430a211de810c6e1c51e2052bb7fab7ff89f63c943e4c8bef298cd00,2024-03-13T23:15:47.363000
|
||||
CVE-2024-23276,0,0,fde06e5e5c27aa477705814ab2f4d6a72ba5820f31217d5ff5bee960cc22bc80,2024-03-13T23:15:47.420000
|
||||
CVE-2024-23277,0,0,c906b3dd2a5568cc03ae9dd6d0e7f06a446700daf74ab0e49008ad5ad87214bf,2024-03-13T21:15:57.963000
|
||||
CVE-2024-23270,0,1,9ffc7392eb2f4eff1860dcb80336f5a8cdd382df1e721d75c8ca7db15331f0ca,2024-03-14T19:06:02.210000
|
||||
CVE-2024-23272,0,1,c9da5a5a9448d1badcb55f1bb94ecccfda01d4c50c7c75b1140074bcaecd426e,2024-03-14T19:54:08.100000
|
||||
CVE-2024-23273,0,1,cb1e92b841add9beb7ff32d91364414d10118c43bd74e233718396f3b8460ec5,2024-03-14T19:54:26.287000
|
||||
CVE-2024-23274,0,1,662fb9b0795cd70eed82bdcf20d41f74676c2f9885c0d27e476a9f0c92a781b5,2024-03-14T19:54:38.937000
|
||||
CVE-2024-23275,0,1,e0b16d7b7845ff2a21896517216a793e7fb601c54e9fbfa1064465a9fb3129ef,2024-03-14T20:34:02.077000
|
||||
CVE-2024-23276,0,1,079c95708932d9c77b57c7e37daf6202b28a15d835eb4f9ac3937c0acb8c0899,2024-03-14T20:34:18.527000
|
||||
CVE-2024-23277,0,1,b8b8680cb3bbc804b90ae335ad6a674884728efc310ccaf590e266267eefad11,2024-03-14T20:34:31.303000
|
||||
CVE-2024-23278,0,0,37587677fcc59459c6e676e3831afba917f437da8f19a0310452de509033afe9,2024-03-13T22:15:10.883000
|
||||
CVE-2024-23279,0,0,2f2a4da20a4912b04931b6c0ce417bc3b1be9e1a7b15c13f5c7903e8526354e3,2024-03-13T21:15:58.063000
|
||||
CVE-2024-23280,0,0,5802b2d7de966c961f62acba594edc16460a2ada3d114036c7e9226aac15caf5,2024-03-13T22:15:10.950000
|
||||
@ -240286,6 +240288,7 @@ CVE-2024-23816,0,0,d90e5d8a8add5ddfd05a35b38827bbf40e25d6527af0702c0c8e1c123914c
|
||||
CVE-2024-23817,0,0,5676dff86204ad09bd540c1293c03d4560071d501dafe8dc45434ac4c0137f68,2024-01-31T23:25:58.247000
|
||||
CVE-2024-23820,0,0,442ce87b6d4e7462abae5349c52b49ec11bd5e7b4d5da07ccb8943cf3cab70fb,2024-02-01T16:30:14.907000
|
||||
CVE-2024-23822,0,0,ff7d5a10be6620b6d28dd41c7c7d2b88b037de8ed8da0a94d9353eebadc89386,2024-02-05T18:04:52.843000
|
||||
CVE-2024-23823,1,1,8a6fef324a12d55fbb824ade9c974578fbac8577ab858ffbbb73b1a38a268902,2024-03-14T20:11:36.180000
|
||||
CVE-2024-23824,0,0,720dd6b8460b3626944881d2146ae362a6c550b94265d7e32de8f62c2158a7f2,2024-02-10T04:04:51.007000
|
||||
CVE-2024-23825,0,0,e35747afca6ba11a2ac686ab8c59d4a85d195e9a38b322cc31ef9b848c545df6,2024-02-05T18:46:02.203000
|
||||
CVE-2024-23826,0,0,a1fb22dbd44ac7e3ef4aaa0208a31a95d4f168aff767b351ee50e7d675ba1814,2024-02-08T16:43:13.403000
|
||||
@ -240536,6 +240539,7 @@ CVE-2024-24558,0,0,e1e4d32f901535a55c2f6412106d8d6d972ab259b4d2d031ab0a6368463e0
|
||||
CVE-2024-24559,0,0,a0cb86b836a7e79e3e1b100a5872aae73fa30cbfc276547c01a7202600c7c117,2024-02-12T21:40:56.547000
|
||||
CVE-2024-24560,0,0,d3bc441b7f7323645f1a247e96e6668e58a3a1d0f8c643e79ccfcc74a44eb295,2024-02-12T15:23:42.867000
|
||||
CVE-2024-24561,0,0,5be80f6a2f32171d39ff2e793460c0d1935dad674bb1256dbd8e583d7f642aab,2024-02-09T20:21:23.980000
|
||||
CVE-2024-24562,1,1,8bfcac28445b02c157bce1b1e0bb92a5bbec088ce506e386b9107b74a19af7aa,2024-03-14T20:11:36.180000
|
||||
CVE-2024-24563,0,0,9029543c8c1164531bf0a5fd870593e244dab5241353adb887235fe9579da2cc,2024-02-15T05:02:12.977000
|
||||
CVE-2024-24564,0,0,be0a637ebc948280561b9eda83902f2962f68eef3543fed436b47cdc70270d2f,2024-02-26T22:10:40.463000
|
||||
CVE-2024-24565,0,0,2b26f8338c7350a8ca05f2c11acfbc691e7437e014aff92fedde224ab2a14e3a,2024-02-05T20:55:23.270000
|
||||
@ -240604,6 +240608,7 @@ CVE-2024-24765,0,0,1dcdf5d3f9f009d85c8c4aac801e5e8bd54dddd577aad07bc5c3e80cc9bd8
|
||||
CVE-2024-24766,0,0,c5cab786b58c3ec2f08fdfa14365ab75620c9bf6ef04c2b72e6996082a25dcdf,2024-03-06T21:42:48.053000
|
||||
CVE-2024-24767,0,0,35493a546e5589356bb9d9764034569c9b6f7d5938a89535d372f61892403666,2024-03-06T21:42:48.053000
|
||||
CVE-2024-24768,0,0,27dc306ca48f5aee06593af40ebe843b8735dea3a4f5dec47f36e425a97f3780,2024-02-13T00:36:30.397000
|
||||
CVE-2024-24770,1,1,63b80bf2be495d5ed1a6a39be10950f417b765ad7151fc2a6ef5f6e4af2d2cbf,2024-03-14T20:11:36.180000
|
||||
CVE-2024-24771,0,0,1468e3d6e6895bc7a063343d9867e26ba54dfe4d85cca1df09b674770a5ae30a,2024-02-15T05:01:22.213000
|
||||
CVE-2024-24772,0,0,d30bc8f7beaf17e813aadd03fb1e8a82ab916ac933a92f71e2c08e1ecbc56667,2024-02-28T15:15:09.093000
|
||||
CVE-2024-24773,0,0,ffb027c910cd93ba912f43ff59fdcdbfeee7e95ade5971f5d0af0e2e97ddd7a5,2024-02-28T15:15:09.177000
|
||||
@ -240766,7 +240771,7 @@ CVE-2024-25126,0,0,cf0623ed49c8e216f3c8783e084ee8e3db6ece93672a14f8cc0bd9589b91a
|
||||
CVE-2024-25128,0,0,172c5f0d62603832e5d7859a4a8be0b3217ee5b1e8ffd030ff8a010d7f347059,2024-02-29T13:49:29.390000
|
||||
CVE-2024-25129,0,0,94b297a9d28866e9e3344e76c82b40cabac4f54bd9e83f1602ef019da71f96a9,2024-02-23T02:42:54.547000
|
||||
CVE-2024-25130,0,0,9ed6bdd2e0b9e9a9c6f507d6c013b142ff6c3cd551628d5ce4a7cec9082ee81a,2024-02-23T02:42:54.547000
|
||||
CVE-2024-25139,0,1,434a1a8570432b07a345e2d4d94e9a66656e3c23943681acca2835cd987627db,2024-03-14T18:11:35.910000
|
||||
CVE-2024-25139,0,0,434a1a8570432b07a345e2d4d94e9a66656e3c23943681acca2835cd987627db,2024-03-14T18:11:35.910000
|
||||
CVE-2024-25140,0,0,910924059f66fa65d93f5323847e59d03704b67134867a3ac9eb665a02a38fa2,2024-02-14T00:26:27.847000
|
||||
CVE-2024-25141,0,0,29fa0c24f25cecd1df32a87cb8d97e893df4f50e0ef569f7fd7f97de363aa71b,2024-02-20T22:15:08.670000
|
||||
CVE-2024-25143,0,0,ed1d5e0e430dd07199fade8c66d12e89ec5dc7886fca4f2d677be809afcc5ced,2024-02-07T17:04:54.407000
|
||||
@ -241203,7 +241208,7 @@ CVE-2024-26581,0,0,353f24559890ac7b3597bd26d99362ecbfd523a3ec7e2aa7e9d65e75d894e
|
||||
CVE-2024-26582,0,0,6cdcf6843f79a1ddc4c2cd0c26ad431557beeca360692c49f2a0f6c51a1d288c,2024-03-11T18:15:18.377000
|
||||
CVE-2024-26583,0,0,4a300c2895f7117869a919f3cccacc96bcc2b42fd06fde7e43015d0dc24ee87c,2024-03-11T18:15:18.453000
|
||||
CVE-2024-26584,0,0,628c83749212390e734524e43d20fa678834b7ea9755141f8a3b9cd3762087b8,2024-03-11T18:15:18.503000
|
||||
CVE-2024-26585,0,0,9130e18bfb73c5c548fc7b8110539811cc500726789e8b328cc5ff9f8ae3ddfa,2024-03-11T18:15:18.553000
|
||||
CVE-2024-26585,0,1,ab0df1121b4a44ad09abca0cf48007274128e339349339533a7e7946a2e72b52,2024-03-14T20:18:37.957000
|
||||
CVE-2024-26586,0,0,6adf6fee4513357dce3d48353704f433902e35e2bc7d0ba0f94b639c08b43cd1,2024-02-23T09:15:22.820000
|
||||
CVE-2024-26587,0,0,0efd83186b44039bd1d35d69a1b607d8dbb0ddf97a28b08dcc63546dbb9a7ecb,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26588,0,0,e28b875fe4ce5483682023926fd2826eb3774745f3f93324b0685c84e6aab78b,2024-02-22T19:07:27.197000
|
||||
@ -241301,6 +241306,8 @@ CVE-2024-27235,0,0,7945730c880341828744b74178a4130752f96577b7b21da1564dd4f76d2e7
|
||||
CVE-2024-27236,0,0,050a1052e26047f2e5d0b58d8351e3e856ec1c52f1b2daf95f02084addfb027c,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27237,0,0,952387726c7567ea2371af0e500cab297b027867a108431eaa82a39745a31338,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27255,0,0,07d4523d50b3b6ceec1ed85c31e8859376bfd63a9732f2f4d2cf6e5b4c34b76b,2024-03-04T13:58:23.447000
|
||||
CVE-2024-27265,1,1,330b186390a3cca3ae10bd0b3ee1e39e75a1602b4fcdc860bbc5c6a93a010cfd,2024-03-14T20:11:36.180000
|
||||
CVE-2024-27266,1,1,6067aa2b57c29a9e769a253e27c10bb2c747c64b936b7eaef7dbc204aa807a96,2024-03-14T20:11:36.180000
|
||||
CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000
|
||||
CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27283,0,0,d0d6cc69e38ce7977029c4d3a011dff4f743808fa73bec6f0327124024522ffa,2024-02-22T19:07:27.197000
|
||||
@ -241314,6 +241321,7 @@ CVE-2024-27295,0,0,7b61bc68a0e7596ec39f45cf16eb56847e1e2291e2b9c36b655d40907b360
|
||||
CVE-2024-27296,0,0,efeac0d0835ce5e895a91174ac6e0936bc76da32bc1ae41fcb14571a12d2985d,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27297,0,0,4adef5b6b344504047ea652a2ba40cd8b6a71ad7086f702d549e1a8bda9ad1af,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27298,0,0,1aaf802a3586818726ce977e3c4d8b52b79c9b45f43876bfaeae085dddddd041,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27301,1,1,ea4f96db3674e6fe8e03ff7f55175b1f9fdc58c05fa850d93965ca0498d5bb55,2024-03-14T20:11:36.180000
|
||||
CVE-2024-27302,0,0,f49f7cb8056f6127ae14fec0cfff2d0bf177dfba1318b206d31d7b548bf3e9f5,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27303,0,0,5bf58561ed507a70ca73108a11218e0be9a2a377c18b42118ebe9af756d8ec79,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27304,0,0,a58fd7f36bc322ab36f59f23fc0b881917cc0b6bb38909a990d60361c28f67b2,2024-03-06T21:42:48.053000
|
||||
@ -241444,7 +241452,7 @@ CVE-2024-28174,0,0,fa1674b985861bddf4d0ff5ab075ec0e4328a9665c668bfe339f9f0de580d
|
||||
CVE-2024-28175,0,0,c8f25bff8e97476e2963865ef2e9cf777aae8f2ef724b2ba6f372c990cea8179,2024-03-14T12:52:16.723000
|
||||
CVE-2024-28176,0,0,5bb6d329167995170bd276a45554624691bdda8cbb6c83c2d08f42eba9f617aa,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28180,0,0,1e73ce45496cde15ab7710e8895a9f7d4caf4d2dcdb0d6de4d94afa753e9a64b,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28181,1,1,9eef168e9b9da4aa84a4cba01a79c67dd2a92582426f82c3a5ad14611a744484,2024-03-14T18:15:07.107000
|
||||
CVE-2024-28181,0,1,43f0a809bba9c8c0eb02896e0986a3f9ccb9b3e30fc3eda1da963f37d0308dd8,2024-03-14T20:11:36.180000
|
||||
CVE-2024-28184,0,0,043b0bc7533d0fc96bb6df4be7b21b8477ffe807b0ac6ed0c4b06cf7d8241c3c,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28186,0,0,bd19020fb98c7e49f4ae9534406a8116ce29f7f2cd9253fb5db74e8880c2331b,2024-03-13T12:33:51.697000
|
||||
CVE-2024-28187,0,0,ac9aee9b90f5e80eaf35f8c7ff9228de1d46fc7e7981b3ae0d130073676ebc09,2024-03-12T12:40:13.500000
|
||||
@ -241480,6 +241488,9 @@ CVE-2024-28390,0,0,c59fe44ce5898e034e8253a1c3bd017a5eae7c1708d584b45d3cdcaf6b6ab
|
||||
CVE-2024-28391,0,0,b1444c24f7ecf1ab52e2ae0fbb735e6665eab4acbe77c214aa4859db21cb1963,2024-03-14T12:52:09.877000
|
||||
CVE-2024-28417,0,0,af00e2b57e718e054f7e08c6b3b0d384a18688d81735bc5de07f53c08e95bb44,2024-03-14T14:21:20.217000
|
||||
CVE-2024-28418,0,0,ae238b712a12df26411e78ac0a02714475617bc52923967f2dcd5f99fed7ae88,2024-03-14T14:21:20.217000
|
||||
CVE-2024-28423,1,1,372e672a227c93e4c17b43a656f1688758e71678c55f13573c7b40701da49f01,2024-03-14T20:11:36.180000
|
||||
CVE-2024-28424,1,1,05a1d242c621de5dbc7c2cf6c05bc52693076d1555a74835ea1663a11e03c0a9,2024-03-14T20:11:36.180000
|
||||
CVE-2024-28425,1,1,bdbe12dd875a12ca19b5176fb53ff9c1ceaca5403939e0b8f4cdd10fdb0ff249,2024-03-14T20:11:36.180000
|
||||
CVE-2024-28429,0,0,caaa64487b84149266e9e941a72e13f93e6070c94b1fe7355fb56db4eb5b2161,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28430,0,0,bf34fb49e742ebf9176808c1e05b7467ed1662a29a5c18afe29f976454928e37,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c418,2024-03-13T14:28:45.217000
|
||||
@ -241513,4 +241524,4 @@ CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3
|
||||
CVE-2024-28757,0,0,2ea8a9bd701b62a4c7d927e860f5361b09b4376e3bc3bbb014ff5d4ca725cec6,2024-03-11T01:32:29.610000
|
||||
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
|
||||
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
|
||||
CVE-2024-28849,1,1,3fd4e14c66f66b904cf6ec0b520762c4afbd3156d6cd6b7fed8cfe38b4a83639,2024-03-14T18:11:35.910000
|
||||
CVE-2024-28849,0,0,3fd4e14c66f66b904cf6ec0b520762c4afbd3156d6cd6b7fed8cfe38b4a83639,2024-03-14T18:11:35.910000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user