From 6d0c8a0fbe6be0266196cbf820881b216e3c0c57 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 7 Jan 2025 19:03:59 +0000 Subject: [PATCH] Auto-Update: 2025-01-07T19:00:35.982204+00:00 --- CVE-2020/CVE-2020-48xx/CVE-2020-4874.json | 71 ++- CVE-2021/CVE-2021-205xx/CVE-2021-20556.json | 81 ++- CVE-2021/CVE-2021-272xx/CVE-2021-27285.json | 43 +- CVE-2021/CVE-2021-471xx/CVE-2021-47104.json | 212 ++++++- CVE-2021/CVE-2021-471xx/CVE-2021-47116.json | 116 +++- CVE-2021/CVE-2021-471xx/CVE-2021-47119.json | 117 +++- CVE-2021/CVE-2021-471xx/CVE-2021-47120.json | 134 ++++- CVE-2021/CVE-2021-471xx/CVE-2021-47121.json | 202 ++++++- CVE-2021/CVE-2021-471xx/CVE-2021-47122.json | 202 ++++++- CVE-2021/CVE-2021-471xx/CVE-2021-47125.json | 100 +++- CVE-2021/CVE-2021-471xx/CVE-2021-47127.json | 100 +++- CVE-2021/CVE-2021-471xx/CVE-2021-47133.json | 100 +++- CVE-2021/CVE-2021-471xx/CVE-2021-47180.json | 197 ++++++- CVE-2021/CVE-2021-471xx/CVE-2021-47190.json | 114 +++- CVE-2021/CVE-2021-472xx/CVE-2021-47200.json | 80 ++- CVE-2021/CVE-2021-472xx/CVE-2021-47206.json | 181 +++++- CVE-2021/CVE-2021-475xx/CVE-2021-47549.json | 197 ++++++- CVE-2022/CVE-2022-316xx/CVE-2022-31693.json | 32 +- CVE-2023/CVE-2023-01xx/CVE-2023-0121.json | 10 +- CVE-2023/CVE-2023-05xx/CVE-2023-0508.json | 9 +- CVE-2023/CVE-2023-20xx/CVE-2023-2001.json | 19 +- CVE-2023/CVE-2023-20xx/CVE-2023-2013.json | 19 +- CVE-2023/CVE-2023-20xx/CVE-2023-2015.json | 19 +- CVE-2023/CVE-2023-21xx/CVE-2023-2198.json | 19 +- CVE-2023/CVE-2023-21xx/CVE-2023-2199.json | 19 +- CVE-2023/CVE-2023-24xx/CVE-2023-2442.json | 19 +- CVE-2023/CVE-2023-25xx/CVE-2023-2589.json | 19 +- CVE-2023/CVE-2023-304xx/CVE-2023-30400.json | 32 +- CVE-2023/CVE-2023-525xx/CVE-2023-52564.json | 146 ++++- CVE-2023/CVE-2023-526xx/CVE-2023-52637.json | 205 ++++++- CVE-2023/CVE-2023-63xx/CVE-2023-6326.json | 6 +- CVE-2023/CVE-2023-63xx/CVE-2023-6382.json | 6 +- CVE-2024/CVE-2024-06xx/CVE-2024-0611.json | 6 +- CVE-2024/CVE-2024-101xx/CVE-2024-10102.json | 35 +- CVE-2024/CVE-2024-105xx/CVE-2024-10562.json | 35 +- CVE-2024/CVE-2024-109xx/CVE-2024-10941.json | 75 ++- CVE-2024/CVE-2024-116xx/CVE-2024-11606.json | 31 +- CVE-2024/CVE-2024-118xx/CVE-2024-11832.json | 54 +- CVE-2024/CVE-2024-124xx/CVE-2024-12429.json | 100 ++++ CVE-2024/CVE-2024-124xx/CVE-2024-12430.json | 100 ++++ CVE-2024/CVE-2024-128xx/CVE-2024-12841.json | 71 ++- CVE-2024/CVE-2024-128xx/CVE-2024-12843.json | 71 ++- CVE-2024/CVE-2024-128xx/CVE-2024-12844.json | 76 ++- CVE-2024/CVE-2024-128xx/CVE-2024-12845.json | 76 ++- CVE-2024/CVE-2024-13xx/CVE-2024-1366.json | 74 ++- CVE-2024/CVE-2024-13xx/CVE-2024-1377.json | 74 ++- CVE-2024/CVE-2024-13xx/CVE-2024-1387.json | 64 ++- CVE-2024/CVE-2024-14xx/CVE-2024-1449.json | 6 +- CVE-2024/CVE-2024-14xx/CVE-2024-1498.json | 84 ++- CVE-2024/CVE-2024-18xx/CVE-2024-1802.json | 76 ++- CVE-2024/CVE-2024-18xx/CVE-2024-1803.json | 56 +- CVE-2024/CVE-2024-21xx/CVE-2024-2128.json | 84 ++- CVE-2024/CVE-2024-24xx/CVE-2024-2468.json | 76 ++- CVE-2024/CVE-2024-266xx/CVE-2024-26655.json | 102 +++- CVE-2024/CVE-2024-266xx/CVE-2024-26657.json | 102 +++- CVE-2024/CVE-2024-266xx/CVE-2024-26663.json | 222 +++++++- CVE-2024/CVE-2024-266xx/CVE-2024-26695.json | 197 ++++++- CVE-2024/CVE-2024-267xx/CVE-2024-26722.json | 204 ++++++- CVE-2024/CVE-2024-267xx/CVE-2024-26725.json | 100 +++- CVE-2024/CVE-2024-267xx/CVE-2024-26739.json | 117 +++- CVE-2024/CVE-2024-267xx/CVE-2024-26775.json | 118 +++- CVE-2024/CVE-2024-267xx/CVE-2024-26781.json | 162 +++++- CVE-2024/CVE-2024-268xx/CVE-2024-26833.json | 193 ++++++- CVE-2024/CVE-2024-268xx/CVE-2024-26840.json | 217 ++++++- CVE-2024/CVE-2024-268xx/CVE-2024-26860.json | 131 ++++- CVE-2024/CVE-2024-268xx/CVE-2024-26865.json | 131 ++++- CVE-2024/CVE-2024-268xx/CVE-2024-26887.json | 114 +++- CVE-2024/CVE-2024-26xx/CVE-2024-2688.json | 76 ++- CVE-2024/CVE-2024-27xx/CVE-2024-2786.json | 94 ++- CVE-2024/CVE-2024-27xx/CVE-2024-2787.json | 76 ++- CVE-2024/CVE-2024-27xx/CVE-2024-2788.json | 76 ++- CVE-2024/CVE-2024-27xx/CVE-2024-2789.json | 76 ++- CVE-2024/CVE-2024-32xx/CVE-2024-3244.json | 84 ++- CVE-2024/CVE-2024-32xx/CVE-2024-3245.json | 76 ++- CVE-2024/CVE-2024-358xx/CVE-2024-35883.json | 107 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36286.json | 187 +++++- CVE-2024/CVE-2024-371xx/CVE-2024-37149.json | 63 ++- CVE-2024/CVE-2024-37xx/CVE-2024-3724.json | 96 +++- CVE-2024/CVE-2024-38xx/CVE-2024-3890.json | 76 ++- CVE-2024/CVE-2024-38xx/CVE-2024-3891.json | 74 ++- CVE-2024/CVE-2024-407xx/CVE-2024-40747.json | 56 ++ CVE-2024/CVE-2024-407xx/CVE-2024-40748.json | 33 ++ CVE-2024/CVE-2024-407xx/CVE-2024-40749.json | 33 ++ CVE-2024/CVE-2024-434xx/CVE-2024-43416.json | 63 ++- CVE-2024/CVE-2024-435xx/CVE-2024-43577.json | 37 +- CVE-2024/CVE-2024-437xx/CVE-2024-43716.json | 6 +- CVE-2024/CVE-2024-437xx/CVE-2024-43717.json | 6 +- CVE-2024/CVE-2024-437xx/CVE-2024-43729.json | 6 +- CVE-2024/CVE-2024-437xx/CVE-2024-43731.json | 6 +- CVE-2024/CVE-2024-437xx/CVE-2024-43755.json | 6 +- CVE-2024/CVE-2024-43xx/CVE-2024-4316.json | 74 ++- CVE-2024/CVE-2024-43xx/CVE-2024-4391.json | 84 ++- CVE-2024/CVE-2024-444xx/CVE-2024-44450.json | 21 + CVE-2024/CVE-2024-44xx/CVE-2024-4470.json | 6 +- CVE-2024/CVE-2024-44xx/CVE-2024-4478.json | 94 ++- CVE-2024/CVE-2024-48xx/CVE-2024-4865.json | 84 ++- CVE-2024/CVE-2024-495xx/CVE-2024-49535.json | 8 +- CVE-2024/CVE-2024-498xx/CVE-2024-49816.json | 63 ++- CVE-2024/CVE-2024-498xx/CVE-2024-49817.json | 53 +- CVE-2024/CVE-2024-498xx/CVE-2024-49818.json | 41 +- CVE-2024/CVE-2024-506xx/CVE-2024-50658.json | 29 + CVE-2024/CVE-2024-506xx/CVE-2024-50659.json | 29 + CVE-2024/CVE-2024-506xx/CVE-2024-50660.json | 29 + CVE-2024/CVE-2024-50xx/CVE-2024-5041.json | 84 ++- CVE-2024/CVE-2024-50xx/CVE-2024-5088.json | 84 ++- CVE-2024/CVE-2024-528xx/CVE-2024-52831.json | 6 +- CVE-2024/CVE-2024-528xx/CVE-2024-52865.json | 18 +- CVE-2024/CVE-2024-529xx/CVE-2024-52901.json | 26 +- CVE-2024/CVE-2024-531xx/CVE-2024-53146.json | 153 ++++- CVE-2024/CVE-2024-53xx/CVE-2024-5347.json | 95 +++- CVE-2024/CVE-2024-540xx/CVE-2024-54006.json | 44 ++ CVE-2024/CVE-2024-540xx/CVE-2024-54007.json | 44 ++ CVE-2024/CVE-2024-542xx/CVE-2024-54266.json | 47 +- CVE-2024/CVE-2024-543xx/CVE-2024-54382.json | 47 +- CVE-2024/CVE-2024-554xx/CVE-2024-55410.json | 25 + CVE-2024/CVE-2024-554xx/CVE-2024-55411.json | 25 + CVE-2024/CVE-2024-554xx/CVE-2024-55412.json | 25 + CVE-2024/CVE-2024-554xx/CVE-2024-55413.json | 25 + CVE-2024/CVE-2024-554xx/CVE-2024-55414.json | 25 + CVE-2024/CVE-2024-555xx/CVE-2024-55555.json | 25 + CVE-2024/CVE-2024-562xx/CVE-2024-56270.json | 56 ++ CVE-2024/CVE-2024-562xx/CVE-2024-56272.json | 56 ++ CVE-2024/CVE-2024-83xx/CVE-2024-8361.json | 56 ++ CVE-2025/CVE-2025-02xx/CVE-2025-0298.json | 8 +- CVE-2025/CVE-2025-02xx/CVE-2025-0299.json | 145 +++++ CVE-2025/CVE-2025-03xx/CVE-2025-0300.json | 145 +++++ CVE-2025/CVE-2025-03xx/CVE-2025-0301.json | 145 +++++ CVE-2025/CVE-2025-216xx/CVE-2025-21622.json | 8 +- CVE-2025/CVE-2025-216xx/CVE-2025-21623.json | 8 +- CVE-2025/CVE-2025-216xx/CVE-2025-21624.json | 8 +- CVE-2025/CVE-2025-222xx/CVE-2025-22296.json | 56 ++ CVE-2025/CVE-2025-223xx/CVE-2025-22306.json | 56 ++ CVE-2025/CVE-2025-223xx/CVE-2025-22319.json | 56 ++ CVE-2025/CVE-2025-223xx/CVE-2025-22334.json | 56 ++ CVE-2025/CVE-2025-223xx/CVE-2025-22350.json | 56 ++ CVE-2025/CVE-2025-223xx/CVE-2025-22354.json | 56 ++ CVE-2025/CVE-2025-223xx/CVE-2025-22363.json | 56 ++ CVE-2025/CVE-2025-223xx/CVE-2025-22365.json | 56 ++ CVE-2025/CVE-2025-225xx/CVE-2025-22500.json | 56 ++ CVE-2025/CVE-2025-226xx/CVE-2025-22621.json | 56 ++ README.md | 110 ++-- _state.csv | 597 +++++++++++--------- 142 files changed, 9866 insertions(+), 1122 deletions(-) create mode 100644 CVE-2024/CVE-2024-124xx/CVE-2024-12429.json create mode 100644 CVE-2024/CVE-2024-124xx/CVE-2024-12430.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40747.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40748.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40749.json create mode 100644 CVE-2024/CVE-2024-444xx/CVE-2024-44450.json create mode 100644 CVE-2024/CVE-2024-506xx/CVE-2024-50658.json create mode 100644 CVE-2024/CVE-2024-506xx/CVE-2024-50659.json create mode 100644 CVE-2024/CVE-2024-506xx/CVE-2024-50660.json create mode 100644 CVE-2024/CVE-2024-540xx/CVE-2024-54006.json create mode 100644 CVE-2024/CVE-2024-540xx/CVE-2024-54007.json create mode 100644 CVE-2024/CVE-2024-554xx/CVE-2024-55410.json create mode 100644 CVE-2024/CVE-2024-554xx/CVE-2024-55411.json create mode 100644 CVE-2024/CVE-2024-554xx/CVE-2024-55412.json create mode 100644 CVE-2024/CVE-2024-554xx/CVE-2024-55413.json create mode 100644 CVE-2024/CVE-2024-554xx/CVE-2024-55414.json create mode 100644 CVE-2024/CVE-2024-555xx/CVE-2024-55555.json create mode 100644 CVE-2024/CVE-2024-562xx/CVE-2024-56270.json create mode 100644 CVE-2024/CVE-2024-562xx/CVE-2024-56272.json create mode 100644 CVE-2024/CVE-2024-83xx/CVE-2024-8361.json create mode 100644 CVE-2025/CVE-2025-02xx/CVE-2025-0299.json create mode 100644 CVE-2025/CVE-2025-03xx/CVE-2025-0300.json create mode 100644 CVE-2025/CVE-2025-03xx/CVE-2025-0301.json create mode 100644 CVE-2025/CVE-2025-222xx/CVE-2025-22296.json create mode 100644 CVE-2025/CVE-2025-223xx/CVE-2025-22306.json create mode 100644 CVE-2025/CVE-2025-223xx/CVE-2025-22319.json create mode 100644 CVE-2025/CVE-2025-223xx/CVE-2025-22334.json create mode 100644 CVE-2025/CVE-2025-223xx/CVE-2025-22350.json create mode 100644 CVE-2025/CVE-2025-223xx/CVE-2025-22354.json create mode 100644 CVE-2025/CVE-2025-223xx/CVE-2025-22363.json create mode 100644 CVE-2025/CVE-2025-223xx/CVE-2025-22365.json create mode 100644 CVE-2025/CVE-2025-225xx/CVE-2025-22500.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22621.json diff --git a/CVE-2020/CVE-2020-48xx/CVE-2020-4874.json b/CVE-2020/CVE-2020-48xx/CVE-2020-4874.json index f592625fd8a..bb539ab217d 100644 --- a/CVE-2020/CVE-2020-48xx/CVE-2020-4874.json +++ b/CVE-2020/CVE-2020-48xx/CVE-2020-4874.json @@ -2,8 +2,8 @@ "id": "CVE-2020-4874", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-03T17:15:07.160", - "lastModified": "2024-11-21T05:33:21.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:18:25.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,22 +71,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_controller:10.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "04E5A9C3-0F44-40C1-B6B6-92839E386F56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_controller:10.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7AA07D9A-71F7-446A-8A8E-DD8C357666F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_controller:11.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4BB85020-BF02-4C91-B494-93FB19185006" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190837", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7149876", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/190837", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7149876", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-205xx/CVE-2021-20556.json b/CVE-2021/CVE-2021-205xx/CVE-2021-20556.json index c81d4f266d4..5d4a16ea0e2 100644 --- a/CVE-2021/CVE-2021-205xx/CVE-2021-20556.json +++ b/CVE-2021/CVE-2021-205xx/CVE-2021-20556.json @@ -2,8 +2,8 @@ "id": "CVE-2021-20556", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-03T18:15:07.907", - "lastModified": "2024-11-21T05:46:46.143", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:20:08.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,24 +69,73 @@ "value": "CWE-204" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_controller:10.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "04E5A9C3-0F44-40C1-B6B6-92839E386F56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_controller:10.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7AA07D9A-71F7-446A-8A8E-DD8C357666F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_controller:11.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4BB85020-BF02-4C91-B494-93FB19185006" + } + ] + } + ] } ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/199181", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7149876", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/199181", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7149876", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-272xx/CVE-2021-27285.json b/CVE-2021/CVE-2021-272xx/CVE-2021-27285.json index 5985a414437..495ed898d44 100644 --- a/CVE-2021/CVE-2021-272xx/CVE-2021-27285.json +++ b/CVE-2021/CVE-2021-272xx/CVE-2021-27285.json @@ -2,16 +2,55 @@ "id": "CVE-2021-27285", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:07.590", - "lastModified": "2025-01-06T22:15:07.590", + "lastModified": "2025-01-07T17:15:09.260", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Inspur ClusterEngine v4.0 that allows attackers to gain escalated Local privileges and execute arbitrary commands via /opt/tsce4/torque6/bin/getJobsByShell." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Inspur ClusterEngine v4.0 que permite a los atacantes obtener privilegios locales aumentados y ejecutar comandos arbitrarios a trav\u00e9s de /opt/tsce4/torque6/bin/getJobsByShell." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/fjh1997/CVE-2021-27285", diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47104.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47104.json index 16248d67b6e..1c8deb04866 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47104.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47104.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47104", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-04T19:15:18.643", - "lastModified": "2024-11-21T06:35:24.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:32:24.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,245 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: IB/qib: corrige la p\u00e9rdida de memoria en qib_user_sdma_queue_pkts() Se utiliz\u00f3 la etiqueta goto incorrecta para el caso de error y se omiti\u00f3 la limpieza de la asignaci\u00f3n de paquetes. Direcciones-Coverity-ID: 1493352 (\"Fuga de recursos\")" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.4.292", + "versionEndExcluding": "4.4.297", + "matchCriteriaId": "E69C70A5-94AC-41EB-A99D-F630D3D7B8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9.290", + "versionEndExcluding": "4.9.295", + "matchCriteriaId": "52FC2508-8581-4293-946B-34E6B3C78684" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14.255", + "versionEndExcluding": "4.14.260", + "matchCriteriaId": "E12F7C88-A368-42E3-AA10-9A8A19C514AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.216", + "versionEndExcluding": "4.19.223", + "matchCriteriaId": "F914D152-979D-49DC-BEB8-A70542704B98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.157", + "versionEndExcluding": "5.4.169", + "matchCriteriaId": "BF258744-09C4-4706-A7C0-3C9FD555E914" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.77", + "versionEndExcluding": "5.10.89", + "matchCriteriaId": "57310B47-7CDA-4F7A-BED9-45C509CF714D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.12", + "matchCriteriaId": "7CD37FAC-AD9D-4A7B-9014-CF4F7A91800D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", + "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", + "matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*", + "matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*", + "matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8A0915FE-A4AA-4C94-B783-CF29D81E7E54" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0aaec9c5f60754b56f84460ea439b8c5e91f4caa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ced0a3015a95c6a6db45e37250912c4c86697ab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76b648063eb36c72dfc0a6896de8a0a7d2c7841c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/79dcbd8176152b860028b62f81a635d987365752", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7cf6466e00a77b0a914b7b2c28a1fc7947d55e59", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aefcc25f3a0cd28a87d11d41d30419a12cd26a34", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bee90911e0138c76ee67458ac0d58b38a3190f65", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d53456492b5d02033c73dfa0f3b94c86337791ba", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0aaec9c5f60754b56f84460ea439b8c5e91f4caa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ced0a3015a95c6a6db45e37250912c4c86697ab", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76b648063eb36c72dfc0a6896de8a0a7d2c7841c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/79dcbd8176152b860028b62f81a635d987365752", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7cf6466e00a77b0a914b7b2c28a1fc7947d55e59", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aefcc25f3a0cd28a87d11d41d30419a12cd26a34", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bee90911e0138c76ee67458ac0d58b38a3190f65", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d53456492b5d02033c73dfa0f3b94c86337791ba", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47116.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47116.json index 01e7317025a..09d873c4457 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47116.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47116.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47116", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-15T21:15:06.837", - "lastModified": "2024-11-21T06:35:25.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:31:32.993", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,129 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ext4: corrige la p\u00e9rdida de memoria en ext4_mb_init_backend en la ruta de error. Solucione una p\u00e9rdida de memoria descubierta por syzbot cuando un sistema de archivos est\u00e1 da\u00f1ado con un s_log_groups_per_flex ilegalmente grande." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.43", + "matchCriteriaId": "EED29F26-07A5-4096-A687-701C4F98A541" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.10", + "matchCriteriaId": "27384800-AB48-4C08-891E-34B66F5FC4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/04fb2baa0b147f51db065a1b13a11954abe592d0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2050c6e5b161e5e25ce3c420fef58b24fa388a49", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a8867f4e3809050571c98de7a2d465aff5e4daf5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/04fb2baa0b147f51db065a1b13a11954abe592d0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2050c6e5b161e5e25ce3c420fef58b24fa388a49", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a8867f4e3809050571c98de7a2d465aff5e4daf5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47119.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47119.json index d73c1bed0e5..aca9dec864a 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47119.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47119.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47119", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-15T21:15:07.013", - "lastModified": "2024-11-21T06:35:26.120", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:31:16.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,130 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ext4: corrige la p\u00e9rdida de memoria en ext4_fill_super Las referencias del encabezado del b\u00fafer deben liberarse antes de llamar a kill_bdev(); de lo contrario, kill_bdev no liberar\u00e1 el encabezado del b\u00fafer (y su p\u00e1gina a la que hace referencia b_data) y, posteriormente, se filtrar\u00e1 ese bh. Si los tama\u00f1os de los bloques difieren, sb_set_blocksize() eliminar\u00e1 los b\u00faferes actuales y el cach\u00e9 de la p\u00e1gina usando kill_bdev(). Y luego el superbloque se volver\u00e1 a leer, pero esta vez utilizando el tama\u00f1o de bloque correcto. sb_set_blocksize() no liber\u00f3 completamente la p\u00e1gina del superbloque y el encabezado del b\u00fafer y, al estar ocupados, no se liberaron y en su lugar se filtraron. Esto se puede reproducir f\u00e1cilmente llamando a un bucle infinito de: systemctl start .mount, y systemctl stop .mount... ya que systemd crea un cgroup para cada segmento que monta, y la fuga de bh se amplifica con un grupo de memoria moribundo que tampoco se libera nunca, y el consumo de memoria se nota mucho m\u00e1s f\u00e1cilmente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.19", + "versionEndExcluding": "5.10.43", + "matchCriteriaId": "4FE3AE47-9FE6-4BF7-A39E-A283BD97BE7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.10", + "matchCriteriaId": "27384800-AB48-4C08-891E-34B66F5FC4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/01d349a481f0591230300a9171330136f9159bcd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1385b23396d511d5233b8b921ac3058b3f86a5e1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/afd09b617db3786b6ef3dc43e28fe728cfea84df", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/01d349a481f0591230300a9171330136f9159bcd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1385b23396d511d5233b8b921ac3058b3f86a5e1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/afd09b617db3786b6ef3dc43e28fe728cfea84df", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47120.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47120.json index a334a3fcbda..c8d8dfa4995 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47120.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47120.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47120", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-15T21:15:07.060", - "lastModified": "2024-11-21T06:35:26.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-07T18:00:30.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,151 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: HID: magicmouse: corrige NULL-deref al desconectarse. el commit 9d7b18668956 (\"HID: magicmouse: agrega soporte para Apple Magic Trackpad 2\") agreg\u00f3 una verificaci\u00f3n de cordura para un trackpad de Apple pero devolvi\u00f3 el \u00e9xito. en lugar de -ENODEV cuando fall\u00f3 la verificaci\u00f3n. Esto significa que la devoluci\u00f3n de llamada de eliminaci\u00f3n eliminar\u00e1 la referencia al puntero de datos del controlador nunca inicializado cuando el controlador se desvincule posteriormente (por ejemplo, al desconectarse el USB)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.125", + "matchCriteriaId": "552FBD6A-793D-4EE1-9D44-69978256AA46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.43", + "matchCriteriaId": "B2136BD5-4F86-40C8-96C8-5C90A015490C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.10", + "matchCriteriaId": "27384800-AB48-4C08-891E-34B66F5FC4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/368c5d45a87e1bcc7f1e98e0c255c37b7b12c5d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4b4f6cecca446abcb686c6e6c451d4f1ec1a7497", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9cf27473f21913a3eaf4702dd2a25415afd5f33f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b5d013c4c76b276890135b5d32803c4c63924b77", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/368c5d45a87e1bcc7f1e98e0c255c37b7b12c5d6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4b4f6cecca446abcb686c6e6c451d4f1ec1a7497", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9cf27473f21913a3eaf4702dd2a25415afd5f33f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b5d013c4c76b276890135b5d32803c4c63924b77", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47121.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47121.json index e8c06e657c6..641b0c5ba38 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47121.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47121.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47121", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-15T21:15:07.107", - "lastModified": "2024-11-21T06:35:26.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:30:59.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,235 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: caif: corrige la p\u00e9rdida de memoria en cfusbl_device_notify En caso de que falle caif_enroll_dev(), el link_support asignado no se asignar\u00e1 a la estructura correspondiente. As\u00ed que simplemente libera el puntero asignado en caso de error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "4.4.272", + "matchCriteriaId": "1DA24694-E42B-4701-845F-C2C96D93F3B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.272", + "matchCriteriaId": "8FEC5189-264E-4620-BD41-8B5E44F20D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.236", + "matchCriteriaId": "32BD3098-E25B-4893-87B7-49DAAD61B503" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.194", + "matchCriteriaId": "219AB3A3-BDC8-47F5-A638-4A3D5D451EC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.125", + "matchCriteriaId": "552FBD6A-793D-4EE1-9D44-69978256AA46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.43", + "matchCriteriaId": "B2136BD5-4F86-40C8-96C8-5C90A015490C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.10", + "matchCriteriaId": "27384800-AB48-4C08-891E-34B66F5FC4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/46403c1f80b0d3f937ff9c4f5edc63bb64bc5051", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4d94f530cd24c85aede6e72b8923f371b45d6886", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f5d86669fa4d485523ddb1d212e0a2d90bd62bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/81afc61cb6e2b553f2c5f992fa79e0ae73857141", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9ea0ab48e755d8f29fe89eb235fb86176fdb597f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc302e30a504e6b60a9ac8df7988646f46cd0294", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dde8686985ec24d6b00487080a906609bd613ea1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e8b37f5009ea7095529790f022859711e6939c76", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/46403c1f80b0d3f937ff9c4f5edc63bb64bc5051", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4d94f530cd24c85aede6e72b8923f371b45d6886", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f5d86669fa4d485523ddb1d212e0a2d90bd62bb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/81afc61cb6e2b553f2c5f992fa79e0ae73857141", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9ea0ab48e755d8f29fe89eb235fb86176fdb597f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc302e30a504e6b60a9ac8df7988646f46cd0294", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dde8686985ec24d6b00487080a906609bd613ea1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e8b37f5009ea7095529790f022859711e6939c76", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47122.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47122.json index c0d81e39ba3..a662d91e6ad 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47122.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47122.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47122", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-15T21:15:07.157", - "lastModified": "2024-11-21T06:35:26.447", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:30:41.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,235 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: caif: corrige la p\u00e9rdida de memoria en caif_device_notify En caso de que falle caif_enroll_dev(), el link_support asignado no se asignar\u00e1 a la estructura correspondiente. As\u00ed que simplemente libera el puntero asignado en caso de error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "4.4.272", + "matchCriteriaId": "1DA24694-E42B-4701-845F-C2C96D93F3B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.272", + "matchCriteriaId": "8FEC5189-264E-4620-BD41-8B5E44F20D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.236", + "matchCriteriaId": "32BD3098-E25B-4893-87B7-49DAAD61B503" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.194", + "matchCriteriaId": "219AB3A3-BDC8-47F5-A638-4A3D5D451EC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.125", + "matchCriteriaId": "552FBD6A-793D-4EE1-9D44-69978256AA46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.43", + "matchCriteriaId": "B2136BD5-4F86-40C8-96C8-5C90A015490C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.10", + "matchCriteriaId": "27384800-AB48-4C08-891E-34B66F5FC4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3be863c11cab725add9fef4237ed4e232c3fc3bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4bca2034b41c15b62d47a19158bb76235fd4455d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6a0e317f61094d377335547e015dd2ff12caf893", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9348c1f10932f13b299cbc8b1bd5f780751fae49", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af2806345a37313f01b1c9f15e046745b8ee2daa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b042e2b2039565eb8f0eb51c14fbe1ef463c8cd8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b53558a950a89824938e9811eddfc8efcd94e1bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f52f4fd67264c70cd0b4ba326962ebe12d9cba94", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3be863c11cab725add9fef4237ed4e232c3fc3bb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4bca2034b41c15b62d47a19158bb76235fd4455d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6a0e317f61094d377335547e015dd2ff12caf893", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9348c1f10932f13b299cbc8b1bd5f780751fae49", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af2806345a37313f01b1c9f15e046745b8ee2daa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b042e2b2039565eb8f0eb51c14fbe1ef463c8cd8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b53558a950a89824938e9811eddfc8efcd94e1bb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f52f4fd67264c70cd0b4ba326962ebe12d9cba94", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47125.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47125.json index 2641d32312a..ecf50a3889b 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47125.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47125.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47125", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-15T21:15:07.307", - "lastModified": "2024-11-21T06:35:26.800", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-07T18:00:04.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,109 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sch_htb: corrige la fuga de recuento en htb_parent_to_leaf_offload el commit ae81feb7338c (\"sch_htb: corrige la desreferencia del puntero nulo en un new_q nulo\") corrige un error de desreferencia del puntero NULL, pero no es correcto. Debido a que htb_graft_helper maneja adecuadamente el caso cuando new_q es NULL, y despu\u00e9s del parche anterior al omitir esta llamada, se crea una inconsistencia: dev_queue->qdisc seguir\u00e1 apuntando a la qdisc anterior, pero cl->parent->leaf.q apuntar\u00e1 a el nuevo (que ser\u00e1 noop_qdisc, porque new_q era NULL). El c\u00f3digo se basa en la suposici\u00f3n de que estos dos indicadores son iguales, por lo que puede provocar fugas de recuento. La soluci\u00f3n correcta es agregar una verificaci\u00f3n de puntero NULL para proteger qdisc_refcount_inc dentro de htb_parent_to_leaf_offload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.10", + "matchCriteriaId": "C68A4290-9FFF-4037-9467-4FF878E3085F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2411c02d03892a5057499f8102d0cc1e0f852416", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/944d671d5faa0d78980a3da5c0f04960ef1ad893", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2411c02d03892a5057499f8102d0cc1e0f852416", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/944d671d5faa0d78980a3da5c0f04960ef1ad893", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47127.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47127.json index d850113e519..47d40df6435 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47127.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47127.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47127", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-15T21:15:07.417", - "lastModified": "2024-11-21T06:35:27.097", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-07T17:59:07.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,109 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ice: rastrear colas habilitadas para AF_XDP ZC en mapa de bits. El commit c7a219048e45 (\"ice: Remove xsk_buff_pool from VSI Structure\") introdujo silenciosamente una regresi\u00f3n y rompi\u00f3 el lado Tx de AF_XDP en modo de copia. xsk_pool en ice_ring se configura \u00fanicamente en funci\u00f3n de la existencia del programa XDP en la VSI, que a su vez selecciona ice_clean_tx_irq_zc para ejecutarse. Eso no es algo que deber\u00eda suceder en el modo de copia, ya que deber\u00eda usar la ruta de datos normal ice_clean_tx_irq. Esto da como resultado el siguiente s\u00edmbolo cuando xdpsock se ejecuta en escenarios txonly o l2fwd en modo copia: [ 106.050195] ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000030 [ 106.057269] #PF: acceso de lectura del supervisor en modo kernel [ 106.062493] #PF: error_code(0x0000) - p\u00e1gina no presente [106.067709] PGD 0 P4D 0 [106.070293] Ups: 0000 [#1] PREEMPT SMP NOPTI [106.074721] CPU: 61 PID: 0 Comm: swapper/61 No contaminado 5.12. 0-rc2+ #45 [ 106.081436] Nombre de hardware: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 19/03/2019 [ 106.092027] RIP: 0010:xp_raw_get_dma+0x3 6/0x50 [ 106.096551] C\u00f3digo: 74 14 48 b8 ff ff ff ff ff ff 00 00 48 21 f0 48 c1 ee 30 48 01 c6 48 8b 87 90 00 00 00 48 89 f2 81 e6 ff 0f 00 00 48 c1 ea 0c <48> 8b 04 d0 48 83 e0 fe 4 8 01 f0 c3 66 66 2e 0f 1f 84 00 00 00 00 [ 106.115588] RSP: 0018:ffffc9000d694e50 EFLAGS: 00010206 [ 106.120893] RAX: 0000000000000000 RBX: ffff88984b8c8a00 RCX: ffff889852581800 [ 106.128137] RDX: 0000000000000006 RSI: 000000000000000000 RDI: ffff88984cd8b800 [ 106.135383 ] RBP: ffff888123b50001 R08: ffff889896800000 R09: 0000000000000800 [ 106.142628] R10: 00000000000000000 R11: ffffffff826060c0 R12: 00000000 000000ff [ 106.149872] R13: 0000000000000000 R14: 0000000000000040 R15: ffff888123b50018 [ 106.157117] FS: 0000000000000000(0000) GS:ffff8 897e0f40000(0000) knlGS :0000000000000000 [ 106.165332] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 106.171163] CR2: 0000000000000030 CR3: 000000000560a004 CR4: 00000000007706e0 [ 106.178408] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 00000000000000000 [ 106.185653] DR3: 0000000000000000 0 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 106.192898] PKRU: 55555554 [ 106.195653] Seguimiento de llamadas: [ 106.198143] [ 106.200196] ice_clean_tx_irq_zc+0x183/0x2a0 [ice] [ 106 .205087] ice_napi_poll+0x3e/0x590 [hielo] [ 106.209356] __napi_poll+0x2a/ 0x160 [ 106.212911] net_rx_action+0xd6/0x200 [ 106.216634] __do_softirq+0xbf/0x29b [ 106.220274] irq_exit_rcu+0x88/0xc0 [ 106.223819] common_interrupt+0x7b/0xa0 [ 106.227719] [ 106.229857] asm_common_interrupt+0x1e/0x40 Solucione este problema introduciendo el mapa de bits de las colas que est\u00e1n habilitadas para copia cero, donde cada bit, correspondiente a una identificaci\u00f3n de cola en la que se est\u00e1 configurando el grupo xsk, se establecer\u00e1/borrar\u00e1 dentro de ice_xsk_pool_{en,dis}able y se verificar\u00e1 dentro ice_xsk_pool(). Esta \u00faltima es una funci\u00f3n utilizada para decidir qu\u00e9 rutina de encuesta napi se ejecuta. La idea se ha tomado de nuestros otros controladores, como i40e e ixgbe." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.10", + "matchCriteriaId": "C68A4290-9FFF-4037-9467-4FF878E3085F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1d34fa4fcf06649036ba0c97854fcf7a741ee18c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e102db780e1c14f10c70dafa7684af22a745b51d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1d34fa4fcf06649036ba0c97854fcf7a741ee18c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e102db780e1c14f10c70dafa7684af22a745b51d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47133.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47133.json index ba31eb9939e..bec74eba066 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47133.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47133.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47133", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-15T21:15:07.733", - "lastModified": "2024-11-21T06:35:27.883", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:30:18.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,109 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: amd_sfh: Reparar p\u00e9rdida de memoria en amd_sfh_work La herramienta Kmemleak detect\u00f3 una p\u00e9rdida de memoria en el controlador amd_sfh. ==================== objeto sin referencia 0xffff88810228ada0 (tama\u00f1o 32): comm \"insmod\", pid 3968, jiffies 4295056001 (edad 775,792 s) volcado hexadecimal (primeros 32 bytes) : 00 20 73 1f 81 88 ff ff 00 01 00 00 00 00 ad de . s................. 22 01 00 00 00 00 ad de 01 00 02 00 00 00 00 00 \"................. retroceso: [< 000000007b4c8799>] kmem_cache_alloc_trace+0x163/0x4f0 [<0000000005326893>] amd_sfh_get_report+0xa4/0x1d0 [amd_sfh] [<000000002a9e5ec4>] amdtp_hid_request+0x6 2/0x80 [amd_sfh] [<00000000b8a95807>] sensor_hub_get_feature+0x145/0x270 [hid_sensor_hub] [<00000000fda054ee >] hid_sensor_parse_common_attributes+0x215/0x460 [hid_sensor_iio_common] [<0000000021279ecf>] hid_accel_3d_probe+0xff/0x4a0 [hid_sensor_accel_3d] [<00000000915760ce>] platform_probe+0x6a/0xd0 [ <0000000060258a1f>] very_probe+0x192/0x620 [<00000000fa812f2d>] driver_probe_device+ 0x14a/0x1d0 [<000000005e79f7fd>] __device_attach_driver+0xbd/0x110 [<0000000070d15018>] bus_for_each_drv+0xfd/0x160 [<0000000013a3c312>] __device_attach+0x1 8b/0x220 [<000000008c7b4afc>] dispositivo_sonda_inicial+0x13/0x20 [<00000000e6e99665>] bus_probe_dispositivo+ 0xfe/0x120 [<00000000833fa90b>] device_add+0x6a6/0xe00 [<00000000fa901078>] platform_device_add+0x180/0x380 ===================== La soluci\u00f3n es liberar la entrada request_list una vez que la entrada procesada se elimina de request_list." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.10", + "matchCriteriaId": "27384800-AB48-4C08-891E-34B66F5FC4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/29beadea66a226d744d5ffdcde6b984623053d24", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5ad755fd2b326aa2bc8910b0eb351ee6aece21b1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/29beadea66a226d744d5ffdcde6b984623053d24", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5ad755fd2b326aa2bc8910b0eb351ee6aece21b1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47180.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47180.json index c5ead139b79..5c027e86ca0 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47180.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47180.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47180", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-25T10:15:09.363", - "lastModified": "2024-11-21T06:35:34.167", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:17:24.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,230 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: NFC: nci: corrige la p\u00e9rdida de memoria en nci_allocate_device nfcmrvl_disconnect no logra liberar el campo hci_dev en la estructura nci_dev. Solucione este problema liberando hci_dev en nci_free_device. ERROR: p\u00e9rdida de memoria, objeto sin referencia 0xffff888111ea6800 (tama\u00f1o 1024): comunicaci\u00f3n \"kworker/1:0\", pid 19, jiffies 4294942308 (edad 13.580 s) volcado hexadecimal (primeros 32 bytes): 00 00 00 00 00 00 00 00 00 60 fd 0c 81 88 ff ff .........`...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............. ... seguimiento: [<000000004bc25d43>] kmalloc include/linux/slab.h:552 [en l\u00ednea] [<000000004bc25d43>] kzalloc include/linux/slab.h:682 [en l\u00ednea] [<000000004bc25d43>] nci_hci_allocate+0x21/ 0xd0 net/nfc/nci/hci.c:784 [<00000000c59cff92>] nci_allocate_device net/nfc/nci/core.c:1170 [en l\u00ednea] [<00000000c59cff92>] nci_allocate_device+0x10b/0x160 net/nfc/nci/core. c:1132 [<00000000006e0a8e>] nfcmrvl_nci_register_dev+0x10a/0x1c0 controladores/nfc/nfcmrvl/main.c:153 [<000000004da1b57e>] nfcmrvl_probe+0x223/0x290 controladores/nfc/nfcmr vl/usb.c:345 [<00000000d506aed9>] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396 [<00000000bc632c92>] very_probe+0x159/0x4a0 drivers/base/dd.c:554 [<00000000f5009125>] driver_probe_device+0x84/0x100 drivers/base/dd .c:740 [<000000000ce658ca>] __device_attach_driver+0xee/0x110 controladores/base/dd.c:846 [<000000007067d05f>] bus_for_each_drv+0xb7/0x100 controladores/base/bus.c:431 [<00000000f8e1337 2>] __device_attach+0x122 /0x250 controladores/base/dd.c:914 [<000000009cf68860>] bus_probe_device+0xc6/0xe0 controladores/base/bus.c:491 [<00000000359c965a>] dispositivo_add+0x5be/0xc30 controladores/base/core.c:3109 [ <00000000086e4bd3>] usb_set_configuration+0x9d9/0xb90 controladores/usb/core/message.c:2164 [<00000000ca036872>] usb_generic_driver_probe+0x8c/0xc0 controladores/usb/core/generic.c:238 [<00000000d40d3 6f6>] dispositivo_probe_usb+0x5c/ 0x140 controladores/usb/core/driver.c:293 [<00000000bc632c92>] very_probe+0x159/0x4a0 controladores/base/dd.c:554" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "versionEndExcluding": "4.4.271", + "matchCriteriaId": "2DB78FDC-C9EA-4ACD-A898-A03A3597EEDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.271", + "matchCriteriaId": "1E7DAE3A-78E9-45DB-96D8-4541CD7DC26B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.235", + "matchCriteriaId": "03A23445-0C1A-42AB-AC5C-768360DDF32C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.193", + "matchCriteriaId": "C8DEF3EC-88D9-4B89-8CF9-64BD6C863C9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.123", + "matchCriteriaId": "E155FDCC-159C-4B41-A583-2A3E1FD04585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.41", + "matchCriteriaId": "19259C31-3EC0-4F2C-BC92-B844E9D1BE5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.8", + "matchCriteriaId": "2F14396C-5D81-4DCA-BF2C-B00F1CB73DDD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0365701bc44e078682ee1224866a71897495c7ef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2c2fb2df46ea866b49fea5ec7112ec3cd4896c74", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/448a1cb12977f52142e6feb12022c59662d88dc1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4a621621c7af3cec21c47c349b30cd9c3cea11c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/65234f50a90b64b335cbb9164b8a98c2a0d031dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af2a4426baf71163c0c354580ae98c7888a9aba7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b34cb7ac32cc8e5471dc773180ea9ae676b1a745", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e0652f8bb44d6294eeeac06d703185357f25d50b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0365701bc44e078682ee1224866a71897495c7ef", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2c2fb2df46ea866b49fea5ec7112ec3cd4896c74", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/448a1cb12977f52142e6feb12022c59662d88dc1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4a621621c7af3cec21c47c349b30cd9c3cea11c8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/65234f50a90b64b335cbb9164b8a98c2a0d031dd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af2a4426baf71163c0c354580ae98c7888a9aba7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b34cb7ac32cc8e5471dc773180ea9ae676b1a745", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e0652f8bb44d6294eeeac06d703185357f25d50b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47190.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47190.json index 53350565bbd..26cb4e92195 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47190.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47190.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47190", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:47.617", - "lastModified": "2024-11-21T06:35:35.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:11:50.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: perf bpf: Evitar p\u00e9rdida de memoria de perf_env__insert_btf() perf_env__insert_btf() no se inserta si se encuentra un ID de BTF duplicado y esto provoca una p\u00e9rdida de memoria. Modifique la funci\u00f3n para que devuelva un valor de \u00e9xito/error y luego libere la memoria si la inserci\u00f3n no ocurri\u00f3. v2. Agrega un retorno -1 cuando ocurre el error de inserci\u00f3n en perf_env__fetch_btf. Esto no afecta a nada ya que el resultado nunca se verifica." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.4.162", + "matchCriteriaId": "1EA79351-9450-4ADC-97B7-02437D35FBB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.82", + "matchCriteriaId": "AE501832-500C-4EF1-9489-5C13674F619D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "2128A085-4C0C-4C1E-9E9C-0DD868E2170F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47200.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47200.json index 75c8ce23d3a..5951816d9bc 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47200.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47200.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47200", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.077", - "lastModified": "2024-11-21T06:35:36.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:12:06.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/prime: Arreglar el use-after-free en mmap con drm_gem_ttm_mmap drm_gem_ttm_mmap() elimina una referencia al objeto gema en caso de \u00e9xito. Si el refcount del objeto gema == 1 en la entrada a drm_gem_prime_mmap(), esa eliminaci\u00f3n liberar\u00e1 el objeto gema y el drm_gem_object_get() posterior ser\u00e1 un UAF. Se soluciona tomando una referencia antes de llamar al ayudante mmap. Este problema se previ\u00f3 cuando se agreg\u00f3 la eliminaci\u00f3n de referencia en el commit 9786b65bc61ac (\"drm/ttm: corregir el recuento de referencias mmap\"): \"Para que eso funcione correctamente, la llamada drm_gem_object_get() en drm_gem_ttm_mmap() debe moverse para que suceda antes de llamar a obj->funcs->mmap(), de lo contrario, el recuento de referencias de la gema bajar\u00eda a cero\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "24C2E67E-369B-4DC4-89C9-101DE1BAA919" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4f8e469a2384dfa4047145b0093126462cbb6dc0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8244a3bc27b3efd057da154b8d7e414670d5044f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4f8e469a2384dfa4047145b0093126462cbb6dc0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8244a3bc27b3efd057da154b8d7e414670d5044f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47206.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47206.json index aa509b333bd..50f76ad7303 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47206.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47206.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47206", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.357", - "lastModified": "2024-11-21T06:35:37.683", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:12:26.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,214 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: host: ohci-tmio: verificar el valor de retorno despu\u00e9s de llamar a platform_get_resource() Causar\u00e1 null-ptr-deref si platform_get_resource() devuelve NULL, necesitamos verificar el valor de retorno." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.293", + "matchCriteriaId": "83024F84-4857-4CAF-957E-C14804BAC4AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.291", + "matchCriteriaId": "8B1EE39E-FE30-4B7D-A26F-631135BCBB3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.256", + "matchCriteriaId": "FCEB92FF-21BF-4F75-ACA1-6AE1D51A79FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.218", + "matchCriteriaId": "4F85F433-5DEA-47D3-B07E-3B1AC474D6E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.162", + "matchCriteriaId": "51A152D8-D5CE-47BD-9041-DEE164DCE99D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.82", + "matchCriteriaId": "AE501832-500C-4EF1-9489-5C13674F619D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "2128A085-4C0C-4C1E-9E9C-0DD868E2170F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/065334f6640d074a1caec2f8b0091467a22f9483", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/28e016e02118917e50a667bc72fb80098cf2b460", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2f18f97a1a787154a372c0738f1576f14b693d91", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/951b8239fd24678b56c995c5c0456ab12e059d19", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9eff2b2e59fda25051ab36cd1cb5014661df657b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bb6ed2e05eb6e8619b30fa854f9becd50c11723f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f98986b7acb4219f95789095eced93ed69d81d35", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/065334f6640d074a1caec2f8b0091467a22f9483", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/28e016e02118917e50a667bc72fb80098cf2b460", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2f18f97a1a787154a372c0738f1576f14b693d91", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/951b8239fd24678b56c995c5c0456ab12e059d19", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9eff2b2e59fda25051ab36cd1cb5014661df657b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bb6ed2e05eb6e8619b30fa854f9becd50c11723f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f98986b7acb4219f95789095eced93ed69d81d35", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47549.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47549.json index f9a601c2ae0..b6a8ee910fa 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47549.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47549.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47549", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-24T15:15:19.773", - "lastModified": "2024-11-21T06:36:31.420", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:04:16.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,230 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: sata_fsl: corrige UAF en sata_fsl_port_stop cuando rmmod sata_fsl Cuando se ejecuta el comando `rmmod sata_fsl.ko` en el PPC64 GNU/Linux se reporta un error: ====== ==================================================== ========== ERROR: No se puede manejar el acceso a los datos del kernel al leer en 0x80000800805b502c Ups: Acceso al kernel del \u00e1rea defectuosa, firma: 11 [#1] NIP [c0000000000388a4] .ioread32+0x4/0x20 LR [80000000000c6034 ] .sata_fsl_port_stop+0x44/0xe0 [sata_fsl] Seguimiento de llamadas: .free_irq+0x1c/0x4e0 (no confiable) .ata_host_stop+0x74/0xd0 [libata] .release_nodes+0x330/0x3f0 .device_release_driver_internal+0x178/0x2c0. driver_detach+0x64/0xd0 . bus_remove_driver+0x70/0xf0 .driver_unregister+0x38/0x80 .platform_driver_unregister+0x14/0x30 .fsl_sata_driver_exit+0x18/0xa20 [sata_fsl] .__se_sys_delete_module+0x1ec/0x2d0 .system_call_exception+ 0xfc/0x1f0 system_call_common+0xf8/0x200 ======= ==================================================== ========= La activaci\u00f3n del ERROR se muestra en la siguiente pila: driver_detach device_release_driver_internal __device_release_driver drv->remove(dev) --> platform_drv_remove/platform_remove drv->remove(dev) --> sata_fsl_remove iounmap( host_priv->hcr_base); <---- desasignar kfree(host_priv); <---- free devres_release_all release_nodes dr->node.release(dev, dr->data) --> ata_host_stop ap->ops->port_stop(ap) --> sata_fsl_port_stop ioread32(hcr_base + HCONTROL) <--- - UAF host->ops->host_stop(host) Las funciones iounmap(host_priv->hcr_base) y kfree(host_priv) no deben ejecutarse en drv->remove. Estas funciones deben ejecutarse en host_stop despu\u00e9s de port_stop. Por lo tanto, movemos estas funciones a la nueva funci\u00f3n sata_fsl_host_stop y vinculamos la nueva funci\u00f3n a host_stop." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.24", + "versionEndExcluding": "4.4.294", + "matchCriteriaId": "A36A37BB-462B-4E8E-8E56-F443DA1ED26C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.292", + "matchCriteriaId": "DB7F6C04-42D3-48A3-892D-2487383B9B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.257", + "matchCriteriaId": "7080D941-9847-42F5-BA50-0A03CFB61FD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.220", + "matchCriteriaId": "FFE5D9F3-CF1C-4DE8-9116-2EBE7BDEF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.164", + "matchCriteriaId": "D2D8DC10-1823-4334-BD0F-C1B620602FF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.84", + "matchCriteriaId": "AE5B4333-2C46-40C3-8B42-0168AD91DDE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.7", + "matchCriteriaId": "A696A60B-2782-4119-83DD-1EFFBC903F02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", + "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", + "matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0769449b0a5eabc3545337217ae690e46673e73a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/325ea49fc43cbc03a5e1e37de8f0ca6357ced4b1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4a46b2f5dce02539e88a300800812bd24a45e097", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6c8ad7e8cf29eb55836e7a0215f967746ab2b504", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/77393806c76b6b44f1c44bd957788c8bd9152c45", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/91ba94d3f7afca195b224f77a72044fbde1389ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/adf098e2a8a1e1fc075d6a5ba2edd13cf7189082", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cdcd80292106df5cda325426e96495503e41f947", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0769449b0a5eabc3545337217ae690e46673e73a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/325ea49fc43cbc03a5e1e37de8f0ca6357ced4b1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4a46b2f5dce02539e88a300800812bd24a45e097", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6c8ad7e8cf29eb55836e7a0215f967746ab2b504", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/77393806c76b6b44f1c44bd957788c8bd9152c45", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/91ba94d3f7afca195b224f77a72044fbde1389ce", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/adf098e2a8a1e1fc075d6a5ba2edd13cf7189082", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cdcd80292106df5cda325426e96495503e41f947", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31693.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31693.json index 4f63373fb84..f1b6c596076 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31693.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31693.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31693", "sourceIdentifier": "security@vmware.com", "published": "2023-06-07T14:15:09.727", - "lastModified": "2024-11-21T07:05:08.777", + "lastModified": "2025-01-07T17:15:10.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0121.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0121.json index b2b9326ab5a..cef1a9ad8c5 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0121.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0121.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0121", "sourceIdentifier": "cve@gitlab.com", "published": "2023-06-07T17:15:09.727", - "lastModified": "2024-11-21T07:36:35.700", + "lastModified": "2025-01-07T17:15:11.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -177,6 +177,14 @@ "Permissions Required", "Third Party Advisory" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/387549", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0508.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0508.json index 6de3f89bf34..cf8fb37fc4e 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0508.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0508.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0508", "sourceIdentifier": "cve@gitlab.com", "published": "2023-06-07T17:15:09.823", - "lastModified": "2024-11-21T07:37:18.810", + "lastModified": "2025-01-07T17:15:11.700", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -175,6 +175,13 @@ "Permissions Required", "Third Party Advisory" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/389328", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2001.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2001.json index 35224fbe341..f1d15e7ace3 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2001.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2001.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2001", "sourceIdentifier": "cve@gitlab.com", "published": "2023-06-07T17:15:09.967", - "lastModified": "2024-11-21T07:57:44.593", + "lastModified": "2025-01-07T17:15:13.167", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ @@ -163,6 +173,13 @@ "Permissions Required", "Third Party Advisory" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/406764", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2013.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2013.json index fcc35dc17fd..dda71abcde3 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2013.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2013.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2013", "sourceIdentifier": "cve@gitlab.com", "published": "2023-06-07T17:15:10.030", - "lastModified": "2024-11-21T07:57:45.763", + "lastModified": "2025-01-07T17:15:13.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] } ], "configurations": [ @@ -165,6 +175,13 @@ "Permissions Required", "Third Party Advisory" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/406844", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2015.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2015.json index fa798562248..eceea74575f 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2015.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2015.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2015", "sourceIdentifier": "cve@gitlab.com", "published": "2023-06-07T17:15:10.087", - "lastModified": "2024-11-21T07:57:46.010", + "lastModified": "2025-01-07T17:15:13.950", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ @@ -165,6 +175,13 @@ "Permissions Required", "Third Party Advisory" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/407137", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2198.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2198.json index 4007e5bb691..2aa462dc64a 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2198.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2198.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2198", "sourceIdentifier": "cve@gitlab.com", "published": "2023-06-07T17:15:10.150", - "lastModified": "2024-11-21T07:58:08.287", + "lastModified": "2025-01-07T17:15:14.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-1333" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] } ], "configurations": [ @@ -165,6 +175,13 @@ "Permissions Required", "Third Party Advisory" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/408273", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2199.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2199.json index 2abe187943f..7ec38c4f053 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2199.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2199.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2199", "sourceIdentifier": "cve@gitlab.com", "published": "2023-06-07T17:15:10.207", - "lastModified": "2024-11-21T07:58:08.397", + "lastModified": "2025-01-07T17:15:14.397", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-1333" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] } ], "configurations": [ @@ -165,6 +175,13 @@ "Permissions Required", "Third Party Advisory" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/408272", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2442.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2442.json index 759a4365036..c1f61fbf49e 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2442.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2442.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2442", "sourceIdentifier": "cve@gitlab.com", "published": "2023-06-07T16:15:09.403", - "lastModified": "2024-11-21T07:58:37.517", + "lastModified": "2025-01-07T17:15:14.570", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ @@ -151,6 +161,13 @@ "Permissions Required", "Third Party Advisory" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/409346", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2589.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2589.json index 467cea67988..e3c1072c670 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2589.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2589.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2589", "sourceIdentifier": "cve@gitlab.com", "published": "2023-06-07T17:15:10.330", - "lastModified": "2024-11-21T07:58:53.270", + "lastModified": "2025-01-07T17:15:14.747", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] } ], "configurations": [ @@ -165,6 +175,13 @@ "Permissions Required", "Third Party Advisory" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/407891", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30400.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30400.json index 46416615b29..25c658abe01 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30400.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30400.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30400", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-07T01:15:39.143", - "lastModified": "2024-11-21T08:00:07.597", + "lastModified": "2025-01-07T17:15:14.917", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52564.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52564.json index 73c3931605d..0bde33ffc0e 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52564.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52564.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52564", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:48.933", - "lastModified": "2024-11-21T08:40:04.327", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:34:18.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,167 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Revertir \"tty: n_gsm: fix UAF in gsm_cleanup_mux\" Esto revierte el commit 9b9c8195f3f0d74a826077fc1c01b9ee74907239. el commit anterior se revierte porque no resolvi\u00f3 el problema original. gsm_cleanup_mux() intenta liberar los ttys virtuales llamando a gsm_dlci_release() para cada DLCI disponible. All\u00ed, se llama a dlci_put() para disminuir el contador de referencia para el DLCI a trav\u00e9s de tty_port_put() que finalmente llama a gsm_dlci_free(). Esto ya borra el puntero que se est\u00e1 verificando en gsm_cleanup_mux() antes de llamar a gsm_dlci_release(). Por lo tanto, no es necesario borrar este puntero en gsm_cleanup_mux() como se hizo en el commit revertida. el commit introduce una desreferencia de puntero nulo: ? __die+0x1f/0x70 ? page_fault_oops+0x156/0x420? search_exception_tables+0x37/0x50? fixup_exception+0x21/0x310? exc_page_fault+0x69/0x150? asm_exc_page_fault+0x26/0x30? tty_port_put+0x19/0xa0 gsmtty_cleanup+0x29/0x80 [n_gsm] release_one_tty+0x37/0xe0 proceso_one_work+0x1e6/0x3e0 trabajador_thread+0x4c/0x3d0 ? __pfx_worker_thread+0x10/0x10 kthread+0xe1/0x110 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x2f/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1b/0x30 El problema real es que nada protege a dlci_put() de ser llamado varias veces mientras el controlador tty se activ\u00f3 pero a\u00fan no termin\u00f3 de llamar a gsm_dlci_free()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.190", + "versionEndExcluding": "5.10.198", + "matchCriteriaId": "BB2D8159-4945-414E-BE3E-012D06CDECF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.124", + "versionEndExcluding": "5.15.134", + "matchCriteriaId": "19F970A2-0C87-43BE-A458-32CE99A8466F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.43", + "versionEndExcluding": "6.1.56", + "matchCriteriaId": "A7A76EF2-AF5B-4071-9E4E-F62A07108496" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5", + "versionEndExcluding": "6.5.6", + "matchCriteriaId": "37A7D3E0-22DF-4D92-9B5E-F8505D3471A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", + "matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", + "matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*", + "matchCriteriaId": "0DC421F1-3D5A-4BEF-BF76-4E468985D20B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/29346e217b8ab8a52889b88f00b268278d6b7668", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2bff660e0ff349dee84dc4f6f6d10da4497f5b28", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d5c8862932d31a810b6545f7d69ecc124402c6e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a48d2bcd23f2c98d575bc2f9b7a3fbd16aeea9eb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c61d0b87a7028c2c10faffc524d748334c7b9827", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/29346e217b8ab8a52889b88f00b268278d6b7668", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2bff660e0ff349dee84dc4f6f6d10da4497f5b28", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d5c8862932d31a810b6545f7d69ecc124402c6e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a48d2bcd23f2c98d575bc2f9b7a3fbd16aeea9eb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c61d0b87a7028c2c10faffc524d748334c7b9827", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52637.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52637.json index 524479d4d16..63213e89461 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52637.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52637.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52637", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:51.347", - "lastModified": "2024-11-21T08:40:15.393", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:22:33.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,67 +15,236 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: j1939: Reparar UAF en j1939_sk_match_filter durante setsockopt(SO_J1939_FILTER) Bloquear jsk->sk para evitar UAF cuando setsockopt(..., SO_J1939_FILTER, ...) modifica jsk-> filtros mientras recibe paquetes. Se vio el siguiente rastro en el sistema afectado: ============================================ ======================== ERROR: KASAN: slab-use-after-free en j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939] Lectura de tama\u00f1o 4 en direcci\u00f3n ffff888012144014 por tarea j1939/350 CPU: 0 PID: 350 Comm: j1939 Contaminado: GW OE 6.5.0-rc5 #1 Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/ 01/2014 Seguimiento de llamadas: print_report+0xd3/0x620 ? kasan_complete_mode_report_info+0x7d/0x200 ? j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939] kasan_report+0xc2/0x100 ? j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939] __asan_load4+0x84/0xb0 j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939] j1939_sk_recv+0x20b/0x320 [can_j1939] ? __kasan_check_write+0x18/0x20? __pfx_j1939_sk_recv+0x10/0x10 [can_j1939] ? j1939_simple_recv+0x69/0x280 [can_j1939] ? j1939_ac_recv+0x5e/0x310 [can_j1939] j1939_can_recv+0x43f/0x580 [can_j1939] ? __pfx_j1939_can_recv+0x10/0x10 [can_j1939] ? raw_rcv+0x42/0x3c0 [puede_raw]? __pfx_j1939_can_recv+0x10/0x10 [can_j1939] can_rcv_filter+0x11f/0x350 [puede] can_receive+0x12f/0x190 [puede]? __pfx_can_rcv+0x10/0x10 [puede] can_rcv+0xdd/0x130 [puede] ? __pfx_can_rcv+0x10/0x10 [puede] __netif_receive_skb_one_core+0x13d/0x150 ? __pfx___netif_receive_skb_one_core+0x10/0x10 ? __kasan_check_write+0x18/0x20? _raw_spin_lock_irq+0x8c/0xe0 __netif_receive_skb+0x23/0xb0 Process_backlog+0x107/0x260 __napi_poll+0x69/0x310 net_rx_action+0x2a1/0x580 ? __pfx_net_rx_action+0x10/0x10 ? __pfx__raw_spin_lock+0x10/0x10? handle_irq_event+0x7d/0xa0 __do_softirq+0xf3/0x3f8 do_softirq+0x53/0x80 __local_bh_enable_ip+0x6e/0x70 netif_rx+0x16b/0x180 can_send+0x32b/0x520 [can] ? __pfx_can_send+0x10/0x10 [puede]? __check_object_size+0x299/0x410 raw_sendmsg+0x572/0x6d0 [can_raw]? __pfx_raw_sendmsg+0x10/0x10 [can_raw]? apparmor_socket_sendmsg+0x2f/0x40? __pfx_raw_sendmsg+0x10/0x10 [can_raw] sock_sendmsg+0xef/0x100 sock_write_iter+0x162/0x220 ? __pfx_sock_write_iter+0x10/0x10? __rtnl_unlock+0x47/0x80? permiso_archivo_seguridad+0x54/0x320 vfs_write+0x6ba/0x750 ? __pfx_vfs_write+0x10/0x10? __fget_light+0x1ca/0x1f0 ? __rcu_read_unlock+0x5b/0x280 ksys_write+0x143/0x170 ? __pfx_ksys_write+0x10/0x10? __kasan_check_read+0x15/0x20 ? fpregs_assert_state_consistent+0x62/0x70 __x64_sys_write+0x47/0x60 do_syscall_64+0x60/0x90 ? do_syscall_64+0x6d/0x90? irqentry_exit+0x3f/0x50? exc_page_fault+0x79/0xf0 Entry_SYSCALL_64_after_hwframe+0x6e/0xd8 Asignado por la tarea 348: kasan_save_stack+0x2a/0x50 kasan_set_track+0x29/0x40 kasan_save_alloc_info+0x1f/0x30 __kasan_kmalloc+0xb5/0xc0 __kmalloc_node_track_caller+0x67/0x160 j1939_sk_setsockopt+0x284/0x450 [can_j1939] __sys_setsockopt+ 0x15c/0x2f0 __x64_sys_setsockopt+0x6b/0x80 do_syscall_64+0x60/0x90 Entry_SYSCALL_64_after_hwframe+0x6e/0xd8 Liberado por la tarea 349: kasan_save_stack+0x2a/0x50 kasan_set_track+0x29/0x40 ka san_save_free_info+0x2f/0x50 __kasan_slab_free+0x12e/0x1c0 __kmem_cache_free+0x1b9/0x380 kfree+ 0x7a/0x120 j1939_sk_setsockopt+0x3b2/0x450 [can_j1939] __sys_setsockopt+0x15c/0x2f0 __x64_sys_setsockopt+0x6b/0x80 do_syscall_64+0x60/0x90 Entry_SYSCALL_64_after_h wframe+0x6e/0xd8" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4", + "versionEndExcluding": "5.4.269", + "matchCriteriaId": "E2B90340-A8CC-4956-9F40-F37195011EC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.210", + "matchCriteriaId": "F5CB4CA6-A9A0-4AFD-9102-8CF94D708170" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.149", + "matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.79", + "matchCriteriaId": "656E2F29-1779-4EFC-AA64-8F984E2885B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.18", + "matchCriteriaId": "BD961E49-FEDA-47CF-BF23-4D2BD942B4E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.6", + "matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/08de58abedf6e69396e1207e4f99ef8904b2b532", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/41ccb5bcbf03f02d820bc6ea8390811859f558f8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4dd684d4bb3cd5454e0bf6e2a1bdfbd5c9c872ed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/978e50ef8c38dc71bd14d1b0143d554ff5d188ba", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/efe7cf828039aedb297c1f9920b638fffee6aabc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f84e7534457dcd7835be743517c35378bb4e7c50", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fc74b9cb789cae061bbca7b203a3842e059f6b5d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/08de58abedf6e69396e1207e4f99ef8904b2b532", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/41ccb5bcbf03f02d820bc6ea8390811859f558f8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4dd684d4bb3cd5454e0bf6e2a1bdfbd5c9c872ed", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/978e50ef8c38dc71bd14d1b0143d554ff5d188ba", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/efe7cf828039aedb297c1f9920b638fffee6aabc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f84e7534457dcd7835be743517c35378bb4e7c50", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fc74b9cb789cae061bbca7b203a3842e059f6b5d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6326.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6326.json index 0247b781557..3bc87907bc1 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6326.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6326.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6326", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-02T12:15:59.460", - "lastModified": "2025-01-07T16:35:32.547", + "lastModified": "2025-01-07T17:39:16.927", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -101,7 +101,7 @@ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e0a7108-15ef-42d0-adce-fd5b0e6faf3c?source=cve", "source": "security@wordfence.com", "tags": [ - "Vendor Advisory" + "Third Party Advisory" ] }, { @@ -115,7 +115,7 @@ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e0a7108-15ef-42d0-adce-fd5b0e6faf3c?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Third Party Advisory" ] } ] diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6382.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6382.json index ea04451ace0..b254aaa6a92 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6382.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6382.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6382", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T05:15:08.287", - "lastModified": "2025-01-07T16:37:07.597", + "lastModified": "2025-01-07T17:39:11.583", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -115,7 +115,7 @@ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d2fc926-6f9f-4ed9-9598-e39b5e6c6544?source=cve", "source": "security@wordfence.com", "tags": [ - "Vendor Advisory" + "Third Party Advisory" ] }, { @@ -143,7 +143,7 @@ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d2fc926-6f9f-4ed9-9598-e39b5e6c6544?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Third Party Advisory" ] } ] diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0611.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0611.json index 65e763966de..6a877cafbbf 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0611.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0611.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0611", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-02T12:16:00.210", - "lastModified": "2025-01-07T16:41:54.303", + "lastModified": "2025-01-07T17:38:50.460", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -103,7 +103,7 @@ "source": "security@wordfence.com", "tags": [ "Exploit", - "Vendor Advisory" + "Third Party Advisory" ] }, { @@ -119,7 +119,7 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", - "Vendor Advisory" + "Third Party Advisory" ] } ] diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10102.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10102.json index 1e0a9c5b0ce..8f3842bf377 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10102.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10102.json @@ -2,20 +2,51 @@ "id": "CVE-2024-10102", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-07T06:15:13.730", - "lastModified": "2025-01-07T06:15:13.730", + "lastModified": "2025-01-07T17:15:17.017", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Photo Gallery, Images, Slider in Rbs Image Gallery WordPress plugin before 3.2.22 does not sanitise and escape some of its Gallery settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks" + }, + { + "lang": "es", + "value": "Photo Gallery, Images, Slider en Rbs Image Gallery WordPress del complemento de WordPress anterior a la versi\u00f3n 3.2.22 no desinfecta ni evita algunas de las configuraciones de la galer\u00eda, lo que podr\u00eda permitir que usuarios con privilegios elevados, como los colaboradores, realicen ataques de cross site scripting almacenado" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/3b34d1ec-5370-40a8-964e-663f4f9f42f8/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/3b34d1ec-5370-40a8-964e-663f4f9f42f8/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10562.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10562.json index 15e036aac2b..29ffc1aa9ff 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10562.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10562.json @@ -2,20 +2,51 @@ "id": "CVE-2024-10562", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-07T06:15:14.120", - "lastModified": "2025-01-07T06:15:14.120", + "lastModified": "2025-01-07T17:15:17.290", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Form Maker by 10Web WordPress plugin before 1.15.31 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Form Maker de 10Web para WordPress anterior a la versi\u00f3n 1.15.31 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados como el administrador realicen ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/317f6cb7-774f-4381-a855-858c051aa1d5/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/317f6cb7-774f-4381-a855-858c051aa1d5/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10941.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10941.json index bd119967444..eefb04aa144 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10941.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10941.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10941", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-06T21:15:05.213", - "lastModified": "2024-11-08T19:01:25.633", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:08:55.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,82 @@ "value": "Un sitio web malicioso podr\u00eda haber incluido un iframe con una URL mal formada, lo que provoc\u00f3 un bloqueo del navegador que no se pod\u00eda explotar. Esta vulnerabilidad afecta a Firefox anterior a la versi\u00f3n 126." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0", + "matchCriteriaId": "706B671C-BEF5-488D-BCEF-3A5342A4DD1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880879", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1887614", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-21/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11606.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11606.json index ef05b8f6fea..39037a90c6b 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11606.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11606.json @@ -2,16 +2,43 @@ "id": "CVE-2024-11606", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-07T06:15:14.427", - "lastModified": "2025-01-07T06:15:14.427", + "lastModified": "2025-01-07T17:15:18.253", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Tabs Shortcode WordPress plugin through 2.0.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks." + }, + { + "lang": "es", + "value": "El complemento Tabs Shortcode de WordPress hasta la versi\u00f3n 2.0.2 no valida ni escapa algunos de sus atributos de shortcode antes de mostrarlos nuevamente en una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el shortcode, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realizar ataques de Cross-Site Scripting almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/76ae8f5b-2d0e-4bf5-9ae3-f76cd52dea8d/", diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11832.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11832.json index 826cffa1048..9b0dc7162c3 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11832.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11832.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11832", "sourceIdentifier": "security@wordfence.com", "published": "2024-12-13T09:15:06.113", - "lastModified": "2024-12-13T09:15:06.113", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:12:54.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "2.8.5.3", + "matchCriteriaId": "59E6314E-4AD7-4AD3-BF3B-E51355947614" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3206556%40beaver-builder-lite-version&new=3206556%40beaver-builder-lite-version&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1988ff5e-2d3f-4901-8bcc-eb0a7da7566c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12429.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12429.json new file mode 100644 index 00000000000..d73948fc0fb --- /dev/null +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12429.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-12429", + "sourceIdentifier": "cybersecurity@ch.abb.com", + "published": "2025-01-07T17:15:20.527", + "lastModified": "2025-01-07T17:15:20.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An attacker who successfully exploited these vulnerabilities could grant read access to files.\u00a0A vulnerability exists in the AC500 V3 version mentioned. A\u00a0successfully \nauthenticated attacker can use this vulnerability to read system wide files and configuration\n\n\nAll AC500 V3 products (PM5xxx) with firmware version earlier than 3.8.0 are affected by this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://search.abb.com/library/Download.aspx?DocumentID=3ADR011377&LanguageCode=en&DocumentPartId=&Action=Launch", + "source": "cybersecurity@ch.abb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12430.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12430.json new file mode 100644 index 00000000000..99ac53f413a --- /dev/null +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12430.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-12430", + "sourceIdentifier": "cybersecurity@ch.abb.com", + "published": "2025-01-07T17:15:20.703", + "lastModified": "2025-01-07T17:15:20.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An attacker who successfully exploited these vulnerabilities could cause enable command execution. A vulnerability exists in the AC500 V3 version mentioned. After successfully exploiting CVE-2024-12429 (directory traversal), a successfully authenticated attacker can inject arbitrary commands into a specifically crafted file, which then will be executed by root user.\nAll AC500 V3 products (PM5xxx) with firmware version earlier than 3.8.0 are affected by this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], + "references": [ + { + "url": "https://search.abb.com/library/Download.aspx?DocumentID=3ADR011377&LanguageCode=en&DocumentPartId=&Action=Launch", + "source": "cybersecurity@ch.abb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12841.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12841.json index d3ca986e0d6..ab7db37e519 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12841.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12841.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12841", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-20T19:15:06.097", - "lastModified": "2024-12-20T19:15:06.097", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:58:10.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,20 +142,59 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", + "versionEndIncluding": "2.4.1", + "matchCriteriaId": "46A6111E-D96A-425D-AAC4-64CEBA8C0B28" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/emlog/emlog/issues/305", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289077", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289077", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12843.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12843.json index f94da01617a..bda674a87c1 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12843.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12843.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12843", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-20T21:15:07.337", - "lastModified": "2024-12-20T21:15:07.337", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:56:52.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,20 +142,59 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", + "versionEndIncluding": "2.4.1", + "matchCriteriaId": "46A6111E-D96A-425D-AAC4-64CEBA8C0B28" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/emlog/emlog/issues/305", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289079", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289079", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12844.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12844.json index 3133c08b581..ed3994b9c07 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12844.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12844.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12844", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-20T21:15:07.833", - "lastModified": "2024-12-20T21:15:07.833", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:45:15.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,24 +142,66 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", + "versionEndIncluding": "2.4.1", + "matchCriteriaId": "46A6111E-D96A-425D-AAC4-64CEBA8C0B28" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/emlog/emlog/issues/305", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289080", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289080", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.462465", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12845.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12845.json index 0b361f50180..1e78a85cab0 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12845.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12845.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12845", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-20T22:15:24.727", - "lastModified": "2024-12-20T22:15:24.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:35:19.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,24 +142,66 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", + "versionEndIncluding": "2.4.1", + "matchCriteriaId": "46A6111E-D96A-425D-AAC4-64CEBA8C0B28" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/emlog/emlog/issues/306", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289081", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289081", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.462477", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1366.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1366.json index 58072f47563..11fee4a3357 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1366.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1366.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1366", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T06:15:50.110", - "lastModified": "2024-11-21T08:50:25.473", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:21:27.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.3", + "matchCriteriaId": "7769091D-D8EB-4545-8775-8E1B250DBBAE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3044937/happy-elementor-addons", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/08208cb1-2d57-49f9-8ac7-b59caa0cf5fa?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3044937/happy-elementor-addons", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/08208cb1-2d57-49f9-8ac7-b59caa0cf5fa?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1377.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1377.json index bbfc49229cb..c933c352aa1 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1377.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1377.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1377", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T06:15:50.300", - "lastModified": "2024-11-21T08:50:26.870", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:20:57.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.3", + "matchCriteriaId": "7769091D-D8EB-4545-8775-8E1B250DBBAE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3044937/happy-elementor-addons", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b61eb8b7-0d89-47ef-831c-1772d01e2c85?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3044937/happy-elementor-addons", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b61eb8b7-0d89-47ef-831c-1772d01e2c85?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1387.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1387.json index 9a11b93aecc..6e1b63534dd 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1387.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1387.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1387", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:16.683", - "lastModified": "2024-11-21T08:50:28.190", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:19:26.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.4", + "matchCriteriaId": "D3E2E168-2D04-4D21-82B1-70D18E6D3393" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/trunk/classes/clone-handler.php#L58", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3064385/happy-elementor-addons/trunk/classes/clone-handler.php?contextall=1&old=3044937&old_path=%2Fhappy-elementor-addons%2Ftrunk%2Fclasses%2Fclone-handler.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aff10d5a-a2d0-461a-b52b-a25b647eaab4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/trunk/classes/clone-handler.php#L58", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3064385/happy-elementor-addons/trunk/classes/clone-handler.php?contextall=1&old=3044937&old_path=%2Fhappy-elementor-addons%2Ftrunk%2Fclasses%2Fclone-handler.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aff10d5a-a2d0-461a-b52b-a25b647eaab4?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1449.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1449.json index 2d69c3da2b1..d10d2764e2b 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1449.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1449.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1449", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-02T12:16:00.547", - "lastModified": "2025-01-07T16:38:28.197", + "lastModified": "2025-01-07T17:38:57.307", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -101,7 +101,7 @@ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/af9adb6b-f726-4b74-be5c-82fdab0ae1f2?source=cve", "source": "security@wordfence.com", "tags": [ - "Vendor Advisory" + "Third Party Advisory" ] }, { @@ -115,7 +115,7 @@ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/af9adb6b-f726-4b74-be5c-82fdab0ae1f2?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Third Party Advisory" ] } ] diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1498.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1498.json index 4a6da021598..061811d4352 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1498.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1498.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1498", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:18.247", - "lastModified": "2024-11-21T08:50:42.580", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:18:04.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.3", + "matchCriteriaId": "7769091D-D8EB-4545-8775-8E1B250DBBAE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.2/widgets/photo-stack/widget.php#L598", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3044937%40happy-elementor-addons%2Ftrunk&old=3042474%40happy-elementor-addons%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f43e1eed-09f8-44b3-b6fa-d0344f331dd7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.2/widgets/photo-stack/widget.php#L598", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3044937%40happy-elementor-addons%2Ftrunk&old=3042474%40happy-elementor-addons%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f43e1eed-09f8-44b3-b6fa-d0344f331dd7?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1802.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1802.json index 32a7b1ebb28..04b9be04a6a 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1802.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1802.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1802", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T21:15:07.837", - "lastModified": "2024-11-21T08:51:21.250", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:38:34.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,89 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:embedpress:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.10", + "matchCriteriaId": "EDFAAE10-B5B0-434C-A6CC-EA2D6CCFA552" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3045489%40embedpress&new=3045489%40embedpress&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48511d1a-2fd5-4be4-8409-e99d4aadcdfe?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3045489%40embedpress&new=3045489%40embedpress&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48511d1a-2fd5-4be4-8409-e99d4aadcdfe?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1803.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1803.json index bde647bea2e..509616d9522 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1803.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1803.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1803", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-23T13:15:08.887", - "lastModified": "2024-11-21T08:51:21.380", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:32:44.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,66 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:embedpress:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.12", + "matchCriteriaId": "50847190-2ED0-4C6E-8B84-CFEE86763E8D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3055856", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/175e08ce-aec2-427a-90e0-f955711d58b2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3055856", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/175e08ce-aec2-427a-90e0-f955711d58b2?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2128.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2128.json index 7a88ce2bcbc..aa28b84e643 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2128.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2128.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2128", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T20:15:51.097", - "lastModified": "2024-11-21T09:09:05.360", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:33:10.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:embedpress:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.10", + "matchCriteriaId": "EDFAAE10-B5B0-434C-A6CC-EA2D6CCFA552" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/embedpress/tags/3.9.10/EmbedPress/Elementor/Widgets/Embedpress_Pdf.php#L688", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3045489%40embedpress&new=3045489%40embedpress&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6189368d-5925-4c84-9f0f-694b9ebcd45e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/embedpress/tags/3.9.10/EmbedPress/Elementor/Widgets/Embedpress_Pdf.php#L688", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3045489%40embedpress&new=3045489%40embedpress&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6189368d-5925-4c84-9f0f-694b9ebcd45e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2468.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2468.json index 077956a7308..e6035af4c02 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2468.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2468.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2468", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-23T03:15:12.743", - "lastModified": "2024-11-21T09:09:49.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:38:39.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,89 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:embedpress:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.12", + "matchCriteriaId": "50847190-2ED0-4C6E-8B84-CFEE86763E8D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055856%40embedpress&new=3055856%40embedpress&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce3f1310-4d2e-45aa-a3ee-3972a6a31c2e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055856%40embedpress&new=3055856%40embedpress&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce3f1310-4d2e-45aa-a3ee-3972a6a31c2e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26655.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26655.json index eb43919d0df..405ffbca699 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26655.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26655.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26655", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-01T15:15:49.910", - "lastModified": "2024-11-21T09:02:46.583", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:19:13.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,115 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Reparar la p\u00e9rdida de memoria en posix_clock_open() Si la funci\u00f3n clk ops.open() devuelve un error, no liberamos el contexto de pc que asignamos para este reloj. Reorganice ligeramente el c\u00f3digo para que sea m\u00e1s obvio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0200dd7ed2335469955d7e69cc1a6fa7df1f3847", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5b4cdd9c5676559b8a7c944ac5269b914b8c0bb8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a88649b49523e8cbe95254440d803e38c19d2341", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0200dd7ed2335469955d7e69cc1a6fa7df1f3847", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5b4cdd9c5676559b8a7c944ac5269b914b8c0bb8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a88649b49523e8cbe95254440d803e38c19d2341", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26657.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26657.json index 268e720e60c..2146cb9f833 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26657.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26657.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26657", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-02T07:15:42.830", - "lastModified": "2024-11-21T09:02:46.837", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:20:00.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,115 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/sched: corrige null-ptr-deref en la entidad init. El error se puede activar enviando un amdgpu_cs_wait_ioctl al controlador DRM AMDGPU en cualquier ASIC con contexto v\u00e1lido. El error fue reportado por Joonkyo Jung . Por ejemplo, el siguiente c\u00f3digo: static void Syzkaller2(int fd) { union drm_amdgpu_ctx arg1; uni\u00f3n drm_amdgpu_wait_cs arg2; arg1.in.op = AMDGPU_CTX_OP_ALLOC_CTX; ret = drmIoctl(fd, 0x140106442 /* amdgpu_ctx_ioctl */, &arg1); arg2.in.handle = 0x0; arg2.in.timeout = 0x2000000000000; arg2.in.ip_type = AMD_IP_VPE /* 0x9 */; arg2->in.ip_instance = 0x0; arg2.in.ring = 0x0; arg2.in.ctx_id = arg1.out.alloc.ctx_id; drmIoctl(fd, 0xc0206449 /* AMDGPU_WAIT_CS * /, &arg2); } Se podr\u00eda suponer que el ioctl AMDGPU_WAIT_CS sin trabajo enviado previamente debe devolver el error, pero la siguiente confirmaci\u00f3n 1decbf6bb0b4dc56c9da6c5e57b994ebfc2be3aa modific\u00f3 la l\u00f3gica y permiti\u00f3 que sched_rq fuera igual a NULL. Como resultado, cuando no hay trabajo, ioctl AMDGPU_WAIT_CS devuelve \u00e9xito. El cambio corrige null-ptr-deref en la entidad init y la siguiente pila demuestra la condici\u00f3n de error: [+0.000007] ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000028 [+0.007086] #PF: acceso de lectura del supervisor en modo kernel [+0.005234 ] #PF: error_code(0x0000) - p\u00e1gina no presente [ +0.005232] PGD 0 P4D 0 [ +0.002501] Ups: 0000 [#1] PREEMPT SMP KASAN NOPTI [ +0.005034] CPU: 10 PID: 9229 Comm: amd_basic Tainted : GBWL 6.7.0+ #4 [ +0.007797] Nombre del hardware: Nombre del producto del sistema ASUS/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 03/12/2020 [ +0.009798] RIP: 0010:drm_sched_entity_init+0x2d3 /0x420 [gpu_sched] [ +0.006426] C\u00f3digo: 80 00 00 00 00 00 00 00 e8 1a 81 82 e0 49 89 9c 24 c0 00 00 00 4c 89 ef e8 4a 80 82 e0 49 8b 5d 00 48 8 d 7b 28 e8 3d 80 82 e0 <48> 83 7b 28 00 0f 84 28 01 00 00 4d 8d ac 24 98 00 00 00 49 8d 5c [ +0.019094] RSP: 0018:ffffc90014c1fa40 EFLAGS: 00010282 [ +0. 005237] RAX: 0000000000000001 RBX: 0000000000000000 RCX : ffffffff8113f3fa [ +0.007326] RDX: ffffbfff0a7889d RSI: 0000000000000008 RDI: ffffffff853c44e0 [ +0.007264] RBP: ffffc90014c1fa80 R08: 00000000000000 01 R09: ffffbfff0a7889c [ +0.007266] R10: ffffffff853c44e7 R11: 0000000000000001 R12: ffff8881a719b010 [ +0.007263] R13: ffff88810d412748 R14: 0000000000000002 R15: 0000000000000000 [ +0.007264] FS: 00007ffff7045540(0000) GS:ffff8883cc900000(0000) knlGS:0000000000000000 [ +0.00823 6] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ +0.005851] CR2: 0000000000000028 CR3: 000000011912e000 CR4 : 0000000000350ef0 [ +0.007175] Seguimiento de llamadas: [ +0.002561] [ +0.002141] ? show_regs+0x6a/0x80 [+0.003473]? __die+0x25/0x70 [ +0.003124] ? page_fault_oops+0x214/0x720 [+0.004179]? preempt_count_sub+0x18/0xc0 [+0.004093]? __pfx_page_fault_oops+0x10/0x10 [ +0.004590] ? srso_return_thunk+0x5/0x5f [+0.004000]? vprintk_default+0x1d/0x30 [+0.004063]? srso_return_thunk+0x5/0x5f [+0.004087]? vprintk+0x5c/0x90 [ +0.003296] ? drm_sched_entity_init+0x2d3/0x420 [gpu_sched] [+0.005807]? srso_return_thunk+0x5/0x5f [+0.004090]? _printk+0xb3/0xe0 [ +0.003293] ? __pfx__printk+0x10/0x10 [ +0.003735] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [+0.005482]? do_user_addr_fault+0x345/0x770 [ +0.004361] ? exc_page_fault+0x64/0xf0 [+0.003972]? asm_exc_page_fault+0x27/0x30 [+0.004271]? add_taint+0x2a/0xa0 [ +0.003476] ? drm_sched_entity_init+0x2d3/0x420 [gpu_sched] [ +0.005812] amdgpu_ctx_get_entity+0x3f9/0x770 [amdgpu] [ +0.009530] ? terminar_task_switch.isra.0+0x129/0x470 [+0.005068]? __pfx_amdgpu_ctx_get_entity+0x10/0x10 [amdgpu] [ +0.010063] ? __kasan_check_write+0x14/0x20 [ +0.004356] ? srso_return_thunk+0x5/0x5f [+0.004001]? mutex_unlock+0x81/0xd0 [+0.003802]? srso_return_thunk+0x5/0x5f [ +0.004096] amdgpu_cs_wait_ioctl+0xf6/0x270 [amdgpu] [ +0.009355] ? __pfx_ ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/54b5b7275dfdec35812ccce70930cd7c4ee612b2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/74cd204c7afe498aa9dcc3ebf0ecac53d477a429", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f34e8bb7d6c6626933fe993e03ed59ae85e16abb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/54b5b7275dfdec35812ccce70930cd7c4ee612b2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/74cd204c7afe498aa9dcc3ebf0ecac53d477a429", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f34e8bb7d6c6626933fe993e03ed59ae85e16abb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26663.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26663.json index fc898d981d8..f878bc2f35a 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26663.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26663.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26663", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-02T07:15:43.287", - "lastModified": "2024-11-21T09:02:47.680", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:20:30.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,79 +15,259 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: tipc: verifique el tipo de portador antes de llamar a tipc_udp_nl_bearer_add() syzbot inform\u00f3 la siguiente falla de protecci\u00f3n general [1]: falla de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000010: 0000 [#1 ] PREEMPT SMP KASAN KASAN: null-ptr-deref en el rango [0x00000000000000080-0x0000000000000087] ... RIP: 0010:tipc_udp_is_known_peer+0x9c/0x250 net/tipc/udp_media.c:291 ... Seguimiento de llamadas: tipc_udp_ nl_bearer_add+ 0x212/0x2f0 net/tipc/udp_media.c:646 tipc_nl_bearer_add+0x21e/0x360 net/tipc/bearer.c:1089 genl_family_rcv_msg_doit+0x1fc/0x2e0 net/netlink/genetlink.c:972 genl_family_rcv_msg net/netlink/genetlink. c:1052 [en l\u00ednea] genl_rcv_msg+0x561/0x800 net/netlink/genetlink.c:1067 netlink_rcv_skb+0x16b/0x440 net/netlink/af_netlink.c:2544 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1076 netlink_unicast_kernel net/netlink/ af_netlink.c:1341 [en l\u00ednea] netlink_unicast+0x53b/0x810 net/netlink/af_netlink.c:1367 netlink_sendmsg+0x8b7/0xd70 net/netlink/af_netlink.c:1909 sock_sendmsg_nosec net/socket.c:730 [en l\u00ednea] __sock_sendmsg+0xd 5 /0x180 net/socket.c:745 ____sys_sendmsg+0x6ac/0x940 net/socket.c:2584 ___sys_sendmsg+0x135/0x1d0 net/socket.c:2638 __sys_sendmsg+0x117/0x1e0 net/socket.c:2667 do_syscall_x 64 arco/x86/ Entry/common.c:52 [en l\u00ednea] do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x63/0x6b La causa de este problema es que cuando se llama a tipc_nl_bearer_add() con el atributo TIPC_NLA_BEARER_UDP_OPTS, tipc_udp_nl_bear er_a\u00f1adir () se llama incluso si el portador no es UDP. tipc_udp_is_known_peer() llamado por tipc_udp_nl_bearer_add() supone que el campo media_ptr de tipc_bearer tiene un objeto de tipo udp_bearer, por lo que la funci\u00f3n se vuelve loca para los portadores que no son UDP. Este parche soluciona el problema al verificar el tipo de portador antes de llamar a tipc_udp_nl_bearer_add() en tipc_nl_bearer_add()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9", + "versionEndExcluding": "4.19.307", + "matchCriteriaId": "A1A227E7-C02C-4FC4-84AA-230362C5E2C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.269", + "matchCriteriaId": "319545F3-D56C-4751-BEBF-0505478BBAE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.210", + "matchCriteriaId": "F5CB4CA6-A9A0-4AFD-9102-8CF94D708170" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.149", + "matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.78", + "matchCriteriaId": "26190115-BC0C-4106-9408-E7928FE5DA62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.17", + "matchCriteriaId": "73F8C6ED-5A0B-4B25-8FA9-AF916A9C8F0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.5", + "matchCriteriaId": "01925741-2C95-47C1-A7EA-3DC2BB0012D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0cd331dfd6023640c9669d0592bc0fd491205f87", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/19d7314f2fb9515bdaac9829d4d8eb34edd1fe95", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/24ec8f0da93b8a9fba11600be8a90f0d73fb46f1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3871aa01e1a779d866fa9dfdd5a836f342f4eb87", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3d3a5b31b43515b5752ff282702ca546ec3e48b6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6f70f0b412458c622a12d4292782c8e92e210c2f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/888e3524be87f3df9fa3c083484e4b62b3e3bb59", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c1701ea85ef0ec7be6a1b36c7da69f572ed2fd12", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0cd331dfd6023640c9669d0592bc0fd491205f87", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/19d7314f2fb9515bdaac9829d4d8eb34edd1fe95", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/24ec8f0da93b8a9fba11600be8a90f0d73fb46f1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3871aa01e1a779d866fa9dfdd5a836f342f4eb87", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3d3a5b31b43515b5752ff282702ca546ec3e48b6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6f70f0b412458c622a12d4292782c8e92e210c2f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/888e3524be87f3df9fa3c083484e4b62b3e3bb59", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c1701ea85ef0ec7be6a1b36c7da69f572ed2fd12", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26695.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26695.json index aaaec542e05..05c0918ef2a 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26695.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26695.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26695", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:52.770", - "lastModified": "2024-11-21T09:02:51.843", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:27:31.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,59 +15,224 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: crypto: ccp - Corrige la desreferencia del puntero nulo en __sev_platform_shutdown_locked El dispositivo de la plataforma SEV se puede apagar con un psp_master nulo, por ejemplo, usando DEBUG_TEST_DRIVER_REMOVE. Encontrado usando KASAN: [ 137.148210] ccp 0000:23:00.1: dispositivo de habilitaci\u00f3n (0000 -> 0002) [ 137.162647] ccp 0000:23:00.1: no hay colas de comandos disponibles [ 137.170598] ccp 0000:23:00.1: sev habilitado [ 13 7.174645 ] ccp 0000:23:00.1: psp habilitado [137.178890] falla de protecci\u00f3n general, probablemente para direcci\u00f3n no can\u00f3nica 0xdffffc000000001e: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC KASAN NOPTI [137.182693] KASAN: null-ptr-deref en rango [0x00 000000000000f0- 0x00000000000000f7] [ 137.182693] CPU: 93 PID: 1 Comm: swapper/0 No contaminado 6.8.0-rc1+ #311 [ 137.182693] RIP: 0010:__sev_platform_shutdown_locked+0x51/0x180 [ 137.1826 93] C\u00f3digo: 08 80 3c 08 00 0f 85 0e 01 00 00 48 8b 1d 67 b6 01 08 48 b8 00 00 00 00 00 fc ff df 48 8d bb f0 00 00 00 48 89 f9 48 c1 e9 03 <80> 3c 01 00 0f 85 fe 00 00 00 48 8b 9b f0 00 00 00 48 85 db 74 2c [ 137.182693] RSP: 0018:ffffc900000cf9b0 EFLAGS: 00010216 [ 137.182693] RAX: dffffc0000000000 RBX: 00000000000000000 RC X: 000000000000001e [ 137.182693] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 00000000000000f0 [ 137.182693] RBP: ffffc900000cf9c8 R0 8 : 0000000000000000 R09: ffffbfff58f5a66 [ 137.182693] R10: ffffc900000cf9c8 R11: ffffffffac7ad32f R12: ffff8881e5052c28 [ 137.182693] R13: ffff8881 e5052c28 R14: ffff8881758e43e8 R15: ffffffffac64abf8 [ 137.182693] FS: 0000000000000000(0000) GS:ffff889de7000000(0000) knlGS:00000000000000000 [ 137.182693] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 137.182693] CR2: 0000000000000000 CR3: 0000001cf7c7e000 CR4: 0000000000350ef0 [ 137.182693 ] Seguimiento de llamadas: [ 137.182693] [ 137.182693] ? show_regs+0x6c/0x80 [137.182693]? __die_body+0x24/0x70 [ 137.182693] ? die_addr+0x4b/0x80 [ 137.182693] ? exc_general_protection+0x126/0x230 [137.182693]? asm_exc_general_protection+0x2b/0x30 [137.182693]? __sev_platform_shutdown_locked+0x51/0x180 [ 137.182693] sev_firmware_shutdown.isra.0+0x1e/0x80 [ 137.182693] sev_dev_destroy+0x49/0x100 [ 137.182693] psp_dev_destroy+0x47/0 xb0 [ 137.182693] sp_destroy+0xbb/0x240 [ 137.182693] sp_pci_remove+0x45/0x60 [ 137.182693] pci_device_remove+0xaa/0x1d0 [ 137.182693] device_remove+0xc7/0x170 [ 137.182693]realmente_probe+0x374/0xbe0 [ 137.182693] ? srso_return_thunk+0x5/0x5f [ 137.182693] __driver_probe_device+0x199/0x460 [ 137.182693] driver_probe_device+0x4e/0xd0 [ 137.182693] __driver_attach+0x191/0x3d0 [ 137.18 2693] ? __pfx___driver_attach+0x10/0x10 [ 137.182693] bus_for_each_dev+0x100/0x190 [ 137.182693] ? __pfx_bus_for_each_dev+0x10/0x10 [137.182693]? __kasan_check_read+0x15/0x20 [ 137.182693] ? srso_return_thunk+0x5/0x5f [137.182693]? _raw_spin_unlock+0x27/0x50 [ 137.182693] driver_attach+0x41/0x60 [ 137.182693] bus_add_driver+0x2a8/0x580 [ 137.182693] driver_register+0x141/0x480 [ 137.182693] __pci_ registro_controlador+0x1d6/0x2a0 [137.182693]? srso_return_thunk+0x5/0x5f [137.182693]? esrt_sysfs_init+0x1cd/0x5d0 [137.182693]? __pfx_sp_mod_init+0x10/0x10 [ 137.182693] sp_pci_init+0x22/0x30 [ 137.182693] sp_mod_init+0x14/0x30 [ 137.182693] ? __pfx_sp_mod_init+0x10/0x10 [ 137.182693] do_one_initcall+0xd1/0x470 [ 137.182693] ? __pfx_do_one_initcall+0x10/0x10 [137.182693]? parameq+0x80/0xf0 [137.182693]? srso_return_thunk+0x5/0x5f [137.182693]? __kmalloc+0x3b0/0x4e0 [ 137.182693] ? kernel_init_freeable+0x92d/0x1050 [137.182693]? kasan_populate_vmalloc_pte+0x171/0x190 [137.182693]? srso_return_thunk+0x5/0x5f [137.182693] kernel_init_freeable+0xa64/0x1050 [137.182693]? __pfx_kernel_init+0x10/0x10 [ 137.182693] kernel_init+0x24/0x160 [ 137.182693] ? __switch_to_asm+0x3e/0x70 [ 137.182693] ret_from_fork+0x40/0x80 [ 137.182693] ? __pfx_kernel_init+0x1 ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.137", + "versionEndExcluding": "5.10.210", + "matchCriteriaId": "93A470B0-33C7-4407-BE46-511E35E25B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.61", + "versionEndExcluding": "5.15.149", + "matchCriteriaId": "B6BC6CAE-7288-41A5-B180-985BBCD16B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18.18", + "versionEndExcluding": "5.19", + "matchCriteriaId": "B60CAFE2-08C3-461B-B5F8-25BEB0C9853E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19.2", + "versionEndExcluding": "5.20", + "matchCriteriaId": "E8D3E719-D0A1-4044-AB60-B63044B0A1B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.1.79", + "matchCriteriaId": "82C70944-013B-4FC2-97B8-F2D6C1342B5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.18", + "matchCriteriaId": "BD961E49-FEDA-47CF-BF23-4D2BD942B4E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.6", + "matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/58054faf3bd29cd0b949b77efcb6157f66f401ed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7535ec350a5f09b5756a7607f5582913f21200f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8731fe001a60581794ed9cf65da8cd304846a6fb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88aa493f393d2ee38ac140e1f6ac1881346e85d4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b5909f197f3b26aebedca7d8ac7b688fd993a266", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ccb88e9549e7cfd8bcd511c538f437e20026e983", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/58054faf3bd29cd0b949b77efcb6157f66f401ed", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7535ec350a5f09b5756a7607f5582913f21200f4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8731fe001a60581794ed9cf65da8cd304846a6fb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88aa493f393d2ee38ac140e1f6ac1881346e85d4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b5909f197f3b26aebedca7d8ac7b688fd993a266", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ccb88e9549e7cfd8bcd511c538f437e20026e983", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26722.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26722.json index 8890c331b17..9cca11cf8f9 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26722.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26722.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26722", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:54.090", - "lastModified": "2024-11-21T09:02:55.213", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:35:32.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,79 +15,241 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: rt5645: corrige el punto muerto en rt5645_jack_detect_work() Hay una ruta en rt5645_jack_detect_work(), donde rt5645->jd_mutex queda bloqueado para siempre. Eso puede provocar un punto muerto cuando se llama a rt5645_jack_detect_work() por segunda vez. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.74", + "versionEndIncluding": "6.1.79", + "matchCriteriaId": "852CB6BE-3228-4411-BFB3-3476E97F76C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.13", + "versionEndIncluding": "6.6.18", + "matchCriteriaId": "612AA495-77DC-4CB1-BCEA-945651A3FC49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndIncluding": "6.7.6", + "matchCriteriaId": "ACAC1BED-491D-44E3-8BF8-B5C03A72B29C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:4.19.306:*:*:*:*:*:*:*", + "matchCriteriaId": "B5C9F296-5EEA-4A85-8BFA-A8F7985604C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.4.268:*:*:*:*:*:*:*", + "matchCriteriaId": "CD9ADFDA-47C9-48A7-BEEC-149C68E62280" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.10.209:*:*:*:*:*:*:*", + "matchCriteriaId": "BD21022C-1BC0-45E5-A2F1-1D6A051593EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.15.148:*:*:*:*:*:*:*", + "matchCriteriaId": "4A22E6AA-8188-4EFC-B9C1-F93C773F0A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/050ad2ca0ac169dd9e552075d2c6af1bbb46534c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1f0d7792e9023e8658e901b7b76a555f6aa052ec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3dd2d99e2352903d0e0b8769e6c9b8293c7454b2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/422d5243b9f780abd3d39da2b746e3915677b07d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4a98bc739d0753a5810ce5630943cd7614c7717e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6ef5d5b92f7117b324efaac72b3db27ae8bb3082", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d14b8e2005f36319df9412d42037416d64827f6b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ed5b8b735369b40d6c1f8ef3e62d369f74b4c491", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/050ad2ca0ac169dd9e552075d2c6af1bbb46534c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1f0d7792e9023e8658e901b7b76a555f6aa052ec", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3dd2d99e2352903d0e0b8769e6c9b8293c7454b2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/422d5243b9f780abd3d39da2b746e3915677b07d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4a98bc739d0753a5810ce5630943cd7614c7717e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6ef5d5b92f7117b324efaac72b3db27ae8bb3082", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d14b8e2005f36319df9412d42037416d64827f6b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ed5b8b735369b40d6c1f8ef3e62d369f74b4c491", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26725.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26725.json index 8866a0281c1..bd147929654 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26725.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26725.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26725", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:54.257", - "lastModified": "2024-11-21T09:02:55.653", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:28:15.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,109 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dpll: soluciona un posible punto muerto durante la operaci\u00f3n de volcado de netlink Recientemente, he estado recibiendo la siguiente advertencia de punto muerto durante el volcado de pin de dpll: [52804.637962] =========== =========================================== [52804.638536] ADVERTENCIA: posible circular dependencia de bloqueo detectada [52804.639111] 6.8.0-rc2jiri+ #1 No contaminado [52804.639529] -------------------------------- ---------------------- [52804.640104] python3/2984 est\u00e1 intentando adquirir el bloqueo: [52804.640581] ffff88810e642678 (nlk_cb_mutex-GENERIC){+.+.}- {3:3}, en: netlink_dump+0xb3/0x780 [52804.641417] pero la tarea ya mantiene el bloqueo: [52804.642010] ffffffff83bde4c8 (dpll_lock){+.+.}-{3:3}, en: dpll_lock_dumpit+0x13/0x20 [52804.642747] qu\u00e9 bloqueo ya depende del nuevo bloqueo. [52804.643551] la cadena de dependencia existente (en orden inverso) es: [52804.644259] -> #1 (dpll_lock){+.+.}-{3:3}: [52804.644836] lock_acquire+0x174/0x3e0 [52804.645271] __mutex_lock+ 0x119/0x1150 [52804.645723] dpll_lock_dumpit+0x13/0x20 [52804.646169] genl_start+0x266/0x320 [52804.646578] __netlink_dump_start+0x321/0x450 [52804.647056 ] genl_family_rcv_msg_dumpit+0x155/0x1e0 [52804.647575] genl_rcv_msg+0x1ed/0x3b0 [52804.648001] netlink_rcv_skb+0xdc/ 0x210 [52804.648440] genl_rcv+0x24/0x40 [52804.648831] netlink_unicast+0x2f1/0x490 [52804.649290] netlink_sendmsg+0x36d/0x660 [52804.649742] __sock_sendmsg +0x73/0xc0 [52804.650165] __sys_sendto+0x184/0x210 [52804.650597] __x64_sys_sendto+0x72/0x80 [ 52804.651045] do_syscall_64+0x6f/0x140 [52804.651474] Entry_SYSCALL_64_after_hwframe+0x46/0x4e [52804.652001] -> #0 (nlk_cb_mutex-GENERIC){+.+.}-{3:3}: [52804.6 52650] check_prev_add+0x1ae/0x1280 [52804.653107 ] __lock_acquire+0x1ed3/0x29a0 [52804.653559] lock_acquire+0x174/0x3e0 [52804.653984] __mutex_lock+0x119/0x1150 [52804.654423] netlink_dump+0xb3/0x780 [52804.654 845] __netlink_dump_start+0x389/0x450 [52804.655321] genl_family_rcv_msg_dumpit+0x155/0x1e0 [52804.655842] genl_rcv_msg +0x1ed/0x3b0 [52804.656272] netlink_rcv_skb+0xdc/0x210 [52804.656721] genl_rcv+0x24/0x40 [52804.657119] netlink_unicast+0x2f1/0x490 [52804.657570] netlink_sendm sg+0x36d/0x660 [52804.658022] __sock_sendmsg+0x73/0xc0 [52804.658450] __sys_sendto+0x184 /0x210 [52804.658877] __x64_sys_sendto+0x72/0x80 [52804.659322] do_syscall_64+0x6f/0x140 [52804.659752] Entry_SYSCALL_64_after_hwframe+0x46/0x4e [52804.66 0281] otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: [52804.661077] Posible escenario de bloqueo inseguro: [52804.661671] CPU0 CPU1 [52804.662129] ---- ---- [52804.662577] bloqueo(dpll_lock); [52804.662924] bloqueo (nlk_cb_mutex-GENERIC); [52804.663538] bloqueo(dpll_lock); [52804.664073] bloqueo (nlk_cb_mutex-GENERIC); [52804.664490] El problema es el siguiente: __netlink_dump_start() llama a control->start(cb) con nlk->cb_mutex retenido. En control->start(cb) se toma dpll_lock. Luego, nlk->cb_mutex se libera y se toma nuevamente en netlink_dump(), mientras dpll_lock a\u00fan se mantiene. Eso lleva a un punto muerto de ABBA cuando otra CPU corre con la misma operaci\u00f3n. Solucione este problema moviendo dpll_lock a la devoluci\u00f3n de llamada dumpit(), lo que garantiza el orden correcto de toma de bloqueo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.6", + "matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/087739cbd0d0b87b6cec2c0799436ac66e24acc8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/53c0441dd2c44ee93fddb5473885fd41e4bc2361", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/087739cbd0d0b87b6cec2c0799436ac66e24acc8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/53c0441dd2c44ee93fddb5473885fd41e4bc2361", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26739.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26739.json index d012a9036f3..c60c2398a6a 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26739.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26739.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26739", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:51.367", - "lastModified": "2024-11-21T09:02:57.537", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:28:37.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,130 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/sched: act_mirred: no anula retval si ya perdimos el skb. Si estamos redirigiendo el skb y a\u00fan no hemos llamado a tcf_mirred_forward(), necesitamos para decirle al n\u00facleo que suelte el skb configurando el c\u00f3digo de retecci\u00f3n en SHOT. Sin embargo, si hemos llamado a tcf_mirred_forward(), el skb est\u00e1 fuera de nuestras manos y devolver SHOT conducir\u00e1 a UaF. Mueva la anulaci\u00f3n de recuperaci\u00f3n a la ruta de error que realmente la necesita." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "F8A3F8A7-B329-4F88-88B5-ABAECCAE3D60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/166c2c8a6a4dc2e4ceba9e10cfe81c3e469e3210", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/28cdbbd38a4413b8eff53399b3f872fd4e80db9d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f4e294bbdca8ac8757db436fc82214f3882fc7e7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/166c2c8a6a4dc2e4ceba9e10cfe81c3e469e3210", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/28cdbbd38a4413b8eff53399b3f872fd4e80db9d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f4e294bbdca8ac8757db436fc82214f3882fc7e7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26775.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26775.json index 7389e89e9bc..fe2555ec26b 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26775.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26775.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26775", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:53.187", - "lastModified": "2024-11-21T09:03:02.633", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:29:01.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,135 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: aoe: evita un posible punto muerto en set_capacity Mueve set_capacity() fuera de la secci\u00f3n procesada por (&d->lock). Para evitar una posible interrupci\u00f3n en un escenario de bloqueo inseguro: CPU0 CPU1 ---- ---- [1] lock(&bdev->bd_size_lock); local_irq_disable(); [2] bloquear(&d->bloquear); [3] bloquear(&bdev->bd_size_lock); [4] bloqueo(&d->bloqueo); *** DEADLOCK *** Donde [1](&bdev->bd_size_lock) mantenido por zram_add()->set_capacity(). [2]bloqueo(&d->bloqueo) retenido por aoeblk_gdalloc(). Y aoeblk_gdalloc() est\u00e1 intentando adquirir [3](&bdev->bd_size_lock) en la llamada set_capacity(). En esta situaci\u00f3n, un intento de adquirir [4]lock(&d->lock) de aoecmd_cfg_rsp() provocar\u00e1 un punto muerto. Entonces, la soluci\u00f3n m\u00e1s simple es romper la dependencia del bloqueo [2](&d->lock) -> [3](&bdev->bd_size_lock) moviendo set_capacity() afuera." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.80", + "matchCriteriaId": "68B819D6-60AD-446F-A1CF-814A2ADCB42C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/19a77b27163820f793b4d022979ffdca8f659b77", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2d623c94fbba3554f4446ba6f3c764994e8b0d26", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/673629018ba04906899dcb631beec34d871f709c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e169bd4fb2b36c4b2bee63c35c740c85daeb2e86", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/19a77b27163820f793b4d022979ffdca8f659b77", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2d623c94fbba3554f4446ba6f3c764994e8b0d26", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/673629018ba04906899dcb631beec34d871f709c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e169bd4fb2b36c4b2bee63c35c740c85daeb2e86", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26781.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26781.json index d9809e5ae99..c409f051f6f 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26781.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26781.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26781", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:07.957", - "lastModified": "2024-11-21T09:03:03.490", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:11:31.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,59 +15,189 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mptcp: corrige un posible punto muerto en el diagn\u00f3stico de subflujo Syzbot y Eric informaron sobre un bloqueo de bloqueo en el diagn\u00f3stico de subflujo: ADVERTENCIA: se detect\u00f3 posible dependencia de bloqueo circular 6.8.0-rc4-syzkaller-00212-g40b9385dd8e6 #0 Not tainted syz-executor.2/24141 is trying to acquire lock: ffff888045870130 (k-sk_lock-AF_INET6){+.+.}-{0:0}, at: tcp_diag_put_ulp net/ipv4/tcp_diag.c:100 [inline] ffff888045870130 (k-sk_lock-AF_INET6){+.+.}-{0:0}, at: tcp_diag_get_aux+0x738/0x830 net/ipv4/tcp_diag.c:137 but task is already holding lock: ffffc9000135e488 (&h->lhash2[i].lock){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline] ffffc9000135e488 (&h->lhash2[i].lock){+.+.}-{2:2}, at: inet_diag_dump_icsk+0x39f/0x1f80 net/ipv4/inet_diag.c:1038 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&h->lhash2[i].lock){+.+.}-{2:2}: lock_acquire+0x1e3/0x530 kernel/locking/lockdep.c:5754 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] __inet_hash+0x335/0xbe0 net/ipv4/inet_hashtables.c:743 inet_csk_listen_start+0x23a/0x320 net/ipv4/inet_connection_sock.c:1261 __inet_listen_sk+0x2a2/0x770 net/ipv4/af_inet.c:217 inet_listen+0xa3/0x110 net/ipv4/af_inet.c:239 rds_tcp_listen_init+0x3fd/0x5a0 net/rds/tcp_listen.c:316 rds_tcp_init_net+0x141/0x320 net/rds/tcp.c:577 ops_init+0x352/0x610 net/core/net_namespace.c:136 __register_pernet_operations net/core/net_namespace.c:1214 [inline] register_pernet_operations+0x2cb/0x660 net/core/net_namespace.c:1283 register_pernet_device+0x33/0x80 net/core/net_namespace.c:1370 rds_tcp_init+0x62/0xd0 net/rds/tcp.c:735 do_one_initcall+0x238/0x830 init/main.c:1236 do_initcall_level+0x157/0x210 init/main.c:1298 do_initcalls+0x3f/0x80 init/main.c:1314 kernel_init_freeable+0x42f/0x5d0 init/main.c:1551 kernel_init+0x1d/0x2a0 init/main.c:1441 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:242 -> #0 (k-sk_lock-AF_INET6){+.+.}-{0:0}: check_prev_add kernel/locking/lockdep.c:3134 [inline] check_prevs_add kernel/locking/lockdep.c:3253 [inline] validate_chain+0x18ca/0x58e0 kernel/locking/lockdep.c:3869 __lock_acquire+0x1345/0x1fd0 kernel/locking/lockdep.c:5137 lock_acquire+0x1e3/0x530 kernel/locking/lockdep.c:5754 lock_sock_fast include/net/sock.h:1723 [inline] subflow_get_info+0x166/0xd20 net/mptcp/diag.c:28 tcp_diag_put_ulp net/ipv4/tcp_diag.c:100 [inline] tcp_diag_get_aux+0x738/0x830 net/ipv4/tcp_diag.c:137 inet_sk_diag_fill+0x10ed/0x1e00 net/ipv4/inet_diag.c:345 inet_diag_dump_icsk+0x55b/0x1f80 net/ipv4/inet_diag.c:1061 __inet_diag_dump+0x211/0x3a0 net/ipv4/inet_diag.c:1263 inet_diag_dump_compat+0x1c1/0x2d0 net/ipv4/inet_diag.c:1371 netlink_dump+0x59b/0xc80 net/netlink/af_netlink.c:2264 __netlink_dump_start+0x5df/0x790 net/netlink/af_netlink.c:2370 netlink_dump_start include/linux/netlink.h:338 [inline] inet_diag_rcv_msg_compat+0x209/0x4c0 net/ipv4/inet_diag.c:1405 sock_diag_rcv_msg+0xe7/0x410 netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543 sock_diag_rcv+0x2a/0x40 net/core/sock_diag.c:280 netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline] netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367 netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [inline] __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667 do_syscall_64+0xf9/0x240 entry_SYSCALL_64_after_hwframe+0x6f/0x77 Como se\u00f1al\u00f3 Eric, podemos romper la cadena de dependencia de bloqueo evitar el vertido ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.19", + "versionEndExcluding": "6.6.21", + "matchCriteriaId": "AEA459B1-9D99-43F5-BF07-DED98EB9F1A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7.7", + "versionEndExcluding": "6.7.9", + "matchCriteriaId": "C869F4DC-D004-4EAC-8C1D-BADE7D47918B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.10.211:*:*:*:*:*:*:*", + "matchCriteriaId": "F4984E31-DB63-4A46-BA66-9DE0977CDECB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.15.150:*:*:*:*:*:*:*", + "matchCriteriaId": "F2FB65FA-EA68-4974-8F77-9817CBD9E418" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1.80:*:*:*:*:*:*:*", + "matchCriteriaId": "8513383E-EE09-4F12-8335-61B28C03F2E5" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/70e5b013538d5e4cb421afed431a5fcd2a5d49ee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc32ba2fdf3f8b136619fff551f166ba51ec856d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d487e7ba1bc7444d5f062c4930ef8436c47c7e63", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d6a9608af9a75d13243d217f6ce1e30e57d56ffe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f27d319df055629480b84b9288a502337b6f2a2e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa8c776f4c323a9fbc8ddf25edcb962083391430", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/70e5b013538d5e4cb421afed431a5fcd2a5d49ee", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc32ba2fdf3f8b136619fff551f166ba51ec856d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d487e7ba1bc7444d5f062c4930ef8436c47c7e63", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d6a9608af9a75d13243d217f6ce1e30e57d56ffe", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f27d319df055629480b84b9288a502337b6f2a2e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa8c776f4c323a9fbc8ddf25edcb962083391430", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26833.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26833.json index 7bfbb699af0..4b18f058b68 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26833.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26833.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26833", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:09.560", - "lastModified": "2024-11-21T09:03:10.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:12:57.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,59 +15,220 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: corrige la p\u00e9rdida de memoria en dm_sw_fini() Despu\u00e9s de destruir dmub_srv, la memoria asociada a \u00e9l no se libera, lo que provoca una p\u00e9rdida de memoria: objeto sin referencia 0xffff896302b45800 (tama\u00f1o 1024) : comm \"(udev-worker)\", pid 222, sjiffies 4294894636 volcado hexadecimal (primeros 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........... ..... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ retroceso (crc 6265fd77): [] kmalloc_trace+ 0x29d/0x340 [] dm_dmub_sw_init+0xb4/0x450 [amdgpu] [] dm_sw_init+0x15/0x2b0 [amdgpu] [] 1417/0x24e0 [amdgpu] [] amdgpu_driver_load_kms+0x15 /0x190 [amdgpu] [] amdgpu_pci_probe+0x187/0x4e0 [amdgpu] [] local_pci_probe+0x3e/0x90 [] pci_device_probe+0xc3/0x230 [ ] realmente_probe+0xe2/0x480 [< ffffffff99805c98>] __driver_probe_device+0x78/0x160 [] driver_probe_device+0x1f/0x90 [] __driver_attach+0xce/0x1c0 [] v+0x70/0xc0 [] bus_add_driver+0x112/0x210 [< ffffffff99807245>] driver_register+0x55/0x100 [] do_one_initcall+0x41/0x300 Solucione este problema liberando dmub_srv despu\u00e9s de destruirlo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "5.10.211", + "matchCriteriaId": "DA7797D4-A182-44B7-8248-1545687250DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.150", + "matchCriteriaId": "CB6C60DE-9E0C-46C5-904D-D4F4031F8E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.80", + "matchCriteriaId": "BA7850CE-97C9-4408-A348-6173296BCA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/10c6b90e975358c17856a578419dc449887899c2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/33f649f1b1cea39ed360e6c12bba4fac83118e6e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/541e79265ea7e339a7c4a462feafe9f8f996e04b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/58168005337eabef345a872be3f87d0215ff3b30", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b49b022f7dfce85eb77d0d987008fde5c01d7857", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bae67893578d608e35691dcdfa90c4957debf1d3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/10c6b90e975358c17856a578419dc449887899c2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/33f649f1b1cea39ed360e6c12bba4fac83118e6e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/541e79265ea7e339a7c4a462feafe9f8f996e04b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/58168005337eabef345a872be3f87d0215ff3b30", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b49b022f7dfce85eb77d0d987008fde5c01d7857", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bae67893578d608e35691dcdfa90c4957debf1d3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26840.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26840.json index 00eb64debf7..f07e8e335f8 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26840.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26840.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26840", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:09.910", - "lastModified": "2024-11-21T09:03:11.103", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:13:19.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,79 +15,254 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cachefiles: corrige la p\u00e9rdida de memoria en cachefiles_add_cache() Se inform\u00f3 la siguiente p\u00e9rdida de memoria despu\u00e9s de desvincular /dev/cachefiles: ================= ==================================================== objeto sin referencia 0xffff9b674176e3c0 (tama\u00f1o 192): comm \"cachefilesd2\", pid 680, jiffies 4294881224 volcado hexadecimal (primeros 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ retroceso (crc ea38a44b): [ ] kmem_cache_alloc+0x2d5/0x370 [] prepare_creds+0x26/0x2e0 [] cachefiles_determine_cache_security+0x1f/0x120 [] cachefiles_add_cache+0x13c/0x 3a0 [] cachefiles_daemon_write+0x146/0x1c0 [ ] vfs_write+0xcb/0x520 [] ksys_write+0x69/0xf0 [] do_syscall_64+0x72/0x140 [] Entry_SYSCALL_64_after_hwframe+0x6e/0x76 =============== ==================================================== == Coloque el recuento de referencias de cache_cred en cachefiles_daemon_unbind() para solucionar el problema. Y tambi\u00e9n coloque cache_cred en la rama de error cachefiles_add_cache() para evitar p\u00e9rdidas de memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.30", + "versionEndExcluding": "4.19.309", + "matchCriteriaId": "FE617771-4A89-47F5-8CAC-2B6D1E6C93E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.271", + "matchCriteriaId": "7BE17E30-58A5-468C-A06E-28C355F4F8DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.212", + "matchCriteriaId": "01B34738-A022-44A9-9250-DCBC76539CB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.151", + "matchCriteriaId": "EEAFD33E-C22F-4FB1-A417-9C96AB3E0358" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.80", + "matchCriteriaId": "BA7850CE-97C9-4408-A348-6173296BCA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/037d5a949b0455540ef9aab34c10ddf54b65d285", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/38e921616320d159336b0ffadb09e9fb4945c7c3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43eccc5823732ba6daab2511ed32dfc545a666d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8b218e2f0a27a9f09428b1847b4580640b9d1e58", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/94965be37add0983672e48ecb33cdbda92b62579", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9cac69912052a4def571fedf1cb9bb4ec590e25a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cb5466783793e66272624cf71925ae1d1ba32083", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e21a2f17566cbd64926fb8f16323972f7a064444", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/037d5a949b0455540ef9aab34c10ddf54b65d285", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/38e921616320d159336b0ffadb09e9fb4945c7c3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43eccc5823732ba6daab2511ed32dfc545a666d8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8b218e2f0a27a9f09428b1847b4580640b9d1e58", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/94965be37add0983672e48ecb33cdbda92b62579", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9cac69912052a4def571fedf1cb9bb4ec590e25a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cb5466783793e66272624cf71925ae1d1ba32083", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e21a2f17566cbd64926fb8f16323972f7a064444", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26860.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26860.json index 001d16adc98..544f8e3d127 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26860.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26860.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26860", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:08.950", - "lastModified": "2024-11-21T09:03:14.147", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:13:52.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,152 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dm-integrity: soluciona una p\u00e9rdida de memoria al volver a verificar los datos. La memoria para el puntero de \"sumas de verificaci\u00f3n\" se perder\u00e1 si los datos se vuelven a verificar despu\u00e9s de una falla en la suma de verificaci\u00f3n (porque el kfree asociado no suceder\u00e1). debido a 'goto skip_io'). Solucione este problema liberando la memoria de sumas de verificaci\u00f3n antes de volver a verificar y simplemente use la memoria \"checksum_onstack\" para almacenar la suma de verificaci\u00f3n durante la nueva verificaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.80", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "04603A3F-F633-4F6B-8E98-5D6B95526F8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.19", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "82EEFF87-D1F0-4DA5-ABA3-76779055DE39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "123AA580-CFCB-482C-9725-21C9B73ED09B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/20e21c3c0195d915f33bc7321ee6b362177bf5bf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/338580a7fb9b0930bb38098007e89cc0fc496bf7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/55e565c42dce81a4e49c13262d5bc4eb4c2e588a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d35654f03c35c273240d85ec67e3f2c3596c4e0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/74abc2fe09691f3d836d8a54d599ca71f1e4287b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/20e21c3c0195d915f33bc7321ee6b362177bf5bf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/338580a7fb9b0930bb38098007e89cc0fc496bf7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/55e565c42dce81a4e49c13262d5bc4eb4c2e588a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d35654f03c35c273240d85ec67e3f2c3596c4e0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/74abc2fe09691f3d836d8a54d599ca71f1e4287b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26865.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26865.json index 4c20eddfd82..c446ae14839 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26865.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26865.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26865", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.207", - "lastModified": "2024-11-21T09:03:14.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:14:10.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,152 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: rds: tcp: Se corrige el use-after-free de red en reqsk_timer_handler(). syzkaller inform\u00f3 una advertencia de netns tracker [0] seguida de KASAN splat [1] y otra advertencia de ref tracker [1]. syzkaller no pudo encontrar una reproducci\u00f3n, pero en el registro, la \u00fanica secuencia sospechosa fue la siguiente: 18:26:22 ejecutando el programa 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ... connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4001, 0x0, @loopback}, 0x1c) (async) Lo notable aqu\u00ed es 0x4001 en connect(), que es RDS_TCP_PORT. Entonces, el escenario ser\u00eda: 1. unshare(CLONE_NEWNET) crea un oyente tcp por red en rds_tcp_listen_init(). 2. syz-executor se conecta a \u00e9l y crea una solicitud. 3. syz-executor sale () inmediatamente. 4. La red est\u00e1 desmantelada. [0] 5. Se activa el temporizador de reqsk y se produce UAF mientras se libera reqsk. [1] 6. El oyente se libera despu\u00e9s del per\u00edodo de gracia de RCU. [2] B\u00e1sicamente, reqsk supone que el oyente garantiza la seguridad de la red hasta que expiren todos los temporizadores de reqsk manteniendo el refcount del oyente. Sin embargo, este no fue el caso de los sockets del kernel. La confirmaci\u00f3n 740ea3c4a0b2 (\"tcp: Limpiar la solicitud del oyente del kernel en inet_twsk_purge()\") solucion\u00f3 este problema solo para ehash por red. Apliquemos la misma soluci\u00f3n para el ehash global. [0]: ref_tracker: net notrefcnt@0000000065449cc3 tiene 1/1 usuarios en sk_alloc (./include/net/net_namespace.h:337 net/core/sock.c:2146) inet6_create (net/ipv6/af_inet6.c:192 net/ipv6/af_inet6.c:119) __sock_create (net/socket.c:1572) rds_tcp_listen_init (net/rds/tcp_listen.c:279) rds_tcp_init_net (net/rds/tcp.c:577) ops_init (net/core/ net_namespace.c:137) setup_net (net/core/net_namespace.c:340) copy_net_ns (net/core/net_namespace.c:497) create_new_namespaces (kernel/nsproxy.c:110) unshare_nsproxy_namespaces (kernel/nsproxy.c:228 ( discriminador 4)) ksys_unshare (kernel/fork.c:3429) __x64_sys_unshare (kernel/fork.c:3496) do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) Entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129) ... ADVERTENCIA: CPU: 0 PID: 27 en lib/ref_tracker.c:179 ref_tracker_dir_exit (lib/ref_tracker.c:179) [1]: ERROR: KASAN: slab-use-after-free en inet_csk_reqsk_queue_drop (./include/net/inet_hashtables.h:180 net/ipv4/inet_connection_sock.c:952 net/ipv4/inet_connection_sock.c:966) Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff88801b370400 mediante el intercambiador de tareas /0/0 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 01/04/2014 Seguimiento de llamadas: dump_stack_lvl (lib/dump_stack .c:107 (discriminador 1)) print_report (mm/kasan/report.c:378 mm/kasan/report.c:488) kasan_report (mm/kasan/report.c:603) inet_csk_reqsk_queue_drop (./include/net/ inet_hashtables.h:180 net/ipv4/inet_connection_sock.c:952 net/ipv4/inet_connection_sock.c:966) reqsk_timer_handler (net/ipv4/inet_connection_sock.c:979 net/ipv4/inet_connection_sock.c:1092) call_timer_fn (./arch /x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:207 ./include/trace/events/timer.h:127 kernel/time/timer.c:1701) __run_timers.part. 0 (kernel/time/timer.c:1752 kernel/time/timer.c:2038) run_timer_softirq (kernel/time/timer.c:2053) __do_softirq (./arch/x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:207 ./include/trace/events/irq.h:142 kernel/softirq.c:554) irq_exit_rcu (kernel/softirq.c:427 kernel/softirq.c:632 kernel/ softirq.c:644) sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1076 (discriminator 14)) Asignado por la tarea 258 en la CPU 0 a 83.612050s: kasan_save_stack (mm/kasan/common.c :48) kasan_save_track (mm/kasan/common.c:68) __kasan_slab_alloc (mm/kasan/common.c:343) kmem_cache_alloc (mm/slub.c:3813 mm/slub.c:3860 mm/slub.c:3867 ) copy_net_ns (./include/linux/slab.h:701 net/core/net_namespace.c:421 net/core/net_namespace.c:480) create_new_namespaces (kernel/nsproxy.c:110) unshare_nsproxy_name ---truncado-- -" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "D8516138-F391-413E-8258-C9301F91451F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1e9fd5cf8d7f487332560f7bb312fc7d416817f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a750d6a5b365265dbda33330a6188547ddb5c24", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9905a157048f441f1412e7bd13372f4a971d75c6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9ceac040506a05a30b104b2aa2e9146810704500", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f901ee07853ce97e9f1104c7c898fbbe447f0279", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1e9fd5cf8d7f487332560f7bb312fc7d416817f3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a750d6a5b365265dbda33330a6188547ddb5c24", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9905a157048f441f1412e7bd13372f4a971d75c6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9ceac040506a05a30b104b2aa2e9146810704500", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f901ee07853ce97e9f1104c7c898fbbe447f0279", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26887.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26887.json index 52917506435..e66d45c06be 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26887.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26887.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26887", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.297", - "lastModified": "2024-11-21T09:03:18.210", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:14:41.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,131 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Bluetooth: btusb: corrige la p\u00e9rdida de memoria. Esto verifica si CONFIG_DEV_COREDUMP est\u00e1 habilitado antes de intentar clonar el skb y tambi\u00e9n se asegura de que btmtk_process_coredump libere el skb pasado siguiendo la misma l\u00f3gica." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "5B28A88F-F85F-4008-8F7C-44FC9152916E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/620b9e60e4b55fa55540ce852a0f3c9e6091dbbc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/79f4127a502c5905f04da1f20a7bbe07103fb77c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b08bd8f02a24e2b82fece5ac51dc1c3d9aa6c404", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b10e6f6b160a60b98fb7476028f5a95405bbd725", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/620b9e60e4b55fa55540ce852a0f3c9e6091dbbc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/79f4127a502c5905f04da1f20a7bbe07103fb77c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b08bd8f02a24e2b82fece5ac51dc1c3d9aa6c404", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b10e6f6b160a60b98fb7476028f5a95405bbd725", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2688.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2688.json index 895d0922501..7d9044ff2fc 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2688.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2688.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2688", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-23T03:15:13.247", - "lastModified": "2024-11-21T09:10:17.823", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:17:38.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,89 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:embedpress:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.12", + "matchCriteriaId": "50847190-2ED0-4C6E-8B84-CFEE86763E8D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055856%40embedpress&new=3055856%40embedpress&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c5b67927-5993-4e21-af52-8ebe7fee48ab?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055856%40embedpress&new=3055856%40embedpress&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c5b67927-5993-4e21-af52-8ebe7fee48ab?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2786.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2786.json index c4d2a8f04eb..28955cb0833 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2786.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2786.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2786", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:36.653", - "lastModified": "2024-11-21T09:10:30.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:17:10.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,54 +39,120 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.4", + "matchCriteriaId": "D3E2E168-2D04-4D21-82B1-70D18E6D3393" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.4/widgets/card/widget.php#L1216", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.4/widgets/gradient-heading/widget.php#L260", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.4/widgets/gradient-heading/widget.php#L262", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.4/widgets/review/widget.php#L821", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3064385%40happy-elementor-addons%2Ftrunk&old=3044937%40happy-elementor-addons%2Ftrunk&sfp_email=&sfph_mail=#file18", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4688c1ee-335c-4adb-bd68-894ff34d001d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.4/widgets/card/widget.php#L1216", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.4/widgets/gradient-heading/widget.php#L260", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.4/widgets/gradient-heading/widget.php#L262", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.4/widgets/review/widget.php#L821", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3064385%40happy-elementor-addons%2Ftrunk&old=3044937%40happy-elementor-addons%2Ftrunk&sfp_email=&sfph_mail=#file18", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4688c1ee-335c-4adb-bd68-894ff34d001d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2787.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2787.json index 9ee22fe6787..39a8b2e8ef1 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2787.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2787.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2787", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:36.827", - "lastModified": "2024-11-21T09:10:31.060", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:16:22.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,89 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.4", + "matchCriteriaId": "D3E2E168-2D04-4D21-82B1-70D18E6D3393" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3064385%40happy-elementor-addons%2Ftrunk&old=3044937%40happy-elementor-addons%2Ftrunk&sfp_email=&sfph_mail=#file13", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ea3daad1-74a1-44be-b7ed-b58b806da614?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3064385%40happy-elementor-addons%2Ftrunk&old=3044937%40happy-elementor-addons%2Ftrunk&sfp_email=&sfph_mail=#file13", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ea3daad1-74a1-44be-b7ed-b58b806da614?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2788.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2788.json index d321f3dc640..51cd9ad3719 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2788.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2788.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2788", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:36.993", - "lastModified": "2024-11-21T09:10:31.203", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:15:21.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,89 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.4", + "matchCriteriaId": "D3E2E168-2D04-4D21-82B1-70D18E6D3393" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3064385%40happy-elementor-addons%2Ftrunk&old=3044937%40happy-elementor-addons%2Ftrunk&sfp_email=&sfph_mail=#file13", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/73e4ec2f-f4e1-469d-a4b7-5a10d44b7a2f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3064385%40happy-elementor-addons%2Ftrunk&old=3044937%40happy-elementor-addons%2Ftrunk&sfp_email=&sfph_mail=#file13", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/73e4ec2f-f4e1-469d-a4b7-5a10d44b7a2f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2789.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2789.json index 558953638ea..d04ad060c94 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2789.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2789.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2789", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:37.160", - "lastModified": "2024-11-21T09:10:31.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:14:48.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,89 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.4", + "matchCriteriaId": "D3E2E168-2D04-4D21-82B1-70D18E6D3393" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3064385%40happy-elementor-addons%2Ftrunk&old=3044937%40happy-elementor-addons%2Ftrunk&sfp_email=&sfph_mail=#file13", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bb93853b-a6e0-42d1-8b10-b391984603f2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3064385%40happy-elementor-addons%2Ftrunk&old=3044937%40happy-elementor-addons%2Ftrunk&sfp_email=&sfph_mail=#file13", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bb93853b-a6e0-42d1-8b10-b391984603f2?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3244.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3244.json index 62cafca9c48..f2c34121fb2 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3244.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3244.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3244", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:40.550", - "lastModified": "2024-11-21T09:29:13.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:30:57.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:embedpress:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.14", + "matchCriteriaId": "B1CDBC4F-09AA-4126-B054-8557A1F43065" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/embedpress/tags/3.9.13/EmbedPress/ThirdParty/Googlecalendar/Embedpress_Google_Helper.php#L657", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3064544/embedpress/tags/3.9.15/EmbedPress/ThirdParty/Googlecalendar/Embedpress_Google_Helper.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/778d8443-fc0f-4e97-8460-e5ceee8b62a1?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/embedpress/tags/3.9.13/EmbedPress/ThirdParty/Googlecalendar/Embedpress_Google_Helper.php#L657", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3064544/embedpress/tags/3.9.15/EmbedPress/ThirdParty/Googlecalendar/Embedpress_Google_Helper.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/778d8443-fc0f-4e97-8460-e5ceee8b62a1?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3245.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3245.json index 43880873f99..fd2967488d7 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3245.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3245.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3245", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-06T03:15:08.103", - "lastModified": "2024-11-21T09:29:14.063", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:31:35.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,89 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:embedpress:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.14", + "matchCriteriaId": "B1CDBC4F-09AA-4126-B054-8557A1F43065" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3064544/embedpress/tags/3.9.15/Gutenberg/dist/blocks.build.js", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a427c798-f546-4ca1-98ab-32b433ee5b59?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3064544/embedpress/tags/3.9.15/Gutenberg/dist/blocks.build.js", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a427c798-f546-4ca1-98ab-32b433ee5b59?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35883.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35883.json index 67c751c314b..573a97eb38a 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35883.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35883.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35883", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:09.527", - "lastModified": "2024-11-21T09:21:07.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:03:52.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,120 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: mchp-pci1xxx: corrige una posible desreferencia de puntero null en pci1xxx_spi_probe En la funci\u00f3n pci1xxxx_spi_probe, existe un posible puntero null que puede deberse a una asignaci\u00f3n de memoria fallida por parte de la funci\u00f3n devm_kzalloc. Por lo tanto, es necesario agregar una verificaci\u00f3n de puntero null para evitar que se elimine la referencia al puntero null m\u00e1s adelante en el c\u00f3digo. Para solucionar este problema, se debe marcar spi_bus->spi_int[iter]. La memoria asignada por devm_kzalloc se liberar\u00e1 autom\u00e1ticamente, por lo que simplemente devuelva -ENOMEM directamente sin preocuparse por p\u00e9rdidas de memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.26", + "matchCriteriaId": "C520696A-A594-4FFC-A32D-12DA535CE911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.5", + "matchCriteriaId": "DBD6C99E-4250-4DFE-8447-FF2075939D10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1f886a7bfb3faf4c1021e73f045538008ce7634e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4b31a226097cf8cc3c9de5e855d97757fdb2bf06", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95e5d9eb26705a9a76d2ef8bcba9ee2e195d653d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1f886a7bfb3faf4c1021e73f045538008ce7634e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4b31a226097cf8cc3c9de5e855d97757fdb2bf06", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95e5d9eb26705a9a76d2ef8bcba9ee2e195d653d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36286.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36286.json index a70814a738f..c9e2e5ce45d 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36286.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36286.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36286", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:10.277", - "lastModified": "2024-11-21T09:21:59.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:08:25.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,220 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nfnetlink_queue: adquirir rcu_read_lock() en instancia_destroy_rcu() syzbot inform\u00f3 que se pod\u00eda llamar a nf_reinject() sin rcu_read_lock() : ADVERTENCIA: uso sospechoso de RCU 6.9.0-rc7-syzkaller -02060-g5c1672705a1a #0 \u00a1No est\u00e1 contaminado net/netfilter/nfnetlink_queue.c:263 uso sospechoso de rcu_dereference_check()! otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: rcu_scheduler_active = 2, debug_locks = 1 2 bloqueos mantenidos por syz-executor.4/13427: #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, en: rcu_lock_acquire include/linux/rcupdate.h:329 [en l\u00ednea] #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, en: rcu_do_batch kernel/rcu/tree.c:2190 [en l\u00ednea] #0 : ffffffff8e334f60 (rcu_callback){....}-{0:0}, en: rcu_core+0xa86/0x1830 kernel/rcu/tree.c:2471 #1: ffff88801ca92958 (&inst->lock){+.-.} -{2:2}, en: spin_lock_bh include/linux/spinlock.h:356 [en l\u00ednea] #1: ffff88801ca92958 (&inst->lock){+.-.}-{2:2}, en: nfqnl_flush net/ netfilter/nfnetlink_queue.c:405 [en l\u00ednea] #1: ffff88801ca92958 (&inst->lock){+.-.}-{2:2}, en: instancia_destroy_rcu+0x30/0x220 net/netfilter/nfnetlink_queue.c:172 pila backtrace: CPU: 0 PID: 13427 Comm: syz-executor.4 No contaminado 6.9.0-rc7-syzkaller-02060-g5c1672705a1a #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Llamada de Google 02/04/2024 Trace: __dump_stack lib/dump_stack.c: 88 [en l\u00ednea] dump_stack_lvl+0x241/0x360 lib/dump_stack.c: 114 Lockdep_rcu_suspicious+0x221/0x340 kernel/locking/lockdep.c: 6712 nf_filt. C :323 [en l\u00ednea] nfqnl_reinject+0x6ec/0x1120 net/netfilter/nfnetlink_queue.c:397 nfqnl_flush net/netfilter/nfnetlink_queue.c:410 [en l\u00ednea] instancia_destroy_rcu+0x1ae/0x220 net/netfilter/nfnetlink_queue.c:172 do_batch kernel/rcu /tree.c:2196 [en l\u00ednea] rcu_core+0xafd/0x1830 kernel/rcu/tree.c:2471 handle_softirqs+0x2d6/0x990 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [en l\u00ednea] invoke_softirq kernel/softirq .c:428 [en l\u00ednea] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 irq_exit_rcu+0x9/0x30 kernel/softirq.c:649 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [en l\u00ednea] r_interrupci\u00f3n+ 0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043 " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.25", + "versionEndExcluding": "4.19.316", + "matchCriteriaId": "AD24684C-C664-4564-A2BD-039A20739DC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.278", + "matchCriteriaId": "7FDBF235-DA18-49A1-8690-6C7272FD0701" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.219", + "matchCriteriaId": "E9063AF3-D593-43B7-810D-58B87F82F9F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "31130639-53FE-4726-8986-434EE2528CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "EEFB78EE-F990-4197-BF1C-156760A55667" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.4", + "matchCriteriaId": "991B9791-966A-4D18-9E8D-A8AB128E5627" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/215df6490e208bfdd5b3012f5075e7f8736f3e7a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/25ea5377e3d2921a0f96ae2551f5ab1b36825dd4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3989b817857f4890fab9379221a9d3f52bf5c256", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/68f40354a3851df46c27be96b84f11ae193e36c5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8658bd777cbfcb0c13df23d0ea120e70517761b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8f365564af898819a523f1a8cf5c6ce053e9f718", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dc21c6cc3d6986d938efbf95de62473982c98dec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e01065b339e323b3dfa1be217fd89e9b3208b0ab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/215df6490e208bfdd5b3012f5075e7f8736f3e7a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/25ea5377e3d2921a0f96ae2551f5ab1b36825dd4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3989b817857f4890fab9379221a9d3f52bf5c256", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/68f40354a3851df46c27be96b84f11ae193e36c5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8658bd777cbfcb0c13df23d0ea120e70517761b9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8f365564af898819a523f1a8cf5c6ce053e9f718", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dc21c6cc3d6986d938efbf95de62473982c98dec", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e01065b339e323b3dfa1be217fd89e9b3208b0ab", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37149.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37149.json index aae69758840..6832ff3e107 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37149.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37149.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37149", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-10T20:15:03.543", - "lastModified": "2024-11-21T09:23:18.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:03:06.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-73" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.85", + "versionEndExcluding": "10.0.16", + "matchCriteriaId": "2910869A-4955-4EF7-9E9D-16E45682606A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cwvp-j887-m4xh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cwvp-j887-m4xh", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3724.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3724.json index fbb2b319381..0ae0a3c09ad 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3724.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3724.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3724", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:30.150", - "lastModified": "2024-11-21T09:30:15.000", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:12:54.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,117 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.4", + "matchCriteriaId": "D3E2E168-2D04-4D21-82B1-70D18E6D3393" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3072960/happy-elementor-addons/trunk/widgets/horizontal-timeline/widget.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3072960/happy-elementor-addons/trunk/widgets/image-stack-group/widget.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3072960/happy-elementor-addons/trunk/widgets/photo-stack/widget.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/826483d7-948d-46c4-890c-71001b03847c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3072960/happy-elementor-addons/trunk/widgets/horizontal-timeline/widget.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3072960/happy-elementor-addons/trunk/widgets/image-stack-group/widget.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3072960/happy-elementor-addons/trunk/widgets/photo-stack/widget.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/826483d7-948d-46c4-890c-71001b03847c?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3890.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3890.json index c96884f3f10..93644fba72f 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3890.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3890.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3890", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-26T08:15:13.773", - "lastModified": "2024-11-21T09:30:38.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:13:29.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,89 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.5", + "matchCriteriaId": "B3A53D79-EC91-41B9-A55F-0A6D63DD228C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3076871/happy-elementor-addons/trunk/widgets/calendly/widget.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22e4eb2a-2c2b-4f4f-821e-8d2d7e558364?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3076871/happy-elementor-addons/trunk/widgets/calendly/widget.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22e4eb2a-2c2b-4f4f-821e-8d2d7e558364?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3891.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3891.json index d05de4cff2e..df2152af37c 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3891.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3891.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3891", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:32.090", - "lastModified": "2024-11-21T09:30:38.523", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:11:13.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.5", + "matchCriteriaId": "B3A53D79-EC91-41B9-A55F-0A6D63DD228C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3072960/happy-elementor-addons/trunk/widgets/site-title/widget.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ade7f391-3824-4d0b-8718-f7995170a43d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3072960/happy-elementor-addons/trunk/widgets/site-title/widget.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ade7f391-3824-4d0b-8718-f7995170a43d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40747.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40747.json new file mode 100644 index 00000000000..0f8122a8c90 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40747.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-40747", + "sourceIdentifier": "security@joomla.org", + "published": "2025-01-07T17:15:23.430", + "lastModified": "2025-01-07T17:15:23.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Various module chromes didn't properly process inputs, leading to XSS vectors." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@joomla.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://developer.joomla.org/security-centre/954-20250101-core-xss-vectors-in-module-chromes.html", + "source": "security@joomla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40748.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40748.json new file mode 100644 index 00000000000..d7a1be30678 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40748.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-40748", + "sourceIdentifier": "security@joomla.org", + "published": "2025-01-07T17:15:23.587", + "lastModified": "2025-01-07T17:15:23.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Lack of output escaping in the id attribute of menu lists." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@joomla.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://developer.joomla.org/security-centre/955-20250102-core-xss-vector-in-the-id-attribute-of-menu-lists.html", + "source": "security@joomla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40749.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40749.json new file mode 100644 index 00000000000..6dda8b1c510 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40749.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-40749", + "sourceIdentifier": "security@joomla.org", + "published": "2025-01-07T17:15:23.683", + "lastModified": "2025-01-07T17:15:23.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Access Controls allows access to protected views." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@joomla.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://developer.joomla.org/security-centre/956-20250103-core-read-acl-violation-in-multiple-core-views.html", + "source": "security@joomla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43416.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43416.json index 77f5b43c8c9..b99f4a53b88 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43416.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43416.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43416", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-18T17:15:11.220", - "lastModified": "2024-11-19T21:57:56.293", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:05:20.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.80", + "versionEndExcluding": "10.0.17", + "matchCriteriaId": "32ABC28B-4FBB-4935-84A6-099E9F11B796" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/glpi-project/glpi/commit/9be1466053f829680db318f7e7e5880d2d789c6d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j8gc-xpgr-2ww7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43577.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43577.json index 5c110b97101..610b150975a 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43577.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43577.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43577", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-18T23:15:06.510", - "lastModified": "2024-10-23T19:15:18.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:14:49.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-449" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionEndExcluding": "130.0.2849.46", + "matchCriteriaId": "999ACE14-4B5E-4FC6-B6E9-75CF769CCA0F" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43577", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43716.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43716.json index 4f16a2b93c2..0b3d4968015 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43716.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43716.json @@ -2,13 +2,13 @@ "id": "CVE-2024-43716", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:06.533", - "lastModified": "2024-12-17T14:58:24.220", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-07T18:15:17.263", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + "value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and have a low impact on confidentiality. Exploitation of this issue does not require user interaction." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43717.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43717.json index 145134d7090..42fc764e6ea 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43717.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43717.json @@ -2,13 +2,13 @@ "id": "CVE-2024-43717", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:06.703", - "lastModified": "2024-12-17T14:59:13.620", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-07T18:15:18.030", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + "value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and have a low impact on confidentiality. Exploitation of this issue does not require user interaction." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43729.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43729.json index 4d4bfeb99fa..1eaf8614cd3 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43729.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43729.json @@ -2,13 +2,13 @@ "id": "CVE-2024-43729", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:08.653", - "lastModified": "2024-12-17T16:10:37.357", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-07T18:15:18.267", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + "value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and have a high impact on integrity. Exploitation of this issue does not require user interaction." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43731.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43731.json index 65654aa54a0..816da330526 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43731.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43731.json @@ -2,13 +2,13 @@ "id": "CVE-2024-43731", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:08.953", - "lastModified": "2024-12-17T16:10:11.630", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-07T18:15:18.403", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + "value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and have a low impact on integrity. Exploitation of this issue does not require user interaction." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43755.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43755.json index 56f34b026b1..e676d6ba4dd 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43755.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43755.json @@ -2,13 +2,13 @@ "id": "CVE-2024-43755", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:12.507", - "lastModified": "2024-12-17T16:17:28.580", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-07T18:15:18.547", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + "value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and affect the integrity of the page. Exploitation of this issue requires user interaction." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4316.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4316.json index a189c5d5ba7..2eb15776abf 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4316.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4316.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4316", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:43:16.177", - "lastModified": "2024-11-21T09:42:36.700", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:30:24.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:embedpress:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.16", + "matchCriteriaId": "CF7C98AA-5923-40F0-84DF-A2ECCCBC667F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/embedpress/trunk/EmbedPress/Elementor/Widgets/Embedpress_Elementor.php#L3076", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2af03168-9344-4db0-9b69-2ad1fdb6d472?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/embedpress/trunk/EmbedPress/Elementor/Widgets/Embedpress_Elementor.php#L3076", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2af03168-9344-4db0-9b69-2ad1fdb6d472?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4391.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4391.json index 10ce6ec184c..693e0b55119 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4391.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4391.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4391", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T09:15:17.143", - "lastModified": "2024-11-21T09:42:45.350", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:09:14.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.7", + "matchCriteriaId": "470638EC-0007-4A72-B565-D59C32231FC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/trunk/widgets/event-calendar/widget.php#L1811", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3083138/happy-elementor-addons/trunk/widgets/event-calendar/widget.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e75f7e1a-f3bb-4b24-bf04-b83d0e572551?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/trunk/widgets/event-calendar/widget.php#L1811", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3083138/happy-elementor-addons/trunk/widgets/event-calendar/widget.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e75f7e1a-f3bb-4b24-bf04-b83d0e572551?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-444xx/CVE-2024-44450.json b/CVE-2024/CVE-2024-444xx/CVE-2024-44450.json new file mode 100644 index 00000000000..5f6d6527a39 --- /dev/null +++ b/CVE-2024/CVE-2024-444xx/CVE-2024-44450.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-44450", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-07T18:15:18.693", + "lastModified": "2025-01-07T18:15:18.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple functions are vulnerable to Authorization Bypass in AIMS eCrew. The issue was fixed in version JUN23 #190." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/BottleOfScotch/85e4c6e1d90060ddebd80b8384d59346", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4470.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4470.json index e45f3632dec..60be05bc476 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4470.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4470.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4470", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-21T07:15:08.810", - "lastModified": "2025-01-07T16:37:44.157", + "lastModified": "2025-01-07T17:39:05.017", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -108,7 +108,7 @@ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd59bee7-5de5-406d-8c1b-654306d68ab8?source=cve", "source": "security@wordfence.com", "tags": [ - "Vendor Advisory" + "Third Party Advisory" ] }, { @@ -129,7 +129,7 @@ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd59bee7-5de5-406d-8c1b-654306d68ab8?source=cve", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Third Party Advisory" ] } ] diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4478.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4478.json index b181fdff083..fe492995c92 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4478.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4478.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4478", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T08:15:38.200", - "lastModified": "2024-11-21T09:42:54.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:10:23.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,115 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.7", + "matchCriteriaId": "470638EC-0007-4A72-B565-D59C32231FC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.7/widgets/image-stack-group/widget.php#L611", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3083138/#file584", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/happy-elementor-addons/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c7243f40-5cca-475a-bb27-44fab965bb0e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.7/widgets/image-stack-group/widget.php#L611", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3083138/#file584", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/happy-elementor-addons/#developers", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c7243f40-5cca-475a-bb27-44fab965bb0e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4865.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4865.json index df8b9ec941e..c87a6a07e4a 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4865.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4865.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4865", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-18T03:15:06.340", - "lastModified": "2024-11-21T09:43:45.310", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:04:22.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.8", + "matchCriteriaId": "3A9E3CEA-F92B-4FA8-AE7B-FCC3FDE3F493" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/trunk/widgets/skills/widget.php#L359", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3087575/happy-elementor-addons/trunk/widgets/skills/widget.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2fdf2020-ad80-44c3-89b6-fc2ba067cd33?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/trunk/widgets/skills/widget.php#L359", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3087575/happy-elementor-addons/trunk/widgets/skills/widget.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2fdf2020-ad80-44c3-89b6-fc2ba067cd33?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49535.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49535.json index 561d3be278c..0e8a9a7c70d 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49535.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49535.json @@ -2,13 +2,13 @@ "id": "CVE-2024-49535", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T20:15:18.923", - "lastModified": "2024-12-18T15:07:06.950", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-07T18:15:18.843", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. This vulnerability allows an attacker to provide malicious XML input containing a reference to an external entity, leading to data disclosure or potentially code execution. Exploitation of this issue requires user interaction in that a victim must process a malicious XML document." + "value": "Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that allows an attacker to provide malicious XML input containing a reference to an external entity, leading to unauthorized read access to the file system. Exploitation of this issue requires user interaction in that a victim must process a malicious XML document." }, { "lang": "es", @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49816.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49816.json index 07f76970531..b18eb5c4e2a 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49816.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49816.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49816", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-17T18:15:23.760", - "lastModified": "2024-12-17T18:15:23.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:25:58.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1F72EFFA-6912-4148-AA54-FDD7458AAFA1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C5C5BE-7E5C-455C-80F4-5C5783086D2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E65E3E60-1F3B-4E1E-9DF8-98BBDAC5FC94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "66EB3ACF-F107-49CD-B667-36F2BF2C746D" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7175067", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49817.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49817.json index dc0a33ba3c5..107219969d8 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49817.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49817.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49817", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-17T18:15:23.937", - "lastModified": "2024-12-17T18:15:23.937", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:23:31.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,64 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-260" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1F72EFFA-6912-4148-AA54-FDD7458AAFA1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C5C5BE-7E5C-455C-80F4-5C5783086D2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E65E3E60-1F3B-4E1E-9DF8-98BBDAC5FC94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "66EB3ACF-F107-49CD-B667-36F2BF2C746D" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7175067", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49818.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49818.json index e87d2a00e09..539d97253fc 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49818.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49818.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49818", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-17T18:15:24.127", - "lastModified": "2024-12-17T18:15:24.127", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:20:08.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1F72EFFA-6912-4148-AA54-FDD7458AAFA1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C5C5BE-7E5C-455C-80F4-5C5783086D2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E65E3E60-1F3B-4E1E-9DF8-98BBDAC5FC94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "66EB3ACF-F107-49CD-B667-36F2BF2C746D" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7175067", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50658.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50658.json new file mode 100644 index 00000000000..e6ea1db9945 --- /dev/null +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50658.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-50658", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-07T18:15:18.990", + "lastModified": "2025-01-07T18:15:18.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Template Injection (SSTI) was found in AdPortal 3.0.39 allows a remote attacker to execute arbitrary code via the shippingAsBilling and firstname parameters in updateuserinfo.html file" + } + ], + "metrics": {}, + "references": [ + { + "url": "http://adportal.com", + "source": "cve@mitre.org" + }, + { + "url": "http://ipublish.com", + "source": "cve@mitre.org" + }, + { + "url": "https://petercipolone.info/wp-content/uploads/2025/01/iPublishMedia_AdPortal3.0.39_CVEs.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50659.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50659.json new file mode 100644 index 00000000000..bc4ff8e32ae --- /dev/null +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50659.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-50659", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-07T18:15:19.153", + "lastModified": "2025-01-07T18:15:19.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability iPublish Media Solutions AdPortal 3.0.39 allows a remote attacker to escalate privileges via the shippingAsBilling parameter in updateuserinfo.html." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://adportal.com", + "source": "cve@mitre.org" + }, + { + "url": "http://ipublish.com", + "source": "cve@mitre.org" + }, + { + "url": "https://petercipolone.info/wp-content/uploads/2025/01/iPublishMedia_AdPortal3.0.39_CVEs.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50660.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50660.json new file mode 100644 index 00000000000..ff83a1b4292 --- /dev/null +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50660.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-50660", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-07T18:15:19.310", + "lastModified": "2025-01-07T18:15:19.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "File Upload Bypass was found in AdPortal 3.0.39 allows a remote attacker to execute arbitrary code via the file upload functionality" + } + ], + "metrics": {}, + "references": [ + { + "url": "http://adportal.com", + "source": "cve@mitre.org" + }, + { + "url": "http://ipublish.com", + "source": "cve@mitre.org" + }, + { + "url": "https://petercipolone.info/wp-content/uploads/2025/01/iPublishMedia_AdPortal3.0.39_CVEs.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5041.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5041.json index 3683f62ed55..1f7a61e33cc 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5041.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5041", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-31T10:15:10.220", - "lastModified": "2024-11-21T09:46:50.373", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:51:05.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.9", + "matchCriteriaId": "C910DDC6-89B5-48CB-81D5-01E3CCC50D8D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/trunk/widgets/image-accordion/widget.php#L1462", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3095128/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fb037c9f-5d20-46f6-b1ff-34b9d192bad2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/trunk/widgets/image-accordion/widget.php#L1462", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3095128/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fb037c9f-5d20-46f6-b1ff-34b9d192bad2?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5088.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5088.json index 2ec152e9dfd..77bd32e3fa6 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5088.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5088.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5088", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-18T12:15:47.010", - "lastModified": "2024-11-21T09:46:56.560", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:03:40.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.8", + "matchCriteriaId": "3A9E3CEA-F92B-4FA8-AE7B-FCC3FDE3F493" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/trunk/widgets/skills/widget.php#L360", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3087575/happy-elementor-addons/trunk/widgets/skills/widget.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/203ab09f-7344-4cab-86bf-0c1ec545d78f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/trunk/widgets/skills/widget.php#L360", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3087575/happy-elementor-addons/trunk/widgets/skills/widget.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/203ab09f-7344-4cab-86bf-0c1ec545d78f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52831.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52831.json index 5a5cca2276a..fad2f713ad8 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52831.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52831.json @@ -2,13 +2,13 @@ "id": "CVE-2024-52831", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:15.533", - "lastModified": "2024-12-13T17:20:24.467", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-07T18:15:19.520", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + "value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and affect the integrity of the page. Exploitation of this issue requires user interaction." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52865.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52865.json index f3dd8fff4c4..50ed6e2dc7a 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52865.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52865.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52865", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:22.663", - "lastModified": "2024-12-13T17:37:30.603", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-07T18:15:19.667", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,27 +19,27 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", - "baseScore": 4.6, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, - "exploitabilityScore": 2.1, - "impactScore": 2.5 + "exploitabilityScore": 2.3, + "impactScore": 2.7 }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52901.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52901.json index c564a67ae38..cef46cdccd4 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52901.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52901.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52901", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-12T16:15:54.807", - "lastModified": "2024-12-12T16:15:54.807", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:16:58.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7177700", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53146.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53146.json index ec693d1a8c6..9a9859bc57a 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53146.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53146.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53146", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-24T12:15:22.653", - "lastModified": "2024-12-24T12:15:22.653", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:15:25.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,172 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: NFSD: evita un posible desbordamiento de enteros. Si la longitud de la etiqueta es >= U32_MAX - 3, entonces la suma \"longitud + 4\" puede provocar un desbordamiento de enteros. Solucione este problema dividiendo la decodificaci\u00f3n en varios pasos para que decode_cb_compound4res() no tenga que realizar aritm\u00e9tica en el valor de longitud no seguro." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.325", + "matchCriteriaId": "96043CF8-5AF4-4DD9-9F49-9B7651C0EB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.287", + "matchCriteriaId": "E4B15788-D35E-4E5B-A9C0-070AE3729B34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/084f797dbc7e52209a4ab6dbc7f0109268754eb9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3c5f545c9a1f8a1869246f6f3ae8c17289d6a841", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/745f7ce5a95e783ba62fe774325829466aec2aa8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f33b92e5b18e904a481e6e208486da43e4dc841", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/842f1c27a1aef5367e535f9e85c8c3b06352151a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/90adbae9dd158da8331d9fdd32077bd1af04f553", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ccd3394f9a7200d6b088553bf38e688620cd27af", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dde654cad08fdaac370febb161ec41eb58e9d2a2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/de53c5305184ca1333b87e695d329d1502d694ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5347.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5347.json index de7fd158199..c6f23835d8e 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5347.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5347.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5347", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-31T10:15:10.413", - "lastModified": "2024-11-21T09:47:28.127", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T17:37:36.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,116 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "3.11.0", + "matchCriteriaId": "1AEC4600-169A-4A46-B44F-B5BDD376CC19" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.9/widgets/post-navigation/widget.php#L588", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3095128/happy-elementor-addons/trunk/widgets/post-navigation/widget.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Product" + ] }, { "url": "https://wordpress.org/plugins/happy-elementor-addons/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/415a7201-bdff-4342-9e06-ce0e500cdc7c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.9/widgets/post-navigation/widget.php#L588", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3095128/happy-elementor-addons/trunk/widgets/post-navigation/widget.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/happy-elementor-addons/#developers", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/415a7201-bdff-4342-9e06-ce0e500cdc7c?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54006.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54006.json new file mode 100644 index 00000000000..49b19599308 --- /dev/null +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54006.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-54006", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2025-01-07T18:15:20.080", + "lastModified": "2025-01-07T18:15:20.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple command injection vulnerabilities exist in the web interface of the 501 Wireless Client Bridge which could lead to authenticated remote command execution. Successful exploitation of these vulnerabilities result in the ability of an attacker to execute arbitrary commands as a privileged user on the underlying operating system. Exploitation requires administrative authentication credentials on the host system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04763en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54007.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54007.json new file mode 100644 index 00000000000..a806cf1267d --- /dev/null +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54007.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-54007", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2025-01-07T18:15:20.240", + "lastModified": "2025-01-07T18:15:20.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple command injection vulnerabilities exist in the web interface of the 501 Wireless Client Bridge which could lead to authenticated remote command execution. Successful exploitation of these vulnerabilities result in the ability of an attacker to execute arbitrary commands as a privileged user on the underlying operating system. Exploitation requires administrative authentication credentials on the host system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04763en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54266.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54266.json index f2179785fb4..99eddaae805 100644 --- a/CVE-2024/CVE-2024-542xx/CVE-2024-54266.json +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54266.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54266", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-13T15:15:30.767", - "lastModified": "2024-12-13T15:15:30.767", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:05:59.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.1.16", + "matchCriteriaId": "4C22AC0E-4814-43F8-93D8-6F1804CFD102" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/imagerecycle-pdf-image-compression/vulnerability/wordpress-imagerecycle-pdf-image-compression-plugin-3-1-16-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-543xx/CVE-2024-54382.json b/CVE-2024/CVE-2024-543xx/CVE-2024-54382.json index 0d553a2caff..fc4584c1fc2 100644 --- a/CVE-2024/CVE-2024-543xx/CVE-2024-54382.json +++ b/CVE-2024/CVE-2024-543xx/CVE-2024-54382.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54382", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-16T15:15:12.313", - "lastModified": "2024-12-16T15:15:12.313", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T18:00:04.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1.6", + "matchCriteriaId": "90B7F55D-A563-4B51-9466-2A74AA8568D8" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/bold-page-builder/vulnerability/wordpress-bold-page-builder-plugin-5-1-5-path-traversal-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json new file mode 100644 index 00000000000..052bd5f4e84 --- /dev/null +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-55410", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-07T18:15:20.387", + "lastModified": "2025-01-07T18:15:20.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the 690b33e1-0462-4e84-9bea-c7552b45432a.sys component of Asus GPU Tweak II Program Driver v1.0.0.0 allows attackers to perform arbitrary read and write actions via supplying crafted IOCTL requests." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://asus.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55410/CVE-2024-55410_690b33e1-0462-4e84-9bea-c7552b45432a.sys_README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55411.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55411.json new file mode 100644 index 00000000000..a8a08b64c1e --- /dev/null +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55411.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-55411", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-07T18:15:20.543", + "lastModified": "2025-01-07T18:15:20.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the snxpcamd.sys component of SUNIX Multi I/O Card v10.1.0.0 allows attackers to perform arbitrary read and write actions via supplying crafted IOCTL requests." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55411/CVE-2024-55411_snxpcamd.sys_README.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sunix.com/tw/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55412.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55412.json new file mode 100644 index 00000000000..7a9dd12eac0 --- /dev/null +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55412.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-55412", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-07T18:15:20.700", + "lastModified": "2025-01-07T18:15:20.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability exits in driver snxpsamd.sys in SUNIX Serial Driver x64 - 10.1.0.0, which allows low-privileged users to read and write arbitary i/o port via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55412/CVE-2024-55412_snxpsamd.sys_README.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sunix.com/tw/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55413.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55413.json new file mode 100644 index 00000000000..802bb1dbc7e --- /dev/null +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55413.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-55413", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-07T18:15:20.843", + "lastModified": "2025-01-07T18:15:20.843", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability exits in driver snxppamd.sys in SUNIX Parallel Driver x64 - 10.1.0.0, which allows low-privileged users to read and write arbitary i/o port via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55413/CVE-2024-55413_snxppamd.sys_README.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sunix.com/tw/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55414.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55414.json new file mode 100644 index 00000000000..705ed8d44a2 --- /dev/null +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55414.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-55414", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-07T18:15:20.987", + "lastModified": "2025-01-07T18:15:20.987", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability exits in driver SmSerl64.sys in Motorola SM56 Modem WDM Driver v6.12.23.0, which allows low-privileged users to mapping physical memory via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55414/CVE-2024-55414_SmSerl64.sys_README.md", + "source": "cve@mitre.org" + }, + { + "url": "https://us.motorola.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55555.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55555.json new file mode 100644 index 00000000000..04c8c9142bd --- /dev/null +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55555.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-55555", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-07T17:15:30.503", + "lastModified": "2025-01-07T17:15:30.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Invoice Ninja before 5.10.43 allows remote code execution from a pre-authenticated route when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values. The route/{hash} route defined in the invoiceninja/routes/client.php file can be accessed without authentication. The parameter {hash} is passed to the function decrypt that expects a Laravel ciphered value containing a serialized object. (Furthermore, Laravel contains several gadget chains usable to trigger remote command execution from arbitrary deserialization.) Therefore, an attacker in possession of the APP_KEY is able to fully control a string passed to an unserialize function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/invoiceninja/invoiceninja/commit/d9302021472c3e7e23bac8c3d5fbec57a5f38f0c", + "source": "cve@mitre.org" + }, + { + "url": "https://www.synacktiv.com/advisories/invoiceninja-unauthenticated-remote-command-execution-when-appkey-known", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56270.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56270.json new file mode 100644 index 00000000000..6237131b9c0 --- /dev/null +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56270.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-56270", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-07T17:15:31.140", + "lastModified": "2025-01-07T17:15:31.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in SecureSubmit WP SecureSubmit.This issue affects WP SecureSubmit: from n/a through 1.5.16." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/securesubmit/vulnerability/wordpress-wp-securesubmit-plugin-1-5-16-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56272.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56272.json new file mode 100644 index 00000000000..a1b2b283610 --- /dev/null +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56272.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-56272", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-07T17:15:31.287", + "lastModified": "2025-01-07T17:15:31.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ThemeSupport Hide Category by User Role for WooCommerce.This issue affects Hide Category by User Role for WooCommerce: from n/a through 2.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/hide-category-by-user-role-for-woocommerce/vulnerability/wordpress-hide-category-by-user-role-for-woocommerce-plugin-2-1-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8361.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8361.json new file mode 100644 index 00000000000..7d4bfd84b7b --- /dev/null +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8361.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-8361", + "sourceIdentifier": "product-security@silabs.com", + "published": "2025-01-07T17:15:31.420", + "lastModified": "2025-01-07T17:15:31.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In SiWx91x devices, the SHA2/224 algorithm returns a hash of 256 bits instead of 224 bits. This incorrect hash length triggers a software assertion, which subsequently causes a Denial of Service (DoS).\nIf a watchdog is implemented, device will restart after watch dog expires. If watchdog is not implemented, device can be recovered only after a hard reset" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-131" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/068Vm00000I7zqo", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0298.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0298.json index 19740ae6f5c..5a69cfe9557 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0298.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0298.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0298", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-07T16:15:40.167", - "lastModified": "2025-01-07T16:15:40.167", + "lastModified": "2025-01-07T17:15:31.770", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.475159", "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/th4s1s/5435e605e6e9f14a5b76c313483eb58a", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0299.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0299.json new file mode 100644 index 00000000000..601b1ea8945 --- /dev/null +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0299.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0299", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-07T17:15:31.903", + "lastModified": "2025-01-07T17:15:31.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in code-projects Online Book Shop 1.0. Affected is an unknown function of the file /search_result.php. The manipulation of the argument s leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/th4s1s/b30a06e83b98ddcbc69b9038c145d8cd", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.290448", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.290448", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.475285", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0300.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0300.json new file mode 100644 index 00000000000..f06b48641e1 --- /dev/null +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0300.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0300", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-07T17:15:32.090", + "lastModified": "2025-01-07T17:15:32.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in code-projects Online Book Shop 1.0. Affected by this vulnerability is an unknown functionality of the file /subcat.php. The manipulation of the argument cat leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/th4s1s/21abb650b4b70fe8392d8449445703f7", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.290449", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.290449", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.475286", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0301.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0301.json new file mode 100644 index 00000000000..5a0b86e79fb --- /dev/null +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0301.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0301", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-07T18:15:21.460", + "lastModified": "2025-01-07T18:15:21.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in code-projects Online Book Shop 1.0. Affected by this issue is some unknown functionality of the file /subcat.php. The manipulation of the argument catnm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/th4s1s/03262c6ce877137b61d745a2e4fe8a63", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.290450", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.290450", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.475287", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21622.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21622.json index bb806934612..0043652de58 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21622.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21622.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21622", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-07T16:15:40.510", - "lastModified": "2025-01-07T16:15:40.510", + "lastModified": "2025-01-07T18:15:21.703", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-5qpx-23rw-36gg", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-5qpx-23rw-36gg", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21623.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21623.json index f4145793966..ab4cfc30058 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21623.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21623.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21623", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-07T16:15:40.690", - "lastModified": "2025-01-07T16:15:40.690", + "lastModified": "2025-01-07T17:15:32.313", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -59,6 +59,10 @@ { "url": "https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-ffhj-hprx-7qvr", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-ffhj-hprx-7qvr", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21624.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21624.json index 6948fe15d58..7a2f0817863 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21624.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21624.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21624", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-07T16:15:40.853", - "lastModified": "2025-01-07T16:15:40.853", + "lastModified": "2025-01-07T17:15:32.417", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-98vm-2xqm-xrcc", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-98vm-2xqm-xrcc", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22296.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22296.json new file mode 100644 index 00000000000..04fd1057cff --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22296.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22296", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-07T17:15:32.520", + "lastModified": "2025-01-07T17:15:32.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HashThemes Hash Elements.This issue affects Hash Elements: from n/a through 1.4.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/hash-elements/vulnerability/wordpress-hash-elements-plugin-1-4-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22306.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22306.json new file mode 100644 index 00000000000..57bda802f9c --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22306.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22306", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-07T17:15:32.663", + "lastModified": "2025-01-07T17:15:32.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Link Whisper Link Whisper Free.This issue affects Link Whisper Free: from n/a through 0.7.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-538" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/link-whisper/vulnerability/wordpress-link-whisper-free-plugin-0-7-7-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22319.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22319.json new file mode 100644 index 00000000000..4e2db9aecc0 --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22319.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22319", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-07T17:15:32.810", + "lastModified": "2025-01-07T17:15:32.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in DearHive Social Media Share Buttons | MashShare.This issue affects Social Media Share Buttons | MashShare: from n/a through 4.0.47." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mashsharer/vulnerability/wordpress-mashshare-plugin-4-0-47-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22334.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22334.json new file mode 100644 index 00000000000..c1ff21cdce0 --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22334.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22334", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-07T17:15:32.953", + "lastModified": "2025-01-07T17:15:32.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FilaThemes Education LMS allows Stored XSS.This issue affects Education LMS: from n/a through 0.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/education-lms/vulnerability/wordpress-education-lms-theme-0-0-7-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22350.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22350.json new file mode 100644 index 00000000000..d6482af5193 --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22350.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22350", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-07T17:15:33.093", + "lastModified": "2025-01-07T17:15:33.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WpIndeed Ultimate Learning Pro allows SQL Injection.This issue affects Ultimate Learning Pro: from n/a through 3.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/indeed-learning-pro/vulnerability/wordpress-indeed-ultimate-learning-pro-plugin-3-9-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22354.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22354.json new file mode 100644 index 00000000000..05b1f55f1ba --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22354.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22354", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-07T17:15:33.230", + "lastModified": "2025-01-07T17:15:33.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Code Themes Digi Store allows DOM-Based XSS.This issue affects Digi Store: from n/a through 1.1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/digi-store/vulnerability/wordpress-digi-store-theme-1-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22363.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22363.json new file mode 100644 index 00000000000..12a4581d47a --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22363.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22363", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-07T17:15:33.377", + "lastModified": "2025-01-07T17:15:33.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ORION Allada T-shirt Designer for Woocommerce.This issue affects Allada T-shirt Designer for Woocommerce: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/allada-tshirt-designer-for-woocommerce/vulnerability/wordpress-allada-t-shirt-designer-for-woocommerce-plugin-1-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22365.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22365.json new file mode 100644 index 00000000000..d5efecbaff7 --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22365.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22365", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-07T17:15:33.510", + "lastModified": "2025-01-07T17:15:33.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric McNiece EMC2 Alert Boxes allows Stored XSS.This issue affects EMC2 Alert Boxes: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/emc2-alert-boxes/vulnerability/wordpress-emc2-alert-boxes-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22500.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22500.json new file mode 100644 index 00000000000..9af2c0a0d5f --- /dev/null +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22500.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22500", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-07T17:15:33.657", + "lastModified": "2025-01-07T17:15:33.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ali Ali Alpha Price Table For Elementor allows DOM-Based XSS.This issue affects Alpha Price Table For Elementor: from n/a through 1.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/alpha-price-table-for-elementor/vulnerability/wordpress-alpha-price-table-for-elementor-plugin-1-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22621.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22621.json new file mode 100644 index 00000000000..b574207c702 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22621.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22621", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2025-01-07T17:15:35.710", + "lastModified": "2025-01-07T17:15:35.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In versions 1.0.67 and lower of the Splunk App for SOAR, the Splunk documentation for that app recommended adding the `admin_all_objects` capability to the `splunk_app_soar` role. This addition could lead to improper access control for a low-privileged user that does not hold the \u201cadmin\u201c Splunk roles." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2025-0101", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index fb482f79faf..86c28bdf8be 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-07T17:00:28.092861+00:00 +2025-01-07T19:00:35.982204+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-07T17:00:00.897000+00:00 +2025-01-07T18:58:10.143000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -276162 +276195 ``` ### CVEs added in the last Commit -Recently added CVEs: `98` +Recently added CVEs: `33` -- [CVE-2025-22555](CVE-2025/CVE-2025-225xx/CVE-2025-22555.json) (`2025-01-07T16:15:51.627`) -- [CVE-2025-22556](CVE-2025/CVE-2025-225xx/CVE-2025-22556.json) (`2025-01-07T16:15:51.780`) -- [CVE-2025-22557](CVE-2025/CVE-2025-225xx/CVE-2025-22557.json) (`2025-01-07T16:15:51.920`) -- [CVE-2025-22558](CVE-2025/CVE-2025-225xx/CVE-2025-22558.json) (`2025-01-07T16:15:52.080`) -- [CVE-2025-22559](CVE-2025/CVE-2025-225xx/CVE-2025-22559.json) (`2025-01-07T16:15:52.243`) -- [CVE-2025-22560](CVE-2025/CVE-2025-225xx/CVE-2025-22560.json) (`2025-01-07T16:15:52.380`) -- [CVE-2025-22562](CVE-2025/CVE-2025-225xx/CVE-2025-22562.json) (`2025-01-07T16:15:52.540`) -- [CVE-2025-22563](CVE-2025/CVE-2025-225xx/CVE-2025-22563.json) (`2025-01-07T16:15:52.940`) -- [CVE-2025-22571](CVE-2025/CVE-2025-225xx/CVE-2025-22571.json) (`2025-01-07T16:15:53.187`) -- [CVE-2025-22572](CVE-2025/CVE-2025-225xx/CVE-2025-22572.json) (`2025-01-07T16:15:53.357`) -- [CVE-2025-22573](CVE-2025/CVE-2025-225xx/CVE-2025-22573.json) (`2025-01-07T16:15:53.520`) -- [CVE-2025-22574](CVE-2025/CVE-2025-225xx/CVE-2025-22574.json) (`2025-01-07T16:15:53.667`) -- [CVE-2025-22577](CVE-2025/CVE-2025-225xx/CVE-2025-22577.json) (`2025-01-07T16:15:53.823`) -- [CVE-2025-22578](CVE-2025/CVE-2025-225xx/CVE-2025-22578.json) (`2025-01-07T16:15:53.970`) -- [CVE-2025-22579](CVE-2025/CVE-2025-225xx/CVE-2025-22579.json) (`2025-01-07T16:15:54.130`) -- [CVE-2025-22580](CVE-2025/CVE-2025-225xx/CVE-2025-22580.json) (`2025-01-07T16:15:54.303`) -- [CVE-2025-22581](CVE-2025/CVE-2025-225xx/CVE-2025-22581.json) (`2025-01-07T16:15:54.467`) -- [CVE-2025-22582](CVE-2025/CVE-2025-225xx/CVE-2025-22582.json) (`2025-01-07T16:15:54.640`) -- [CVE-2025-22584](CVE-2025/CVE-2025-225xx/CVE-2025-22584.json) (`2025-01-07T16:15:54.780`) -- [CVE-2025-22585](CVE-2025/CVE-2025-225xx/CVE-2025-22585.json) (`2025-01-07T16:15:54.923`) -- [CVE-2025-22589](CVE-2025/CVE-2025-225xx/CVE-2025-22589.json) (`2025-01-07T16:15:55.053`) -- [CVE-2025-22590](CVE-2025/CVE-2025-225xx/CVE-2025-22590.json) (`2025-01-07T16:15:55.200`) -- [CVE-2025-22591](CVE-2025/CVE-2025-225xx/CVE-2025-22591.json) (`2025-01-07T16:15:55.337`) -- [CVE-2025-22592](CVE-2025/CVE-2025-225xx/CVE-2025-22592.json) (`2025-01-07T16:15:55.470`) -- [CVE-2025-22593](CVE-2025/CVE-2025-225xx/CVE-2025-22593.json) (`2025-01-07T16:15:55.627`) +- [CVE-2024-50660](CVE-2024/CVE-2024-506xx/CVE-2024-50660.json) (`2025-01-07T18:15:19.310`) +- [CVE-2024-54006](CVE-2024/CVE-2024-540xx/CVE-2024-54006.json) (`2025-01-07T18:15:20.080`) +- [CVE-2024-54007](CVE-2024/CVE-2024-540xx/CVE-2024-54007.json) (`2025-01-07T18:15:20.240`) +- [CVE-2024-55410](CVE-2024/CVE-2024-554xx/CVE-2024-55410.json) (`2025-01-07T18:15:20.387`) +- [CVE-2024-55411](CVE-2024/CVE-2024-554xx/CVE-2024-55411.json) (`2025-01-07T18:15:20.543`) +- [CVE-2024-55412](CVE-2024/CVE-2024-554xx/CVE-2024-55412.json) (`2025-01-07T18:15:20.700`) +- [CVE-2024-55413](CVE-2024/CVE-2024-554xx/CVE-2024-55413.json) (`2025-01-07T18:15:20.843`) +- [CVE-2024-55414](CVE-2024/CVE-2024-554xx/CVE-2024-55414.json) (`2025-01-07T18:15:20.987`) +- [CVE-2024-55555](CVE-2024/CVE-2024-555xx/CVE-2024-55555.json) (`2025-01-07T17:15:30.503`) +- [CVE-2024-56270](CVE-2024/CVE-2024-562xx/CVE-2024-56270.json) (`2025-01-07T17:15:31.140`) +- [CVE-2024-56272](CVE-2024/CVE-2024-562xx/CVE-2024-56272.json) (`2025-01-07T17:15:31.287`) +- [CVE-2024-8361](CVE-2024/CVE-2024-83xx/CVE-2024-8361.json) (`2025-01-07T17:15:31.420`) +- [CVE-2025-0299](CVE-2025/CVE-2025-02xx/CVE-2025-0299.json) (`2025-01-07T17:15:31.903`) +- [CVE-2025-0300](CVE-2025/CVE-2025-03xx/CVE-2025-0300.json) (`2025-01-07T17:15:32.090`) +- [CVE-2025-0301](CVE-2025/CVE-2025-03xx/CVE-2025-0301.json) (`2025-01-07T18:15:21.460`) +- [CVE-2025-22296](CVE-2025/CVE-2025-222xx/CVE-2025-22296.json) (`2025-01-07T17:15:32.520`) +- [CVE-2025-22306](CVE-2025/CVE-2025-223xx/CVE-2025-22306.json) (`2025-01-07T17:15:32.663`) +- [CVE-2025-22319](CVE-2025/CVE-2025-223xx/CVE-2025-22319.json) (`2025-01-07T17:15:32.810`) +- [CVE-2025-22334](CVE-2025/CVE-2025-223xx/CVE-2025-22334.json) (`2025-01-07T17:15:32.953`) +- [CVE-2025-22350](CVE-2025/CVE-2025-223xx/CVE-2025-22350.json) (`2025-01-07T17:15:33.093`) +- [CVE-2025-22354](CVE-2025/CVE-2025-223xx/CVE-2025-22354.json) (`2025-01-07T17:15:33.230`) +- [CVE-2025-22363](CVE-2025/CVE-2025-223xx/CVE-2025-22363.json) (`2025-01-07T17:15:33.377`) +- [CVE-2025-22365](CVE-2025/CVE-2025-223xx/CVE-2025-22365.json) (`2025-01-07T17:15:33.510`) +- [CVE-2025-22500](CVE-2025/CVE-2025-225xx/CVE-2025-22500.json) (`2025-01-07T17:15:33.657`) +- [CVE-2025-22621](CVE-2025/CVE-2025-226xx/CVE-2025-22621.json) (`2025-01-07T17:15:35.710`) ### CVEs modified in the last Commit -Recently modified CVEs: `86` +Recently modified CVEs: `107` -- [CVE-2024-51112](CVE-2024/CVE-2024-511xx/CVE-2024-51112.json) (`2025-01-07T15:15:10.270`) -- [CVE-2024-52000](CVE-2024/CVE-2024-520xx/CVE-2024-52000.json) (`2025-01-07T16:52:48.723`) -- [CVE-2024-52001](CVE-2024/CVE-2024-520xx/CVE-2024-52001.json) (`2025-01-07T16:48:41.057`) -- [CVE-2024-52002](CVE-2024/CVE-2024-520xx/CVE-2024-52002.json) (`2025-01-07T16:43:28.527`) -- [CVE-2024-53096](CVE-2024/CVE-2024-530xx/CVE-2024-53096.json) (`2025-01-07T15:42:04.183`) -- [CVE-2024-53103](CVE-2024/CVE-2024-531xx/CVE-2024-53103.json) (`2025-01-07T16:25:33.233`) -- [CVE-2024-53145](CVE-2024/CVE-2024-531xx/CVE-2024-53145.json) (`2025-01-07T16:14:57.543`) -- [CVE-2024-53149](CVE-2024/CVE-2024-531xx/CVE-2024-53149.json) (`2025-01-07T16:36:45.343`) -- [CVE-2024-53150](CVE-2024/CVE-2024-531xx/CVE-2024-53150.json) (`2025-01-07T16:38:32.010`) -- [CVE-2024-53151](CVE-2024/CVE-2024-531xx/CVE-2024-53151.json) (`2025-01-07T16:41:42.637`) -- [CVE-2024-53154](CVE-2024/CVE-2024-531xx/CVE-2024-53154.json) (`2025-01-07T15:58:21.587`) -- [CVE-2024-53155](CVE-2024/CVE-2024-531xx/CVE-2024-53155.json) (`2025-01-07T16:00:13.753`) -- [CVE-2024-53156](CVE-2024/CVE-2024-531xx/CVE-2024-53156.json) (`2025-01-07T16:02:00.303`) -- [CVE-2024-53157](CVE-2024/CVE-2024-531xx/CVE-2024-53157.json) (`2025-01-07T16:02:21.087`) -- [CVE-2024-53235](CVE-2024/CVE-2024-532xx/CVE-2024-53235.json) (`2025-01-07T16:02:48.350`) -- [CVE-2024-54767](CVE-2024/CVE-2024-547xx/CVE-2024-54767.json) (`2025-01-07T16:15:36.157`) -- [CVE-2024-54984](CVE-2024/CVE-2024-549xx/CVE-2024-54984.json) (`2025-01-07T15:15:10.720`) -- [CVE-2024-55407](CVE-2024/CVE-2024-554xx/CVE-2024-55407.json) (`2025-01-07T16:15:36.480`) -- [CVE-2024-55550](CVE-2024/CVE-2024-555xx/CVE-2024-55550.json) (`2025-01-07T16:15:36.660`) -- [CVE-2024-55553](CVE-2024/CVE-2024-555xx/CVE-2024-55553.json) (`2025-01-07T16:15:36.840`) -- [CVE-2024-8855](CVE-2024/CVE-2024-88xx/CVE-2024-8855.json) (`2025-01-07T16:15:37.873`) -- [CVE-2024-8857](CVE-2024/CVE-2024-88xx/CVE-2024-8857.json) (`2025-01-07T16:15:38.023`) -- [CVE-2024-9638](CVE-2024/CVE-2024-96xx/CVE-2024-9638.json) (`2025-01-07T16:15:38.170`) -- [CVE-2025-0294](CVE-2025/CVE-2025-02xx/CVE-2025-0294.json) (`2025-01-07T15:15:12.113`) -- [CVE-2025-21616](CVE-2025/CVE-2025-216xx/CVE-2025-21616.json) (`2025-01-07T16:15:40.390`) +- [CVE-2024-43717](CVE-2024/CVE-2024-437xx/CVE-2024-43717.json) (`2025-01-07T18:15:18.030`) +- [CVE-2024-43729](CVE-2024/CVE-2024-437xx/CVE-2024-43729.json) (`2025-01-07T18:15:18.267`) +- [CVE-2024-43731](CVE-2024/CVE-2024-437xx/CVE-2024-43731.json) (`2025-01-07T18:15:18.403`) +- [CVE-2024-43755](CVE-2024/CVE-2024-437xx/CVE-2024-43755.json) (`2025-01-07T18:15:18.547`) +- [CVE-2024-4391](CVE-2024/CVE-2024-43xx/CVE-2024-4391.json) (`2025-01-07T18:09:14.470`) +- [CVE-2024-4470](CVE-2024/CVE-2024-44xx/CVE-2024-4470.json) (`2025-01-07T17:39:05.017`) +- [CVE-2024-4478](CVE-2024/CVE-2024-44xx/CVE-2024-4478.json) (`2025-01-07T18:10:23.620`) +- [CVE-2024-4865](CVE-2024/CVE-2024-48xx/CVE-2024-4865.json) (`2025-01-07T18:04:22.393`) +- [CVE-2024-49535](CVE-2024/CVE-2024-495xx/CVE-2024-49535.json) (`2025-01-07T18:15:18.843`) +- [CVE-2024-49816](CVE-2024/CVE-2024-498xx/CVE-2024-49816.json) (`2025-01-07T17:25:58.430`) +- [CVE-2024-49817](CVE-2024/CVE-2024-498xx/CVE-2024-49817.json) (`2025-01-07T17:23:31.817`) +- [CVE-2024-49818](CVE-2024/CVE-2024-498xx/CVE-2024-49818.json) (`2025-01-07T17:20:08.497`) +- [CVE-2024-5041](CVE-2024/CVE-2024-50xx/CVE-2024-5041.json) (`2025-01-07T17:51:05.097`) +- [CVE-2024-5088](CVE-2024/CVE-2024-50xx/CVE-2024-5088.json) (`2025-01-07T18:03:40.723`) +- [CVE-2024-52831](CVE-2024/CVE-2024-528xx/CVE-2024-52831.json) (`2025-01-07T18:15:19.520`) +- [CVE-2024-52865](CVE-2024/CVE-2024-528xx/CVE-2024-52865.json) (`2025-01-07T18:15:19.667`) +- [CVE-2024-52901](CVE-2024/CVE-2024-529xx/CVE-2024-52901.json) (`2025-01-07T18:16:58.680`) +- [CVE-2024-53146](CVE-2024/CVE-2024-531xx/CVE-2024-53146.json) (`2025-01-07T17:15:25.477`) +- [CVE-2024-5347](CVE-2024/CVE-2024-53xx/CVE-2024-5347.json) (`2025-01-07T17:37:36.740`) +- [CVE-2024-54266](CVE-2024/CVE-2024-542xx/CVE-2024-54266.json) (`2025-01-07T18:05:59.697`) +- [CVE-2024-54382](CVE-2024/CVE-2024-543xx/CVE-2024-54382.json) (`2025-01-07T18:00:04.237`) +- [CVE-2025-0298](CVE-2025/CVE-2025-02xx/CVE-2025-0298.json) (`2025-01-07T17:15:31.770`) +- [CVE-2025-21622](CVE-2025/CVE-2025-216xx/CVE-2025-21622.json) (`2025-01-07T18:15:21.703`) +- [CVE-2025-21623](CVE-2025/CVE-2025-216xx/CVE-2025-21623.json) (`2025-01-07T17:15:32.313`) +- [CVE-2025-21624](CVE-2025/CVE-2025-216xx/CVE-2025-21624.json) (`2025-01-07T17:15:32.417`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a77715b7b6f..46e72f23998 100644 --- a/_state.csv +++ b/_state.csv @@ -160458,7 +160458,7 @@ CVE-2020-4869,0,0,a096dd8d27fe49f2175aa9fcc15a84c198165387c69f79776662e9e7cf4d20 CVE-2020-4870,0,0,c937ba9223dbc21e2fa187dfd9d3dfd3fb6e69d6fa4dfe41bd7cd6bd41176f87,2024-11-21T05:33:20.740000 CVE-2020-4871,0,0,0841080546d345f5d9bcfcd697ff326a0786fefe22122c974079150c9ac1cc9d,2024-11-21T05:33:20.887000 CVE-2020-4873,0,0,ec4246500eaf6d983549f4f781592165d14b8a5f25df8aa527d4d568c9ba79b5,2024-11-21T05:33:21 -CVE-2020-4874,0,0,46d0cdc81e0cf5240b53766df2a346569dab62712e3bec8c2a3a02d784b73cfa,2024-11-21T05:33:21.110000 +CVE-2020-4874,0,1,c6bbbfd85b767f640dec51549d1c21706d39b377ac010a4d0c50c6d44e1dd01a,2025-01-07T18:18:25.410000 CVE-2020-4875,0,0,39ee9e70341e60c15f153bd43e1ec55ab3fd1145a2499b443675f41245480901,2024-11-21T05:33:21.223000 CVE-2020-4876,0,0,ab396d82eafea6c832367bcde95ca430e1b3d6e022cc6da83b2d314b2366d343,2024-11-21T05:33:21.350000 CVE-2020-4877,0,0,b3762d86081ad4944ce550fb306a1bfa5b58f1884f777af72c1bf3cb1cf33e65,2024-11-21T05:33:21.470000 @@ -167039,7 +167039,7 @@ CVE-2021-20450,0,0,c277954dcc01142621c71d59d5d1fc644df23a1ada38b6368abecc3ca6c27 CVE-2021-20451,0,0,140727ef7c978a379a035c1b2ba5c8d9e8b59652213bcdbe5ff21accf16ab86f,2024-11-21T05:46:36.977000 CVE-2021-20453,0,0,69cac692ccb994b91ee56611307326b4371e627412e63b371dd093ede4578a39,2024-11-21T05:46:37.100000 CVE-2021-20454,0,0,b5a9b823983a12936ec287dc3098e2bed23b7aa3e8189b7deea101639225c258,2024-11-21T05:46:37.220000 -CVE-2021-20455,1,1,8b7018f692a10e801c382acdf873135d57690a09d34295e52fba3a2cb6405207,2025-01-07T16:15:27.430000 +CVE-2021-20455,0,0,8b7018f692a10e801c382acdf873135d57690a09d34295e52fba3a2cb6405207,2025-01-07T16:15:27.430000 CVE-2021-2046,0,0,ad9de75bfb455d28bedfc8d0200a0362300a00bb9087c78e5ba220afb8420fbc,2024-11-21T06:02:15.540000 CVE-2021-20461,0,0,32bb741266cc653229bac24a9612d59bf6c19ecf87f4dbca4826c2185db1cdaf,2024-11-21T05:46:37.343000 CVE-2021-20464,0,0,47ae6cb8b812d3b3a5c9f84cd7749fc1250c97a6b5585c32f4656f620f51f5cf,2024-11-21T05:46:37.480000 @@ -167120,7 +167120,7 @@ CVE-2021-20551,0,0,7599827456c11032b04f5d5521c20a3fded80a5e3c708285d2d6320462966 CVE-2021-20552,0,0,db1b98f153498419c0ae5ac70680b77b702feff37c6f6d82a53523aa26f56b3c,2024-11-21T05:46:45.883000 CVE-2021-20553,0,0,29adadcd60470e04ecbfe9d1d04e3019b1969542a43f2d8e35834c6b6827cf3d,2024-12-19T00:15:04.710000 CVE-2021-20554,0,0,2e5190cabe82cd81ebbfc6a35e57e2047a5de9b2faf0ac96253685a1f61ba149,2024-11-21T05:46:46.007000 -CVE-2021-20556,0,0,552b5d32da9b2eeac3209dea05c3cfae11b7144d835a0a518f91253bd57b7e21,2024-11-21T05:46:46.143000 +CVE-2021-20556,0,1,c01cecb547576fb07f154bd11b34124a7db1aab143b2b0033cf86a87ac8f9d2e,2025-01-07T18:20:08.197000 CVE-2021-20557,0,0,d4a8b7981ff7e6cc87b1d17dad192132faa62d5127df8614b78f16f4ade1626a,2024-11-21T05:46:46.263000 CVE-2021-20559,0,0,44a0c736e40433e96bff115b048b00986c4acf3989bb653afdc0aa865262de7a,2024-11-21T05:46:46.383000 CVE-2021-2056,0,0,83b6b5557c24f34a63ab2c89fad75bdc0a1444c00f1b08eed0a1443f00f862bc,2024-11-21T06:02:16.910000 @@ -172703,7 +172703,7 @@ CVE-2021-27277,0,0,c0500f09d2de8af927806deb53c5b89586648bc24f65938947093558ea6ef CVE-2021-27278,0,0,0b849bf8ecb1b33ad2c418b7753387e3742705746cd273f87bc2b00caeabd639,2024-11-21T05:57:44.973000 CVE-2021-27279,0,0,9c1c22f6fce2e2c0a5b3e3c5e960440c197e62d251afcdd93c46f655ba969489,2024-11-21T05:57:45.090000 CVE-2021-27280,0,0,fa97a1c3c0b93673391e1f68371111a1e43626abb251aa7ad077acd7cead7459,2024-11-21T05:57:45.233000 -CVE-2021-27285,0,0,0a49f2bdd0cf76df6eb68dea6670b8e9ce7ab7b0926d56459f5d8fb388786060,2025-01-06T22:15:07.590000 +CVE-2021-27285,0,1,bc2e2d7f6620fc7e4dd88c333a7711b358a5bc903ca61b62fa989912a7f58cf4,2025-01-07T17:15:09.260000 CVE-2021-27288,0,0,606ad26a1abd722ab2cd939613d0803a2551dc95bf04397c8efcf59866de7236,2024-11-21T05:57:45.377000 CVE-2021-27290,0,0,be04b1216152563800893871eddbfc237f57b512e2d32676fcdada8b5e6c4b91,2024-11-21T05:57:45.503000 CVE-2021-27291,0,0,a6a2bca68b907033ff929c7ca1aee0cdabfcf505cc9ed4eff271611781565338,2024-11-21T05:57:45.667000 @@ -187294,7 +187294,7 @@ CVE-2021-47100,0,0,2b8f2107fe64f7c73bf68f2f95ef8622755f71c6871f58fda571a3592bd55 CVE-2021-47101,0,0,bfb7def982c3a6b5601b776cd28a8ef36780c20b8f28c6838de98c69c62dc068,2024-11-21T06:35:24.037000 CVE-2021-47102,0,0,e3d7ce077927f70cf04a6ee8106db62100f560b49e92f6f23722ec783869854a,2024-11-21T06:35:24.150000 CVE-2021-47103,0,0,db3e5e9d3ae7e807e359f19f747350aa2c349e7dc8e83b609a63a55c8d4eda05,2024-11-21T06:35:24.260000 -CVE-2021-47104,0,0,d5e8599923021fbc33f842435b64cddfc70005473a6e0bec7ef126ce66061ef3,2024-11-21T06:35:24.397000 +CVE-2021-47104,0,1,106f2b5520760467943f47cb23329a1907137148a138d2cede6ef704d6e1962f,2025-01-07T17:32:24.537000 CVE-2021-47105,0,0,c70bcdb3e4cbea4051aa23250c557a66de07f80b342d42024622054eb24f08ea,2024-11-21T06:35:24.523000 CVE-2021-47106,0,0,27334527400dbf9b93c9b718dd5f958b31aa596e4bfc81d49d5ef21b989aaedf,2024-11-21T06:35:24.633000 CVE-2021-47107,0,0,be272f01aeb3781cd9faff996c74315b3c711ebc0838122ffa859b7f28658968,2024-11-21T06:35:24.743000 @@ -187306,24 +187306,24 @@ CVE-2021-47112,0,0,a20d2120af9da235238188b5d7e07b790c472dc4c22aa4ca421dcc709b8ba CVE-2021-47113,0,0,8eb9b5c0c20b4352e5ba37957059faa6001d1826ad53979e0c54dacb851c9cdc,2024-11-21T06:35:25.433000 CVE-2021-47114,0,0,33f28c6c40c74c3c7483c305faed69fe78c39ec42681673db72acad0bd83dcfc,2024-11-21T06:35:25.530000 CVE-2021-47115,0,0,f255399fb89ea4ffe6096e6f82439a37de26ac16dd3a923a8b2fb3dcb7c27662,2024-03-18T11:15:07.400000 -CVE-2021-47116,0,0,18d308f9978ed2d1658f22f2ac2c5376ba8203362ff48d4959088b6840c78f1a,2024-11-21T06:35:25.730000 +CVE-2021-47116,0,1,02298962ea00799ddb41fef923f3717f23807aae52ca815ef460897f366279e2,2025-01-07T17:31:32.993000 CVE-2021-47117,0,0,a04d2591f281ce8189779baa7d93e422e256c484f6928d79376ceabdb3bbf036,2024-11-21T06:35:25.837000 CVE-2021-47118,0,0,a74ccc8e27562236d9f0d8db75bc9977352bf9b063dead58a99c5d6db09e87ee,2024-11-21T06:35:25.993000 -CVE-2021-47119,0,0,670639e1c03e29a69bb0419bc9f71c03d68807fff50c669ebe80b488fd86c94d,2024-11-21T06:35:26.120000 -CVE-2021-47120,0,0,f5bf78c108c0a1f2610736d73bfb075ae8b79288f843fd27a9a93ee817c6c514,2024-11-21T06:35:26.227000 -CVE-2021-47121,0,0,268837798904c01ea189baaf601a7ff7595c33403f1d0e7435f710ed68e67f16,2024-11-21T06:35:26.330000 -CVE-2021-47122,0,0,29a92a09cb240b380ea34dc4ebb3585a20f64cbfc3a6e6f8091b821c98aeffe6,2024-11-21T06:35:26.447000 +CVE-2021-47119,0,1,b8835ce6595fabe87b0a3dc81d3bad5d613873557aa970029021aba98ef9bc09,2025-01-07T17:31:16.383000 +CVE-2021-47120,0,1,a8931334cd0ba99593e580c28269f1e44ba4714794111d8fb18c2df3029c4179,2025-01-07T18:00:30.300000 +CVE-2021-47121,0,1,1b44ddf91b918ac9517f5d49bf9f6811990d7b57b41644e2f05a7bc400f7096c,2025-01-07T17:30:59.237000 +CVE-2021-47122,0,1,9ed5437e226d5c2adada117d14bc702c320b44fe8e911e47dbe54e2d10713b94,2025-01-07T17:30:41.093000 CVE-2021-47123,0,0,1859bc393986e6935259f99c094a75f5745bcda1015b985ec75ee1c9b9520857,2024-11-21T06:35:26.560000 CVE-2021-47124,0,0,95081f73f1ff6a03bad9e22ba5f2a0e4ea2c4dd1aa8571c317ad81b73a779839,2024-11-21T06:35:26.677000 -CVE-2021-47125,0,0,ffc01098c195934b67f8d730da27b6ed778ff40d386f12a250d20a419c84b118,2024-11-21T06:35:26.800000 +CVE-2021-47125,0,1,0c24e7c9f662e9f81dde4975d7878b1f80e26ba4dfaf797617d164908767a28a,2025-01-07T18:00:04.453000 CVE-2021-47126,0,0,e6599ae461bf84b325c1e83e708846c87910ff2ff4d8decc1af2fae4062ce137,2024-11-21T06:35:26.907000 -CVE-2021-47127,0,0,ae02bdb92ca2f6e0656d870a9a6ce866f3463b43c10cc93f8a619a0dd59bb8c3,2024-11-21T06:35:27.097000 +CVE-2021-47127,0,1,ebe5d9e2681d9a417cb235248fa90255c41e030db394f5c355acffab8c09fe6e,2025-01-07T17:59:07.007000 CVE-2021-47128,0,0,3bf0caf472cd33c2c78f624a75fddcb54739c3103c173247a946c5b0e9fab2b3,2024-11-21T06:35:27.207000 CVE-2021-47129,0,0,69c32b331e531916dec780cadef5b1969a6b4b250ad407ca601f9c56fe9fdd5f,2024-11-21T06:35:27.327000 CVE-2021-47130,0,0,0c6e373f71f6e4d31bb75bdedeae36ea7a6002724cf26356c64b760e5f4aed81,2024-11-21T06:35:27.503000 CVE-2021-47131,0,0,797f90ad2985dacfb646e40c6d2e54538bf86bd86566ff6be1720ffc9753ac35,2024-11-21T06:35:27.670000 CVE-2021-47132,0,0,a189ce5bc29dc71d7470bdb0eb1fc36ac5e1855eba76f2d2c0adac9549011726,2024-11-21T06:35:27.780000 -CVE-2021-47133,0,0,b0bb1ed7e8e70e19b134032db9ec7c66bfed466a16b0b5f1b72eac40d583a759,2024-11-21T06:35:27.883000 +CVE-2021-47133,0,1,15f5446e43fa356d120f2d868f662208753386cbd9bfc3e70c007ae433610c0f,2025-01-07T17:30:18.143000 CVE-2021-47134,0,0,df7541358336990901f42cc28f8edafd799f673c4c0478847c59e3e1584455c8,2024-11-21T06:35:27.983000 CVE-2021-47135,0,0,cda9eb900b9488f1dcc0b5669f6061ff518909364b49a074fa354e5374568a58,2024-11-21T06:35:28.083000 CVE-2021-47136,0,0,f2f4ee2108d0e723eee0be602a357e029fb60164467baf3750e548396a0fd511,2024-11-21T06:35:28.190000 @@ -187370,7 +187370,7 @@ CVE-2021-47176,0,0,c88bbdbdaceccc1f67276288295d72167db998b34697f0e24483194e60f76 CVE-2021-47177,0,0,fbdb7ea23981a65ddb8feb0533b2e1178b9d69bd4e0dcfd5e7200e716d8cc472,2024-11-21T06:35:33.777000 CVE-2021-47178,0,0,442e05ede1ff2e98e4a38c104f48dbd0348e93d7b2273ca73cb747bf1d3b9d1b,2024-11-21T06:35:33.900000 CVE-2021-47179,0,0,a8b6b384d1d3dd4500e62419e8055586dec0b9099243b3a6cfff7cfb16fe0e45,2024-11-21T06:35:34.020000 -CVE-2021-47180,0,0,d1cd2ccf0226af7ed5b6aec6aea3f9ee9f0eeab708391cee11c6f2d3d76c6acd,2024-11-21T06:35:34.167000 +CVE-2021-47180,0,1,04d7ef49a6dbe27745e9ac88054127415a124aa60051eed7e0cd4e5e824fa8ec,2025-01-07T17:17:24.333000 CVE-2021-47181,0,0,c987c8c832cf3c59bca5d287fe34238d65206d3d339884f075eab0b776cf4e0a,2024-12-20T14:31:22.240000 CVE-2021-47182,0,0,639ad06be2a6517cd3152f844460c6d89d5631a9bb3a9b0d16574f25f9340342,2024-11-21T06:35:34.437000 CVE-2021-47183,0,0,0e63e98ae71d7513627535219339cdc1c7ccd75d9d5a94c4dc3b6c8b7e3d0c50,2024-11-21T06:35:34.553000 @@ -187380,7 +187380,7 @@ CVE-2021-47186,0,0,a394c86f0d639d2ea19b5f4049d6893cfec880c1b84d050667fdab1792f26 CVE-2021-47187,0,0,a4aa540b0dd14ad359c36d2a9ab5f7f6e0f4d25d40cc6e094f3e9a0ba8dd3469,2024-11-21T06:35:35.210000 CVE-2021-47188,0,0,00c30f21ab6336a4d9e2b45fd4a8928bec19589009838353b371e0a1fa3f8015,2024-11-21T06:35:35.330000 CVE-2021-47189,0,0,6b5a3eaa80084a3e837e6115663c571962e3f793536fa8f08533d74f389c8aef,2024-11-21T06:35:35.463000 -CVE-2021-47190,0,0,ab9375831b917daccf3fb0e57db30c8a49f0bcda62a4a0cdd15cbcb62fe69761,2024-11-21T06:35:35.670000 +CVE-2021-47190,0,1,40ef95b8cb1627967e420a0198535424c5b2953d956679426a61ed7516c65495,2025-01-07T17:11:50.810000 CVE-2021-47191,0,0,25b9f16a10465ab533164e719d45fed1ceea1474460d1b52039c6ad3a4283af5,2024-11-21T06:35:35.783000 CVE-2021-47192,0,0,7c4cd5bbbdb4219843e00ea339300d08c65e06dec7b36ecf3164f42082648220,2024-11-21T06:35:35.897000 CVE-2021-47193,0,0,c905fa876770fb280b0f84199dc4cabbc26a998966555c8162862f405026d033,2024-11-21T06:35:36.083000 @@ -187390,13 +187390,13 @@ CVE-2021-47196,0,0,9c6a270492b768a1b4d73ad58631be16dcd509faeff71f5bcd9c593e2324e CVE-2021-47197,0,0,e1be827f1706e71126b521cdeedf1b7080c03ca936e6a8a7a91237e856912a8d,2024-11-21T06:35:36.657000 CVE-2021-47198,0,0,c6ebaa79159722415c0515cc96cef05062f595cf3f4623c6619bd38959b8b1fb,2024-11-21T06:35:36.777000 CVE-2021-47199,0,0,156f51d5a11adb42866210cbf1fd4c5bab73e4e3a6e1ce374d8f5e2ced68ce10,2024-11-21T06:35:36.887000 -CVE-2021-47200,0,0,0357466e91b06a2e9d5c467e8c36ff90a160ed9e59890a4a4f68ba45e432b2c6,2024-11-21T06:35:36.990000 +CVE-2021-47200,0,1,f7d0a9f6d9d00fe034547827f9d38362c4dd747ef6c9609a6880de97be1ec3ee,2025-01-07T17:12:06.773000 CVE-2021-47201,0,0,95dca28d1aec2043b14c4b3d34caf8b5c6cf58f315fe66aad9fdae98e9727b41,2024-11-21T06:35:37.100000 CVE-2021-47202,0,0,a628118a2bcd86097b64a32a6575f766823194503c974f84f61048c0ba9fd763,2024-11-21T06:35:37.220000 CVE-2021-47203,0,0,9564d820cb2d93da0a0ae7eda2757d5eef2fa0adaa3776421915d06aab3e590c,2024-11-21T06:35:37.340000 CVE-2021-47204,0,0,e90b5c66a7c909d6593631617c20be22d07f44baef0b63f3582fdf62d1585af0,2024-11-21T06:35:37.460000 CVE-2021-47205,0,0,18551c172472e25239345747128ada0ccd7cc6fe471b57ef495541cf1516fa26,2024-11-21T06:35:37.577000 -CVE-2021-47206,0,0,1c2ba1ee0cb8d3511a9e66f8697bcc787185e8f7f7f171742961fd4e009b3006,2024-11-21T06:35:37.683000 +CVE-2021-47206,0,1,6c20cc18955b069ca564695979ba4d69e50258ddcc033c348c73d4096f845cb1,2025-01-07T17:12:26.390000 CVE-2021-47207,0,0,d6e7ebba058fbc26c30ff619791823f11271eab1f7f01abbcae995ea6a305b67,2024-11-21T06:35:37.800000 CVE-2021-47208,0,0,0aedc6593001cbe298d9e706064e1d980e47bb2fd7444fd7cad250e7521e5eb1,2024-11-21T06:35:37.923000 CVE-2021-47209,0,0,1536c1bef2c14e12d373ca6bd92154342840694d5f784ecde3999106c390f9bf,2024-11-21T06:35:38.130000 @@ -187739,7 +187739,7 @@ CVE-2021-47545,0,0,f9e54059060dbde4c9be7c93d9de1cad5092e9bea1c8e1591e1b69055c210 CVE-2021-47546,0,0,54bcc7169bd461a06886ac3f167c21667e124d34007f91ee3743e852c6c99296,2024-11-21T06:36:30.640000 CVE-2021-47547,0,0,4e95578421b3ba89a68842416ee51a2f39ce8706ff5816375cec09b54177bc9c,2024-11-21T06:36:30.863000 CVE-2021-47548,0,0,82dfe3e264322396e9734e2ff0b3b02da38463649c5a837d2de30228f01b6d33,2024-11-21T06:36:31.137000 -CVE-2021-47549,0,0,2a17a59496cef216e891ee50b705043cdf5b1046d7df69d0aa3ba6cdf1a6faa1,2024-11-21T06:36:31.420000 +CVE-2021-47549,0,1,d03a13419f24f5c877fa34cdea0784a48a2887d43194994f26b4000773afbbe0,2025-01-07T17:04:16.397000 CVE-2021-47550,0,0,0a085fbccc238b3375d78c1e9815ef80cf5634271b69aaabbbb9581043db555c,2024-11-21T06:36:31.627000 CVE-2021-47551,0,0,9e8f253638ee07c81e018309849d1f17bf5cf6bf4bbe61c9498c8d27a5ddd2f4,2024-11-21T06:36:31.810000 CVE-2021-47552,0,0,fdad00dfcc6599d689b7ad97e0127507adab9701ca3a33aa5bec92ba101023c1,2025-01-06T20:47:35.617000 @@ -192020,7 +192020,7 @@ CVE-2022-22358,0,0,84767261124809a9d1ed519f9f64155fc6ba5ec9fdf71fddbcd7410488522 CVE-2022-22359,0,0,2bf01eb540622dca847eaacee6236e255186c1277196c7cc79e981387a737156,2024-11-21T06:46:41.857000 CVE-2022-22360,0,0,565952d652a3bdb7d639feb074a1b0e26498767df3453bcf21d65b3148621e6f,2024-11-21T06:46:41.973000 CVE-2022-22361,0,0,10b0f271693e25631ef1989315b59440c197a948d70ee3735bfc385e81ac916f,2024-11-21T06:46:42.090000 -CVE-2022-22363,1,1,e770f7f5dbc3b57de7d846ca0e694a449e70e29864fe0c3385ac95fbf3aa5eb9,2025-01-07T16:15:28.050000 +CVE-2022-22363,0,0,e770f7f5dbc3b57de7d846ca0e694a449e70e29864fe0c3385ac95fbf3aa5eb9,2025-01-07T16:15:28.050000 CVE-2022-22364,0,0,b731fe796d62d66b4e178e785141a2fdcaec9d0de2086193da11eb7b1cbc2491,2024-11-21T06:46:42.210000 CVE-2022-22365,0,0,93b131a9b6677b900794e8bfb444f14fa30b748b1163134645f09fea46b11764,2024-11-21T06:46:42.330000 CVE-2022-22366,0,0,09a7cac2af7c3326b1c4db129ec697d7b77dfaf6bb69f773673a6a77e39cac91,2024-11-21T06:46:42.450000 @@ -199896,7 +199896,7 @@ CVE-2022-3169,0,0,ecfa3f3d78be0ce58bc65f193b62dda0a7e4538de19636ade41604c695a867 CVE-2022-31690,0,0,8f5f9687ffd26b348113734eeefc4578975df661f56b256703755f64c61905c2,2024-11-21T07:05:08.323000 CVE-2022-31691,0,0,47354184e4b1402095d8e96a3af246babe8acf3af32c9936f4752e6191a16a31,2024-11-21T07:05:08.480000 CVE-2022-31692,0,0,77b9f58db80c3ed8bd019381fa9ea4ce0000154679ed5ca9e96d22a7bf8c2f49,2024-11-21T07:05:08.633000 -CVE-2022-31693,0,0,913ec655df4b8e3b2273b8936344d70f1a1f814ac2fa4693c7654d377a38eb39,2024-11-21T07:05:08.777000 +CVE-2022-31693,0,1,e4d138fa62c4c452e71649c73d8be4ef766536579305d019b090fc4196f692c5,2025-01-07T17:15:10.433000 CVE-2022-31694,0,0,194725518dc2ef64a6274415ae39d17011132b1437b4d05c26e866d1d6e9daf2,2024-11-21T07:05:08.950000 CVE-2022-31696,0,0,92cbb5e5a327dcecef36027d6dcb58b0740a71db367cb95598e8d9df016a7b53,2024-11-21T07:05:09.130000 CVE-2022-31697,0,0,3d3c9f801ea26de28bbd2057e79472dcab870b29249bdf1400f36cc7da8ce9a1,2024-11-21T07:05:09.370000 @@ -209401,7 +209401,7 @@ CVE-2022-43845,0,0,4dd0555a0d80dc6547097d2325e631aae8cc1a25ed03e0c104688f7fd5b7e CVE-2022-43848,0,0,10733803c11c371a0a9c9ee79c86f454e6481168e95b3e9730f0535811d5ceb8,2024-11-21T07:27:16.430000 CVE-2022-43849,0,0,19b75e027c95da1828001070b83b6be44a4cfbf71a32632e6411f0d83c7bf310,2024-11-21T07:27:16.567000 CVE-2022-4385,0,0,65f1a561c3e1db592a3f66f59cbfa3bb56e5e753c26fd7e5291d3b919454eb87,2024-11-21T07:35:10.627000 -CVE-2022-43855,0,1,64fbe7dc298ae5c5ac98c70a6d144003654c18affb03fce85bbaadaad755a546,2025-01-07T15:38:33.697000 +CVE-2022-43855,0,0,64fbe7dc298ae5c5ac98c70a6d144003654c18affb03fce85bbaadaad755a546,2025-01-07T15:38:33.697000 CVE-2022-43857,0,0,c2306b55f2b4c37a83b047fd2388728e99b12612bc990aa59fe7703ba18ae695,2024-11-21T07:27:16.837000 CVE-2022-43858,0,0,f37263e6c9a749dffda738fdd0099cd194b151233806de545336aaf55f4891b9,2024-11-21T07:27:16.990000 CVE-2022-43859,0,0,fb5fcf2008667bf8e36fcb4c86b0d5f159050715bb8a549a5cfbc9fc72c9e289,2024-11-21T07:27:17.153000 @@ -212608,8 +212608,8 @@ CVE-2022-48638,0,0,7a36934df459d35a752e9c19975343358bc638b0a6803ab6e929e9511ae19 CVE-2022-48639,0,0,2bf64fdcd67f028c10f8b9e564b4b89ca3aa02bab5ff7a158a3f571c972d4c15,2024-11-21T07:33:40.237000 CVE-2022-4864,0,0,59b15f5eec2180ddfa7ce36526893d26fb614ed7bf416e8ac4ed3714bd6e2186,2024-11-21T07:36:05.780000 CVE-2022-48640,0,0,5e756f70cbddf596ac5b8ae586dd2af870a1a48da17b6fd47eabf03f4ed205b8,2024-11-21T07:33:40.350000 -CVE-2022-48641,0,1,99cb3d858a92705b7faa733f64ea99edcf4ba5c00c38154dda248e15af991606,2025-01-07T16:57:26.363000 -CVE-2022-48642,0,1,68582f54759adaad89e7572c48a2bb40facbf5e58029a83e5488b10b4265fdd3,2025-01-07T16:58:08.190000 +CVE-2022-48641,0,0,99cb3d858a92705b7faa733f64ea99edcf4ba5c00c38154dda248e15af991606,2025-01-07T16:57:26.363000 +CVE-2022-48642,0,0,68582f54759adaad89e7572c48a2bb40facbf5e58029a83e5488b10b4265fdd3,2025-01-07T16:58:08.190000 CVE-2022-48643,0,0,ab9b649f55ad96816c2493c31f5a05b2eb566c44703b1f0180a6a102d8ac6207,2024-11-21T07:33:40.710000 CVE-2022-48644,0,0,c5039b46b0d136554ba427d83c4470091587ebeb56eef158e382b1a908e7e2d6,2024-11-21T07:33:40.817000 CVE-2022-48645,0,0,4d8ec773eaf2c6a6981744ed20ef9fe75b117903e4fb588c647780c2e96ceca6,2024-11-21T07:33:40.933000 @@ -213226,7 +213226,7 @@ CVE-2023-0117,0,0,d925e15b03815e85cd9575db6cb76a9d33e78b2295bb879cf3ba095982cfab CVE-2023-0118,0,0,aa0b661d40d0ecffa7edc28fcea63c3d1e6716f461081ff2b068a1c61f148b16,2024-11-21T07:36:35.247000 CVE-2023-0119,0,0,db8b4bb6e60810391071fecb8352baf3f21408c3c45bfe947c091d19a61eb005,2024-11-21T07:36:35.410000 CVE-2023-0120,0,0,13869732abdfabb700ffbaf147e2c3e4fa590d46bc9b1f6ba275c936f0defe72,2024-11-21T07:36:35.567000 -CVE-2023-0121,0,0,9ee70795fa83fcd91160ab62e7ea2401b17f2fb5e1312e0f8a074455f53636b0,2024-11-21T07:36:35.700000 +CVE-2023-0121,0,1,05b01d522be2062fb81270ad11161f94652f5f502dfeef0a71d912cf44555e1e,2025-01-07T17:15:11.040000 CVE-2023-0122,0,0,b16e3c5f26806b8c2deeb87ed9816ff662c7345f493bb5edcd882c5467ff7758,2024-11-21T07:36:35.837000 CVE-2023-0123,0,0,050d9fd610b886c7a718f7b46f264e216d04e5cc3c8bb5b7bd45ada2027e04eb,2024-11-21T07:36:35.957000 CVE-2023-0124,0,0,c85156ba1cefba43c1069a4756da8bac9a088ad0823a2eb094f480cd7fd4ca14,2024-11-21T07:36:36.070000 @@ -213599,7 +213599,7 @@ CVE-2023-0504,0,0,ed39f0256fdbb77742a865d394c28c8f7c27b437596d39977e5b76cf929c6b CVE-2023-0505,0,0,2d8b1055bbcdb069db40ac811013dbb3e557542160dcd2ba627c78f082c956dc,2024-11-21T07:37:18.457000 CVE-2023-0506,0,0,87b88a38de8a656da96d2baaafb826c88720aba59d839140e544d0231abe4669,2024-11-21T07:37:18.557000 CVE-2023-0507,0,0,eea611616a40910200b2b2658035e9b796b5a71ee27f82d51b789577f22f61dc,2024-11-21T07:37:18.687000 -CVE-2023-0508,0,0,3b7663cbc3d07ab28fc31285864c0eabfb4ee9d084d507ca816ebf5f7825ebbb,2024-11-21T07:37:18.810000 +CVE-2023-0508,0,1,3633feae8b122f41d68594b44da27848f4f97caa8fd0978e248c5755fdd1b9a0,2025-01-07T17:15:11.700000 CVE-2023-0509,0,0,13c7cf1b9e7c848dafa6de2985329c806b5364b54521b16ff548b5f19a1d82b8,2024-11-21T07:37:18.937000 CVE-2023-0511,0,0,519cdf5faaf7a9befdcfea0647da47e3612d475d128ecb936230af8799a78288,2024-11-21T07:37:19.050000 CVE-2023-0512,0,0,ef0dea17e984a58cd9ac76ceb00b4b97241e3976fed7f0cf7813f28df25cc1ec,2024-11-21T07:37:19.170000 @@ -213750,9 +213750,9 @@ CVE-2023-0662,0,0,c41719169476ca9b8e5799d04b3db3add3444c0ea739c0a159030df6d85174 CVE-2023-0663,0,0,e551da6aa8b74e91f43f593061ac3862fa32da542869afeccfd2b069aa7b8f68,2024-11-21T07:37:34.953000 CVE-2023-0664,0,0,c52e01a2288988dad950f445c26784fe498a8022c387f4a0b5bc8ba3c8d2af2a,2024-11-21T07:37:35.087000 CVE-2023-0665,0,0,f38be998f5b2ed4f8a710dae6c708e87a0da01499468b6ac7f9425307dec03ce,2024-11-21T07:37:35.217000 -CVE-2023-0666,0,1,ffdb9ed65b66d9501fb7ba4f3ba75e2f59e17b429aa8ed9e9aade22c103edf94,2025-01-07T16:15:28.873000 +CVE-2023-0666,0,0,ffdb9ed65b66d9501fb7ba4f3ba75e2f59e17b429aa8ed9e9aade22c103edf94,2025-01-07T16:15:28.873000 CVE-2023-0667,0,0,6ce2da8cd021a850e6b966b13d3f1c5aa6c4612f36c388d5e418ef2a0edd1e51,2025-01-06T21:15:08.783000 -CVE-2023-0668,0,1,0bcd556958f148852498223d61a9b6e12f93a04aba52c0ec5107946ad0f89ac1,2025-01-07T16:15:29.157000 +CVE-2023-0668,0,0,0bcd556958f148852498223d61a9b6e12f93a04aba52c0ec5107946ad0f89ac1,2025-01-07T16:15:29.157000 CVE-2023-0669,0,0,fff921b621ad70082c23fad8bf9015d87babc283877a7fa6ac12ff58fee6f287,2024-11-21T07:37:35.710000 CVE-2023-0670,0,0,5bdded158185e9657a0a331db34ccdf5912942247170670e10672ccd4117ea74,2024-11-21T07:37:35.850000 CVE-2023-0671,0,0,31a0191d43d5caefbf53a2b1834f7f7af28c570b673efd2065d279713f8ddd58,2024-11-21T07:37:35.960000 @@ -215029,7 +215029,7 @@ CVE-2023-20006,0,0,78fb991face6a7b60142118f09197c5ea317af7981f1b44722583cd9915d2 CVE-2023-20007,0,0,e66472f16742cc8b69cd10f96c5911bf6dfbc42a8e70876f1a740b167758dc68,2024-11-21T07:40:19.730000 CVE-2023-20008,0,0,ad694520f54134b346a506f52a7b526a4fc427bfb49beded59b0bfd44fff1888,2024-11-21T07:40:19.863000 CVE-2023-20009,0,0,6a5e9cd5f745a8d28bb5ea4fea6e0d2f315c4d95eeadf4702997646f302790c7,2024-11-21T07:40:20.017000 -CVE-2023-2001,0,0,f6da68dc733bd30870fd29335fe77293e41f92b9e7323a052d3c10c077af2338,2024-11-21T07:57:44.593000 +CVE-2023-2001,0,1,405c9aaef445555a8673a076bd82197a162f32aaff8ac2919a11668daa941c39,2025-01-07T17:15:13.167000 CVE-2023-20010,0,0,8117fa1d8535a2a2061a1e64bf99124c9dabfc271c38ae2dcd8cd3fc2ac397b8,2024-11-21T07:40:20.160000 CVE-2023-20011,0,0,7740dc0bf75312b2df27d426539ada304afc07b65d14883dfb42cab6ee1bf4f9,2024-11-21T07:40:20.303000 CVE-2023-20012,0,0,07d478ac66348d359fa711833c1d8a17b549f5d18e580258d91aa336869deb54,2024-11-21T07:40:20.440000 @@ -215157,7 +215157,7 @@ CVE-2023-20126,0,0,70dce8eb4f11c428b6926304e6ae9086ac5938f0dc6e112500f266b10a383 CVE-2023-20127,0,0,f7e57e15ae78bf92feb1eee01e4585903d78bdd9a4a7f9ea362bfc55841e5005,2024-11-21T07:40:37.230000 CVE-2023-20128,0,0,a1ddde03e7dd575863968c62441ca9f432105d2a1f8abc404ebc0b709355a7d7,2024-11-21T07:40:37.353000 CVE-2023-20129,0,0,32d6d667e84e5bdc6e93defd4557109cadbe47dfb524ea89ccf00757f6aad7ea,2024-11-21T07:40:37.480000 -CVE-2023-2013,0,0,2c13adf33e7758d1d84636d67848edff0b91e763a31248121e9637f6e44944aa,2024-11-21T07:57:45.763000 +CVE-2023-2013,0,1,72fcf84cdf5b88e5a2c098330323ac4b932376f84231b4a35940456bd8fa2c8f,2025-01-07T17:15:13.710000 CVE-2023-20130,0,0,9a6974641534475440b91d8f64a253039239adde95026e66c262c0832b92313c,2024-11-21T07:40:37.600000 CVE-2023-20131,0,0,d9646ac191340d6c6eeba8dbb277722db753a87563746cf0c07d916cc6600573,2024-11-21T07:40:37.737000 CVE-2023-20132,0,0,c0218f1473666958c31cde6d66291201625981115c28527d76d537e9e5f87f8c,2024-11-21T07:40:37.860000 @@ -215179,7 +215179,7 @@ CVE-2023-20146,0,0,f69b1831b56cb21e7bba328dc21bb5232c973d9820e3b592ae73e140c9446 CVE-2023-20147,0,0,5cb957c773b5319e4793215a4fe6c1722896bc23d8334634f7a3f8d7236c0463,2024-11-21T07:40:39.787000 CVE-2023-20148,0,0,0c10101f42a9bc0df79468fe1a5fa0dc07156f55e39972f3828caace1f27993a,2024-11-21T07:40:39.913000 CVE-2023-20149,0,0,7ebebb22a0f8cadbf7bd084a45d8cde40be04333d5e92009cb2f66ea8d8588e8,2024-11-21T07:40:40.040000 -CVE-2023-2015,0,0,a6f4941e5f9b70ed32dd73389e760a5602ee1b6c8a52465b5c8c00f9b9815652,2024-11-21T07:57:46.010000 +CVE-2023-2015,0,1,058b2f708fce569b8441f5a067e1c525bc45ef85b2a3a6c9b1f3ee6970b83d69,2025-01-07T17:15:13.950000 CVE-2023-20150,0,0,38b578f6a4b032dce3d1ac459b9320c9111ff8106b98db0b692c38044628d3c4,2024-11-21T07:40:40.163000 CVE-2023-20151,0,0,218bc983aef0b6d9dd9a8c532f8818b60644c61f483b5ce2c98350ad62e24385,2024-11-21T07:40:40.290000 CVE-2023-20152,0,0,dfa9a42fe53f646a215828c624c7129c2826540352734cb4a33303f6bcac72f6,2024-11-21T07:40:40.420000 @@ -215681,8 +215681,8 @@ CVE-2023-20884,0,0,4423dfb254ef19cd65eb6cdc64b42d779ddefab65e5ccd6f3e9ec2229f3ac CVE-2023-20885,0,0,0dfdf492922f0b854de542b4e33abc881f21c058cd2a01cc3c31dff463cde87b,2024-12-16T20:15:06.557000 CVE-2023-20886,0,0,7a982823666f96ea57050e3be9fa8d457665501ecee354ebbfe73207a1794a5a,2024-11-21T07:41:45.290000 CVE-2023-20887,0,0,072fa55b19037026443d59f5a8b6eb8c8f0d66a8ce2a12de803a75a2e2066424,2025-01-06T22:15:07.900000 -CVE-2023-20888,0,1,723c7f0b957cdef56a4661c479c825f356eedc0bc04101cdf7f7700b2e357931,2025-01-07T16:15:29.400000 -CVE-2023-20889,0,1,fd83950042aec40275dad2507592571009f6b50d10101fb2b79214d35f573bc1,2025-01-07T16:15:29.613000 +CVE-2023-20888,0,0,723c7f0b957cdef56a4661c479c825f356eedc0bc04101cdf7f7700b2e357931,2025-01-07T16:15:29.400000 +CVE-2023-20889,0,0,fd83950042aec40275dad2507592571009f6b50d10101fb2b79214d35f573bc1,2025-01-07T16:15:29.613000 CVE-2023-2089,0,0,71b86ef69634c1f1cecb80679171d8c1d18cdf2b9a712b87a474c4a7b660ee38,2024-11-21T07:57:54.870000 CVE-2023-20890,0,0,c6d89d2ff550700edc8ac2e64d97d12842613e678a3a487ff3860e6c922c6b29,2024-11-21T07:41:45.750000 CVE-2023-20891,0,0,0a9ec7ceee2a6f45f9dcb69e11b8f16e9ae513637c8989ce0cc9bd0e4e2531fb,2024-11-21T07:41:45.863000 @@ -216809,7 +216809,7 @@ CVE-2023-21976,0,0,ff98f3d47d17a1d8ad8a3a02b6c50346167cb12d055418397cf40d315bc97 CVE-2023-21977,0,0,3c347900dea7d90bfc4f10a8581a2fac2531f7f6d807de13fcb70eeee0f8fa3a,2024-11-21T07:44:01.933000 CVE-2023-21978,0,0,0a6b4095e04d43241996c7fe2fb1879d3cdeb647ef2af9e4527ed3d25e7b676b,2024-11-21T07:44:02.057000 CVE-2023-21979,0,0,116e4c19c05f2acdcbd2bed4e7a8046ab1822f615b80b736dce185e39f1a398c,2024-11-21T07:44:02.177000 -CVE-2023-2198,0,0,e29a0ae283dd75b1383f5bc40c3e7cb90af5acfc5cdeb2e1c1a77803600b1895,2024-11-21T07:58:08.287000 +CVE-2023-2198,0,1,6f907a11d77fa69856685faeb4691c50af4c27a85baa74d0803f2bd4c91fa693,2025-01-07T17:15:14.210000 CVE-2023-21980,0,0,c34b85f4306e44e22bce54bbb52d90a33c6f6ea7cfbb0b7037bbb3a558d99c5b,2024-11-21T07:44:02.303000 CVE-2023-21981,0,0,7be861dc89e03cc02485d0dcc37a0180919028ebb08a88e7594d6d3240ea5ea5,2024-11-21T07:44:02.440000 CVE-2023-21982,0,0,09e87aab550c964f470d52d2659a98ed65f6e9af06fa0e3fc285a5b8887fd13f,2024-11-21T07:44:02.563000 @@ -216820,7 +216820,7 @@ CVE-2023-21986,0,0,9d6a168c2366edbfe6fdfedfa026d19055142cb05a3e873ac2fcba0efe92e CVE-2023-21987,0,0,eb49f50c15f20aac58a35b684fec4f6af4ad7473bc7133bc583be6aca073d048,2024-11-21T07:44:03.203000 CVE-2023-21988,0,0,70dd4f41eb47f1e1492e32dfa7689fba60e95ae11f2d5c07c7859519eb1b27e6,2024-11-21T07:44:03.333000 CVE-2023-21989,0,0,67d8355376b0cc631b433eb95d515f575f4c3c599dd2285771435917ae77550b,2024-11-21T07:44:03.477000 -CVE-2023-2199,0,0,640dd1ff5597997088949b85d72837eb3e2b4c70f0e774b9fcc325681d68eeaf,2024-11-21T07:58:08.397000 +CVE-2023-2199,0,1,138569ad41d39d2332677696c1c3e34f25bfa8059e4481dfc851914f94f4c1fe,2025-01-07T17:15:14.397000 CVE-2023-21990,0,0,5195fcbbd7a502fbbc5fcb435adafd4aa44c631e0cf74dc70e79daaa1bb3f642,2024-11-21T07:44:03.607000 CVE-2023-21991,0,0,66b35f3714e340f982b008cd5f2a6371a8be9a244f9461fd09a521989a791125,2024-11-21T07:44:03.730000 CVE-2023-21992,0,0,1301f96891a9bc79760ff7b68f6ff27715fc84567428dbf910ca7b6be18d3b57,2024-11-21T07:44:03.843000 @@ -218738,7 +218738,7 @@ CVE-2023-24416,0,0,1b449df0fe61306d8c1b970891de4c8cbe5d61162328610a7d45335de1c21 CVE-2023-24417,0,0,f24f25e5baf50b812d0c3e3d872d8cbd6a577d1bc10ef748c0fb28b0f0858760,2024-11-21T07:47:49.540000 CVE-2023-24418,0,0,3af2bc70acb73f557a860ae963c15254b495111d360663e66665bb78dcda823c,2024-11-21T07:47:49.690000 CVE-2023-24419,0,0,ff3247261a6031e519cdec6ce23c8feb190cd19f85ee04ea51321e64e9e629eb,2024-11-21T07:47:49.820000 -CVE-2023-2442,0,0,d8e5e05765f921daa01445987d9da1fe388ca1e8a10c45de53400ead8cad51dd,2024-11-21T07:58:37.517000 +CVE-2023-2442,0,1,1dd258bd71f39498f8fe8188811c1bc3bd6af83ae2f4ed06e9d5c5d5c6c80fe1,2025-01-07T17:15:14.570000 CVE-2023-24420,0,0,60052984e26c9e953e869776688ef7e1725803b50c7612603374a8e9155f9933,2024-11-21T07:47:49.953000 CVE-2023-24421,0,0,25bd7f9d6f73cea9c3a71b7b33f53fe9e5c69bc5f8200b24ba620e394f1a4ed9,2024-11-21T07:47:50.083000 CVE-2023-24422,0,0,24fc526a3c461afb7bbe4e3489d8bda73524a681226ed4c201624da677beb2ee,2024-11-21T07:47:50.210000 @@ -219488,7 +219488,7 @@ CVE-2023-25289,0,0,de0ce224bffd109739500be01369899ca72d949f8d8a7146bf4bf245dda25 CVE-2023-2529,0,0,e0c597e5f44df4f0fa35a31922c8c63e9eda9621312de091657b5b531d976868,2024-11-21T07:58:47.050000 CVE-2023-25292,0,0,1f86a32d6a4338c659d4285a5fc98df6a17b54f2c670480f9fe0a7bdeb97ad9e,2024-11-21T07:49:23.620000 CVE-2023-25295,0,0,a98834b6bd1f87785173f8777c2482cbef1ded510a102976fe5e23312fa33c78,2024-11-21T07:49:23.760000 -CVE-2023-2530,0,1,db6a677f08220af6ab3816d0cbd5e5581c51871954258b8e0fcc2eb2fac4c605,2025-01-07T16:15:29.843000 +CVE-2023-2530,0,0,db6a677f08220af6ab3816d0cbd5e5581c51871954258b8e0fcc2eb2fac4c605,2025-01-07T16:15:29.843000 CVE-2023-25303,0,0,0fff8997fbb0dad0658b1458cb96909339d0a3ee3f17f6cda9f8e25ba49cee9d,2024-11-21T07:49:23.910000 CVE-2023-25304,0,0,28a9fcfe9f8defd2b94db49ca3a63558bcf2cd3ca6efe7b0c3e6f407ffddeb97,2024-11-21T07:49:24.047000 CVE-2023-25305,0,0,e034ff43c37edb7c066168ed0e8780cecf32ded05354e03285f0640dac3342bf,2024-11-21T07:49:24.173000 @@ -219985,7 +219985,7 @@ CVE-2023-25886,0,0,a667aac9fb2b7e06e6c5e9a3a1dbf948965b850711504b7919852f1ed8adb CVE-2023-25887,0,0,7ec861a622f4794e61b2e6fec5731407dfc1aeaf59e6818435b4939d22be7261,2024-11-21T07:50:22.033000 CVE-2023-25888,0,0,cb61bb4da0d7b45f7ad4dbf03ed740dc6f9c38e55cfbbe6f1dff451113de96b8,2024-11-21T07:50:22.153000 CVE-2023-25889,0,0,970dc38107ab7ea466443753c5a66522701cb0b176a3ddeaaac1802ddba3bb52,2024-11-21T07:50:22.280000 -CVE-2023-2589,0,0,464f36bdfa6f0d22177d634ec43cf3bf84ccdba3aaeda418b3a98bda204e0b0b,2024-11-21T07:58:53.270000 +CVE-2023-2589,0,1,b52c61f074438217d19fccb25acfdf69239b46f2a65d382d8e51d41e096b5062,2025-01-07T17:15:14.747000 CVE-2023-25890,0,0,6cfdb99688214de6b1031c37fa9da504a708ede570574a9d98f15d46b0637d20,2024-11-21T07:50:22.393000 CVE-2023-25891,0,0,dc9e63daac65232f21b0a5ffa2aaf6ad6f7b94b7d96078e378d75ec9be3604a3,2024-11-21T07:50:22.520000 CVE-2023-25892,0,0,4317a18ccd927e44e948b08b50b4a33078a85143890420e5956eaca1a3b959ee,2024-11-21T07:50:22.647000 @@ -223514,7 +223514,7 @@ CVE-2023-3039,0,0,5fb1117a3c974bb5675369e9814fd755e9c2c006e24e1faf7e2d4e7dfc8e49 CVE-2023-30394,0,0,0029c2f10bc315baa8071d1799ca0506df08206db7f66c6b9f0205ee7b2e5992,2024-11-21T08:00:07.210000 CVE-2023-30399,0,0,b6956a22b0bc087cbd98c36f25069d5d41456450781cd6d5930cc67d63cbddf5,2024-11-21T08:00:07.447000 CVE-2023-3040,0,0,67b10a7d0cecd4a947310cdb25b708f4d546d578a5f4921b2c7bf1b13d0b5a63,2024-11-21T08:16:18.200000 -CVE-2023-30400,0,0,319aab5cc3cb7e2aed0bf918227b4e0b4c0c1816f7a781b67555845043a9462e,2024-11-21T08:00:07.597000 +CVE-2023-30400,0,1,bb78308803fe6c1020bfaeee5d3b90938cc2692e9bc738ed02b67caa3fca347e,2025-01-07T17:15:14.917000 CVE-2023-30402,0,0,efa5059955c4d7e3b68dacb1538cae5e0c524acca0015b8971b4926f93dbd6aa,2024-11-21T08:00:07.747000 CVE-2023-30403,0,0,ce8104defab1170a8d832bf42d1268c7fd633f46e683c6fe27dc6198a30f5e2b,2024-11-21T08:00:07.907000 CVE-2023-30404,0,0,87b22d02f8d2dc3fb5adecb232d7bdadb45a7cec15c53d553846e4223dd2f9c5,2024-11-21T08:00:08.073000 @@ -224151,9 +224151,9 @@ CVE-2023-31101,0,0,84390422dbf5a5821e8f914f92993664c448911aa69b3d18f44ad9c02ab10 CVE-2023-31102,0,0,0befc70f83111f1d99f825978a0e14dbded8ec6a90b35f966fe71f085d9e1dd9,2024-11-21T08:01:25.310000 CVE-2023-31103,0,0,c126d74ecf5c8750ea2a8ac6630f10fb115366517006f7188ade051da19d7f41,2024-11-21T08:01:25.553000 CVE-2023-3111,0,0,6d3d3c61c7709921810ccdbf24a159b026d4c2c7113ef97420750e9567380cc7,2024-11-21T08:16:29.017000 -CVE-2023-31114,0,1,00399776dc80a67be64865596040d39cdeea521434ac9adca360562a6af8fb2f,2025-01-07T15:15:06.800000 -CVE-2023-31115,0,1,0a9658ffe7dda834de67822bab10923e699c8c59bb4f6fc69994082426af92d9,2025-01-07T15:15:07.683000 -CVE-2023-31116,0,1,c55675266d454aebeb27737d038748d80f3794b5e0768fb210700351bf7de879,2025-01-07T15:15:07.850000 +CVE-2023-31114,0,0,00399776dc80a67be64865596040d39cdeea521434ac9adca360562a6af8fb2f,2025-01-07T15:15:06.800000 +CVE-2023-31115,0,0,0a9658ffe7dda834de67822bab10923e699c8c59bb4f6fc69994082426af92d9,2025-01-07T15:15:07.683000 +CVE-2023-31116,0,0,c55675266d454aebeb27737d038748d80f3794b5e0768fb210700351bf7de879,2025-01-07T15:15:07.850000 CVE-2023-3112,0,0,5732cc69571acd1eb4f8657f50860bcffb6be054e7e94a4152f7d92b7818c82a,2024-11-21T08:16:29.187000 CVE-2023-31122,0,0,775fb6ca489442b871f995b94e395eecdc6cd94f9e7eb529e9f77ce9781aabcf,2024-11-21T08:01:26.177000 CVE-2023-31123,0,0,ea5a6bfa14cbab83c854da8d4aca838cc24c3e204831291f3a9eee8f9ee2648a,2024-11-21T08:01:26.327000 @@ -225935,9 +225935,9 @@ CVE-2023-33279,0,0,c5b52a353f3ee6325fcdbc23e78def6dd9840f906e0c4aa43a168e1260736 CVE-2023-3328,0,0,19ff79881d8bc75c570024c2c95120dd8f165b34196c4c953dd29948c4479610,2024-11-21T08:17:01.480000 CVE-2023-33280,0,0,dd129b41a63a61652c937421f2797c2268bcb168616b41614739762f2d92381c,2024-11-21T08:05:19.307000 CVE-2023-33281,0,0,067771f6ca325b24677ebeb151358c2c9e2cc8b783e08f179c67a9925546697e,2024-11-21T08:05:19.500000 -CVE-2023-33282,0,1,b9105cd79bc3fe38b67de1004c426bb3546015ffe36bedcfc063a51cc7e790da,2025-01-07T15:15:08 -CVE-2023-33283,0,1,aa728629f1c9780c7132c3e98fa5e81cf6102cf0d8ded155986326ffa98868c5,2025-01-07T16:15:29.973000 -CVE-2023-33284,0,1,db41d8e24bc207a166de9f5ad7b6c86c72497666dab7cc586996e222d3bc20d4,2025-01-07T16:15:30.170000 +CVE-2023-33282,0,0,b9105cd79bc3fe38b67de1004c426bb3546015ffe36bedcfc063a51cc7e790da,2025-01-07T15:15:08 +CVE-2023-33283,0,0,aa728629f1c9780c7132c3e98fa5e81cf6102cf0d8ded155986326ffa98868c5,2025-01-07T16:15:29.973000 +CVE-2023-33284,0,0,db41d8e24bc207a166de9f5ad7b6c86c72497666dab7cc586996e222d3bc20d4,2025-01-07T16:15:30.170000 CVE-2023-33285,0,0,30741f1677c923d9321a174f24cbcfbb45d70b7fa16adbecc164042f72c69993,2024-11-21T08:05:20.157000 CVE-2023-33287,0,0,1725d54a85eb14ed5ed43bcb323871ad9163e79462681a72627cfeea124f1f79,2024-11-21T08:05:20.330000 CVE-2023-33288,0,0,26838f7327104c1b47d024f5db0a9eb1c2668da883675bbf3c61e6d3c54ee2da,2024-11-21T08:05:20.497000 @@ -226063,14 +226063,14 @@ CVE-2023-3349,0,0,198f0750e28fec680b199f31ee62e51097776525e0e38e70fe1488f9073098 CVE-2023-33492,0,0,f18ce2f813c3ba55047411a06441328b89b300d96f041da133c6dcfb061e2cf2,2024-11-21T08:05:38.440000 CVE-2023-33493,0,0,1adf36c0169de71a220f9b04ac78654488990b0d222648e1c9e4c1d68f48a9b9,2024-11-21T08:05:38.587000 CVE-2023-33495,0,0,b41da8a24563d7ec6c8b1e481c93b00b01b328f982e2b129df4bb9b0e2fe8de5,2024-12-09T22:15:21.557000 -CVE-2023-33496,0,1,3fd0a52821141bf6f5309c19678c375cd3da0df157cfd4491cb9856f63310f2a,2025-01-07T16:15:30.370000 -CVE-2023-33498,0,1,379c46b468fd16d5349d5ed08fd815599da430bed83605ed93a8b87d62e95229,2025-01-07T16:15:30.577000 +CVE-2023-33496,0,0,3fd0a52821141bf6f5309c19678c375cd3da0df157cfd4491cb9856f63310f2a,2025-01-07T16:15:30.370000 +CVE-2023-33498,0,0,379c46b468fd16d5349d5ed08fd815599da430bed83605ed93a8b87d62e95229,2025-01-07T16:15:30.577000 CVE-2023-3350,0,0,c693ece6a6dc8a063084324beeed66e17765ab0612916966eb644715f1b77e3f,2024-11-21T08:17:04.707000 CVE-2023-33507,0,0,8c8de104a836f2a97cd9fdb66854a75143bede63381b0f6428367968cc3647c8,2024-11-21T08:05:39.220000 CVE-2023-33508,0,0,eefee40d15da825ff91a58514af3667b807a8d58fe173d0d65d33f631700d05f,2024-11-21T08:05:39.370000 CVE-2023-33509,0,0,7c087a342d0e252ecbe0a47b1cafba10b65eb1c2aefbfbfaa10685cf24ed5b5c,2024-11-21T08:05:39.520000 CVE-2023-3351,0,0,f64258e34e1f6e2c3debe6ab542c8550e84fbbc69c1d8f132c263991d8bde067,2023-11-07T04:18:34.703000 -CVE-2023-33510,0,1,2fdbca3ef3ec1beb92f8e78ca0e200b48de108215e8c467acd4f2362be303f38,2025-01-07T16:15:30.803000 +CVE-2023-33510,0,0,2fdbca3ef3ec1beb92f8e78ca0e200b48de108215e8c467acd4f2362be303f38,2025-01-07T16:15:30.803000 CVE-2023-33515,0,0,365a9a5f6a7f4c9eca56bb36b50c44f896d0d4286fd9bf91ea545127cf4cb344,2025-01-06T18:15:14.737000 CVE-2023-33517,0,0,b525e4f20df193bb6cbce03994f81acd991418a35811daa2f53394dfc22d6d82,2024-11-21T08:05:39.983000 CVE-2023-33518,0,0,d2a984b73ce9cab4514b9daac0fd3b164012234648668d157ade4d7b4b4aa3a9,2024-11-21T08:05:40.207000 @@ -226082,9 +226082,9 @@ CVE-2023-33530,0,0,57857e1bf8e466401ac30cdd0dc887f8986765437c17856ecb13f708f7f9e CVE-2023-33532,0,0,50ab32c25e361dd582a0b7febef0af88121e3f6206486854b3e53aec4e9993fe,2024-11-21T08:05:40.760000 CVE-2023-33533,0,0,24981bd383e42008ed24aba8323ae2f18199e8d390590f1a85d2ffb5a9e35a06,2024-11-21T08:05:40.900000 CVE-2023-33534,0,0,375224b30005c5c6b4df976c11ab08ed3b921dbd5d50ac7db6447c43e9441aad,2024-11-21T08:05:41.057000 -CVE-2023-33536,0,1,4483a4c84bae9df5f08f3544144640e560096a5f4d7b065a9e0bcbbe032477f3,2025-01-07T16:15:31.153000 -CVE-2023-33537,0,1,06a836a8ec9a8a82dac73cdff5c990d7b4a0e29c9bc271ecada9cf746e2d2bd8,2025-01-07T16:15:31.423000 -CVE-2023-33538,0,1,b3b643fe39302a1c48ae218034aade7823381ded5695561882bb311b6c1280d5,2025-01-07T15:15:08.190000 +CVE-2023-33536,0,0,4483a4c84bae9df5f08f3544144640e560096a5f4d7b065a9e0bcbbe032477f3,2025-01-07T16:15:31.153000 +CVE-2023-33537,0,0,06a836a8ec9a8a82dac73cdff5c990d7b4a0e29c9bc271ecada9cf746e2d2bd8,2025-01-07T16:15:31.423000 +CVE-2023-33538,0,0,b3b643fe39302a1c48ae218034aade7823381ded5695561882bb311b6c1280d5,2025-01-07T15:15:08.190000 CVE-2023-3354,0,0,c1971a8d35c84792a7e3b4b69170665e207a3bb365fff75d5a707072047933e4,2024-11-21T08:17:05.117000 CVE-2023-33544,0,0,88bef72ec7a83ed8f48a74d9d233d68d45815d12dcef7901cc8dd38c21b6c141,2024-11-21T08:05:41.690000 CVE-2023-33546,0,0,9e82aede766f4b9b701714d917a2868af3b3571a49bd4b295d6aba2bb98c278a,2024-11-21T08:05:41.850000 @@ -226092,8 +226092,8 @@ CVE-2023-33548,0,0,b51dc1575c1f7daa608b0b5836c474f314a242a913214763d5debf853883d CVE-2023-3355,0,0,66c43df3dd0ee91c832932172c9cb5c8a55655cbcbf5f77d9dc727f70b08e4ec,2024-11-21T08:17:05.290000 CVE-2023-33551,0,0,15ca22be4f110c38b80ef279ae23e0f0520d88f7835dffae7ff26ecf6ce6cde8,2024-11-21T08:05:42.157000 CVE-2023-33552,0,0,d954eec01e7648a78344657472a098bc82cdf50ddc5f7580444f9b507c1e3dbe,2024-11-21T08:05:42.310000 -CVE-2023-33553,0,1,100e48dbe8dcd919ffada509e862616914253c61bf4e10f091c0f3eae04e1bbc,2025-01-07T15:15:08.367000 -CVE-2023-33556,0,1,296f7cfa4be2684388b87c0d047b815a94475706490d2524330b63115be6fe38,2025-01-07T15:15:08.523000 +CVE-2023-33553,0,0,100e48dbe8dcd919ffada509e862616914253c61bf4e10f091c0f3eae04e1bbc,2025-01-07T15:15:08.367000 +CVE-2023-33556,0,0,296f7cfa4be2684388b87c0d047b815a94475706490d2524330b63115be6fe38,2025-01-07T15:15:08.523000 CVE-2023-33557,0,0,cc03734a1aa1840f74f9352ffd50d3d02541603dee095c93032d40edd69bf2c3,2025-01-06T18:15:15.217000 CVE-2023-33558,0,0,b7fdfe8e2f5f7ef9885330921ddc07a85ad745f4e7ac06e0631fdd030c9d0f58,2024-11-21T08:05:42.920000 CVE-2023-33559,0,0,fc3f3f42dddfccb0ab6605167a971e0c19be007ce1b19ab51ab90f1e64cff7d5,2024-11-21T08:05:43.100000 @@ -226118,8 +226118,8 @@ CVE-2023-33591,0,0,ff986afc0316a9e18af2b67e930a74090c24895de581e443e4716ade8f286 CVE-2023-33592,0,0,8922d2c6a40eff40aef481311ec4cf8aae1ed6d293035442c831315c238899fb,2024-11-21T08:05:45.073000 CVE-2023-33595,0,0,1bfc607aeb14ad4037561ccdc7e1d651e1c4e212d60ea37d1fe5cb863b850c2c,2024-11-21T08:05:45.207000 CVE-2023-33599,0,0,55db37be74a013892d3fb1b0b959784c91c13cb15114f0eb3da8abcea57b2b27,2024-11-21T08:05:45.340000 -CVE-2023-33601,0,1,083f601d16fc0c97e32a1d9a35e9fc894753c7797215ae07c91ec9209ba10419,2025-01-07T15:15:08.683000 -CVE-2023-33604,0,1,9226692a3dd315a1017ff5ed1441afdde1ea9512e7a0c2d0d0e313e5471408b4,2025-01-07T15:15:08.840000 +CVE-2023-33601,0,0,083f601d16fc0c97e32a1d9a35e9fc894753c7797215ae07c91ec9209ba10419,2025-01-07T15:15:08.683000 +CVE-2023-33604,0,0,9226692a3dd315a1017ff5ed1441afdde1ea9512e7a0c2d0d0e313e5471408b4,2025-01-07T15:15:08.840000 CVE-2023-3361,0,0,9ebef56d12e80daf97a750299f08bde92471b07cbe9f6a4eb2f93a79cb7a07a2,2024-11-21T08:17:05.957000 CVE-2023-33613,0,0,d31ff0ae7b47563662632adcd8b48a93c5fd23279ad6dd401f2b3d9233df15bc,2024-11-21T08:05:45.750000 CVE-2023-33617,0,0,cdd85c4f3a32f88b6ddbe476650229c42a93db6627fcd104ee4ed51cbc91add9,2024-11-21T08:05:45.893000 @@ -226229,7 +226229,7 @@ CVE-2023-33778,0,0,a42a0c1ec1262b6938bad9833717ee5df22f921f3c2249d491299db7d9b42 CVE-2023-33779,0,0,1eb55c2bfcdb14a79b3fd3b01e17b005110092a805fd4ef937e8dad4263f6c70,2024-11-21T08:05:59.100000 CVE-2023-3378,0,0,b0837eae984d75a22386db3789972e8c74c698027c143f4d7579a37ec8c86ee2,2023-11-07T04:18:37.350000 CVE-2023-33780,0,0,9ae1d559f1968f9d1c9b4ea057170a356d47e42b68a94bb638f2d18fa1a6a09f,2024-11-21T08:05:59.243000 -CVE-2023-33781,0,1,c90d3f3e88fc22ed2c2116e02df4f6097f4d0f53cc84aa386821b9da17b0bf0a,2025-01-07T15:15:09.010000 +CVE-2023-33781,0,0,c90d3f3e88fc22ed2c2116e02df4f6097f4d0f53cc84aa386821b9da17b0bf0a,2025-01-07T15:15:09.010000 CVE-2023-33782,0,0,7113ddd4c34555a3f3c6eb824db06cb3a795e9dfcb0ec4ed13c5bc2328a8b8ae,2025-01-06T21:15:11.420000 CVE-2023-33785,0,0,9c7ec92d4a5d0a7399391c5080a052fcbd29a0f4edc35f1cf7df2fe324674784,2024-11-21T08:05:59.697000 CVE-2023-33786,0,0,47b4a818f4852512dedbd0ed4174db94426bfbe71bb01a9a604089696e58ed83,2024-11-21T08:05:59.840000 @@ -226283,7 +226283,7 @@ CVE-2023-3386,0,0,d30955c349e34a557fc3604c8361d5876aa81b368c9209af3e63334e0abe2a CVE-2023-33860,0,0,e017fbdba9558f00704985467fbde4b07f66309a8eaddc6d0377f397c304755f,2024-11-21T08:06:05.317000 CVE-2023-33863,0,0,fd4de3cd204ecd9abde1ab83a4548dd63ee41b30d6ee69afbfb6ee012922f30f,2024-11-21T08:06:05.450000 CVE-2023-33864,0,0,3b7d281acce4d93babd99bc9e0a9e089bae23d3b36fb18770832c44296dfe6fa,2024-11-21T08:06:05.600000 -CVE-2023-33865,0,1,591f9efdebada9c214b8e020ad4d4a40ea13edda60a879949af086ed7a44751d,2025-01-07T16:15:31.647000 +CVE-2023-33865,0,0,591f9efdebada9c214b8e020ad4d4a40ea13edda60a879949af086ed7a44751d,2025-01-07T16:15:31.647000 CVE-2023-33866,0,0,53d4f76ee94f995d0e197f13a803b8e21e4131a9ec8c445c7c4748c9b252e41c,2024-11-21T08:06:05.900000 CVE-2023-33867,0,0,98339c98bcebc4a0583c8f1275d8bbeb85001b283b4aa10d817a65e0b7c91382,2024-11-21T08:06:06.030000 CVE-2023-33868,0,0,e24a1154738a185102ea2e84d77190f97c9ca31bac268c2b85291c46052f93b0,2024-11-21T08:06:06.163000 @@ -230168,8 +230168,8 @@ CVE-2023-38941,0,0,f42f2dd234548ad3bcfc87ebbb40bb1737da50e91b3d54994b775a6e31240 CVE-2023-38942,0,0,82aee0951d543d730982b7bc343b25fa2f97d6709e4b9187b4aac5e20178cbe5,2024-11-21T08:14:29.713000 CVE-2023-38943,0,0,e695fcf2ae5d518077dea7995f85cff2c02d0b248aadd31a7a9abfe0adbfadd7,2024-11-21T08:14:29.850000 CVE-2023-38944,0,0,d49d604e9fb29439b39f01f4ddda0ad5f164f7103a704a0a4ba2af50691bb1a5,2025-01-03T20:12:34.917000 -CVE-2023-38945,0,1,896d887bc64789cb4c29982bc567b80505440c14b0aa9992e49a07caf6901286,2025-01-07T15:14:46.853000 -CVE-2023-38946,0,1,f2edf9352f8495b3ca5311cea746301b6200567518be1e6d5e0353690d9a43b3,2025-01-07T15:16:04.743000 +CVE-2023-38945,0,0,896d887bc64789cb4c29982bc567b80505440c14b0aa9992e49a07caf6901286,2025-01-07T15:14:46.853000 +CVE-2023-38946,0,0,f2edf9352f8495b3ca5311cea746301b6200567518be1e6d5e0353690d9a43b3,2025-01-07T15:16:04.743000 CVE-2023-38947,0,0,4b170c719db2192efd9102401f3f6cc979e345599bd9ddb234da0273152742ba,2024-11-21T08:14:30.630000 CVE-2023-38948,0,0,7f9a4531f6471458e67c1014544195b67754e27b0669a00f971903e09a3b5f0d,2024-11-21T08:14:30.857000 CVE-2023-38949,0,0,c240796243f9ded0b6052fbc9a21be405bd0ca548837dcc16f4cb50e1af9c800,2024-11-21T08:14:31 @@ -239975,7 +239975,7 @@ CVE-2023-52487,0,0,de51440deae5dacc8c190c40f2337dde434f7fd0e2594ff02b6d5684b9903 CVE-2023-52488,0,0,68738be0d8dede65f330b32169dd66b0b6cfe13f45fb773a272170dda25fe6ce,2024-11-21T08:39:53.130000 CVE-2023-52489,0,0,06ac4268c68ddb320c502594803f5971db0d61ef37b6150af57f566836747b11,2024-11-21T08:39:53.273000 CVE-2023-5249,0,0,66795859b94115699a1a33c2c476e77d83b1313b38a4d4dd71029c0ce4694430,2024-11-21T08:41:22.310000 -CVE-2023-52490,0,1,ac0645c6d93b992f3c60098d66e2a3b8bd3e99c282442be872cc6bbd165e3480,2025-01-07T15:44:33.343000 +CVE-2023-52490,0,0,ac0645c6d93b992f3c60098d66e2a3b8bd3e99c282442be872cc6bbd165e3480,2025-01-07T15:44:33.343000 CVE-2023-52491,0,0,033c3717ec0e3c1ff278f67e39cabcd6c9f75e93df8df5930180e00b807e6f9f,2024-12-12T17:32:00.693000 CVE-2023-52492,0,0,633066263ed0b651947b542854e436bd97416b7d5443fb71ca249df44c30da50,2024-11-21T08:39:53.663000 CVE-2023-52493,0,0,226a91067fa9e733403ac59e421c8bf19e75585ed93a94075b47dc216a3235f1,2024-12-12T15:57:46.703000 @@ -240056,7 +240056,7 @@ CVE-2023-52560,0,0,8101dc5e12b61978499f3c1f952560bbf0c85a42b7e572f0d17179ed35ab4 CVE-2023-52561,0,0,bbc18871877cad65375af08e325f56ae47245e643f99add72f816b7bee748d2b,2024-11-21T08:40:03.893000 CVE-2023-52562,0,0,5a80f3b5bbde94e2506e1411a1c685dcbcc12f061a4accd03162004cc58c21c7,2024-11-21T08:40:04.087000 CVE-2023-52563,0,0,01157a06c1bdeb4c4102bca50ef9a48709c1400e6898d82272f45549e1856933,2024-12-11T15:23:23.317000 -CVE-2023-52564,0,0,8efd6d254cb42cb83746945354c2b6818c569d547491c3c61e2750bb026a8e8a,2024-11-21T08:40:04.327000 +CVE-2023-52564,0,1,368c7f05707add455dbe5f5abcb8ce9056a0b45ef412d168e0c72b5fa5d229e4,2025-01-07T17:34:18.947000 CVE-2023-52565,0,0,573eae026add44222db4dcfafdb299400ef2ab79702c7319794326b052947218,2024-12-11T15:22:29.917000 CVE-2023-52566,0,0,0561ca08823b0139170f0520b6f130894bad2ca52e446eddfcab5d955446225a,2024-11-21T08:40:04.560000 CVE-2023-52567,0,0,18cd831f228d03b1e3290afd2f881bf52bd296c7921d05278f526558565ace57,2024-12-11T16:26:16.023000 @@ -240136,7 +240136,7 @@ CVE-2023-52633,0,0,e8739deede41fefe7edc6a3edd527d9c70f4d242029af9d2cae101e59bc80 CVE-2023-52634,0,0,59679a08c4900558ed995c08015c16e39e692260a153315e40766b571f7d79a8,2024-11-21T08:40:15.037000 CVE-2023-52635,0,0,093e0fcc26e1a4bf8735f14d9a9038fe82684cb0746710b0b9dd63447402f451,2024-11-21T08:40:15.147000 CVE-2023-52636,0,0,7ec22954972ceb2ce23caf808402ae6347cb7dbaabd0bc98a275702228312f3e,2024-11-21T08:40:15.277000 -CVE-2023-52637,0,0,56ddcf3010ed477ffbc690599867e79915ea90e248a4e8882473a544d0e9fa62,2024-11-21T08:40:15.393000 +CVE-2023-52637,0,1,6525471408a491031c4de1ae8f72983964f519e08c54239f19df671c1d6ab72e,2025-01-07T17:22:33.383000 CVE-2023-52638,0,0,c6d956093aab90e17727bec1d09e03b2c3f6f5f0fbd5eeebd240123e9fae6766,2024-11-21T08:40:15.537000 CVE-2023-52639,0,0,b9266e7df56c393cbd7d2f91daa1a5f5d3b49bd1a9fdf904c1c821471c67f58b,2024-11-21T08:40:15.663000 CVE-2023-5264,0,0,3e616cabf1a089b6e6cdd95ca27e570fd2ac3366b640b4e1c4e5769bd4fd0c47,2024-11-21T08:41:24.370000 @@ -240165,8 +240165,8 @@ CVE-2023-5266,0,0,36a025257ca1a5a01d1722477c5cdddc95c4c243398db33d451514cf043d9a CVE-2023-52660,0,0,358e8dc47410610b9f9672166cf82c0f3b48f9a136624210ebe4beaef46e7ab7,2024-11-21T08:40:18.393000 CVE-2023-52661,0,0,0db12b4ae9b466f647d72616423afc1e5dd602ae3df1ae15ad3bd6d59fb9c4be,2024-11-21T08:40:18.493000 CVE-2023-52662,0,0,71b7d56d340dab206fb48342916ff0b200957de03180e9c58fa9a030a0275af4,2024-11-21T08:40:18.603000 -CVE-2023-52663,0,1,aefc7fb34e639ac7685e30d0b290105bfc4363d7a68f57c98b607c4c70ad7ba4,2025-01-07T16:58:24.913000 -CVE-2023-52664,0,1,53dda01e84d35fa34f80702d177af01142220912b2b78efcb2f400625fec3ee0,2025-01-07T17:00:00.897000 +CVE-2023-52663,0,0,aefc7fb34e639ac7685e30d0b290105bfc4363d7a68f57c98b607c4c70ad7ba4,2025-01-07T16:58:24.913000 +CVE-2023-52664,0,0,53dda01e84d35fa34f80702d177af01142220912b2b78efcb2f400625fec3ee0,2025-01-07T17:00:00.897000 CVE-2023-52665,0,0,791f31a412c848c4b6b18dc59ee81ece8b7e34e43416814b97f8d3b507c03dd4,2024-05-21T07:15:08.063000 CVE-2023-52666,0,0,7ef0df6672c0f5762714f0a9e3035a23c9863435e59c0a7d3d97d8876562167e,2024-06-12T09:15:16.760000 CVE-2023-52667,0,0,0505f1d35650169f79911397440e10c3a7f0dc3a68a8ff6a4985e0ea1ab32fc2,2024-11-21T08:40:18.970000 @@ -241416,7 +241416,7 @@ CVE-2023-6322,0,0,d5c869bd35acfde6cf7110d1bc4153435a496bfbdf9c1d3628a98a6f01fcae CVE-2023-6323,0,0,3e99fe9db7b6b54d633f4268a64b0fc6585cbb702703718a2d4c3321e6c9a60e,2024-11-21T08:43:37.493000 CVE-2023-6324,0,0,bebd0cce90083c61e0bdd531be86f95c2246eae82a5bcef3a8a84c129d68148c,2024-11-21T08:43:37.627000 CVE-2023-6325,0,0,e17101d7e855c4f4674887a9fc98e3c8c9faa0a57755c37cf1b80bf7c278189b,2024-11-21T08:43:37.750000 -CVE-2023-6326,0,1,3b19c482d703b72f7f2773ed50202b1b773327d6b76cceeba23b1b47c6c23dbe,2025-01-07T16:35:32.547000 +CVE-2023-6326,0,1,334e197b7eb5ade58bd24c55fbe2967b55abe19c0a21fd69b918be44424b2471,2025-01-07T17:39:16.927000 CVE-2023-6327,0,0,3501e80d5828b88c1388859a9a8f98cdd39d9d123d23b068f0f48068ef35d850,2024-11-21T08:43:38.007000 CVE-2023-6329,0,0,4c2ee01ec4e81d5caa17fabee54fcc52d6be16725c3211c88533d88574dbd9cf,2024-11-21T08:43:38.127000 CVE-2023-6333,0,0,961ff0506817d5b19435905357d5cda18c6d500dab05b45ec6426977d561b32c,2024-11-21T08:43:38.257000 @@ -241465,7 +241465,7 @@ CVE-2023-6378,0,0,76f7c841f67442acf1ca356626d1c1e29040905fb2f472985bb7db6ce6fe73 CVE-2023-6379,0,0,56e43b1d6863cea65350fcd99bdae74a5424c38e5e9804170909e3e2e9aedece,2024-11-21T08:43:44.673000 CVE-2023-6380,0,0,dd8cbae4f4c7c6750547de2a45fef685851c32ee677b163797c886d1edf5c505,2024-11-21T08:43:44.820000 CVE-2023-6381,0,0,ee3ced35aaedcb71670b465138656fc1f3af9cc181ad6962f9cffc9a7f86b5c6,2024-11-21T08:43:44.960000 -CVE-2023-6382,0,1,eafe3a31f33c2bd501743c597775950cfefbce67ffcc860f53932a9242acd44f,2025-01-07T16:37:07.597000 +CVE-2023-6382,0,1,45e895a592b86c31377dbcd30a665edad609e95472ab5c55b6abd3c44ef768d7,2025-01-07T17:39:11.583000 CVE-2023-6383,0,0,59528aa83fcb44c4ddb21de622a524ccd599edf11acdb850f1df2f683548db37,2024-11-21T08:43:45.233000 CVE-2023-6384,0,0,531fd45eb2bfac343d3d0c6d6337e476841abd93ba70599722414ec5ccd5843b,2024-11-21T08:43:45.357000 CVE-2023-6385,0,0,aaefc98730bd631213481acf06dc37b5e840fda532acd38cfd4c3144862e6e8f,2024-11-21T08:43:45.477000 @@ -242817,7 +242817,7 @@ CVE-2024-0607,0,0,7593ab4432ea7553985e7b16ebd4406e544edfa1354f24e856a4b897e755a0 CVE-2024-0608,0,0,364ed7c1816141e08551230deeb225e6f9581f28de27c921e03af6d7943a316a,2024-11-21T08:46:59.527000 CVE-2024-0609,0,0,fe969d910275d5a3a2703bfbabc3af993e9947034bdebc50e55519d8d7cbf919,2024-11-21T08:46:59.647000 CVE-2024-0610,0,0,887040afeacfe3c398060bb033448abdd3d146ff8a900aad2223c9e43bcbaaf4,2024-11-21T08:46:59.760000 -CVE-2024-0611,0,1,618db9e60b15032faee10b841b129b2fc33aef4bb715f366cb4958ea521cafb8,2025-01-07T16:41:54.303000 +CVE-2024-0611,0,1,663347c1724ebcd33ea935e789f8fa6bd6a3de9942c2f6663f2c2af22f7bbc3f,2025-01-07T17:38:50.460000 CVE-2024-0612,0,0,da64d0a677fd45a04382f6cbc2c145ee6f8fef3954e4d1e4ac27b2a8c4b9f266,2024-11-21T08:46:59.997000 CVE-2024-0613,0,0,da8643fc97b531c82d214469e3fab5ad51b81a35aa2fb83e969424e9e3503eb0,2024-11-21T08:47:00.130000 CVE-2024-0614,0,0,8ef2fd0e88a079773d26e3260e074716b398c31bfe09434fb6fc0840a8fda420,2024-11-21T08:47:00.257000 @@ -243191,8 +243191,8 @@ CVE-2024-10008,0,0,430e5c41cd163f95f6d041350798011748203d8006a8933be6815e52fc33e CVE-2024-1001,0,0,140fc173e33ae8fa7b986d187129f7b01af76bf1cd74c6ed57f4103bfb5a0ff3,2024-11-21T08:49:33.840000 CVE-2024-10010,0,0,3c516bdbb96231263dc71a10acb05a3ca22dee1eea755f0c63dcfc8d58f0508f,2024-12-12T16:15:09.483000 CVE-2024-10011,0,0,37a7a2add316aa62fc644e677a8222291d1b4d2f7d89a6ec187d4cc2ee2d4a93,2024-11-06T16:01:39.573000 -CVE-2024-10012,0,1,d10a75ec4724d8f74c105946730627ba41f26c77e16892042087e9ac3b05647b,2025-01-07T15:59:23.043000 -CVE-2024-10013,0,1,329fbb074d0a9c6e588f04324f32210f857340af98d86ed46e47ef2cfe85fd3b,2025-01-07T15:46:38.317000 +CVE-2024-10012,0,0,d10a75ec4724d8f74c105946730627ba41f26c77e16892042087e9ac3b05647b,2025-01-07T15:59:23.043000 +CVE-2024-10013,0,0,329fbb074d0a9c6e588f04324f32210f857340af98d86ed46e47ef2cfe85fd3b,2025-01-07T15:46:38.317000 CVE-2024-10014,0,0,50214c84cef4e2fd21abb109362711999bfa6a60090d35936fd0e9cba0811d5b,2024-10-29T16:58:48.127000 CVE-2024-10015,0,0,217a292c789a9f8ea3b1717a9a4b42a5c13589b9293af6ac699c09a1f0997322,2024-11-18T17:11:17.393000 CVE-2024-10016,0,0,f77f52c803ffaca4f851d3ea7a048b10f89ed8d8abf952ae01a553fb73da8ac4,2024-10-25T12:56:07.750000 @@ -243254,7 +243254,7 @@ CVE-2024-10099,0,0,ff238a91e24fcb0a85fcb34f700c80404c8e345e8e0c333898778e0f4a6cf CVE-2024-1010,0,0,b760c6839f8ba4fc102d84ec8eb422be6a7986ee41491a18032e2ca8b34ccde5,2024-11-21T08:49:35.243000 CVE-2024-10100,0,0,e257ac7ecea7ed9deddddca60657be7d2649829f289e846b06e9d10c365d346b,2024-11-04T19:15:05.297000 CVE-2024-10101,0,0,fec1f0c88678ca99198bb58f95f12b144e2edf82230ea1a8688c401204e642f7,2024-12-20T21:15:06.440000 -CVE-2024-10102,0,0,e633bb19adeec60256d843d80f8603ddd720609a36b1d493798b4b97a59dd6a5,2025-01-07T06:15:13.730000 +CVE-2024-10102,0,1,906252b364857cef0be371ad8a47aa6b14b73ae692c77500512501801da251ca,2025-01-07T17:15:17.017000 CVE-2024-10103,0,0,e854e5edfcf43e70adfea03c62a4fcbb787ffe431d5323bec06ca7656746d9ef,2024-11-19T21:57:32.967000 CVE-2024-10104,0,0,edcf9a609eefa3129230f441c58905f876237c83c0092e5bc98e317fac05c0fd,2024-11-15T19:35:04.683000 CVE-2024-10108,0,0,57e3bdf5c93deb8dbbc7ad9bd9f5c8802e9586c3214ce14e9acc02b653026e84,2024-11-01T12:57:03.417000 @@ -243644,7 +243644,7 @@ CVE-2024-10557,0,0,e65f5d89b91c24f295e5cbd0f813e2ad8ed04df13cf96a919800b770566f3 CVE-2024-10559,0,0,16e3eab9e781d1e16f0d045b8d1d79bfb09e11f3fa816a22b4936c2b8431f9e3,2024-11-01T20:43:41.070000 CVE-2024-1056,0,0,af182e17efd4af1cb9d6458d1d7d67974a36b702d2e517ba61380bf6c671d68a,2024-09-19T22:06:32.340000 CVE-2024-10561,0,0,2bfd240be58df048fbf99413f7d4286366df5405b43b9b75120456be9297f833,2024-11-01T20:42:12.303000 -CVE-2024-10562,0,0,d7c95a3831dfff851e9ee43d43dd6c5ce77c641b46f6a2531ccb0389cbb9078c,2025-01-07T06:15:14.120000 +CVE-2024-10562,0,1,86906989a3e088ebb6be07468d3bc50f1d72791587d96a7ee77dfe424b82a1ff,2025-01-07T17:15:17.290000 CVE-2024-10567,0,0,a04d3f3d999e2b2d50068629e658949590c474642a1d298fb74a13508e02b197,2024-12-04T09:15:04.177000 CVE-2024-10568,0,0,29a6369be6bdec3fac3a49600567225eff324bd19cbe3ade1e99b53075e8cfa9,2024-12-12T16:15:11.250000 CVE-2024-1057,0,0,82d074eff87805c0c8af6f292d67be991df4f6c4e8e298eece318c63dbd97000,2024-11-21T08:49:41.890000 @@ -243959,7 +243959,7 @@ CVE-2024-10934,0,0,6dae70f2d9b047711f71d589675cbcb98ce87c40154b32c6e0f536ad5d783 CVE-2024-10937,0,0,f3549007a000819e9c2b92d84627c6a8f0950225e9fa8a067012e5b6f0eb9781,2024-12-05T09:15:04.377000 CVE-2024-10939,0,0,51b8ed7e89cb6cce38a6a9e5f66ac395ad176f1b332ff5472d247565035a8f52,2024-12-16T19:15:06.400000 CVE-2024-1094,0,0,4f6b2c2580413352eb02acf345a730d51f35d7640cec3afbef03e4f7e048ad8b,2024-11-21T08:49:46.967000 -CVE-2024-10941,0,0,8537f9c00cf4c110fcb746281712b724f0c39f0fcbc376c34101a752ecc9c6fe,2024-11-08T19:01:25.633000 +CVE-2024-10941,0,1,f1593dd3f1ae61836edff1eb2fda5462fb1177e4c99177e785fd0a852d866a3b,2025-01-07T17:08:55.713000 CVE-2024-10943,0,0,26f3128d989fcb7c084f6a2785233e142b456ba7fa2bbfa2225352075f798149,2024-11-13T17:01:58.603000 CVE-2024-10944,0,0,1c0b69d1ba3b87998eabf673d5ce85783b7ff742767256df1f0369b07a97fdcd,2024-11-13T17:01:58.603000 CVE-2024-10945,0,0,eaecb76bb2926a21e85aba18d448e990c084aea718f0f5fbf4d666258d929307,2024-11-13T17:01:58.603000 @@ -244521,7 +244521,7 @@ CVE-2024-11599,0,0,a26c993827526d1af73bfe90f868b9bfb9a722b6b2267b567215827aef919 CVE-2024-1160,0,0,12b04de1fea0a3119efc89b33ba5d2f3d172880f1becfa13297009e56b4efb45,2024-11-21T08:49:55.987000 CVE-2024-11601,0,0,51a555e6d26623f2054da12f000d146e4e1662608f2c3f75f4d4bafe7cada303,2024-11-22T06:15:19.830000 CVE-2024-11605,0,0,60d00021c065e6f38e758db8986f6f41c042a104c692f051aa09c9422ba7d5c1,2024-12-27T19:15:07.253000 -CVE-2024-11606,0,0,8acdf1f93f94dec6f06145e6dbcc04add41c7af3a7c8e9a88142b21b37b1486c,2025-01-07T06:15:14.427000 +CVE-2024-11606,0,1,240bff9d1ed22851171a3934ba81047b46b452a8dbf38cad6a6ba260d59793c6,2025-01-07T17:15:18.253000 CVE-2024-11607,0,0,64db1cb50de786964ba95a2d2de30c3c373b3627734b2fcf18c662efd5d3b19e,2024-12-27T15:15:09.637000 CVE-2024-11608,0,0,8ddbc230a8730b76ffe6955779ba3c4d90ea8f23edd3f564c2db516009c0d0dc,2024-12-09T18:15:22.580000 CVE-2024-1161,0,0,68cc61ca71a85d6059ad02181ec1fb4a89655dbd3db8900d271e7a26ec14fb67,2024-11-21T08:49:56.127000 @@ -244586,7 +244586,7 @@ CVE-2024-11677,0,0,87a6177c5b391fe3e3720d37e67024bea5a041e744a962c7b6d3c8e2d9ea8 CVE-2024-11678,0,0,fce9fb7e025c917df93cde2de1c865701af156abefa3010e32d19624bfee04c2,2024-12-04T20:39:07.400000 CVE-2024-1168,0,0,361fc3dacab1a6af3309993965ec9d946bde5b152da006d3137d0cea2c78645f,2024-11-21T08:49:57.020000 CVE-2024-11680,0,0,413293c09da5679a3e6b3bb9a6bdd26dd9245aca40b801761cabf7d2cf810aa4,2024-12-06T18:42:17.390000 -CVE-2024-11681,1,1,d3f9f5399f018a89696b7dd5177496fdcee19e93f2567f6159786f1fbca01bb6,2025-01-07T16:15:32.097000 +CVE-2024-11681,0,0,d3f9f5399f018a89696b7dd5177496fdcee19e93f2567f6159786f1fbca01bb6,2025-01-07T16:15:32.097000 CVE-2024-11682,0,0,560590a5be0c603e71436f75adade57eb313e8dad3069a7dc031cb3c6f8d4225,2024-12-21T07:15:08.260000 CVE-2024-11683,0,0,c5c34a549f676b6e4bfb5a3fd3e5626bf20a1dd88602d5be54893cdf8cd9f992,2024-12-12T04:15:06.490000 CVE-2024-11684,0,0,12cb277c9205905669ffa100f303ceaebc405f85837f54097728fa8f404b4d50,2024-11-28T09:15:04.793000 @@ -244727,7 +244727,7 @@ CVE-2024-11826,0,0,978742b568a878385fd8a9b641ea4d38722fc9aee92a4048f75713c88b655 CVE-2024-11827,0,0,56fd4585b95b5b001b477bafaf482165d34a68f8e4c23484879244ef8898da04,2024-12-13T12:15:19.050000 CVE-2024-11828,0,0,2182fcc94d5c2924b387611eabcc64629aff0d6ea201e85bc92b19a7228cc503,2024-12-12T21:07:04.270000 CVE-2024-1183,0,0,65ecfa5c3d2b221c19281f6b798c6cc7087d171223e10f3dd191314d09620aec,2024-11-21T08:49:58.950000 -CVE-2024-11832,0,0,5f82d94f034a50b6d5f6fc7fc87ac19a1e7fea9175a10f503e0d504731085280,2024-12-13T09:15:06.113000 +CVE-2024-11832,0,1,7a6414b8a97e02ea73c05598b642d3e1c0cc9c0557b16b568dca85c729ab2498,2025-01-07T18:12:54.040000 CVE-2024-11833,0,0,2f00371e995b5b3574e742c8a1281cd097aa61871ee6812330dd6292e5403d49,2024-12-13T06:15:25.233000 CVE-2024-11834,0,0,124fbdacb7bd4bad593c6266594bab85739315b08458d1106e21c16eada45fb6,2024-12-16T18:15:08.243000 CVE-2024-11835,0,0,5262f682f44a74d58169f278da5e25511d007423370483539a8b966372b21d48,2024-12-13T06:15:25.600000 @@ -245140,6 +245140,8 @@ CVE-2024-12422,0,0,27a2b7b5579aea6b626e898353e29adaf77dce7f7392fa2cdcdfb4f6d5529 CVE-2024-12425,0,0,eea15e7971a0067182f0f87cd0809df360664c0ea5db3b792659192d954300c4,2025-01-07T12:15:24.183000 CVE-2024-12426,0,0,b1768326240a0dd8a6e52437c59b87b6647b9ea2add19ab16c01c997897bb793,2025-01-07T13:15:07.210000 CVE-2024-12428,0,0,0dc42c82097510dcd67ba200f4a63250bd059d1ff61bcff7d39f7b5f34a5af10,2024-12-25T05:15:06.920000 +CVE-2024-12429,1,1,99de63e9af0ae88e6e217f344e187dc7b14d0fe0ccd82d65454e97b04105efab,2025-01-07T17:15:20.527000 +CVE-2024-12430,1,1,d4276ccf8ce8cf1fc6449eee29ff956f270f606dae1ca6365bb2571c495303e4,2025-01-07T17:15:20.703000 CVE-2024-12432,0,0,3d67b932349f6253a91fa970f1501aba586896a462aba17731bbe90a2499433d,2024-12-18T04:15:07.947000 CVE-2024-12435,0,0,0b924907debc21d874056d540a36b4cd28d4a499f8792c113a5d9122f40bd903,2025-01-07T05:15:18.887000 CVE-2024-12437,0,0,6e24f2f4b2ec72fb52a0e054617c7907aded8c9b581797c18ca0d91453127b86,2025-01-07T07:15:27.127000 @@ -245300,7 +245302,7 @@ CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca CVE-2024-12686,0,0,97a8ebdac182b849799b086a05a52b29fdf4a643f18b8c80f4ed8210bf61fbe4,2024-12-18T21:15:08.020000 CVE-2024-12687,0,0,db582e783ba07ea03e34c560f3ce0d9a75e73c080a0914e89215bff58a3d20a7,2024-12-16T20:15:09.777000 CVE-2024-1269,0,0,afe5fa6f2789b35a14da593df22cde42ff88e5a3e5db5d1bb0de9d1e5a1f477a,2024-11-21T08:50:12.253000 -CVE-2024-12692,0,1,8b53a26a0cc42a23dac5c38dee635e34fe5ff00e8738afb8bd1ea85dad7db9e6,2025-01-07T16:15:32.573000 +CVE-2024-12692,0,0,8b53a26a0cc42a23dac5c38dee635e34fe5ff00e8738afb8bd1ea85dad7db9e6,2025-01-07T16:15:32.573000 CVE-2024-12693,0,0,c4f94ffd5f7d3b684a1f1d67fedf841d735528fd88fd85faafce8d3cf44b4de0,2025-01-06T15:15:10.593000 CVE-2024-12694,0,0,9800fbc5ca389434bdda7fa0de83799fcd1088c52cf84f2bdcf95dc149b6c72f,2025-01-03T14:15:23.560000 CVE-2024-12695,0,0,c12cc3a1c005ac4ce33f9efb358fc8de53ca6da21a9008edd22e7d591fcee580,2025-01-06T15:15:10.753000 @@ -245366,11 +245368,11 @@ CVE-2024-12838,0,0,fc3344bbd1594d72170abe3c3de711c6b7f403390fed0595079fc59c585eb CVE-2024-12839,0,0,4b3b3f59193ccbe4e75ecac88630587384ac9969398e35c448d95021f675007c,2024-12-31T02:15:06.110000 CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000 CVE-2024-12840,0,0,e7528a4b68539dcba75aad0835821b79ed34f43bac74e1052c7303bbe2f9c53b,2024-12-20T16:15:23.417000 -CVE-2024-12841,0,0,c738525065181f5fd675eaeda283796811d753e1465fe11eed1df9a607acfd7a,2024-12-20T19:15:06.097000 +CVE-2024-12841,0,1,b9db49232caa7ead1b43768f055f37fd24ff371f1dd2a2733b51461344a5e0ea,2025-01-07T18:58:10.143000 CVE-2024-12842,0,0,fdb5637330c9cf60cacdf27d02f9d4503dc9b60697726cad3b7f383a3475286a,2024-12-24T17:15:08.800000 -CVE-2024-12843,0,0,e0d63d5eaa72fe482e9688112e3425396d4210ce7c52333ca08afb767873f90a,2024-12-20T21:15:07.337000 -CVE-2024-12844,0,0,5c87a9ff55812bd16a6653ca7a057210dd46c019a4746aa2ea360cfc1b225b08,2024-12-20T21:15:07.833000 -CVE-2024-12845,0,0,6db3f79a15d2d76db842fd5e3307555a4b420c54dce4b03038fc42d43c0c515d,2024-12-20T22:15:24.727000 +CVE-2024-12843,0,1,0238e674ff4a2f2823631a9cac361a4395bebdd053f8f32556861c5f8a60563e,2025-01-07T18:56:52.100000 +CVE-2024-12844,0,1,5c0e1e9f12ccd3e7b6409ec6f9fa62b1ac61e24d0cd9ed98d53a582ec95f3c0b,2025-01-07T18:45:15.590000 +CVE-2024-12845,0,1,a476f9ae604ca9ba196326844e481285fd755f33cc18c52bebc4a8c43fca5e80,2025-01-07T18:35:19.607000 CVE-2024-12846,0,0,e4c252bde2ca9af2e00706946ce2eb14da53254be655d485961e368b0c87d8ac,2024-12-21T05:15:07.373000 CVE-2024-12849,0,0,1ec1f74cc5622df60afc70cfedb69ebca5791587da5e6e97ed85991f051e26c4,2025-01-07T06:15:17.607000 CVE-2024-1285,0,0,f377c2065ba4ae04295fe1855da43b832210575f04c4c7725642d3c9965142c4,2024-11-21T08:50:13.903000 @@ -245638,7 +245640,7 @@ CVE-2024-1362,0,0,f040608d8c88b35d1afc5ddb2f1e81b507f9ac1293e908ddfb2e77912f2304 CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000 CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000 CVE-2024-1365,0,0,0f6156fbf2b7d3a217bf5d4ee39b3ca345099663b38e102dcb249b872d4e92ab,2024-11-21T08:50:25.350000 -CVE-2024-1366,0,0,7697ad2f255a31bc33eb4d39d43dd7c6b0f31b1d35a06d0895ccb390655dc375,2024-11-21T08:50:25.473000 +CVE-2024-1366,0,1,41f2af73acb5e76ac7c2022807fff2e016bc9ca7fb30dc8ea18cd52e10cae6bb,2025-01-07T18:21:27.007000 CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000 CVE-2024-1368,0,0,e78cd290aff3eda879ea71814281e9fb9dbaef60630fac7d18ff14dae3d223f0,2024-11-21T08:50:25.737000 CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000 @@ -245649,7 +245651,7 @@ CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000 CVE-2024-1375,0,0,be19da9eb494f4d8787330f2f78fc8aabab79724cc539fca66a358b2ab7e8ba7,2024-11-21T08:50:26.593000 CVE-2024-1376,0,0,34411a3106e4c74f2617f4da0b50ff6e7d812385caea8af0b8361fb64d6e9d04,2024-11-21T08:50:26.737000 -CVE-2024-1377,0,0,38786b9801585ae64369936a2fdfc6245b23525f6dcc84e93bcbee0c6acae2cc,2024-11-21T08:50:26.870000 +CVE-2024-1377,0,1,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000 CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000 CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000 CVE-2024-1380,0,0,5e58429e812779e5b01ebfe83f389083ec54823fd1aa2e429e923f21c4d1de2d,2024-11-21T08:50:27.317000 @@ -245659,7 +245661,7 @@ CVE-2024-1383,0,0,59b5f34a837fb68b850c9929786dc2e35071d4c4d7ba3d2784cb584749f9b1 CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000 CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 -CVE-2024-1387,0,0,af5cd72a70a7c71f1a246ea1c2d945efaa5d1b490d9da8bcf52de16dc762f9fc,2024-11-21T08:50:28.190000 +CVE-2024-1387,0,1,2c2f906637a61e38d38a9b0ca47ff4dc68c131d6fabb5f801315dfb2710ce089,2025-01-07T18:19:26.400000 CVE-2024-1388,0,0,c2b5d2938c277c7664f923040377355501089f9ef5680d3793e69eb817c2e3fe,2024-11-21T08:50:28.327000 CVE-2024-1389,0,0,5873690e0845507df8953cc4f63b4ccd0c40998cbb5a2b9d552ef1fc675e0a5e,2024-11-21T08:50:28.477000 CVE-2024-1390,0,0,37b0dff04be1b8b0f2a887698f2eb84de50a3b7e7acefe6e7e54550c938a7935,2024-11-21T08:50:28.600000 @@ -245720,7 +245722,7 @@ CVE-2024-1445,0,0,0a624acf2f93fcc7458a537b50687e8779f2e95d40ded5926d8cbd4da5fc9d CVE-2024-1446,0,0,bcbd55f0d2c90e85050905640a9752443538e2056a662d31a605b1bda37d17f2,2024-11-21T08:50:36.100000 CVE-2024-1447,0,0,6746acde1301c5825538a1aa38cac61672f524700591a0648dd48779ea53ab7d,2024-11-21T08:50:36.220000 CVE-2024-1448,0,0,907e2cf35615925862c90020c543aac7ee629ef9f57982dfeb1cd4e6b6c53a20,2024-11-21T08:50:36.353000 -CVE-2024-1449,0,1,900313206bc17949c546aa6ae12c1462c25b681680e8883269c8831cf2e12f01,2025-01-07T16:38:28.197000 +CVE-2024-1449,0,1,95a37d5ef698eee492da651c7884d70c40bd960e6512acbe5a06fb32eb9cd083,2025-01-07T17:38:57.307000 CVE-2024-1450,0,0,2c4685806ad094ef0e67bd2000051393b62a0d6ee127f95dcc18abbea7135c6a,2024-11-21T08:50:36.610000 CVE-2024-1451,0,0,b0465625c202e8f09e409320e5302d0e1b7fca565c7881c89608e7a88e11ffcb,2024-11-21T08:50:36.730000 CVE-2024-1452,0,0,0d5ef33ed18cfe6afb9e5ddd11bf0c4f1f56bedc89751ce9b22df72c9a658963,2024-11-21T08:50:36.890000 @@ -245766,7 +245768,7 @@ CVE-2024-1493,0,0,951758bed46ad6e985cb8d3e1e537f9ab8062a6daa78beef2a278abf219ede CVE-2024-1495,0,0,b3d42a19aa1a62facaef98e7f063ab8c0b4a92d4ea0b89ef5f606fcb4257510d,2024-11-21T08:50:42.197000 CVE-2024-1496,0,0,71a5c9ff961f70d5c4e2145e340948010a4486cd14c2a715cb1c9eaa56db410a,2024-11-21T08:50:42.343000 CVE-2024-1497,0,0,135b57c143aea476a4b103b6a41508a0aa39f5d2197178fcea14053e7a1759c8,2024-11-21T08:50:42.460000 -CVE-2024-1498,0,0,9d0c72605be29f2dce9b391cb58f69c036da17e1d9af13adaf7a12a42e753a51,2024-11-21T08:50:42.580000 +CVE-2024-1498,0,1,9cbd92d0f33965fc6126a633cc19db346c78e615eab4dbf18c292d9646196f1d,2025-01-07T18:18:04.250000 CVE-2024-1499,0,0,2fa895202673064cbd35a54445b99c9cb0cf65d5e0d54bc253de6d34157152db,2024-11-21T08:50:42.720000 CVE-2024-1500,0,0,f0baad270213be3a3b3ffd4ce4ec973dd4a0ab50e726cc28eaa12b3ce2c96526,2024-11-21T08:50:42.853000 CVE-2024-1501,0,0,7278cf3016d6e749f83586c857f319c6893ef852e37caa5b00a791eeb8409c93,2024-11-21T08:50:42.983000 @@ -246046,8 +246048,8 @@ CVE-2024-1798,0,0,b61f537a4a5f0f1ad767fda3f9e18af7ae4f05fe2e34299e4b65a55d2e6cec CVE-2024-1799,0,0,4fe6b469e0dfdfa7580497300a6e88df3efeb98aee5b6039e938180c097fa959,2024-11-21T08:51:20.813000 CVE-2024-1800,0,0,609ccad4be046a067cb9addf0ef54625b1b4643940d8030a220b703ae6b9dc5c,2024-11-21T08:51:20.953000 CVE-2024-1801,0,0,e9f9b47468cf706fbc29eb8ac6fb4ba8baeae4bf8a02e4e506b6dfdb3920e727,2024-11-21T08:51:21.110000 -CVE-2024-1802,0,0,cd64225f09b6ae10fc043389fd6f4420381cbfc98d6600a1ba675e45bc69f0ff,2024-11-21T08:51:21.250000 -CVE-2024-1803,0,0,af78940bdc55ab9fc9afc486a0280883adc3590718d97eec61db7b1c8e47c515,2024-11-21T08:51:21.380000 +CVE-2024-1802,0,1,e397e6b7dee998d4237cdf34cb2f4f4f12723d9ff7f8f5340fd21a36dcdd1526,2025-01-07T17:38:34.240000 +CVE-2024-1803,0,1,4dce34fe6e230d1682861cc571df27955adc84c1351e2be9c0fcf45315c51d7b,2025-01-07T17:32:44.720000 CVE-2024-1804,0,0,ac920f0514ab771b01277f413454aa542e7f03ee80e295a638eca8b6dbe9c716,2024-11-21T08:51:21.513000 CVE-2024-1805,0,0,ed10fc350751db7f4a95ffe560e12f60d492aa960fd0952807dc20c063b17638,2024-11-21T08:51:21.657000 CVE-2024-1806,0,0,2284345e421150e9544a2640d57d38c999b0dbb2e8962e2b151c650e594a85a4,2024-11-21T08:51:21.783000 @@ -247363,7 +247365,7 @@ CVE-2024-21276,0,0,b6850299da600e720a89d8789a20e032ce54857ec541fcf3d99d09d3905d1 CVE-2024-21277,0,0,16147e297cc4910256180b0a9846948cf51af4e2c44fbc94f1ce1acb72154c21,2024-10-21T16:06:47.313000 CVE-2024-21278,0,0,35659e753de7236e6d6eda1138a25fd15a28a7b65c4c952f426045d230f80b9b,2024-10-21T16:07:08.597000 CVE-2024-21279,0,0,bd1d4a2a2f889a30ccd6f6427f64ed78f2f81854458ff2aee9d78349f29926b3,2024-10-21T16:08:39.683000 -CVE-2024-2128,0,0,3684d572b55cc040ae046cbd4cd9ecbcab62ce6088494c3436c4652f92695ff7,2024-11-21T09:09:05.360000 +CVE-2024-2128,0,1,8a6a8fb746acb8df8ef680e1be0951d9282ad90e5664d89ded73498bbed63d5e,2025-01-07T17:33:10.987000 CVE-2024-21280,0,0,a8160e2ee62bf3603cc86357a4cb7a85373ff97cfcb4b233ad325224caf738db,2024-10-21T16:08:59.440000 CVE-2024-21281,0,0,10f4b80656d9b6d3b983ed8f9ab8a32c88a5a7bc06f3ea01392d777f34aef604,2024-10-21T16:11:15.620000 CVE-2024-21282,0,0,234b7d728c9353bacd8db074237fbfde690353a059d5384b9e54019db15a9702,2024-10-21T16:12:01.550000 @@ -249826,7 +249828,7 @@ CVE-2024-2464,0,0,a78bc2c9252bb2b47a0187db94331e09b4187899ca4acbfe6bf24a296b8311 CVE-2024-2465,0,0,9dfb9bf3bb865c229fb26bfbcac054e70b393be6dedef67687e11d88a7f9826c,2024-11-21T09:09:48.647000 CVE-2024-2466,0,0,d8b1e64fa1a3eee0ad1e15cc0aedc5c3295d42d00c2d3e960f0a0dd4a6e21d4e,2024-11-21T09:09:48.847000 CVE-2024-2467,0,0,b462667402cedba4caa592ae7c567717067689568689db5eedb10e506ef16a4b,2024-11-21T09:09:49.040000 -CVE-2024-2468,0,0,d4e693c7efbe2fb32c1333fbe18f900639c83af20cf172711559cba0a95fa83b,2024-11-21T09:09:49.177000 +CVE-2024-2468,0,1,ee79c285973462515e70d1cd2da5bd3b8fd4566e8905e23739ea0319c22a0401,2025-01-07T17:38:39.947000 CVE-2024-24680,0,0,474c362fefe258eca65be82ee02746cd95560765418ab406dcac5f7813a26c14,2024-11-21T08:59:29.843000 CVE-2024-24681,0,0,daaafc6083a3baa0f3954624170a5674e6c403704d454c369d62666209a35b0b,2024-11-21T08:59:30.023000 CVE-2024-24683,0,0,8f2ae4428ee5c111dfe0471d0522ee8f0f1aa241441321a4a91466595b31d3c7,2024-11-21T21:15:18.530000 @@ -250151,7 +250153,7 @@ CVE-2024-25030,0,0,3bf7cf36ab25986b6901ce978418ca57d6fa819b3639e450fc36c96ac4859 CVE-2024-25031,0,0,336ae1209bec97edf2f576f0dbcab4e5fecb1cf28a1e1d867216b37694f08f50,2024-11-21T09:00:09.263000 CVE-2024-25035,0,0,b7214df75690f8a2c0cde375218fa064c6af31099cab5de418b369cfbfb53d96,2024-12-11T03:36:11.700000 CVE-2024-25036,0,0,a0130984c78d987e616d5d6732535de3078a91e4d686daa4bfe8d88a169b88cd,2024-12-11T03:35:51.663000 -CVE-2024-25037,1,1,63f6c4cdef62c3fb13494c2a3686a2ddfee00836b96ea06cdbf9ada167ef68b7,2025-01-07T16:15:32.937000 +CVE-2024-25037,0,0,63f6c4cdef62c3fb13494c2a3686a2ddfee00836b96ea06cdbf9ada167ef68b7,2025-01-07T16:15:32.937000 CVE-2024-2504,0,0,f5ba71a497b867559bd1b6db67d9796fbd7c70d2c928d6cdcb40ce2b13ffc17e,2024-11-21T09:09:53.917000 CVE-2024-25041,0,0,c2ef0b11a47c5fcb85869011d777be135ff05637ba0b82b517f0e1a3d01142a3,2024-11-21T09:00:09.433000 CVE-2024-25042,0,0,4d891cf8354bf53aa99ac5cbf11a8eea4fec899c318094b4a81b3f89e31cf294,2024-12-18T17:15:13.057000 @@ -251302,16 +251304,16 @@ CVE-2024-26651,0,0,898711d0c00a026cf190f460e3b24d2751f2699fd4b1b6a25eb50a9711c0c CVE-2024-26652,0,0,105744a3326cfd97769655231f5141eceba4e2c7ae5c2e6279ca9167a71c0f9b,2024-11-21T09:02:46.153000 CVE-2024-26653,0,0,db98f320cff58271fe6aaf7bf6b15792fa97acb1234731d2ecea6f7465086264,2024-11-21T09:02:46.333000 CVE-2024-26654,0,0,073ea408c21c8db50fd749dfd7c5e328ccbb2cec2bdba16431e35630b902ea58,2024-11-21T09:02:46.457000 -CVE-2024-26655,0,0,bc70f32e19c8e9d0f6ae95757054b6e1d24902e61145eb8a94e42c3b275f29dc,2024-11-21T09:02:46.583000 +CVE-2024-26655,0,1,44c6fc1f60aa28c9bb65a03278297b88c473f78c7cccc5d35bc94149a1733e48,2025-01-07T17:19:13.987000 CVE-2024-26656,0,0,87294d191c345c70a4c471a87fe66eabdaba9c1d9c21608ca348166e40c96d44,2024-11-21T09:02:46.717000 -CVE-2024-26657,0,0,49b49fba415997afb311b2def52fb4d6dd126f4877941e4f36ae49f3647b09ec,2024-11-21T09:02:46.837000 +CVE-2024-26657,0,1,5b20f2d67a13488a4561cdf1804b4d16bd412c492c2f8931f4259c8fdab78f08,2025-01-07T17:20:00.840000 CVE-2024-26658,0,0,d8d3bbfb4b8888f4ac28f0fa2f85d0ddd9b9cef8032b00d528a731dbc6177ca2,2024-11-21T09:02:46.957000 CVE-2024-26659,0,0,d1c064e96da1d530f31cb13996b98b6c11a5365d98cf8e2364eb0850bbe23f59,2024-11-21T09:02:47.073000 CVE-2024-2666,0,0,d00adc3e9b1fc0494d98012a351083edb998787519f5e050211ef5544ece12d6,2024-11-21T09:10:14.760000 CVE-2024-26660,0,0,a422396ff04da2dd1fc0fcd251abf1c784b2a21a790731caa445e598fd0e0efd,2024-11-21T09:02:47.193000 CVE-2024-26661,0,0,d45863d2e30232e358edb0d1a1e889067585e710a0e2ee684c544bcee0a67515,2024-11-21T09:02:47.317000 CVE-2024-26662,0,0,a88f4521b9b995afb0e21d9f507fb182180356687597cd7121dd3a6b42115b74,2024-11-21T09:02:47.500000 -CVE-2024-26663,0,0,e366a54f6751ab2c3dc2b31694c8af7b6d2c4a0c577f7d6a2d00ca8cea74151b,2024-11-21T09:02:47.680000 +CVE-2024-26663,0,1,74a791432f5d59cb2bc083592aaf9ae5c64f10e827e4bfdc39da1da462ef98fd,2025-01-07T17:20:30.367000 CVE-2024-26664,0,0,f174ef6695a76159aab69bc64b6113c4071e242e88009058b38ce039df6e0a7f,2024-11-21T09:02:47.807000 CVE-2024-26665,0,0,f4bee053dd0134b062104e2c5f4cfdd25854016f2cf132977a8c9da042ac47a4,2024-11-21T09:02:47.933000 CVE-2024-26666,0,0,f3d57571a156c221255e6ed43ce466550f0474a9e05c86712515e781d1d5dfe2,2024-11-21T09:02:48.060000 @@ -251346,7 +251348,7 @@ CVE-2024-26691,0,0,7878b9be6d1b840ce81b6b9ba5d2bb037a477b0ec0114b4a6fa216b7702e3 CVE-2024-26692,0,0,e7f487356d74c96106975bf2abfe9db6d6da6422f0939133b174aaec264ed9e0,2024-11-21T09:02:51.487000 CVE-2024-26693,0,0,0d216053635f1d975b6125d601423966cfb8e3352e6cb20eea467a9c7f54bfc5,2024-11-21T09:02:51.593000 CVE-2024-26694,0,0,d7de5e117af4733c0f14914e4a566edc0be68c02409aa6c1b8e298297b9e43bd,2024-11-21T09:02:51.727000 -CVE-2024-26695,0,0,b7cb9008080cbf91d93e760a6bac872d3686c461063314acadc62cd6142589a8,2024-11-21T09:02:51.843000 +CVE-2024-26695,0,1,1ae7cd1e1e85f699df2959b2788d7af1c813dbc8bb82849f43b281e54bed1937,2025-01-07T17:27:31.323000 CVE-2024-26696,0,0,265278528371538cc023600a4c7d8dbbc5ef61d12e3796a87a5522e53c60b655,2024-11-21T09:02:51.970000 CVE-2024-26697,0,0,45e5cf8cc205b6572bf2614df87fc02ee354aaf14f2ce522f92421e8870dc643,2024-11-21T09:02:52.090000 CVE-2024-26698,0,0,f3c474569b48f60e66044478a18c11a89915914693da10adf07718688bd99993,2024-11-21T09:02:52.217000 @@ -251376,10 +251378,10 @@ CVE-2024-26719,0,0,49272ffb2292f3d85039eb80d999203cc47568c7ee88d8dd11d75770d1415 CVE-2024-2672,0,0,37c31eab6f5cd3fb8466d604392093c92b8e3eb9dce60eeef838946e4f379074,2024-11-21T09:10:15.560000 CVE-2024-26720,0,0,1ca9f5c1cf45272d711bbb341b9a3a3e8a66cb323b330efba47b2d4d73910e9a,2024-12-19T12:15:06.417000 CVE-2024-26721,0,0,ca9a0496ef9381a3510ada8cf6ba88673a4cc89acefb09f26c80679837546878,2024-11-21T09:02:55.100000 -CVE-2024-26722,0,0,4773cb2a8025f731c87d2e690a4d544f8addd05cda56e3be510b56a59f420e8f,2024-11-21T09:02:55.213000 +CVE-2024-26722,0,1,12d674d56dcf1067f7c24e779fb92b06855d0b7019ccfecfbfdcc292981abf0d,2025-01-07T17:35:32.710000 CVE-2024-26723,0,0,f35d3a0170fc204ff63f3cb0d2c569463d0cc7f7c48d6a9fa170a41519069565,2024-11-21T09:02:55.350000 CVE-2024-26724,0,0,43e9a149198997f589b6cd208e12f3a69d3baa8ce56112adffc81394841c146d,2024-11-21T09:02:55.540000 -CVE-2024-26725,0,0,2a913e31c5d51aff4e0611cb6f29437e3d560c3b8b05c2176917db0adede82ae,2024-11-21T09:02:55.653000 +CVE-2024-26725,0,1,e9fe20a5c5e5470547a40a8d97f1401a07214b8c6c4b76fbce65efa947d2335c,2025-01-07T17:28:15.293000 CVE-2024-26726,0,0,a2e6006099000b7188e7331f1757708510f6f822879749731a4c6d16b7b3a5dc,2024-11-21T09:02:55.767000 CVE-2024-26727,0,0,f9e493a2bebe6568fa8635c090fa7c3e7b404bd3fd35053c77015e7873b7cdd0,2024-11-21T09:02:55.880000 CVE-2024-26728,0,0,338379872f24f5239a89f2a94a5bc497d4b27c1cc10ab739d5f79b5a2f1814b7,2024-11-21T09:02:55.997000 @@ -251394,7 +251396,7 @@ CVE-2024-26735,0,0,23416017cb42c35b17ab61282110d884834e0c54e876d15ce4bdaf6d667bf CVE-2024-26736,0,0,b29129ddb5d3afb3852cff1b0fe131c66351f86286513d203d1c2dae3f9ca5da,2024-11-21T09:02:57.090000 CVE-2024-26737,0,0,03a6f3a24bd6f11bc15a839c4e708d9160bb2b3e53fb885adad418a2aca958d6,2024-11-21T09:02:57.210000 CVE-2024-26738,0,0,70cc2f36f2f1843016c91868853f1d3cb6c904553112ede4ffd2ba15f359199e,2024-11-21T09:02:57.417000 -CVE-2024-26739,0,0,af3d7c44ab5542711c71e8801d07d67cee3de7176005407ffd07277c97fd0ff5,2024-11-21T09:02:57.537000 +CVE-2024-26739,0,1,3e91524254897924d33159faf525041742412059c301b8791dc3047a5453f1e7,2025-01-07T17:28:37.057000 CVE-2024-2674,0,0,8fe3ca5c10cd895f32135cc2d60fd9befe59849157b4cb265f3ba85a4513aee7,2024-11-21T09:10:15.840000 CVE-2024-26740,0,0,5c985b6d9944a225321eb8d8626fe328a08a180b8b9ad6ec1127b25a27e4e7b4,2024-11-21T09:02:57.653000 CVE-2024-26741,0,0,07c5a92acb340b29068c32dceb2487e34761abe12c58d1829d69712440cc0bbc,2024-11-21T09:02:57.780000 @@ -251434,14 +251436,14 @@ CVE-2024-26771,0,0,a2a6303023c74cb42fbdef5b966efd015fb528b251c1def136298d57747b6 CVE-2024-26772,0,0,fe8524e99fc68d449508f3ebfd8f6afb4c482f632501c09f5f84e454baa54b83,2024-11-21T09:03:02.190000 CVE-2024-26773,0,0,7ef5aed49abdb8b41013d862bea1395e73f0e319d07ad740410642ca0777300e,2024-11-21T09:03:02.380000 CVE-2024-26774,0,0,e1b47f609864ec2bf2c985b00a1f42e9a22977ef025fa7997c7afa306e1199e8,2024-11-21T09:03:02.507000 -CVE-2024-26775,0,0,5b329f844b647d7b2744e0b02493ac238c74dc0f4b3c6d7bcb0be6d4bc761527,2024-11-21T09:03:02.633000 +CVE-2024-26775,0,1,285e0acd81a3ae287fc503b023988af78322228ca5a120edc7cd1b3b8dae3d03,2025-01-07T17:29:01.727000 CVE-2024-26776,0,0,df60d24175807dcc1374919feb99e25e818fb7996e5941b5c63c03df3065b99e,2024-11-21T09:03:02.773000 CVE-2024-26777,0,0,8288575773c8b9e98cd7567bfb1c915cea2788a3ad332ac377ebf312fe765642,2024-11-21T09:03:02.893000 CVE-2024-26778,0,0,eaee91601af1eee3696590fba0d785b9e73f9a5f1749926c481404d032d40a2b,2024-11-21T09:03:03.020000 CVE-2024-26779,0,0,d1dc3ab9d0793413ef8d6f7d472f6b251827d39f169d2e3624611da23e742948,2024-11-21T09:03:03.160000 CVE-2024-2678,0,0,3d6cf5e0204c87c83c809f82226365945406dbd96f04189c8b2ae5ffd524f53c,2024-11-21T09:10:16.423000 CVE-2024-26780,0,0,fee0ab2d14222179966bcf01d07c058d2d30ea8f43041aa94eb3ef9c96c6dd91,2024-11-21T09:03:03.370000 -CVE-2024-26781,0,0,c17af58e491ce3f1bc00d1171924bfba25193d7644b19f0343c634c01d16b01d,2024-11-21T09:03:03.490000 +CVE-2024-26781,0,1,8363890f5e40c49be0f36bf4bb23c5384620993df3f14b874ae1a4280c959004,2025-01-07T17:11:31.483000 CVE-2024-26782,0,0,af24b295a2a14dd277c2f640dd98af16a16ba55999c8897c07ee47027ad93a8b,2024-11-21T09:03:03.607000 CVE-2024-26783,0,0,4c88f8a469d8e3fbcff9fc3b4ec47ce374be17421d39b0d3da1148c684918fac,2024-11-21T09:03:03.733000 CVE-2024-26784,0,0,5821b81a5ef90036edef0036b32f90e3136a3fea2205d46ae75dbe8e20d91a20,2024-12-20T13:57:21.897000 @@ -251498,7 +251500,7 @@ CVE-2024-2683,0,0,c666bc0f8d4f99c33749c0e66ad30a4fb205835cded4157d2383c256488564 CVE-2024-26830,0,0,79942d49d5f2eb06b207a086e5327469b8f22e82ed05e882883226083eef8816,2024-11-21T09:03:09.897000 CVE-2024-26831,0,0,6571b4816f74c1ad7263d31c34d0dfe7efca4bf7da100dedb1dd929fef02110e,2024-11-21T09:03:10.007000 CVE-2024-26832,0,0,da5ab4fff5487c0c53535c383641602b746cc9489885d79f6d7318f624e63b23,2024-11-21T09:03:10.120000 -CVE-2024-26833,0,0,e454195b73ac789b12a3638f6d37614a38d66aff89534f4f911ab846ba29886c,2024-11-21T09:03:10.240000 +CVE-2024-26833,0,1,c4f0dbad926b7d1e497c6aa9b916cdcaa43006376781f6fa025095f8fef910c5,2025-01-07T17:12:57.887000 CVE-2024-26834,0,0,1d6da4d5b6be524b82fc21a43631fb0a6b9bcc8ba781b2f3653b35e4f5038e7c,2024-11-21T09:03:10.360000 CVE-2024-26835,0,0,835030cc1d535a21663a5d77b99df1febce90a20bd2caee76203fbcaedc894d1,2024-11-21T09:03:10.480000 CVE-2024-26836,0,0,4ad3e2a9dcf9d2db56d93279f59d5b475a06711095747d2d93b4c8b1a17e4c49,2024-11-21T09:03:10.607000 @@ -251506,7 +251508,7 @@ CVE-2024-26837,0,0,d7cf0d497a1934810d8d36e7cad91f83f8ba7a4fc7f73dc96f665ed0bb4f9 CVE-2024-26838,0,0,4aa246ce2481b80eb12cfbdfe842d038f2f45b2a62604835a6ac9fb8a19802f5,2024-11-21T09:03:10.853000 CVE-2024-26839,0,0,94831cb58e8ca8a43716949ef42ec744b2bef3a31caad721b703815d66491641,2024-11-21T09:03:10.980000 CVE-2024-2684,0,0,2addc2ca38f6caafae58093a53a83a40b02f9350a4d9c9280dc3fac70a7a6d56,2024-11-21T09:10:17.277000 -CVE-2024-26840,0,0,63bd1a29463568778bcd8318d9199f80c7422a1f2827979b0201761d3652c534,2024-11-21T09:03:11.103000 +CVE-2024-26840,0,1,184a6898c218b037239b30da9b8ff36296b7dddccc7007005850bd631f698139,2025-01-07T17:13:19.863000 CVE-2024-26841,0,0,595c74555dc4b25e8ea88566fd859ea64ec149ad165f7c91a511ba37a9b2ffc6,2024-11-21T09:03:11.233000 CVE-2024-26842,0,0,1653d8bc4cb070c12721c1ba13b2bb8c69f00941499be5adac0f3f29549d0106,2024-11-21T09:03:11.357000 CVE-2024-26843,0,0,b9d654eaca8b971ba143f7f4fb87196ce8b745706b2c80bb9e34065be3c35694,2024-11-21T09:03:11.477000 @@ -251528,12 +251530,12 @@ CVE-2024-26857,0,0,17f9879de007a3724949c9b26519f2d2821087aeaa81cfe5596c2e79c9bad CVE-2024-26858,0,0,8ecfbd5757c21058ce63348d67f9ca24ef7a65e27484e67bd18128e756205172,2024-11-21T09:03:13.893000 CVE-2024-26859,0,0,a4f7e7362173c7b06b068dbea1d3bbfc5d46ae62555acd49351b6b77ebd1ce5b,2024-11-21T09:03:14.013000 CVE-2024-2686,0,0,fec0f14b6d657e98130580c8bcb63b2672efadf690146c9437f8751fa56e7fc7,2024-11-21T09:10:17.557000 -CVE-2024-26860,0,0,7d18ddf040637733c0aa7e11e5c56aeeea3688f3b4e6b16b3c3ffb65196ba400,2024-11-21T09:03:14.147000 +CVE-2024-26860,0,1,00d381323672664bc41f4e4cd89b44b51ee6c36af10590042488ae21013d2872,2025-01-07T17:13:52.260000 CVE-2024-26861,0,0,f06c56909e76d83d3acf8485d5478c6ae2d0d83b82e0b9091c4412ec634a0ec7,2024-11-21T09:03:14.277000 CVE-2024-26862,0,0,94216787489441c2b38672b60a8ef4910c5138aedfb248664baddac7173ed4ec,2024-11-21T09:03:14.403000 CVE-2024-26863,0,0,dcfe4cba306f89e0c765144f98bb541f3dc86b1c5194ee5524af0ddd3b3386b6,2024-11-21T09:03:14.533000 CVE-2024-26864,0,0,eb2f6d1cc842168692d58368c5385a125dd9b538c58507cdba23f5736373b299,2024-11-21T09:03:14.663000 -CVE-2024-26865,0,0,a81bc5c1ee31d959463be0f682c6246c7d5b91938e3c2fd646321e66d5687319,2024-11-21T09:03:14.880000 +CVE-2024-26865,0,1,425ec1e666ffd707bf5be9f39ce33453ce0f57a20ff8f1bd74eaf4b15ccb3949,2025-01-07T17:14:10.927000 CVE-2024-26866,0,0,5a4c4e85054f22132b72e870bf4ca5192ad00542c720bff41708d831fa0c657a,2024-11-21T09:03:15 CVE-2024-26867,0,0,f4c3e98cf18f5362ba9d8cbace769954683f72425fbef623fdb1cff3c29bca91,2024-11-21T09:03:15.117000 CVE-2024-26868,0,0,055bdae3e7e29d3f52563d5563ba9980e87a61b4ffd69a55f8c0e79220a94325,2024-11-21T09:03:15.243000 @@ -251549,7 +251551,7 @@ CVE-2024-26876,0,0,cae97524862d4115e788a327d03cf0da2acf0edba8249dc998aedc8a21a3f CVE-2024-26877,0,0,54721b8ba6c7b4d0a18ed9c595e6136296498a569bd20bfeb4ea6cc3920631ea,2024-11-21T09:03:16.520000 CVE-2024-26878,0,0,11ab35a3fb8ca18e8c636a1de49a408c1da401e7928031e6cc0f6285ff8b6bf7,2024-11-21T09:03:16.660000 CVE-2024-26879,0,0,9704d8839b75b0e854eec4c51359697b6a4476f2d785619c7296d3dff7e0f239,2024-11-21T09:03:16.793000 -CVE-2024-2688,0,0,e06fd55a9a898b1566e884e06c4bb5ead92e827564dc87adcc13f51fc08ae312,2024-11-21T09:10:17.823000 +CVE-2024-2688,0,1,93325ede5335c7cfe6caa2a8077a03a339fd6598ac72c158a197fc34644bc992,2025-01-07T17:17:38.673000 CVE-2024-26880,0,0,b775bc30b873c71ce0741bd89eb501a0811ff9c595ceddd964535015994b3d7e,2024-11-21T09:03:16.923000 CVE-2024-26881,0,0,c9147da975715d7d9e15d8a477237dbe48b93c3e840440ef85c748b4931c6aee,2024-11-21T09:03:17.140000 CVE-2024-26882,0,0,bbe489ee29c0a7bd46d4fc46f3291be28306717f3a37638640e3b60d051438f5,2024-12-20T13:15:20.370000 @@ -251557,8 +251559,8 @@ CVE-2024-26883,0,0,d72e5c2a08cc96112a7158053aecf4ca442365affa186e749544aa6413017 CVE-2024-26884,0,0,90485ab2ad08ce5980bd35da2176ba31c8ca763f26d4fd993f1e3d22b12d7886,2024-11-21T09:03:17.677000 CVE-2024-26885,0,0,446267f933cc671c64b57ab46b84d5d9d05b3aa1cddb1f687f50fb09e97e50f3,2024-11-21T09:03:17.910000 CVE-2024-26886,0,0,8af5f83b231347feac992ebb8fd9bbe331d78a4bb3749c39f2345a13f62ebd26,2024-12-04T18:15:13.987000 -CVE-2024-26887,0,0,52b6581d24189a2d81f17e465837a50d9200dc3c5c81175bc39c0e5b7aeff58b,2024-11-21T09:03:18.210000 -CVE-2024-26888,0,1,74846900da7a6f8b09026caa9be4b4eccab844d24d851aaa854a0bea0b7158e6,2025-01-07T16:43:58.107000 +CVE-2024-26887,0,1,3251ccc7a70790e196686afa8951af70ae741b2291763bea2e84a28b5f78b248,2025-01-07T17:14:41.810000 +CVE-2024-26888,0,0,74846900da7a6f8b09026caa9be4b4eccab844d24d851aaa854a0bea0b7158e6,2025-01-07T16:43:58.107000 CVE-2024-26889,0,0,0a87ef24881e5a1013b327bce78ea618038475fe9f273fcf03f83972360f57c1,2024-11-21T09:03:18.463000 CVE-2024-2689,0,0,efd9c698169d4dc6b507d633d5c5bca5635fd88f4fbab04c5f54592266ffc962,2024-11-21T09:10:17.947000 CVE-2024-26890,0,0,d28148780134fe9d4fd26b89472d475a8cd9fd94507e1d0beb5192c2d01a8c30,2024-11-21T09:03:18.677000 @@ -251602,7 +251604,7 @@ CVE-2024-26924,0,0,125a9c401639f41463ac2b44afaf3bb6e4d369d8163f027e1aeeb65e4fd3a CVE-2024-26925,0,0,20888a15d1cf5a1e8e5e70a7116e306e3a92356ef2a117e4a8c708c88ea6472e,2024-11-21T09:03:23.883000 CVE-2024-26926,0,0,1b156d894496658533a56f98b1f816c7f7a219acb93a64935886f571f23e2261,2024-11-21T09:03:24.013000 CVE-2024-26927,0,0,0fecf20cf7794b1af701d3a69af1d6c8a2e09c8b8b3ce436eaea422a6f78c033,2024-11-21T09:03:24.137000 -CVE-2024-26928,0,1,12e429c2f9b4063e83fe9375ac72719500e95092853217831d1e8baf0db3cf10,2025-01-07T16:44:17.763000 +CVE-2024-26928,0,0,12e429c2f9b4063e83fe9375ac72719500e95092853217831d1e8baf0db3cf10,2025-01-07T16:44:17.763000 CVE-2024-26929,0,0,022a77a2924a8c7f211d44200437bd4faa4bef4be671f225beb2a6c72269b938,2025-01-06T17:15:15.537000 CVE-2024-2693,0,0,452ca8cd515c59ca1cd15ca2894e9f69af6463e79c7e90d82b67b288f52c52bd,2024-11-21T09:10:18.520000 CVE-2024-26930,0,0,09db815ac2b49390346c0187e051f7a56a9f41aacd4cd6e8d98f1c9ac24f90d0,2024-11-21T09:03:24.700000 @@ -252374,14 +252376,14 @@ CVE-2024-27853,0,0,72a1ed6ec4d0895fb804921668bc2bff946add21527d9bb528b8f3dbbcdca CVE-2024-27855,0,0,7b61a08acfa4129bbd09ca95b2fbbadadedd2683e38c872f9104fbd486556985,2024-11-21T09:05:17.320000 CVE-2024-27857,0,0,50c74cada9fa0a92498be7b0ed6d9257c0a8cdcb5b5d97a471df147f46938208,2024-11-21T09:05:17.540000 CVE-2024-27858,0,0,aa4ac34917fc25a3b363315db7cb3fffd219145d245e40c2d78d17a7bcb483bf,2024-09-23T19:56:28.840000 -CVE-2024-2786,0,0,465f59062e983d0de9f13e77b135499356b2ad4d8a9797f02164c9ebf9174c41,2024-11-21T09:10:30.913000 +CVE-2024-2786,0,1,22e7aa45cb0e7749183823d317f8f7b810ca18197f71a7cb7903a7f8a0a36e07,2025-01-07T18:17:10.187000 CVE-2024-27860,0,0,573c398bb03b5382369ac69cc1d55fcdcd51ef33a018d7ec6bcd579bee759306,2024-09-23T19:10:07.350000 CVE-2024-27861,0,0,44687bbf9414155e406d842a229f671ff45e5709268fc42f7e0846677b06e6c3,2024-10-10T13:13:53.450000 CVE-2024-27862,0,0,1879dd3c7b86226e41db14689055cbd9455607ed315179a7b729f6913bf91dce,2024-12-10T15:00:16.310000 CVE-2024-27863,0,0,bc20f934200c90ab71177ba452dea8ed95327208c78d45ff56560458c5cbbb31,2024-11-21T09:05:18.200000 CVE-2024-27867,0,0,9d8a031b2bac38a4828644f9e0ea14edefe724dd0e937c81c7aeb7d5722cc9e9,2024-12-10T14:42:58.173000 CVE-2024-27869,0,0,442e73dd0d7130124e1f9354705c039a9fb91c795afa462c9d6d657225ed2617,2024-12-12T20:08:50.837000 -CVE-2024-2787,0,0,c6ee0a0ef07bb5f9f8c230e62700bfe657cf67b51bc35284f46647b4239f368c,2024-11-21T09:10:31.060000 +CVE-2024-2787,0,1,a9d2b0e64e8db9f6d5ae7fa6b26a749dc3bd0bc8bb2de2e45246495b4bf79be4,2025-01-07T18:16:22.477000 CVE-2024-27871,0,0,970b05cbe9294bb0a3bb5c093d25c78edda1afa20430c21070839e14a02f2ee6,2024-11-21T09:05:18.840000 CVE-2024-27872,0,0,b43781852f09d2090c80445aa16b248a0d29720fdc116e2bbdd0dbeeaf3a4b38,2024-11-21T09:05:18.997000 CVE-2024-27873,0,0,af19869e49617cb610d7eea767fce4e92f7dda25373d3488798e008324fbdd2a,2024-11-21T09:05:19.140000 @@ -252391,7 +252393,7 @@ CVE-2024-27876,0,0,b7f87bbaa63f346af2d221b267fbf1fa56201cd4b9f728c4e431ba1212de0 CVE-2024-27877,0,0,45be2b5613afa9ae468b6af267aa93bdc0afba5faea5f453002cf918f675cc6d,2024-11-21T09:05:19.787000 CVE-2024-27878,0,0,fac979f4951af3bc569c5e2412a5795638ccc7a547e74adca11fe4da6c646d26,2024-12-10T15:14:11.670000 CVE-2024-27879,0,0,bda89f2508278a583c21b1b1e13bd397a1c4dc019b4ff5c383bd10e63f1c4a74,2024-12-12T16:07:08.427000 -CVE-2024-2788,0,0,f3853273bf7a198827f84b5d0c66cfdaa94ddc2c815515ef6b33ee6adefb37e4,2024-11-21T09:10:31.203000 +CVE-2024-2788,0,1,99848bdfdad8a8f01266ef99c4952ca602ca8e09cb7215188fa7f52761bd3dba,2025-01-07T18:15:21.890000 CVE-2024-27880,0,0,773a386792ad07328a7a0448d54c6ad89345135e04a61568c7b277c03fab901e,2024-09-24T16:34:04.597000 CVE-2024-27881,0,0,3db1c1b42fc709e1d85fa27d3684b72f5a7511052e075845a29b9197854132e8,2024-11-21T09:05:20.400000 CVE-2024-27882,0,0,de1636067606d8abea05b2d623862645d7430157a629cccf883a6c28832f50bb,2024-11-21T09:05:20.550000 @@ -252402,7 +252404,7 @@ CVE-2024-27886,0,0,3c715f8c52f1864ddda85ca53b2b16f09102ef3c94476f9d4abb350858861 CVE-2024-27887,0,0,27c7d91a187938663d4a01d4c87033037d24e5ace0c9df0921f49ee73def6186,2024-11-21T09:05:21.357000 CVE-2024-27888,0,0,cd0431e20853cd52fac0840f748f121c2c1ffdab2233c1cee21b2fe50a5a00fd,2024-12-10T14:51:04.667000 CVE-2024-27889,0,0,9baa87884a3e66fc5756c9ced2a8ef947001f8941593056f52c6dadb55724bf9,2024-11-21T09:05:21.780000 -CVE-2024-2789,0,0,be9a0fe704b4e7e250cdad0636f7f24b2d52ae163d229e7b6b42f2754560cf46,2024-11-21T09:10:31.330000 +CVE-2024-2789,0,1,b1690b1b83fedf5140ce93f0eda4241364d6c80c52f2ee1616fa1c36870eb1b9,2025-01-07T18:14:48.107000 CVE-2024-27894,0,0,a529ce9447bf5cccdc79592c335a904880367559eca12c605a0c1c557584b199,2024-11-21T09:05:21.910000 CVE-2024-27895,0,0,d55175960df25787806e528bf2b5b0b690105cc86f51c145001c192d4b0382fc,2024-12-09T17:59:55 CVE-2024-27896,0,0,cefb57e4fd2360f9ca76121f5d55c0879f2b9778073436f6d450ff9f01865a42,2024-11-29T15:15:16.833000 @@ -252701,7 +252703,7 @@ CVE-2024-28193,0,0,7ef66a28dd1ff57f0c0b025e8167ec6baa56982b11f2bb9d0c45c5587f2e1 CVE-2024-28194,0,0,919f980bb3d86b49fd10405531eb8e0036001d5d3499843f594d6737b1cc5add,2024-11-21T09:06:00.183000 CVE-2024-28195,0,0,1c8cd56ede5413ee2e3fc3f8a72d5ad055ccc2245b1d55d162ea0bb57080f1c2,2024-11-21T09:06:00.303000 CVE-2024-28196,0,0,5935adc603506f91db2ad215ee3616bfe048394ec93eefd8b8d42fb8dd2992e8,2024-11-21T09:06:00.430000 -CVE-2024-28197,0,1,1ae2047ecd0c4043e0bdc00ceaccfcd5a2d21148692c0ff8a3261be8b479f2bf,2025-01-07T15:54:40.987000 +CVE-2024-28197,0,0,1ae2047ecd0c4043e0bdc00ceaccfcd5a2d21148692c0ff8a3261be8b479f2bf,2025-01-07T15:54:40.987000 CVE-2024-28198,0,0,761cba225c385d498bdd6fba40bd3dda8cd3d08c2183e5b794fada4afb002ea1,2024-11-21T09:06:00.677000 CVE-2024-28199,0,0,ce7b5d92a4f57c9e2aa64edecef6ee8520d5af49c8b77489080d765a812d8d41,2024-11-21T09:06:00.800000 CVE-2024-2820,0,0,4d0e26921d742b5d6f7e0ce43a1d980380526277b25e57c51d6b025d6bf05566,2024-11-21T09:10:36.203000 @@ -252984,7 +252986,7 @@ CVE-2024-28767,0,0,3dcbbe23de561638ccf8a9738544653a62b61fe75d19cdbb00efaaf18a467 CVE-2024-2877,0,0,e8536f3b9a8db8cfb1a01dc3baa76bd8616106f111c0e4e2021b78fa36854ec8,2024-11-21T09:10:44.020000 CVE-2024-28772,0,0,78e1b65ccd01d2b2cb5151ac2638f146b229ea64b2c3771ff8b54d177679ec5a,2024-11-21T09:06:55.327000 CVE-2024-28775,0,0,6a2db0e9a4b51ca58dc1a2ce04ae9f65cde9a99b61684111bcbdf3398dd02cad,2024-11-21T09:06:55.493000 -CVE-2024-28778,1,1,895e2a4d65da3d78cd823f5e1437f8049521f3de18986a05a966b6187269bac0,2025-01-07T16:15:33.113000 +CVE-2024-28778,0,0,895e2a4d65da3d78cd823f5e1437f8049521f3de18986a05a966b6187269bac0,2025-01-07T16:15:33.113000 CVE-2024-28781,0,0,86f3b30ca9d39b2bf52a47caeda684702c3ae5f69d11221a2c8e7af407228220,2024-11-21T09:06:55.643000 CVE-2024-28782,0,0,3827c4b953b1c26f26179fc828e8b34b71d580a39e37d458a5957d5222c3b151,2024-11-21T09:06:55.783000 CVE-2024-28784,0,0,31a16452abfdc2ff65c4b937882456f9364f61d12d2099ccb8cc285baa43f061,2024-11-21T09:06:55.913000 @@ -255073,7 +255075,7 @@ CVE-2024-31452,0,0,5cdafef5c78e09ffca3c98f889487c5ec92d0c08a681ca2ac3a4058828c15 CVE-2024-31453,0,0,b6c3a6e04c34279599464a5b1034ab954b144d546b1c7a6dd30ea6f033341e15,2024-11-21T09:13:33.070000 CVE-2024-31454,0,0,eeb3af91d04a4e06c485cdbd46bbe0f563c4f3a8310390a192ea57d6116c0739,2024-11-21T09:13:33.200000 CVE-2024-31455,0,0,edba5197d4b290cc9185f10d89d5349716bae6b04d956f46193540522ac4de65,2024-11-21T09:13:33.317000 -CVE-2024-31456,0,1,cc0ebc549412cae09a060830a9cb2cf999f8a86a823dbb12d2b962b4a6203e97,2025-01-07T16:49:45.263000 +CVE-2024-31456,0,0,cc0ebc549412cae09a060830a9cb2cf999f8a86a823dbb12d2b962b4a6203e97,2025-01-07T16:49:45.263000 CVE-2024-31457,0,0,7496b235da2a8f649f51f4c05bcb0a1fc7ccf63d38289c9f137e2e2c5f70e2a3,2024-11-21T09:13:33.593000 CVE-2024-31458,0,0,f1203e2c3a46f7be642b13c51e7dd5168879adfb2fe09654c2cb338e1e72a5b8,2024-12-18T20:47:06.343000 CVE-2024-31459,0,0,1536d88df9c977acdfaeb9e560565850a2e9d806cdd7736d9c16cf9832c335ff,2024-12-18T20:49:57.357000 @@ -255672,7 +255674,7 @@ CVE-2024-32436,0,0,8044c0c5b62c21784c9be3ff2584e84967c0fc4799922a4b88f20967f655f CVE-2024-32437,0,0,d05903855c587c292c85c78b75946393cda7036314c94e6821d51e129a961c5a,2024-11-21T09:14:54.840000 CVE-2024-32438,0,0,d0711a398346831e0dd5d3ec69fb8abdf7ce375a1ae62c39010f9c8e3f6af0c6,2024-11-21T09:14:54.963000 CVE-2024-32439,0,0,c93c080c6bd5fc3ef9b3ca4a61b63c4854c9d41dc3c9c6b474fd9a6612e68c39,2024-11-21T09:14:55.083000 -CVE-2024-3244,0,0,992bef206ded05149f715b14609dc73ff3c53cae5e289a8ea79638c20a90045e,2024-11-21T09:29:13.950000 +CVE-2024-3244,0,1,311a2cc00d878685a21f9685aa33084048a4139ba8bee33269230ac560a119f0,2025-01-07T17:30:57.407000 CVE-2024-32440,0,0,ff692b0a03343db90397eb6708f375d84b1a73aa375b364b5835f0fc5827cb9c,2024-11-21T09:14:55.203000 CVE-2024-32441,0,0,4076910d07bed6b9d4cefc87b1b3b985bf388543de2a958314810cfc90e9db68,2024-11-21T09:14:55.347000 CVE-2024-32442,0,0,b3bd042a059c591a9c5317d648cb230e56fc61c0307716f4a68b451a9e9442b8,2024-11-21T09:14:55.470000 @@ -255682,7 +255684,7 @@ CVE-2024-32446,0,0,e0b8fe279543f93f30ff2ead222ea7474b722775a50599de0315253d16f21 CVE-2024-32447,0,0,65c51e9023978c817b34ba31aaf082a8856bbb640be2f26d8ea45768a8563819,2024-11-21T09:14:55.950000 CVE-2024-32448,0,0,c2644cb8f0998390394c33d13a3d7beba4b081dfedbf6e9bfc713e69552652b9,2024-11-21T09:14:56.090000 CVE-2024-32449,0,0,bd5d85974402150461e58910ebfab5b122d57f593f720174e815ec37028208dd,2024-11-21T09:14:56.233000 -CVE-2024-3245,0,0,4c5f18539990920cf90657c510f38be0c812a2e8244dc55c126895b5f3e9035d,2024-11-21T09:29:14.063000 +CVE-2024-3245,0,1,13439254b9aa1780516c922ba7947eb1765f94dce5c9fa16d65d774cb283be2b,2025-01-07T17:31:35.253000 CVE-2024-32450,0,0,f5005384c792b1c96118a2689a658572d0a8948ee2989070808948c600f247ad,2024-11-21T09:14:56.350000 CVE-2024-32451,0,0,4942328953ae20d3e887165021341c7f33db7bc463a4bd0beabb60de895ec09d,2024-11-21T09:14:56.477000 CVE-2024-32452,0,0,aac4cde9be434a15a3c8880e6d658feca99b75b72025c37dbb742996431a40b9,2024-11-21T09:14:56.590000 @@ -257981,7 +257983,7 @@ CVE-2024-3548,0,0,64d728af28809c7e405f88cc2b9445430ea7fcba331c3ebc611e9b0849f0df CVE-2024-3549,0,0,fa4e42792b87ad0d0a8c4b5d8e7f55d9a4bcf88d4b080da714fb25722a9b01a9,2024-11-21T09:29:51.313000 CVE-2024-35492,0,0,95f9a6ef68591f2158df514fa0b56c27d61acfc840f920f18bc3599e42cac680,2024-11-21T09:20:21.520000 CVE-2024-35495,0,0,390f47c2cbce25898044aeb7d1d5f69964e2bab36870c263144336aca99b03e9,2024-10-30T15:35:10.887000 -CVE-2024-35498,0,1,bb1d6dc6adc06319174305aec52a77d02e9248270cdfbb5d04470bef2b3a6d9f,2025-01-07T16:15:33.277000 +CVE-2024-35498,0,0,bb1d6dc6adc06319174305aec52a77d02e9248270cdfbb5d04470bef2b3a6d9f,2025-01-07T16:15:33.277000 CVE-2024-3550,0,0,c0d4daea2f4c6dc96445348b84c055a461e0c57276f8a5b6076f02f996d10f65,2024-11-21T09:29:51.433000 CVE-2024-35504,0,0,f66769e4b1ea57e9ac1b3b58572543a71ffffdd53e99eaa814d248b36957d3ee,2024-11-21T09:20:21.907000 CVE-2024-3551,0,0,6dfb995a287494b771bad4f867f53bea4aed5291629de60ee9f068404e24e321,2024-11-21T09:29:51.557000 @@ -258318,7 +258320,7 @@ CVE-2024-3588,0,0,7be7e614119cd5fbb1f3a298b06ce732e361051683f92378493b101e5e6399 CVE-2024-35880,0,0,0a8170c333bf0261ae5c11c5ca251ddcbdefcd4ec60fc42a1fc39d0b77cf4726,2024-11-21T09:21:07.003000 CVE-2024-35881,0,0,18e9986624075074b5c849b71ec06ec755a0f3690c4e0f6ce9952cc43be815f1,2024-05-23T14:15:09.927000 CVE-2024-35882,0,0,7ec639f047f7410e2c5657baf945250f55db30bf01eb95dc9a5aaa6c9c89399d,2024-11-21T09:21:07.143000 -CVE-2024-35883,0,0,2618fdd68cc8147790d73f78271969ed43431ac98584198a411ad99713474b4f,2024-11-21T09:21:07.260000 +CVE-2024-35883,0,1,a2b640dcae8368f24ce720903948a3e556cd46de40ac218e93d27b39b31c98c6,2025-01-07T17:03:52.937000 CVE-2024-35884,0,0,64236ae9f1f6f6d7559964b4f8856712ac0636f40624bb99449f1adf1f5aae28,2024-11-21T09:21:07.377000 CVE-2024-35885,0,0,5110fe794cf802cea059dbea13c96f04583edc7fc49e6ad2c3915af9534760db,2024-11-21T09:21:07.577000 CVE-2024-35886,0,0,d014f4e1d413232e97df138b468d29fd39a1f27a091442a8720317832bc226fe,2024-11-21T09:21:07.707000 @@ -258708,7 +258710,7 @@ CVE-2024-3628,0,0,d9122ea95c68760f6c82e514b7bf2614f4957fff6146aa16ce6a105c301b1b CVE-2024-36281,0,0,fc8e6e44e243630297f09f054a7c0a2dabfee41c676b2a632e48ca708c74a3cc,2024-11-21T09:21:59.083000 CVE-2024-36282,0,0,a2590150cfca5dfddf6e889ff7dbd39d67cfcaf459962141a39b085d34dfcd1d,2024-11-15T14:00:09.720000 CVE-2024-36284,0,0,68deabc42822058ffe26432b6898ed761bb9edadc01c7c7df784af68b0c22ce5,2024-11-15T14:00:09.720000 -CVE-2024-36286,0,0,02378f3e3404892979b767ea44786d55f2a920bdc48c0465fab37d6beb247b2a,2024-11-21T09:21:59.400000 +CVE-2024-36286,0,1,bac102403e45fda8132277c6a8c936743611fe7ec3db2c756aa2121a9f9c29ed,2025-01-07T17:08:25.580000 CVE-2024-36287,0,0,454ffb39c6631203600464ecb505365d9728982dd5fbfd6048bea7e40482bfdb,2024-11-21T09:21:59.527000 CVE-2024-36288,0,0,541c28d0151ea2628599b96895a2d3701ce11da4847adc16a1712449dea92513,2024-11-21T09:21:59.667000 CVE-2024-36289,0,0,9a4e2e8c22c877a7229e5ef67cd4e3937f178f5664cb9107f76a5fa80df78b1a,2024-11-21T09:21:59.813000 @@ -259307,9 +259309,9 @@ CVE-2024-37143,0,0,8127203f90cbaf631ca5e4edcfa76ef27898cdc3404b1d360c9412b879452 CVE-2024-37144,0,0,04f6a12bfc2a722c349a8ddf0e2720a19828efd3bd8c4b40c82da7c243ea5dde,2024-12-10T03:15:05.730000 CVE-2024-37145,0,0,603e250630d8db36a65f2b32fc29bd909465783da4a4b9d605a69590653a4715,2024-11-21T09:23:17.597000 CVE-2024-37146,0,0,e821fd740200ae8a142c50ef5c7f6d74765fdc916fffef75517e92f79dcfc790,2024-11-21T09:23:17.743000 -CVE-2024-37147,0,1,f35af8a320b964787a60a6cedf526a4d8c944aa12ade01afe6bca9d7962c0627,2025-01-07T16:55:46.580000 -CVE-2024-37148,0,1,119978faaf5ee714ed0d6a8435f9704a171008d896b47a828f4d298a193b330f,2025-01-07T16:58:37.837000 -CVE-2024-37149,0,0,c274ea93c6cb368788d9ec672d58400bf62a23277c298f2107353bf430814c68,2024-11-21T09:23:18.133000 +CVE-2024-37147,0,0,f35af8a320b964787a60a6cedf526a4d8c944aa12ade01afe6bca9d7962c0627,2025-01-07T16:55:46.580000 +CVE-2024-37148,0,0,119978faaf5ee714ed0d6a8435f9704a171008d896b47a828f4d298a193b330f,2025-01-07T16:58:37.837000 +CVE-2024-37149,0,1,779a428819ac98a5b73820212e0215550d8f842428065c78ef84cc5f004b2696,2025-01-07T17:03:06.697000 CVE-2024-3715,0,0,0450c039825a1ce2a072b18a6e99aee1905c772e46b078169d5726e5daa06deb,2024-11-21T09:30:13.797000 CVE-2024-37150,0,0,6fbd0750471510149d8d52d3af7979836a70620c53cf349ed817d29373cd6232,2024-11-21T09:23:18.263000 CVE-2024-37151,0,0,6d804c1ab226bda9fc58302f18032197919b6c25790fa8bc4361178b805df015,2024-11-21T09:23:18.420000 @@ -259393,7 +259395,7 @@ CVE-2024-37236,0,0,6b4aceadcf374d1b86c6a7bc226f5a79b9a72b11efc590b606e4b50332088 CVE-2024-37237,0,0,409c42035fb47e6e7e5eed9b1c650f7e0a7b7f6ff52e8f2689dabfb454330759,2025-01-02T14:15:06.620000 CVE-2024-37238,0,0,bcc8746969ca9a0c42451be8fd2d790ed2743252626348c4093ffa37b98bdef8,2025-01-02T12:15:18.150000 CVE-2024-37239,0,0,7fcf88c0cdf82bb1d65ccc47c80d93fc90be0316771870c506f509ae04f42183,2024-11-21T09:23:27.450000 -CVE-2024-3724,0,0,27b1cf35253c5c2be7a90d08590ce3b88eb769a4315bdf8272d8eb99efd8d05d,2024-11-21T09:30:15 +CVE-2024-3724,0,1,a9e27fda429bb3ccda0f4b2ef080fcb670bf9ce0114d361e8f17628165007beb,2025-01-07T18:12:54.113000 CVE-2024-37240,0,0,1cbe5d2850f63a31a9803350bd89c7de4f2f8d173b1cc60bbc5680b07a09c090,2025-01-02T12:15:18.283000 CVE-2024-37241,0,0,98b4bf29501ded62e9c2be80f2d2fae8e6b7459c891f345ce10838d1a4338a4d,2025-01-02T14:15:06.773000 CVE-2024-37242,0,0,5134faf8f98234b23a3448c0a1ee7d0c129c512358398e5aa82cee920e4421e3,2025-01-02T12:15:18.443000 @@ -259968,7 +259970,7 @@ CVE-2024-37977,0,0,dee6bfe73c934bbb0e5b355698842fdf9fb96df5529c7a364cc3aa487c852 CVE-2024-37978,0,0,a35234845a6938a1abf05b052966acbc37f365d5f6c31d8ff3bc67e28719cfb1,2024-11-21T09:24:38.520000 CVE-2024-37979,0,0,c6ba0ecb1eb3eefdfedd4ce069487bce354f57d4cdf194b460bb48440d5ec7e1,2024-10-16T17:41:30.850000 CVE-2024-3798,0,0,71a9dca43378fd449ccf2e81ed896c5ddeca8817f8c50de9c1c19dc1d01bef2f,2024-11-21T09:30:25.430000 -CVE-2024-37980,0,1,23bddd4fdfcb08f8468751d9603ec49949acb5b7220390885beab62086789a42,2025-01-07T15:26:25.013000 +CVE-2024-37980,0,0,23bddd4fdfcb08f8468751d9603ec49949acb5b7220390885beab62086789a42,2025-01-07T15:26:25.013000 CVE-2024-37981,0,0,ab863615cd356d38ac272b7b13be943976e6ab71cd6287f89ca57cee781e26f4,2024-11-21T09:24:38.803000 CVE-2024-37982,0,0,aefa2d8036944cda94dc3382341b2a96df015b5b111576af2963b53ef08c7486,2024-10-16T17:43:30.040000 CVE-2024-37983,0,0,0d39229f2985db21e2ab221fc92d1468add3c72c64bc910f5f703d961be44413,2024-10-16T13:15:20.690000 @@ -260579,7 +260581,7 @@ CVE-2024-38621,0,0,2edfcf1f82bf3dfea3755dc1e9ed3fde3ce229f91c9bd1b66b6fe77f3cc33 CVE-2024-38622,0,0,b2e62f946f859fe22fd8fbcd0aeffa1a6dfcdd01e6b66628aa784df475b04635,2024-11-21T09:26:30.653000 CVE-2024-38623,0,0,e3dc8df426a30e14470bfe0b41c8fbf74c4c010c97e3641f7a475eeab3fd19a6,2024-11-21T09:26:30.777000 CVE-2024-38624,0,0,1300e43c985eaaf350de1e71bf2ad3a3d0cbd72b56d2af9065f3dd82a76239fa,2024-11-21T09:26:31 -CVE-2024-38625,0,1,0d78c7e7a82eab79f5bd56766d425b5483e5a3ea8d81f23acbf41ece84573b73,2025-01-07T16:09:49.880000 +CVE-2024-38625,0,0,0d78c7e7a82eab79f5bd56766d425b5483e5a3ea8d81f23acbf41ece84573b73,2025-01-07T16:09:49.880000 CVE-2024-38626,0,0,9dff8e6fc4731654105396cce1c9207718ab0bedf2c7f1f623ccefb5a64f401f,2024-11-21T09:26:31.267000 CVE-2024-38627,0,0,3720cb02d28cbfc603ff9a752e3b01df4699e8e737a2585ba6134a0d17a5914d,2024-11-21T09:26:31.397000 CVE-2024-38628,0,0,d4fdcf9144ee46898dc11363f4021850813c3f0a120b750dfa71c7d8984509cf,2024-11-21T09:26:31.563000 @@ -260834,11 +260836,11 @@ CVE-2024-38894,0,0,8d7c5dfdaba1b46c2336b02e7567c6998411ed85766dd2590e0adda3792ac CVE-2024-38895,0,0,031696391118df2d2cd0870cac0ef5164bfe774f31edce8d9ce148781ece0fd1,2024-11-21T09:26:58.530000 CVE-2024-38896,0,0,1ab09de63110f597d6ddae57bc917df9c10f6e2395a414469c9037df6b83067b,2024-11-21T09:26:58.733000 CVE-2024-38897,0,0,b43024c8c4cd5005ae2c3ac6e382f0314f8925a2efba660eda76a12caae34593,2024-11-21T09:26:58.940000 -CVE-2024-3890,0,0,7dbffb58b952d5d4647fd312eab450fa5abe0243e508d1f8c542f2e7523676f7,2024-11-21T09:30:38.400000 +CVE-2024-3890,0,1,fce70548afac71463049803d99839c76f83c3f99644b737e71452f11bf39c15a,2025-01-07T18:13:29.557000 CVE-2024-38902,0,0,a693326f3cd12e43b2820ef71c94c75ea54ac8c7c4d6238702c99651c6a826b1,2024-11-21T09:26:59.153000 CVE-2024-38903,0,0,5ac36a5d0829f2d9338553ce3926f23b23b26a430d990d436d81e63cebcf3b1a,2024-11-21T09:26:59.357000 CVE-2024-38909,0,0,b15b2d0b578ec22ef9b768dfad1ac7e18a3e7777eb1f844ceb5682377b647733,2024-11-21T09:26:59.560000 -CVE-2024-3891,0,0,12294a474bd8336a1e28ee33a44e19a44d04ebea3018979cba185bcc7b46c203,2024-11-21T09:30:38.523000 +CVE-2024-3891,0,1,4d72bc4ea7906c74fa96e7962b045759b217e44e525621a88b5a5a6135790d8b,2025-01-07T18:11:13.230000 CVE-2024-38910,0,0,d2dff3af8a966f6c22ba1ee4e9572a11e68c5f4930901faf724b461844929ff4,2024-12-06T20:15:26.337000 CVE-2024-3892,0,0,168f6aff52bfffda49f624381b72994cf29f64be38888e2b464dc312a00a3830,2024-11-21T09:30:38.637000 CVE-2024-38920,0,0,b3f18b36d081bdf4f139117e79ad8be02343cb455f4901876d3fc1cdb41ab339,2024-12-06T19:15:11.923000 @@ -261845,7 +261847,7 @@ CVE-2024-40691,0,0,ac3d9a2c16ecf56eb2b1909a87f2673e6fa5961b82ba378fe17aa1da2a76b CVE-2024-40695,0,0,0d717382495ca983a078932b58ed2224b4fa40332fd067474a8fe684c9650d24,2024-12-20T14:15:24.063000 CVE-2024-40697,0,0,9675ffc87015078088b6658ddad78e8bbe317856a9033b7e633b65273e34d419,2024-08-22T13:27:20.743000 CVE-2024-4070,0,0,228e3a9486746eb131dc1faba8cea69af4b69cb949a0fc5caabe789181f2b9b7,2024-11-21T09:42:07.967000 -CVE-2024-40702,1,1,5239865371844f6925e15401b29df86d20860fe463a0a8fc0dd9b286a1223e68,2025-01-07T16:15:33.463000 +CVE-2024-40702,0,0,5239865371844f6925e15401b29df86d20860fe463a0a8fc0dd9b286a1223e68,2025-01-07T16:15:33.463000 CVE-2024-40703,0,0,e703b61d3f8dfe06de226d6f2873ad12453588e6ae0585ecf895673088efbbbb,2024-09-27T16:49:46.177000 CVE-2024-40704,0,0,f1eefecca06d931cc6fa5c315f3cff483d4ea73258582e293da29f36971e3c43,2024-08-15T20:03:13.530000 CVE-2024-40705,0,0,498d1b36f9941cc45abf0a56c450cafece4560bbcc29015fb60565ec3b88fad7,2024-08-15T19:57:34.780000 @@ -261890,6 +261892,9 @@ CVE-2024-40743,0,0,4fd30ab81bc561e1670c5d56491735c591320085c7d82d8aa63eaf16d1b2f CVE-2024-40744,0,0,500374d1b7dcc6ceb47ed346384bf42b0fa553630fa102e80407350b833ddf52,2024-12-05T17:15:11.570000 CVE-2024-40745,0,0,cd13ff95b3dae5558dba4f85299c61c29cfa0dd17dc355a880cf8c9b4262abba,2024-12-04T17:15:14.097000 CVE-2024-40746,0,0,28b5eac0696e1aa464ec2af9223be9793b0cfde2d3c3c98b18ce12186dc2b572,2024-10-29T15:34:22.100000 +CVE-2024-40747,1,1,4ac0d947ad350f4ce82e954feff0a48ad670b67ab2a398cf1268d1edafd92d56,2025-01-07T17:15:23.430000 +CVE-2024-40748,1,1,43a64d8cbf8572aa1b7b31280299908757127830f7f019cd3ef95428b8155e3d,2025-01-07T17:15:23.587000 +CVE-2024-40749,1,1,34a24eba0dfe2b089a8df6e7a53003807eca3d6f36ffe1dc2af0e8f9d193e011,2025-01-07T17:15:23.683000 CVE-2024-4075,0,0,6c653a7c78c4e11129adcbe0518ad6a07843b29f0e234c98fb05402925f6c893,2024-11-21T09:42:08.680000 CVE-2024-40750,0,0,c491090d917045d507fa28976c97558943f972457181ebb36c0ba9aa25c97d61,2024-11-22T19:15:07.113000 CVE-2024-40754,0,0,bd9d6903684af54e3d4f528bdae88b70db33043ddc74f4404f7d893dbc9cb397,2024-09-10T14:35:04.833000 @@ -262081,7 +262086,7 @@ CVE-2024-40959,0,0,0043be57531474631cc6de7737512d2ab0230deb9269189d29b950369a0fd CVE-2024-4096,0,0,8e6356a175cb07c3b5b0cf4903a72e6a9d5834935e926562f58c2a2a95e0bbd4,2024-11-21T09:42:11.190000 CVE-2024-40960,0,0,d1b260bce7a6f4e3918591cefa3fd644d2061253ecfc0dec1722a192d1703af2,2024-11-21T09:31:57.263000 CVE-2024-40961,0,0,c323f131dac03e8f3736a795ce92c772336b6ee895d5ed1507aa424851c01204,2024-11-21T09:31:57.413000 -CVE-2024-40962,0,1,1b32e5be99ff36031e51ef4af62c32f3376ebee25aa8774ef70b4bd4ef137e55,2025-01-07T16:10:10.253000 +CVE-2024-40962,0,0,1b32e5be99ff36031e51ef4af62c32f3376ebee25aa8774ef70b4bd4ef137e55,2025-01-07T16:10:10.253000 CVE-2024-40963,0,0,c843adbb2e11ca70f14a76d9f2283ec92ebfc91029cb9c0ca45fa23dfccbddc3,2024-11-21T09:31:57.677000 CVE-2024-40964,0,0,c910de534f63857a534d4a6d6bc0df1c126902b754988ebd232d1222d98e8703,2024-11-21T09:31:57.803000 CVE-2024-40965,0,0,f8d0a45c787c53552589ec6b6dd6d65da2df46381e3d5301192fc08e266a5574,2024-12-09T13:10:01.363000 @@ -263649,7 +263654,7 @@ CVE-2024-43156,0,0,005c4f5cf5fc0a4447dc62a1e524f20f134286968ad6d64fd8ca0fb1f25cb CVE-2024-43157,0,0,bc959868b43a577c0690ac3e0c69496a2ff7be67cec78982ce41036a907bf849,2024-11-01T20:24:53.730000 CVE-2024-43158,0,0,a715173b9a50c5bb588ab20fec2b2110f5dd34cf2e01c0b0e36aeb5ed60eb345,2024-11-01T20:24:53.730000 CVE-2024-43159,0,0,ae9e74f348520b73e6ec4d2a23f115e06b3d06f51ff875dd40e8b55f38b95abb,2024-11-01T20:24:53.730000 -CVE-2024-4316,0,0,dba3ad7e42dc2c08f2e737b04c8bb461b7387db10499eccc2a9be2abdb66925c,2024-11-21T09:42:36.700000 +CVE-2024-4316,0,1,b7b8a9d4c1356d209feb221abca36a483bd07dece8876de45774f325bd4283b4,2025-01-07T17:30:24.580000 CVE-2024-43160,0,0,6d8c23907ab563c1d34c62fe9a94d2c684992bb4fdeddd474a536a429cb84e49,2024-08-13T12:58:25.437000 CVE-2024-43161,0,0,e6753db1def719f316615c9e382d9045b1cddb091cef48944129f62ec1e48564,2024-08-13T12:58:25.437000 CVE-2024-43162,0,0,3619158fc9cfa6c5c9354252f22998c92ac3e96543b33ccadbaa494b8127f445,2024-11-01T20:24:53.730000 @@ -263893,7 +263898,7 @@ CVE-2024-43412,0,0,6dac6a77e3be815f1d76c1ff9b3afdb81be2b5d5f2d1f92cd48ab3531edb3 CVE-2024-43413,0,0,01dfa26b99ce16e07f34499ba88616d1dbe6920d78f192968d6f4cca109c35b6,2024-09-12T20:18:46.097000 CVE-2024-43414,0,0,1ea8b0ccf66fc760dd73f8c8ea071dcf10b55363a7e852d6fa7fa5a3de61a8a7,2024-09-12T21:33:40.887000 CVE-2024-43415,0,0,5a4e5a3aa10caa0938c29e25e546071550f87b677e0e2bfbe801097e243e3e7c,2024-11-13T19:15:08.580000 -CVE-2024-43416,0,0,af574b3cf34332d6c0ecad7ab35da2f5724c8dce46a430eea7f94dfa27119c2a,2024-11-19T21:57:56.293000 +CVE-2024-43416,0,1,2fc12b328347487003a10a9144d0427da1c43668f15962d7f0305543cbb3040f,2025-01-07T17:05:20.757000 CVE-2024-43417,0,0,a64db853aab641666e5ccd36b5774318b1b87e33ceca621611b145b74c8ae52a,2024-11-20T15:21:07.650000 CVE-2024-43418,0,0,4070430691b02a9c3a3480d7781582dd0e8dd4d964b3db2f1a26ad5f03bae23d,2024-11-20T15:20:43.297000 CVE-2024-4342,0,0,8d784da755496d501879ef5ed907cecaae2d774e059f9862fe8806debc14cd6e,2024-11-21T09:42:39.730000 @@ -263948,7 +263953,7 @@ CVE-2024-43469,0,0,75247ad0690e3ea6ea0a08b9d64faf2b2e5451a936ce8666801ac78b9855e CVE-2024-4347,0,0,914a1499327477b8f0d5c50c90bea6d9fba28df27349659abefe40d9866051aa,2024-11-21T09:42:40.347000 CVE-2024-43470,0,0,9a76034ad627badcc26378fb10d49799f03d939aface9e6b118044400f64ff6e,2024-09-17T17:35:02.157000 CVE-2024-43472,0,0,f8e3c9d6561ac8ce5ee6caae48e1fe73371e9553c9d00583bd608487f652ca9e,2024-08-28T19:13:21.393000 -CVE-2024-43474,0,1,34d0a8030540bbfd63b455373b872bb8de8f8337d541fdec541bcbb4c7793dfc,2025-01-07T15:19:09.057000 +CVE-2024-43474,0,0,34d0a8030540bbfd63b455373b872bb8de8f8337d541fdec541bcbb4c7793dfc,2025-01-07T15:19:09.057000 CVE-2024-43475,0,0,642843020638a34a7bc3bf72ec4bd21d750594153b5913cff49eb86ee294c022,2024-09-13T14:42:52.533000 CVE-2024-43476,0,0,c09b8c55c9964dc9f155766a737473ad6c5f443b790981f8712ada0463e6fd6d,2024-09-13T14:39:20.693000 CVE-2024-43477,0,0,e6cc806f74b6683e07d5bd22159ff78489c4915a4a56167b18f8893a367f7d01,2024-09-10T18:15:13.970000 @@ -264049,7 +264054,7 @@ CVE-2024-43573,0,0,ee49e709e695f77239a94a3a0e4087b726fb4bad2ae8d351b3c5083ef3073 CVE-2024-43574,0,0,b662ed90c3a35ede4ed2374ef29681dd4c1e072b3761f2224f3f3dce9c6e9035,2024-10-17T18:58:37.100000 CVE-2024-43575,0,0,60c3e9995ec678490b587ee560de28a179546f8d9e870a9ab0dd969c53bba224,2024-10-16T21:53:59.407000 CVE-2024-43576,0,0,226ed8f442f81adac9fde327d8e05ef6b12943509a4e7657f1f66a4231834666,2024-10-16T21:54:24.047000 -CVE-2024-43577,0,0,57071e454b0d0d6387ba2a2b42b62d03e909577ea647dd1f992769d9c9386546,2024-10-23T19:15:18.673000 +CVE-2024-43577,0,1,efd0b7f12f1a1e0a2dc8940b892f4cdee42da314932618cf607507c408e2efe1,2025-01-07T17:14:49.983000 CVE-2024-43578,0,0,68de9c2fcd1167d879fdbd4c652aac964c08875cc8742eafc4500af2fb1b4aca,2024-10-18T16:59:29.557000 CVE-2024-43579,0,0,2ce859cd52dc4a97ac81cddf07dd72a9a5c901d7a0d24c1dba0fa40bea4cdd93,2024-10-18T16:54:06.810000 CVE-2024-4358,0,0,d375da0ccda66b536e55f5f5f94ec71dcf0db33fbb63706af62a0cde4ce8d5a2,2024-11-21T09:42:41.593000 @@ -264084,7 +264089,7 @@ CVE-2024-4361,0,0,43aff6787a4479f38b03751f8b309978e2b7bd8011ebcb21afe8f9fe0204fc CVE-2024-43610,0,0,f619f17cece16bd26f46489d2cc5e940ddf35f153fc3baff61d99e73d8015e6f,2024-10-10T12:51:56.987000 CVE-2024-43611,0,0,70068d68bda071c9a5571ee7abb6c83fdd9b870395a94ed7f5071cbbc659a60b,2024-10-22T16:01:19.373000 CVE-2024-43612,0,0,812c826e3c16ba289dfbb62de4b281704dbf93c4d4b0a921ae535f6bffcdffc3,2024-10-21T20:48:02.050000 -CVE-2024-43613,0,1,cc633dda43ef8b13ce69f0ec4a9b365544125d76676b641d4b82c2346a780a25,2025-01-07T16:20:13.437000 +CVE-2024-43613,0,0,cc633dda43ef8b13ce69f0ec4a9b365544125d76676b641d4b82c2346a780a25,2025-01-07T16:20:13.437000 CVE-2024-43614,0,0,c5d2c4e61e699928a9aa80596895800f4eb921603cf99ac879c7ced052428111,2024-10-21T20:50:38.370000 CVE-2024-43615,0,0,a7be6185efd769f927c83d1bcf5f6fbb2f4769f426bd0b8c50fc4d20209f00f6,2024-10-21T21:00:34.967000 CVE-2024-43616,0,0,53854d33ac39e3d7883338ceed28a977b17a47e36ed07fb5aef1617d3c509acc,2024-10-21T20:47:00.313000 @@ -264150,8 +264155,8 @@ CVE-2024-43712,0,0,9ab3fe760e8f19464e8d37dd73b7335ae43d5382e27e4d6ab5795a2dd3e62 CVE-2024-43713,0,0,2351d2ccf5a9bdfa299b6fe1f3d7c7e3a4bbc01a6f8443c4348a36cf5880bc04,2024-12-17T14:55:13.953000 CVE-2024-43714,0,0,73ad98cab774040abdc9b8e9830549831c35b419b45dea5dc85f0b3962eb2d25,2024-12-17T14:55:24.553000 CVE-2024-43715,0,0,4cf84ce10fab9827937044c82277f713ec455de0838fd3078877d96d6d43fbdc,2024-12-17T14:56:06.787000 -CVE-2024-43716,0,0,f90c2b7c357bddfe8d5a74436152e07d34c10373ddacb26f30e6dda4e203b918,2024-12-17T14:58:24.220000 -CVE-2024-43717,0,0,6a66b67dbafdf186ec2cff04181d7c35b20a480e8dd5fa7b5c7ac4986486df38,2024-12-17T14:59:13.620000 +CVE-2024-43716,0,1,009da89de5f3b4e0c48ccbc9f9afebe7de08904ae25d66b77937acd662c2692c,2025-01-07T18:15:17.263000 +CVE-2024-43717,0,1,ccd703987c1f407a30f1019822c53e720743151cc146709c45b7046f3b33f960,2025-01-07T18:15:18.030000 CVE-2024-43718,0,0,394dea2bb63e682641a18a050280c4d9fb559e75c8d8f769c6d9d796d651463e,2024-12-17T14:59:24.850000 CVE-2024-43719,0,0,9e152e2bc11f3e899db10ed56cf0d743ff8e1ac51d28f9bba7748782b337b4ae,2024-12-17T15:23:21.027000 CVE-2024-4372,0,0,80047d29f24899dba9fb9823b96bdeb83dfdd1716f145c555f0448a73bb4cc01,2024-11-21T09:42:43.207000 @@ -264164,10 +264169,10 @@ CVE-2024-43725,0,0,30380d7f2f90fe9234fad10753826883e156b71a37c48fedae6b77ba41a09 CVE-2024-43726,0,0,25e5303aa3d2752d4973cd451cf4740ebcd9f1f02789fc820a4b05c4601e1fbe,2024-12-17T15:23:50.963000 CVE-2024-43727,0,0,6e56c5fd624e3d379d7a3f747e5e59a0ffcf502486e1f94044c9e261f88907bd,2024-12-17T16:08:59.233000 CVE-2024-43728,0,0,c3233a8c789e7819d2c5f63e98573c68412f95bb218cc659cfa54ba5cd1b9f27,2024-12-17T16:08:52.357000 -CVE-2024-43729,0,0,fd16aca5266f26268892610b59b3ce22649a0cc6dd52c18fd369fe8e8746be8f,2024-12-17T16:10:37.357000 +CVE-2024-43729,0,1,7d852ab4c2372e9e77931801c7e93d9de683f3b0ce27b7b6ba1b56ff00068517,2025-01-07T18:15:18.267000 CVE-2024-4373,0,0,90a0bc6a003143c6727c6fb96559f1f531614f51612ca46e3d9865e65abf33ed,2024-11-21T09:42:43.307000 CVE-2024-43730,0,0,511fc38ab1b131240f519e4f5725c0c19c0dc6686d2f45ccf117f360ef4d0ec4,2024-12-17T16:09:14.430000 -CVE-2024-43731,0,0,5c3b5fe66c97a5a6d36076b9f043d86ca4c61e21608b97d83f5065dbede7f9d1,2024-12-17T16:10:11.630000 +CVE-2024-43731,0,1,eb1a58f417189a04539b090c92e9c0f34926f6d0e5467737d804624fcc14cb1a,2025-01-07T18:15:18.403000 CVE-2024-43732,0,0,d6320d07d27825fe26289d95b0ef0809cf1168dcd72804211be7b630d7eb9634,2024-12-17T15:08:29.537000 CVE-2024-43733,0,0,9ad070ad4729a1fff8df43b928e321304ffaa479d4de2f84055ee8022b03111a,2024-12-17T15:08:40.910000 CVE-2024-43734,0,0,ebfd9ee98601f9656f925992a8e0e853e89fded4ec860b392177b953b100cd0a,2024-12-17T15:10:05.660000 @@ -264191,7 +264196,7 @@ CVE-2024-43750,0,0,84861a013c07a536eba3f06c1b09c36a5af56d8913259dd5be0d6c3bb4ce0 CVE-2024-43751,0,0,a350488993c65a864fda41c0cdcd589c92469ad8ac5061ed73a77cc5124a866c,2024-12-17T16:15:49.793000 CVE-2024-43752,0,0,78725707fce29b89535aaa051fd9d1bf7a58d22739ed1f840f25cc25538887c1,2024-12-17T16:15:41.260000 CVE-2024-43754,0,0,04f09243dbb41276e17aaf9f91bbba9c55bd97a5caeca10068df60bba8e0741f,2024-12-17T16:15:30.050000 -CVE-2024-43755,0,0,41c60138af18b7c36fdb420e74f060641494c92de226f501c5d32f4b44381f09,2024-12-17T16:17:28.580000 +CVE-2024-43755,0,1,478380913bd8cdca07355832bb95eb988bf4e0c44806af477f9c965e2e53d97d,2025-01-07T18:15:18.547000 CVE-2024-43756,0,0,574012d52ba61623896d593dde944e97d1e4486f17b00226542a0b61b33f8b0d,2024-09-13T17:00:59.890000 CVE-2024-43758,0,0,0f26a442661cf8c474cf15fed83c27096c39a987496f8728b4b680b80eec825a,2024-09-13T17:27:33.230000 CVE-2024-43759,0,0,4270d1c80d4da61f734b4e2d0cec7cefaa5eece74e1d071a8d6c550e1b8941c2,2024-09-13T17:13:35.427000 @@ -264349,7 +264354,7 @@ CVE-2024-43906,0,0,a11c19379737ca1150a8615b78ff271062afaa51010d3036c3045576af10e CVE-2024-43907,0,0,7312fc518eac8cc6654410140f58643915046ed9250373ecadc251d4785cc8c6,2024-08-27T13:41:40.497000 CVE-2024-43908,0,0,53a4829da8a8a1ad7fa0dc717c980975a2bb5c37e29b8800bdfbda1733423e08,2024-08-27T13:41:55.260000 CVE-2024-43909,0,0,ad74e5431cfb800574a2dd7e0ced34f90848e63e0bbff2558cec0eed3e55119c,2024-08-27T13:41:48.467000 -CVE-2024-4391,0,0,ac3d2205f9c2193e4ff93857932967c98c9a26780df9b93dee31f7f9d9cc1700,2024-11-21T09:42:45.350000 +CVE-2024-4391,0,1,4aa68eb768a7600ba1d511ef94f64977ab4a9f3debf9ac676e99a8182061a2de,2025-01-07T18:09:14.470000 CVE-2024-43910,0,0,f09792e52923a702137c77836c509e81bd123178796b2db869e8028c46dbd737,2024-09-05T18:30:23.437000 CVE-2024-43911,0,0,20c6e5eef3dcc934fa499bebf9dc436656bf40bb76e7e9eefe4334ad2b410795,2024-11-08T16:15:22.483000 CVE-2024-43912,0,0,b045133d294e4fa9817b7cc6e1963575a481178f8d5aa121f3202846d1b4ef09,2024-09-05T18:19:17.067000 @@ -264768,6 +264773,7 @@ CVE-2024-44439,0,0,532d340c7125d38b3791848ed20a07920e65477c51ca4d64efca5629beabb CVE-2024-4444,0,0,feeaffc9146fccf0816d38147af86858ffa3c68d94baf1fab273954d1c7348c4,2024-11-21T09:42:50.610000 CVE-2024-44445,0,0,70e29647242626c5fc3cd02b62378e61567a9538e073b5b0672118158325e4f5,2024-11-21T22:15:07.637000 CVE-2024-4445,0,0,46341af9b6fb502c6f33de80f90e54dcbc98c3195a6f7b6924f2303483fe6e07,2024-11-21T09:42:50.723000 +CVE-2024-44450,1,1,d0bf611f9c2a3e5c81d59ffb7c44fbf18529a784249ffe96ec7e80d2f339a0d4,2025-01-07T18:15:18.693000 CVE-2024-44459,0,0,6692baff458ff714d53ffedc49b8e8781eaf99012cbbded46425655a64ca52e7,2024-10-30T20:35:29.427000 CVE-2024-4446,0,0,a4fc1a809d7fdafb7a075aa0f7592e0b84c47ee34b07d544758f459a4a149dac,2024-11-21T09:42:50.843000 CVE-2024-44460,0,0,9863860565b5b349bc349acea444639a968dc1cc5f314565dcb3e0a824f6c075,2024-10-30T19:35:23.557000 @@ -264830,7 +264836,7 @@ CVE-2024-44683,0,0,4f09b1238998a5a3d9b77f763fcdfbbc3350d7daebe8a7400a76e3f1196f7 CVE-2024-44684,0,0,ca9a79e91bc9d1c7ddd6ceab423f06e6f37813c82b172366e5088549ad184571,2024-09-04T16:42:01.137000 CVE-2024-44685,0,0,138e5ccb6a247889566b2c8e876848883dccce9dffed61342cd752922384a187,2024-09-13T19:35:14.350000 CVE-2024-4469,0,0,2acfa1019c2317d8aef7e399b196bfa2e7b6264982511057658094c0bb63f495,2024-11-21T09:42:53.253000 -CVE-2024-4470,0,1,b60aaeda59de76277dce0e7a4074555a8b3cdd03513201bfb1663044b82b6873,2025-01-07T16:37:44.157000 +CVE-2024-4470,0,1,95a96de7675987e789a46492efc5acc2246ba00fc92f0fc9109c8e99235cd5aa,2025-01-07T17:39:05.017000 CVE-2024-4471,0,0,4180714e8cfa916547c68fea005eda3c94d571b570a4287f33686157acb5dc91,2024-11-21T09:42:53.470000 CVE-2024-44711,0,0,620599d0f9bccc5f0a82e6591e0e72db06771c1ec29da729120ba22a8704288d,2024-10-10T14:15:04.777000 CVE-2024-44716,0,0,bd6eccd7545156f7db9256b8dd3aa49a2749442bd5838e30c17d76677f843c43,2024-09-03T18:32:45.427000 @@ -264865,7 +264871,7 @@ CVE-2024-44776,0,0,4a401f17cb489db8e3a27a309be25f5339458e753f79a473b6f579dab3a5a CVE-2024-44777,0,0,a398edec91d4490afe5ef74579daaf4dd8cf95eb1a91d4125ac3c877af1c7458,2024-09-03T18:33:38.413000 CVE-2024-44778,0,0,2e0392cca2029ac29be6fd26b409316246831ba50d1c6fb07ec9f0877ed724d6,2024-09-03T18:34:36.987000 CVE-2024-44779,0,0,89f84cd04887cf441739e87fd1910860f0cd447826aca8f4d6ab4e891df1c036,2024-09-03T18:33:51.297000 -CVE-2024-4478,0,0,d08f3306744ed4f0062979f84651b94a68f0103cc48f36d3cee29f96589aea10,2024-11-21T09:42:54.410000 +CVE-2024-4478,0,1,62210ed3e1939498ea153e2b17e53a08eb23459f305f452dec267e013e244b48,2025-01-07T18:10:23.620000 CVE-2024-44786,0,0,2132a56021bb3deb06dc29a9b690059b9000abfdaaee4a4a267842e4b43f4e57,2024-11-27T17:15:11.767000 CVE-2024-4479,0,0,dfdcaca31cd400549b0ee63269f5a6b1b16e3de105086e057e7dcec118936812,2024-11-21T09:42:54.537000 CVE-2024-44793,0,0,839294f33f69f2c70ce53d6d218eb1bd4640df57d528f116e13f66530b3feecd,2024-09-05T18:28:42.687000 @@ -265761,7 +265767,7 @@ CVE-2024-4617,0,0,591f2f27c42c02f697911ff625983cd1e4eaf8f3a464b0dba65cf73eb6c11b CVE-2024-4618,0,0,cdc22910a020e9bb9502aeb149bf184528942c32b067a8d361cbb1776e6c9212,2024-11-21T09:43:13.690000 CVE-2024-4619,0,0,e13855d30b6945557dd4659b259b86ac4d456f730a52ea3bb1b91f51d4f58536,2024-11-21T09:43:13.810000 CVE-2024-4620,0,0,ba6cb8b4b90a19279ffa16a083d9166077215ec27ed0288a47d1ce2ebcacc327,2024-11-21T09:43:13.923000 -CVE-2024-46209,0,1,d3bbc915447ec1fe735ec63d5553d0fa25a7e9df2ec6f6285302779d3f6b2f93,2025-01-07T16:15:33.800000 +CVE-2024-46209,0,0,d3bbc915447ec1fe735ec63d5553d0fa25a7e9df2ec6f6285302779d3f6b2f93,2025-01-07T16:15:33.800000 CVE-2024-4621,0,0,5b081f12feb85affecbce7e55cb325897bb9294ab5a34846e1b6b33436e2d24d,2024-11-21T09:43:14.093000 CVE-2024-46212,0,0,9fb6a248b9aee6c6623aaaed9592269e8faf25b72106f535b7602ba05dd43c74,2024-10-18T12:53:04.627000 CVE-2024-46213,0,0,14e6aca58c78f4091257ec1bdfcf4f32aabc7fd46f373f1f42d1b8882c20a13c,2024-10-18T12:53:04.627000 @@ -265775,7 +265781,7 @@ CVE-2024-46239,0,0,039d008e66cebe4327bee95b97b4914de6b1e6cba80f55339b9918f2122a1 CVE-2024-4624,0,0,b8449ff3b8e0ee2c88b4f6d45e1af5d82eabc4c0852145584765c0329d0b8432,2024-11-21T09:43:14.500000 CVE-2024-46240,0,0,1191cdf44b6509cbee2a8abac44a625a4ac7bf4a3622ea84bd1d88a32af8af69,2024-10-25T19:00:20.737000 CVE-2024-46241,0,0,1f0674ec17f2d56b2953e5c99a2b749bf8e4230c80e89ee3aa315644015de064,2024-09-26T13:32:55.343000 -CVE-2024-46242,1,1,d23dfffa50059d3cca3d03fe3bd881789dcf7805de796241f7d089988319ccf8,2025-01-07T16:15:33.950000 +CVE-2024-46242,0,0,d23dfffa50059d3cca3d03fe3bd881789dcf7805de796241f7d089988319ccf8,2025-01-07T16:15:33.950000 CVE-2024-46256,0,0,e8ff1292d6b21c7ae8cc6b0452346dfd4818ec086d9a14227767a4b9e342f7b1,2024-10-24T17:15:16.690000 CVE-2024-46257,0,0,2e21e52a1504a13633477840dbd557e9ad05285ae3938c3634988f0489dcfd2d,2024-10-24T18:15:08.617000 CVE-2024-46258,0,0,c52e6b996ce625372477bea80c1b4801ac61785137225fc2e692df95afee475a,2024-10-04T16:41:08.497000 @@ -265930,9 +265936,9 @@ CVE-2024-46597,0,0,c52dc232c382bb8b06d8853357df9fa3c69df01498ea057ff4e6221b106d8 CVE-2024-46598,0,0,cc14f076324de01fb0aedc665220d3a3ce311adfb4ca6be3700a7951d6f4c5a6,2024-09-24T16:37:39.833000 CVE-2024-4660,0,0,61cefac851d738e6211130f613c3c24b72cb5a59425ed2099eb13a6958c5f9b7,2024-11-21T09:43:19.410000 CVE-2024-46600,0,0,a2edf2944e549d9be47dd52eb91fd1fdfd1682be8e1c383075c7935775b4a0c4,2024-09-26T13:32:02.803000 -CVE-2024-46601,1,1,d1aa8c76af546481926d81fa58587c0b0819234b4bbf0362674827e463f9a514,2025-01-07T16:15:34.087000 -CVE-2024-46602,1,1,c8cdf0e02eb0f302fbc4f38d2d86b603365b9f6ef16468e4bc1af7349fe9b4f2,2025-01-07T16:15:34.213000 -CVE-2024-46603,1,1,836e3dc8bfaeddf29857fbecb92cd5946281a59796c24b0d8d2aec535913b1f1,2025-01-07T16:15:34.370000 +CVE-2024-46601,0,0,d1aa8c76af546481926d81fa58587c0b0819234b4bbf0362674827e463f9a514,2025-01-07T16:15:34.087000 +CVE-2024-46602,0,0,c8cdf0e02eb0f302fbc4f38d2d86b603365b9f6ef16468e4bc1af7349fe9b4f2,2025-01-07T16:15:34.213000 +CVE-2024-46603,0,0,836e3dc8bfaeddf29857fbecb92cd5946281a59796c24b0d8d2aec535913b1f1,2025-01-07T16:15:34.370000 CVE-2024-46605,0,0,1055d0ef26a73f5e645f2fdb8709387122d75ec2801b9b56966b3a9b26aba333,2024-10-18T12:53:04.627000 CVE-2024-46606,0,0,28b5ab017aae3b940eef21410c789c635db9a13916d1c5cd18485d534534131f,2024-10-18T12:53:04.627000 CVE-2024-46607,0,0,60627a32f7e8fcaeaabd9ac6ff6cf0f372f36d39c465be7eb007e5b08e6157e9,2024-09-26T13:32:02.803000 @@ -265942,7 +265948,7 @@ CVE-2024-46610,0,0,d9dd8e07efaf4137061a4cc329bf5a1f8a1df9d6dda6d0ee310e2fb6b1592 CVE-2024-46612,0,0,e8870a8bb445c23c7ae5bf4aade92a65f12442d4b320c6776d50cdc0fbee7ff9,2024-09-26T13:32:02.803000 CVE-2024-46613,0,0,8c2d66370d93094092ee82785e548b32b2278867ca9c8a29f2da471a13fd64e6,2024-11-19T21:35:06.937000 CVE-2024-4662,0,0,a5946fd4e271464e0c94e8fadff0689ed378ccaf6470b84420e776c96e0baead,2024-11-21T09:43:19.670000 -CVE-2024-46622,0,1,a44c7bc86f1de80b27512eabf0c6ff1761728c709366003944049de21b02a3a0,2025-01-07T16:15:34.500000 +CVE-2024-46622,0,0,a44c7bc86f1de80b27512eabf0c6ff1761728c709366003944049de21b02a3a0,2025-01-07T16:15:34.500000 CVE-2024-46624,0,0,1d781dac5c3c03f9553a33e0c8f61a0000ac641e3c43c8e2d01875530634c569,2024-12-04T15:15:11.727000 CVE-2024-46625,0,0,a71dae4f94fa8c690b0d8806dc95d669dc35df1e9bd6eee6ac14f04f1fa13c47,2024-12-11T15:15:10.417000 CVE-2024-46626,0,0,5f2da2d194da31d583545399c8aa7d58649fa22471fe456c45183b18d5dd3c81,2024-10-04T13:50:43.727000 @@ -267239,7 +267245,7 @@ CVE-2024-48238,0,0,3f2ffc614fa15d916232399b967037f846ea28604374a981ad0466971cf3e CVE-2024-48239,0,0,0c07796f9941e77d31ea455c930d1849f400f89336e89d408653eccdc74bdbd1,2024-10-29T19:35:22.840000 CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000 CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000 -CVE-2024-48245,1,1,03e7c6a259252abfb450758b12e8246b166207af136fa7df3cec4b63433f47b3,2025-01-07T16:15:34.730000 +CVE-2024-48245,0,0,03e7c6a259252abfb450758b12e8246b166207af136fa7df3cec4b63433f47b3,2025-01-07T16:15:34.730000 CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000 CVE-2024-48251,0,0,c80def3e238ed0fab4e8dad7bc06f5b33b90fcccea2cf3bdaafbfe1c7c4fb67e,2024-10-17T18:35:12.280000 @@ -267311,8 +267317,8 @@ CVE-2024-48450,0,0,2ad4bca80a954b5a64850267d64cde36a0cc73a58476afe8de69f997e4304 CVE-2024-48453,0,0,3e4df1eeae274bbab92d66627c425462f4715efda5653276293edf2b80192e38,2024-12-12T02:04:03.420000 CVE-2024-48454,0,0,9e0f8e82bd55ca3c8b98e816c5edf51ab830449d458f68194479be7d35927289,2024-10-25T12:56:07.750000 CVE-2024-48455,0,0,6e133e8ee57b44bba6c49d6e60aaa60c9d55d5d8bd2e95486d0bc2e58c6233d2,2025-01-06T22:15:09.510000 -CVE-2024-48456,0,1,fbb569fb57e72aec0b2b4128e6a8adfd90b8bb9238365e9a09eddcb2d6533a26,2025-01-07T16:15:34.867000 -CVE-2024-48457,0,1,99b77ae7cdd1ef223e036610bca59359991ba4db95d35fe9aa786febce4524d5,2025-01-07T16:15:35.057000 +CVE-2024-48456,0,0,fbb569fb57e72aec0b2b4128e6a8adfd90b8bb9238365e9a09eddcb2d6533a26,2025-01-07T16:15:34.867000 +CVE-2024-48457,0,0,99b77ae7cdd1ef223e036610bca59359991ba4db95d35fe9aa786febce4524d5,2025-01-07T16:15:35.057000 CVE-2024-48459,0,0,f2ab7e7f3244c10dbfc979fa6bc201608cff2894282b5a96f254cb41fcce18b6,2024-10-29T20:35:32.737000 CVE-2024-4846,0,0,74d9cb500e6ec3c3eeaefc6b52bb41cb76c1e47820ff2b958b0158c620b5f565,2024-11-21T09:43:43.533000 CVE-2024-48461,0,0,18aa4511ff3360b386c9bf1fdfd51c3ed737ebfb483f16f5fc9298b5d999091e,2024-11-01T12:57:35.843000 @@ -267379,7 +267385,7 @@ CVE-2024-48645,0,0,9152ba80924d9c92409f6703bb9c2d238b590d6f9b8c29d83efec7dae6452 CVE-2024-48646,0,0,bf27b7220c78f47654099c0d09c9128370095b06177bd842d6c21d4ef1db924a,2024-11-01T12:57:03.417000 CVE-2024-48647,0,0,b7696d94da9270a17d9207f6567d56381aaae72681124cf7f89fe2e76f29522d,2024-11-01T12:57:03.417000 CVE-2024-48648,0,0,b4d8db028154fd4559a114bfba42dd1bdb7d1acca8b8710121b3d0a413885b7e,2024-11-01T12:57:03.417000 -CVE-2024-4865,0,0,28389b6e4f30e82bb1ce7faa2de5713012513a2328dd270c6967acb33fba0445,2024-11-21T09:43:45.310000 +CVE-2024-4865,0,1,f1576ecc87ca7fee9298742cd01dc67deb3971b1f5088fdc5baa9a9828ba495a,2025-01-07T18:04:22.393000 CVE-2024-48651,0,0,f0197e7609d526e9b91c56abb48f7be52f102bc1a47973d0312a75c9bc7d3752,2024-11-29T15:15:17.403000 CVE-2024-48652,0,0,1f1ceb7278aed53b322a7fd62edb1a6f7a99113850dfb02458f6ee594abd4d39,2024-10-25T16:51:57.013000 CVE-2024-48654,0,0,1451b7b16fe7197dc60ccb9b6c42729ce028097408e2e8fee132d0f35031f574,2024-10-28T13:58:09.230000 @@ -267562,7 +267568,7 @@ CVE-2024-48983,0,0,3f60809c606c2488b989897e12c459d2aeb7ed4f2dadf99e233ef785ffd15 CVE-2024-48984,0,0,1ffae666f1e42473bd707894036881e108cae353da85d0eae9c25770d53a785a,2024-11-25T22:15:14.253000 CVE-2024-48985,0,0,8bb53bbc96b650088379aee793c8f02be947eccaa5841fe0f7cf1ff00c0bae42,2024-11-25T22:15:14.790000 CVE-2024-48986,0,0,cf9484fda56052e686c7c5f0c8f108e09e57cac0d3001558017ed0e9f5d2880b,2024-11-26T16:15:16.217000 -CVE-2024-48987,0,1,a203e6b54ef42e4731ad652ce9f7229eecdbed2197839b80d366764cbe3de8c6,2025-01-07T16:15:35.237000 +CVE-2024-48987,0,0,a203e6b54ef42e4731ad652ce9f7229eecdbed2197839b80d366764cbe3de8c6,2025-01-07T16:15:35.237000 CVE-2024-48989,0,0,66d2a88dd40e61ad72a4274898e13f4d867c8914eed9220af9f32ce117d951d8,2024-11-13T17:01:16.850000 CVE-2024-4899,0,0,4215cce8da622bc2d5c7da1a06d33c6b523a0182697459650c35738bc8a5a87b,2024-11-21T09:43:49.323000 CVE-2024-48990,0,0,8ae314221da60f3f28b2dc061e7fd91a0c68d57bf2594502511d6f645886ec7c,2024-12-03T14:15:20.627000 @@ -267600,7 +267606,7 @@ CVE-2024-49019,0,0,843647f8f90ac786c0a7f52167d5ad1708680de16d471d21015ae93f5cacb CVE-2024-4902,0,0,911ddf9902c4a6fad164d9b35cb427e99b0367ddb6da36eb88769e39c7047b11,2024-11-21T09:43:49.733000 CVE-2024-49021,0,0,6307ace2b764fb3bcaadf5b8f349375e7b79a2e73d5feba8d2f974b7854838d0,2024-11-15T16:04:55.487000 CVE-2024-49023,0,0,27afda74dc87c5b87ec57696c77daeb47321854c2cad0318414c8543eb0f695d,2024-10-18T17:01:32.803000 -CVE-2024-49025,0,1,dd38bc2daa238896569bf2ff9659a286e630c2d74cfbe39695757215fc91e02f,2025-01-07T15:42:37.300000 +CVE-2024-49025,0,0,dd38bc2daa238896569bf2ff9659a286e630c2d74cfbe39695757215fc91e02f,2025-01-07T15:42:37.300000 CVE-2024-49026,0,0,b64588563c951fbd06562cd405e03d7e6e984ef3f419c2627b7c0c356617197f,2024-11-16T00:08:54.853000 CVE-2024-49027,0,0,8cd22fedb07cd9edd7f325517308cd7e0e055917852e77b172ccdd20cdda3162,2024-11-16T00:09:09.700000 CVE-2024-49028,0,0,e4c1cddf086926fa4c1f28e00e67df32d5f06d4e1bf706d0231c2a2e4db2c364,2024-11-18T20:34:16.910000 @@ -267616,7 +267622,7 @@ CVE-2024-49039,0,0,1b38f44a621b2ec6c9245d6149c0d2e4243dd86623a9535e85cd3047ada03 CVE-2024-4904,0,0,8f1d8ea4c71693b63388d0102ac60b48cb8ea1f86873e76d3239d3cadf4cec58,2024-11-21T09:43:50.007000 CVE-2024-49040,0,0,5d0b4fb7954b8696818411a1e9fccbcaf7848a4d687b1b89ca1a2a3a7950420c,2024-11-16T00:05:03.997000 CVE-2024-49041,0,0,8ae253c5553f6c4eb4df71d9a127c4d885da429468adc6a3d64965239642896d,2024-12-06T02:15:18.263000 -CVE-2024-49042,0,1,8743867024ab3e89f3af6361330279cbb35cfe9cd54baf2d468c03c6c484face,2025-01-07T16:18:47.907000 +CVE-2024-49042,0,0,8743867024ab3e89f3af6361330279cbb35cfe9cd54baf2d468c03c6c484face,2025-01-07T16:18:47.907000 CVE-2024-49043,0,0,37989fd57d6d886902b1161cbc445ed9dc49420e49ee7bdbcd84bf837df93d50,2024-11-15T16:05:30.773000 CVE-2024-49044,0,0,61fc818fe767bc9cc29166454a6588c5d1d52bf58babfe90898a89e53c1bd092,2024-11-16T00:03:54.977000 CVE-2024-49046,0,0,b0aad407293d17e8d984623741bd55ea04b6e04629c13046891467cb593f4a52,2024-11-18T22:10:12.960000 @@ -267628,7 +267634,7 @@ CVE-2024-49051,0,0,1a4c11022b4ef8ffb4e676126a8467f49f4fbe220c913e43f0c88e07a91fb CVE-2024-49052,0,0,562a3afb9529893213b3c3a54ea9afa75634dd6a87e1e537d239e6b014ada48e,2024-11-26T20:15:32.723000 CVE-2024-49053,0,0,d6f7a021684f24601e3900d69b66e2b12a673af230694f44e43638dac949a195,2024-11-26T20:15:32.890000 CVE-2024-49054,0,0,1cfc6e1b9daff4eccbd3f4eb039d3f29a00c732f02dfff3006c8c1d6493fc090,2024-11-22T16:15:32.150000 -CVE-2024-49056,0,1,2bd2b2266d7b792cf7f1f9d1b8f0dc5da233dfb03d127cfa27eda6bdd0ad0933,2025-01-07T16:33:01.547000 +CVE-2024-49056,0,0,2bd2b2266d7b792cf7f1f9d1b8f0dc5da233dfb03d127cfa27eda6bdd0ad0933,2025-01-07T16:33:01.547000 CVE-2024-49057,0,0,5cc31537350c6786b0720ca4d729a2efcf9b727dd55fdc496e17ba6d856dd65c,2024-12-12T02:04:29.907000 CVE-2024-49059,0,0,0cfa33e7e3df27c4f8c8c88e205cb7aa04bc3101421e54c43b006e79b82fa7d3,2024-12-12T02:04:30.040000 CVE-2024-4906,0,0,867b56b92bfe21b322ca43ff902131a5c10ad7122b44578e5002b985071da5a0,2024-11-21T09:43:50.303000 @@ -267969,7 +267975,7 @@ CVE-2024-49531,0,0,71f77a052b0c9c7d9812f8d9c227b39545cc763dbd68880fe5ec5c2381f8f CVE-2024-49532,0,0,cabb7d628c45a7a3751eb851d9a37dcb0dee5d325edeaad66bc4f4b2866949d3,2024-12-11T12:15:20.753000 CVE-2024-49533,0,0,2810856bd75248205690772208ec800f6fe4ce7fc996956e4a6e6446a723d041,2024-12-11T12:48:18.580000 CVE-2024-49534,0,0,91a4013066a325ea34e6a4847385d92f7ca030956a33318227acbcce3d67f1ce,2024-12-11T12:48:19.230000 -CVE-2024-49535,0,0,a8999da97e4285896456271d4cdceca951f9c859250023ebce227da98e8f2f28,2024-12-18T15:07:06.950000 +CVE-2024-49535,0,1,7ece5b7ca5360287fd4346933e5a2bbd25d6c5e232900c1c846cd6281ed8bdb3,2025-01-07T18:15:18.843000 CVE-2024-49536,0,0,3226abc075af5af9440f5cdc9a3a66360f030ce3d405055960c0bca748fe4e92,2024-11-19T21:21:45.640000 CVE-2024-49537,0,0,ba882a99cef27c89f9b2e8ef04d1eabb52008f24920d39f5c7da20d6b3c16d7b,2024-12-18T15:21:52.587000 CVE-2024-49538,0,0,d94b4476ce6c517a0b8de10420f326b0d49ebed3fd6007726fa7f55c341bc62e,2024-12-18T15:17:43.620000 @@ -268155,9 +268161,9 @@ CVE-2024-49803,0,0,3d17c64dfa44a309f0956e2f80441fab8adbfd788223cf7d4d00fdb1c300a CVE-2024-49804,0,0,9f69c0555ffa5cee4c9737c951497d9f13a0a16cf2a7c81ab8b24b57fe9013d8,2024-11-29T17:15:08.330000 CVE-2024-49805,0,0,7ffe3272417593fded7c1532e656178bffa9488f6e3f217560f596f3472e4024,2024-11-29T17:15:08.470000 CVE-2024-49806,0,0,482936de6637cf76dde54f51f1f52b121a6d4662a65fe5c43e3cc1abbc23e574,2024-11-29T17:15:08.627000 -CVE-2024-49816,0,0,f70791c7c86212b5e6f25afaa9487a7fd27819db27de3b7ca907ebf782e5f9df,2024-12-17T18:15:23.760000 -CVE-2024-49817,0,0,3fcd1e73a590844aeb6cf34023415e89b133b5b1e9882e79fccbc38c1caf2b4b,2024-12-17T18:15:23.937000 -CVE-2024-49818,0,0,6b1ecfe860d02586769f1a41553f8141b55c58d43c135ba037775bfedaa34972,2024-12-17T18:15:24.127000 +CVE-2024-49816,0,1,29fec4881722e27e4de58cfa345cd2fbdffa0b4c8c7096fb575d64021d438094,2025-01-07T17:25:58.430000 +CVE-2024-49817,0,1,faf269773338cb40692b44da53cb55c3f9c6f56cc98bbe6ac46416bd80e96260,2025-01-07T17:23:31.817000 +CVE-2024-49818,0,1,148b4e77a026b651bd8bac5c6677434a12ec93c5c55e11ec99c033a2167f5317,2025-01-07T17:20:08.497000 CVE-2024-49819,0,0,1dc8c091d2beaa844749d80a6b8ca3108c650b84c17ef340c853dc44a3c81cd7,2024-12-17T18:15:24.300000 CVE-2024-49820,0,0,4961f823f51f3d5fa89d923b790410729467cb3ad2991758b6509177518ba468,2024-12-17T18:15:24.463000 CVE-2024-4983,0,0,eefedacb8523e31a6a187e2c5f1e853f41a668185e6ca18f1a2fa72cc91a9950,2024-11-21T09:44:00.070000 @@ -268640,8 +268646,8 @@ CVE-2024-50289,0,0,cbe890f5c9d4c6f76920eb8ce53083b1779519960db0d61cf86dba6e73892 CVE-2024-5029,0,0,88e2c5662d4330e534abb2433fb00aba3c37b519f000b76661416999479d4a12,2024-11-21T22:15:09.660000 CVE-2024-50290,0,0,472e5b89bdd80749e630d2d7cfdfbfa1f003a07e281a56444507df0faaba7cc5,2024-11-19T21:57:32.967000 CVE-2024-50291,0,0,2bfa2e93499428357803d9d1742bd1017215506f4ce049e714c1056a205a95ca,2024-11-27T15:16:30.260000 -CVE-2024-50292,0,1,95d21dc38032b448123cfcbc6b215509e2ac23d9178dd1641ccfa234e827b99e,2025-01-07T16:10:33.080000 -CVE-2024-50293,0,1,ba7302d95d830c357b7ec4b916e45204ce4fc52b68cfdce311e4f38bff6cd4d5,2025-01-07T16:11:07.423000 +CVE-2024-50292,0,0,95d21dc38032b448123cfcbc6b215509e2ac23d9178dd1641ccfa234e827b99e,2025-01-07T16:10:33.080000 +CVE-2024-50293,0,0,ba7302d95d830c357b7ec4b916e45204ce4fc52b68cfdce311e4f38bff6cd4d5,2025-01-07T16:11:07.423000 CVE-2024-50294,0,0,a56287c7c6c44b3839623aee8786a853478aac87c1c8f4037bacdb635fa62108,2024-11-19T21:57:32.967000 CVE-2024-50295,0,0,b5793fe9e5e200c708da8e3fd2d3817806f8597db59622027c2d0bf299d5097d,2024-11-19T21:57:32.967000 CVE-2024-50296,0,0,a0ab00a3d94c15ca5a168953900e499984de52c4d2f3ef150ea36247cfc34755,2024-11-27T15:24:16.020000 @@ -268753,7 +268759,7 @@ CVE-2024-50404,0,0,10c1a4f714ed0cce3a57b353e9bbee3b67305da9581dec9da31ed249a3a8b CVE-2024-50407,0,0,9866052bb59192baca2967b3bc2111164d6bd7872bf340b1aca3f2c160296628,2024-11-07T20:28:22.860000 CVE-2024-50408,0,0,58a47a84acdf0f836c9f8a5fa3c21e90b2d2f3c587c1b70e5c24f5387d6b7c59,2024-10-29T16:01:08.447000 CVE-2024-50409,0,0,d098af286ab64a0110f5be7e77620539ec040083e43f27de87ded5e888586c5d,2024-11-07T20:28:43.577000 -CVE-2024-5041,0,0,4adddc95cd6380e96a38f2df0d5bb194254d4f78cf130b03e689eb3ba3d33065,2024-11-21T09:46:50.373000 +CVE-2024-5041,0,1,d9623094ca1e3939083cd9fab5f795b7d4cf111264673ce469ee95d5ba4b6dd2,2025-01-07T17:51:05.097000 CVE-2024-50410,0,0,acc11182790345c3d4f45cbdf4282ce20e32cccae40927d8249759c8178f80e3,2024-11-07T20:29:13.937000 CVE-2024-50411,0,0,2fc567e690f4a678b484ef3782fe17511148259789c8dfda1769eecabe3bc947,2024-11-07T21:09:13.727000 CVE-2024-50412,0,0,d55f8cc3919122ebe49d4ecf190304453e9f697767640b2f199983853ee0bb0a,2024-10-29T14:34:04.427000 @@ -268972,7 +268978,10 @@ CVE-2024-50653,0,0,c3c2eb452e8edda9530908359ecefe1b49303fe46316e9194f74a85e37342 CVE-2024-50654,0,0,5fcda88001562dfee1e6cc60fc3a7e9ed1e6a24d11c939faa9c604dfe739ca92,2024-11-21T19:15:11.113000 CVE-2024-50655,0,0,1459d7257280aa2e8bdcb66b80527b54cff1ac83583af5c95b1d9f4626d5dfc0,2024-11-21T09:44:54.133000 CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000 +CVE-2024-50658,1,1,02f2d1a74cfcccd18e4da0a673413f2beac8ce2ee9dd4b10329ad9369d7c4ce7,2025-01-07T18:15:18.990000 +CVE-2024-50659,1,1,d7ebea611d9162da6643448ce8803c67a30d61b443e2c9497240dde7fbe3c702,2025-01-07T18:15:19.153000 CVE-2024-5066,0,0,0791653545be3944782f3bdc7c1ab3604d2c7f0fab82f79e00981952033549de,2024-11-21T09:46:53.670000 +CVE-2024-50660,1,1,718a9165348cd73d52eaf5fbf1661753466a7b84c7bb473e55777abc7122e427,2025-01-07T18:15:19.310000 CVE-2024-50667,0,0,2acba17bb6b4eea051169d8d69b68e53449d255d2507f74a89d880a87e24dc78,2024-11-12T17:35:12.270000 CVE-2024-5067,0,0,1b5c70fd6aa8a713385c4f1e29f8c71eeaa98648b5736e6e39376f75e3abb922,2024-11-21T09:46:53.810000 CVE-2024-50671,0,0,99782c17088a8d91d172d01f5a082085329526fd6f7189288ae0f91a8aaa1a9a,2024-12-04T17:15:14.860000 @@ -269041,7 +269050,7 @@ CVE-2024-50853,0,0,a2c16db2d9a48c6744a7c1a41fb13ec1d9457efe837db0d74474da40cef9e CVE-2024-50854,0,0,ef773b735c2a347d27ee6e8fc360f731f61bfb69f79492695040fe16f5b3d113,2024-11-14T14:43:25.770000 CVE-2024-5086,0,0,6f4adcedc32131edaa2421b93d6f66300703be46e5cbd2689d364be6c71d3e7a,2024-11-21T09:46:56.290000 CVE-2024-5087,0,0,31abeedd94931ed5c0834d8eca1075c48705227fc52b3830e1422827a9f66ace,2024-11-21T09:46:56.403000 -CVE-2024-5088,0,0,4c3ac4edb0b1a5157e082eddd1cec5b9206b6957e5bd375f5df1ec553df51266,2024-11-21T09:46:56.560000 +CVE-2024-5088,0,1,cb760213addc1b272fedcd03b93efb771012fe463aac9fb68544dce6e855ac4a,2025-01-07T18:03:40.723000 CVE-2024-5089,0,0,305706c4595c847ac9cbba52082727d9aefdb687316aa25305e2ea82257716b3,2024-06-06T09:15:14.897000 CVE-2024-5090,0,0,7b6c0d5d4fe6cd2b9ee39cf4e630635d858bd47c5d22afc5ac55f4a356dc9ef0,2024-11-21T09:46:56.690000 CVE-2024-5091,0,0,942cd7816598a9a38306116813c44d46c4017ec3ca91059e04ec4c54cf0eda30,2024-11-21T09:46:56.817000 @@ -269148,7 +269157,7 @@ CVE-2024-51094,0,0,9c0a3563e2cbfb0f7e4111937c25ede7da4801ccd5cc0469207158910b8a9 CVE-2024-5110,0,0,fb15a6e8ac3918d54232e697045ba8a0a4f2778f988710aceb135278db14c8a7,2024-11-21T09:46:59.470000 CVE-2024-5111,0,0,16553f7e015987eac3af34fccd670274f33dec3aabde04972879226d81661f96,2024-11-21T09:46:59.603000 CVE-2024-51111,0,0,06fdca48d9f713ba11aa0605dc978b93849ded746b605b0da33a035e037b1411,2025-01-06T18:15:20.060000 -CVE-2024-51112,0,1,fb9ec1f188e1020f6eea6a788766268b99f0b03f66304006a370bc6367d7b8dc,2025-01-07T15:15:10.270000 +CVE-2024-51112,0,0,fb9ec1f188e1020f6eea6a788766268b99f0b03f66304006a370bc6367d7b8dc,2025-01-07T15:15:10.270000 CVE-2024-51114,0,0,bb120dee5f82301bedd52f6a870fc78612d9b471bba9079cbb07365933b729b3,2024-12-05T20:15:22.340000 CVE-2024-51115,0,0,97924e30f339bc462ccaad1ee3c55c378e15485436cb0bc88676f0cde030376a,2024-11-06T18:17:17.287000 CVE-2024-51116,0,0,163c0d7988ca5329a27514b03075ee6d2fff2ef84e9d3dc466528f493b745f84,2024-11-06T18:17:17.287000 @@ -269761,9 +269770,9 @@ CVE-2024-51995,0,0,e5cad8da2bad6fce5771e874e2b1a0884993be035c680bc3742b5680b4815 CVE-2024-51996,0,0,ff85801f2278caabbb88a673f5522aa23a97c2f9d7260bda4506e22cbaf33529,2024-11-15T14:00:09.720000 CVE-2024-51997,0,0,acce3d20366994a4b626635e9d1a5180796478ce8a1652c0c783857ab39acd0f,2024-11-12T13:56:54.483000 CVE-2024-51998,0,0,9839aa62f76a80c9973f2fb8d41eecba253f6b3142e87cdc34afb99ddaff8394,2024-11-08T19:01:03.880000 -CVE-2024-52000,0,1,164c382f8c88982eb63ce07c2be596e0b502f12f5ca998748920dbcc2ce078fc,2025-01-07T16:52:48.723000 -CVE-2024-52001,0,1,78f4b3f4ac098d84e7755b87917d54c89f68966e660cd2cf99fbfaea2ecc818e,2025-01-07T16:48:41.057000 -CVE-2024-52002,0,1,5dd71186c04d642ab39d61b570b48d9b6609d3cf4aeef18bda9bfec319cb6014,2025-01-07T16:43:28.527000 +CVE-2024-52000,0,0,164c382f8c88982eb63ce07c2be596e0b502f12f5ca998748920dbcc2ce078fc,2025-01-07T16:52:48.723000 +CVE-2024-52001,0,0,78f4b3f4ac098d84e7755b87917d54c89f68966e660cd2cf99fbfaea2ecc818e,2025-01-07T16:48:41.057000 +CVE-2024-52002,0,0,5dd71186c04d642ab39d61b570b48d9b6609d3cf4aeef18bda9bfec319cb6014,2025-01-07T16:43:28.527000 CVE-2024-52003,0,0,c4d0137679bf24bf7e427991f4a35c6e340cb6ae5935b9bf8c2c02879996db01,2024-11-29T19:15:08.170000 CVE-2024-52004,0,0,af81d9a04f1ca0a30dd0ecd4bf4087812462bfda43adfb75471e3a85c7fac816,2024-11-12T13:56:54.483000 CVE-2024-52007,0,0,6f0263bf421a0f49599286dd93cf09426c13c6e425c7e139103d5ade39ba57aa,2024-11-12T13:56:54.483000 @@ -270231,7 +270240,7 @@ CVE-2024-52809,0,0,652f885846d676120f14dabdd6ac521fed85152402f72016697d2b26d1715 CVE-2024-5281,0,0,fc0976db5d10ac7222d6d7be38c22f60caf8b70ddc146c5f21bffad51467d30a,2024-11-21T09:47:20.760000 CVE-2024-52810,0,0,bc519c3395fca90f2847180bace5d2bd61f10ead143c379d0438b1982cdf8ded,2024-11-29T19:15:09.163000 CVE-2024-52811,0,0,8b4a122817488a51be41eacb5a5ec9e0b5886ee8b97dd1908dd9d3513b97f482,2024-11-25T19:15:11.567000 -CVE-2024-52813,1,1,a7a093d4b10add49402e1ec74d19b9e8b011e357dece838f290e240f092e2e83,2025-01-07T16:15:35.610000 +CVE-2024-52813,0,0,a7a093d4b10add49402e1ec74d19b9e8b011e357dece838f290e240f092e2e83,2025-01-07T16:15:35.610000 CVE-2024-52814,0,0,27542fdf4d1e39899f04e440482727ae79215851a144e892e913b9bf3a0be02c,2024-11-22T16:15:34.553000 CVE-2024-52815,0,0,c1e8fde97970f9249cef290754120e31a2a9f9b91031232cee085d5724ae3d3e,2024-12-03T17:15:12.267000 CVE-2024-52816,0,0,65718f19cb2a012b57ef8da79137eacc99e273905d4b5a57cf388720343e4d20,2024-12-17T16:15:18.873000 @@ -270248,7 +270257,7 @@ CVE-2024-52828,0,0,b91fe6328a18fb3b30a5eabdd9d8505c62acd230a6c59a5f57df74efc2102 CVE-2024-52829,0,0,c106e3d1fce91af490fece8750d8c3941c825efb7a57e842b25787e876aa82f3,2024-12-13T17:12:13.453000 CVE-2024-5283,0,0,2e4c0e59b537a1fa6ef21044d27ad6c5c503d962bc23f2bfaaea7d6483dfc4a1,2024-11-21T09:47:21.083000 CVE-2024-52830,0,0,520275838c0dd5c92182498e39edb487b6f8eb3d04d45f85e0b9a800aba0348d,2024-12-13T17:18:43.007000 -CVE-2024-52831,0,0,febc6ce542b9dea4fc3ebc985b026e7cd9b8167d00a2e198d286f4415587ad5f,2024-12-13T17:20:24.467000 +CVE-2024-52831,0,1,64f3e404c0f12053b43b90c3e636dca032dd793d5982360c07aad2d2d60d4e0f,2025-01-07T18:15:19.520000 CVE-2024-52832,0,0,7cffb2271f69c746cdef4738f588d99cba2378e891601a03a56800f8f1a2044d,2024-12-13T17:20:37.987000 CVE-2024-52833,0,0,751a005b876b2ea1c588dd46853cf3b76001db256f88e1e9dc37654077d36db6,2024-12-18T14:37:46.917000 CVE-2024-52834,0,0,347eaba9bc4ad85ef5dbc05cebef0fcb760c58a6d09f0b408ba67fa855d111fa,2024-12-13T17:20:47.050000 @@ -270283,7 +270292,7 @@ CVE-2024-52860,0,0,30f08ade949c5a06ad2f0eb4e9439642ec65e9685cc0cca424116899c4011 CVE-2024-52861,0,0,4daaab8a6a15db3f62fc7bf6f5ec079ab7566a1b0c5251b1b33d89c9120d62d7,2024-12-13T17:44:50.320000 CVE-2024-52862,0,0,38d6d5355e836074358c16f05c0d64f338c50e9ed2c4ba8e1c39a7c2a8895449,2024-12-13T17:38:11.093000 CVE-2024-52864,0,0,5aed2598110b254c3d64ec7569ade01fe6bf6ea08bd9b96449615a122a0e7958,2024-12-13T17:37:46.930000 -CVE-2024-52865,0,0,069c368d5dcca6a0e4d636335711c4f61c2d7fa34d916118ae775f41239bc122,2024-12-13T17:37:30.603000 +CVE-2024-52865,0,1,d77c984fda3ac5b6322fda83849195e30728a895341439024cb7eb650daf701d,2025-01-07T18:15:19.667000 CVE-2024-52867,0,0,b14a9f7c8b0d212f056e38d3758777be722d9d6a10918da14d6ef6ffa3fcbd7e,2024-11-21T09:46:35.283000 CVE-2024-5287,0,0,ede9629ba14e7833d0e00ab367a4e2205145f22a5dce3f4d9b720c5001bdf2cc,2024-11-21T09:47:21.753000 CVE-2024-52871,0,0,bc912334ad7760e2905477f1da15c92d58ec818da9de2502b7206c7a0336bc4d,2024-11-18T18:35:09.027000 @@ -270297,7 +270306,7 @@ CVE-2024-52896,0,0,e4fbb864f7848e639fc1924ff6e3f9dbd32543077984aeb4db567e289d876 CVE-2024-52897,0,0,a95c21b621375142334fe37fe01c64626d608c334ccb17049cec65f4899cb6db,2024-12-19T18:15:23.357000 CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000 CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000 -CVE-2024-52901,0,0,b3ccbf901557a10cf010f8431eea890e5b9f6a1652ed07cc8e414631c66b0338,2024-12-12T16:15:54.807000 +CVE-2024-52901,0,1,36d188f2446e50c3cb0f73c4dc9bb8995fd68fc57b5b23eb83b9c2e8f4d32395,2025-01-07T18:16:58.680000 CVE-2024-52906,0,0,431d94d1b8f33effe6649fec1d40fce02705d36efd5f14a5de5395492c85ff96,2024-12-25T15:15:07.470000 CVE-2024-5291,0,0,59cced621ba81a9183b7024bcfca25ce68853e845d2185c7bff426c187f3d943,2024-11-21T09:47:22.270000 CVE-2024-52912,0,0,de0cdb8e2800d5227d67a2b677bd337b1802fb96c19fe1ed635449a3093fb257,2024-11-18T17:11:17.393000 @@ -270421,7 +270430,7 @@ CVE-2024-53092,0,0,7648140eeea3dbcba07b87610f5bab990445287d13346f351e0a3179515b1 CVE-2024-53093,0,0,7a2189a6767397ac9a9524b82ec1cfcf95c13b9556edae05a0802a66edbd2129,2024-12-24T15:02:22.377000 CVE-2024-53094,0,0,6cdea08f81d52ec066a95bb50c1589dc812eaf5d31206bb51acb4c07058ecd73,2024-12-24T15:07:35.193000 CVE-2024-53095,0,0,4e724c82098942c519f58d8d0672f065c3504379b32765b65ae8d7e7c202ab88,2024-12-11T15:15:17.940000 -CVE-2024-53096,0,1,dcefc8c8d5e883d6b19cbf59b746dea2614648687427eb8d2bd5cd72eef79062,2025-01-07T15:42:04.183000 +CVE-2024-53096,0,0,dcefc8c8d5e883d6b19cbf59b746dea2614648687427eb8d2bd5cd72eef79062,2025-01-07T15:42:04.183000 CVE-2024-53097,0,0,c8b4e0e4b2cea4326a95fc9929fae4823328f4bcb85dc78d93b5c59fcdd291d7,2024-12-24T15:44:19.850000 CVE-2024-53098,0,0,e841aa1c52390814ec8cb3f228cfb4a113b5a3d775d80a08f6be6b8c677914fc,2024-12-24T15:48:21.330000 CVE-2024-53099,0,0,547974d5607c74bc75023012dee1183f239fa1b3db6bb0628f2ee2193d1004f6,2025-01-02T14:15:08.300000 @@ -270429,7 +270438,7 @@ CVE-2024-5310,0,0,2f7fe56905fa71b6c5244c78a7d9d6396f207d8efd7d5fc87cedf378b01f95 CVE-2024-53100,0,0,c9b76774e7fbb3d37345443f9fcb41fcc27f64217f335d86b9b5ba659a640559,2024-12-24T15:52:44.583000 CVE-2024-53101,0,0,c425bb46b3515da57dc87974bd0976857d07567982d62109b13f805737e7ca08,2024-12-19T18:08:23.857000 CVE-2024-53102,0,0,d1c3ad92d75c37363246642f8e4ba479d5a4bde44aee221d715666c203805e79,2024-12-12T16:15:54.967000 -CVE-2024-53103,0,1,77cafd307914e1a24f1ee1d35ab96ff6e827044224f7940ed86d3699c313884e,2025-01-07T16:25:33.233000 +CVE-2024-53103,0,0,77cafd307914e1a24f1ee1d35ab96ff6e827044224f7940ed86d3699c313884e,2025-01-07T16:25:33.233000 CVE-2024-53104,0,0,063549a8c93277f1603e55e543da35e55c8ff1c1baaef95c67cc0358a7fba5da,2024-12-11T15:15:18.110000 CVE-2024-53105,0,0,20675f3b2d3d99600460dea0e4abb4193907124cdadd66352ebc6b7d7d157a85,2024-12-14T21:15:35.210000 CVE-2024-53106,0,0,30e3702644fc7a35784d9f94136dad383572937546c2f59633334350f5453e80,2024-12-02T14:15:11.420000 @@ -270475,20 +270484,20 @@ CVE-2024-53141,0,0,c4eea5c2fe51a3898acccfa414620e41964aab3e73f12af77b5d7bb35ff9f CVE-2024-53142,0,0,fc23c3e378fb46ab5615da6a919ab3136de551312d5d21e741724005200e92a7,2024-12-14T21:15:38.707000 CVE-2024-53143,0,0,4f295a131c4b62067b8322b7a004cec43cd0b859ae5d1b6a73813cfd9519c39f,2024-12-13T14:15:22.443000 CVE-2024-53144,0,0,9d107c35ff0dca61e5b14e7d0131ac8dad4f8c1aeabd45b2baa64b7fc7411808,2024-12-18T08:15:05.687000 -CVE-2024-53145,0,1,845c82eecd5000228acfbd771e22e0fcec976590e482e5c078720e730bd428d5,2025-01-07T16:14:57.543000 -CVE-2024-53146,0,0,e18a949ec16b9359bad3761dca63094ce301a4b4599e723769333e1c14f227b5,2024-12-24T12:15:22.653000 +CVE-2024-53145,0,0,845c82eecd5000228acfbd771e22e0fcec976590e482e5c078720e730bd428d5,2025-01-07T16:14:57.543000 +CVE-2024-53146,0,1,143a6857f7adc5fe799b8f016794e004afe724691ccaf56befb27f641c543479,2025-01-07T17:15:25.477000 CVE-2024-53147,0,0,a5545dbb75e1ea0355592ea9c5cbed6b78973df74296885178a65e66e3108898,2024-12-24T12:15:22.777000 CVE-2024-53148,0,0,4b9d4dc07b7bfc2792b42b5f67199b390604698146ea12cfd91f1c4f238361d1,2024-12-24T12:15:22.887000 -CVE-2024-53149,0,1,05bc68379e7ec92e2772d13505c846df279c54454448dcbefdd2801c1300b616,2025-01-07T16:36:45.343000 +CVE-2024-53149,0,0,05bc68379e7ec92e2772d13505c846df279c54454448dcbefdd2801c1300b616,2025-01-07T16:36:45.343000 CVE-2024-5315,0,0,cfc4383f1c53119936ccfb248038372daec91d7a497e742b345000be072ec700,2024-11-21T09:47:24.927000 -CVE-2024-53150,0,1,42062accc76561f05b3a37cb4c8683d4a5bafa996981cf7fbbd661e8aa552bdd,2025-01-07T16:38:32.010000 -CVE-2024-53151,0,1,9bcf302f86c516b6c3a19dba6dc2acf65ba01a50be814d57fdb94bd0b36b3601,2025-01-07T16:41:42.637000 +CVE-2024-53150,0,0,42062accc76561f05b3a37cb4c8683d4a5bafa996981cf7fbbd661e8aa552bdd,2025-01-07T16:38:32.010000 +CVE-2024-53151,0,0,9bcf302f86c516b6c3a19dba6dc2acf65ba01a50be814d57fdb94bd0b36b3601,2025-01-07T16:41:42.637000 CVE-2024-53152,0,0,8c8f4f476264eba0a73ea6d3f2f2e87f1734a052b6ac9dc8cfbd62726a584cb9,2024-12-24T12:15:23.353000 CVE-2024-53153,0,0,9da752cadb1a825f791ff9d8397e2b649ec7c58eaee650a673532728edacefc9,2024-12-24T12:15:23.467000 -CVE-2024-53154,0,1,36f3939d10c8a8472ba6281a2b3ca9ed689ebe2a63b16786b383b929bcb0f38c,2025-01-07T15:58:21.587000 -CVE-2024-53155,0,1,337c9592c2cd07cacfbc5cc85e02055aa42cacc6a208444c3dff71eb8a386e45,2025-01-07T16:00:13.753000 -CVE-2024-53156,0,1,aac424b44518844505e5ed4113e6ba71250434f5c6b683b2c4a41bab7ca199a1,2025-01-07T16:02:00.303000 -CVE-2024-53157,0,1,740c4e38854260229fa4eb1ce5949dd5a376a90942ced861f2cd242a3bcc0508,2025-01-07T16:02:21.087000 +CVE-2024-53154,0,0,36f3939d10c8a8472ba6281a2b3ca9ed689ebe2a63b16786b383b929bcb0f38c,2025-01-07T15:58:21.587000 +CVE-2024-53155,0,0,337c9592c2cd07cacfbc5cc85e02055aa42cacc6a208444c3dff71eb8a386e45,2025-01-07T16:00:13.753000 +CVE-2024-53156,0,0,aac424b44518844505e5ed4113e6ba71250434f5c6b683b2c4a41bab7ca199a1,2025-01-07T16:02:00.303000 +CVE-2024-53157,0,0,740c4e38854260229fa4eb1ce5949dd5a376a90942ced861f2cd242a3bcc0508,2025-01-07T16:02:21.087000 CVE-2024-53158,0,0,e531f3eba6de342b83e364b8771c46bf2c1c9fd8d80363877d69a71c57f42b0f,2024-12-24T12:15:24.097000 CVE-2024-53159,0,0,176d1d08b67cfe19ad35318eb47af120be22501b0d6c2bb160c8999095d700f1,2024-12-24T12:15:24.217000 CVE-2024-53160,0,0,4057796bb00f7bfb6f732886520cc805fa7c46e82813820ad292c8bad3293b53,2024-12-24T12:15:24.340000 @@ -270570,7 +270579,7 @@ CVE-2024-53231,0,0,d17e3bda80b5a7cf1c8301cfd137a4225331a6dbdf23858cf1d31e5b8b86f CVE-2024-53232,0,0,b2490c67d61762567c2a4758a059dd7afff0e8ed42e292b47c4a7cf1089d2169,2024-12-27T14:15:31.510000 CVE-2024-53233,0,0,3c38f13d75de4a76f794a84b10f00e056fd02bc1f845028887460515d557b226,2024-12-27T14:15:31.630000 CVE-2024-53234,0,0,74235b9bba8c6fa335f832d794b846a6cdfc4adf175080c7f64bc2837d1b0788,2024-12-27T14:15:31.783000 -CVE-2024-53235,0,1,0c72a9d02c4c1323ac68c14078ff2fdc579770d6094d03c12233e24c514bf29f,2025-01-07T16:02:48.350000 +CVE-2024-53235,0,0,0c72a9d02c4c1323ac68c14078ff2fdc579770d6094d03c12233e24c514bf29f,2025-01-07T16:02:48.350000 CVE-2024-53236,0,0,7fb60b41991b24fab1f4d66c148092639a1f6c1a16382de6518a0eb474a5c377,2024-12-27T14:15:32.013000 CVE-2024-53237,0,0,23d171fbd4bb56e8eac2319610adf1e1fd3e1e2401f72a4cefcfacfc9e5a2a90,2024-12-27T14:15:32.130000 CVE-2024-53238,0,0,6610e7d3aafebef8985c1159594be7c64b8219149820bb4d4db18a3c87d26a9e,2024-12-27T14:15:32.253000 @@ -270630,7 +270639,7 @@ CVE-2024-53333,0,0,fec584e947b0ef91060e7974c2bc2800b0a5e22197ac40e517d4bb4ecce04 CVE-2024-53334,0,0,16279143f552729b554e869e900fcdb0e710a67308c49b11d3ac0e3ed52e676d,2024-11-21T21:15:24.810000 CVE-2024-53335,0,0,c7b5a8f73d12d44b7820d29b4dc55e553a7dba1e50218bfd0cdeaf78dc12e004,2024-11-26T18:15:19.850000 CVE-2024-5334,0,0,cb79190d7e117b2165ef511634fe8d33c9e23cab24dd6ad00dc4efad8b756c7c,2024-11-21T09:47:26.523000 -CVE-2024-53345,1,1,b29b6abaf7fe0fe01a35e24d3254dc989494daf29457426767f85c2b65eb5a54,2025-01-07T16:15:35.777000 +CVE-2024-53345,0,0,b29b6abaf7fe0fe01a35e24d3254dc989494daf29457426767f85c2b65eb5a54,2025-01-07T16:15:35.777000 CVE-2024-5335,0,0,227008637fcf0f08540aa31f6f2f1e0a27300047ea0b90140042ff30c0f0094f,2024-08-21T12:30:33.697000 CVE-2024-5336,0,0,3be15ca705f47dea3ffc9a0dd73cdf82724f581c9671519a64e222f9d7a209cc,2024-11-21T09:47:26.713000 CVE-2024-53364,0,0,924e143b4294f3ffb491904ae2396d08e4637aeb46539cceee83f2ecfb2d4d99,2024-12-02T20:15:07.487000 @@ -270657,7 +270666,7 @@ CVE-2024-53450,0,0,35c5f2872561bc157223093101834ca44cd8e03e4dad5a58a6584da3319ab CVE-2024-53457,0,0,2a9d6ff9530514e1b1118f6cfb8ea3e80f964c7759c5b6fc65af26bdd6a25cf5,2024-12-10T18:15:41.873000 CVE-2024-53459,0,0,5f9e5f3a8b33fbe02bdd059bb8fe15cb2eeacdc4f602dd12944ee928044f080b,2024-12-02T18:15:11.123000 CVE-2024-5346,0,0,835e1b7230e6e33db8d8cf7bc9b64a0aa9f43b5b6335773933376ca9c2372d0c,2024-11-21T09:47:28 -CVE-2024-5347,0,0,de874d6aa2a2a8b66720e1c81529adf22617cbfacec3535c9a6e8a145e10f5bb,2024-11-21T09:47:28.127000 +CVE-2024-5347,0,1,0c5671c37266d4b6415334f49ff7f9b369d4764bc9323bdb81fdb5f456d61912,2025-01-07T17:37:36.740000 CVE-2024-53470,0,0,7e717d458d3e971476fce58f4e759acfb3653594788d9bb4f7ef6a8cad1dbc8b,2024-12-10T22:15:25.010000 CVE-2024-53471,0,0,dea70dfafbf7c115f6b9fc5aab8fa383b86b6c8d65d06c11e3049e5b3d3b885e,2024-12-10T22:15:25.277000 CVE-2024-53472,0,0,f62f01117567dfa980810b663addc9d4b9e324fc111266531f31ef2f0fb28372,2024-12-11T17:15:19.720000 @@ -270830,7 +270839,7 @@ CVE-2024-53797,0,0,0f15663ed81f303c311eda4c1e4733f8c9b6c22597eba45aad68c515136db CVE-2024-53798,0,0,dd15d9db7be990295567f0511fa2c3e51a57e6a70e8f9db78d34a77a51f00ebd,2024-12-09T13:15:40.930000 CVE-2024-53799,0,0,783da60a33ccbce78617be33a3c476d287119720767ee98d4405ce9d100a841c,2024-12-06T14:15:22.170000 CVE-2024-5380,0,0,226318c98a74a19f1dd2a14061de91ef6b8613a700730137544bc16df39ee24e,2024-11-21T09:47:32.550000 -CVE-2024-53800,1,1,60f2b1b418aa5af9bf8eb7e264f0747ee70d94d6038011b54f5154fa38aa6730,2025-01-07T16:15:35.883000 +CVE-2024-53800,0,0,60f2b1b418aa5af9bf8eb7e264f0747ee70d94d6038011b54f5154fa38aa6730,2025-01-07T16:15:35.883000 CVE-2024-53801,0,0,94bde297cc2eef951bc9e8d66d3d26a93b5e79f18c7ae9de872b0a80bde93680,2024-12-06T14:15:22.303000 CVE-2024-53802,0,0,d38c12f04c4095c1a6ac4f4dc30d15b9305c85ea7eb04aa1ddfb5bdeec10087f,2024-12-06T14:15:22.430000 CVE-2024-53803,0,0,3ee8313ec2c5826e6c44093bf2e19288a4ab5e01b17ba7838c8e2683c5a34992,2024-12-06T14:15:22.567000 @@ -270973,6 +270982,8 @@ CVE-2024-54002,0,0,7c5a00df1d470c32b9eac42d93309bb19614d9762fa0f049a771979bb9894 CVE-2024-54003,0,0,b632b439005206974a2b4ec6ab08a78e134e0c09d892996aec7289d7221f0377,2024-11-27T20:15:26.133000 CVE-2024-54004,0,0,5d94a9bc2fe383b10883d5f21fb711b04368ee28bef8377081c80a039d1c1dee,2024-11-27T19:15:33.723000 CVE-2024-54005,0,0,a1140344f7f7dfc4d3d4467b796a2fa8133c201f3d329efe99a74d57c08e17e6,2024-12-10T14:30:47.037000 +CVE-2024-54006,1,1,f55b666be5c6205269fabf5603b5f5423581db802e2ba8dafb0c2f1a67b21603,2025-01-07T18:15:20.080000 +CVE-2024-54007,1,1,8376f1766cf59438979920e8366ea38e85feeafb2ed31ba3c3ada639b999ac68,2025-01-07T18:15:20.240000 CVE-2024-54008,0,0,eea0fea8f522a304d841eaa6b0b75d4fade41407f80f4626ca71a3072a5c233d,2024-12-11T14:15:19.713000 CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f828,2024-12-19T23:15:06.887000 CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000 @@ -271146,7 +271157,7 @@ CVE-2024-54261,0,0,5352ee7590aa7abcc1191a751ff3624b070d86f69e57a3db157de2e7b4ef2 CVE-2024-54262,0,0,b1455d05bf98faaae40cbb5ae73c8a069df39dcdd5702501d93523a3217d456f,2024-12-13T15:15:30.347000 CVE-2024-54264,0,0,2917a24f44b5b5eb07fa8f3cbdd137898237078cf524d5d0f6a7ca94dd76141d,2024-12-13T15:15:30.490000 CVE-2024-54265,0,0,8b0241677d815a86c6e5c36435ae0e422966edb1ca23130a4486607e789a30ea,2024-12-13T15:15:30.627000 -CVE-2024-54266,0,0,d39039a4efec2c4bb03a14a66e28d5b139ce625cd543bff73d2539818dcc5fd1,2024-12-13T15:15:30.767000 +CVE-2024-54266,0,1,d444be4e1ee22dd451822fabc010f4ef86c2b038c294a565a8a8c51aef896700,2025-01-07T18:05:59.697000 CVE-2024-54267,0,0,76f7008cb7e3a38e8545f73bbc644c092c440137c92b5ce9caceadf7f166993c,2024-12-13T15:15:30.923000 CVE-2024-54268,0,0,2ce0a46606ea8570aabcf0f5ef556af89297e04399b9637bbdfc8644e181a39a,2024-12-13T15:15:31.080000 CVE-2024-54269,0,0,80ac095d31433aafabf7debefee962a6f6c2eac87daa457c3fe90f17fcc9678f,2024-12-11T10:15:07.790000 @@ -271269,7 +271280,7 @@ CVE-2024-54379,0,0,16a50aac9a81680417d12ecce6a04daaadbbc13793c010d89d4fd975b005c CVE-2024-5438,0,0,ffa2cf18257657249bf4324d169209d5b77afdfcf36ba5cbe26b4a5e29aa156e,2024-11-21T09:47:41.163000 CVE-2024-54380,0,0,4efb6eedb1f7a631f15aeb34a01cef94ed5b1d0cac872f478c68e429940567ec,2024-12-16T15:15:12.123000 CVE-2024-54381,0,0,b624021adc9f877c5bf65ba0a9f9f00d42a1d908d3acdaab0d6e177c085085db,2024-12-18T19:15:11.320000 -CVE-2024-54382,0,0,822ab1c8c9fc5753ede8ceaa193b4959d01c905c3a74274a660af7a6ce63706e,2024-12-16T15:15:12.313000 +CVE-2024-54382,0,1,df88bcd4d759d80bff5d24f0a9b4cbd4a06ab468f7d0c9500e321cdcc546c1e6,2025-01-07T18:00:04.237000 CVE-2024-54383,0,0,d9bfedfc2e8a2efef14a6e748090631d27224f3d58b269d30f5ce133ddb37aa1,2024-12-18T19:15:11.467000 CVE-2024-54384,0,0,f30b61b2ceda0ddf4db488bacd44d3ce31f793022483536b90f9936711f035ee,2024-12-16T15:15:12.497000 CVE-2024-54385,0,0,4c9245e744e6a17a20469e5e23858f5ad7d2906ffb71b966d06957db234901d6,2024-12-16T15:15:12.653000 @@ -271423,7 +271434,7 @@ CVE-2024-54750,0,0,a2b9bd793ac60105835f796550f4eca54ad7139b40ad2fdf283a28d5ab764 CVE-2024-54751,0,0,1362ae63d46fa3e6e13ddf6e48994d99d3189782d67a09cf0bde552f8a9a1b0f,2024-12-11T16:15:14.910000 CVE-2024-54763,0,0,569e1b003ff4063f8b2d3c6abf3b92c3cfcf659be7b3e8d47a113001dd609ca8,2025-01-06T22:15:10.737000 CVE-2024-54764,0,0,209c75bf142c690be0633df50e11eea12bb8b77d1b813f37310e8ad2ef7f5122,2025-01-06T23:15:06.510000 -CVE-2024-54767,0,1,7c02cf0b0d6cbdcad4d274fa0bc8d056590e80886a47139f828b2d63cc3bf859,2025-01-07T16:15:36.157000 +CVE-2024-54767,0,0,7c02cf0b0d6cbdcad4d274fa0bc8d056590e80886a47139f828b2d63cc3bf859,2025-01-07T16:15:36.157000 CVE-2024-54774,0,0,4ed84230e45b966235391401edd82584405ef683a3e2fc4ff18ea7ccdbfb6480,2024-12-28T18:15:10.397000 CVE-2024-54775,0,0,3fdaf8fe1f78335459cdc17721da7bdc51023f16b45ae3c005b68536d3244569,2024-12-28T17:15:07.733000 CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000 @@ -271477,10 +271488,10 @@ CVE-2024-5497,0,0,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20 CVE-2024-5498,0,0,9ecbba4511623233a33c3c81181005b0976c38a133da4d6811e96531fd97f158,2024-12-26T16:43:44.433000 CVE-2024-54982,0,0,cfd88a096d00b833d6272b1bd199993ae32049d7bc6efe9c3a455db48be861e0,2024-12-31T20:16:07.193000 CVE-2024-54983,0,0,149f3772b456c1ff99a44fd44b0ae178f010b2926690711624e998da7ad367e4,2024-12-31T20:16:07.363000 -CVE-2024-54984,0,1,3c6b13090909d3934507dc7f38f4e66c664045495e844f3883a0db8064e98820,2025-01-07T15:15:10.720000 +CVE-2024-54984,0,0,3c6b13090909d3934507dc7f38f4e66c664045495e844f3883a0db8064e98820,2025-01-07T15:15:10.720000 CVE-2024-5499,0,0,bbe4dd69894f0f98fba609f59dfd6e7af7f9cec1f980c4939ff30b774a53a4b5,2024-12-26T16:07:06.693000 CVE-2024-5500,0,0,280f34db2c8783872a68d6daa217e3e1e4614074bb8e8b0a741315b28d98613a,2024-11-21T09:47:49.373000 -CVE-2024-55008,1,1,45f19479e0e8c65fbf11eff6cbb408ee7d465fc2df91642006d13b8678e33436,2025-01-07T16:15:36.337000 +CVE-2024-55008,0,0,45f19479e0e8c65fbf11eff6cbb408ee7d465fc2df91642006d13b8678e33436,2025-01-07T16:15:36.337000 CVE-2024-5501,0,0,c16d3f86bb6f5e02795073b49cb84dc8c7e7a5718a6fed025ea914c4721b4cad,2024-11-21T09:47:49.573000 CVE-2024-5502,0,0,5a18d45bd85121e2ecc06d05133613fd7aff163eb02902343f6ea41930ef607b,2024-09-12T21:05:37.880000 CVE-2024-5503,0,0,9845e42fb1624974feec370d0d7a831f8d27d3205ac47bd2622c9c03ded76cc7,2024-11-21T09:47:49.763000 @@ -271543,9 +271554,14 @@ CVE-2024-5535,0,0,b70b433a28b7d7ab0e1d2beceba590e517cc88af55d524db84cbd7ff3afa5e CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c0e,2024-11-21T09:47:53.307000 CVE-2024-5537,0,0,dc964262ed4087ff313c4be3be100753a858d893c6319a531383572e591004b1,2024-05-30T17:15:34.583000 CVE-2024-5538,0,0,349018b8a831720930f224f86428ace57b32dfb3177832784fb8b5e53a9e5993,2024-05-31T11:15:09.923000 -CVE-2024-55407,0,1,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402acd89,2025-01-07T16:15:36.480000 +CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402acd89,2025-01-07T16:15:36.480000 CVE-2024-55408,0,0,ab1bcbfb27fd1483d3ffbbb7fd6604f52d3a36813a1b039bd2c2b2c31076a008,2025-01-06T19:15:13.010000 CVE-2024-5541,0,0,f9b4d455e6b62fc87b5177b190c5e5d55cffd60f56e01c7f957c7d36f3e08c46,2024-11-21T09:47:53.453000 +CVE-2024-55410,1,1,f21bc15ce65427de3d1568f279150edcc6469479003174eee745e0690e31a73c,2025-01-07T18:15:20.387000 +CVE-2024-55411,1,1,1aaefe335c6784c1c51d968334cc18ae747aab41b366982bf94b394b831a6ba0,2025-01-07T18:15:20.543000 +CVE-2024-55412,1,1,17b18ba76fae98112f34a2a804fb362110fc4f134e23a208e67528a65fb8dd1c,2025-01-07T18:15:20.700000 +CVE-2024-55413,1,1,b1d11b4cd0e66963e957801a3a382988999f51eced77f066473c6ac9888be3ce,2025-01-07T18:15:20.843000 +CVE-2024-55414,1,1,48b4ac1f9b6828b07d73736164a0e3f329787333258f40cc677ae94cda348437,2025-01-07T18:15:20.987000 CVE-2024-5542,0,0,6f204123d7eb6582297f3ed2f1f9284859b42e6e6e67e32f4ec293ca8971e5c4,2024-11-21T09:47:53.577000 CVE-2024-5543,0,0,a26f2d14789d49017a49269cf3e4b4468656a016d744676df971b6df226be4f0,2024-11-21T09:47:53.697000 CVE-2024-5544,0,0,9d691e1e8372bdc434d572825f303cd1b0a2983a0161dea14c330331f38ec0b0,2024-11-21T09:47:53.813000 @@ -271588,10 +271604,11 @@ CVE-2024-55546,0,0,942b232afb25307bd1bbb9171d407a64efb6124e7535155a6616308769a30 CVE-2024-55547,0,0,9d23528e3e5c1a7b1f76563e1d474f90d9913c0e87c6f8fd8a14829ed85aff3d,2024-12-10T20:15:21.527000 CVE-2024-55548,0,0,b89e0a622aeff00dfd6cdc1dc1884c1956fa3e7da287ae36b11ba4d60647d05d,2024-12-10T20:15:21.643000 CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000 -CVE-2024-55550,0,1,f14b09989fc33e9668bd77f32e52a61daf63a823657985b5bd0cda5251e19e1b,2025-01-07T16:15:36.660000 -CVE-2024-55553,0,1,3bc316f0af4b80bc58ae910e6172da9ff5010fe0b778c5270df43d1041706470,2025-01-07T16:15:36.840000 +CVE-2024-55550,0,0,f14b09989fc33e9668bd77f32e52a61daf63a823657985b5bd0cda5251e19e1b,2025-01-07T16:15:36.660000 +CVE-2024-55553,0,0,3bc316f0af4b80bc58ae910e6172da9ff5010fe0b778c5270df43d1041706470,2025-01-07T16:15:36.840000 CVE-2024-55554,0,0,09e3cdaa4a820daeb6598bb5a8faaf533e66285f3e6a4797b593c193d2a0933a,2024-12-17T17:15:09.843000 -CVE-2024-55556,1,1,f6240e3c75d02dffd25d8327c36b48f04ddfbf6dc1d3897c46320c15b6f0b8d9,2025-01-07T16:15:37.017000 +CVE-2024-55555,1,1,92ec6348d3aeb1444c67b3369f1f1371c489738160cc1d5ac8a1f9d7f747d7b4,2025-01-07T17:15:30.503000 +CVE-2024-55556,0,0,f6240e3c75d02dffd25d8327c36b48f04ddfbf6dc1d3897c46320c15b6f0b8d9,2025-01-07T16:15:37.017000 CVE-2024-55557,0,0,1c44f970be9c9162e2fd5fa3f9e1778bc69c31c3d5707dcbd0caa2e430754ba4,2024-12-17T16:15:25.900000 CVE-2024-5556,0,0,f573f07f74091c9ef49ab63e55c790d8f661c071a22a95c82ecfdf6c6886287c,2024-08-27T14:36:53.273000 CVE-2024-55560,0,0,34631484c4ac18e7385d5b08b3c8f4829d4f28112bef5e467e27e8892a961b13,2024-12-09T16:15:22.750000 @@ -271783,7 +271800,7 @@ CVE-2024-56052,0,0,9a44770d39da7be425571a9350723d3d9e09d773bb8c96e5f144a39458c2f CVE-2024-56053,0,0,026aacd8a5b9ca9d06f79c80ecce4ffac76991d6422ee09c875a778f742e2ca8,2024-12-18T19:15:13.003000 CVE-2024-56054,0,0,4ecf044ccaa288170eea4018528a257091f569e9668667ecf092c6eee1833a59,2024-12-18T19:15:13.137000 CVE-2024-56055,0,0,1e85ee23c3361383079345b69160198a31bbded4d1fcb235bf4bc7a0356b4c45,2024-12-18T19:15:13.263000 -CVE-2024-56056,1,1,8d14785eb528e82368e3b3c93b1f879b67915ddd42adea1eee4b741c53e85318,2025-01-07T16:15:37.140000 +CVE-2024-56056,0,0,8d14785eb528e82368e3b3c93b1f879b67915ddd42adea1eee4b741c53e85318,2025-01-07T16:15:37.140000 CVE-2024-56057,0,0,52ab628951e1d719b316ba7abe1325c61108c1e1b94190c530d208ac2916ed0a,2024-12-18T19:15:13.417000 CVE-2024-56058,0,0,acc256b72c6ddf178feafe627688e78f25a5d2961313a94b4eed1089cb116425,2024-12-18T12:15:12.087000 CVE-2024-56059,0,0,54cd8436a78994ce8bff57ca5e507720ff26093eb1124abb1e7cdd3e2c39fdfb,2024-12-18T12:15:12.237000 @@ -271910,7 +271927,9 @@ CVE-2024-56266,0,0,265a3e77ffeab76fe861882c5717b3b9f7e42687ff2745ec11b3fa63a202e CVE-2024-56267,0,0,1a857d7bf07f7bdad7247fe75bbc7603553ef3ae2a1cef53f9569ee0b2c25d2f,2025-01-02T12:15:28.617000 CVE-2024-56268,0,0,6c5e42fafa8d0d431aa18ee0814c13c9e3020d74b57b5ddd14fbebc4b330873e,2025-01-02T13:15:08.120000 CVE-2024-5627,0,0,4f3ee87aef2fc9763c8caa5864c6f83c1e8820b485bf86b137197706dbea80f8,2024-11-21T09:48:02.683000 +CVE-2024-56270,1,1,df13454e72976bfa8d5a934269f214a22dc7ca6db8fdc5b423c4e419c271bb6c,2025-01-07T17:15:31.140000 CVE-2024-56271,0,0,df93b7b8c223fda7db8cbb4a8cc54558145247fb67ea138a0710e62e8e911ccd,2025-01-07T11:15:08.633000 +CVE-2024-56272,1,1,c4dbe487d0cac00b9007bfec86295aaafd9dbe01ebce3e80cbae94fe35f40618,2025-01-07T17:15:31.287000 CVE-2024-56273,0,0,70a23a8ba1d0ad54c61e3bfa45bff3ffe0599c3be68f5ed823651c9ddf17a51a,2025-01-07T11:15:08.800000 CVE-2024-56274,0,0,91313746e73dee537f4f972ba62324c78971b1a73469f61e949c7f1c2409fe09,2025-01-07T11:15:08.960000 CVE-2024-56275,0,0,2793727a8fefb5fd80a40f3d275862084bc0f436c8be3b4ff920f614e5ec8751,2025-01-07T11:15:09.130000 @@ -274634,6 +274653,7 @@ CVE-2024-8357,0,0,1d889408be1770076ad81711236c2a891b36406e9fc3a925e957f690d3e9af CVE-2024-8358,0,0,5fb394033ecc4990c585e13519c166d42fa3ff92798bd5136ede9dccb7b4708d,2024-12-11T04:00:11.233000 CVE-2024-8359,0,0,d54d10f5fe9164e60ec13d6bc33fcba551ad8ecc6982ba256a03e2194f9ccecf,2024-12-11T03:57:48.243000 CVE-2024-8360,0,0,ed6b27add01a92e9b19489ef7584e5d2cb3487d850b912f3eb15873fc81ef9c2,2024-12-04T19:32:21.703000 +CVE-2024-8361,1,1,08d81eea997bee8fc0bf336f88e65ae7c6477453ff150c8e91d874a8fb0dc127,2025-01-07T17:15:31.420000 CVE-2024-8362,0,0,6dbce73a6371abf2515922ae5bca256741ceef67962b22664e0b4f9994cda556,2025-01-02T17:37:05.167000 CVE-2024-8363,0,0,31dc15c8efef4d6babfe272b0bb3432c061f6d6e93807b938d15de08fc21d43f,2024-09-11T16:35:05.653000 CVE-2024-8364,0,0,627f8b2156971d2679081614445e8377234b8cf137137dc8007755116bce395c,2024-09-25T15:08:08.503000 @@ -275047,9 +275067,9 @@ CVE-2024-8849,0,0,0734151af4af8138bcdc00f593bbe5da7ce0eb57042fd20edab1406815b87a CVE-2024-8850,0,0,6a79107655be2c071c14b8c23b6123b1889673d27ef57475d913bb60daea2138,2024-09-25T18:49:53.397000 CVE-2024-8852,0,0,30058a9af3dd7a32997e52bc92060be7a6e41d470611028e31f3fcdaf7d3bfbb,2024-10-25T21:20:11.410000 CVE-2024-8853,0,0,8a2f5d1c05cc9b3a3da315856bc11b5532339e2e37b2d0099ab6a7be83232255,2024-09-25T17:49:25.653000 -CVE-2024-8855,0,1,802999a70966b0b71e612ef66e31228db9820bd8dfec7895b3f8da0854e74b69,2025-01-07T16:15:37.873000 +CVE-2024-8855,0,0,802999a70966b0b71e612ef66e31228db9820bd8dfec7895b3f8da0854e74b69,2025-01-07T16:15:37.873000 CVE-2024-8856,0,0,9673197f029df18178a4a1f715fc7a70f5066ac5587142a3b689de66b2851e04,2024-11-21T16:15:27.633000 -CVE-2024-8857,0,1,16278ff34750ee56afd95e32985c0c6a98ffcbe3092c1e921c57f4b64e713d3d,2025-01-07T16:15:38.023000 +CVE-2024-8857,0,0,16278ff34750ee56afd95e32985c0c6a98ffcbe3092c1e921c57f4b64e713d3d,2025-01-07T16:15:38.023000 CVE-2024-8858,0,0,ad81041fe495a196e9577347167ecfba5a083a17b0628925776a883bde8de8f7,2024-10-02T18:41:29.067000 CVE-2024-8861,0,0,b142f8cdfb1b389115184b8221537238e047c24179b6739e896f736e2c2081f9,2024-10-01T13:41:27.213000 CVE-2024-8862,0,0,1a8961f8693547b26bd383d0fe2e24176b66436d4aff5322938219edf5b87168,2024-09-20T15:47:10.697000 @@ -275664,7 +275684,7 @@ CVE-2024-9633,0,0,464719aabf82d4c51da737aba0ef58dd3d7e243c61253713abe30460682816 CVE-2024-9634,0,0,7b5dabf15ae54de4daab48b64d2e27f430eb55d7ab2217a5e19376e8531d6f32,2024-10-16T16:38:14.557000 CVE-2024-9635,0,0,9f77fd7ccc96fa6d4c00f44465f9f4a309bfc7a2ae1c26c3627ef0449f3c9e02,2024-11-23T07:15:05.027000 CVE-2024-9637,0,0,0f4d16db68000f66da50bae84c41a0f228004e7436fcad95d0969905f72e932a,2024-10-28T13:58:09.230000 -CVE-2024-9638,0,1,07713ca86d99b56fc460dcddc9f1d60133310c7d0c8406d6771a8f56af4a079c,2025-01-07T16:15:38.170000 +CVE-2024-9638,0,0,07713ca86d99b56fc460dcddc9f1d60133310c7d0c8406d6771a8f56af4a079c,2025-01-07T16:15:38.170000 CVE-2024-9641,0,0,1af3f797b9845e72a30c1ec84ed9cc9350f350e1f0f00ee15b2f0dce5766f023,2024-12-12T18:15:28.297000 CVE-2024-9642,0,0,e785c942bfa480a7574dc49561aef989c60cf4146a0b8eb964f23c4e5169b91d,2024-10-28T13:58:09.230000 CVE-2024-9647,0,0,fcdcaf92364c0d2df50a52f6773b32a5c3346fda1bdd5380b00168c49162a8b6,2024-10-16T16:38:14.557000 @@ -276013,22 +276033,25 @@ CVE-2025-0230,0,0,da56c380fbd78e0c1f33c2e3a59c91c27f8ad01a46dc235a12db28093892ee CVE-2025-0231,0,0,73ba5b334ad5db7bd7f18e0277fa8cbe48a99916bc557dd1170e5fb52d78d868,2025-01-05T22:15:05.540000 CVE-2025-0232,0,0,bbb1f8dd03cca1cfde501a9cda5da15f541da213c05bfee0e291ed634d921d4c,2025-01-05T22:15:05.767000 CVE-2025-0233,0,0,5ed4a33582b9d256ec10fa7176aad6ab5c25b941c467fc43ba8899ab1d384b8a,2025-01-05T23:15:07.320000 -CVE-2025-0237,1,1,2c3434970a16bec4392c3f4bed6767e2925d87ab842525d3b26b205dc283cf1f,2025-01-07T16:15:38.323000 -CVE-2025-0238,1,1,e82327f2f3ebe1b24a464a1a04ae8d05e90f55b42a3f025ea84dc43f52b25878,2025-01-07T16:15:38.470000 -CVE-2025-0239,1,1,afe9eebfe4b4296706d9ce7f0682dd4ed3f5045335b08cc44d37cc5438c37472,2025-01-07T16:15:38.563000 -CVE-2025-0240,1,1,e96fcd5423b4d2b2ff7a765d0bfae31256c7b6e21ad279b2a7a9221a4d70de9d,2025-01-07T16:15:38.663000 -CVE-2025-0241,1,1,de4460d398e9a978698b951541d871507b0033d391ba8312f623449de07c64a9,2025-01-07T16:15:38.767000 -CVE-2025-0242,1,1,9b431442a04718d3c03b715641e5690877e9163ddca776bb88f8cd458d487a6a,2025-01-07T16:15:38.860000 -CVE-2025-0243,1,1,444567568d81e3ebf7b0ef1744bbe79078a7f79e5d87b28594b3b341799213d8,2025-01-07T16:15:38.973000 -CVE-2025-0244,1,1,da7a2b514c4830f709716da93c7d0ce9571dbe62ad6b385d46d804ff7e516618,2025-01-07T16:15:39.073000 -CVE-2025-0245,1,1,7d1c15830a35f014af9d006a8c36ef0ada0ae949c06344e8358c104b93e5a2b3,2025-01-07T16:15:39.167000 -CVE-2025-0246,1,1,74b6776ab53ef7efb7befa6d5e4e3be744a879e5642872b470060da8ae784144,2025-01-07T16:15:39.260000 -CVE-2025-0247,1,1,397c23031a5d2c57816f34c6269a1946e0c796fab05b8f5ddab685e73b49be75,2025-01-07T16:15:39.357000 -CVE-2025-0294,0,1,e5d86f9b17bdfc744e2441f17af376b91232f83a0091836e1403d549321b0bdf,2025-01-07T15:15:12.113000 -CVE-2025-0295,1,1,52a16028421d06d344a294c38baeb65e7eade91eddca5850ff08cb460a814ef0,2025-01-07T16:15:39.460000 -CVE-2025-0296,1,1,ef99994aa0e927283601f299ff2a2a7b6828140dc06395bd45961df4e93495db,2025-01-07T16:15:39.673000 -CVE-2025-0297,1,1,e6df0dbc25b69f65f6585e2723e6f83d60a4cc3da33516aa4da5024622d55482,2025-01-07T16:15:39.887000 -CVE-2025-0298,1,1,035368a53219841b97c48e0c494f4c144d1c514f2f8ac3997e14062ac72f07c8,2025-01-07T16:15:40.167000 +CVE-2025-0237,0,0,2c3434970a16bec4392c3f4bed6767e2925d87ab842525d3b26b205dc283cf1f,2025-01-07T16:15:38.323000 +CVE-2025-0238,0,0,e82327f2f3ebe1b24a464a1a04ae8d05e90f55b42a3f025ea84dc43f52b25878,2025-01-07T16:15:38.470000 +CVE-2025-0239,0,0,afe9eebfe4b4296706d9ce7f0682dd4ed3f5045335b08cc44d37cc5438c37472,2025-01-07T16:15:38.563000 +CVE-2025-0240,0,0,e96fcd5423b4d2b2ff7a765d0bfae31256c7b6e21ad279b2a7a9221a4d70de9d,2025-01-07T16:15:38.663000 +CVE-2025-0241,0,0,de4460d398e9a978698b951541d871507b0033d391ba8312f623449de07c64a9,2025-01-07T16:15:38.767000 +CVE-2025-0242,0,0,9b431442a04718d3c03b715641e5690877e9163ddca776bb88f8cd458d487a6a,2025-01-07T16:15:38.860000 +CVE-2025-0243,0,0,444567568d81e3ebf7b0ef1744bbe79078a7f79e5d87b28594b3b341799213d8,2025-01-07T16:15:38.973000 +CVE-2025-0244,0,0,da7a2b514c4830f709716da93c7d0ce9571dbe62ad6b385d46d804ff7e516618,2025-01-07T16:15:39.073000 +CVE-2025-0245,0,0,7d1c15830a35f014af9d006a8c36ef0ada0ae949c06344e8358c104b93e5a2b3,2025-01-07T16:15:39.167000 +CVE-2025-0246,0,0,74b6776ab53ef7efb7befa6d5e4e3be744a879e5642872b470060da8ae784144,2025-01-07T16:15:39.260000 +CVE-2025-0247,0,0,397c23031a5d2c57816f34c6269a1946e0c796fab05b8f5ddab685e73b49be75,2025-01-07T16:15:39.357000 +CVE-2025-0294,0,0,e5d86f9b17bdfc744e2441f17af376b91232f83a0091836e1403d549321b0bdf,2025-01-07T15:15:12.113000 +CVE-2025-0295,0,0,52a16028421d06d344a294c38baeb65e7eade91eddca5850ff08cb460a814ef0,2025-01-07T16:15:39.460000 +CVE-2025-0296,0,0,ef99994aa0e927283601f299ff2a2a7b6828140dc06395bd45961df4e93495db,2025-01-07T16:15:39.673000 +CVE-2025-0297,0,0,e6df0dbc25b69f65f6585e2723e6f83d60a4cc3da33516aa4da5024622d55482,2025-01-07T16:15:39.887000 +CVE-2025-0298,0,1,ec923ed4b9b6afa6228d656ddb0c601f5ebbf31d02abf4f38a99c8dda70d2f64,2025-01-07T17:15:31.770000 +CVE-2025-0299,1,1,20f18cca613c06c41b7b250e7744fa9512af312dbb8fb59402a521c1da06c33a,2025-01-07T17:15:31.903000 +CVE-2025-0300,1,1,6462b093b202cdda5c643638789beb08104cb14d8ff95eb1f2f740fecb0f8630,2025-01-07T17:15:32.090000 +CVE-2025-0301,1,1,db7e09db06a3c89075ef99c6e0773ce8d9b6391802870d788b13b4dc1d994dbc,2025-01-07T18:15:21.460000 CVE-2025-21604,0,0,ec728601eba6bd539d6daf316c2c18ea930a896bd5f0099ef67fb1e9d57f3d64,2025-01-06T16:15:30.927000 CVE-2025-21609,0,0,46e3af17bfffe98fbaec33d01272d23877fbd06c6cc0e4a79625fd3beabb7e1e,2025-01-03T17:15:09.147000 CVE-2025-21610,0,0,803b1c12bbaab2c87bcfc5865cced8b68fa26746eb8c056e6bba01e1200224ac,2025-01-03T17:15:09.290000 @@ -276037,18 +276060,19 @@ CVE-2025-21612,0,0,9fd30e827023ec934479d337fa9a8b1d25e05479de4a6b330575dbf744f4b CVE-2025-21613,0,0,450c2846ee71577b9830e8e719c31e155c37244e65ba9e77e5a01008786d8ec2,2025-01-06T17:15:47.043000 CVE-2025-21614,0,0,aabe0db280dc9dc10bd490c84810b1f616f5219669182912c62b49c623ecf63b,2025-01-06T17:15:47.310000 CVE-2025-21615,0,0,fb1d1b59e0795bd682134b6fa4b1fdae854aaf92d872a6fbaa412cd39ddeff25,2025-01-06T17:15:47.510000 -CVE-2025-21616,0,1,574f280ca4e262b9cdf785b3704051d4db7363eefe89b70ebf0256101acb2498,2025-01-07T16:15:40.390000 +CVE-2025-21616,0,0,574f280ca4e262b9cdf785b3704051d4db7363eefe89b70ebf0256101acb2498,2025-01-07T16:15:40.390000 CVE-2025-21617,0,0,1b5674c17538c133c12a05d0a22a69c96dc39356013d3a7f6803ed67351947a8,2025-01-06T20:15:39.453000 CVE-2025-21618,0,0,4c20ae4fc5c8b4aacd9f26687daa5f4af9af83a3837718673c9fc7ecd24be6c6,2025-01-06T17:15:47.660000 CVE-2025-21620,0,0,66289b3b3f28df54a495a49470b309f007a7b7fd72e39a3c6fd58a9e688ab03c,2025-01-06T23:15:07.770000 -CVE-2025-21622,1,1,1e85a305aaeb3d751c0f8dd8b35ba1c3ec71888a5305a62fa31520e33aebe572,2025-01-07T16:15:40.510000 -CVE-2025-21623,1,1,fb9e2454631eeced07f7e09182714cb11ec08c587b53d0458a2a22f56e6a9f58,2025-01-07T16:15:40.690000 -CVE-2025-21624,1,1,1f3abe6867e68bce9b05dea4977e41838d9ee0307f6b472f6d587e372663f92d,2025-01-07T16:15:40.853000 +CVE-2025-21622,0,1,6c5785ebf77d1798b874aaffe451a58c4a37257af0382e9b593172ad9a04e2cc,2025-01-07T18:15:21.703000 +CVE-2025-21623,0,1,6087933d996aad8edaafac7f0dbca82dce0a66add1f565d4e48b576d3a77cbb8,2025-01-07T17:15:32.313000 +CVE-2025-21624,0,1,48317da35eed5453ecdf02e6a373b353bc1bb2bc0793e255b08a0ed1235e3ac9,2025-01-07T17:15:32.417000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 CVE-2025-22261,0,0,b64f32ab7c14edb8b70371073baa276f94f41977fffad6128d5b8c7f32ae4fb7,2025-01-07T11:15:13.290000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 CVE-2025-22293,0,0,bd03641f797a3639dbea19e70261d5f3ef47716330e1253c8622562a786a5f2c,2025-01-07T11:15:13.473000 -CVE-2025-22294,1,1,a0564480f329fcd7c0e66762a6817c8b66e311ef88bcaa9ea4b0a25b2b9b8c80,2025-01-07T16:15:41.137000 +CVE-2025-22294,0,0,a0564480f329fcd7c0e66762a6817c8b66e311ef88bcaa9ea4b0a25b2b9b8c80,2025-01-07T16:15:41.137000 +CVE-2025-22296,1,1,759024dc281b7a918cf27de1ec3629f142320bc454cf6ef32a8190d71b2c339f,2025-01-07T17:15:32.520000 CVE-2025-22297,0,0,9977305a0d6e75d824a101b4298426a66f5e4c76cfe0c4871bbf38350398707d,2025-01-07T11:15:13.630000 CVE-2025-22298,0,0,8bc5151a6942224b93d58d09b54219f124b26cf650100c5c624298b6e94661bd,2025-01-07T11:15:13.783000 CVE-2025-22299,0,0,c413e7372a98636798485d615adbccdf818206e57405b9ae93b2ac23848684e5,2025-01-07T11:15:13.943000 @@ -276058,12 +276082,14 @@ CVE-2025-22302,0,0,9b40c40d15063e6cb76e8e33a9f975cd91b38be16047944b37a967c977abf CVE-2025-22303,0,0,7f3990123a03c4c027b93344f96b18488d25683c34566288a5ac2e49799c51c3,2025-01-07T11:15:14.563000 CVE-2025-22304,0,0,dc86decb897d8dcb17d6736b8050d3d147c3f346bb65a4bf4381bfc3ce627059,2025-01-07T11:15:14.740000 CVE-2025-22305,0,0,f80b09c32552f5e5a6f1c3abe88e565f14882f9a6fcd2231897d49d487ea9c83,2025-01-07T11:15:14.907000 +CVE-2025-22306,1,1,ae136ad221e1043a964eff9f5b0e44c3146bac4ea56d0d79bbdbf2a5266a8985,2025-01-07T17:15:32.663000 CVE-2025-22308,0,0,3082a330a5c2f55a8195387df80671bf625d85613ddf1f7720a63d796beb37c1,2025-01-07T11:15:15.043000 CVE-2025-22309,0,0,1d83d809e311c9f86146142b11ab3c2ee137d4e51c296bdf1e9908e49bfd5e64,2025-01-07T11:15:15.190000 CVE-2025-22310,0,0,611b8cef352c958ab385e33339cb21ae50588ba907bd8686700e8a0f08828219,2025-01-07T11:15:15.320000 CVE-2025-22312,0,0,864b53e49a0caf0c7477fbc1a622314be233df9866c8bc743a5d17b3ab7c6f47,2025-01-07T11:15:15.480000 CVE-2025-22315,0,0,88d7cb14e835cbfb35184951d4d2a01276f091d2cdaf1e147fca6e420a388c7e,2025-01-07T11:15:15.627000 CVE-2025-22316,0,0,1d4f03291501adc4e7db2e57a09c519ced1e62121cc59f1dd048002a13f21c3d,2025-01-07T11:15:15.763000 +CVE-2025-22319,1,1,8dd7b737df78f4bf7802f660e60b5c48ed6d3989c739f6f6a383e6a420d195cf,2025-01-07T17:15:32.810000 CVE-2025-22320,0,0,39971b0eba2ae0a7960757327aa5a1f311a765451f9b5f47f1b68ee3273616b0,2025-01-07T11:15:15.910000 CVE-2025-22321,0,0,4c47cbd5a81bbeb1a3ce3278f8eed6d123ea975216894c1911cb3a468c9f05d5,2025-01-07T11:15:16.073000 CVE-2025-22323,0,0,cdedb294b6295dcc011f80ea22408485a3314d32d768478ea6a9ed25cd479083,2025-01-07T11:15:16.297000 @@ -276073,24 +276099,29 @@ CVE-2025-22326,0,0,55fcc2ec90ca2a48f1ecf2e7ef15d685d0e234288e1450bdf5945ada1cab9 CVE-2025-22327,0,0,94ae0a0af4015641e039cb88bbf4a5342f924e137904074a584ea13bae54ad53,2025-01-07T11:15:16.870000 CVE-2025-22328,0,0,85e6710d10db6ae0f5bd4808efdfb16540414aacd5b21f737702fea8c3f3f3b6,2025-01-07T11:15:17.020000 CVE-2025-22333,0,0,9076c8d41b6efd0e0fd9421ac7e36825af266ebb1d92a228e7e9cdde0a09d000,2025-01-07T11:15:17.160000 -CVE-2025-22335,1,1,7b6c88c7f724973f8b5d10f9481d7ef4194a9913c64a19757342a49b449698c6,2025-01-07T16:15:42.703000 +CVE-2025-22334,1,1,8e60bcaee158fd51d60c9a3859250bdbfa79c9dcca3ca723d148b2a899a99369,2025-01-07T17:15:32.953000 +CVE-2025-22335,0,0,7b6c88c7f724973f8b5d10f9481d7ef4194a9913c64a19757342a49b449698c6,2025-01-07T16:15:42.703000 CVE-2025-22336,0,0,d1d30c72fb6e01dc20afc043a552806c00e06e487af20ad9dfbaf9607a442c8a,2025-01-07T11:15:17.313000 -CVE-2025-22338,1,1,7386260298494eb42e950f1f880bf8ae70e10350f68ba2f5b8af057495330fac,2025-01-07T16:15:44.117000 +CVE-2025-22338,0,0,7386260298494eb42e950f1f880bf8ae70e10350f68ba2f5b8af057495330fac,2025-01-07T16:15:44.117000 CVE-2025-22339,0,0,771cfd61a8b5d752aa38f63f03d13ecf4a4d9126ac8095ef4007c48756aefabd,2025-01-07T11:15:17.463000 CVE-2025-22342,0,0,063a12927989c01da7ad06ed778a17254bdc2f246dbbcfb9d1a331dab7385b47,2025-01-07T11:15:17.610000 CVE-2025-22343,0,0,a01cb6c83acf422bb85038c7e3d12905550105cbaa3bde139d47adcc60f7e94e,2025-01-07T11:15:17.743000 CVE-2025-22347,0,0,b23f9601774be508b95375b043d031713941d78a35e42f0b11cd23293672f811,2025-01-07T11:15:17.897000 CVE-2025-22348,0,0,86e2244a5ffc25b4844fe28b25003a18e5b493a92b7075a4184650958446241b,2025-01-07T11:15:18.037000 CVE-2025-22349,0,0,1aac443b538c01953d14a1490dcb4b090d3357b772a15bb29d022c3f9880c993,2025-01-07T11:15:18.183000 +CVE-2025-22350,1,1,f6384c2bb654cfdc089567a22466aa0b901f518f50760ff7d208a39363f21e1e,2025-01-07T17:15:33.093000 CVE-2025-22351,0,0,850cf70aa8b27015ce532cecc7f0819503b3dd39321b8093c7d78fe3fb290254,2025-01-07T11:15:18.330000 CVE-2025-22352,0,0,77c72d08304a1f4a828a4db852ee618f0ac94237ad547f3fa3c67bb38390eea4,2025-01-07T11:15:18.527000 CVE-2025-22353,0,0,bb13d32958cb020a5d38b41c167cac622c401d6dd92bed3b5262ff1ec4b962d5,2025-01-07T11:15:18.693000 +CVE-2025-22354,1,1,a287c4cbcd18ae3f4a8063018001df7da0a271ef5be0f4f8e2c4ffadb2c93302,2025-01-07T17:15:33.230000 CVE-2025-22355,0,0,7fb49003033f48622ee177ed3064a841afeb8f3b7923595e3ceb552e3c7193b9,2025-01-07T11:15:18.857000 CVE-2025-22357,0,0,147c0fa518b43fbbeedf81bdce042c347d77b134bf6606621324ad2a82888239,2025-01-07T11:15:19.013000 CVE-2025-22358,0,0,dc1be20fb09e74a2611eb7051b2d21fd1f1d91ae5c82de9f69ea7f312ec9287e,2025-01-07T11:15:19.167000 CVE-2025-22359,0,0,11db53ae6023dbca41854e1a04c18ab114bd8d0c5c79981bba4090ad1735197c,2025-01-07T11:15:19.310000 CVE-2025-22362,0,0,f2c1c84b7d03553f8071ba09037dd1ff504eab870b6dc98d49037cbeeba451a7,2025-01-07T11:15:19.453000 +CVE-2025-22363,1,1,9f7b898386cda8ee09a75c7b5770220c6d443164e4a4258e07c36b540b5d907e,2025-01-07T17:15:33.377000 CVE-2025-22364,0,0,30da29bd1c8315e53dffcf2832952f80fef5aba5790c2ba343b9edf8659a4437,2025-01-07T11:15:19.600000 +CVE-2025-22365,1,1,83a5bd41bc238768f90c95f610a8a0ddd456ed7dd042625fb9e911cf5f20b4a6,2025-01-07T17:15:33.510000 CVE-2025-22376,0,0,5718c706cab54399c824e81247fa8725e0b2da3334acc9f4e812565255340de1,2025-01-03T23:15:08.897000 CVE-2025-22383,0,0,5d92cf5968d0b3cb8c32ffddbb5f9d0fa05899712bf08a80edc7535b9d1dfdd0,2025-01-06T15:15:16.103000 CVE-2025-22384,0,0,c3eb3907c8203007a185e0b56ba50453f7625b9e4c3e243d711609914b16742e,2025-01-06T17:15:47.820000 @@ -276101,63 +276132,65 @@ CVE-2025-22388,0,0,7b76724cf59a9c67f325da6bd673f3f15746ba083c4bc35be8117d11c0a0d CVE-2025-22389,0,0,50d6eaab20c8259cde700c821ce2570def076c6cb2eb277d3379fa3f59f6550e,2025-01-04T03:15:07.580000 CVE-2025-22390,0,0,36805a833480d9f50dee34ab32e5ed9b2707017fd5287eb5a8abd68b1059bfbf,2025-01-06T17:15:48.170000 CVE-2025-22395,0,0,ac5db0ebc696fbb0c57e43b4ad48f0832ef7eb798546a738d8afe72cc61eda1e,2025-01-07T03:15:06.047000 -CVE-2025-22502,1,1,e47e75d81258d25ae0eee9a569a8a8d8f361d17aa85c464ced2971eda4004a93,2025-01-07T16:15:45.717000 -CVE-2025-22503,1,1,402bf3ce290423b600660d8b85d86d2013a2c04e54ea441b78372503a408f2f7,2025-01-07T16:15:45.877000 -CVE-2025-22507,1,1,2cff9b71c5a8e1294ee0ea1c856dbc50719946a9ec91412f79300cad5de53356,2025-01-07T16:15:46.040000 -CVE-2025-22511,1,1,28a656f74d0a00f1dcd5f2d1fb8e8415e8bf825a558b6f9a2f3991d9b3896e4c,2025-01-07T16:15:46.180000 -CVE-2025-22512,1,1,d0e0480ae125953d948bdeebc4960963d65049146d2d6560308d96f549fba6a9,2025-01-07T16:15:46.320000 -CVE-2025-22515,1,1,dc88383ea73e68ad51939744f6cae290bf90cb256d13103188ae9c7665a86c51,2025-01-07T16:15:46.497000 -CVE-2025-22516,1,1,611fd84a0c349163e43f1ea89c3240b45cba2292ed25e25c8d08cb8836f2cf54,2025-01-07T16:15:46.653000 -CVE-2025-22517,1,1,9fc983ded78103459897537381d1a380b232ba76124ae4a3d3794ebc5a224301,2025-01-07T16:15:46.820000 -CVE-2025-22518,1,1,a864a2676a4bdff938f1d9f28be32f463fce1aeb40c710954302551237bb9be6,2025-01-07T16:15:46.990000 -CVE-2025-22519,1,1,b03dc852be0c8215b11d4c8de5b1d47c9bad810d10f80dfb0ef73517ae023738,2025-01-07T16:15:47.140000 -CVE-2025-22520,1,1,edfead18f9eeda03c8cc00cb5e0cacef67069ec050ab27b8d11f83a53b1efbea,2025-01-07T16:15:47.310000 -CVE-2025-22522,1,1,024f0bd031ecc70bb9629fcbe159baf4796426c2b85db8fc05b2bf93b91b9c2b,2025-01-07T16:15:47.513000 -CVE-2025-22524,1,1,84de273bb5783bbeb6318c5154a0cd9ff47d207b84705cc5b1c22760470cbf7f,2025-01-07T16:15:47.680000 -CVE-2025-22525,1,1,c96a8d63c38ef7bfc31d30f88b9939fae4e7eb77a1967169714468d86712f834,2025-01-07T16:15:47.830000 -CVE-2025-22528,1,1,3e1473c212cdf502c2941e4cf89839c1aa0ab52527e07c4b7914a485feb0efdf,2025-01-07T16:15:47.987000 -CVE-2025-22529,1,1,872768ac8fbd7b67a82b204961d3b56dea5a0864471f1d1cdb5936b86e5a73fd,2025-01-07T16:15:48.180000 -CVE-2025-22530,1,1,31f07343a8cb5d2166ec46b0ca399cb71cd94cb7ab1ef67d619b834824c1b425,2025-01-07T16:15:48.350000 -CVE-2025-22531,1,1,9c8dd36d7210e53ba214e8f3cc09f5da41541d942c153faebf89f5d129cdcd86,2025-01-07T16:15:48.520000 -CVE-2025-22532,1,1,b809c5252350cda430ceffeda6049dcb96cccaa25d66b8277bb5a0735d1322f9,2025-01-07T16:15:48.747000 -CVE-2025-22533,1,1,25b61589f30ce3deeecfd9c254fce95888fe59e98c0f7f43787108cd88655b60,2025-01-07T16:15:48.980000 -CVE-2025-22534,1,1,2b1b89b97d9c480a79a27ab2e9768d7914cb2fe9f00d99eb04c1e686e9999643,2025-01-07T16:15:49.130000 -CVE-2025-22536,1,1,d7d3b86b0fd1337cd788f34b766b814fcb4ee3ac1850fff21c34eb096ed2c876,2025-01-07T16:15:49.293000 -CVE-2025-22538,1,1,12a6fca46dfb6875c8a21107d2505a7d5354a155e2258b9de3a7a1adb40ca128,2025-01-07T16:15:49.460000 -CVE-2025-22541,1,1,b6c1d2a08ee9cabe1f5ee57bf104d9edc96473b54fda84b7fdacf8ea8bb547e8,2025-01-07T16:15:49.670000 -CVE-2025-22543,1,1,bb92465369b746da5e3aad33249c8aa0381b90e534dfbb0263a00bbb5c76fd92,2025-01-07T16:15:49.830000 -CVE-2025-22544,1,1,b86adfc3c97a7b5d0d3070401eb2342efddf9d1d837dd854681a3c6a418665ab,2025-01-07T16:15:50.003000 -CVE-2025-22545,1,1,93ce509499b8aeceaabee7fe6f1d969e7f54041fc7dce1a116d7d372e009170a,2025-01-07T16:15:50.140000 -CVE-2025-22546,1,1,79cc26a75b344b9ec118869ae66493493c7eb2b57dcae63bb853bc19ab4946e2,2025-01-07T16:15:50.300000 -CVE-2025-22547,1,1,448662935ffb6e18a8e1163dd127035d11795af899fe916e5975ed1890e96a0c,2025-01-07T16:15:50.463000 -CVE-2025-22548,1,1,a2db0dc193c4bf9919788b967c39e79b3c40d299b83bf580eaf891c7ba01f8f7,2025-01-07T16:15:50.623000 -CVE-2025-22549,1,1,37651db6a80599d6a9d497dbafceef4e36e97fa49984798305794401d5aab828,2025-01-07T16:15:50.790000 -CVE-2025-22550,1,1,6f6d866b2625259c5090072b3a79f45d7499a06cc915b8ccdbfd564c98f9d1cf,2025-01-07T16:15:50.960000 -CVE-2025-22551,1,1,1c18b6a68d2faff9ea94214e5f20e5d2d17b48b1ae31ff8ccdbf60543e9bb4ce,2025-01-07T16:15:51.127000 -CVE-2025-22552,1,1,2dfde245749df3b6fbe40234d508891ad03a012dcf4f3026e6523a9622ec19ed,2025-01-07T16:15:51.277000 -CVE-2025-22554,1,1,169aa2b604547b25659f115978b58d0f1bd7f01eddb66dd86a7268532d44c0d9,2025-01-07T16:15:51.443000 -CVE-2025-22555,1,1,d1e6d57508dcad2a7bd8a9f8b3df05e46a8cd4445ec31cc6bf7d6924761d0bd1,2025-01-07T16:15:51.627000 -CVE-2025-22556,1,1,80282a8b7a3877b8271925b73b265c9263e83dc11ca55c1f26f5815967b33d22,2025-01-07T16:15:51.780000 -CVE-2025-22557,1,1,554688a370f3db327fa06284ca2f5bc0989345f9c179b0129147bfc3c998df56,2025-01-07T16:15:51.920000 -CVE-2025-22558,1,1,02538728dcbe28f9141d88cc5f37cf5e77cdba128b736b8999068fb514290b69,2025-01-07T16:15:52.080000 -CVE-2025-22559,1,1,f5edeba6ab7d923752b407ae8aab3700703d56d33a7f7999527accd4fd6d59de,2025-01-07T16:15:52.243000 -CVE-2025-22560,1,1,b722a48c52ac2270e574d7f5e02e3277d49a8fd1223636c766a0dea93a013371,2025-01-07T16:15:52.380000 -CVE-2025-22562,1,1,7160616e3f1e58346b09b1df777bd943bb4feb68c941a8f3be9d3e61e578fef3,2025-01-07T16:15:52.540000 -CVE-2025-22563,1,1,8f83fd6b5a5ec2381366f243f66907385b1669b6fef4670423d5257df7197ee1,2025-01-07T16:15:52.940000 -CVE-2025-22571,1,1,1b4f24da1a6f1bb7f346661376dfe49926d420862ecc376c082a8f78051bb43a,2025-01-07T16:15:53.187000 -CVE-2025-22572,1,1,32ab9eedcf4e42497aa29295e4986051818a49862bb5bf5d6d005d7558592521,2025-01-07T16:15:53.357000 -CVE-2025-22573,1,1,d2119173e267406cc8c9fcd20059a69bef2e08f7671866825bd18cb7cdb0d91d,2025-01-07T16:15:53.520000 -CVE-2025-22574,1,1,c37802a3f5d46dae3a4ce727391565c816599e4812b3e203a764a730d9724f8b,2025-01-07T16:15:53.667000 -CVE-2025-22577,1,1,832542f3ba4935e52a354806ac4c5d20d6ab091f340f611b5ababf5d00adcf75,2025-01-07T16:15:53.823000 -CVE-2025-22578,1,1,95fa1fcefb1a422e599db02a6781a35ca29ce1bc289d8fd08c5f19c13e53b5b4,2025-01-07T16:15:53.970000 -CVE-2025-22579,1,1,3cd63585cff10d775a15cd489268bb3f4f3859adb48a219faa18d77152c22936,2025-01-07T16:15:54.130000 -CVE-2025-22580,1,1,b35ffa4af0fb66dbc86a0bdb9fdf61c75ae3e7d1a1b77120fa8c043d429ae245,2025-01-07T16:15:54.303000 -CVE-2025-22581,1,1,53e1424ec6641d678bf117bb3c262da47ec66270c5ac57f65419efe21500073f,2025-01-07T16:15:54.467000 -CVE-2025-22582,1,1,0e04785e89c9d4acbccb3710e27d086b1e71be3155e4f5c0e225a467988b1226,2025-01-07T16:15:54.640000 -CVE-2025-22584,1,1,92ae95688057a343a3c112aba90a91e888f006a83dffd4231d4c896dd9b0eff6,2025-01-07T16:15:54.780000 -CVE-2025-22585,1,1,ef5b5a89cfb8baed252c15be492e73d626a65d7d4898a799d60ec5b5176f289f,2025-01-07T16:15:54.923000 -CVE-2025-22589,1,1,bb529e158c7e1933304f26efc5f066f63e5c287ae81ac09f059d86eaefe4703b,2025-01-07T16:15:55.053000 -CVE-2025-22590,1,1,b614c7d50ccfeb50c3e47048ce19c3611ad36ac118669e3c81ea441e322bcf11,2025-01-07T16:15:55.200000 -CVE-2025-22591,1,1,357b853ebe55eb932f399d326d5cfd3cf40fa62ab1a4f95d6fbcdc2774241b5d,2025-01-07T16:15:55.337000 -CVE-2025-22592,1,1,ff5fac2b9bc94ed835e8f9addacdb39fda9bbbe54c2e47c1826c43b63204eab4,2025-01-07T16:15:55.470000 -CVE-2025-22593,1,1,2e2b9b257210673d1959179ba19f9ddffb24fc86c8f15dcc25f3759c772c6b90,2025-01-07T16:15:55.627000 +CVE-2025-22500,1,1,8aa8d02f24b4f8f19adb445be3e34cd476c909361320155120249ca356361cc0,2025-01-07T17:15:33.657000 +CVE-2025-22502,0,0,e47e75d81258d25ae0eee9a569a8a8d8f361d17aa85c464ced2971eda4004a93,2025-01-07T16:15:45.717000 +CVE-2025-22503,0,0,402bf3ce290423b600660d8b85d86d2013a2c04e54ea441b78372503a408f2f7,2025-01-07T16:15:45.877000 +CVE-2025-22507,0,0,2cff9b71c5a8e1294ee0ea1c856dbc50719946a9ec91412f79300cad5de53356,2025-01-07T16:15:46.040000 +CVE-2025-22511,0,0,28a656f74d0a00f1dcd5f2d1fb8e8415e8bf825a558b6f9a2f3991d9b3896e4c,2025-01-07T16:15:46.180000 +CVE-2025-22512,0,0,d0e0480ae125953d948bdeebc4960963d65049146d2d6560308d96f549fba6a9,2025-01-07T16:15:46.320000 +CVE-2025-22515,0,0,dc88383ea73e68ad51939744f6cae290bf90cb256d13103188ae9c7665a86c51,2025-01-07T16:15:46.497000 +CVE-2025-22516,0,0,611fd84a0c349163e43f1ea89c3240b45cba2292ed25e25c8d08cb8836f2cf54,2025-01-07T16:15:46.653000 +CVE-2025-22517,0,0,9fc983ded78103459897537381d1a380b232ba76124ae4a3d3794ebc5a224301,2025-01-07T16:15:46.820000 +CVE-2025-22518,0,0,a864a2676a4bdff938f1d9f28be32f463fce1aeb40c710954302551237bb9be6,2025-01-07T16:15:46.990000 +CVE-2025-22519,0,0,b03dc852be0c8215b11d4c8de5b1d47c9bad810d10f80dfb0ef73517ae023738,2025-01-07T16:15:47.140000 +CVE-2025-22520,0,0,edfead18f9eeda03c8cc00cb5e0cacef67069ec050ab27b8d11f83a53b1efbea,2025-01-07T16:15:47.310000 +CVE-2025-22522,0,0,024f0bd031ecc70bb9629fcbe159baf4796426c2b85db8fc05b2bf93b91b9c2b,2025-01-07T16:15:47.513000 +CVE-2025-22524,0,0,84de273bb5783bbeb6318c5154a0cd9ff47d207b84705cc5b1c22760470cbf7f,2025-01-07T16:15:47.680000 +CVE-2025-22525,0,0,c96a8d63c38ef7bfc31d30f88b9939fae4e7eb77a1967169714468d86712f834,2025-01-07T16:15:47.830000 +CVE-2025-22528,0,0,3e1473c212cdf502c2941e4cf89839c1aa0ab52527e07c4b7914a485feb0efdf,2025-01-07T16:15:47.987000 +CVE-2025-22529,0,0,872768ac8fbd7b67a82b204961d3b56dea5a0864471f1d1cdb5936b86e5a73fd,2025-01-07T16:15:48.180000 +CVE-2025-22530,0,0,31f07343a8cb5d2166ec46b0ca399cb71cd94cb7ab1ef67d619b834824c1b425,2025-01-07T16:15:48.350000 +CVE-2025-22531,0,0,9c8dd36d7210e53ba214e8f3cc09f5da41541d942c153faebf89f5d129cdcd86,2025-01-07T16:15:48.520000 +CVE-2025-22532,0,0,b809c5252350cda430ceffeda6049dcb96cccaa25d66b8277bb5a0735d1322f9,2025-01-07T16:15:48.747000 +CVE-2025-22533,0,0,25b61589f30ce3deeecfd9c254fce95888fe59e98c0f7f43787108cd88655b60,2025-01-07T16:15:48.980000 +CVE-2025-22534,0,0,2b1b89b97d9c480a79a27ab2e9768d7914cb2fe9f00d99eb04c1e686e9999643,2025-01-07T16:15:49.130000 +CVE-2025-22536,0,0,d7d3b86b0fd1337cd788f34b766b814fcb4ee3ac1850fff21c34eb096ed2c876,2025-01-07T16:15:49.293000 +CVE-2025-22538,0,0,12a6fca46dfb6875c8a21107d2505a7d5354a155e2258b9de3a7a1adb40ca128,2025-01-07T16:15:49.460000 +CVE-2025-22541,0,0,b6c1d2a08ee9cabe1f5ee57bf104d9edc96473b54fda84b7fdacf8ea8bb547e8,2025-01-07T16:15:49.670000 +CVE-2025-22543,0,0,bb92465369b746da5e3aad33249c8aa0381b90e534dfbb0263a00bbb5c76fd92,2025-01-07T16:15:49.830000 +CVE-2025-22544,0,0,b86adfc3c97a7b5d0d3070401eb2342efddf9d1d837dd854681a3c6a418665ab,2025-01-07T16:15:50.003000 +CVE-2025-22545,0,0,93ce509499b8aeceaabee7fe6f1d969e7f54041fc7dce1a116d7d372e009170a,2025-01-07T16:15:50.140000 +CVE-2025-22546,0,0,79cc26a75b344b9ec118869ae66493493c7eb2b57dcae63bb853bc19ab4946e2,2025-01-07T16:15:50.300000 +CVE-2025-22547,0,0,448662935ffb6e18a8e1163dd127035d11795af899fe916e5975ed1890e96a0c,2025-01-07T16:15:50.463000 +CVE-2025-22548,0,0,a2db0dc193c4bf9919788b967c39e79b3c40d299b83bf580eaf891c7ba01f8f7,2025-01-07T16:15:50.623000 +CVE-2025-22549,0,0,37651db6a80599d6a9d497dbafceef4e36e97fa49984798305794401d5aab828,2025-01-07T16:15:50.790000 +CVE-2025-22550,0,0,6f6d866b2625259c5090072b3a79f45d7499a06cc915b8ccdbfd564c98f9d1cf,2025-01-07T16:15:50.960000 +CVE-2025-22551,0,0,1c18b6a68d2faff9ea94214e5f20e5d2d17b48b1ae31ff8ccdbf60543e9bb4ce,2025-01-07T16:15:51.127000 +CVE-2025-22552,0,0,2dfde245749df3b6fbe40234d508891ad03a012dcf4f3026e6523a9622ec19ed,2025-01-07T16:15:51.277000 +CVE-2025-22554,0,0,169aa2b604547b25659f115978b58d0f1bd7f01eddb66dd86a7268532d44c0d9,2025-01-07T16:15:51.443000 +CVE-2025-22555,0,0,d1e6d57508dcad2a7bd8a9f8b3df05e46a8cd4445ec31cc6bf7d6924761d0bd1,2025-01-07T16:15:51.627000 +CVE-2025-22556,0,0,80282a8b7a3877b8271925b73b265c9263e83dc11ca55c1f26f5815967b33d22,2025-01-07T16:15:51.780000 +CVE-2025-22557,0,0,554688a370f3db327fa06284ca2f5bc0989345f9c179b0129147bfc3c998df56,2025-01-07T16:15:51.920000 +CVE-2025-22558,0,0,02538728dcbe28f9141d88cc5f37cf5e77cdba128b736b8999068fb514290b69,2025-01-07T16:15:52.080000 +CVE-2025-22559,0,0,f5edeba6ab7d923752b407ae8aab3700703d56d33a7f7999527accd4fd6d59de,2025-01-07T16:15:52.243000 +CVE-2025-22560,0,0,b722a48c52ac2270e574d7f5e02e3277d49a8fd1223636c766a0dea93a013371,2025-01-07T16:15:52.380000 +CVE-2025-22562,0,0,7160616e3f1e58346b09b1df777bd943bb4feb68c941a8f3be9d3e61e578fef3,2025-01-07T16:15:52.540000 +CVE-2025-22563,0,0,8f83fd6b5a5ec2381366f243f66907385b1669b6fef4670423d5257df7197ee1,2025-01-07T16:15:52.940000 +CVE-2025-22571,0,0,1b4f24da1a6f1bb7f346661376dfe49926d420862ecc376c082a8f78051bb43a,2025-01-07T16:15:53.187000 +CVE-2025-22572,0,0,32ab9eedcf4e42497aa29295e4986051818a49862bb5bf5d6d005d7558592521,2025-01-07T16:15:53.357000 +CVE-2025-22573,0,0,d2119173e267406cc8c9fcd20059a69bef2e08f7671866825bd18cb7cdb0d91d,2025-01-07T16:15:53.520000 +CVE-2025-22574,0,0,c37802a3f5d46dae3a4ce727391565c816599e4812b3e203a764a730d9724f8b,2025-01-07T16:15:53.667000 +CVE-2025-22577,0,0,832542f3ba4935e52a354806ac4c5d20d6ab091f340f611b5ababf5d00adcf75,2025-01-07T16:15:53.823000 +CVE-2025-22578,0,0,95fa1fcefb1a422e599db02a6781a35ca29ce1bc289d8fd08c5f19c13e53b5b4,2025-01-07T16:15:53.970000 +CVE-2025-22579,0,0,3cd63585cff10d775a15cd489268bb3f4f3859adb48a219faa18d77152c22936,2025-01-07T16:15:54.130000 +CVE-2025-22580,0,0,b35ffa4af0fb66dbc86a0bdb9fdf61c75ae3e7d1a1b77120fa8c043d429ae245,2025-01-07T16:15:54.303000 +CVE-2025-22581,0,0,53e1424ec6641d678bf117bb3c262da47ec66270c5ac57f65419efe21500073f,2025-01-07T16:15:54.467000 +CVE-2025-22582,0,0,0e04785e89c9d4acbccb3710e27d086b1e71be3155e4f5c0e225a467988b1226,2025-01-07T16:15:54.640000 +CVE-2025-22584,0,0,92ae95688057a343a3c112aba90a91e888f006a83dffd4231d4c896dd9b0eff6,2025-01-07T16:15:54.780000 +CVE-2025-22585,0,0,ef5b5a89cfb8baed252c15be492e73d626a65d7d4898a799d60ec5b5176f289f,2025-01-07T16:15:54.923000 +CVE-2025-22589,0,0,bb529e158c7e1933304f26efc5f066f63e5c287ae81ac09f059d86eaefe4703b,2025-01-07T16:15:55.053000 +CVE-2025-22590,0,0,b614c7d50ccfeb50c3e47048ce19c3611ad36ac118669e3c81ea441e322bcf11,2025-01-07T16:15:55.200000 +CVE-2025-22591,0,0,357b853ebe55eb932f399d326d5cfd3cf40fa62ab1a4f95d6fbcdc2774241b5d,2025-01-07T16:15:55.337000 +CVE-2025-22592,0,0,ff5fac2b9bc94ed835e8f9addacdb39fda9bbbe54c2e47c1826c43b63204eab4,2025-01-07T16:15:55.470000 +CVE-2025-22593,0,0,2e2b9b257210673d1959179ba19f9ddffb24fc86c8f15dcc25f3759c772c6b90,2025-01-07T16:15:55.627000 +CVE-2025-22621,1,1,f36d0f70806d0c581838cce0fde67d4e521043699061f9e9337c84ae8de6806b,2025-01-07T17:15:35.710000