diff --git a/CVE-2019/CVE-2019-162xx/CVE-2019-16283.json b/CVE-2019/CVE-2019-162xx/CVE-2019-16283.json index 5d9e5dd6ed4..88a2b3ef4b1 100644 --- a/CVE-2019/CVE-2019-162xx/CVE-2019-16283.json +++ b/CVE-2019/CVE-2019-162xx/CVE-2019-16283.json @@ -2,7 +2,7 @@ "id": "CVE-2019-16283", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-06-09T18:15:09.483", - "lastModified": "2024-11-21T04:30:27.177", + "lastModified": "2025-01-06T18:15:09.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36732.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36732.json index 65588ca34e8..45a61deee55 100644 --- a/CVE-2020/CVE-2020-367xx/CVE-2020-36732.json +++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36732.json @@ -2,7 +2,7 @@ "id": "CVE-2020-36732", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-12T02:15:48.347", - "lastModified": "2024-11-21T05:30:11.017", + "lastModified": "2025-01-06T18:15:11.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-330" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-331" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-437xx/CVE-2022-43777.json b/CVE-2022/CVE-2022-437xx/CVE-2022-43777.json index d92d1571f3a..0234c3e516c 100644 --- a/CVE-2022/CVE-2022-437xx/CVE-2022-43777.json +++ b/CVE-2022/CVE-2022-437xx/CVE-2022-43777.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43777", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-06-12T20:15:10.310", - "lastModified": "2024-11-21T07:27:13.020", + "lastModified": "2025-01-06T17:15:08.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.1, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-437xx/CVE-2022-43778.json b/CVE-2022/CVE-2022-437xx/CVE-2022-43778.json index 60f0ec63cb5..aa8156169bb 100644 --- a/CVE-2022/CVE-2022-437xx/CVE-2022-43778.json +++ b/CVE-2022/CVE-2022-437xx/CVE-2022-43778.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43778", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-06-12T20:15:10.360", - "lastModified": "2024-11-21T07:27:13.620", + "lastModified": "2025-01-06T17:15:10.027", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.1, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ @@ -10901,6 +10931,14 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "https://support.hp.com/us-en/document/ish_7709808-7709835-16/hpsbhf03835", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1119.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1119.json index 5ddfed438c3..2a813ca4004 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1119.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1119.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1119", "sourceIdentifier": "contact@wpscan.com", "published": "2023-07-10T16:15:48.720", - "lastModified": "2024-11-21T07:38:29.800", + "lastModified": "2025-01-06T17:15:10.700", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21245.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21245.json index 012f2eda710..08faba94386 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21245.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21245.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21245", "sourceIdentifier": "security@android.com", "published": "2023-07-13T00:15:23.683", - "lastModified": "2024-11-21T07:42:29.000", + "lastModified": "2025-01-06T17:15:11.087", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2454.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2454.json index dc474ec9495..f160cf2f3ee 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2454.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2454.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2454", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-09T19:15:09.253", - "lastModified": "2024-11-21T07:58:38.883", + "lastModified": "2025-01-06T18:15:13.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2455.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2455.json index 573f7c717a8..0ce616b2113 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2455.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2455.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2455", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-09T19:15:09.313", - "lastModified": "2024-11-21T07:58:39.010", + "lastModified": "2025-01-06T18:15:13.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25434.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25434.json index 54d31b99157..a368e08b7aa 100644 --- a/CVE-2023/CVE-2023-254xx/CVE-2023-25434.json +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25434.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25434", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T20:15:09.337", - "lastModified": "2024-11-21T07:49:30.410", + "lastModified": "2025-01-06T17:15:11.303", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26132.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26132.json index 51d3072ccd7..49a75575b12 100644 --- a/CVE-2023/CVE-2023-261xx/CVE-2023-26132.json +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26132.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26132", "sourceIdentifier": "report@snyk.io", "published": "2023-06-10T05:15:08.970", - "lastModified": "2024-11-21T07:50:50.543", + "lastModified": "2025-01-06T17:15:11.647", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -75,6 +75,16 @@ "value": "CWE-1321" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26133.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26133.json index 3d43585b489..61a821ef6b3 100644 --- a/CVE-2023/CVE-2023-261xx/CVE-2023-26133.json +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26133.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26133", "sourceIdentifier": "report@snyk.io", "published": "2023-06-12T05:15:09.400", - "lastModified": "2024-11-21T07:50:50.667", + "lastModified": "2025-01-06T17:15:11.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -75,6 +75,16 @@ "value": "CWE-1321" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26965.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26965.json index fb3419162b4..81e9c4567bf 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26965.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26965.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26965", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T21:15:09.483", - "lastModified": "2024-11-21T07:52:07.757", + "lastModified": "2025-01-06T17:15:12.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27706.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27706.json index 49bc05aa808..9dba9c4ca77 100644 --- a/CVE-2023/CVE-2023-277xx/CVE-2023-27706.json +++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27706.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27706", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-09T19:15:09.107", - "lastModified": "2024-11-21T07:53:22.320", + "lastModified": "2025-01-06T18:15:11.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-312" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27716.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27716.json index 490d6f96fa9..0a64936c9ca 100644 --- a/CVE-2023/CVE-2023-277xx/CVE-2023-27716.json +++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27716.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27716", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-12T21:15:22.543", - "lastModified": "2024-11-21T07:53:22.890", + "lastModified": "2025-01-06T18:15:12.193", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28478.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28478.json index 8816ebf5143..18626145b81 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28478.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28478.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28478", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-12T20:15:11.717", - "lastModified": "2024-11-21T07:55:10.953", + "lastModified": "2025-01-06T17:15:12.243", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29712.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29712.json index e0d53c929d7..c0706f169da 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29712.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29712.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29712", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-09T18:15:09.600", - "lastModified": "2024-11-21T07:57:24.340", + "lastModified": "2025-01-06T18:15:12.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29713.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29713.json index 5b52d55dd81..8fc157d3d01 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29713.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29713.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29713", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-09T19:15:09.160", - "lastModified": "2024-11-21T07:57:24.497", + "lastModified": "2025-01-06T18:15:12.683", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29714.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29714.json index dfcf080b27b..f295d104661 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29714.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29714.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29714", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-09T19:15:09.207", - "lastModified": "2024-11-21T07:57:24.633", + "lastModified": "2025-01-06T18:15:12.930", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29749.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29749.json index f05a070b390..5730b6a1b78 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29749.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29749.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29749", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-09T20:15:09.663", - "lastModified": "2024-11-21T07:57:28.457", + "lastModified": "2025-01-06T18:15:13.163", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29767.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29767.json index e7618da2a11..48ff281fa70 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29767.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29767.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29767", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-09T20:15:10.140", - "lastModified": "2024-11-21T07:57:29.977", + "lastModified": "2025-01-06T18:15:13.400", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30082.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30082.json index 85ced6948a9..84823d282d4 100644 --- a/CVE-2023/CVE-2023-300xx/CVE-2023-30082.json +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30082.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30082", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T20:15:09.453", - "lastModified": "2024-11-21T07:59:46.327", + "lastModified": "2025-01-06T17:15:12.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-1284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30150.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30150.json index 7b762b3cb3f..bdffa93f433 100644 --- a/CVE-2023/CVE-2023-301xx/CVE-2023-30150.json +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30150.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30150", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T21:15:09.557", - "lastModified": "2024-11-21T07:59:50.653", + "lastModified": "2025-01-06T17:15:12.697", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30198.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30198.json index b8e634fe93d..f6fdd423d46 100644 --- a/CVE-2023/CVE-2023-301xx/CVE-2023-30198.json +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30198.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30198", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-12T17:15:09.760", - "lastModified": "2024-11-21T07:59:53.620", + "lastModified": "2025-01-06T18:15:14.143", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -121,6 +121,10 @@ "tags": [ "Product" ] + }, + { + "url": "https://packetstorm.news/files/id/173136", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-302xx/CVE-2023-30262.json b/CVE-2023/CVE-2023-302xx/CVE-2023-30262.json index fa3818e6d07..e304048c5b7 100644 --- a/CVE-2023/CVE-2023-302xx/CVE-2023-30262.json +++ b/CVE-2023/CVE-2023-302xx/CVE-2023-30262.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30262", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-09T18:15:09.647", - "lastModified": "2024-11-21T07:59:57.570", + "lastModified": "2025-01-06T18:15:14.373", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31671.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31671.json index 5486607e219..33ad1a5da0b 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31671.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31671.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31671", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T18:15:09.573", - "lastModified": "2024-11-21T08:02:08.647", + "lastModified": "2025-01-06T17:15:12.890", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31746.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31746.json index fcca06dc29a..4950ed36d85 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31746.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31746.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31746", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T21:15:09.610", - "lastModified": "2024-11-21T08:02:13.870", + "lastModified": "2025-01-06T17:15:13.100", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32219.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32219.json index 658e14b09e5..86f1b97ed11 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32219.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32219.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32219", "sourceIdentifier": "cna@cyber.gov.il", "published": "2023-06-12T21:15:22.597", - "lastModified": "2024-11-21T08:02:55.563", + "lastModified": "2025-01-06T17:15:13.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32220.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32220.json index 2e0470029a2..154888ce865 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32220.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32220.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32220", "sourceIdentifier": "cna@cyber.gov.il", "published": "2023-06-12T21:15:22.673", - "lastModified": "2024-11-21T08:02:55.670", + "lastModified": "2025-01-06T17:15:13.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33515.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33515.json index 50faf01793d..505df4fef26 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33515.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33515.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33515", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T21:15:09.663", - "lastModified": "2024-11-21T08:05:39.833", + "lastModified": "2025-01-06T18:15:14.737", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33557.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33557.json index e69b06af93c..e40cded17d8 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33557.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33557.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33557", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-09T18:15:09.693", - "lastModified": "2024-11-21T08:05:42.760", + "lastModified": "2025-01-06T18:15:15.217", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34363.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34363.json index 4ff6637e37a..4ef9e2b1e70 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34363.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34363.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34363", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-09T07:15:10.507", - "lastModified": "2024-11-21T08:07:06.067", + "lastModified": "2025-01-06T18:15:15.647", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-338" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-338" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34364.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34364.json index 3c97c1fae00..b06b1446821 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34364.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34364.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34364", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-09T07:15:10.563", - "lastModified": "2024-11-21T08:07:06.197", + "lastModified": "2025-01-06T18:15:15.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34367.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34367.json index 88ca614ff1d..5b18c8a3547 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34367.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34367.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34367", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T20:15:09.510", - "lastModified": "2024-11-21T08:07:06.567", + "lastModified": "2025-01-06T18:15:16.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35031.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35031.json index 70176d19ec5..9a98127ea92 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35031.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35031.json @@ -2,7 +2,7 @@ "id": "CVE-2023-35031", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-12T02:15:48.447", - "lastModified": "2024-11-21T08:07:50.853", + "lastModified": "2025-01-06T18:15:16.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35034.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35034.json index 3a3a46e3365..74b147e1a5e 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35034.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35034.json @@ -2,7 +2,7 @@ "id": "CVE-2023-35034", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-12T02:15:48.570", - "lastModified": "2024-11-21T08:07:51.330", + "lastModified": "2025-01-06T18:15:16.923", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-377xx/CVE-2023-37712.json b/CVE-2023/CVE-2023-377xx/CVE-2023-37712.json index 442838329c4..907b7d47977 100644 --- a/CVE-2023/CVE-2023-377xx/CVE-2023-37712.json +++ b/CVE-2023/CVE-2023-377xx/CVE-2023-37712.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37712", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-10T17:15:09.877", - "lastModified": "2024-11-21T08:12:09.553", + "lastModified": "2025-01-06T17:15:13.680", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ @@ -146,6 +176,14 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/fromSetIpBind", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6601.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6601.json new file mode 100644 index 00000000000..02a61924e18 --- /dev/null +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6601.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2023-6601", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-01-06T17:15:14.217", + "lastModified": "2025-01-06T17:15:14.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in FFmpeg's HLS demuxer. This vulnerability allows bypassing unsafe file extension checks and triggering arbitrary demuxers via base64-encoded data URIs appended with specific file extensions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-99" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253172", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6604.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6604.json new file mode 100644 index 00000000000..dea20fca82c --- /dev/null +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6604.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2023-6604", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-01-06T17:15:14.413", + "lastModified": "2025-01-06T17:15:14.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in FFmpeg. This vulnerability allows unexpected additional CPU load and storage consumption, potentially leading to degraded performance or denial of service via the demuxing of arbitrary data as XBIN-formatted data without proper format validation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-99" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334337", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6605.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6605.json new file mode 100644 index 00000000000..78d08c7385b --- /dev/null +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6605.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2023-6605", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-01-06T17:15:14.613", + "lastModified": "2025-01-06T17:15:14.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in FFmpeg's DASH playlist support. This vulnerability allows arbitrary HTTP GET requests to be made on behalf of the machine running FFmpeg via a crafted DASH playlist containing malicious URLs." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-99" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334336", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10957.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10957.json index c295d2b75d5..d6ddec6b71e 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10957.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10957.json @@ -2,20 +2,20 @@ "id": "CVE-2024-10957", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-04T14:15:22.430", - "lastModified": "2025-01-04T14:15:22.430", - "vulnStatus": "Received", + "lastModified": "2025-01-06T17:15:14.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The UpdraftPlus: WP Backup & Migration Plugin plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.24.11 via deserialization of untrusted input in the 'recursive_unserialized_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. An administrator must perform a search and replace action to trigger the exploit." + "value": "The UpdraftPlus: WP Backup & Migration Plugin plugin for WordPress is vulnerable to PHP Object Injection in all versions from 1.23.8 to 1.24.11 via deserialization of untrusted input in the 'recursive_unserialized_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. An administrator must perform a search and replace action to trigger the exploit." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11168.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11168.json index b9b17ef2fb9..2f697a8f83c 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11168.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11168.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11168", "sourceIdentifier": "cna@python.org", "published": "2024-11-12T22:15:14.920", - "lastModified": "2024-12-03T21:15:05.470", + "lastModified": "2025-01-06T18:15:17.900", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11691.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11691.json index ec960ef85cc..eb0d20c1dc1 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11691.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11691.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11691", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:18.633", - "lastModified": "2024-12-13T17:15:05.813", + "lastModified": "2025-01-06T18:15:18.373", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914707", diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12254.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12254.json index 31b5ef2a817..f7e71370ee6 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12254.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12254.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12254", "sourceIdentifier": "cna@python.org", "published": "2024-12-06T16:15:20.623", - "lastModified": "2024-12-06T19:15:10.983", + "lastModified": "2025-01-06T18:15:18.713", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13031.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13031.json index 1ad993683ad..22966496d7d 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13031.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13031.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13031", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-30T01:15:06.827", - "lastModified": "2024-12-30T01:15:06.827", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:56:33.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,24 +142,65 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:antabot:white-jotter:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.2.2", + "matchCriteriaId": "6759B940-07EF-49C7-A0F8-ABC2C329843A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/white-jotter/ReflectedXSS-ContentEditor.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289764", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289764", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.466530", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13032.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13032.json index 735f6ea0f6e..ee78e4d5dd0 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13032.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13032.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13032", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-30T02:15:06.260", - "lastModified": "2024-12-30T02:15:06.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:47:07.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:antabot:white-jotter:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.2.2", + "matchCriteriaId": "6759B940-07EF-49C7-A0F8-ABC2C329843A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/white-jotter/ServerSideRequestForgery-ArticleCoverURL.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289765", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289765", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.466551", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13033.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13033.json index ad6e7c1bb93..e6ae895d358 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13033.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13033.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13033", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-30T02:15:07.270", - "lastModified": "2024-12-30T02:15:07.270", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:26:59.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,24 +142,63 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:chat_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BA2E5E8E-272F-46CA-A1AB-50C53B07FFA3" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289766", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289766", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.471109", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13034.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13034.json index 2e862d9b7ff..c0edd7b36ef 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13034.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13034.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13034", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-30T02:15:07.433", - "lastModified": "2024-12-30T02:15:07.433", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:11:07.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,24 +142,63 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:chat_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BA2E5E8E-272F-46CA-A1AB-50C53B07FFA3" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289767", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289767", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.471111", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13035.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13035.json index c31370dcc12..cde10763147 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13035.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13035.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13035", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-30T03:15:06.413", - "lastModified": "2024-12-30T03:15:06.413", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:59:47.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,24 +142,63 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:chat_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BA2E5E8E-272F-46CA-A1AB-50C53B07FFA3" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289768", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289768", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.471112", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13036.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13036.json index 7cc80d7619a..80b25a0a10a 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13036.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13036.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13036", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-30T03:15:06.580", - "lastModified": "2024-12-30T03:15:06.580", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:26:00.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,24 +142,63 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:chat_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C53942AF-E982-409D-BFDF-FAFD90E5C154" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289769", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289769", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.471113", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13037.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13037.json index cb00d7c6d97..928d4b52964 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13037.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13037.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13037", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-30T04:15:05.200", - "lastModified": "2024-12-30T04:15:05.200", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:00:22.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,72 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "108AEB9D-CD44-4A0D-8CB6-82EA6162A0B4" + } + ] + } + ] } ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/matias-a11y/cve/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289770", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289770", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.471674", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26929.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26929.json index b04d8d0dab3..da3a52ee0ac 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26929.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26929.json @@ -2,220 +2,15 @@ "id": "CVE-2024-26929", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:07.380", - "lastModified": "2024-11-21T09:03:24.463", - "vulnStatus": "Modified", + "lastModified": "2025-01-06T17:15:15.537", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix double free of fcport\n\nThe server was crashing after LOGO because fcport was getting freed twice.\n\n -----------[ cut here ]-----------\n kernel BUG at mm/slub.c:371!\n invalid opcode: 0000 1 SMP PTI\n CPU: 35 PID: 4610 Comm: bash Kdump: loaded Tainted: G OE --------- - - 4.18.0-425.3.1.el8.x86_64 #1\n Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021\n RIP: 0010:set_freepointer.part.57+0x0/0x10\n RSP: 0018:ffffb07107027d90 EFLAGS: 00010246\n RAX: ffff9cb7e3150000 RBX: ffff9cb7e332b9c0 RCX: ffff9cb7e3150400\n RDX: 0000000000001f37 RSI: 0000000000000000 RDI: ffff9cb7c0005500\n RBP: fffff693448c5400 R08: 0000000080000000 R09: 0000000000000009\n R10: 0000000000000000 R11: 0000000000132af0 R12: ffff9cb7c0005500\n R13: ffff9cb7e3150000 R14: ffffffffc06990e0 R15: ffff9cb7ea85ea58\n FS: 00007ff6b79c2740(0000) GS:ffff9cb8f7ec0000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000055b426b7d700 CR3: 0000000169c18002 CR4: 00000000007706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n kfree+0x238/0x250\n qla2x00_els_dcmd_sp_free+0x20/0x230 [qla2xxx]\n ? qla24xx_els_dcmd_iocb+0x607/0x690 [qla2xxx]\n qla2x00_issue_logo+0x28c/0x2a0 [qla2xxx]\n ? qla2x00_issue_logo+0x28c/0x2a0 [qla2xxx]\n ? kernfs_fop_write+0x11e/0x1a0\n\nRemove one of the free calls and add check for valid fcport. Also use\nfunction qla2x00_free_fcport() instead of kfree()." - }, - { - "lang": "es", - "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: qla2xxx: Correcci\u00f3n doble liberaci\u00f3n de fcport El servidor fallaba despu\u00e9s de LOGO porque fcport se liberaba dos veces. -----------[ cortar aqu\u00ed ]----------- \u00a1ERROR del kernel en mm/slub.c:371! c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 1 SMP PTI CPU: 35 PID: 4610 Comm: bash Kdump: cargado Contaminado: G OE --------- - - 4.18.0-425.3.1.el8.x86_64 #1 Nombre de hardware: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 03/09/2021 RIP: 0010:set_freepointer.part.57+0x0/0x10 RSP: 0018:ffffb07107027d90 EFLAGS: 00010246 RAX: RBX: ffff9cb7e332b9c0 RCX: ffff9cb7e3150400 RDX: 0000000000001f37 RSI : 0000000000000000 RDI: ffff9cb7c0005500 RBP: fffff693448c5400 R08: 0000000080000000 R09: 00000000000000009 R10: 0000000000000000 R11: 0000000132af0 R12: ffff9cb7c0005500 R13: ffff9cb7e3150000 R14: ffffffffc06990e0 R15: ffff9cb7ea85ea58 FS: 00007ff6b79c2740(0000) GS:ffff9cb8f7ec0000(000) 0) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b426b7d700 CR3: 0000000169c18002 CR4: 00000000007706e0 DR0: 0000000000000000 DR1: 00000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Seguimiento de llamadas: kfree+0x238/0x250 _els_dcmd_sp_free+0x20 /0x230 [qla2xxx] ? qla24xx_els_dcmd_iocb+0x607/0x690 [qla2xxx] qla2x00_issue_logo+0x28c/0x2a0 [qla2xxx] ? qla2x00_issue_logo+0x28c/0x2a0 [qla2xxx] ? kernfs_fop_write+0x11e/0x1a0 Elimine una de las llamadas gratuitas y agregue una verificaci\u00f3n de fcport v\u00e1lido. Utilice tambi\u00e9n la funci\u00f3n qla2x00_free_fcport() en lugar de kfree()." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", - "baseScore": 7.7, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 2.5, - "impactScore": 5.2 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-415" - } - ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-415" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndExcluding": "5.15.154", - "matchCriteriaId": "131A208A-4C74-498A-BFFB-240B45FE2C0C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.16", - "versionEndExcluding": "6.1.84", - "matchCriteriaId": "834D9BD5-42A6-4D74-979E-4D6D93F630FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "6.2", - "versionEndExcluding": "6.6.24", - "matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "6.7", - "versionEndExcluding": "6.7.12", - "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartExcluding": "6.8", - "versionEndExcluding": "6.8.3", - "matchCriteriaId": "1649B701-9DF9-4E5D-AA4B-6A7071BF05D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", - "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Patch" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29049.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29049.json index 8786b9ae81f..a8f91a2e7b9 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29049.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29049.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29049", "sourceIdentifier": "secure@microsoft.com", "published": "2024-04-04T22:15:08.827", - "lastModified": "2024-11-21T09:07:27.020", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:37:14.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.7 } ] }, @@ -49,16 +69,57 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionEndExcluding": "122.0.2365.120", + "matchCriteriaId": "1A5B11B0-BD90-4DE9-8CAF-8EB64270417B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionStartIncluding": "123.0.2420.53", + "versionEndExcluding": "123.0.2420.81", + "matchCriteriaId": "644353AD-99A7-4044-B00C-786C55306EE8" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29049", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29049", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29981.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29981.json index fac5a787b93..9a278f19bcf 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29981.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29981.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29981", "sourceIdentifier": "secure@microsoft.com", "published": "2024-04-04T22:15:09.153", - "lastModified": "2024-11-21T09:08:44.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:38:04.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,57 @@ "value": "CWE-1021" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionEndExcluding": "122.0.2365.120", + "matchCriteriaId": "1A5B11B0-BD90-4DE9-8CAF-8EB64270417B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionStartIncluding": "123.0.2420.53", + "versionEndExcluding": "123.0.2420.81", + "matchCriteriaId": "644353AD-99A7-4044-B00C-786C55306EE8" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29981", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29981", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31914.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31914.json index 14badf5d38f..593c7eb4613 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31914.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31914.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31914", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-06T16:15:28.320", - "lastModified": "2025-01-06T16:15:28.320", + "lastModified": "2025-01-06T17:15:36.653", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,27 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46073.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46073.json new file mode 100644 index 00000000000..61f08b7a3aa --- /dev/null +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46073.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-46073", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-06T18:15:19.493", + "lastModified": "2025-01-06T18:15:19.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A reflected Cross-Site Scripting (XSS) vulnerability exists in the login page of IceHRM v32.4.0.OS. The vulnerability is due to improper sanitization of the \"next\" parameter, which is included in the application's response without adequate escaping. An attacker can exploit this flaw by tricking a user into visiting a specially crafted URL, causing the execution of arbitrary JavaScript code in the context of the victim's browser. The issue occurs even though the application has sanitization mechanisms in place." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/gamonoid/icehrm", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/manisashank/CVE-Publish/blob/main/CVE-2024-46073.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46622.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46622.json new file mode 100644 index 00000000000..b659f225343 --- /dev/null +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46622.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-46622", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-06T18:15:19.660", + "lastModified": "2025-01-06T18:15:19.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Escalation of Privilege security vulnerability was found in SecureAge Security Suite software 7.0.x before 7.0.38, 7.1.x before 7.1.11, 8.0.x before 8.0.18, and 8.1.x before 8.1.18 that allows arbitrary file creation, modification and deletion." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.secureage.com/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.secureage.com/blog/resolved-escalation-of-privilege", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47475.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47475.json new file mode 100644 index 00000000000..e84dcc0bedb --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47475.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47475", + "sourceIdentifier": "security_alert@emc.com", + "published": "2025-01-06T17:15:37.423", + "lastModified": "2025-01-06T17:15:37.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell PowerScale OneFS 8.2.2.x through 9.8.0.x contains an incorrect permission assignment for critical resource vulnerability. A locally authenticated attacker could potentially exploit this vulnerability, leading to denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000242681/dsa-2024-417-security-update-for-dell-powerscale-onefs-for-security-vulnerability", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51111.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51111.json index d59e156971f..2267030f671 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51111.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51111.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51111", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T16:15:28.807", - "lastModified": "2025-01-06T16:15:28.807", + "lastModified": "2025-01-06T18:15:20.060", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Cross-Site Scripting (XSS) vulnerability in Pnetlab 5.3.11 allows an attacker to inject malicious scripts into a web page, which are executed in the context of the victim's browser." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://pnetlab.com", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51472.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51472.json new file mode 100644 index 00000000000..6b8a5adfb3c --- /dev/null +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51472.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2024-51472", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-06T17:15:38.517", + "lastModified": "2025-01-06T17:15:38.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM UrbanCode Deploy (UCD) 7.2 through 7.2.3.13, 7.3 through 7.3.2.8, and IBM DevOps Deploy 8.0 through 8.0.1.3 are vulnerable to HTML injection. This vulnerability may allow a user to embed arbitrary HTML tags in the Web UI potentially leading to sensitive information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7177856", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-522xx/CVE-2024-52269.json b/CVE-2024/CVE-2024-522xx/CVE-2024-52269.json index d43375c4ebe..97bf862ba99 100644 --- a/CVE-2024/CVE-2024-522xx/CVE-2024-52269.json +++ b/CVE-2024/CVE-2024-522xx/CVE-2024-52269.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52269", "sourceIdentifier": "2fdefc65-d750-4b8d-96ee-6e2c0c42dbfe", "published": "2024-12-04T12:15:19.500", - "lastModified": "2024-12-05T11:15:06.340", + "lastModified": "2025-01-06T18:15:20.720", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -66,6 +66,28 @@ "providerUrgency": "RED" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-522xx/CVE-2024-52276.json b/CVE-2024/CVE-2024-522xx/CVE-2024-52276.json index 8b98f2501af..5c33ecd7deb 100644 --- a/CVE-2024/CVE-2024-522xx/CVE-2024-52276.json +++ b/CVE-2024/CVE-2024-522xx/CVE-2024-52276.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52276", "sourceIdentifier": "2fdefc65-d750-4b8d-96ee-6e2c0c42dbfe", "published": "2024-12-04T11:30:50.947", - "lastModified": "2024-12-05T11:15:07.360", + "lastModified": "2025-01-06T18:15:20.967", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -66,6 +66,28 @@ "providerUrgency": "RED" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53185.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53185.json index 2b671160a2e..8f7da61dfbd 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53185.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53185.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53185", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:25.973", - "lastModified": "2024-12-27T14:15:25.973", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:17:06.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: cliente: corregir NULL ptr deref en crypto_aead_setkey() Ni SMB3.0 ni SMB3.02 admiten el contexto de negociaci\u00f3n de cifrado, por lo que cuando se establece el indicador SMB2_GLOBAL_CAP_ENCRYPTION en la respuesta de negociaci\u00f3n, el cliente utiliza AES-128-CCM como cifrado predeterminado. Consulte MS-SMB2 3.3.5.4. el commit b0abcd65ec54 (\"smb: cliente: corregir UAF en descifrado as\u00edncrono\") agreg\u00f3 una comprobaci\u00f3n @server->cipher_type para llamar condicionalmente a smb3_crypto_aead_allocate(), pero esa comprobaci\u00f3n siempre ser\u00eda falsa ya que @server->cipher_type no est\u00e1 configurado para SMB3.02. Corrija el siguiente splat de KASAN configurando tambi\u00e9n @server->cipher_type para SMB3.02. mount.cifs //srv/share /mnt -o vers=3.02,seal,... ERROR: KASAN: null-ptr-deref en crypto_aead_setkey+0x2c/0x130 Lectura de tama\u00f1o 8 en la direcci\u00f3n 0000000000000020 por la tarea mount.cifs/1095 CPU: 1 UID: 0 PID: 1095 Comm: mount.cifs No contaminado 6.12.0 #1 Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-3.fc41 04/01/2014 Rastreo de llamadas: dump_stack_lvl+0x5d/0x80 ? crypto_aead_setkey+0x2c/0x130 kasan_report+0xda/0x110 ? crypto_aead_setkey+0x2c/0x130 crypto_aead_setkey+0x2c/0x130 crypt_message+0x258/0xec0 [cifs] ? __asan_memset+0x23/0x50 ? __pfx_crypt_message+0x10/0x10 [cifs] ? mark_lock+0xb0/0x6a0 ? hlock_class+0x32/0xb0 ? mark_lock+0xb0/0x6a0 smb3_init_transform_rq+0x352/0x3f0 [cifs] ? lock_acquire.part.0+0xf4/0x2a0 smb_send_rqst+0x144/0x230 [cifs] ? __pfx_smb_send_rqst+0x10/0x10 [cifs] ? hlock_class+0x32/0xb0 ? smb2_setup_request+0x225/0x3a0 [cifs] ? __pfx_cifs_compound_last_callback+0x10/0x10 [cifs] compuesto_send_recv+0x59b/0x1140 [cifs] ? __pfx_compound_send_recv+0x10/0x10 [cifs] ? __create_object+0x5e/0x90 ? hlock_class+0x32/0xb0 ? __pfx_SMB2_tcon+0x10/0x10 [cifs] ? bloqueo_adquirir.parte.0+0xf4/0x2a0 ? bloqueo_adquirir+0xc6/0x120 ? _get_xid+0x16/0xd0 [cifs] ? cifs_get_smb_ses+0xcdd/0x10a0 [cifs] cifs_get_smb_ses+0xcdd/0x10a0 [cifs] ? __pfx_cifs_get_smb_ses+0x10/0x10 [cifs] ? cifs_get_tcp_session+0xaa0/0xca0 [cifs] cifs_mount_get_session+0x8a/0x210 [cifs] dfs_mount_share+0x1b0/0x11d0 [cifs] ? __pfx___lock_acquire+0x10/0x10 ? __pfx_dfs_mount_share+0x10/0x10 [cifs] ? bloqueo_adquirir.parte.0+0xf4/0x2a0 ? bloqueo_retenido_encontrar+0x8a/0xa0 ? clase_bloqueo_h+0x32/0xb0 ? liberaci\u00f3n_bloqueo+0x203/0x5d0 montaje_cifs+0xb3/0x3d0 [cifs] ? intento_bloqueo_giro_sin_bloqueo+0xc6/0x120 ? montaje_cifs_pfx+0x10/0x10 [cifs] ? bloqueo_adquirir+0x3f/0x90 ? montaje_nls_encontrar+0x16/0xa0 ? banderas_mnt_actualizar_smb3+0x372/0x3b0 [cifs] cifs_smb3_hacer_montar+0x1e2/0xc80 [cifs] ? __pfx_vfs_parse_fs_string+0x10/0x10 ? __pfx_cifs_smb3_do_mount+0x10/0x10 [cifs] smb3_get_tree+0x1bf/0x330 [cifs] vfs_get_tree+0x4a/0x160 path_mount+0x3c1/0xfb0 ? kasan_quarantine_put+0xc7/0x1d0 ? __pfx_path_mount+0x10/0x10 ? kmem_cache_free+0x118/0x3e0 ? user_path_at+0x74/0xa0 __x64_sys_mount+0x1a6/0x1e0 ? __pfx___x64_sys_mount+0x10/0x10 ? marcar_bloqueos_retenidos+0x1a/0x90 hacer_llamada_al_sistema_64+0xbb/0x1d0 entrada_SYSCALL_64_despu\u00e9s_de_hwframe+0x77/0x7f" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.57", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "C8945A66-658A-4AD8-A181-1427B77B6201" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11.4", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "882290D1-9594-457B-B4DE-75810B78463D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/22127c1dc04364cda3da812161e70921e6c3c0af", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/46f8e25926817272ec8d5bfbd003569bdeb9a8c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4bdec0d1f658f7c98749bd2c5a486e6cfa8565d2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9b8904b53b5ace0519c74cd89fc3ca763f3856d4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53221.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53221.json index 5782cb97b57..999a639fe06 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53221.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53221.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53221", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:30.190", - "lastModified": "2024-12-27T14:15:30.190", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:18:20.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n de null-ptr-deref en f2fs_submit_page_bio() Existe el siguiente problema al instalar simult\u00e1neamente el m\u00f3dulo f2fs.ko y montar el sistema de archivos f2fs: KASAN: null-ptr-deref en el rango [0x0000000000000020-0x0000000000000027] RIP: 0010:__bio_alloc+0x2fb/0x6c0 [f2fs] Seguimiento de llamadas: f2fs_submit_page_bio+0x126/0x8b0 [f2fs] __get_meta_page+0x1d4/0x920 [f2fs] get_checkpoint_version.constprop.0+0x2b/0x3c0 [f2fs] El problema anterior ocurre porque el biset del sistema de archivos f2fs no est\u00e1 configurado inicializado antes de registrar \"f2fs_fs_type\". Para solucionar el problema anterior, simplemente registre \"f2fs_fs_type\" al final de init_f2fs_fs(). Aseg\u00farese de que todos los recursos del sistema de archivos f2fs est\u00e9n inicializados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "F6E5BC9C-2956-4725-8827-6A983AE003AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/32f5e291b7677495f98246eec573767430321c08", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e11b1d5fda972f6be60ab732976a7c8e064cd56", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b7d0a97b28083084ebdd8e5c6bccd12e6ec18faa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53230.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53230.json index 54502e94785..c69fccb454c 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53230.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53230.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53230", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:31.290", - "lastModified": "2024-12-27T14:15:31.290", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:19:04.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cpufreq: CPPC: Se corrige la posible desreferenciaci\u00f3n de puntero nulo para cppc_get_cpu_cost(). cpufreq_cpu_get_raw() puede devolver NULL si la CPU no est\u00e1 en la m\u00e1scara de CPU policy->cpus y provocar\u00e1 una desreferenciaci\u00f3n de puntero nulo, as\u00ed que verifique NULL para cppc_get_cpu_cost()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "96FDD29E-2D1D-4602-885E-33F1A42B1BB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1975b481f644f8f841d9c188e3c214fce187f18b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1a1374bb8c5926674973d849feed500bc61ad535", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6be57617a38b3f33266acecdb3c063c1c079aaf7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/afd22d9839359829776abb55cc9bc4946e888704", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f05ef81db63889f6f14eb77fd140dac6cedb6f7f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53231.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53231.json index d1c714556da..ced6a1893dd 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53231.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53231.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53231", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:31.390", - "lastModified": "2024-12-27T14:15:31.390", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:19:49.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cpufreq: CPPC: Se corrige la posible desreferenciaci\u00f3n de puntero nulo para cpufreq_cpu_get_raw(). cpufreq_cpu_get_raw() puede devolver NULL si la CPU no est\u00e1 en la m\u00e1scara de CPU policy->cpus y provocar\u00e1 una desreferenciaci\u00f3n de puntero nulo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "96FDD29E-2D1D-4602-885E-33F1A42B1BB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/65fe2f7fdafe2698a343661800434b3f2e51041e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a357b63fd21e4b2791008c2175ba7a8c235ebce1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a78e7207564258db6e373e86294a85f9d646d35a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e07570a8f2cfc51260c6266cb8e1bd4777a610d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e9b39f1924b76abc18881e4ce899fb232dd23d12", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53833.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53833.json index 4c7fa05c3b7..1f6d7f5e596 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53833.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53833.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53833", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2025-01-03T04:15:06.227", - "lastModified": "2025-01-03T04:15:06.227", + "lastModified": "2025-01-06T17:15:39.110", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En prepare_response_locked de lwis_transaction.c, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-12-01", diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53916.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53916.json index 9c995f4c4ea..180d4b0a2e1 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53916.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53916.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53916", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-25T00:15:04.423", - "lastModified": "2024-12-04T22:15:22.840", + "lastModified": "2025-01-06T18:15:21.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], "references": [ { "url": "https://github.com/openstack/neutron/blob/363ffa6e9e1ab5968f87d45bc2f1cb6394f48b9f/neutron/extensions/tagging.py#L138-L232", diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54879.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54879.json new file mode 100644 index 00000000000..7dfeaa1605d --- /dev/null +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54879.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-54879", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-06T18:15:21.880", + "lastModified": "2025-01-06T18:15:21.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SeaCMS V13.1 is vulnerable to Incorrect Access Control. A logic flaw can be exploited by an attacker to allow any user to recharge members indefinitely." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://seacms.com", + "source": "cve@mitre.org" + }, + { + "url": "https://blog.csdn.net/weixin_46686336/article/details/144797242", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54880.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54880.json new file mode 100644 index 00000000000..beeaf5ab877 --- /dev/null +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54880.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-54880", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-06T18:15:22.037", + "lastModified": "2025-01-06T18:15:22.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SeaCMS V13.1 is vulnerable to Incorrect Access Control. A logic flaw can be exploited by an attacker to allow any user to register accounts in bulk." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.csdn.net/weixin_46686336/article/details/144797063", + "source": "cve@mitre.org" + }, + { + "url": "https://www.seacms.net/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55529.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55529.json new file mode 100644 index 00000000000..b1e9fc709c8 --- /dev/null +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55529.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-55529", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-06T18:15:22.183", + "lastModified": "2025-01-06T18:15:22.183", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Z-BlogPHP 1.7.3 is vulnerable to arbitrary code execution via \\zb_users\\theme\\shell\\template." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/fengyijiu520/Z-Blog-", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55605.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55605.json new file mode 100644 index 00000000000..e3bbea5cbce --- /dev/null +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55605.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-55605", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-06T17:15:39.600", + "lastModified": "2025-01-06T17:15:39.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large input buffer to the to_lowercase, to_uppercase, strip_whitespace, compress_whitespace, dotprefix, header_lowercase, strip_pseudo_headers, url_decode, or xor transform can lead to a stack overflow causing Suricata to crash. The issue has been addressed in Suricata 7.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-x2hr-33vp-w289", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7229", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55626.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55626.json new file mode 100644 index 00000000000..fbbae28d0d6 --- /dev/null +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55626.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-55626", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-06T18:15:22.570", + "lastModified": "2025-01-06T18:15:22.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large BPF filter file provided to Suricata at startup can lead to a buffer overflow at Suricata startup. The issue has been addressed in Suricata 7.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OISF/suricata/commit/dd71ef0af222a566e54dfc479dd1951dd17d7ceb", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-wmg4-jqx5-4h9v", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7366", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55627.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55627.json new file mode 100644 index 00000000000..9be541e36cc --- /dev/null +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55627.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2024-55627", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-06T18:15:22.757", + "lastModified": "2025-01-06T18:15:22.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a specially crafted TCP stream can lead to a very large buffer overflow while being zero-filled during initialization with memset due to an unsigned integer underflow. The issue has been addressed in Suricata 7.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + }, + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OISF/suricata/commit/282509f70c4ce805098e59535af445362e3e9ebd", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/8900041405dbb5f9584edae994af2100733fb4be", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/9a53ec43b13f0039a083950511a18bf6f408e432", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-h2mv-7gg8-8x7v", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7393", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55628.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55628.json new file mode 100644 index 00000000000..89ba6c205d7 --- /dev/null +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55628.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2024-55628", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-06T18:15:22.947", + "lastModified": "2025-01-06T18:15:22.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.8, DNS resource name compression can lead to small DNS messages containing very large hostnames which can be costly to decode, and lead to very large DNS log records. While there are limits in place, they were too generous. The issue has been addressed in Suricata 7.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-405" + }, + { + "lang": "en", + "value": "CWE-779" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OISF/suricata/commit/19cf0f81335d9f787d587450f7105ad95a648951", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/37f4c52b22fcdde4adf9b479cb5700f89d00768d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/3a5671739f5b25e5dd973a74ca5fd8ea40e1ae2d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-96w4-jqwf-qx2j", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7280", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55629.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55629.json new file mode 100644 index 00000000000..75e312dfa75 --- /dev/null +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55629.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-55629", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-06T18:15:23.130", + "lastModified": "2025-01-06T18:15:23.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, TCP streams with TCP urgent data (out of band data) can lead to Suricata analyzing data differently than the applications at the TCP endpoints, leading to possible evasions. Suricata 7.0.8 includes options to allow users to configure how to handle TCP urgent data. In IPS mode, you can use a rule such as drop tcp any any -> any any (sid:1; tcp.flags:U*;) to drop all the packets with urgent flag set." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-437" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OISF/suricata/commit/6882bcb3e51bd3cf509fb6569cc30f48d7bb53d7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/779f9d8ba35c3f9b5abfa327d3a4209861bd2eb8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-69wr-vhwg-84h2", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7411", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json index f890fcdf99b..118cb63ed48 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5594", "sourceIdentifier": "security@openvpn.net", "published": "2025-01-06T14:15:08.807", - "lastModified": "2025-01-06T14:15:08.807", - "vulnStatus": "Received", + "lastModified": "2025-01-06T17:15:44.383", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@openvpn.net", diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56574.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56574.json index 675732bd1dc..751eb5b1dab 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56574.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56574.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56574", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:16.420", - "lastModified": "2024-12-27T15:15:16.420", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:20:38.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: ts2020: fix null-ptr-deref in ts2020_probe() KASAN inform\u00f3 un problema de null-ptr-deref al ejecutar el siguiente comando: # echo ts2020 0x20 > /sys/bus/i2c/devices/i2c-0/new_device KASAN: null-ptr-deref in range [0x000000000000010-0x0000000000000017] CPU: 53 UID: 0 PID: 970 Comm: systemd-udevd No contaminado 6.12.0-rc2+ #24 Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009) RIP: 0010:ts2020_probe+0xad/0xe10 [ts2020] RSP: 0018:ffffc9000abbf598 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffffc0714809 RDX: 0000000000000002 RSI: ffff88811550be00 RDI: 0000000000000010 RBP: ffff888109868800 R08: 0000000000000001 R09: fffff52001577eb6 R10: 00000000000000000 R11: ffffc9000abbff50 R12: ffffffffc0714790 R13: 1ffff92001577eb8 R14: ffffffffc07190d0 R15: 0000000000000001 FS: 00007f95f13b98c0(0000) GS:ffff888149280000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555d2634b000 CR3: 0000000152236000 CR4: 000000000000006f0 DR0: 00000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: ts2020_probe+0xad/0xe10 [ts2020] i2c_device_probe+0x421/0xb40 really_probe+0x266/0x850 ... La causa del problema es que al usar sysfs para registrar din\u00e1micamente un Dispositivo i2c, no hay datos de plataforma, pero el proceso de sondeo de ts2020 necesita utilizar datos de plataforma, lo que da como resultado el acceso a un puntero nulo. Resuelva este problema agregando comprobaciones a los datos de plataforma." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1", + "versionEndExcluding": "5.4.287", + "matchCriteriaId": "4B08AFEE-D4EF-47B3-BD35-5A861B359191" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.4", + "matchCriteriaId": "04756810-D093-4B43-B1D9-CF5035968061" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4a058b34b52ed3feb1f3ff6fd26aefeeeed20cba", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a53f97cd5977911850b695add057f9965c1a2d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/901070571bc191d1d8d7a1379bc5ba9446200999", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a2ed3b780f34e4a6403064208bc2c99d1ed85026", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b6208d1567f929105011bcdfd738f59a6bdc1088", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ced1c04e82e3ecc246b921b9733f0df0866aa50d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dc03866b5f4aa2668946f8384a1e5286ae53bbaa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56577.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56577.json index edc2d92bbee..5544aabccc6 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56577.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56577.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56577", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:16.767", - "lastModified": "2024-12-27T15:15:16.767", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:21:33.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: mtk-jpeg: Corregir null-ptr-deref durante la descarga del m\u00f3dulo La cola de trabajo debe destruirse en mtk_jpeg_core.c desde el commit 09aea13ecf6f (\"media: mtk-jpeg: refactorizar algunas variables\"), de lo contrario, el siguiente seguimiento de llamadas puede activarse f\u00e1cilmente. [ 677.862514] No se puede gestionar la solicitud de paginaci\u00f3n del n\u00facleo en la direcci\u00f3n virtual dfff800000000023 [ 677.863633] KASAN: null-ptr-deref en el rango [0x0000000000000118-0x000000000000011f] ... [ 677.879654] CPU: 6 PID: 1071 Comm: modprobe Tainted: GO 6.8.12-mtk+gfa1a78e5d24b+ #17 ... [ 677.882838] pc : destroy_workqueue+0x3c/0x770 [ 677.883413] lr : mtk_jpegdec_destroy_workqueue+0x70/0x88 [mtk_jpeg_dec_hw] [ 677.884314] sp : ffff80008ad974f0 [ 677.884744] x29: ffff80008ad974f0 x28: ffff0000d7115580 x27: ffff0000dd691070 [ 677.885669] x26: ffff0000dd691408 x25: ffff8000844af3e0 x24: ffff80008ad97690 [ 677.886592] x23: ffff0000e051d400 x22: ffff0000dd691010 x21: dfff800000000000 [ 677.887515] x20: 0000000000000000 x19: 0000000000000000 x18: ffff800085397ac0 [ 677.888438] x17: 0000000000000000 x16: ffff8000801b87c8 x15: 1ffff000115b2e10 [ 677.889361] x14: 00000000f1f1f1f1 x13: 000000000000000 x12: x11: 1ffff000115b2e4c x10: ffff7000115b2e4c x9: ffff80000aa43e90 [677.891208] x8: 00008fffeea4d1b4 x7: ffff80008ad97267 x6: 0000000000000001 [677.892131] x5: ffff80008ad97260 x4: ffff7000115b2e4d x3: 0000000000000000 [677.893054] x2: 00000000000000023 x1 : dfff800000000000 x0 : 0000000000000118 [ 677.893977] Rastreo de llamadas: [ 677.894297] destroy_workqueue+0x3c/0x770 [ 677.894826] mtk_jpegdec_destroy_workqueue+0x70/0x88 [mtk_jpeg_dec_hw] [ 677.895677] devm_action_release+0x50/0x90 [ 677.896211] release_nodes+0xe8/0x170 [ 677.896688] devres_release_all+0xf8/0x178 [ 677.897219] device_unbind_cleanup+0x24/0x170 [ 677.897785] device_release_driver_internal+0x35c/0x480 [ 677.898461] device_release_driver+0x20/0x38 ... [ 677.912665] ---[ fin de seguimiento 0000000000000000 ]---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "443C5382-3B75-483A-BDE8-C8856CA429BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.4", + "matchCriteriaId": "04756810-D093-4B43-B1D9-CF5035968061" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0ba08c21c6a92e6512e73644555120427c9a49d4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/17af2b39daf12870cac61ffc360e62bc35798afb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bc3889a39baf783c64c6d628bbb74d76ce164bb1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56611.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56611.json index c8f47ac7abd..2cfe42390d8 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56611.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56611.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56611", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:20.587", - "lastModified": "2024-12-27T15:15:20.587", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:22:48.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,94 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/mempolicy: se corrige el error de migrants_to_node() suponiendo que hay al menos un VMA en un MM. Actualmente, suponemos que hay al menos un VMA en un MM, lo que no es cierto. Por lo tanto, podr\u00edamos terminar haciendo que find_vma() devuelva NULL, para luego desreferenciarlo. Por lo tanto, se gestiona correctamente el error de que find_vma() devuelva NULL. Esto corrige el informe: Ups: error de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref en el rango [0x000000000000000-0x0000000000000007] CPU: 1 UID: 0 PID: 6021 Comm: syz-executor284 No contaminado 6.12.0-rc7-syzkaller-00187-gf868cd251776 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 RIP: 0010:migrate_to_node mm/mempolicy.c:1090 [en l\u00ednea] RIP: 0010:do_migrate_pages+0x403/0x6f0 mm/mempolicy.c:1194 C\u00f3digo: ... RSP: 0018:ffffc9000375fd08 EFLAGS: 00010246 RAX: 000000000000000 RBX: ffffc9000375fd78 RCX: 000000000000000 RDX: ffff88807e171300 RSI: dffffc0000000000 RDI: ffff88803390c044 RBP: ffff88807e171428 R08: 0000000000000014 R09: fffffbfff2039ef1 R10: ffffffff901cf78f R11: 0000000000000000 R12: 0000000000000003 R13: ffffc9000375fe90 R14: ffffc9000375fe98 R15: ffffc9000375fdf8 FS: 00005555919e1380(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005555919e1ca8 CR3: 000000007f12a000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: kernel_migrate_pages+0x5b2/0x750 mm/mempolicy.c:1709 __do_sys_migrate_pages mm/mempolicy.c:1727 [en l\u00ednea] __se_sys_migrate_pages mm/mempolicy.c:1723 [en l\u00ednea] __x64_sys_migrate_pages+0x96/0x100 mm/mempolicy.c:1723 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f [akpm@linux-foundation.org: agregar improbable()]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.16", + "versionEndExcluding": "6.6.66", + "matchCriteriaId": "FE619D1D-A017-4BE5-AB50-183794C0C729" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.5", + "matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/091c1dd2d4df6edd1beebe0e5863d4034ade9572", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/42d9fe2adf8613f9eea1f0c2619c9e2611eae0ea", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a13b2b9b0b0b04612c7d81e3b3dfb485c5f7abc3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56643.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56643.json index 83af25ccf00..9b1e3c5c5ec 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56643.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56643.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56643", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:24.040", - "lastModified": "2024-12-27T15:15:24.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:14:41.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,150 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dccp: Se corrige la p\u00e9rdida de memoria en dccp_feat_change_recv Si dccp_feat_push_confirm() falla despu\u00e9s de que se acept\u00f3 un nuevo valor para la caracter\u00edstica SP sin conciliaci\u00f3n (rama 'entry == NULL'), la memoria asignada para ese valor con dccp_feat_clone_sp_val() nunca se libera. Aqu\u00ed est\u00e1 la pila kmemleak para esto: objeto sin referencia 0xffff88801d4ab488 (tama\u00f1o 8): comm \"syz-executor310\", pid 1127, jiffies 4295085598 (edad 41.666s) volcado hexadecimal (primeros 8 bytes): 01 b4 4a 1d 80 88 ff ff ..J..... backtrace: [<00000000db7cabfe>] kmemdup+0x23/0x50 mm/util.c:128 [<0000000019b38405>] kmemdup include/linux/string.h:465 [en l\u00ednea] [<0000000019b38405>] dccp_feat_clone_sp_val net/dccp/feat.c:371 [en l\u00ednea] [<0000000019b38405>] dccp_feat_clone_sp_val net/dccp/feat.c:367 [en l\u00ednea] [<0000000019b38405>] dccp_feat_change_recv net/dccp/feat.c:1145 [en l\u00ednea] [<0000000019b38405>] dccp_feat_parse_options+0x1196/0x2180 net/dccp/feat.c:1416 [<00000000b1f6d94a>] dccp_parse_options+0xa2a/0x1260 net/dccp/options.c:125 [<0000000030d7b621>] dccp_rcv_state_process+0x197/0x13d0 red/dccp/input.c:650 [<000000001f74c72e>] dccp_v4_do_rcv+0xf9/0x1a0 red/dccp/ipv4.c:688 [<00000000a6c24128>] sk_backlog_rcv incluir/net/sock.h:1041 [en l\u00ednea] [<00000000a6c24128>] __release_sock+0x139/0x3b0 red/core/sock.c:2570 [<00000000cf1f3a53>] release_sock+0x54/0x1b0 net/core/sock.c:3111 [<000000008422fa23>] espera_de_conexi\u00f3n inet net/ipv4/af_inet.c:603 [en l\u00ednea] [<000000008422fa23>] __inet_stream_connect+0x5d0/0xf70 net/ipv4/af_inet.c:696 [<0000000015b6f64d>] inet_stream_connect+0x53/0xa0 net/ipv4/af_inet.c:735 [<0000000010122488>] archivo_de_conexi\u00f3n_sys+0x15c/0x1a0 net/socket.c:1865 [<00000000b4b70023>] __sys_connect+0x165/0x1a0 red/socket.c:1882 [<00000000f4cb3815>] __do_sys_connect red/socket.c:1892 [en l\u00ednea] [<00000000f4cb3815>] __se_sys_connect red/socket.c:1889 [en l\u00ednea] [<00000000f4cb3815>] __x64_sys_connect+0x6e/0xb0 red/socket.c:1889 [<00000000e7b1e839>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<0000000055e91434>] entry_SYSCALL_64_after_hwframe+0x67/0xd1 Limpia la memoria asignada en caso de que dccp_feat_push_confirm() falle y se resuelve con un c\u00f3digo de reinicio de error. Encontrado por Linux Verification Center (linuxtesting.org) con Syzkaller." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.29", + "versionEndExcluding": "5.4.287", + "matchCriteriaId": "1298C84F-E296-4E2D-8B96-829D4E94588D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.66", + "matchCriteriaId": "29A976AD-B9AB-4A95-9F08-7669F8847EB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.5", + "matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/22be4727a8f898442066bcac34f8a1ad0bc72e14", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/623be080ab3c13d71570bd32f7202a8efa8e2252", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6ff67909ee2ffad911e3122616df41dee23ff4f6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9ee68b0f23706a77f53c832457b9384178b76421", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bc3d4423def1a9412a0ae454cb4477089ab79276", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c99507fff94b926fc92279c92d80f229c91cb85d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d3ec686a369fae5034303061f003cd3f94ddfd23", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56660.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56660.json index 04ec1d73047..de3826e6a8b 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56660.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56660.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56660", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:25.857", - "lastModified": "2024-12-27T15:15:25.857", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:43:45.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,113 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: DR, evitar la posible desreferencia del puntero de error La funci\u00f3n dr_domain_add_vport_cap() generalmente devuelve NULL en caso de error, pero a veces queremos que devuelva ERR_PTR(-EBUSY) para que el autor de la llamada pueda volver a intentarlo. El problema aqu\u00ed es que \"ret\" puede ser -EBUSY o -ENOMEM y si es y -ENOMEM, entonces el puntero de error se propaga de vuelta y finalmente se desreferencia en dr_ste_v0_build_src_gvmi_qpn_tag()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.121", + "matchCriteriaId": "D8DA16A0-9C6E-493E-90EE-309A34901477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.67", + "matchCriteriaId": "BF4F2CD1-2CA6-4D6B-9B0C-57C3C4D6544A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.6", + "matchCriteriaId": "0CB1A9BB-F95E-43DD-A2FD-147912FD91E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/11776cff0b563c8b8a4fa76cab620bfb633a8cb8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/325cf73a1b449fea3158ab99d03a7a717aad1618", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/61f720e801443d4e2a3c0261eda4ad8431458dca", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a59c61a1869ceefc65ef02886f91e8cd0062211f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56661.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56661.json index d90543f7aac..c92ded50fa0 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56661.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56661.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56661", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:25.960", - "lastModified": "2024-12-27T15:15:25.960", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:49:40.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,138 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tipc: se corrige la deref NULL en cleanup_bearer() syzbot encontr\u00f3 [1] que despu\u00e9s de el commit culpada, ub->ubsock->sk era NULL al intentar atomic_dec() : atomic_dec(&tipc_net(sock_net(ub->ubsock->sk))->wq_count); Solucione esto almacenando en cach\u00e9 el puntero tipc_net. [1] Ups: error de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref en el rango [0x000000000000030-0x0000000000000037] CPU: 0 UID: 0 PID: 5896 Comm: kworker/0:3 No contaminado 6.13.0-rc1-next-20241203-syzkaller #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 13/09/2024 Cola de trabajo: eventos cleanup_bearer RIP: 0010:read_pnet include/net/net_namespace.h:387 [en l\u00ednea] RIP: 0010:sock_net include/net/sock.h:655 [en l\u00ednea] RIP: 0010:cleanup_bearer+0x1f7/0x280 net/tipc/udp_media.c:820 C\u00f3digo: 18 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 3c f7 99 f6 48 8b 1b 48 83 c3 30 e8 f0 e4 60 00 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 1a f7 99 f6 49 83 c7 e8 48 8b 1b RSP: 0018:ffffc9000410fb70 EFLAGS: 00010206 RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff88802fe45a00 RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffc9000410f900 RBP: ffff88807e1f0908 R08: ffffc9000410f907 R09: 1ffff92000821f20 R10: dffffc0000000000 R11: fffff52000821f21 R12: ffff888031d19980 R13: dffffc0000000000 R14: dffffc0000000000 R15: ffff88807e1f0918 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000556ca050b000 CR3: 0000000031c0c000 CR4: 00000000003526f0 DR0: 00000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.4.287:*:*:*:*:*:*:*", + "matchCriteriaId": "270B5743-09BB-4393-B8A8-86C7EAAB8DAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.10.231:*:*:*:*:*:*:*", + "matchCriteriaId": "7D576002-9649-4BE6-AF72-C5E230DF0A0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.15.174:*:*:*:*:*:*:*", + "matchCriteriaId": "B25345A0-8E32-4651-B6FF-2DE4DB0B3A48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1.120:*:*:*:*:*:*:*", + "matchCriteriaId": "52A2191E-D354-4732-9A39-C4059434873F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6.66:*:*:*:*:*:*:*", + "matchCriteriaId": "36894D4E-0255-4309-B4D2-06ED50D7D076" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12.5:*:*:*:*:*:*:*", + "matchCriteriaId": "F9807ED9-EBAB-45B9-AC9D-FA54900DD0DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/07b569eda6fe6a1e83be5a587abee12d1303f95e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/754ec823ee53422361da7958a8c8bf3275426912", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89ecda492d0a37fd00aaffc4151f1f44c26d93ac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a771f349c95d3397636861a0a6462d4a7a7ecb25", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a852c82eda4991e21610837aaa160965be71f5cc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b04d86fff66b15c07505d226431f808c15b1703c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d1d4dfb189a115734bff81c411bc58d9e348db7d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56662.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56662.json index 138fafea601..d3cf83de59f 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56662.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56662.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56662", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:26.073", - "lastModified": "2024-12-27T15:15:26.073", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:51:31.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,155 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: acpi: nfit: vmalloc-out-of-bounds Lectura en acpi_nfit_ctl Se soluciona un problema detectado por syzbot con KASAN: ERROR: KASAN: vmalloc-out-of-bounds en cmd_to_func drivers/acpi/nfit/ core.c:416 [en l\u00ednea] ERROR: KASAN: vmalloc-out-of-bounds en acpi_nfit_ctl+0x20e8/0x24a0 drivers/acpi/nfit/core.c:459 El problema ocurre en cmd_to_func cuando se accede a la matriz call_pkg->nd_reserved2 sin verificar que call_pkg apunte a un b\u00fafer que tenga el tama\u00f1o adecuado como una estructura nd_cmd_pkg. Esto puede provocar un acceso fuera de los l\u00edmites y un comportamiento indefinido si el b\u00fafer no tiene suficiente espacio. Para solucionar este problema, se agreg\u00f3 una verificaci\u00f3n en acpi_nfit_ctl() para garantizar que buf no sea NULL y que buf_len sea menor que sizeof(*call_pkg) antes de acceder a \u00e9l. Esto garantiza un acceso seguro a los miembros de call_pkg, incluida la matriz nd_reserved2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14.176", + "versionEndExcluding": "4.15", + "matchCriteriaId": "B6274D15-ED31-472F-B0FC-C76687469C95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.31", + "versionEndExcluding": "4.20", + "matchCriteriaId": "C208F54A-1F85-44EF-9E91-6DA461A49CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.4", + "versionEndExcluding": "5.10.232", + "matchCriteriaId": "3B31FA24-D2AC-48A5-A29D-35820E219F8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.175", + "matchCriteriaId": "7A1F3620-6900-4852-9229-C3527377EBDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.121", + "matchCriteriaId": "D8DA16A0-9C6E-493E-90EE-309A34901477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.67", + "matchCriteriaId": "BF4F2CD1-2CA6-4D6B-9B0C-57C3C4D6544A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.6", + "matchCriteriaId": "0CB1A9BB-F95E-43DD-A2FD-147912FD91E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/143f723e9eb4f0302ffb7adfdc7ef77eab3f68e0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/212846fafb753a48e869e2a342fc1e24048da771", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/265e98f72bac6c41a4492d3e30a8e5fd22fe0779", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/616aa5f3c86e0479bcbb81e41c08c43ff32af637", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bbdb3307f609ec4dc9558770f464ede01fe52aed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e08dc2dc3c3f7938df0e4476fe3e6fdec5583c1d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56663.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56663.json index 1fa4de246a9..be4f8feaafa 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56663.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56663.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56663", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:26.187", - "lastModified": "2024-12-27T15:15:26.187", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:52:41.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,120 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: nl80211: correcci\u00f3n del error NL80211_ATTR_MLO_LINK_ID en uno Dado que la validaci\u00f3n del rango del atributo netlink proporciona una verificaci\u00f3n inclusiva, el *m\u00e1ximo* del atributo NL80211_ATTR_MLO_LINK_ID debe ser IEEE80211_MLD_MAX_NUM_LINKS - 1, lo que de lo contrario provocar\u00eda un error de uno. Una pila de fallos para demostraci\u00f3n: ==================================================================== ERROR: KASAN: acceso a memoria salvaje en ieee80211_tx_control_port+0x3b6/0xca0 net/mac80211/tx.c:5939 Lectura de tama\u00f1o 6 en la direcci\u00f3n 001102080000000c por la tarea fuzzer.386/9508 CPU: 1 PID: 9508 Comm: syz.1.386 No contaminado 6.1.70 #2 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0x177/0x231 lib/dump_stack.c:106 print_report+0xe0/0x750 mm/kasan/report.c:398 kasan_report+0x139/0x170 mm/kasan/report.c:495 kasan_check_range+0x287/0x290 mm/kasan/generic.c:189 memcpy+0x25/0x60 mm/kasan/shadow.c:65 ieee80211_tx_control_port+0x3b6/0xca0 net/mac80211/tx.c:5939 rdev_tx_control_port net/wireless/rdev-ops.h:761 [en l\u00ednea] nl80211_tx_control_port+0x7b3/0xc40 net/wireless/nl80211.c:15453 genl_family_rcv_msg_doit+0x22e/0x320 net/netlink/genetlink.c:756 genl_family_rcv_msg net/netlink/genetlink.c:833 [en l\u00ednea] genl_rcv_msg+0x539/0x740 net/netlink/genetlink.c:850 netlink_rcv_skb+0x1de/0x420 net/netlink/af_netlink.c:2508 genl_rcv+0x24/0x40 net/netlink/genetlink.c:861 netlink_unicast_kernel net/netlink/af_netlink.c:1326 [en l\u00ednea] netlink_unicast+0x74b/0x8c0 net/netlink/af_netlink.c:1352 netlink_sendmsg+0x882/0xb90 net/netlink/af_netlink.c:1874 sock_sendmsg_nosec net/socket.c:716 [en l\u00ednea] __sock_sendmsg net/socket.c:728 [en l\u00ednea] ____sys_sendmsg+0x5cc/0x8f0 net/socket.c:2499 ___sys_sendmsg+0x21c/0x290 net/socket.c:2553 __sys_sendmsg net/socket.c:2582 [en l\u00ednea] __do_sys_sendmsg net/socket.c:2591 [en l\u00ednea] __se_sys_sendmsg+0x19e/0x270 net/socket.c:2589 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x45/0x90 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x63/0xcd Actualice la pol\u00edtica para garantizar una validaci\u00f3n correcta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-193" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19.2", + "versionEndExcluding": "5.20", + "matchCriteriaId": "E8D3E719-D0A1-4044-AB60-B63044B0A1B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.1.121", + "matchCriteriaId": "46F9451D-F254-4A6D-A0CE-93AC2EF2FC98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.67", + "matchCriteriaId": "BF4F2CD1-2CA6-4D6B-9B0C-57C3C4D6544A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.6", + "matchCriteriaId": "0CB1A9BB-F95E-43DD-A2FD-147912FD91E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/29e640ae641b9f5ffc666049426d2b16c98d9963", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2e3dbf938656986cce73ac4083500d0bcfbffe24", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f3412522f78826fef1dfae40ef378a863df2591c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f850d1d9f1106f528dfc5807565f2d1fa9a397d3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56665.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56665.json index 6e4027e92d3..e148fec0be5 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56665.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56665.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56665", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:26.400", - "lastModified": "2024-12-27T15:15:26.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:42:12.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,120 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf,perf: Se corrige el acceso no v\u00e1lido a prog_array en perf_event_detach_bpf_prog Syzbot inform\u00f3 [1] un fallo que ocurre en el siguiente escenario de seguimiento: - crear un evento perf de tracepoint con attr.inherit=1, adjuntarlo al proceso y establecerle el programa bpf - el proceso adjunto se bifurca -> chid crea un evento heredado el nuevo evento secundario comparte el programa bpf del padre y tp_event (de ah\u00ed prog_array) que es global para tracepoint - salir tanto del proceso como de su hijo -> liberar ambos eventos - la primera llamada perf_event_detach_bpf_prog liberar\u00e1 tp_event->prog_array y la segunda perf_event_detach_bpf_prog se bloquear\u00e1, porque tp_event->prog_array es NULL La correcci\u00f3n asegura que las comprobaciones perf_event_detach_bpf_prog prog_array es v\u00e1lido antes de intentar eliminar el programa bpf de \u00e9l. [1] https://lore.kernel.org/bpf/Z1MR6dCIKajNS6nU@krava/T/#m91dbf0688221ec7a7fc95e896a7ef9ff93b0b8ad" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.170", + "versionEndExcluding": "5.16", + "matchCriteriaId": "C7FE0726-C761-4349-9521-83EAB0A1FCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.115", + "versionEndExcluding": "6.1.121", + "matchCriteriaId": "5DAD94E3-C170-44EA-93AC-5712A955ED0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.59", + "versionEndExcluding": "6.6.67", + "matchCriteriaId": "1CA5A1BF-E0D3-405F-8671-0923F72D88B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11.6", + "versionEndExcluding": "6.12.6", + "matchCriteriaId": "A23E2ECD-FEEE-4F72-A40D-756B9EC8B8DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/842e5af282453983586e2eae3c8eaf252de5f22f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/978c4486cca5c7b9253d3ab98a88c8e769cb9bbd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c2b6b47662d5f2dfce92e5ffbdcac8229f321d9d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dfb15ddf3b65e0df2129f9756d1b4fa78055cdb3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56666.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56666.json index f22db764912..7705db2d6fd 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56666.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56666.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56666", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:26.503", - "lastModified": "2024-12-27T15:15:26.503", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:23:37.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,85 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdkfd: Desreferenciar valor de retorno nulo En la funci\u00f3n pqm_uninit hay una asignaci\u00f3n de llamada de \"pdd = kfd_get_process_device_data\" que podr\u00eda ser nulo, y este valor fue posteriormente desreferenciado sin verificaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.6", + "matchCriteriaId": "51496C42-4FDD-448D-9925-54CF2C078DF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/768442d918932c4da09003f1fd6be1750b93a4ba", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a592bb19abdc2072875c87da606461bfd7821b08", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56667.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56667.json index 438c21888ce..f385e40e430 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56667.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56667.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56667", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:26.600", - "lastModified": "2024-12-27T15:15:26.600", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:21:07.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,99 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/i915: Se corrige la desreferencia de puntero NULL en capture_engine Cuando la estructura intel_context contiene NULL, genera un error de desreferencia de puntero NULL en drm_info(). (seleccionado de el commit 754302a5bc1bd8fd3b7d85c168b0a1af6d4bba4d)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3", + "versionEndExcluding": "6.6.67", + "matchCriteriaId": "7ADA2DEA-E7E0-4C82-A5D7-41BCC88A223F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.6", + "matchCriteriaId": "0CB1A9BB-F95E-43DD-A2FD-147912FD91E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/da0b986256ae9a78b0215214ff44f271bfe237c1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e07f9c92bd127f8835ac669d83b5e7ff59bbb40f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e6ebe4f14a267bc431d0eebab4f335c0ebd45977", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56668.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56668.json index f1964d1d04d..f8f2fa146c2 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56668.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56668.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56668", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:26.693", - "lastModified": "2024-12-27T15:15:26.693", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:20:19.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu/vt-d: Arreglar el puntero NULL de qi_batch con el dominio principal anidado El qi_batch se asigna al asignar la etiqueta de cach\u00e9 para un dominio. Mientras que para el dominio principal anidado, se omite. Por lo tanto, al intentar asignar p\u00e1ginas al principal anidado, se produjo una desreferencia NULL. Adem\u00e1s, existe una posible fuga de memoria ya que no hay un bloqueo alrededor de la asignaci\u00f3n de dominio->qi_batch. Para resolverlo, agregue un ayudante para la asignaci\u00f3n de qi_batch y ll\u00e1melo tanto en __cache_tag_assign_domain() como en __cache_tag_assign_parent_domain(). ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 0000000000000200 #PF: acceso de lectura del supervisor en modo kernel #PF: error_code(0x0000) - p\u00e1gina no presente PGD 8104795067 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 223 UID: 0 PID: 4357 Comm: qemu-system-x86 No contaminado 6.13.0-rc1-00028-g4b50c3c3b998-dirty #2632 Seguimiento de llamadas: ? __die+0x24/0x70 ? page_fault_oops+0x80/0x150 ? do_user_addr_fault+0x63/0x7b0 ? exc_page_fault+0x7c/0x220 ? asm_exc_page_fault+0x26/0x30 ? rango_de_vaciado_de_etiqueta_de_cach\u00e9_np+0x13c/0x260 intel_iommu_iotlb_sync_map+0x1a/0x30 iommu_map+0x61/0xf0 lote_a_dominio+0x188/0x250 iopt_area_fill_domains+0x125/0x320 ? iopt_map_pages+0x63/0x100 iopt_map_common.isra.0+0xa7/0x190 iopt_map_user_pages+0x6a/0x80 iommufd_ioas_map+0xcd/0x1d0 iommufd_fops_ioctl+0x118/0x1c0 __x64_sys_ioctl+0x93/0xc0 hacer_syscall_64+0x71/0x140 entrada_SYSCALL_64_despu\u00e9s_hwframe+0x76/0x7e" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.6", + "matchCriteriaId": "51496C42-4FDD-448D-9925-54CF2C078DF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/74536f91962d5f6af0a42414773ce61e653c10ee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ffd774c34774fd4cc0e9cf2976595623a6c3a077", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56669.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56669.json index eb212914dc2..9b60f4b1caa 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56669.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56669.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56669", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:26.797", - "lastModified": "2024-12-27T15:15:26.797", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:19:13.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,93 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu/vt-d: eliminar etiquetas de cach\u00e9 antes de deshabilitar ATS La implementaci\u00f3n actual elimina las etiquetas de cach\u00e9 despu\u00e9s de deshabilitar ATS, lo que genera posibles fugas de memoria y fallas del kernel. Espec\u00edficamente, las etiquetas de cach\u00e9 de tipo CACHE_TAG_DEVTLB pueden permanecer en la lista incluso despu\u00e9s de que se libere el dominio, lo que provoca una condici\u00f3n de use-after-free. Este problema realmente aparece cuando m\u00faltiples VF de diferentes PF pasan a un solo proceso de espacio de usuario a trav\u00e9s de vfio-pci. En tales casos, el n\u00facleo puede bloquearse con mensajes como: ERROR: desreferencia de puntero NULL del n\u00facleo, direcci\u00f3n: 0000000000000014 PGD 19036a067 P4D 1940a3067 PUD 136c9b067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 74 UID: 0 PID: 3183 Comm: testCli No contaminado 6.11.9 #2 RIP: 0010:cache_tag_flush_range+0x9b/0x250 Rastreo de llamadas: ? __die+0x1f/0x60 ? page_fault_oops+0x163/0x590 ? exc_page_fault+0x72/0x190 ? asm_exc_page_fault+0x22/0x30 ? rango_de_desinfecci\u00f3n_de_etiquetas_de_cach\u00e9+0x9b/0x250 ? cache_tag_flush_range+0x5d/0x250 intel_iommu_tlb_sync+0x29/0x40 intel_iommu_unmap_pages+0xfe/0x160 __iommu_unmap+0xd8/0x1a0 vfio_unmap_unpin+0x182/0x340 [vfio_iommu_type1] vfio_remove_dma+0x2a/0xb0 [vfio_iommu_type1] vfio_iommu_type1_ioctl+0xafa/0x18e0 [vfio_iommu_type1] Mueva cache_tag_unassign_domain() antes de iommu_disable_pci_caps() para solucionarlo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + }, + { + "lang": "en", + "value": "CWE-416" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.12.6", + "matchCriteriaId": "EFB33A9C-69D1-4691-B0BD-2D5C9590E239" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1f2557e08a617a4b5e92a48a1a9a6f86621def18", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9a0a72d3ed919ebe6491f527630998be053151d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56670.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56670.json index efe47735787..5c58fa63b42 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56670.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56670.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56670", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:26.890", - "lastModified": "2024-12-27T15:15:26.890", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T18:13:02.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,155 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: u_serial: soluciona el problema por el cual gs_start_io se bloqueaba debido al acceso a un puntero nulo. Teniendo en cuenta que en algunos casos extremos, cuando varios subprocesos acceden al controlador u_serial, el subproceso A ejecuta la operaci\u00f3n de apertura y llama a gs_open, el subproceso B ejecuta la operaci\u00f3n de desconexi\u00f3n y llama a la funci\u00f3n gserial_disconnect, el puntero port->port_usb se establecer\u00e1 en NULL. P. ej. Hilo A Hilo B gs_open() gadget_unbind_driver() gs_start_io() composite_disconnect() gs_start_rx() gserial_disconnect() ... ... spin_unlock(&port->port_lock) status = usb_ep_queue() spin_lock(&port->port_lock) spin_lock(&port->port_lock) port->port_usb = NULL gs_free_requests(port->port_usb->in) spin_unlock(&port->port_lock) Bloqueo Esto hace que el hilo A acceda a un puntero nulo (port->port_usb es nulo) al llamar a la funci\u00f3n gs_free_requests, lo que provoca un bloqueo. Si port_usb es NULL, se omitir\u00e1 la solicitud de liberaci\u00f3n, ya que la realizar\u00e1 gserial_disconnect. Por lo tanto, agregue una verificaci\u00f3n de puntero nulo a gs_start_io antes de intentar acceder al valor del puntero port->port_usb. Rastreo de llamadas: gs_start_io+0x164/0x25c gs_open+0x108/0x13c tty_open+0x314/0x638 chrdev_open+0x1b8/0x258 do_dentry_open+0x2c4/0x700 vfs_open+0x2c/0x3c path_openat+0xa64/0xc60 do_filp_open+0xb8/0x164 do_sys_openat2+0x84/0xf0 __arm64_sys_openat+0x70/0x9c invocar_syscall+0x58/0x114 el0_svc_common+0x80/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x38/0x68" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.27", + "versionEndExcluding": "5.4.288", + "matchCriteriaId": "6E124544-1BF2-4F82-8695-47BCE74E1600" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.232", + "matchCriteriaId": "0B975945-2894-4433-BA59-0988B75B4C12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.175", + "matchCriteriaId": "7A1F3620-6900-4852-9229-C3527377EBDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.121", + "matchCriteriaId": "D8DA16A0-9C6E-493E-90EE-309A34901477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.67", + "matchCriteriaId": "BF4F2CD1-2CA6-4D6B-9B0C-57C3C4D6544A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.6", + "matchCriteriaId": "0CB1A9BB-F95E-43DD-A2FD-147912FD91E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1247e1df086aa6c17ab53cd1bedce70dd7132765", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/28b3c03a6790de1f6f2683919ad657840f0f0f58", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4cfbca86f6a8b801f3254e0e3c8f2b1d2d64be2b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4efdfdc32d8d6307f968cd99f1db64468471bab1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8ca07a3d18f39b1669927ef536e485787e856df6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c83213b6649d22656b3a4e92544ceeea8a2c6c07", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dd6b0ca6025f64ccb465a6a3460c5b0307ed9c44", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56710.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56710.json index fce8492d037..7aa148e3b98 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56710.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56710.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56710", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T09:15:05.970", - "lastModified": "2025-01-02T14:15:08.600", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:13:00.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,104 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ceph: se corrige la p\u00e9rdida de memoria en ceph_direct_read_write() La matriz bvecs que se asigna en iter_get_bvecs_alloc() se filtra y las p\u00e1ginas permanecen fijadas si ceph_alloc_sparse_ext_map() falla. No es necesario retrasar la asignaci\u00f3n del mapa sparse_ext hasta que se configure la matriz bvecs, as\u00ed que solucione esto moviendo la asignaci\u00f3n de sparse_ext un poco antes. Adem\u00e1s, haga un ajuste similar en __ceph_sync_read() para lograr coherencia (una p\u00e9rdida del mismo tipo en __ceph_sync_read() se ha abordado de forma diferente)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.69", + "matchCriteriaId": "C7A72CB0-18DD-4A2A-8E59-4FB714531AA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.7", + "matchCriteriaId": "811AC89A-14AC-49FA-9B54-E99526F1CA47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/44e518abbb498075ae85c7d1d1a503a6bb05ea2d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/66e0c4f91461d17d48071695271c824620bed4ef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eb9041837123f31d5897e99bb761f46cb4ce5859", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56712.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56712.json index e121a3d9f8f..a152cda8516 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56712.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56712.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56712", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T09:15:06.250", - "lastModified": "2024-12-29T09:15:06.250", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:11:48.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,90 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: udmabuf: reparar p\u00e9rdida de memoria en la \u00faltima ruta de error export_udmabuf() En export_udmabuf(), si dma_buf_fd() falla porque la tabla FD est\u00e1 llena, ya se ha creado un dma_buf que posee el udmabuf; pero la gesti\u00f3n de errores en udmabuf_create() destruir\u00e1 el udmabuf sin hacer nada con el dma_buf que lo contiene. Esto deja un dma_buf en la memoria que contiene un puntero colgante; aunque eso no parece conducir a nada malo excepto a una p\u00e9rdida de memoria. Arr\u00e9glelo moviendo la llamada dma_buf_fd() fuera de export_udmabuf() para que podamos darle un gesti\u00f3n de errores diferente. Tenga en cuenta que la forma de este c\u00f3digo cambi\u00f3 mucho en el commit 5e72b2b41a21 (\"udmabuf: convertir el controlador udmabuf para usar folios\"); Pero la p\u00e9rdida de memoria parece haber existido desde la introducci\u00f3n de udmabuf." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "6.12.7", + "matchCriteriaId": "132A930B-79DA-4CD0-9863-6D6DAD5DDACA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/c9fc8428d4255c2128da9c4d5cd92e554d0150cf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f49856f525acd5bef52ae28b7da2e001bbe7439e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56726.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56726.json index dd16a15e735..4af59985280 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56726.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56726.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56726", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:06.703", - "lastModified": "2024-12-29T12:15:06.703", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:10:17.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: octeontx2-pf: gestionar errores otx2_mbox_get_rsp en cn10k.c. Agregar verificaci\u00f3n de puntero de error despu\u00e9s de llamar a otx2_mbox_get_rsp()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "018DF5B7-C996-453C-A0E3-17831086B30F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/41f39f4c67253f802809310be6846ff408c3c758", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/54abcec092616a4d01195355eb5d6036fb8fe363", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/856ad633e11869729be698df2287ecfe6ec31f27", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a374e7e79fbdd7574bd89344447b0d4b91ba9801", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ac9183023b6a9c09467516abd8aab04f9a2f9564", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c5a6c5af434671aea739a5a41c849819144f02c9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56727.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56727.json index 65a310d7190..a48b7c0e389 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56727.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56727.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56727", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:06.813", - "lastModified": "2024-12-29T12:15:06.813", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:09:19.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: octeontx2-pf: gestionar errores otx2_mbox_get_rsp en otx2_flows.c. A\u00f1adiendo comprobaci\u00f3n de puntero de error despu\u00e9s de llamar a otx2_mbox_get_rsp()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "F74E4CA1-0407-4198-8012-2A7BB41D8B4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8c9f8b35dc3d4ad8053a72bc0c5a7843591f6b75", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a479b3d7586e6f77f8337bbcac980eaf2d0a4029", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bd3110bc102ab6292656b8118be819faa0de8dd0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c4eae7bac880edd88aaed6a8ec2997fa85e259c7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5e60f17d2462ef5c13db4d1a54eef5778fd2295", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56748.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56748.json index 048da64530a..845e5f48d72 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56748.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56748.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56748", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:08.303", - "lastModified": "2024-12-29T12:15:08.303", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:07:33.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: qedf: Se corrige una posible p\u00e9rdida de memoria en qedf_alloc_and_init_sb() El gancho \"qed_ops->common->sb_init = qed_sb_init\" no libera la memoria DMA sb_virt cuando falla. Agregue dma_free_coherent() para liberarla. Esta es la misma forma que qedr_alloc_mem_sb() y qede_alloc_mem_sb()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.11", + "versionEndExcluding": "5.4.287", + "matchCriteriaId": "5F182E41-B51C-4700-AC27-E092FB0ACC21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0e04bd5a11dffe8c1c0e4c9fc79f7d3cd6182dd5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/64654bf5efb3f748e6fc41227adda689618ce9c4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/78a169dc69fbdaf114c40e2d56955bf6bd4fc3c0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7c1832287b21ff68c4e3625e63cc7619edf5908b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/97384449ddfc07f12ca75f510eb070020d7abb34", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a56777a3ef5b35e24a20c4418bcf88bad033807a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b514f45e0fe18d763a1afc34401b1585333cb329", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c62c30429db3eb4ced35c7fcf6f04a61ce3a01bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56749.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56749.json index 1eeec6057b8..54f28084b47 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56749.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56749.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56749", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:08.410", - "lastModified": "2024-12-29T12:15:08.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:06:18.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dlm: se corrige el recuento de referencias de dlm_recover_members en caso de error. Si dlm_recover_members() falla, no eliminamos las referencias de la lista ra\u00edz creada anteriormente que contiene y mantenemos todos los rsbs activos durante la recuperaci\u00f3n. Puede que no sea un evento improbable porque ping_members() podr\u00eda encontrarse con un -EINTR si se activa nuevamente otro progreso de recuperaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "158A6B22-9260-41D7-965A-A81798A5A969" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/200b977ebbc313a59174ba971006a231b3533dc5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3230718a75a6c30ed60ac920c26be2119fa82b8e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fb2ec564887af1f365d754f7c306f1b5cd375b5e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56750.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56750.json index 2e4c24cae74..f9c6cdbfdce 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56750.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56750.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56750", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:08.517", - "lastModified": "2024-12-29T12:15:08.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:04:58.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: erofs: corrige blksize < PAGE_SIZE para montajes respaldados por archivos Ajuste sb->s_blocksize{,_bits} directamente para montajes respaldados por archivos cuando el tama\u00f1o de bloque fs es menor que PAGE_SIZE. Anteriormente, EROFS usaba sb_set_blocksize(), que causaba un p\u00e1nico si no se usaban montajes respaldados por bdev." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/679d8537e5748241c71ac97a6b6dc919eae31716", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bae0854160939a64a092516ff1b2f221402b843b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56751.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56751.json index fe375f81437..bf4348d670d 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56751.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56751.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56751", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:08.640", - "lastModified": "2024-12-29T12:15:08.640", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-06T17:00:37.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv6: liberar el siguiente salto al eliminar el dispositivo. La CI est\u00e1 experimentando un bloqueo aperi\u00f3dico en el momento de eliminar el dispositivo en la prueba autom\u00e1tica pmtu.sh: unregister_netdevice: esperando a que veth_A-R1 se libere. Recuento de uso = 6 ref_tracker: veth_A-R1@ffff888013df15d8 tiene 1/5 usuarios en dst_init+0x84/0x4a0 dst_alloc+0x97/0x150 ip6_dst_alloc+0x23/0x90 ip6_rt_pcpu_alloc+0x1e6/0x520 ip6_pol_route+0x56f/0x840 fib6_rule_lookup+0x334/0x630 ip6_route_output_flags+0x259/0x480 ip6_dst_lookup_tail.constprop.0+0x5c2/0x940 ip6_dst_lookup_flow+0x88/0x190 udp_tunnel6_dst_lookup+0x2a7/0x4c0 vxlan_xmit_one+0xbde/0x4a50 [vxlan] vxlan_xmit+0x9ad/0xf20 [vxlan] dev_hard_start_xmit+0x10e/0x360 __dev_queue_xmit+0xf95/0x18c0 arp_solicit+0x4a2/0xe00 neigh_probe+0xaa/0xf0 Si bien el primer sospechoso es dst_cache, el seguimiento expl\u00edcito del dst que debe la \u00faltima referencia del dispositivo a trav\u00e9s de sondas demostr\u00f3 que dicho dst se mantiene en el siguiente salto en el fib6_info de origen. Similar a el commit f5b51fe804ec (\"ipv6: route: purge exception on removal\"), necesitamos liberar expl\u00edcitamente la informaci\u00f3n fib original al desconectar un dispositivo que se va a eliminar de un dst ipv6 activo: mueva la desinfecci\u00f3n fib6_info a ip6_dst_ifdown(). Probado ejecutando: ./pmtu.sh cleanup_ipv6_exception en un bucle cerrado durante m\u00e1s de 400 iteraciones sin splat, ejecutando un kernel sin parchear Observ\u00e9 un splat cada ~10 iteraciones." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "00376139-25FC-484F-BF0B-09AA1783B306" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0e4c6faaef8a24b762a24ffb767280e263ef8e10", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43e25adc80269f917d2a195f0d59f74cdd182955", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a3c3f8a4d025acc8c857246ec2b812c59102487a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b2f26a27ea3f72f75d18330f76f5d1007c791848", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eb02688c5c45c3e7af7e71f036a7144f5639cbfe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56757.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56757.json new file mode 100644 index 00000000000..217741dc431 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56757.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56757", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-06T17:15:40.297", + "lastModified": "2025-01-06T17:15:40.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: mediatek: add intf release flow when usb disconnect\n\nMediaTek claim an special usb intr interface for ISO data transmission.\nThe interface need to be released before unregistering hci device when\nusb disconnect. Removing BT usb dongle without properly releasing the\ninterface may cause Kernel panic while unregister hci device." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/489304e67087abddc2666c5af0159cb95afdcf59", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cc569d791ab2a0de74f76e470515d25d24c9b84b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56758.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56758.json new file mode 100644 index 00000000000..5f4f3a04d01 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56758.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56758", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-06T17:15:40.597", + "lastModified": "2025-01-06T17:15:40.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: check folio mapping after unlock in relocate_one_folio()\n\nWhen we call btrfs_read_folio() to bring a folio uptodate, we unlock the\nfolio. The result of that is that a different thread can modify the\nmapping (like remove it with invalidate) before we call folio_lock().\nThis results in an invalid page and we need to try again.\n\nIn particular, if we are relocating concurrently with aborting a\ntransaction, this can result in a crash like the following:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n PGD 0 P4D 0\n Oops: 0000 [#1] SMP\n CPU: 76 PID: 1411631 Comm: kworker/u322:5\n Workqueue: events_unbound btrfs_reclaim_bgs_work\n RIP: 0010:set_page_extent_mapped+0x20/0xb0\n RSP: 0018:ffffc900516a7be8 EFLAGS: 00010246\n RAX: ffffea009e851d08 RBX: ffffea009e0b1880 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: ffffc900516a7b90 RDI: ffffea009e0b1880\n RBP: 0000000003573000 R08: 0000000000000001 R09: ffff88c07fd2f3f0\n R10: 0000000000000000 R11: 0000194754b575be R12: 0000000003572000\n R13: 0000000003572fff R14: 0000000000100cca R15: 0000000005582fff\n FS: 0000000000000000(0000) GS:ffff88c07fd00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 000000407d00f002 CR4: 00000000007706f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n \n ? __die+0x78/0xc0\n ? page_fault_oops+0x2a8/0x3a0\n ? __switch_to+0x133/0x530\n ? wq_worker_running+0xa/0x40\n ? exc_page_fault+0x63/0x130\n ? asm_exc_page_fault+0x22/0x30\n ? set_page_extent_mapped+0x20/0xb0\n relocate_file_extent_cluster+0x1a7/0x940\n relocate_data_extent+0xaf/0x120\n relocate_block_group+0x20f/0x480\n btrfs_relocate_block_group+0x152/0x320\n btrfs_relocate_chunk+0x3d/0x120\n btrfs_reclaim_bgs_work+0x2ae/0x4e0\n process_scheduled_works+0x184/0x370\n worker_thread+0xc6/0x3e0\n ? blk_add_timer+0xb0/0xb0\n kthread+0xae/0xe0\n ? flush_tlb_kernel_range+0x90/0x90\n ret_from_fork+0x2f/0x40\n ? flush_tlb_kernel_range+0x90/0x90\n ret_from_fork_asm+0x11/0x20\n \n\nThis occurs because cleanup_one_transaction() calls\ndestroy_delalloc_inodes() which calls invalidate_inode_pages2() which\ntakes the folio_lock before setting mapping to NULL. We fail to check\nthis, and subsequently call set_extent_mapping(), which assumes that\nmapping != NULL (in fact it asserts that in debug mode)\n\nNote that the \"fixes\" patch here is not the one that introduced the\nrace (the very first iteration of this code from 2009) but a more recent\nchange that made this particular crash happen in practice." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3e74859ee35edc33a022c3f3971df066ea0ca6b9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d508e56270389b3a16f5b3cf247f4eb1bbad1578", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56759.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56759.json new file mode 100644 index 00000000000..386c0c49277 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56759.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56759", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-06T17:15:40.900", + "lastModified": "2025-01-06T17:15:40.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix use-after-free when COWing tree bock and tracing is enabled\n\nWhen a COWing a tree block, at btrfs_cow_block(), and we have the\ntracepoint trace_btrfs_cow_block() enabled and preemption is also enabled\n(CONFIG_PREEMPT=y), we can trigger a use-after-free in the COWed extent\nbuffer while inside the tracepoint code. This is because in some paths\nthat call btrfs_cow_block(), such as btrfs_search_slot(), we are holding\nthe last reference on the extent buffer @buf so btrfs_force_cow_block()\ndrops the last reference on the @buf extent buffer when it calls\nfree_extent_buffer_stale(buf), which schedules the release of the extent\nbuffer with RCU. This means that if we are on a kernel with preemption,\nthe current task may be preempted before calling trace_btrfs_cow_block()\nand the extent buffer already released by the time trace_btrfs_cow_block()\nis called, resulting in a use-after-free.\n\nFix this by moving the trace_btrfs_cow_block() from btrfs_cow_block() to\nbtrfs_force_cow_block() before the COWed extent buffer is freed.\nThis also has a side effect of invoking the tracepoint in the tree defrag\ncode, at defrag.c:btrfs_realloc_node(), since btrfs_force_cow_block() is\ncalled there, but this is fine and it was actually missing there." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/44f52bbe96dfdbe4aca3818a2534520082a07040", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c3a403d8ce36f5a809a492581de5ad17843e4701", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56760.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56760.json new file mode 100644 index 00000000000..7bafa60fca9 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56760.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-56760", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-06T17:15:41.173", + "lastModified": "2025-01-06T17:15:41.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/MSI: Handle lack of irqdomain gracefully\n\nAlexandre observed a warning emitted from pci_msi_setup_msi_irqs() on a\nRISCV platform which does not provide PCI/MSI support:\n\n WARNING: CPU: 1 PID: 1 at drivers/pci/msi/msi.h:121 pci_msi_setup_msi_irqs+0x2c/0x32\n __pci_enable_msix_range+0x30c/0x596\n pci_msi_setup_msi_irqs+0x2c/0x32\n pci_alloc_irq_vectors_affinity+0xb8/0xe2\n\nRISCV uses hierarchical interrupt domains and correctly does not implement\nthe legacy fallback. The warning triggers from the legacy fallback stub.\n\nThat warning is bogus as the PCI/MSI layer knows whether a PCI/MSI parent\ndomain is associated with the device or not. There is a check for MSI-X,\nwhich has a legacy assumption. But that legacy fallback assumption is only\nvalid when legacy support is enabled, but otherwise the check should simply\nreturn -ENOTSUPP.\n\nLoongarch tripped over the same problem and blindly enabled legacy support\nwithout implementing the legacy fallbacks. There are weak implementations\nwhich return an error, so the problem was papered over.\n\nCorrect pci_msi_domain_supports() to evaluate the legacy mode and add\nthe missing supported check into the MSI enable path to complete it." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/a60b990798eb17433d0283788280422b1bd94b18", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/aed157301c659a48f5564cc4568cf0e5c8831af0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b1f7476e07b93d65a1a3643dcb4a7bed80d4328d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56761.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56761.json new file mode 100644 index 00000000000..da493983f35 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56761.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56761", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-06T17:15:41.480", + "lastModified": "2025-01-06T17:15:41.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fred: Clear WFE in missing-ENDBRANCH #CPs\n\nAn indirect branch instruction sets the CPU indirect branch tracker\n(IBT) into WAIT_FOR_ENDBRANCH (WFE) state and WFE stays asserted\nacross the instruction boundary. When the decoder finds an\ninappropriate instruction while WFE is set ENDBR, the CPU raises a #CP\nfault.\n\nFor the \"kernel IBT no ENDBR\" selftest where #CPs are deliberately\ntriggered, the WFE state of the interrupted context needs to be\ncleared to let execution continue. Otherwise when the CPU resumes\nfrom the instruction that just caused the previous #CP, another\nmissing-ENDBRANCH #CP is raised and the CPU enters a dead loop.\n\nThis is not a problem with IDT because it doesn't preserve WFE and\nIRET doesn't set WFE. But FRED provides space on the entry stack\n(in an expanded CS area) to save and restore the WFE state, thus the\nWFE state is no longer clobbered, so software must clear it.\n\nClear WFE to avoid dead looping in ibt_clear_fred_wfe() and the\n!ibt_fatal code path when execution is allowed to continue.\n\nClobbering WFE in any other circumstance is a security-relevant bug.\n\n[ dhansen: changelog rewording ]" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/b939f108e86b76119428a6fa4e92491e09ac7867", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dc81e556f2a017d681251ace21bf06c126d5a192", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56762.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56762.json new file mode 100644 index 00000000000..5ba3f77afb2 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56762.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-56762", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-06T17:15:41.777", + "lastModified": "2025-01-06T17:15:41.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/sqpoll: fix sqpoll error handling races\n\nBUG: KASAN: slab-use-after-free in __lock_acquire+0x370b/0x4a10 kernel/locking/lockdep.c:5089\nCall Trace:\n\n...\n_raw_spin_lock_irqsave+0x3d/0x60 kernel/locking/spinlock.c:162\nclass_raw_spinlock_irqsave_constructor include/linux/spinlock.h:551 [inline]\ntry_to_wake_up+0xb5/0x23c0 kernel/sched/core.c:4205\nio_sq_thread_park+0xac/0xe0 io_uring/sqpoll.c:55\nio_sq_thread_finish+0x6b/0x310 io_uring/sqpoll.c:96\nio_sq_offload_create+0x162/0x11d0 io_uring/sqpoll.c:497\nio_uring_create io_uring/io_uring.c:3724 [inline]\nio_uring_setup+0x1728/0x3230 io_uring/io_uring.c:3806\n...\n\nKun Hu reports that the SQPOLL creating error path has UAF, which\nhappens if io_uring_alloc_task_context() fails and then io_sq_thread()\nmanages to run and complete before the rest of error handling code,\nwhich means io_sq_thread_finish() is looking at already killed task.\n\nNote that this is mostly theoretical, requiring fault injection on\nthe allocation side to trigger in practice." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/6237331361711810d8f2e3fbfe2f7a6f9548f5e0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/80120bb4eef7848d5aa3b1a0cd88367cd05fbe03", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8e8494c83cf73168118587e9567e4f7e50ce4fd8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e33ac68e5e21ec1292490dfe061e75c0dbdd3bd4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56763.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56763.json new file mode 100644 index 00000000000..db717111cf0 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56763.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-56763", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-06T17:15:42.150", + "lastModified": "2025-01-06T17:15:42.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Prevent bad count for tracing_cpumask_write\n\nIf a large count is provided, it will trigger a warning in bitmap_parse_user.\nAlso check zero for it." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/03041e474a6a8f1bfd4b96b164bb3165c48fa1a3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1cca920af19df5dd91254e5ff35e68e911683706", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3d15f4c2449558ffe83b4dba30614ef1cd6937c3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/98feccbf32cfdde8c722bc4587aaa60ee5ac33f0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56764.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56764.json new file mode 100644 index 00000000000..37fc8aac2cb --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56764.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56764", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-06T17:15:42.483", + "lastModified": "2025-01-06T17:15:42.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nublk: detach gendisk from ublk device if add_disk() fails\n\nInside ublk_abort_requests(), gendisk is grabbed for aborting all\ninflight requests. And ublk_abort_requests() is called when exiting\nthe uring context or handling timeout.\n\nIf add_disk() fails, the gendisk may have been freed when calling\nublk_abort_requests(), so use-after-free can be caused when getting\ndisk's reference in ublk_abort_requests().\n\nFixes the bug by detaching gendisk from ublk device if add_disk() fails." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/75cd4005da5492129917a4a4ee45e81660556104", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7d680f2f76a3417fdfc3946da7471e81464f7b41", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56765.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56765.json new file mode 100644 index 00000000000..bd6901037f9 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56765.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-56765", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-06T17:15:42.800", + "lastModified": "2025-01-06T17:15:42.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/vas: Add close() callback in vas_vm_ops struct\n\nThe mapping VMA address is saved in VAS window struct when the\npaste address is mapped. This VMA address is used during migration\nto unmap the paste address if the window is active. The paste\naddress mapping will be removed when the window is closed or with\nthe munmap(). But the VMA address in the VAS window is not updated\nwith munmap() which is causing invalid access during migration.\n\nThe KASAN report shows:\n[16386.254991] BUG: KASAN: slab-use-after-free in reconfig_close_windows+0x1a0/0x4e8\n[16386.255043] Read of size 8 at addr c00000014a819670 by task drmgr/696928\n\n[16386.255096] CPU: 29 UID: 0 PID: 696928 Comm: drmgr Kdump: loaded Tainted: G B 6.11.0-rc5-nxgzip #2\n[16386.255128] Tainted: [B]=BAD_PAGE\n[16386.255148] Hardware name: IBM,9080-HEX Power11 (architected) 0x820200 0xf000007 of:IBM,FW1110.00 (NH1110_016) hv:phyp pSeries\n[16386.255181] Call Trace:\n[16386.255202] [c00000016b297660] [c0000000018ad0ac] dump_stack_lvl+0x84/0xe8 (unreliable)\n[16386.255246] [c00000016b297690] [c0000000006e8a90] print_report+0x19c/0x764\n[16386.255285] [c00000016b297760] [c0000000006e9490] kasan_report+0x128/0x1f8\n[16386.255309] [c00000016b297880] [c0000000006eb5c8] __asan_load8+0xac/0xe0\n[16386.255326] [c00000016b2978a0] [c00000000013f898] reconfig_close_windows+0x1a0/0x4e8\n[16386.255343] [c00000016b297990] [c000000000140e58] vas_migration_handler+0x3a4/0x3fc\n[16386.255368] [c00000016b297a90] [c000000000128848] pseries_migrate_partition+0x4c/0x4c4\n...\n\n[16386.256136] Allocated by task 696554 on cpu 31 at 16377.277618s:\n[16386.256149] kasan_save_stack+0x34/0x68\n[16386.256163] kasan_save_track+0x34/0x80\n[16386.256175] kasan_save_alloc_info+0x58/0x74\n[16386.256196] __kasan_slab_alloc+0xb8/0xdc\n[16386.256209] kmem_cache_alloc_noprof+0x200/0x3d0\n[16386.256225] vm_area_alloc+0x44/0x150\n[16386.256245] mmap_region+0x214/0x10c4\n[16386.256265] do_mmap+0x5fc/0x750\n[16386.256277] vm_mmap_pgoff+0x14c/0x24c\n[16386.256292] ksys_mmap_pgoff+0x20c/0x348\n[16386.256303] sys_mmap+0xd0/0x160\n...\n\n[16386.256350] Freed by task 0 on cpu 31 at 16386.204848s:\n[16386.256363] kasan_save_stack+0x34/0x68\n[16386.256374] kasan_save_track+0x34/0x80\n[16386.256384] kasan_save_free_info+0x64/0x10c\n[16386.256396] __kasan_slab_free+0x120/0x204\n[16386.256415] kmem_cache_free+0x128/0x450\n[16386.256428] vm_area_free_rcu_cb+0xa8/0xd8\n[16386.256441] rcu_do_batch+0x2c8/0xcf0\n[16386.256458] rcu_core+0x378/0x3c4\n[16386.256473] handle_softirqs+0x20c/0x60c\n[16386.256495] do_softirq_own_stack+0x6c/0x88\n[16386.256509] do_softirq_own_stack+0x58/0x88\n[16386.256521] __irq_exit_rcu+0x1a4/0x20c\n[16386.256533] irq_exit+0x20/0x38\n[16386.256544] interrupt_async_exit_prepare.constprop.0+0x18/0x2c\n...\n\n[16386.256717] Last potentially related work creation:\n[16386.256729] kasan_save_stack+0x34/0x68\n[16386.256741] __kasan_record_aux_stack+0xcc/0x12c\n[16386.256753] __call_rcu_common.constprop.0+0x94/0xd04\n[16386.256766] vm_area_free+0x28/0x3c\n[16386.256778] remove_vma+0xf4/0x114\n[16386.256797] do_vmi_align_munmap.constprop.0+0x684/0x870\n[16386.256811] __vm_munmap+0xe0/0x1f8\n[16386.256821] sys_munmap+0x54/0x6c\n[16386.256830] system_call_exception+0x1a0/0x4a0\n[16386.256841] system_call_vectored_common+0x15c/0x2ec\n\n[16386.256868] The buggy address belongs to the object at c00000014a819670\n which belongs to the cache vm_area_struct of size 168\n[16386.256887] The buggy address is located 0 bytes inside of\n freed 168-byte region [c00000014a819670, c00000014a819718)\n\n[16386.256915] The buggy address belongs to the physical page:\n[16386.256928] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14a81\n[16386.256950] memcg:c0000000ba430001\n[16386.256961] anon flags: 0x43ffff800000000(node=4|zone=0|lastcpupid=0x7ffff)\n[16386.256975] page_type: 0xfdffffff(slab)\n[16386\n---truncated---" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/05aa156e156ef3168e7ab8a68721945196495c17", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6d9cd27105459f169993a4c5f216499a946dbf34", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8b2282b5084521254a2cd9742a3f4e1d5b77f843", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b7f60ffdfd96f8fc826f1d61a1c6067d828e20b9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56766.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56766.json new file mode 100644 index 00000000000..c2c02342d36 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56766.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-56766", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-06T17:15:43.127", + "lastModified": "2025-01-06T17:15:43.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: rawnand: fix double free in atmel_pmecc_create_user()\n\nThe \"user\" pointer was converted from being allocated with kzalloc() to\nbeing allocated by devm_kzalloc(). Calling kfree(user) will lead to a\ndouble free." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/6ea15205d7e2b811fbbdf79783f686f58abfb4b7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d2f090ea57f8d6587e09d4066f740a8617767b3d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d8e4771f99c0400a1873235704b28bb803c83d17", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dd45c87782738715d5e7c167f8dabf0814a7394a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56767.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56767.json new file mode 100644 index 00000000000..0dec26b24c2 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56767.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-56767", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-06T17:15:43.477", + "lastModified": "2025-01-06T17:15:43.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset\n\nThe at_xdmac_memset_create_desc may return NULL, which will lead to a\nnull pointer dereference. For example, the len input is error, or the\natchan->free_descs_list is empty and memory is exhausted. Therefore, add\ncheck to avoid this." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/54376d8d26596f98ed7432a788314bb9154bf3e3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c43ec96e8d34399bd9dab2f2dc316b904892133f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e658f1c133b854b2ae799147301d82dddb8f3162", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fdba6d5e455388377ec7e82a5913ddfcc7edd93b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56768.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56768.json new file mode 100644 index 00000000000..a33cd489a28 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56768.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56768", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-06T17:15:43.800", + "lastModified": "2025-01-06T17:15:43.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix bpf_get_smp_processor_id() on !CONFIG_SMP\n\nOn x86-64 calling bpf_get_smp_processor_id() in a kernel with CONFIG_SMP\ndisabled can trigger the following bug, as pcpu_hot is unavailable:\n\n [ 8.471774] BUG: unable to handle page fault for address: 00000000936a290c\n [ 8.471849] #PF: supervisor read access in kernel mode\n [ 8.471881] #PF: error_code(0x0000) - not-present page\n\nFix by inlining a return 0 in the !CONFIG_SMP case." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/23579010cf0a12476e96a5f1acdf78a9c5843657", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f4ab7d74247b0150547cf909b3f6f24ee85183df", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56769.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56769.json new file mode 100644 index 00000000000..cf962cb4f63 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56769.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-56769", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-06T17:15:44.063", + "lastModified": "2025-01-06T17:15:44.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg\n\nSyzbot reports [1] an uninitialized value issue found by KMSAN in\ndib3000_read_reg().\n\nLocal u8 rb[2] is used in i2c_transfer() as a read buffer; in case\nthat call fails, the buffer may end up with some undefined values.\n\nSince no elaborate error handling is expected in dib3000_write_reg(),\nsimply zero out rb buffer to mitigate the problem.\n\n[1] Syzkaller report\ndvb-usb: bulk message failed: -22 (6/0)\n=====================================================\nBUG: KMSAN: uninit-value in dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n dibusb_dib3000mb_frontend_attach+0x155/0x2f0 drivers/media/usb/dvb-usb/dibusb-mb.c:31\n dvb_usb_adapter_frontend_init+0xed/0x9a0 drivers/media/usb/dvb-usb/dvb-usb-dvb.c:290\n dvb_usb_adapter_init drivers/media/usb/dvb-usb/dvb-usb-init.c:90 [inline]\n dvb_usb_init drivers/media/usb/dvb-usb/dvb-usb-init.c:186 [inline]\n dvb_usb_device_init+0x25a8/0x3760 drivers/media/usb/dvb-usb/dvb-usb-init.c:310\n dibusb_probe+0x46/0x250 drivers/media/usb/dvb-usb/dibusb-mb.c:110\n...\nLocal variable rb created at:\n dib3000_read_reg+0x86/0x4e0 drivers/media/dvb-frontends/dib3000mb.c:54\n dib3000mb_attach+0x123/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n..." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1d6de21f00293d819b5ca6dbe75ff1f3b6392140", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2dd59fe0e19e1ab955259978082b62e5751924c7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3876e3a1c31a58a352c6bf5d2a90e3304445a637", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c1197c1457bb7098cf46366e898eb52b41b6876a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56828.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56828.json new file mode 100644 index 00000000000..d4ac368de28 --- /dev/null +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56828.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-56828", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-06T18:15:23.467", + "lastModified": "2025-01-06T18:15:23.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "File Upload vulnerability in ChestnutCMS through 1.5.0. Based on the code analysis, it was determined that the /api/member/avatar API endpoint receives a base64 string as input. This string is then passed to the memberService.uploadAvatarByBase64 method for processing. Within the service, the base64-encoded image is parsed. For example, given a string like: data:image/html;base64,PGh0bWw+PGltZyBzcmM9eCBvbmVycm9yPWFsZXJ0KDEpPjwvaHRtbD4= the content after the comma is extracted and decoded using Base64.getDecoder().decode(). The substring from the 11th character up to the first occurrence of a semicolon (;) is assigned to the suffix variable (representing the file extension). The decoded content is then written to a file. However, the file extension is not validated, and since this functionality is exposed to the frontend, it poses significant security risks." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/liweiyi/ChestnutCMS", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Zerone0x00/CVE/blob/main/ChestnutCMS/CVE-2024-56828.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.1000mz.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8474.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8474.json index df6c23ff8a0..5cdd7d860bd 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8474.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8474.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8474", "sourceIdentifier": "security@openvpn.net", "published": "2025-01-06T15:15:14.983", - "lastModified": "2025-01-06T15:15:14.983", + "lastModified": "2025-01-06T17:15:44.747", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "OpenVPN Connect before version 3.5.0 can contain the configuration profile's clear-text private key which is logged in the application log, which an unauthorized actor can use to decrypt the VPN traffic" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@openvpn.net", diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21612.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21612.json index 0799e53c016..e1fc4e562c0 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21612.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21612.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21612", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T16:15:31.633", - "lastModified": "2025-01-06T16:15:31.633", + "lastModified": "2025-01-06T17:15:46.840", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-80" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21613.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21613.json new file mode 100644 index 00000000000..4c29fc60488 --- /dev/null +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21613.json @@ -0,0 +1,110 @@ +{ + "id": "CVE-2025-21613", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-06T17:15:47.043", + "lastModified": "2025-01-06T17:15:47.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "go-git is a highly extensible git implementation library written in pure Go. An argument injection vulnerability was discovered in go-git versions prior to v5.13. Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the file transport protocol is being used, as that is the only protocol that shells out to git binaries. This vulnerability is fixed in 5.13.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Clear", + "baseScore": 9.2, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "CLEAR" + } + } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-88" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-88" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/go-git/go-git/security/advisories/GHSA-v725-9546-7q7m", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21614.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21614.json new file mode 100644 index 00000000000..45260504f16 --- /dev/null +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21614.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-21614", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-06T17:15:47.310", + "lastModified": "2025-01-06T17:15:47.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "go-git is a highly extensible git implementation library written in pure Go. A denial of service (DoS) vulnerability was discovered in go-git versions prior to v5.13. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in go-git clients. Users running versions of go-git from v4 and above are recommended to upgrade to v5.13 in order to mitigate this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/go-git/go-git/security/advisories/GHSA-r9px-m959-cxf4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21615.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21615.json new file mode 100644 index 00000000000..78372120dc8 --- /dev/null +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21615.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-21615", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-06T17:15:47.510", + "lastModified": "2025-01-06T17:15:47.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "AAT (Another Activity Tracker) is a GPS-tracking application for tracking sportive activities, with emphasis on cycling. Versions lower than v1.26 of AAT are vulnerable to data exfiltration from malicious apps installed on the same device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/bailuk/AAT/security/advisories/GHSA-pwpm-x58v-px5c", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21618.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21618.json new file mode 100644 index 00000000000..bc92e6492f6 --- /dev/null +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21618.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-21618", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-06T17:15:47.660", + "lastModified": "2025-01-06T17:15:47.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NiceGUI is an easy-to-use, Python-based UI framework. Prior to 2.9.1, authenticating with NiceGUI logged in the user for all browsers, including browsers in incognito mode. This vulnerability is fixed in 2.9.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zauberzeug/nicegui/commit/1621a4ba6a06676b8094362d36623551e651adc1", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zauberzeug/nicegui/security/advisories/GHSA-v6jv-p6r8-j78w", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22384.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22384.json index b16bc51710e..ce06a90e8ef 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22384.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22384.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22384", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-04T02:15:06.937", - "lastModified": "2025-01-04T02:15:06.937", - "vulnStatus": "Received", + "lastModified": "2025-01-06T17:15:47.820", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue concerning business logic exists in the Commerce B2B application, which allows storefront visitors to purchase discontinued products in specific scenarios where requests are altered before reaching the server." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "cve@mitre.org", diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22387.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22387.json index 5e4f3ccc0b8..ee00ac5ed08 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22387.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22387.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22387", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-04T02:15:07.343", - "lastModified": "2025-01-04T03:15:07.340", - "vulnStatus": "Received", + "lastModified": "2025-01-06T17:15:47.997", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue exists in requests for resources where the session token is submitted as a URL parameter. This exposes information about the authenticated session, which can be leveraged for session hijacking." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "cve@mitre.org", diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22390.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22390.json index 4d3d00d2e9c..350ec824e01 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22390.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22390.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22390", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-04T02:15:07.747", - "lastModified": "2025-01-04T03:15:07.700", - "vulnStatus": "Received", + "lastModified": "2025-01-06T17:15:48.170", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS due to insufficient enforcement of password complexity requirements. The application permits users to set passwords with a minimum length of 6 characters, lacking adequate complexity to resist modern attack techniques such as password spraying or offline password cracking." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "cve@mitre.org", diff --git a/README.md b/README.md index 5ad02ed9839..fae59ea1111 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-06T17:00:22.086000+00:00 +2025-01-06T19:00:28.740053+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-06T16:56:36.777000+00:00 +2025-01-06T18:56:33.010000+00:00 ``` ### Last Data Feed Release @@ -33,54 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -275796 +275829 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `33` -- [CVE-2024-12996](CVE-2024/CVE-2024-129xx/CVE-2024-12996.json) (`2025-01-06T15:15:10.933`) -- [CVE-2024-12997](CVE-2024/CVE-2024-129xx/CVE-2024-12997.json) (`2025-01-06T15:15:11.027`) -- [CVE-2024-31913](CVE-2024/CVE-2024-319xx/CVE-2024-31913.json) (`2025-01-06T16:15:28.163`) -- [CVE-2024-31914](CVE-2024/CVE-2024-319xx/CVE-2024-31914.json) (`2025-01-06T16:15:28.320`) -- [CVE-2024-51111](CVE-2024/CVE-2024-511xx/CVE-2024-51111.json) (`2025-01-06T16:15:28.807`) -- [CVE-2024-51112](CVE-2024/CVE-2024-511xx/CVE-2024-51112.json) (`2025-01-06T16:15:28.943`) -- [CVE-2024-8474](CVE-2024/CVE-2024-84xx/CVE-2024-8474.json) (`2025-01-06T15:15:14.983`) -- [CVE-2025-21604](CVE-2025/CVE-2025-216xx/CVE-2025-21604.json) (`2025-01-06T16:15:30.927`) -- [CVE-2025-21611](CVE-2025/CVE-2025-216xx/CVE-2025-21611.json) (`2025-01-06T16:15:31.413`) -- [CVE-2025-21612](CVE-2025/CVE-2025-216xx/CVE-2025-21612.json) (`2025-01-06T16:15:31.633`) +- [CVE-2024-54880](CVE-2024/CVE-2024-548xx/CVE-2024-54880.json) (`2025-01-06T18:15:22.037`) +- [CVE-2024-55529](CVE-2024/CVE-2024-555xx/CVE-2024-55529.json) (`2025-01-06T18:15:22.183`) +- [CVE-2024-55605](CVE-2024/CVE-2024-556xx/CVE-2024-55605.json) (`2025-01-06T17:15:39.600`) +- [CVE-2024-55626](CVE-2024/CVE-2024-556xx/CVE-2024-55626.json) (`2025-01-06T18:15:22.570`) +- [CVE-2024-55627](CVE-2024/CVE-2024-556xx/CVE-2024-55627.json) (`2025-01-06T18:15:22.757`) +- [CVE-2024-55628](CVE-2024/CVE-2024-556xx/CVE-2024-55628.json) (`2025-01-06T18:15:22.947`) +- [CVE-2024-55629](CVE-2024/CVE-2024-556xx/CVE-2024-55629.json) (`2025-01-06T18:15:23.130`) +- [CVE-2024-56757](CVE-2024/CVE-2024-567xx/CVE-2024-56757.json) (`2025-01-06T17:15:40.297`) +- [CVE-2024-56758](CVE-2024/CVE-2024-567xx/CVE-2024-56758.json) (`2025-01-06T17:15:40.597`) +- [CVE-2024-56759](CVE-2024/CVE-2024-567xx/CVE-2024-56759.json) (`2025-01-06T17:15:40.900`) +- [CVE-2024-56760](CVE-2024/CVE-2024-567xx/CVE-2024-56760.json) (`2025-01-06T17:15:41.173`) +- [CVE-2024-56761](CVE-2024/CVE-2024-567xx/CVE-2024-56761.json) (`2025-01-06T17:15:41.480`) +- [CVE-2024-56762](CVE-2024/CVE-2024-567xx/CVE-2024-56762.json) (`2025-01-06T17:15:41.777`) +- [CVE-2024-56763](CVE-2024/CVE-2024-567xx/CVE-2024-56763.json) (`2025-01-06T17:15:42.150`) +- [CVE-2024-56764](CVE-2024/CVE-2024-567xx/CVE-2024-56764.json) (`2025-01-06T17:15:42.483`) +- [CVE-2024-56765](CVE-2024/CVE-2024-567xx/CVE-2024-56765.json) (`2025-01-06T17:15:42.800`) +- [CVE-2024-56766](CVE-2024/CVE-2024-567xx/CVE-2024-56766.json) (`2025-01-06T17:15:43.127`) +- [CVE-2024-56767](CVE-2024/CVE-2024-567xx/CVE-2024-56767.json) (`2025-01-06T17:15:43.477`) +- [CVE-2024-56768](CVE-2024/CVE-2024-567xx/CVE-2024-56768.json) (`2025-01-06T17:15:43.800`) +- [CVE-2024-56769](CVE-2024/CVE-2024-567xx/CVE-2024-56769.json) (`2025-01-06T17:15:44.063`) +- [CVE-2024-56828](CVE-2024/CVE-2024-568xx/CVE-2024-56828.json) (`2025-01-06T18:15:23.467`) +- [CVE-2025-21613](CVE-2025/CVE-2025-216xx/CVE-2025-21613.json) (`2025-01-06T17:15:47.043`) +- [CVE-2025-21614](CVE-2025/CVE-2025-216xx/CVE-2025-21614.json) (`2025-01-06T17:15:47.310`) +- [CVE-2025-21615](CVE-2025/CVE-2025-216xx/CVE-2025-21615.json) (`2025-01-06T17:15:47.510`) +- [CVE-2025-21618](CVE-2025/CVE-2025-216xx/CVE-2025-21618.json) (`2025-01-06T17:15:47.660`) ### CVEs modified in the last Commit -Recently modified CVEs: `51` +Recently modified CVEs: `88` -- [CVE-2024-13072](CVE-2024/CVE-2024-130xx/CVE-2024-13072.json) (`2025-01-06T15:19:09.547`) -- [CVE-2024-20105](CVE-2024/CVE-2024-201xx/CVE-2024-20105.json) (`2025-01-06T15:15:11.433`) -- [CVE-2024-20140](CVE-2024/CVE-2024-201xx/CVE-2024-20140.json) (`2025-01-06T15:15:11.600`) -- [CVE-2024-20143](CVE-2024/CVE-2024-201xx/CVE-2024-20143.json) (`2025-01-06T15:15:11.753`) -- [CVE-2024-20144](CVE-2024/CVE-2024-201xx/CVE-2024-20144.json) (`2025-01-06T15:15:11.917`) -- [CVE-2024-20145](CVE-2024/CVE-2024-201xx/CVE-2024-20145.json) (`2025-01-06T15:15:12.077`) -- [CVE-2024-20146](CVE-2024/CVE-2024-201xx/CVE-2024-20146.json) (`2025-01-06T15:15:12.223`) -- [CVE-2024-20148](CVE-2024/CVE-2024-201xx/CVE-2024-20148.json) (`2025-01-06T15:15:12.387`) -- [CVE-2024-20149](CVE-2024/CVE-2024-201xx/CVE-2024-20149.json) (`2025-01-06T15:15:12.523`) -- [CVE-2024-20150](CVE-2024/CVE-2024-201xx/CVE-2024-20150.json) (`2025-01-06T15:15:12.707`) -- [CVE-2024-20151](CVE-2024/CVE-2024-201xx/CVE-2024-20151.json) (`2025-01-06T15:15:12.857`) -- [CVE-2024-20152](CVE-2024/CVE-2024-201xx/CVE-2024-20152.json) (`2025-01-06T15:15:13.023`) -- [CVE-2024-20153](CVE-2024/CVE-2024-201xx/CVE-2024-20153.json) (`2025-01-06T15:15:13.173`) -- [CVE-2024-20154](CVE-2024/CVE-2024-201xx/CVE-2024-20154.json) (`2025-01-06T15:15:13.343`) -- [CVE-2024-33112](CVE-2024/CVE-2024-331xx/CVE-2024-33112.json) (`2025-01-06T15:15:13.940`) -- [CVE-2024-54538](CVE-2024/CVE-2024-545xx/CVE-2024-54538.json) (`2025-01-06T15:11:09.817`) -- [CVE-2024-56671](CVE-2024/CVE-2024-566xx/CVE-2024-56671.json) (`2025-01-06T16:56:36.777`) -- [CVE-2024-56672](CVE-2024/CVE-2024-566xx/CVE-2024-56672.json) (`2025-01-06T16:53:02.043`) -- [CVE-2024-56673](CVE-2024/CVE-2024-566xx/CVE-2024-56673.json) (`2025-01-06T15:08:36.363`) -- [CVE-2024-56674](CVE-2024/CVE-2024-566xx/CVE-2024-56674.json) (`2025-01-06T15:06:43.330`) -- [CVE-2024-56675](CVE-2024/CVE-2024-566xx/CVE-2024-56675.json) (`2025-01-06T15:03:31.087`) -- [CVE-2025-22383](CVE-2025/CVE-2025-223xx/CVE-2025-22383.json) (`2025-01-06T15:15:16.103`) -- [CVE-2025-22385](CVE-2025/CVE-2025-223xx/CVE-2025-22385.json) (`2025-01-06T16:15:32.017`) -- [CVE-2025-22386](CVE-2025/CVE-2025-223xx/CVE-2025-22386.json) (`2025-01-06T16:15:32.707`) -- [CVE-2025-22388](CVE-2025/CVE-2025-223xx/CVE-2025-22388.json) (`2025-01-06T15:15:16.307`) +- [CVE-2024-56611](CVE-2024/CVE-2024-566xx/CVE-2024-56611.json) (`2025-01-06T17:22:48.560`) +- [CVE-2024-56643](CVE-2024/CVE-2024-566xx/CVE-2024-56643.json) (`2025-01-06T17:14:41.813`) +- [CVE-2024-56660](CVE-2024/CVE-2024-566xx/CVE-2024-56660.json) (`2025-01-06T18:43:45.897`) +- [CVE-2024-56661](CVE-2024/CVE-2024-566xx/CVE-2024-56661.json) (`2025-01-06T18:49:40.310`) +- [CVE-2024-56662](CVE-2024/CVE-2024-566xx/CVE-2024-56662.json) (`2025-01-06T18:51:31.593`) +- [CVE-2024-56663](CVE-2024/CVE-2024-566xx/CVE-2024-56663.json) (`2025-01-06T18:52:41.737`) +- [CVE-2024-56665](CVE-2024/CVE-2024-566xx/CVE-2024-56665.json) (`2025-01-06T18:42:12.090`) +- [CVE-2024-56666](CVE-2024/CVE-2024-566xx/CVE-2024-56666.json) (`2025-01-06T18:23:37.147`) +- [CVE-2024-56667](CVE-2024/CVE-2024-566xx/CVE-2024-56667.json) (`2025-01-06T18:21:07.280`) +- [CVE-2024-56668](CVE-2024/CVE-2024-566xx/CVE-2024-56668.json) (`2025-01-06T18:20:19.580`) +- [CVE-2024-56669](CVE-2024/CVE-2024-566xx/CVE-2024-56669.json) (`2025-01-06T18:19:13.567`) +- [CVE-2024-56670](CVE-2024/CVE-2024-566xx/CVE-2024-56670.json) (`2025-01-06T18:13:02.807`) +- [CVE-2024-56710](CVE-2024/CVE-2024-567xx/CVE-2024-56710.json) (`2025-01-06T17:13:00.090`) +- [CVE-2024-56712](CVE-2024/CVE-2024-567xx/CVE-2024-56712.json) (`2025-01-06T17:11:48.987`) +- [CVE-2024-56726](CVE-2024/CVE-2024-567xx/CVE-2024-56726.json) (`2025-01-06T17:10:17.110`) +- [CVE-2024-56727](CVE-2024/CVE-2024-567xx/CVE-2024-56727.json) (`2025-01-06T17:09:19.120`) +- [CVE-2024-56748](CVE-2024/CVE-2024-567xx/CVE-2024-56748.json) (`2025-01-06T17:07:33.423`) +- [CVE-2024-56749](CVE-2024/CVE-2024-567xx/CVE-2024-56749.json) (`2025-01-06T17:06:18.380`) +- [CVE-2024-56750](CVE-2024/CVE-2024-567xx/CVE-2024-56750.json) (`2025-01-06T17:04:58.267`) +- [CVE-2024-56751](CVE-2024/CVE-2024-567xx/CVE-2024-56751.json) (`2025-01-06T17:00:37.690`) +- [CVE-2024-8474](CVE-2024/CVE-2024-84xx/CVE-2024-8474.json) (`2025-01-06T17:15:44.747`) +- [CVE-2025-21612](CVE-2025/CVE-2025-216xx/CVE-2025-21612.json) (`2025-01-06T17:15:46.840`) +- [CVE-2025-22384](CVE-2025/CVE-2025-223xx/CVE-2025-22384.json) (`2025-01-06T17:15:47.820`) +- [CVE-2025-22387](CVE-2025/CVE-2025-223xx/CVE-2025-22387.json) (`2025-01-06T17:15:47.997`) +- [CVE-2025-22390](CVE-2025/CVE-2025-223xx/CVE-2025-22390.json) (`2025-01-06T17:15:48.170`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ca14d42c5cd..6e9d3d70330 100644 --- a/_state.csv +++ b/_state.csv @@ -75532,7 +75532,7 @@ CVE-2015-2047,0,0,2704a69c5415cf0032ffb800fb0c5fbb11a6ac1ee9bf8c1864588d2de549b4 CVE-2015-2048,0,0,fd99c803aeaa4b05fb164e9b853997f754d242468c30cf8c99e13e009614e1c9,2024-11-21T02:26:39.240000 CVE-2015-2049,0,0,f8f0d997bb37ec8639cbb7da18049aa17a872025f2b7d884b4feee0b321bac52,2024-11-21T02:26:39.380000 CVE-2015-2050,0,0,bbe386a91567e56321126dc93dd5386a1a9bae2855ee91c5ac823ca6c6018b67,2024-11-21T02:26:39.523000 -CVE-2015-2051,0,1,ec2aa2784c152072929e487d1eef8fce9f1e75342c96535d90a9da9a4f5726f1,2025-01-06T15:15:08.723000 +CVE-2015-2051,0,0,ec2aa2784c152072929e487d1eef8fce9f1e75342c96535d90a9da9a4f5726f1,2025-01-06T15:15:08.723000 CVE-2015-2052,0,0,2cb54fe3b8bbacbfd68bc37cc687e8615315e5eb691c09dcebceefecfb956e93,2024-11-21T02:26:39.887000 CVE-2015-2053,0,0,1cbb13193c9c15b7fffcd8a775c59016be05e9754e77d71097206817982b21d9,2024-11-21T02:26:40.020000 CVE-2015-2054,0,0,b4572a1920f607058a9b730c111e2615651825e83a65bb44f719ba29841028de,2024-11-21T02:26:40.163000 @@ -129221,7 +129221,7 @@ CVE-2019-10886,0,0,ddaae779ca882312c5add87ed4862fa7f66bd0fd28489f44793f8d58a7ddb CVE-2019-10887,0,0,01e06e359a228959a59e2c1ac4b13fd0e0fe165a8b08414fc2c26fe4b388e9c1,2024-11-21T04:20:03.337000 CVE-2019-10888,0,0,feee76c67ffdd6ca7f445b77c82bdb35a0e95ffe370d8c4b36c16b5fcacf047b,2024-11-21T04:20:03.500000 CVE-2019-1089,0,0,fe72a4d92999ae0b1e480880bfaa7703302ef038a793508cad76935177755551,2024-11-21T04:35:59.643000 -CVE-2019-10891,0,1,facf8db02ef6d3201f83450bbcef6264e2fec1a4c0f0105fa66c8658ba4daae6,2025-01-06T15:15:09.593000 +CVE-2019-10891,0,0,facf8db02ef6d3201f83450bbcef6264e2fec1a4c0f0105fa66c8658ba4daae6,2025-01-06T15:15:09.593000 CVE-2019-10892,0,0,52cb4ec98e5e23db3941a83183cbc75d45e57c7e11fe5b32a20618dce5743311,2024-11-21T04:20:03.790000 CVE-2019-10893,0,0,5f21bdad6dca3236d197222535a6a5359214793124b2165da61fd6011f0db465,2024-11-21T04:20:04 CVE-2019-10894,0,0,48f3061b32b51d7b68c6ed90aec044e2f5b73828788bffa80ab992a8f1ade96c,2024-11-21T04:20:04.160000 @@ -134206,7 +134206,7 @@ CVE-2019-16279,0,0,cf72393fbff796f9a03980b1ea4fce135ee432f26ba459c93f4ae2e23cb5f CVE-2019-1628,0,0,1e32037049a8875797e1502415b567bcbe41c67e51ffc2a1aa3cd611f0c9281c,2024-11-21T04:36:57.933000 CVE-2019-16281,0,0,938304d26885864d59e3d34885772edab6902031b9fa4910a0d9dfe0c6ff0440,2024-11-21T04:30:26.883000 CVE-2019-16282,0,0,2d3896404bbf5bc9c866739eb93788213e3a4aa094d7ecc54660738f0110b20b,2024-11-21T04:30:27.030000 -CVE-2019-16283,0,0,75f3e347a46c6b10b1432b809209074f631d7a37b8ebe7314a2b9f7e952c961e,2024-11-21T04:30:27.177000 +CVE-2019-16283,0,1,5fdbfec4d7b6cd038f4412079c38b440ef5d70d92ec140822f91bf9b80774609,2025-01-06T18:15:09.650000 CVE-2019-16284,0,0,482b6500cd85c56fa1e22ea5dc21cc216dcd8886879a84e0c2f7ca643ea5e788,2024-11-21T04:30:27.300000 CVE-2019-16285,0,0,4579a441a0a4377cbed67ecd1ea0e0a99eac6b61e41ca7d989a22a8a2de5a030,2024-11-21T04:30:27.513000 CVE-2019-16286,0,0,0f386385a18a3114f926f5729367bdee9dd155c34e6c7e12b08ce39248354e08,2024-11-21T04:30:27.633000 @@ -159460,7 +159460,7 @@ CVE-2020-36729,0,0,298bc3d44e9f5cbceeabf1a18b9f5de844f8650ea84c425405008953ceb84 CVE-2020-3673,0,0,db9beaf1ea66a3321459fa36c54ffba4418e914676affac4b489c6c6d187f58e,2024-11-21T05:31:32.990000 CVE-2020-36730,0,0,e3eb0628b04aca543deeb8a8a892fc427ae5e88062b881d8bf2593fa35698788,2024-11-21T05:30:10.790000 CVE-2020-36731,0,0,2ec46ffe6a2a80e621ec158f66e499259f82d7ec70e1ff687d6fe3d298f9833f,2024-11-21T05:30:10.900000 -CVE-2020-36732,0,0,11084c67b869818792993119997cced210d413308bb8c23cf5c360214851c8d2,2024-11-21T05:30:11.017000 +CVE-2020-36732,0,1,3354c7a2c56208714864f9892213d9fa29131defa1929f40d1f99156d7fa064e,2025-01-06T18:15:11.100000 CVE-2020-36735,0,0,4913606840dd5397080bada55f33dddfdf64f2f036cd03fe5c31936b41a31823,2024-11-21T05:30:11.180000 CVE-2020-36736,0,0,6f4994cf3765a4af3a4707d59bbf9a9324347b35039ff604ac21f40cc5b78f35,2024-11-21T05:30:11.343000 CVE-2020-36737,0,0,ce685b20826e85e25fa065e04fe7b2fe8fb24e372837351b4c62aa2494320fba,2024-11-21T05:30:11.477000 @@ -204239,9 +204239,9 @@ CVE-2022-37050,0,0,d8d69374e63c8bafedd1ac6fdac85d75b18881fba2c4619638282a4d880e9 CVE-2022-37051,0,0,f9f5a60e888d559d1ab2bcafe356ee13479584911a3ed3048280916155f3878d,2024-11-21T07:14:21.403000 CVE-2022-37052,0,0,6a394760189288f7574f5b11c869f13acc8631383cdcb25608fb7dbdd19eaa35,2024-11-21T07:14:21.557000 CVE-2022-37053,0,0,dd19473a37f9d32e9ae7d0e20e0e36478a17051ccca407a238ae7c620e86e6e6,2024-11-21T07:14:21.710000 -CVE-2022-37055,0,1,99fe1b90a1e738e90e5f6eac83ca05f6974b2b7663ae3f0f9c2eee4610867482,2025-01-06T15:15:09.830000 -CVE-2022-37056,0,1,ffca9801e43db0fd7859c7760e21bfb44c4c6230d11d373595083571b42b24f0,2025-01-06T15:15:09.993000 -CVE-2022-37057,0,1,dd28037e644edafa9fd9e43757050b1d91726f01db98eaf62a98a6312337c549,2025-01-06T15:15:10.147000 +CVE-2022-37055,0,0,99fe1b90a1e738e90e5f6eac83ca05f6974b2b7663ae3f0f9c2eee4610867482,2025-01-06T15:15:09.830000 +CVE-2022-37056,0,0,ffca9801e43db0fd7859c7760e21bfb44c4c6230d11d373595083571b42b24f0,2025-01-06T15:15:09.993000 +CVE-2022-37057,0,0,dd28037e644edafa9fd9e43757050b1d91726f01db98eaf62a98a6312337c549,2025-01-06T15:15:10.147000 CVE-2022-37059,0,0,2eefb354470e4941edf10d216ad1f91f19208928aef8952c5bb7ab53efbd8d1c,2024-11-21T07:14:22.337000 CVE-2022-3706,0,0,e12338ac6ae091430a77dc88b3adb48260db8ec44fe506086ed6dcd27e6a25c4,2024-11-21T07:20:04.717000 CVE-2022-37060,0,0,43a883b8c68a5c0b6116ba4a6c7058f0ec351ee738110f987aebb18f21bc268b,2024-11-21T07:14:22.480000 @@ -209329,8 +209329,8 @@ CVE-2022-43773,0,0,3c883dc603288e7ea1f59fc9241971d3ea6fbf6ad6050b01a29564c785659 CVE-2022-43774,0,0,cd7525c340e473b7b20f255c71c0e0a744e6425dcecf94fad27dd76c4af7a4bf,2024-11-21T07:27:12.647000 CVE-2022-43775,0,0,fe8255a7f905d733b5bee5ba38b65c00e1ddf89fc2b0e9b486569e717e09767c,2024-11-21T07:27:12.770000 CVE-2022-43776,0,0,fa7bddb3c589e9dec0c4c48f8a2da7c4453c4a4969bf4e7c56fffba1bfc9aa1a,2024-11-21T07:27:12.897000 -CVE-2022-43777,0,0,90e46605a72042087e8aad7068509958968fcdca77ee6dc534bcb7bb733ad99e,2024-11-21T07:27:13.020000 -CVE-2022-43778,0,0,66d24168a1be905633a5d6cbd00d0c1b4fc1e758745067d3aa40f8e96f202307,2024-11-21T07:27:13.620000 +CVE-2022-43777,0,1,a8ab8288374bb6959857e7fb57cb9a487b5354613e91673296bc76bc7aae57d9,2025-01-06T17:15:08.490000 +CVE-2022-43778,0,1,5b94c7576788fb345035324a3ddcef021919ddf3fa602ae83eb0553a2ac2382c,2025-01-06T17:15:10.027000 CVE-2022-43779,0,0,26680bd83e9e6f2c6e4047bf242699ba7b4f82bd73d59dd926020adda337df49,2024-11-21T07:27:14.187000 CVE-2022-4378,0,0,94a7169c32f7463b7d4f16b282579aeb81cd2f1ccbd1c460ae37bb36301c863b,2024-11-21T07:35:09.897000 CVE-2022-43780,0,0,58fe6c5fa796dd58945801184f0a916aab76c3042f0a71cf000967f989cc8588,2024-11-21T07:27:14.360000 @@ -214180,7 +214180,7 @@ CVE-2023-1115,0,0,832c1f1ff16bf3e058b1f6c2a1d8245c18f9bdeec6fc552041d0a5690583d4 CVE-2023-1116,0,0,ed232ae38fe16cc6f1e36dea9764095b769657e73386995f1bb580c6b3f4fcff,2024-11-21T07:38:29.430000 CVE-2023-1117,0,0,f44ed3655c93feb3e1b06e5916c404303e47dabcaf1edd8a041256455f5442dd,2024-11-21T07:38:29.550000 CVE-2023-1118,0,0,2cbc1bf3ceb7e4ce12857f154f3991dc5fdab30e4ed9e65e20115e0c0d801b65,2024-11-21T07:38:29.670000 -CVE-2023-1119,0,0,aba163598ee6017a5ed8cee19e78b33dccd5c4bdd7387d8baa69d09df884b6e6,2024-11-21T07:38:29.800000 +CVE-2023-1119,0,1,cc2e7848f4d29e726fad3dba5c2b07a98b7a4d33850c96eb155893535adcd16d,2025-01-06T17:15:10.700000 CVE-2023-1120,0,0,b67431b8801043d2762b77648bf7daebaf783cb74af84def7c793f702bbf01f9,2024-11-21T07:38:29.910000 CVE-2023-1121,0,0,648ad857aed412ab295fe1760415bbeb314db5b54caa4785e2f62f8e08764a65,2024-11-21T07:38:30.020000 CVE-2023-1122,0,0,662df1661abe841ba899aa885ca33cd9cbbc4ca3be01370afb41f220b945b637,2024-11-21T07:38:30.130000 @@ -216059,7 +216059,7 @@ CVE-2023-21241,0,0,a9c52cc3d271695ea6e26c73c5d86c4c4dbf2dd781083ecb5949ea8883089 CVE-2023-21242,0,0,8a0858444fe1e9582d88e57bac5e027e0cc7bb99af9f5c9dc4a02b511574b9c4,2024-11-21T07:42:28.650000 CVE-2023-21243,0,0,7d6e099126f714628cf154778994e112a34dacd44ad8236454879a2be712856d,2024-11-21T07:42:28.760000 CVE-2023-21244,0,0,8dac766f4b86486f00562cef81d9807715c2856710458f7069b50370db3533e3,2024-11-21T07:42:28.877000 -CVE-2023-21245,0,0,c611e7d6407681ece5a89d0876b3a4928c70025f8256b473ddff940a8b0fbba3,2024-11-21T07:42:29 +CVE-2023-21245,0,1,6f31a6018414b862e341c83f1931be358fbe28d70c7df234c4a282c3249ceceb,2025-01-06T17:15:11.087000 CVE-2023-21246,0,0,1f6bcffc9d220b84d23cb12a7e9b770433c98266c39e0604ab29512f2ade75be,2024-11-21T07:42:29.117000 CVE-2023-21247,0,0,bc133ab9c456551ec2ef0a7118cff02a516dc7bf991de0bb51275c15c330ed1c,2024-11-21T07:42:29.240000 CVE-2023-21248,0,0,b6a51b49e225af875a42be7d6e4656a8a57077db3d54cfde473e418594bc6b89,2024-11-21T07:42:29.357000 @@ -218790,7 +218790,7 @@ CVE-2023-24467,0,0,55406cf1faaec4b6580953c04a3012fa1c0d42832668608c31cb96b9c3c3e CVE-2023-24468,0,0,b16bd4de6dfdbe945d32fdf1548c9e11d1c93ddf707756efebe0726c679f4afb,2024-11-21T07:47:55.107000 CVE-2023-24469,0,0,a9377ea65c9498eaf5d1c4eae744f9e44b65020ab796251fe5a53a3ce5c454f8,2025-01-03T19:15:09.590000 CVE-2023-2447,0,0,4ec809bb328a770bd9ca5946a889993e16b770e9ec04f38adc8310b23274c0c6,2024-11-21T07:58:38.067000 -CVE-2023-24470,0,1,b9aed5a006801525507460b60c51f828a0cf2886ae2a907eb98e672ae9993898,2025-01-06T16:15:24.590000 +CVE-2023-24470,0,0,b9aed5a006801525507460b60c51f828a0cf2886ae2a907eb98e672ae9993898,2025-01-06T16:15:24.590000 CVE-2023-24471,0,0,5179a7361f4c151520a50596dd93febc191a697ab0b9e040a68f4894d1c0bf24,2024-11-21T07:47:55.473000 CVE-2023-24472,0,0,960a51705afa9dda11cb29157e0c5c2a6d6ba9488f92b721b0fc775cda531599,2024-11-21T07:47:55.630000 CVE-2023-24473,0,0,88e942a6fab04e3eb327350e2f0d5da7290856e72d2c6c8f117f7e57e14af117,2024-11-21T07:47:55.753000 @@ -218866,16 +218866,16 @@ CVE-2023-24536,0,0,bb2b8efcce4307c33912fd14b2db6df4da6e5afc1a5edcdd426d6232dcb52 CVE-2023-24537,0,0,98119d9acafd36005d2ffe696ca11675bc78d34c3c5852328010fe5111c9a191,2024-11-29T12:15:05.507000 CVE-2023-24538,0,0,c6ee96ea8510988e4fb3d5d751f84079e69488c511ff159e1502a7c218c3a75d,2024-11-21T07:48:05.130000 CVE-2023-24539,0,0,7d40afbc3d00934c9e8f590fc3989310adbadf97bab0e18401a9671a9de01152,2024-11-29T12:15:05.670000 -CVE-2023-2454,0,0,8cf18ce709d2e088a8b4e5ae97c7e082c3c561be88f003946508d29beadc2c78,2024-11-21T07:58:38.883000 +CVE-2023-2454,0,1,6361fc24a87ee7375e7b169be77c132fef3b9323deeb35b6d25dbcbf4850e79b,2025-01-06T18:15:13.670000 CVE-2023-24540,0,0,78c0fbdc26b2cb2340f1de68d6774afb1921dcf0f98a7af2ab94c8367e561a16,2024-11-21T07:48:05.360000 CVE-2023-24542,0,0,6612770957bfd2d7428b34a6ccdd2c7fcc6dc69049e1a2e76f202f5ae6e2afa2,2024-11-21T07:48:05.473000 CVE-2023-24544,0,0,7a92daab2fe2f7e58be38c40376f6014daf231528157940605d6e0de84c2256e,2024-11-21T07:48:05.587000 CVE-2023-24545,0,0,a0ab2d4842655375847722a0e937641ff0e0f8a7250b255418abf046a7f0cb00,2024-11-21T07:48:05.733000 -CVE-2023-24546,0,1,7020ab34f942f7b48b41f38297b3a027d155db5f7ccaf02c983628213573b70a,2025-01-06T16:15:25.363000 +CVE-2023-24546,0,0,7020ab34f942f7b48b41f38297b3a027d155db5f7ccaf02c983628213573b70a,2025-01-06T16:15:25.363000 CVE-2023-24547,0,0,ab4dbce96e07b332e9e34fa4d32b493fce80d0ef36ed65791e9039844198f213,2024-11-21T07:48:05.987000 CVE-2023-24548,0,0,a9103924d4dea5c52b518d7e19a320b493a0616e5bfba40084eeaa8b493cac21,2024-11-21T07:48:06.157000 CVE-2023-24549,0,0,b122e819e53fdd79b7990e08f010d0f1f483a4a925a9213645920d1e7b74bf73,2024-11-21T07:48:06.317000 -CVE-2023-2455,0,0,f87e1d37c2dba115e4b72cdf755bd6c6c0c3628ffa117e29beba95413862956f,2024-11-21T07:58:39.010000 +CVE-2023-2455,0,1,f162882ac3413eaa968eecb29e54a7dd075c3b364b85d34bc09e9416e99dd8e7,2025-01-06T18:15:13.913000 CVE-2023-24550,0,0,a79464d2dc849e00eb5f2c02880de203ba4bb9e5e04d48ef066d0d34642872d6,2024-11-21T07:48:06.437000 CVE-2023-24551,0,0,b9c3249916eead0e4d8b221bf13902dccb5427a8a4f172b6ffb89d63d452b85f,2024-11-21T07:48:06.557000 CVE-2023-24552,0,0,14f44cba37885b926d25eaf47764c81914d06ffafbea7c6c80f7f0478c79ba65,2024-11-21T07:48:06.677000 @@ -219542,7 +219542,7 @@ CVE-2023-25428,0,0,e156cc2f7344449203b4767e2d20ae3dcdec550c54b2539722b09482b09d8 CVE-2023-25431,0,0,e316aa04217c95c99f1457a91f82135e51b8eff788a9ce2487c26f659f34afa3,2024-11-21T07:49:30 CVE-2023-25432,0,0,f20d1f459f74b986748a5528b7c2eb57d58187f6efbbf33869825f1d4e128f21,2024-11-21T07:49:30.130000 CVE-2023-25433,0,0,5df429e22dc751f41d7a433fdbe286812200698b107ca366808321b8c7ea1827,2024-11-21T07:49:30.260000 -CVE-2023-25434,0,0,2cc57b407d05514c99c8479c33580d16bc3965f8030c9a3cdfe10e50efebaefd,2024-11-21T07:49:30.410000 +CVE-2023-25434,0,1,571f5e56236fa9808326880d35572a59c1b6a1bb40906c385bd1a6191e97c4f4,2025-01-06T17:15:11.303000 CVE-2023-25435,0,0,e64f125b4f4c609726ddb2def3a1414ba08ac5b462994bcc312950eb8396d96b,2024-12-06T20:15:20.487000 CVE-2023-25437,0,0,579707dc4163779f73eb8be843597db5569b95fa17661e9431cfbfb44ee78333,2024-11-21T07:49:30.673000 CVE-2023-25438,0,0,930d14bd652365f198f5c3043909a1e740cff99144c0d9486a27900b45c4f918,2024-11-21T07:49:30.813000 @@ -220207,8 +220207,8 @@ CVE-2023-26128,0,0,4d54ed09be557905cc501455a334c735bc459632902ae5c15e862ff1d96f6 CVE-2023-26129,0,0,5f628b5c2dc59094368e199c259f60d5828017f4c8781a067d6318acd76771ed,2024-11-21T07:50:50.107000 CVE-2023-26130,0,0,9bd6830373a3d7731946cd9deb93af3b66cca12eecf63a6ad5c7eaa7c5486568,2024-11-21T07:50:50.233000 CVE-2023-26131,0,0,832e88db96e3308844a405e07bfd3d96063e78ae66b8f85c8de458ccab8c737c,2024-11-21T07:50:50.410000 -CVE-2023-26132,0,0,cfdefa8245057c14426966d7aff9f9b9090d5527cfd9193de2035babd55d379b,2024-11-21T07:50:50.543000 -CVE-2023-26133,0,0,650d42c602b871dc2a1be71d6e77dc181f3bc0508b1f59c57cf10602864d98d1,2024-11-21T07:50:50.667000 +CVE-2023-26132,0,1,7fd105032d5f1acc02b3eadc3c78d9bbb87549d180693440ea303fff02ef4344,2025-01-06T17:15:11.647000 +CVE-2023-26133,0,1,a42dbd7235b011eae0d5c54f3de9decaf02e221830eceb73b9e9b780c377d3b7,2025-01-06T17:15:11.860000 CVE-2023-26134,0,0,e5a2674133a733a37e4b96de30d3d545928511fe70a4dc0ca2091ec2787c4ef5,2024-11-21T07:50:50.807000 CVE-2023-26135,0,0,a5413ec7d5f10c21d7a49a28c5e8162a309782a6298cbe5ab3b91b1418f853bf,2024-11-21T07:50:50.947000 CVE-2023-26136,0,0,7d2969937f5c5705c97f74159babcdb664cfdb2aba132d2904e7be991bf3e8b6,2024-11-21T07:50:51.107000 @@ -220320,11 +220320,11 @@ CVE-2023-26290,0,0,bba8e304dfe297405a10927501cc5db1a24f14309fba497fc520c3c5e1ec5 CVE-2023-26291,0,0,717248e82d9ff3caf8864552280cd5d434065def34da66050c35d45bbca40f82,2024-11-21T07:51:04.253000 CVE-2023-26292,0,0,b9da7a23b5e4760d3bf237368d6dbdc0d194766ef0e76f65a6b671d12839c1ad,2024-11-21T07:51:04.387000 CVE-2023-26293,0,0,3c06b67a7de762d4a02fead9b0167561026c3c9cb98ed94e394413b258c77de3,2024-11-21T07:51:04.510000 -CVE-2023-26294,0,1,7d86869b29c88dd59953f7aa36d6abd24701ef66c5673ea456799f7ca09e8c84,2025-01-06T16:15:25.617000 -CVE-2023-26295,0,1,b8c2fd17b89a78d151a36a53ed1b4f88628505875355d19d066ee381c0fa1bb4,2025-01-06T16:15:25.867000 -CVE-2023-26296,0,1,49985c5f29db73d1b5956fa19649335a0a874dfa346646f0c3e5d9326dcff820,2025-01-06T16:15:26.060000 -CVE-2023-26297,0,1,5717b3aad3aa891bf64df738f8b5654967133d062b816805e83a7b87b454e39c,2025-01-06T16:15:26.287000 -CVE-2023-26298,0,1,a90ce7d5c6078cf9e176a2eb986eb6a3d2b3e2e7e1429b3efc05761cc0ae09e5,2025-01-06T16:15:26.553000 +CVE-2023-26294,0,0,7d86869b29c88dd59953f7aa36d6abd24701ef66c5673ea456799f7ca09e8c84,2025-01-06T16:15:25.617000 +CVE-2023-26295,0,0,b8c2fd17b89a78d151a36a53ed1b4f88628505875355d19d066ee381c0fa1bb4,2025-01-06T16:15:25.867000 +CVE-2023-26296,0,0,49985c5f29db73d1b5956fa19649335a0a874dfa346646f0c3e5d9326dcff820,2025-01-06T16:15:26.060000 +CVE-2023-26297,0,0,5717b3aad3aa891bf64df738f8b5654967133d062b816805e83a7b87b454e39c,2025-01-06T16:15:26.287000 +CVE-2023-26298,0,0,a90ce7d5c6078cf9e176a2eb986eb6a3d2b3e2e7e1429b3efc05761cc0ae09e5,2025-01-06T16:15:26.553000 CVE-2023-26299,0,0,aac0da5fe3ae99b63f8feca3f42cc635a14ae78b0bbd0e9a1c3c006906c64fec,2024-11-21T07:51:05.217000 CVE-2023-2630,0,0,3f9f55ed8c618bdd619591e4c0245b49ba425982f9025d62b661c9171d5a5550,2024-11-21T07:58:57.973000 CVE-2023-26300,0,0,21192716bacf67c334cfdebdec314d170da619cd8341dd1e80e8a0e7b433aee0,2024-11-21T07:51:05.397000 @@ -220788,7 +220788,7 @@ CVE-2023-26959,0,0,3256c10cc44d1ea908179ee6646c2f1d21949e7f041fefc54308e21873c03 CVE-2023-2696,0,0,80c166f4bb66cbe0e082d20ccd7f4b1fe89761e6fcf75764df81daccdc3a9638,2024-11-21T07:59:06.300000 CVE-2023-26961,0,0,895533ab6d448d35ea0afd90e70725fa325ae4406fac3a00ec8ad575ff71f885,2024-11-21T07:52:07.460000 CVE-2023-26964,0,0,1ea5a10c272afdacfb6765522e80f321734cebc3c6ae31f2ad8ffc4b935722a0,2024-11-21T07:52:07.607000 -CVE-2023-26965,0,0,fa286cd8d4f372307d4dbf52ca1f0eee928a9970addbe417d1d4333ccc50cec5,2024-11-21T07:52:07.757000 +CVE-2023-26965,0,1,5fe050d3ed546ed5ca539a99f1d48b60d7b1c2a58f89bb8e46fdac4ee098d2d9,2025-01-06T17:15:12.030000 CVE-2023-26966,0,0,20620a4079c810d345aa9659d9a695c26cda7892607dc4020c3e9db336a0f61b,2024-11-21T07:52:07.910000 CVE-2023-26968,0,0,a40605378aa2ff7df236c2cca85315db9fb08b9c216176847f2089aa2aadf65b,2024-11-21T07:52:08.060000 CVE-2023-26969,0,0,f893e3684e061ff8592e9c4ff3c0055bf98e7e909222d67a2c906bbd6c09b4c4,2024-11-21T07:52:08.200000 @@ -221376,12 +221376,12 @@ CVE-2023-27701,0,0,0b01355e511d21c351b003386cd72d702cc93b0bee63e7e210be3c915ccbb CVE-2023-27703,0,0,b0bfa75785c637576253800b50a4147b6b090aaebf25f355b89780067efe4934,2024-11-21T07:53:21.877000 CVE-2023-27704,0,0,ffb87257b76ed5d960e64cc507c296f5e240a087180d9b55c58fdabb1dde1482,2024-11-21T07:53:22.023000 CVE-2023-27705,0,0,c57c3fd31a37134c3e85e86d1e2f03ab7a1d49177f66b4e137d201369e61847b,2024-11-21T07:53:22.170000 -CVE-2023-27706,0,0,ef9ce23220b89ebb6a9cd41e167e8565d1351284bbed33c13567525a90e319d5,2024-11-21T07:53:22.320000 +CVE-2023-27706,0,1,f34f30cc30e77318666f1aa67d89ecef723093bff2ff5aa598dbabfa04e0e0fa,2025-01-06T18:15:11.927000 CVE-2023-27707,0,0,21cd82df4851fa4f0f6d309f3ec86941726816aa2ced93be07a567c85cef2609,2024-11-21T07:53:22.480000 CVE-2023-27709,0,0,42937c1255912344539a95a78b631e75e4147ce3df4dbc74c0d1da2eafc4239c,2024-11-21T07:53:22.613000 CVE-2023-2771,0,0,ca5efb03113ccf8bdf2a139cc669a77fad68d96263863f76947581de42452c6e,2024-11-21T07:59:15.637000 CVE-2023-27711,0,0,c9a2e5afb55daf06a1cf6cea1f425e79d38b0b6a59f909f53b876f341de40189,2024-11-21T07:53:22.753000 -CVE-2023-27716,0,0,5438d9c23075b906f6da653473234bdd86d7bbab1d6ceb2306508e0d4c3cc17f,2024-11-21T07:53:22.890000 +CVE-2023-27716,0,1,04cdeae9792ace27212dd0e890152b308a6873b8e0d55f3df12187e1391bdb41,2025-01-06T18:15:12.193000 CVE-2023-27718,0,0,800e260dd05d9aade319051f0789cd2b1cc086d8c80aced28470c9899eef4eed,2024-11-21T07:53:23.040000 CVE-2023-27719,0,0,ad9a081259e586a44857be5d7d388546cc821d3e7f94553d9b77ce9db0e15866,2024-11-21T07:53:23.200000 CVE-2023-2772,0,0,371d0f43be59cbbbe5bc16860b9cc5b542f17f9f3db2e3bda7f801dd2dd6feef,2024-11-21T07:59:15.760000 @@ -221459,7 +221459,7 @@ CVE-2023-27823,0,0,de39d5d1b69e6ce911d3824858554c47261bf277ea1b73dfc02a4c614e32a CVE-2023-27826,0,0,6347975b3ad6cd0a6c56e8ad212042e6480582857697baae9c7d72978fd34950,2024-11-21T07:53:32.610000 CVE-2023-2783,0,0,096c3b26e537bed1ca5ddb3ac65f36398fc1d487c37d85c199430095b0e32907,2024-11-21T07:59:16.937000 CVE-2023-27830,0,0,31134275eb53f6f7a000d54b47d97c7e7c9a150ff8289e7f25052e8f6b4f75b8,2024-11-21T07:53:32.780000 -CVE-2023-27836,0,1,e570ef98939da4780bfb99b46bb9aa7a73a3d5992a3a95011a96e45e50ba6087,2025-01-06T16:15:26.730000 +CVE-2023-27836,0,0,e570ef98939da4780bfb99b46bb9aa7a73a3d5992a3a95011a96e45e50ba6087,2025-01-06T16:15:26.730000 CVE-2023-27837,0,0,09ca7af765c2ff6927776c1eecc7d27a9e98a3793e382e704f3567fa1aeeb314,2025-01-03T21:15:11.333000 CVE-2023-2784,0,0,3beb45ba8d37afa28c5b710c953916c9a0cc09ed1f3ea22bda898c6b758d70ca,2024-11-21T07:59:17.050000 CVE-2023-27842,0,0,ff4319ffbaa6389afa0396471ae6b5a71fce4f1fe6e68640710e37a063b03c1c,2024-11-21T07:53:33.280000 @@ -222096,7 +222096,7 @@ CVE-2023-28474,0,0,167f0536a088954de2498507d2625ca9347de2cebbf61319c4af01e1c206d CVE-2023-28475,0,0,c2c12e381ebe345b739171e57a74c13376e9e29c7ee47b6d8c293c0349d603a9,2024-11-21T07:55:10.450000 CVE-2023-28476,0,0,6e9873d463a748b066306673e6cbe9ec9f361c291c993127a485645422be7147,2024-11-21T07:55:10.610000 CVE-2023-28477,0,0,2f7eb81daf295d1581f4192be55f6af8650472aad73fa62b2d4871690e7df38c,2024-11-21T07:55:10.770000 -CVE-2023-28478,0,0,a328296a9a6fd1b704518c3a2dd1c4dd36bbefe3924b45f39738989e86294670,2024-11-21T07:55:10.953000 +CVE-2023-28478,0,1,bf24b900d7f73e768e8ae402d91ffd76f579e162b908cd16e7b66b9b3a3d3fbc,2025-01-06T17:15:12.243000 CVE-2023-28479,0,0,71489d93d9e5895743233939aaffd16baf8e10f2a80d930137faa95c8e260e7f,2024-11-21T07:55:11.177000 CVE-2023-2848,0,0,ff740bc6f7b0f66f3a119e9d4c2a97a24790d89e907ff11d1e9247cf5020975a,2024-11-21T07:59:24.907000 CVE-2023-28480,0,0,cb6a6622669a44f9f52be09eeb44f2689a26a78ae67ab3822a8f0a5be492a85c,2024-11-21T07:55:11.380000 @@ -223155,9 +223155,9 @@ CVE-2023-29708,0,0,80acc91b8ee5fcbbe3c17d679013a51beda91f56ef3302baa2feb6d2bf7e4 CVE-2023-29709,0,0,1919d1c002a9f96ee0c8c1546cfa07ff60386e39621ffac1bbf1b005f52a1602,2024-12-06T17:15:07.473000 CVE-2023-2971,0,0,f73059d3a4206d7e70963e267db0e7502a375e51ae35fd9e4cbb9110c2e3e71f,2024-11-21T07:59:40.130000 CVE-2023-29711,0,0,4494594bdac4ff9164e10478bfbcf28814f004efb7fa1f6e08f2e51c5c5dc4d0,2024-12-12T19:15:07.757000 -CVE-2023-29712,0,0,d98e4ebe8e609f2fcba09d6e77794c1aaea14d6da6dd5ff34e0cc625d7ecb762,2024-11-21T07:57:24.340000 -CVE-2023-29713,0,0,f1eec4c2cfd35c1df9601eaa8a8df4080c1fc9f4092996b46e7f601c4133218c,2024-11-21T07:57:24.497000 -CVE-2023-29714,0,0,a05d984b0529422e91f597326eaa41d776b9b54ce7e05d4a3d47431a4c3211e3,2024-11-21T07:57:24.633000 +CVE-2023-29712,0,1,4acd792295f6a0c4c4e3644f6e06fa2c947eac6d394fdb813cb603dcc5764cda,2025-01-06T18:15:12.433000 +CVE-2023-29713,0,1,ceb35b8102259779e219f499cbff20efafb32230b552c518e0afdbbdcf079ffd,2025-01-06T18:15:12.683000 +CVE-2023-29714,0,1,f64975efb15c581a3eb606f94a31330a7ab5e099f36c5c0db97a36c33a46b08b,2025-01-06T18:15:12.930000 CVE-2023-2972,0,0,d5c968d2bb89a1b48ddfc3f682f9483a90bbcddb7cf510116994e76efad62b91,2024-11-21T07:59:40.277000 CVE-2023-29720,0,0,1f61853af6e31b6d17a1f07774bef430ef61e62aac6cb8edc9d923d77020b562,2024-11-21T07:57:24.780000 CVE-2023-29721,0,0,16bc6df95e94fb6a5ef25e342a42709e7a4b72452d3121be94f25487bab35666,2024-11-21T07:57:24.930000 @@ -223187,7 +223187,7 @@ CVE-2023-29745,0,0,68e3675b29535613bcb2472df3ab338bd82f6db11be2be773fa63d5dc8c29 CVE-2023-29746,0,0,133c031c39348c96f95d9e43b02a0f81b2e172f555bea6970e402c248a23e4a6,2024-11-21T07:57:28.020000 CVE-2023-29747,0,0,136ce121e376918b0a32772053c87673baadc2f913087856d8be12a0c0a8f781,2024-11-21T07:57:28.170000 CVE-2023-29748,0,0,a4e83df62ba2577db9b71c893df3464a133c4513399945481272b650f70964fe,2024-11-21T07:57:28.317000 -CVE-2023-29749,0,0,aa25f0b8437bf6f4aacbae60a3280c1814dfccd3694da96fc05ef68f080fe9d6,2024-11-21T07:57:28.457000 +CVE-2023-29749,0,1,bee435745394068e96f0cb8168118acb0d5340cb0881d4dd204dc44457c341ca,2025-01-06T18:15:13.163000 CVE-2023-2975,0,0,eff2e981c6d761b203377651befd2b307795817f2e933153b4cfe0cdd2ccccca,2024-11-21T07:59:40.690000 CVE-2023-29751,0,0,c3c57c9e193df0acbaddc3a949bdf918308feb7192ffd375f7255b1caad78f3b,2024-11-21T07:57:28.583000 CVE-2023-29752,0,0,5d648726c3400706752b4a8fb9abd6d2d80461d1565f03f26a821fdef0b123db,2024-11-21T07:57:28.750000 @@ -223200,7 +223200,7 @@ CVE-2023-29759,0,0,2e95bdae5ba57866dd5b18dddfe74ef63af4a96954c818489d819e58dcd2b CVE-2023-2976,0,0,b03475082f280b2feded368efd6f1b9f33545192f289f4208674beed7a69eee5,2024-11-21T07:59:40.830000 CVE-2023-29761,0,0,26a97621d1751e084bb4c21048e53b18e14669caf3153152819ca96cc780ba4d,2024-11-21T07:57:29.703000 CVE-2023-29766,0,0,60a912372f948149a9233be4ae88e9324095738af23af22b01e65aa61557e005,2024-11-21T07:57:29.843000 -CVE-2023-29767,0,0,16116e0de3da8c7baf65b726aa6988aa576a2754046462e5c9b185404907dd6d,2024-11-21T07:57:29.977000 +CVE-2023-29767,0,1,b68faaf3b45ffb0d2cbc64ebbea41b6a0ffb61e7f1e4d4fda9dfa4cba199dc98,2025-01-06T18:15:13.400000 CVE-2023-2977,0,0,1a752c54f745f538d9c93d46f646c0f344e447c42a75ce35891896c78e608b98,2024-11-21T07:59:40.960000 CVE-2023-29770,0,0,2194bec03536589ba63983ee5a9fc8756c676ff1e07518ca2875ebc40fa29460,2024-11-21T07:57:30.110000 CVE-2023-29772,0,0,236d384474273915c0e96c3d9fc6b4ea5ae20135fdb39e54b28539475f08e864,2024-11-21T07:57:30.257000 @@ -223343,7 +223343,7 @@ CVE-2023-30077,0,0,65a962d4d26149ba50f0fda3f1e059cbc85bdc00300c9c0a7af5913af1efa CVE-2023-30078,0,0,b59993147a62c797f33e7c496e57076f579e3cbe18fcb581691b3e11b875ebeb,2023-11-07T04:13:39.507000 CVE-2023-30079,0,0,1864953fe33081a6ea74d96fafa4bcbdbe00bfd5214eb8cad4b963faa87f65ad,2023-11-07T04:13:39.547000 CVE-2023-3008,0,0,b8bd483b2ec70b6ad2626cdc7694f3bc2e5a2939898ff1ee6f945c20cd116aa1,2024-11-21T08:16:13.703000 -CVE-2023-30082,0,0,7f269fc64b6b27dbf6c0fd44e8ceae713e3ff3c40a03a5ac65a9ed8b96c09127,2024-11-21T07:59:46.327000 +CVE-2023-30082,0,1,9bb92d956ae82dd34b1e5eff81dd134b18a6dbb5022b10b0299f85bc1e4eed12,2025-01-06T17:15:12.460000 CVE-2023-30083,0,0,d237da15d0b2a95c9c4c46fd34706df203c3d2e551e0d0053bf138798e83ced4,2024-11-21T07:59:46.473000 CVE-2023-30084,0,0,7552fbb903af88672409296a89ad83fd9ad9d43cf09e45ece4226f8cda3ea36a,2024-11-21T07:59:46.620000 CVE-2023-30085,0,0,8c1db376031a008fa08bd255201efb63329805c701c8606c89bd9a319998c4ed,2024-11-21T07:59:46.773000 @@ -223379,7 +223379,7 @@ CVE-2023-30146,0,0,47f78097a903c2be223bfc1e40b4393199b4917afaf531cbc2c6715590fe9 CVE-2023-30148,0,0,b94aac1599c024a39dc406b4df1c745f84e300d5ed607caf50e2ba928c96b514,2024-11-21T07:59:50.350000 CVE-2023-30149,0,0,0f6dbbb511cf6b056c5536a2c4805decdf86d1077bdafea4f90c4e46d250e00e,2024-11-21T07:59:50.503000 CVE-2023-3015,0,0,a881fc5d740aa3633b850361cffc9464a2df8dc759f002c7c786b147744fa3b1,2024-11-21T08:16:14.757000 -CVE-2023-30150,0,0,8701f0a79837d0e855fac18f21eb406315dd5043272af86e32b597b4b2562931,2024-11-21T07:59:50.653000 +CVE-2023-30150,0,1,d840418dad5b1b12215381c7a07f60a05e71bdd505248718339d4193762c15d7,2025-01-06T17:15:12.697000 CVE-2023-30151,0,0,eb51da61faa641ec7ef34207f2d375c430ce224ddc597287ef03a9720bb44523,2024-11-21T07:59:50.800000 CVE-2023-30153,0,0,6cf6ca3aa05eb847f8f4f95363208d4ed79f29e0f96b6c45b0c4226e1899975e,2024-11-21T07:59:50.953000 CVE-2023-30154,0,0,ec13d7eb78816b6f7fccc2afc2b9605ad3f4ccacd68312c17f5295c0f2e2af5f,2024-11-21T07:59:51.100000 @@ -223403,7 +223403,7 @@ CVE-2023-30194,0,0,97916a3149d4accd5e7cecee33423a08e2cb7a42bf400ac1c6746cf4b6f8b CVE-2023-30195,0,0,9f6fd32b889ec86f9e06a9f333ca1033c4dc8bc185606c569140c5f599d8388a,2024-11-21T07:59:53.150000 CVE-2023-30196,0,0,35e6908f97e6789a4dd0c990aeed48d9ed2d41eab1253c4f2dd81675f70e1287,2024-11-21T07:59:53.313000 CVE-2023-30197,0,0,4ca163fb2bc24fdc31b221d566813bcda7e29fcfa5cc79850d006bf6831bc55f,2024-11-21T07:59:53.463000 -CVE-2023-30198,0,0,a2f82354c25eb93c736fe23f5db17eeafc5948f71fd86d27e0396237c5ca67f6,2024-11-21T07:59:53.620000 +CVE-2023-30198,0,1,7f1941a7741b63aef8b28984f3b14075b64a8d6f6c8b1538f63f22a90dd6b9ff,2025-01-06T18:15:14.143000 CVE-2023-30199,0,0,1f8ebf4c877c0a722d10dbc9b79130c4fc98833d5f788243279b89d19018db31,2024-11-21T07:59:53.783000 CVE-2023-3020,0,0,dc6b0a3b052e0c37cf22c64ca8f4745b185c0203822cf010875cad2a22a94e3a,2024-11-21T08:16:15.523000 CVE-2023-30200,0,0,fb6b9c5a436448ae06419b546257db7987ffc421ea2ea2af3fac0b985d318608,2024-11-21T07:59:53.940000 @@ -223437,7 +223437,7 @@ CVE-2023-30259,0,0,32c44058401c61de009be437804ef940eabc21574b12b4f81778fc4ee5b13 CVE-2023-3026,0,0,87c83e0aaf62141924d188f97ee160cab36e3d3bc4cc5201f7492ba21adf80f5,2024-11-21T08:16:16.343000 CVE-2023-30260,0,0,b2e807a9cca4ccd5f9b28ceaceb1b4f9406b7da38fef7dbfaf1891ae37ddbcc5,2024-11-21T07:59:57.290000 CVE-2023-30261,0,0,d4b192e7b0adabf588260eb7b829bc3917ac5a711aabc9670ced6f37fde5b385,2024-11-21T07:59:57.427000 -CVE-2023-30262,0,0,acea7aa55c69537d18a93797c35637dc6bac01a8837ab7fa379433fdb18c6605,2024-11-21T07:59:57.570000 +CVE-2023-30262,0,1,86707dea940d72fd0b7533ed8ecb180300657bff51578e9dad012dd6e4229360,2025-01-06T18:15:14.373000 CVE-2023-30264,0,0,c820672fed42d98f78d3aea6bd556290b3ab6aee32e7cb23c683e892911db6d0,2024-11-21T07:59:57.710000 CVE-2023-30265,0,0,fb8d7707278943f638b6e36e4f2f95664abc95ef7a11c11a2687dc604a2feff2,2024-11-21T07:59:57.847000 CVE-2023-30266,0,0,abed353f4357dd3f90fb390f435f2cbea9f7d4c54ce80985406e37115d79d5ca,2024-11-21T07:59:57.983000 @@ -223865,7 +223865,7 @@ CVE-2023-30762,0,0,65230d50da39d5769884a23cea215c219f87d24b734bb6f203bdf38965635 CVE-2023-30763,0,0,bc7592b061aaf82c1eac06e9d5fa65a11d784ee282785556a956d5363d94499d,2024-11-21T08:00:51.257000 CVE-2023-30764,0,0,3ee96bc9ee7f0e63a06bf407115b05d6719bf9b6a46c01fc40dabda0589d48f9,2025-01-03T18:15:14.867000 CVE-2023-30765,0,0,74e124605964f03fd6d00452514c12b5d209ca28601a39802d58daee3a6414be,2024-11-21T08:00:51.507000 -CVE-2023-30766,0,1,8bf2a8ec3becd9c2c60278b0287f7ad061689d072c486aa34c1cd936e3876f1b,2025-01-06T15:15:10.310000 +CVE-2023-30766,0,0,8bf2a8ec3becd9c2c60278b0287f7ad061689d072c486aa34c1cd936e3876f1b,2025-01-06T15:15:10.310000 CVE-2023-30767,0,0,85457cbadee2e525e1d99b0cb12376880ce917319783a448267ff8f0d4c5aed3,2024-11-21T08:00:51.763000 CVE-2023-30768,0,0,03c63ca37f99fc3a2814e35ea98ad3e5452a37b90886aeda01832015f682e93c,2024-11-21T08:00:51.883000 CVE-2023-30769,0,0,a7645042e3b10a3a820cface04501fdc419581ff0845bcea26ccc16f2bd18236,2024-11-21T08:00:52.087000 @@ -224515,7 +224515,7 @@ CVE-2023-31664,0,0,881b74e1a642b44ea3e42fd74da98416ab40f52304a35fce9324b6ec98ec1 CVE-2023-31669,0,0,f7ad37979ad57ca89ad61d54bc1d40c66ac7a1a9ef1750d3731821f0686e44a3,2024-11-21T08:02:08.373000 CVE-2023-3167,0,0,86fe7a49be353b5867174c1710ba79ba2f8c2e24bd3a3befd984dd383c2fbd01,2024-11-21T08:16:36.520000 CVE-2023-31670,0,0,97828412a1cc7c3e46a263507da9abfd5bcaa974911064391f8fbb69e112dd5c,2024-11-21T08:02:08.510000 -CVE-2023-31671,0,0,feef968f086e0c466d80f2e0ec781c9fc2b0c9f95a4ac73e591202b9500118d3,2024-11-21T08:02:08.647000 +CVE-2023-31671,0,1,e0884d411163fb2a250ac10737787bb29965bd59bd01f4a5b18a9e8d5fe72048,2025-01-06T17:15:12.890000 CVE-2023-31672,0,0,578a250b68c2ed9a520367b58addf7522e8cfa8b6bc802c6a24600bd205500c5,2024-12-12T22:15:06.950000 CVE-2023-31677,0,0,15b651c87b4ff7e5e78068e713c9f79a2ea3e4c9793fbfdd1cc77bb4fef0a7db,2024-11-21T08:02:08.920000 CVE-2023-31678,0,0,df76619790b3ccc950bcd0631780838ef027e430ede3d6ca643cb3ee2a207f01,2024-11-21T08:02:09.057000 @@ -224553,7 +224553,7 @@ CVE-2023-3173,0,0,022677952ebd42989b06e1597f2563b8948d7c0602e4beeb60f1c2aa27971f CVE-2023-31740,0,0,81f95e0fcfd2c8fa962e0f642f4f6c7a75c2fc0ff6625ee2578bb54fbea3578a,2024-11-21T08:02:13.460000 CVE-2023-31741,0,0,d1957902028aada53e98c00d778ba7c507952bb07eef663918ae8afe94b00504,2024-11-21T08:02:13.590000 CVE-2023-31742,0,0,4c39e5d01348f84c495d575eca9ea50662e51a5fe50b47b11a8aff9ab90a53ef,2024-11-21T08:02:13.737000 -CVE-2023-31746,0,0,c1501ad79fd81affcc54d8552f8b92d0322c26648de7ca4227f90974a1f40231,2024-11-21T08:02:13.870000 +CVE-2023-31746,0,1,3a8aaaa50147d3d114e7254fa8029831eb539b8eeed897297373531d4ecfdb61,2025-01-06T17:15:13.100000 CVE-2023-31747,0,0,e1f12a48eff45f6219f0ac7382e90c9f6cd09a4192724e614d84764897076af4,2024-11-21T08:02:14.103000 CVE-2023-31748,0,0,0f540337304e36e00c3f95780de455af527831695e1251ae1c5fbb139d2d59fc,2024-11-21T08:02:14.240000 CVE-2023-3175,0,0,fab3b543d5ff15291ae9f767c9d5983231c0dacf478e930dd2c194f4b56209b7,2024-11-21T08:16:37.620000 @@ -224918,9 +224918,9 @@ CVE-2023-32215,0,0,6004a9099b04381c82d19ced9374897f16542b2b1c69c9df6af91e514abb4 CVE-2023-32216,0,0,39bab12d297ff67929135594485ed9c9a37edb3746a90635255b238eeee22048,2024-11-21T08:02:55.220000 CVE-2023-32217,0,0,ebde966ce408b0ed617dedc763beabad1ab77f68e1d432d5c25e9f626c45ddc6,2024-11-21T08:02:55.330000 CVE-2023-32218,0,0,f4668f6dec2ad787cba45f10fd52cbffde113c4295d5e52527a0a3bed9829944,2024-11-21T08:02:55.450000 -CVE-2023-32219,0,0,5016bb311111e2171cad0226da9875250b1431f46d617615133b7b54b63a5333,2024-11-21T08:02:55.563000 +CVE-2023-32219,0,1,58a07f3483bd80d80fa1dbd5b356f5de7702031b0cf9377251d8c7d7be1df6a6,2025-01-06T17:15:13.383000 CVE-2023-3222,0,0,7d57eac9a2b5e14a32fbb1633baffee38ba9604df950673d8180481bf98f3795,2024-11-21T08:16:43.900000 -CVE-2023-32220,0,0,7a8e9a38143bd8064ad289215094e013695d95e6076448cf1074f8c028ef2b55,2024-11-21T08:02:55.670000 +CVE-2023-32220,0,1,a03bf1befa4f10f340bed4ddbbc13c608c02d87bb1cfb57a755d98d6a2512ccd,2025-01-06T17:15:13.543000 CVE-2023-32221,0,0,1bb9ec77a45c6795dd7cc048448a8dd2a2768ee4ce6488cb5a868e5cc39185b0,2025-01-04T00:15:06.207000 CVE-2023-32222,0,0,628471b60fe838500aed372d2bdccfc395d9e95fc54bc2874983f952d5f04ce1,2024-11-21T08:02:55.893000 CVE-2023-32223,0,0,917c1b5258b903e7b790f68cd6060630779eb688b3bea354bbc98d7b17f4b584,2024-11-27T17:15:05.937000 @@ -226068,7 +226068,7 @@ CVE-2023-33508,0,0,eefee40d15da825ff91a58514af3667b807a8d58fe173d0d65d33f631700d CVE-2023-33509,0,0,7c087a342d0e252ecbe0a47b1cafba10b65eb1c2aefbfbfaa10685cf24ed5b5c,2024-11-21T08:05:39.520000 CVE-2023-3351,0,0,f64258e34e1f6e2c3debe6ab542c8550e84fbbc69c1d8f132c263991d8bde067,2023-11-07T04:18:34.703000 CVE-2023-33510,0,0,d29b90ff15a726b648e2993c8bf68a5f552f1568c008c0fe5eeca3aa45af10d6,2024-11-21T08:05:39.667000 -CVE-2023-33515,0,0,c3dae0c8f5d76025e4109326e541eb9bf272b52b7bfc2b2f305a55268ccf48db,2024-11-21T08:05:39.833000 +CVE-2023-33515,0,1,365a9a5f6a7f4c9eca56bb36b50c44f896d0d4286fd9bf91ea545127cf4cb344,2025-01-06T18:15:14.737000 CVE-2023-33517,0,0,b525e4f20df193bb6cbce03994f81acd991418a35811daa2f53394dfc22d6d82,2024-11-21T08:05:39.983000 CVE-2023-33518,0,0,d2a984b73ce9cab4514b9daac0fd3b164012234648668d157ade4d7b4b4aa3a9,2024-11-21T08:05:40.207000 CVE-2023-3352,0,0,ca8ce10d91c2afb8d2b579cfae6df369db0748f6d1892a3e858fbf033cc8e8c8,2024-11-21T08:17:04.957000 @@ -226091,7 +226091,7 @@ CVE-2023-33551,0,0,15ca22be4f110c38b80ef279ae23e0f0520d88f7835dffae7ff26ecf6ce6c CVE-2023-33552,0,0,d954eec01e7648a78344657472a098bc82cdf50ddc5f7580444f9b507c1e3dbe,2024-11-21T08:05:42.310000 CVE-2023-33553,0,0,3e45fe36eaea584646bef73a6be0635df469749915e87654cc6e212a560bcc17,2024-11-21T08:05:42.463000 CVE-2023-33556,0,0,4533d7ebbf770d62d87a476cb183e77b38116854e0650689de07ee3efb4dc4d1,2024-11-21T08:05:42.613000 -CVE-2023-33557,0,0,3839ede1289328bc54f84ffa15fd7e718444a3d9d61b052cccf40018efa9155f,2024-11-21T08:05:42.760000 +CVE-2023-33557,0,1,cc03734a1aa1840f74f9352ffd50d3d02541603dee095c93032d40edd69bf2c3,2025-01-06T18:15:15.217000 CVE-2023-33558,0,0,b7fdfe8e2f5f7ef9885330921ddc07a85ad745f4e7ac06e0631fdd030c9d0f58,2024-11-21T08:05:42.920000 CVE-2023-33559,0,0,fc3f3f42dddfccb0ab6605167a971e0c19be007ce1b19ab51ab90f1e64cff7d5,2024-11-21T08:05:43.100000 CVE-2023-3356,0,0,66a366dc535482aaec27641501cc0fa439d1aa09385384444cc802e27b1b3376,2024-11-21T08:17:05.440000 @@ -226786,11 +226786,11 @@ CVE-2023-34359,0,0,7ecc56b0c12976fcb35ee302f0bcf60c8817191ebae574a86b814408229bd CVE-2023-3436,0,0,227d61f366fe1850fe1406700366dafd7937f8fe1e6fcfe508e304f713db46c8,2024-11-21T08:17:15.853000 CVE-2023-34360,0,0,e404dc026effd5b416e5c9290ae32165a3c0adced025385ca63db5abb01b8767,2024-11-21T08:07:05.733000 CVE-2023-34362,0,0,a7508810b93e0e0af92b2378cb2c368b96ac2c87cf8c4bf8102cb160ed445fb3,2024-12-20T17:49:01.637000 -CVE-2023-34363,0,0,dbe01f4420c184b613f6132366b66a6f4c936030470aba7a440f08c87e69fe93,2024-11-21T08:07:06.067000 -CVE-2023-34364,0,0,4267b31fff211a0295f4224cdf6955b09165b33da23b38c3e5e0770eab41e5ca,2024-11-21T08:07:06.197000 +CVE-2023-34363,0,1,f43545706719535cb06037891f36bfe02bd3f94629b1a49d10e73ce9896ec0fe,2025-01-06T18:15:15.647000 +CVE-2023-34364,0,1,f9886ee94bd15c7854952e53698360b85397c982e4343edd3663738b683a840e,2025-01-06T18:15:15.910000 CVE-2023-34365,0,0,03eacff15cc6c3f35f845ba674e0740023198e8082f506d31bf9c9c88694f107,2024-11-21T08:07:06.330000 CVE-2023-34366,0,0,d9fff146381b0bdec40490d73d2fc00248365508742b11a29bb956c0e9bf5a88,2024-11-21T08:07:06.433000 -CVE-2023-34367,0,0,2433360b5679424a827ff2bf20e438e9ed611c84667c418e8544bb1622d14e27,2024-11-21T08:07:06.567000 +CVE-2023-34367,0,1,b0508b6b627f62c28315aca22c7dc13defd35c6ad5b3dff98b7716d7001650e9,2025-01-06T18:15:16.153000 CVE-2023-34368,0,0,0993ae78bcc49438560ed6bf302e639c423563a86eeda05db5e904c53c44a8eb,2024-11-21T08:07:06.697000 CVE-2023-34369,0,0,031d298c252beead78584682979df54a054ec72ded6c5bd76829774d814ff9f0,2024-11-21T08:07:06.807000 CVE-2023-34370,0,0,5c467a4e6b072c2cc5ddbb371005e1741cbdd15da4d570d237c15027e4753d2b,2024-11-21T08:07:06.920000 @@ -227079,7 +227079,7 @@ CVE-2023-34936,0,0,fe251c9b067a7bbfa0d3199136225ddb7757f08f3db3cb7ca8f4bc42a8f1f CVE-2023-34937,0,0,f43fba2a9a16dad5dab7b093617aa204e161a6cf58450b23de0dc5da249053b5,2024-11-21T08:07:42.213000 CVE-2023-34939,0,0,1e57c94800f0065176baee4a65f1b30e0734716612acbda3d974ff9b692d2a6d,2024-11-21T08:07:42.353000 CVE-2023-3494,0,0,fc12b16e161e4658c9e72d2693842b8b08d06478c4e1c421fd9ec8a6fa29b7af,2024-11-21T08:17:23.457000 -CVE-2023-34940,0,1,bddae5e1ed6a7c23ec0925d1949056baa1ed9dd84506a2e6cd41325acdf45d7c,2025-01-06T16:15:26.930000 +CVE-2023-34940,0,0,bddae5e1ed6a7c23ec0925d1949056baa1ed9dd84506a2e6cd41325acdf45d7c,2025-01-06T16:15:26.930000 CVE-2023-34941,0,0,2d355976985d2550f593f3331400499398a893f5e618c378904a5d3552b754f1,2024-11-21T08:07:42.633000 CVE-2023-34942,0,0,ddb4a9fea7cf350e32a591804da2c1d926c7d1b2a92a42834ff98048bd792b1b,2024-11-21T08:07:42.860000 CVE-2023-34944,0,0,c9ca07a3eea6b3eb20c783833cd1b0663a3a1d8463ce4eec31ee01faf7e7509a,2024-11-21T08:07:43.010000 @@ -227147,10 +227147,10 @@ CVE-2023-35024,0,0,0f702480d0b975c5c905618af7a5a061b7a8b1adf7b409013dabe10091c1f CVE-2023-35029,0,0,b16f8db74f690428edb4b58b862ee4b5a0e432791a42b560c14f2c8ab003c75b,2024-11-21T08:07:50.590000 CVE-2023-3503,0,0,21b5e281acea05616fe6417725f5eb047fb2ffd0dfbcb50a0677899a7979b30f,2024-11-21T08:17:24.400000 CVE-2023-35030,0,0,3ebb3d890662e156866d4540397f535e4d4415d3268661b054111f734eadb19e,2024-11-21T08:07:50.727000 -CVE-2023-35031,0,0,65b9054e8d119edf6ecb090d4485b45a26e0752c7a443a97757d069d2d633261,2024-11-21T08:07:50.853000 +CVE-2023-35031,0,1,d0eb56de358f4653d6443f277e4aef88e06025a14ef25f4c9c57ce37b6964750,2025-01-06T18:15:16.410000 CVE-2023-35032,0,0,5daa9913c3eec51f113a41f6923f07bc01ee982d59b9c406ee34a56ecafa755e,2024-11-21T08:07:51.017000 CVE-2023-35033,0,0,7ff74b9d4eab9c6d71fe0788f644ff195caa9f2362a1dcbc34729deff27dbecf,2024-11-21T08:07:51.173000 -CVE-2023-35034,0,0,fa53980548ac3904321fbfcfb82c5ebaf5169185a3cb858da3dcbff74af0e23d,2024-11-21T08:07:51.330000 +CVE-2023-35034,0,1,d9123d0fc7bd081b1aa5dc17ddbd47bda07a14ade5307e23aac6a25c0fb27bd9,2025-01-06T18:15:16.923000 CVE-2023-35035,0,0,24f488f710736b292b67f7e0ccee8f6d6c7e5a3d2ae1a45c19429e3a08c6bd6b,2024-11-21T08:07:51.490000 CVE-2023-35036,0,0,8658a6fbc442990135a1aa1c98922d83375c7c2470ac781635a9d5c216201f12,2025-01-03T19:15:10.400000 CVE-2023-35037,0,0,02214d08e7c4c30c711ad4aeb21edefe0633af78df084263c4b7a1b3428d793e,2024-12-13T15:15:15.563000 @@ -229084,7 +229084,7 @@ CVE-2023-37707,0,0,b38a4aebf00d1526b029577ac4ca268e47391cce6346b800b18661bbe2abb CVE-2023-3771,0,0,6c27f18bd5fabd2fc7f0751c852f45aaba4cd2bea2af33ceb2616979ed83eb5a,2024-11-21T08:18:01.667000 CVE-2023-37710,0,0,f2bfe166f1cf7e267da16662b1b9b8717ed6d7529883b94c440af8d1134935f6,2024-11-21T08:12:09.210000 CVE-2023-37711,0,0,b93697d758497a919dc6ade60dbfa8121f5f121523db4a38746d00e12904a4f9,2024-11-21T08:12:09.377000 -CVE-2023-37712,0,0,71f15d3c78d840d5fa1c8c223f1b483ca9a70035a411fe3f7688cc5405c1a4a7,2024-11-21T08:12:09.553000 +CVE-2023-37712,0,1,8db675624cc3135e082efa132d03d7db0c97bfdcc5527d134fd2f1a7b900e6e8,2025-01-06T17:15:13.680000 CVE-2023-37714,0,0,4da5e44d431c668c055b1ea6c382f9c9dfef44ebcc87a016d38e06ca3fd1a732,2024-11-21T08:12:09.720000 CVE-2023-37715,0,0,b4584972a6649602db88f38345dc7013a3678013dc30c20a0181a8cce9728d0f,2024-11-21T08:12:09.903000 CVE-2023-37716,0,0,4ec3b13c20a47b155852f482a883bdfb51e80c2077a47ce6d80e4ccf18eea1ed,2024-11-21T08:12:10.067000 @@ -236864,7 +236864,7 @@ CVE-2023-48225,0,0,74bc820232800726f48b9d92d450ca01a20168fdc600673a0032d2d2cb504 CVE-2023-48226,0,0,51a51e16cef3187a2cecb4022bd2e76306d3c836aa6e1c8ed64fe93c769beb92,2024-11-21T08:31:15.013000 CVE-2023-48227,0,0,1a3f87242006615a54caa5206f7309046a4825af50401dae9ee939e76c1c0884,2024-11-21T08:31:15.163000 CVE-2023-48228,0,0,6b8456c1399ff52123d9ea23b41d8b18814e4f0cfa30acbe9af58e4f8e05ba89,2024-11-21T08:31:15.303000 -CVE-2023-48229,0,1,e141313128aa11b391daeb6c8654c665a84dd9b698b774134cb7e770cd4e1e33,2025-01-06T15:28:46.193000 +CVE-2023-48229,0,0,e141313128aa11b391daeb6c8654c665a84dd9b698b774134cb7e770cd4e1e33,2025-01-06T15:28:46.193000 CVE-2023-4823,0,0,16d521501c8e0a95401cc904b6e59bf3ab6751695a3719f0ae0c4ecbf5e70e89,2024-11-21T08:36:02.900000 CVE-2023-48230,0,0,afb8a95caf0fe21971a44e839a79c77f889babe995e175ceec1e2efce9d6958b,2024-11-21T08:31:15.573000 CVE-2023-48231,0,0,332504245c17697c1aafcf81a83a619d10decd060050cec79fb8297717ab5407,2024-11-21T08:31:15.713000 @@ -237936,7 +237936,7 @@ CVE-2023-49494,0,0,81ae2af9aba1f0599f724889e50222fc1614d4f34df24851ef830a84c7e56 CVE-2023-4950,0,0,a4648195833b242bd8dc90f4040087dba411d39a1856adc272c663858070dd30,2024-11-21T08:36:19.963000 CVE-2023-49501,0,0,d1d4cf2e652bd9d2b1793967db0891199408ff347661870dbf859b89bae84e59,2024-11-21T08:33:29.360000 CVE-2023-49502,0,0,d0187358d2290dbe6633ea162778b6f0ab90153cb026ab3d49a55b19dc1b8e21,2024-11-21T08:33:29.580000 -CVE-2023-49508,0,1,5e1f09ba47af59106aa6f1e084a2f2edc263166ec4dfac1e8fb03972951e20dd,2025-01-06T16:40:41.920000 +CVE-2023-49508,0,0,5e1f09ba47af59106aa6f1e084a2f2edc263166ec4dfac1e8fb03972951e20dd,2025-01-06T16:40:41.920000 CVE-2023-4951,0,0,1bbc4959ac980f797457caaf60413d1bbf7dabd5bc8076002f966e17295d986f,2024-11-21T08:36:20.073000 CVE-2023-49515,0,0,a4c0f2e305f9bd09bbc07b299160e9ee82b974a0de89b6dbf4caf99ad0f89a33,2024-11-21T08:33:29.953000 CVE-2023-49528,0,0,ae59a6a1bbac46ad56a1a54c31382ae08b7998b27d77cdcde165b61ff049b910,2024-11-21T08:33:30.187000 @@ -238844,7 +238844,7 @@ CVE-2023-50921,0,0,938369d9c8668a29bcca45e4c45256ef98a4698e826c58f3dc016d7e58bdd CVE-2023-50922,0,0,6bf236a9898ccf306bebe92404b72fd903bc082b793476e5e69a5665a62b5a9d,2024-11-21T08:37:32.207000 CVE-2023-50923,0,0,41746b2328d03f226300e1d453aa06f98f173172b6df557f7fc6b5b090ebfb79,2024-12-04T21:15:19.777000 CVE-2023-50924,0,0,ca556db944b3691a7d54a96ff4cb871f507ba9ba13687ba88c121111ca983c8d,2024-11-21T08:37:32.523000 -CVE-2023-50926,0,1,bd9e26d125e89ba14d77cc8e80fb87b46ea39ca58778d29d384b0f164c76a0f8,2025-01-06T15:30:54.840000 +CVE-2023-50926,0,0,bd9e26d125e89ba14d77cc8e80fb87b46ea39ca58778d29d384b0f164c76a0f8,2025-01-06T15:30:54.840000 CVE-2023-50927,0,0,6723c42d317259281fa9d9bcc29b5714a4fc6cf018e7c9c55bc9c44276496084,2024-11-21T08:37:32.790000 CVE-2023-50928,0,0,22cd2c91424b965e0c20afcef32d35cc4bfe393e5f2d12047954179597d626c6,2024-11-21T08:37:32.913000 CVE-2023-50930,0,0,6265c57a5fe972a8fcb40cfec78599317296a10256c2052480630685d43338f2,2024-11-21T08:37:33.060000 @@ -241651,8 +241651,11 @@ CVE-2023-6597,0,0,89b58fa3929cae1473acd78809c36d26c8296660b8913ae3a27336303cbd49 CVE-2023-6598,0,0,6053f14e270dc7076cdc46c9acbd31f7f0ee707160eb4a14b11a84dc8ad71002,2024-11-21T08:44:10.607000 CVE-2023-6599,0,0,b0308b9ca19634b3fb537e54bec970bdcf5229a8d791c9c7b7b83a8cf17b1088,2024-11-21T08:44:10.740000 CVE-2023-6600,0,0,2434010c942a6205776298fb5a7e14d80ba060213c80be479cc1c00dcc02dd91,2024-11-21T08:44:10.873000 +CVE-2023-6601,1,1,2385a6a1a5f4115fee8261484bb704ba54f004ffe4cf6a03881f5633f88181be,2025-01-06T17:15:14.217000 CVE-2023-6602,0,0,42413e4ead09c7346dad47aa2a6683f18d2f4e704ca6e4c2c669d39cf975e95e,2024-12-31T15:15:06.240000 CVE-2023-6603,0,0,49bfef2fb08c9826398a082612513a67e781b4e8132721561e138e97869f52c0,2024-12-31T15:15:07.490000 +CVE-2023-6604,1,1,a69e4fc52c54880018324432fbfe512de5918990e56a7046a8dcd800adc1277f,2025-01-06T17:15:14.413000 +CVE-2023-6605,1,1,a12211c2173970ec0845ce934b9bf354dd6c5aa8b123a3a779f0f416416568d9,2025-01-06T17:15:14.613000 CVE-2023-6606,0,0,8c51965fe5b8c0f5bc9f15f26c28d2f6ae9ab77217ae35702f9542ba8aa7d3dd,2024-11-21T08:44:11 CVE-2023-6607,0,0,b26de4c0815d9e5bfb034470256846caa6d64731defe9bbb333e33aa5af35930,2024-11-21T08:44:11.200000 CVE-2023-6608,0,0,e345741cecbf23cc4076c5f2284f1330a317f8731383fc6e8c7c4d9d02af8e3a,2024-11-21T08:44:11.360000 @@ -243957,7 +243960,7 @@ CVE-2024-10947,0,0,9ca33a842e00d3bfcba6a4108f29e96d0bb33f4c08646ed141de399ea04b7 CVE-2024-1095,0,0,b594dd5cefff941d80a5aca1439ec1658c5df6b960761544886b2b48f93c7e36,2024-11-21T08:49:47.093000 CVE-2024-10952,0,0,edff8b29d26accda4a8e33f169e18ac16231b4d8b9445539c32344bf5f44c6f1,2024-12-04T03:15:04.593000 CVE-2024-10953,0,0,94ed881c1741c9a6db86af195e84904697442fcf31d986afec17a96f3fc5a311,2024-11-12T13:56:54.483000 -CVE-2024-10957,0,0,234550d4342c83a2d2cf74003cdad0693cbb0e280d62294ab5ca067fea36b58e,2025-01-04T14:15:22.430000 +CVE-2024-10957,0,1,964548a9eedc46fb360cb39aa44c4f64670d84e4a05047fcfa8e2648b39d5482,2025-01-06T17:15:14.853000 CVE-2024-10958,0,0,ef36e0bbdfdc2ca66f68ef0f42219502fb71c2dbb5344b8f90bed966330b4e84,2024-11-14T14:57:23.103000 CVE-2024-10959,0,0,fa8e8dfd4e8771ae8c76641a0e2a5e25525492fab6efcc641940a89152f76196,2024-12-10T11:15:05.913000 CVE-2024-1096,0,0,361a397f658718594f88eb8768eb59d67142285dd6bbccd93ad2ca45f5461047,2024-11-21T08:49:47.217000 @@ -244130,7 +244133,7 @@ CVE-2024-11159,0,0,8afad29dc7b40793fcd69369c055be5c54db43acf2a2aa9e2c3ac35746277 CVE-2024-1116,0,0,7d8d96f7c323e069e605409b474b2bd18744f4c3487afdd2599b3edaac1467cd,2024-11-21T08:49:50.050000 CVE-2024-11160,0,0,c2a00c83ebfc94083c99410ffbf76862f5cddeb9d6f2530e0ed9a430c75b3087,2024-11-27T18:15:08.620000 CVE-2024-11165,0,0,e750ee00d78406bda0cb37b4e8b38fcef6ccccfb2c8db0152ac7acfbe3dd03cb,2024-11-21T17:15:10.473000 -CVE-2024-11168,0,0,df73a38cf98fe872a11a7ae5d2776746809ac77d7eb7c9299d0fbd3c2e9cf30e,2024-12-03T21:15:05.470000 +CVE-2024-11168,0,1,8169fd215bcbd6260178c6a13b38e8eb1d50895ab7f745f9981de2f6f5fa7e20,2025-01-06T18:15:17.900000 CVE-2024-1117,0,0,19261231554ceecd0ba30965370c2c4af2e300ee2811f4fe1892361a4588b729,2024-11-21T08:49:50.233000 CVE-2024-11175,0,0,8236837ce7f29fdf946d96e1c922fbdf823c1f335a15dfb3cce120bf0d1fb628,2024-11-15T22:50:48.817000 CVE-2024-11176,0,0,02621942bf5fae9821430c5bd44b0c1370460cb4258a8509f6fcf4259b8b73a1,2024-11-21T15:15:21.823000 @@ -244563,7 +244566,7 @@ CVE-2024-11687,0,0,5e77fbcd46b583a4f084d8bcc3492702fbc8999eee40cfff605d5263f17d5 CVE-2024-11688,0,0,8d8a43b07b745617ea451bc11d9802776a561f6818ffe3d6e83d98ef6a879a1d,2024-12-21T10:15:06.733000 CVE-2024-11689,0,0,083793777007e12786b393e59e70bbd36f5df589b4b26e2949eb5844a08ab45f,2024-12-12T04:15:06.657000 CVE-2024-1169,0,0,7d005e1e32dcb786dc145e0dc1f4f8a0f524691319a7051d5e1a67ddcb23a460,2024-11-21T08:49:57.153000 -CVE-2024-11691,0,0,a0fbb9938b3cdd6ffbf2c6fdace41fd43ef413930c7e002abc7f8ab4774ab9a8,2024-12-13T17:15:05.813000 +CVE-2024-11691,0,1,36fe8b3d1feccd057ef27ddd17979a52004da0a9606d16fdfdb44bd6d5656bc4,2025-01-06T18:15:18.373000 CVE-2024-11692,0,0,9269d1047de5ccf3bbe848f7300e55c4147a58cfd139cb6b7f723bc7b81e3d4c,2024-11-27T16:15:12.530000 CVE-2024-11693,0,0,e0fdce984dc3054eba0934c78141d5d7d4f14af64b3544f5156b2322b39ad19d,2024-11-27T16:15:12.753000 CVE-2024-11694,0,0,356c3325ca9c4e874474b3cd33360d575197817877416f4f7f19070e37ade8d9,2024-12-13T17:15:05.960000 @@ -244872,10 +244875,10 @@ CVE-2024-1210,0,0,f5a9389cac94cbfcfa3f0d961d1ea27115bf7afa331ce2988db15dbaf2efdf CVE-2024-12100,0,0,5d9bee140d619efc5bcb5724e98abb1747cc29824dfdae10a66de74940256d24,2024-12-24T06:15:32.830000 CVE-2024-12101,0,0,cf6330eb409e982923b4b0b78cc8d64ad396889b9513f5530cedf911c9fe2802,2024-12-03T16:15:20.910000 CVE-2024-12103,0,0,2ab2e8f87386f7081d0b465f2935a38be96d397e85c0b3ea2192a2941673c10d,2024-12-24T10:15:05.820000 -CVE-2024-12105,0,1,c925334baf11832542245fbafbe0a3f79d398adadf856f9a557e34ba54e9f5af,2025-01-06T16:55:09.683000 -CVE-2024-12106,0,1,9e76ee608aca4c651df51a3d1911c7cd5490856624d29775a06f401fa9fe71c0,2025-01-06T16:54:14.560000 +CVE-2024-12105,0,0,c925334baf11832542245fbafbe0a3f79d398adadf856f9a557e34ba54e9f5af,2025-01-06T16:55:09.683000 +CVE-2024-12106,0,0,9e76ee608aca4c651df51a3d1911c7cd5490856624d29775a06f401fa9fe71c0,2025-01-06T16:54:14.560000 CVE-2024-12107,0,0,7da8659dc821ee4f071df4b42d3ae5a3881cc2b8cc55779739dc797df4a302eb,2024-12-04T11:15:05 -CVE-2024-12108,0,1,a851d0a44f06acd627e09429b72e15713bd7cb0608174f612b61d76d8c8e9845,2025-01-06T16:51:11.320000 +CVE-2024-12108,0,0,a851d0a44f06acd627e09429b72e15713bd7cb0608174f612b61d76d8c8e9845,2025-01-06T16:51:11.320000 CVE-2024-12110,0,0,f266935beaa447960f1dea8d3421db64eefadfd0613c53fd8d2543de02327a47,2024-12-06T09:15:08.270000 CVE-2024-12111,0,0,94cbde89c1eb7b342ad5b2e1b90e676e3d9dc7b09262fa3ba8de5cb41e47a11b,2024-12-19T20:15:06.950000 CVE-2024-12115,0,0,e6944683813361fa4999b92dbfb5849d2d0c20bc3f6186b671317bdf2839435d,2024-12-07T02:15:18.653000 @@ -244958,7 +244961,7 @@ CVE-2024-12247,0,0,ad117a7da5529073984608210b9ebf0c8357341e47d0f7a47c01f4275cf4a CVE-2024-1225,0,0,1335eabc5dc5752fbd7f31a11bdeda2f1be9be2c21abaca809140eabb8940f2a,2024-11-21T08:50:05.673000 CVE-2024-12250,0,0,e5f748db33ee246e1110b31eaf24b071ff8e9ad960657a91bc37454c3187e14e,2024-12-18T04:15:07.657000 CVE-2024-12253,0,0,ddc85ae180bc30a65db67a43f7fe8d6c4299882333782166c00f6946fb3a98d4,2024-12-07T10:15:06.030000 -CVE-2024-12254,0,0,a10252fca25a6d0cb79d12c00246cbbc9e593a3c9c199cebcc7f84ee54eefcf8,2024-12-06T19:15:10.983000 +CVE-2024-12254,0,1,6372ca23e9b475efcbc80401e5929ada552ac002068d1a3c23d690a8cfd8b99c,2025-01-06T18:15:18.713000 CVE-2024-12255,0,0,3e6ee7ef8ecf957b3c9750bb4e9452362942858fad7f6d35e3c4d339eaa5898b,2024-12-12T15:15:09.967000 CVE-2024-12257,0,0,51052901a7cca4cc3e08f8db1db23715b8800d7e5a86753505efbff635c332e0,2024-12-07T02:15:19.187000 CVE-2024-12258,0,0,3eb19625a1330fc72081e9c0b05d899d6c52aedf5334c3f98a645064595ca085,2024-12-12T04:15:07.160000 @@ -245190,9 +245193,9 @@ CVE-2024-12686,0,0,97a8ebdac182b849799b086a05a52b29fdf4a643f18b8c80f4ed8210bf61f CVE-2024-12687,0,0,db582e783ba07ea03e34c560f3ce0d9a75e73c080a0914e89215bff58a3d20a7,2024-12-16T20:15:09.777000 CVE-2024-1269,0,0,afe5fa6f2789b35a14da593df22cde42ff88e5a3e5db5d1bb0de9d1e5a1f477a,2024-11-21T08:50:12.253000 CVE-2024-12692,0,0,1d91106e54d6f85d8fe7f405f127892c0e24f0eae3c87f0ec8b1a814419d86e2,2024-12-18T22:15:05.730000 -CVE-2024-12693,0,1,c4f94ffd5f7d3b684a1f1d67fedf841d735528fd88fd85faafce8d3cf44b4de0,2025-01-06T15:15:10.593000 +CVE-2024-12693,0,0,c4f94ffd5f7d3b684a1f1d67fedf841d735528fd88fd85faafce8d3cf44b4de0,2025-01-06T15:15:10.593000 CVE-2024-12694,0,0,9800fbc5ca389434bdda7fa0de83799fcd1088c52cf84f2bdcf95dc149b6c72f,2025-01-03T14:15:23.560000 -CVE-2024-12695,0,1,c12cc3a1c005ac4ce33f9efb358fc8de53ca6da21a9008edd22e7d591fcee580,2025-01-06T15:15:10.753000 +CVE-2024-12695,0,0,c12cc3a1c005ac4ce33f9efb358fc8de53ca6da21a9008edd22e7d591fcee580,2025-01-06T15:15:10.753000 CVE-2024-12697,0,0,2459466c74ec5bec9acd976593eaf1864bd447490d29e2029863b77f5d045147,2024-12-21T07:15:09.587000 CVE-2024-12698,0,0,3d9cdcbe538ab50d5f6959e4225d81bf3f0e9f88aa4025e53f307853d2e0961c,2024-12-18T05:15:07.840000 CVE-2024-12700,0,0,c161ba4e53ce97164ad141dae69781306c514830255596765fa43a667338faaa,2024-12-19T23:15:05.860000 @@ -245229,9 +245232,9 @@ CVE-2024-12788,0,0,2281c2f39612902419ec1c3f95a4173a094e065336b0aefb81f4e3ea2b7ae CVE-2024-12789,0,0,831674f9b9c45c12ef0c1443e3e87c1fab4f10c194bc0e0f9ed646f0724762bc,2024-12-19T17:15:08.463000 CVE-2024-1279,0,0,748039c92f5ca569335554a7f38080e94b49a821a92d564d52fc8ec18dfbf14a,2024-11-21T08:50:13.410000 CVE-2024-12790,0,0,3ab6d6fd8704afa118edf15528f1756bc2e775d9f0c2c7d3659c9da7eb84d83e,2024-12-19T17:15:08.650000 -CVE-2024-12791,0,1,ca87ba886f5289e1e8c19015d3d8fc3c978db86f9d300a7f44c7143ee4b7ae26,2025-01-06T16:42:09.837000 -CVE-2024-12792,0,1,2f49d07cb189e8abf573658d63830eb2a6eac4f064c5f29dff915dff35ec0407,2025-01-06T15:28:27.857000 -CVE-2024-12793,0,1,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72540,2025-01-06T15:16:15.037000 +CVE-2024-12791,0,0,ca87ba886f5289e1e8c19015d3d8fc3c978db86f9d300a7f44c7143ee4b7ae26,2025-01-06T16:42:09.837000 +CVE-2024-12792,0,0,2f49d07cb189e8abf573658d63830eb2a6eac4f064c5f29dff915dff35ec0407,2025-01-06T15:28:27.857000 +CVE-2024-12793,0,0,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72540,2025-01-06T15:16:15.037000 CVE-2024-12794,0,0,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000 CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000 CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000 @@ -245358,8 +245361,8 @@ CVE-2024-12991,0,0,5ab1c4da0fe0e15ce35fbf649aaf07ea331ac19ccb9b8ae83308babd1d56c CVE-2024-12993,0,0,f8f3aec3906fd8190d6cc67282f73e546ab798e6463503049b1c7d14dec20553,2024-12-30T11:15:06.100000 CVE-2024-12994,0,0,40469c38a7cdf7d82b74f66d144e914af1491a6c05743fb438f587d34e35e167,2024-12-28T13:15:18.173000 CVE-2024-12995,0,0,9ea8b00be6b1a06f80038a74c3fc23fd754052a424e8fde2c1d49df19bd173eb,2024-12-28T14:15:22.507000 -CVE-2024-12996,1,1,6c43766b1ce2636ec36981eeeba47786371be2965a0df2a813c99d297c767f66,2025-01-06T15:15:10.933000 -CVE-2024-12997,1,1,71092d52f774b0f71c49030eb5b4ba5f2fdddc53fb6fa15623fde6c383daa7f1,2025-01-06T15:15:11.027000 +CVE-2024-12996,0,0,6c43766b1ce2636ec36981eeeba47786371be2965a0df2a813c99d297c767f66,2025-01-06T15:15:10.933000 +CVE-2024-12997,0,0,71092d52f774b0f71c49030eb5b4ba5f2fdddc53fb6fa15623fde6c383daa7f1,2025-01-06T15:15:11.027000 CVE-2024-12998,0,0,c9fe1a60911ac232c6425db703cddb229a2737ea06d6e3df0ccb294e755404bd,2024-12-28T22:15:16.893000 CVE-2024-12999,0,0,c7d0072c2247c00d45b9779689d25c55a975e599b44d5e4f3bce5db98348462d,2024-12-29T02:15:17.057000 CVE-2024-1300,0,0,1449d51d635587092ee7e467b53bae80464f92cc07a6bda2595172832d29c1e4,2024-11-25T03:15:10.053000 @@ -245392,13 +245395,13 @@ CVE-2024-13028,0,0,fa93211a2bdb9a3d16a1438985d05a65ae11871db310d3e60efe2083e10fb CVE-2024-13029,0,0,3645cd09171242525298fe881249dfcae0b5fc3148bc05a911d0c24263b4be86,2024-12-30T00:15:04.837000 CVE-2024-1303,0,0,922ad92b627c1129d744b1f80cb5c88d28598a22649a8dddf52c9956281bb86f,2024-11-21T08:50:16.593000 CVE-2024-13030,0,0,a1002a1e17ed30278fc45a339b4113eb50bbae9a96b4107d150e4d657636aee7,2024-12-30T01:15:06.060000 -CVE-2024-13031,0,0,2fb005908f3f99c6d1dd1fb2243da46f0d838f079e5c4ab33de97b0cc9ec5a0d,2024-12-30T01:15:06.827000 -CVE-2024-13032,0,0,4226866f8dc9efef358824d0994ae4fb32f4603b2eb5b04ad258bbfbc3516d02,2024-12-30T02:15:06.260000 -CVE-2024-13033,0,0,da77f57922770169586d982b014c69109897dbfda6d15e615efad6edf7174036,2024-12-30T02:15:07.270000 -CVE-2024-13034,0,0,98be9accf0276da2c3178dbac3abb228c045af08c18f9da34bbbe32c921fab4c,2024-12-30T02:15:07.433000 -CVE-2024-13035,0,0,0b0b589abd242b2fddbc6c3678979ab9b9a156074f5eec2074a8c03eaa6a65da,2024-12-30T03:15:06.413000 -CVE-2024-13036,0,0,2e8577a2937bca5f0f39849d93ddce05dd150b9fe1c6e201f545f2d0461c63c9,2024-12-30T03:15:06.580000 -CVE-2024-13037,0,0,440fa4033b764774916f3ba72e1081e14283675ea49ed23de38fededb8b6300a,2024-12-30T04:15:05.200000 +CVE-2024-13031,0,1,696e044565c90cc7a58bde484498f7f54bcd0eb90d765ff6574928746745ba22,2025-01-06T18:56:33.010000 +CVE-2024-13032,0,1,91ea1bb07faeacfd0a63f96214c9acb289a73bdaed3547a69a68343cc115f4c2,2025-01-06T18:47:07.217000 +CVE-2024-13033,0,1,7cba2d39d2599400f656377d62e47ac9d7f53bf95540216524dd0387f53792e9,2025-01-06T18:26:59.997000 +CVE-2024-13034,0,1,1f8c123e3a869e41e0970f62d14241b028acd8b90e1b043e1e382c92335d245f,2025-01-06T18:11:07.307000 +CVE-2024-13035,0,1,d96c46ac86dd7e7ad970c419d877a80ec9be279447d882ea550abdb91337ce50,2025-01-06T17:59:47.040000 +CVE-2024-13036,0,1,3e4e42f0c9f994403ad55bd1ab42b7ab4b8cd1594e66b7747c2edec2466b9840,2025-01-06T17:26:00.327000 +CVE-2024-13037,0,1,e1dcac61d9ad9c50db3df58d6f4d3361f0c012be20fa697d9d83904aecb5aefc,2025-01-06T17:00:22.063000 CVE-2024-13038,0,0,07021c3f3e4e5ad8d59084daa2472f76a36a62f583200e4e988b2985299acbc1,2024-12-30T17:15:08.473000 CVE-2024-13039,0,0,2ff048e2898a94c89e2fe46d15a6b69b7d24fd911b280e248c70b61bbb5acce0,2024-12-30T17:15:08.597000 CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000 @@ -245422,7 +245425,7 @@ CVE-2024-13067,0,0,e69189bee5d0a11c81cab03a930cdfe0d459ce5c2a6c85a3bede740d1cceb CVE-2024-13069,0,0,f58ddca809cd35e7f1c0a7c3657ea5bb3a8b81c189f375a7a849a794e92f1650,2024-12-31T16:15:25.580000 CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc715,2024-11-21T08:50:17.233000 CVE-2024-13070,0,0,2bcea116957c968caaf0f2b2dd670ac9a0f612c50f9d2c5bf3eb2ee627a8ffe6,2024-12-31T15:15:07.853000 -CVE-2024-13072,0,1,8a5332c9e37c8ac688b46b2ac18d6747c9c9f75f917ef94831d54e03ea21064c,2025-01-06T15:19:09.547000 +CVE-2024-13072,0,0,8a5332c9e37c8ac688b46b2ac18d6747c9c9f75f917ef94831d54e03ea21064c,2025-01-06T15:19:09.547000 CVE-2024-13074,0,0,82c625761bcc4faebb78f7834747785ec87ab3107c377244ca37e3cdc15a076b,2024-12-31T18:15:25.917000 CVE-2024-13075,0,0,2cb13cdf67fdca2c3fead054a5dd1db8b5aa80d267d1df554624c5bb7ed51b62,2025-01-06T14:57:56.690000 CVE-2024-13076,0,0,112637eaa000ca8ff065f2327ed83998dc721c9a700d6a6ae4ef32916cb3aa62,2025-01-06T14:51:54.247000 @@ -246226,7 +246229,7 @@ CVE-2024-20101,0,0,1b0fb6e30099544a0610e30130e11f942644076950411627a0f652b03e31c CVE-2024-20102,0,0,b14add8569cfdfeb4728ddac4e0e984ab758a4a9669d75ca24872fa709a753de,2024-10-10T18:20:31.820000 CVE-2024-20103,0,0,b3d4791efc226cea589196d5aa87bb175b0cd70d652f826dda4aaaf08c792fe4,2024-10-07T19:36:43.530000 CVE-2024-20104,0,0,279f9fe03a80621edf85d2b9a94aa3e729ef63f418ac218ae57c55ba1b018348,2024-11-04T18:50:05.607000 -CVE-2024-20105,0,1,bb3eb3f6be8275273e0e48baa75106a44702a241c1e10193c8e41b24e73a632c,2025-01-06T15:15:11.433000 +CVE-2024-20105,0,0,bb3eb3f6be8275273e0e48baa75106a44702a241c1e10193c8e41b24e73a632c,2025-01-06T15:15:11.433000 CVE-2024-20106,0,0,9ed0edd0d93f818e255d40207e291113a66f7f07a64b246dc551c45e71818d67,2024-11-04T18:50:05.607000 CVE-2024-20107,0,0,d68c82e7ac5cc57e7b2ad3153d74aa648615bf6a91a48360aabd997b2db586b8,2024-11-04T18:50:05.607000 CVE-2024-20108,0,0,1396ac71b05c962e52132dffa47ef1234f2c2dca3e32a1fef4c04be9e6eb1fb6,2024-11-04T18:50:05.607000 @@ -246264,19 +246267,19 @@ CVE-2024-20137,0,0,53377c7194035f3c7335cd23304ae7e34fb32383669eff1b9c9a22598ab07 CVE-2024-20138,0,0,1264e7fcc71f95b0ae39f37ee36146e7c465bf599e4b07c736bd426b81382a8a,2024-12-02T16:15:08.603000 CVE-2024-20139,0,0,434bf1878b4edcc6ee42c87512888b556d261e46d1cb8ef2e233401120fa701b,2024-12-02T16:15:08.770000 CVE-2024-2014,0,0,9c6b7427d7e4ecbb91bf5ac0c5393a05c9efb2a90a5cef1334b8ef37b43c6713,2024-11-21T09:08:48.813000 -CVE-2024-20140,0,1,b7e714113a77e7268367ee0bacacf836859526222ccf9d56e62f2de38eb7010e,2025-01-06T15:15:11.600000 -CVE-2024-20143,0,1,5491159151fc435252113ef74205dd6a1df8014ef3a8f9c2513235ad58c7fb4a,2025-01-06T15:15:11.753000 -CVE-2024-20144,0,1,09252cf883019e73487a0bbd0007148580d5c9efbc4e46daab58c1320ce6b9e3,2025-01-06T15:15:11.917000 -CVE-2024-20145,0,1,292ed72aab68212a7490eb2e78eda2b2452fb3493049403b3190805671e7bb9f,2025-01-06T15:15:12.077000 -CVE-2024-20146,0,1,5e8ad810c0d25e0e1553aed5ccb532aee860831855fd14c1e591cb9ca9d4b7e5,2025-01-06T15:15:12.223000 -CVE-2024-20148,0,1,ae19424b74cec88ba764144dd07ed8232d55f8475522e350fa8ab3349becfaa1,2025-01-06T15:15:12.387000 -CVE-2024-20149,0,1,db5ca4cf6fb6d87c9cef13ef72bcfae3f6287ad2ae95c9ea79d2fe4d24e8b9ac,2025-01-06T15:15:12.523000 +CVE-2024-20140,0,0,b7e714113a77e7268367ee0bacacf836859526222ccf9d56e62f2de38eb7010e,2025-01-06T15:15:11.600000 +CVE-2024-20143,0,0,5491159151fc435252113ef74205dd6a1df8014ef3a8f9c2513235ad58c7fb4a,2025-01-06T15:15:11.753000 +CVE-2024-20144,0,0,09252cf883019e73487a0bbd0007148580d5c9efbc4e46daab58c1320ce6b9e3,2025-01-06T15:15:11.917000 +CVE-2024-20145,0,0,292ed72aab68212a7490eb2e78eda2b2452fb3493049403b3190805671e7bb9f,2025-01-06T15:15:12.077000 +CVE-2024-20146,0,0,5e8ad810c0d25e0e1553aed5ccb532aee860831855fd14c1e591cb9ca9d4b7e5,2025-01-06T15:15:12.223000 +CVE-2024-20148,0,0,ae19424b74cec88ba764144dd07ed8232d55f8475522e350fa8ab3349becfaa1,2025-01-06T15:15:12.387000 +CVE-2024-20149,0,0,db5ca4cf6fb6d87c9cef13ef72bcfae3f6287ad2ae95c9ea79d2fe4d24e8b9ac,2025-01-06T15:15:12.523000 CVE-2024-2015,0,0,4b2b7166fa9575a7c1050901ca90dd43f109899611c303f2828bf2e2cf52681a,2024-11-21T09:08:48.950000 -CVE-2024-20150,0,1,6f211a955950f4d512ae9ba12eda36305799dde6b9e5333ae1bd37c3b96f0e8e,2025-01-06T15:15:12.707000 -CVE-2024-20151,0,1,538607f46c34ba909762bfb143279ecd62cebcb88388b3e08583b77f9b7b7151,2025-01-06T15:15:12.857000 -CVE-2024-20152,0,1,2677bb7d5fc39cd40a7d294dd1a01974333cfcfdb279fc058fd786559aec7a60,2025-01-06T15:15:13.023000 -CVE-2024-20153,0,1,ff78d00e9b1c56457b86168ff741571f2a113fb5be8b1dca66a0018df69331ad,2025-01-06T15:15:13.173000 -CVE-2024-20154,0,1,bc131748ed6c780a99eef0854972fdaeede2cb00dc4e511cd6ceb166235c4703,2025-01-06T15:15:13.343000 +CVE-2024-20150,0,0,6f211a955950f4d512ae9ba12eda36305799dde6b9e5333ae1bd37c3b96f0e8e,2025-01-06T15:15:12.707000 +CVE-2024-20151,0,0,538607f46c34ba909762bfb143279ecd62cebcb88388b3e08583b77f9b7b7151,2025-01-06T15:15:12.857000 +CVE-2024-20152,0,0,2677bb7d5fc39cd40a7d294dd1a01974333cfcfdb279fc058fd786559aec7a60,2025-01-06T15:15:13.023000 +CVE-2024-20153,0,0,ff78d00e9b1c56457b86168ff741571f2a113fb5be8b1dca66a0018df69331ad,2025-01-06T15:15:13.173000 +CVE-2024-20154,0,0,bc131748ed6c780a99eef0854972fdaeede2cb00dc4e511cd6ceb166235c4703,2025-01-06T15:15:13.343000 CVE-2024-2016,0,0,0a76e7b2522ebfe55ed8955c44da83c1e8d58430e6a8d9e2f2e7fd6c0d9d0b3c,2024-11-21T09:08:49.083000 CVE-2024-2017,0,0,236856e0dda8caa97c3fd2d0292540757fbfb28961569fc651286f391f5350fe,2024-11-21T09:08:49.250000 CVE-2024-2018,0,0,6e829569b26c1c6d9562c5c1edf6c63df592bace683bac56acb5cd3f3ac34712,2024-11-21T09:08:49.413000 @@ -251485,7 +251488,7 @@ CVE-2024-26925,0,0,20888a15d1cf5a1e8e5e70a7116e306e3a92356ef2a117e4a8c708c88ea64 CVE-2024-26926,0,0,1b156d894496658533a56f98b1f816c7f7a219acb93a64935886f571f23e2261,2024-11-21T09:03:24.013000 CVE-2024-26927,0,0,0fecf20cf7794b1af701d3a69af1d6c8a2e09c8b8b3ce436eaea422a6f78c033,2024-11-21T09:03:24.137000 CVE-2024-26928,0,0,3f8460d638aa47336ce7a04cba35fa7b15d32984659cf179a5ab61886c52bbb3,2024-11-21T09:03:24.350000 -CVE-2024-26929,0,0,166e0c04f21715fbc3c686c060748a2cb6acedd2fb35ff9a29c430e9524cd8ab,2024-11-21T09:03:24.463000 +CVE-2024-26929,0,1,022a77a2924a8c7f211d44200437bd4faa4bef4be671f225beb2a6c72269b938,2025-01-06T17:15:15.537000 CVE-2024-2693,0,0,452ca8cd515c59ca1cd15ca2894e9f69af6463e79c7e90d82b67b288f52c52bd,2024-11-21T09:10:18.520000 CVE-2024-26930,0,0,09db815ac2b49390346c0187e051f7a56a9f41aacd4cd6e8d98f1c9ac24f90d0,2024-11-21T09:03:24.700000 CVE-2024-26931,0,0,cb6bd30f53eab5322a5f388de31ca4171aa6e35a7d6be335167ff32e6949e27d,2024-11-21T09:03:24.837000 @@ -253109,7 +253112,7 @@ CVE-2024-29045,0,0,87cfdb85d991420c95e0a71c586b26514c0458fbb4d9ebddc27af9f713e0a CVE-2024-29046,0,0,71d241a85fd57180900865ee8a8f40f72dc4ee91e6aaea9c00b84fbf61fc8f0e,2024-11-21T09:07:26.683000 CVE-2024-29047,0,0,86afded8bb1ddda483f5e66a1217e3fb804588ff5eacb7b56a148b42892123e5,2024-11-21T09:07:26.793000 CVE-2024-29048,0,0,bcd996b30c051d1b44387ac2961bd1e653077a1995d072b0c0d4b1f423767c9f,2024-11-21T09:07:26.907000 -CVE-2024-29049,0,0,04fd79566d6c6aff8207dd99f5719a9a9a6b53a7e52d37d888ae5eb77ba8eb34,2024-11-21T09:07:27.020000 +CVE-2024-29049,0,1,b4de33718e2a66f5e65d4713457675b539c089be4fac657ccc0a19e7d6ed6465,2025-01-06T18:37:14.790000 CVE-2024-2905,0,0,475c26f278f0caf02a3d877ee86a9d24c3c71da9cf1b51cbc9b4dbccdbf9aab6,2024-11-21T09:10:48.187000 CVE-2024-29050,0,0,44f58c2f1cf521bf680200ab8a0b4bb5be8ceae4f46643b1fbd737900e35d15c,2024-11-21T09:07:27.143000 CVE-2024-29052,0,0,e2a6654a30b44b3e0686810533cb0247e9e21bb6a5368478f09f6ab182ad942c,2024-11-21T09:07:27.290000 @@ -253714,7 +253717,7 @@ CVE-2024-29976,0,0,a8a38d5ec72815180a8740de1a2755ff3b4448f57255fa710ba609f4dd4be CVE-2024-29977,0,0,bc0b0c3f00512826d3afc15c878e90557d1e530cdf0900ad20154e5fd854b006,2024-08-23T14:52:19.923000 CVE-2024-29978,0,0,eae448edc2ea3a52a4ea4b11b5efbbaddb66df9b1fe4c50de1f98d83d8337b9f,2024-11-26T08:15:05.353000 CVE-2024-2998,0,0,4dea38390aec1eb05ba53ab716c17a921873391ec79bf9978195fbb79ed9eddd,2024-11-21T09:11:01.313000 -CVE-2024-29981,0,0,c80bdacc9fa2b190a407888024994b97f6c589c86a87b561fe19c741a5ea1728,2024-11-21T09:08:44.330000 +CVE-2024-29981,0,1,0d96708c10f774658d035c3c0f7071119e5248a30ce12e4c6ac613898514042d,2025-01-06T18:38:04.080000 CVE-2024-29982,0,0,0d8f7adaa68518b965d2cd0c582ddd3eb3de6c51f9744c477c784ad55deb2250,2024-11-21T09:08:44.460000 CVE-2024-29983,0,0,eedc8edd2eef333f5f5ae7b2f9e6edf10f5f2c89211607cad138d71df72a14c7,2024-11-21T09:08:44.593000 CVE-2024-29984,0,0,f8fb919a83fa3c44cbab4d023096f64990d1d2fa8128e3c1036db0426984e48f,2024-11-21T09:08:44.727000 @@ -255204,8 +255207,8 @@ CVE-2024-31907,0,0,766c5037edcc6c2c834f4d55bbd6954e77b70d6bdf71d2c01d166b4beda2c CVE-2024-31908,0,0,b99423df6404f34750bc64b8c4574b7d4db6c4a5987445ad5dba0b24ab9eb708,2024-11-21T09:14:06.937000 CVE-2024-3191,0,0,26fefd7ee9b00b194a72c3556380217e011fbb35712e009d8c207a4a175b109d,2024-11-21T09:29:06.920000 CVE-2024-31912,0,0,e94e3df1ade121bddb59b6e335d1c107f2b94a6c777e07a2785aa6e9b40b0354,2024-11-21T09:14:07.060000 -CVE-2024-31913,1,1,0c60ce902f9bc425cc4ff385203bdf252b467675164b8e2fd4f6e5f8d5356ab0,2025-01-06T16:15:28.163000 -CVE-2024-31914,1,1,4c311bb069eb7bc30ab97db520878ba2e0444f9430ea0065022716aba4fb6e05,2025-01-06T16:15:28.320000 +CVE-2024-31913,0,0,0c60ce902f9bc425cc4ff385203bdf252b467675164b8e2fd4f6e5f8d5356ab0,2025-01-06T16:15:28.163000 +CVE-2024-31914,0,1,70e99edb39aeea0caee114a13940c24d81a0a9c0aaf5fd6eb2a830c021010164,2025-01-06T17:15:36.653000 CVE-2024-31916,0,0,6fc3d0c53ff2a376147d1c083325963708c8d7a8627c56aff3166ae76e3bdfce,2024-11-21T09:14:07.203000 CVE-2024-31919,0,0,04cd44631dd35d8a93968eae8f42bcf1ee19cf844b815e3cd3b25950416741a4,2024-11-21T09:14:07.353000 CVE-2024-3192,0,0,3e0dbc4df2d1dbda6e08dc3e198a80d103ada553c6f6862741827e4baf1467f2,2024-11-21T09:29:07.070000 @@ -256204,7 +256207,7 @@ CVE-2024-33109,0,0,9d310e44a0938cb912ac0cdae9f92408fe4443679d6f4d813b944e47d0499 CVE-2024-3311,0,0,0cc6270b4f73bad689e9891a3010e0e7852f6ddbd6eb5f8215a1f2c452ee3fd0,2024-11-21T09:29:22.130000 CVE-2024-33110,0,0,91c17feea0b419df1889446da137532b61005e84ac93a83ccedda0afa0de832e,2024-11-21T09:16:31.670000 CVE-2024-33111,0,0,5a5fbb6688a8e53eb9c9be7f218f1c1ac4df951071c9799ec39c7b33d938d8c5,2024-11-21T09:16:31.910000 -CVE-2024-33112,0,1,e076d0e5e8f72d13a2ccb800f3a3dba68805667556d37629dbb313c4b22a8bdb,2025-01-06T15:15:13.940000 +CVE-2024-33112,0,0,e076d0e5e8f72d13a2ccb800f3a3dba68805667556d37629dbb313c4b22a8bdb,2025-01-06T15:15:13.940000 CVE-2024-33113,0,0,a2af3da0d2a1c1c9a30bda71eae95c4c88b98a90214b7932af280cb3f23d7545,2024-11-21T09:16:32.287000 CVE-2024-33117,0,0,fa5a8875d38650ef6b59de02925d02e55a750e8834071e6e262197cc6d34464f,2024-12-06T21:15:07.340000 CVE-2024-33118,0,0,01cf7fb9b011c86aa5f92aee373c394da860653f62b9c7477080c66ec60949f5,2024-11-21T09:16:32.650000 @@ -265608,6 +265611,7 @@ CVE-2024-46054,0,0,ea04f3f8e16edda442709a7e528b23bf1b32148ce756ebc6055b7f37df234 CVE-2024-46055,0,0,2ecbec976f7a11e048b71b99bcd1a2b2515c490fb210532b75713cca9d5d2cde,2024-11-27T18:15:13.300000 CVE-2024-4606,0,0,efb59025d4d9edff921c42e826e018a201d0090d0d6626c386da644be50bec17,2024-11-21T09:43:12.187000 CVE-2024-4607,0,0,3fbc86af3054a713c72304e558427371fb55d0a3c5b757e7fbd2ba69e3403989,2024-09-10T15:03:24.710000 +CVE-2024-46073,1,1,0c3c34fefa691adf16be8c1c24059d5b7359b61870dc435e6ff03dc7e7132f51,2025-01-06T18:15:19.493000 CVE-2024-46076,0,0,533f845bcff4e34eaa5948ad05e882b3c3e66cc8bf88fa3e81a53d103476adf5,2024-10-10T12:57:21.987000 CVE-2024-46077,0,0,a5bc7bbcd6483a38f972ed0ac7afc6e2a47e42057f395fc853fcf78a91666377,2024-10-07T19:37:26.967000 CVE-2024-46078,0,0,325885497969c4ab975e485e79dd673f326fd36b09e5b7ca8211f68ed9bb4152,2024-10-07T19:37:27.763000 @@ -265811,6 +265815,7 @@ CVE-2024-46610,0,0,d9dd8e07efaf4137061a4cc329bf5a1f8a1df9d6dda6d0ee310e2fb6b1592 CVE-2024-46612,0,0,e8870a8bb445c23c7ae5bf4aade92a65f12442d4b320c6776d50cdc0fbee7ff9,2024-09-26T13:32:02.803000 CVE-2024-46613,0,0,8c2d66370d93094092ee82785e548b32b2278867ca9c8a29f2da471a13fd64e6,2024-11-19T21:35:06.937000 CVE-2024-4662,0,0,a5946fd4e271464e0c94e8fadff0689ed378ccaf6470b84420e776c96e0baead,2024-11-21T09:43:19.670000 +CVE-2024-46622,1,1,cd1c63befc786ebbb2fdea912e2275d104dbb6edea2596a78b48af36e6bd26d9,2025-01-06T18:15:19.660000 CVE-2024-46624,0,0,1d781dac5c3c03f9553a33e0c8f61a0000ac641e3c43c8e2d01875530634c569,2024-12-04T15:15:11.727000 CVE-2024-46625,0,0,a71dae4f94fa8c690b0d8806dc95d669dc35df1e9bd6eee6ac14f04f1fa13c47,2024-12-11T15:15:10.417000 CVE-2024-46626,0,0,5f2da2d194da31d583545399c8aa7d58649fa22471fe456c45183b18d5dd3c81,2024-10-04T13:50:43.727000 @@ -266526,6 +266531,7 @@ CVE-2024-47462,0,0,733badf1a086ff6535251759c6386ebde7b21a1293700259b2c8966da7dc2 CVE-2024-47463,0,0,0dac3d7125bccc1a673d468378cc81c511268e1f45f55b3574b748f788c1fae0,2024-11-06T18:17:17.287000 CVE-2024-47464,0,0,547614204d1f6cfc29d3faea8ceb0db89983ab29949fcfd3f158bcfa0ee8d9ec,2024-11-06T18:17:17.287000 CVE-2024-4747,0,0,dc86c3306ee43b541fd6b01412a7d057d47b79f0d0be13cb5d0ca8e311f58a48,2024-11-21T09:43:30.670000 +CVE-2024-47475,1,1,180dd0dadee9aaf2e43579dc8567a0f4035a3d522fc2d09925de887de9877ad2,2025-01-06T17:15:37.423000 CVE-2024-47476,0,0,7fbeddc8b679c54b9a8d16b073a75eec4d455c0be7f1e02e1d7d8aa5633f37d1,2024-12-03T10:15:05.883000 CVE-2024-4748,0,0,0e1bf604cc16c6bb1a8683ee11cfaa8201b2be0b492e06be1984933dd6cedb52,2024-11-21T09:43:30.787000 CVE-2024-47480,0,0,7bbfcef6bab888f4fa8746c2bd3a01695eae5e5613d22823da6ce5d7f52af5e3,2024-12-18T03:15:26.583000 @@ -269002,8 +269008,8 @@ CVE-2024-51093,0,0,a6898e879de35c8cf2e460ec5a84ae7f0123df10aa875737ef5d0e250287c CVE-2024-51094,0,0,9c0a3563e2cbfb0f7e4111937c25ede7da4801ccd5cc0469207158910b8a9299,2024-11-19T17:35:14.493000 CVE-2024-5110,0,0,fb15a6e8ac3918d54232e697045ba8a0a4f2778f988710aceb135278db14c8a7,2024-11-21T09:46:59.470000 CVE-2024-5111,0,0,16553f7e015987eac3af34fccd670274f33dec3aabde04972879226d81661f96,2024-11-21T09:46:59.603000 -CVE-2024-51111,1,1,8d3d22db45a52492a4e971aa0aeaf7aaf7b6e635f6cd776915991347bc7adc8c,2025-01-06T16:15:28.807000 -CVE-2024-51112,1,1,5449968c3996b12a0dcccd266ac2d98e12653e9da5f2deef7664bebceda791d6,2025-01-06T16:15:28.943000 +CVE-2024-51111,0,1,06fdca48d9f713ba11aa0605dc978b93849ded746b605b0da33a035e037b1411,2025-01-06T18:15:20.060000 +CVE-2024-51112,0,0,5449968c3996b12a0dcccd266ac2d98e12653e9da5f2deef7664bebceda791d6,2025-01-06T16:15:28.943000 CVE-2024-51114,0,0,bb120dee5f82301bedd52f6a870fc78612d9b471bba9079cbb07365933b729b3,2024-12-05T20:15:22.340000 CVE-2024-51115,0,0,97924e30f339bc462ccaad1ee3c55c378e15485436cb0bc88676f0cde030376a,2024-11-06T18:17:17.287000 CVE-2024-51116,0,0,163c0d7988ca5329a27514b03075ee6d2fff2ef84e9d3dc466528f493b745f84,2024-11-06T18:17:17.287000 @@ -269135,6 +269141,7 @@ CVE-2024-51466,0,0,1b90c245992e2f466d154423146cea90d99df5f3b80547b5f6626d10019e0 CVE-2024-5147,0,0,b4fda03873bf91b8aee1014c1d03851aae8f0afeab0edb3aed7529ff221065c3,2024-11-21T09:47:04.057000 CVE-2024-51470,0,0,e89d5ef183a7d29ac11af41a2499db74df261ac8afb07d8bd5315410d8114abd,2024-12-18T20:15:23.233000 CVE-2024-51471,0,0,124b7b8875d261820d9fc9a3eefcc2e273bec0e6de9ec2bd5f9981a02008418a,2024-12-19T18:15:23.153000 +CVE-2024-51472,1,1,7bdead71249065fcbd818917368b77d15bccf70ee70ae6963c84c47575e93634,2025-01-06T17:15:38.517000 CVE-2024-51478,0,0,f0595ed35f1f283d907e9d623fdb50e27981165a57dcab6e98c75f63ec12b3b4,2024-11-01T12:57:03.417000 CVE-2024-51479,0,0,cb129c5fa9252110468d8449b172cda17bf48af7dcff3fe804fa3e07241cca0d,2024-12-17T19:15:06.697000 CVE-2024-5148,0,0,f40c04de71d66c8857441b50b10a14db507d29d1691198e2bceac6bdc772cfd5,2024-09-03T12:59:02.453000 @@ -269690,7 +269697,7 @@ CVE-2024-5224,0,0,19bab4d52c55b31a325c37ec973f1563a0cdca43b7378195c49febac95f71d CVE-2024-5225,0,0,c2f67d0a4a1b2d56ec5220ea993f27b92584fcee94414a7abcc138983fd21c6d,2024-11-21T09:47:13.340000 CVE-2024-5226,0,0,bdb95a590e0a31e2ca492aa22b2d493ceaf590cbf2df55ae0c93d41055415934,2024-08-08T13:04:18.753000 CVE-2024-52268,0,0,e5e6810a9747e7af7c298c06e1bd599e3a19597b915ead434817b591748910f8,2024-11-19T15:57:03.780000 -CVE-2024-52269,0,0,c7e333d74b2cfcbcad8187e8d4d63056d16696a451cd88bc51386bdeaf38983b,2024-12-05T11:15:06.340000 +CVE-2024-52269,0,1,b36218e06d56b89a470b1779ec5f14fd5fc3126dcc140ab1cc30c9b56e1f22cc,2025-01-06T18:15:20.720000 CVE-2024-5227,0,0,f65c704701ee5ef9d493a1b05a58a3a7dadf46e543650b1ca0e9bd9636f84568,2024-11-21T09:47:13.570000 CVE-2024-52270,0,0,fe609a35a3adb57c958464cbb949662645b6a563d889d10bad8a68c9dfed8ac7,2024-12-05T13:15:09.133000 CVE-2024-52271,0,0,0749c985c99c1781523e9c7b1d2ccfdbc4661f9c63d7af06c6705e57aff4cb33,2024-12-05T17:15:12.927000 @@ -269698,7 +269705,7 @@ CVE-2024-52272,0,0,745c739c6c998f764f011d7386e16c8b3b532553eb0164e28da219da9126d CVE-2024-52273,0,0,9ebe8d41ef940a5a5137e78ca8312b16e67b87a80f284b08b9b870dd5ab54e37,2024-12-04T11:30:50.593000 CVE-2024-52274,0,0,dc991e230aab69e539334515f53f81b03395e3268559718315d8cd3724ecac0a,2024-12-04T11:30:50.713000 CVE-2024-52275,0,0,e8f62a81ce5c4198dd1732a94921618e8fc3394cbe13ac5377c183dff350751d,2024-12-04T11:30:50.827000 -CVE-2024-52276,0,0,0f2c52d75da181b6dcdc6813d1379ab5f65d4226ae3dddd1dfcf3b40f3144ea5,2024-12-05T11:15:07.360000 +CVE-2024-52276,0,1,a14786c725d749b2978d9c31178edca8e154ffd5d5721fe9e06996750736b9e8,2025-01-06T18:15:20.967000 CVE-2024-52277,0,0,da81f79b972940081351d531e52543cb52fd6bec896724669f05118d7a978e8d,2024-12-05T14:15:21.547000 CVE-2024-52278,0,0,f6727d2bf49859f0724c1a39e0d775cbd477e6bb49e30b91be3cb4bcf4a7b7c5,2024-12-04T12:15:19.763000 CVE-2024-5228,0,0,e8458dad36641e2f49e283982ba062ff04983c91d94764c17964f8325e9d26d2,2024-11-21T09:47:13.693000 @@ -270363,7 +270370,7 @@ CVE-2024-53181,0,0,75b064e17895b9f277789ad64fcd6ed5a3980c88dfbac5e82d8241bbd1116 CVE-2024-53182,0,0,276da6acd8b3e7662cb4c37221891d60d43b389e6f704002e7f31e4daedb306f,2024-12-27T14:15:25.643000 CVE-2024-53183,0,0,654d7facdcdf21d8448703d0aca76dbb4f82fcf4dcd5a0bcb5fcec43860cb2c1,2024-12-27T14:15:25.743000 CVE-2024-53184,0,0,2a27b94391b5bbab80d359ad179ae46b2fc322eea3533f3c18f42b154d4e7c8c,2024-12-27T14:15:25.853000 -CVE-2024-53185,0,0,4a3f7e3ab42e15b14f84634d2a7bbdbd7f314300d98d4eb4aff66c1bf7235623,2024-12-27T14:15:25.973000 +CVE-2024-53185,0,1,dee02c021154469479b441934b7a7238faacb7a5d2e8c305c86f7d889e21f278,2025-01-06T17:17:06.007000 CVE-2024-53186,0,0,c2645a2d328a7d64d2a84fc9623b12f8e5d7b94b72f4468b86561c8de48d32ce,2024-12-27T14:15:26.083000 CVE-2024-53187,0,0,e9ffe4e8a0f7104ac73e1d5043e16d403601f578bb2cc6b891174adf55edbf0e,2024-12-27T14:15:26.190000 CVE-2024-53188,0,0,5f098d0b17fccef0dad3935cb2078b40fd4c7dbdb7ea624fe85c4915aafad8a8,2024-12-27T14:15:26.297000 @@ -270401,7 +270408,7 @@ CVE-2024-53218,0,0,1b0db000cfaaeea8823b2d141a6f758a2f18d8b58418a91ffa7cee182227b CVE-2024-53219,0,0,1b00affd94d61b5de19fb81e8faa16b477bbd2cfbef7cdbfc96c17cbff88423f,2024-12-27T14:15:29.963000 CVE-2024-5322,0,0,6e9032fa3deabc9be71dae1989b7f0a781e1608a9b8c8f048902e90e4caef6d4,2024-11-21T09:47:25.413000 CVE-2024-53220,0,0,f26063a76be1c0bb3c1467e74b1938b9624affbdebeb012a0b5099418d517cde,2024-12-27T14:15:30.077000 -CVE-2024-53221,0,0,ff96e55ba48623b3baad63c45e096f4d4da60f1c9416451b5c2196eb8409ac5c,2024-12-27T14:15:30.190000 +CVE-2024-53221,0,1,c8102bf3e45423d3a5b6f80cdd7023cf3a790a173fe11da52f6b9a7e049785dd,2025-01-06T17:18:20.647000 CVE-2024-53222,0,0,f47a5510f6b23d61cde71f55aaf5c70eb4fbab132cd4c256d01cfe97bfe4ae80,2024-12-27T14:15:30.327000 CVE-2024-53223,0,0,1fb9775898b8edbe24341acf3f71ecbe157ce3c086c57964866b83250fee9b02,2024-12-27T14:15:30.453000 CVE-2024-53224,0,0,336b7f256f93ca4c42653234db59c438e5694f32d74f85e7f140e28d6a850d12,2024-12-27T14:15:30.583000 @@ -270410,8 +270417,8 @@ CVE-2024-53226,0,0,e1d26c3a2066a21d98e540b9e4d2767b1c52c59caf4ba57ab37b7c8a2fda9 CVE-2024-53227,0,0,966c942f82ff1c93518341256ee912e0a79f64d2ed5dd2fdc9b3e97d00ec6479,2024-12-27T14:15:30.937000 CVE-2024-53228,0,0,b1ea1e0d5f0693bcf931d26e972c20e7ef3af5cd7c48fd90aa6b16f88a533676,2024-12-27T14:15:31.057000 CVE-2024-53229,0,0,a74230d15d8357e8999d91897a965ebf07017f726c655955763713cfc55a9ac9,2024-12-27T14:15:31.163000 -CVE-2024-53230,0,0,a8b9630726ebc3aba7b73df9420c33efbacc632e9e456e80fa4db2b55959aa78,2024-12-27T14:15:31.290000 -CVE-2024-53231,0,0,17e185ff91b4b458b17ce26daf371a350c3cf78290ab759f2eb5e3b046ac546f,2024-12-27T14:15:31.390000 +CVE-2024-53230,0,1,2cad7114efa78446c9daac9a30bf07a048559700a8f0753a2a15b37c9e820cbf,2025-01-06T17:19:04.183000 +CVE-2024-53231,0,1,d17e3bda80b5a7cf1c8301cfd137a4225331a6dbdf23858cf1d31e5b8b86f0db,2025-01-06T17:19:49.817000 CVE-2024-53232,0,0,b2490c67d61762567c2a4758a059dd7afff0e8ed42e292b47c4a7cf1089d2169,2024-12-27T14:15:31.510000 CVE-2024-53233,0,0,3c38f13d75de4a76f794a84b10f00e056fd02bc1f845028887460515d557b226,2024-12-27T14:15:31.630000 CVE-2024-53234,0,0,74235b9bba8c6fa335f832d794b846a6cdfc4adf175080c7f64bc2837d1b0788,2024-12-27T14:15:31.783000 @@ -270704,7 +270711,7 @@ CVE-2024-53825,0,0,07af7202ddabda05f0daeb42ca06edbcf3fb20c192ea7ca7dd7082861a20b CVE-2024-53826,0,0,0b04b1b5846f39442507bbeb125d0ae4870d599699b329db9d8ecf7c2429b842,2024-12-06T14:15:25.077000 CVE-2024-5383,0,0,093acdd4201567d005275d52c1174349cc9fb95effb23b8b65de339d75e5f1d2,2024-11-21T09:47:32.963000 CVE-2024-53832,0,0,1b2ce5c4938b0e1ecf47a9786c83880b95c4a4c43364160d8ae6a9eea87843bf,2024-12-10T14:30:46.853000 -CVE-2024-53833,0,0,21b815baf6a411d81afd9221b4b9fc8642be4a2410696d7fb222aa415f957a99,2025-01-03T04:15:06.227000 +CVE-2024-53833,0,1,b0263a13fde25401d454efd3fc9f5d9e65a4ba307004af4c26526c703bab4f08,2025-01-06T17:15:39.110000 CVE-2024-53834,0,0,f772be6a6b7318016d93e00bbab730f9e5090ffcca9973fc1b51d0f863c6079d,2025-01-03T23:15:07.190000 CVE-2024-53835,0,0,1738259f50e1a13907bddecfb4df1723018cc354975bc160261abe6109d648b3,2025-01-03T23:15:07.333000 CVE-2024-53836,0,0,2cbfd30f09c54112dbd3816407bb73044cb7653f40cd6cff2fd0a50442342b4b,2025-01-03T23:15:07.470000 @@ -270754,7 +270761,7 @@ CVE-2024-53912,0,0,1f4db0332861ddc3d21771f81e88e64303e6668de99899f3afc95f8e7d972 CVE-2024-53913,0,0,f29eb48b3cfa8a7826d6fe7adbaf2bce87f89a85e25f58c699946a9277a37df3,2024-11-29T20:55:25.543000 CVE-2024-53914,0,0,e050babf2e1b2fa263009de5875d826c83245812f4e7813c8d122d68332fd2a8,2024-11-29T20:55:35.293000 CVE-2024-53915,0,0,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2ed72,2024-11-29T20:55:43.810000 -CVE-2024-53916,0,0,7468505b685e2683f2dc63bcafcc06191cbfc06c9d73791b1fbe8d39601d18c5,2024-12-04T22:15:22.840000 +CVE-2024-53916,0,1,b4be14b34e457d9e45c1c40d47ab72826003c5ec84913feddaf103f9ff837586,2025-01-06T18:15:21.627000 CVE-2024-53919,0,0,276cab16a69dd8abd191858092e087c05871f9a8d5d2b89d95f580d07d640fa6,2024-12-10T16:15:23.817000 CVE-2024-5392,0,0,6be8d0f4dc47d176328e011891583492739b095279f214844a12528377250390,2024-11-21T09:47:33.860000 CVE-2024-53920,0,0,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000 @@ -271223,7 +271230,7 @@ CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1 CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000 CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000 CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 -CVE-2024-54538,0,1,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 +CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 @@ -271273,7 +271280,9 @@ CVE-2024-54842,0,0,ccaf3a44f3596e593a08308e4797efa5052c648d3a0bb0b78b9bc5f97386b CVE-2024-5485,0,0,f687486069d8da51bc217d8f3c1b4f2cb223a1d0f0b0390694d1cbb1988c70fb,2024-11-21T09:47:46.253000 CVE-2024-5486,0,0,6dfb8e6d8cb1d8bab5afe16e5d1d045c354e9fc780a2307ae97dd3f4b30153b6,2024-11-21T09:47:46.367000 CVE-2024-5487,0,0,9fbfbc79e6dff8c3b550139a3c2eecf9b7c4bdde8704bc6cfe1f3d5f4415c8a9,2024-08-16T20:22:51.930000 +CVE-2024-54879,1,1,fc78c87ad890a14f75e2c419893ddaa2e8d27d4e1393b3bb787cf2908e1ca68d,2025-01-06T18:15:21.880000 CVE-2024-5488,0,0,703a569b98e6f1a8130cee58df129e22e6ef47912a99f32d5a452e25c6109519,2024-11-21T09:47:46.633000 +CVE-2024-54880,1,1,19b90b651153de387978c7aca82ad8b353028b1b94f86a0a639ec1980415ed4a,2025-01-06T18:15:22.037000 CVE-2024-5489,0,0,6c00a6a2badf83516471ea1d81b619bbe482cb4a54de89ffa7bd06f7fa1ffabd,2024-11-21T09:47:46.807000 CVE-2024-5490,0,0,7e66a0f19af78ba5ab311e474f6c7a834b406cb5857b42d263e55e1190767452,2024-08-27T14:36:10.033000 CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18a69,2024-12-26T20:15:21.800000 @@ -271398,6 +271407,7 @@ CVE-2024-55514,0,0,1ab6d03dbd59f8b12772670ec93c7ec4ae46219483a32dbdb16b58811fc91 CVE-2024-55515,0,0,aa63dd224a4ced8fb9deb1eadd4b58815859b25e0d9ddafab8ac8045b9bd13ff,2024-12-18T16:15:15.090000 CVE-2024-55516,0,0,4229f59dc90fe9b1d907ed2bb61094e572306fdea72c70c9a7f771b2d9b1733b,2024-12-18T16:15:15.263000 CVE-2024-5552,0,0,779c8b119b5a7bc042c6e25c9be4959c8015ea49092434c017d15512182ef4be,2024-11-21T09:47:54.927000 +CVE-2024-55529,1,1,3ee3c864d22f8fe8d4cecdd4869096b439ec499c920963b74520ee59786b803c,2025-01-06T18:15:22.183000 CVE-2024-5553,0,0,c6aeec952a2778be27c1792a1d1c97b8ff8c01ca6ed08226c6b506a6f771b767,2024-11-21T09:47:55.040000 CVE-2024-55538,0,0,67bd56020d7a76419d848694822e6e545c69b0a5adc3b05464d4d5160a8064ea,2025-01-02T15:15:23.933000 CVE-2024-55539,0,0,816c41315228f637dd0f2249a7a98de8c85476c43762c2881ed185f94995fdb5,2024-12-23T14:15:06.270000 @@ -271434,7 +271444,12 @@ CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3e CVE-2024-55601,0,0,3b6016987278f61ded580e0e03402a0550929e4ad53cc1af6a73ada12213c6f3,2024-12-09T22:15:23.100000 CVE-2024-55602,0,0,396d72563ab4a374ac0c8980e8cee78cbdbdadbfbf983b79309109b631e68a0b,2024-12-10T18:15:43.500000 CVE-2024-55603,0,0,4a06b9a652178b29a5724b7f94acd1a3f69ff4ebeee7b75073970ce4b7b59f31,2024-12-19T00:15:06.713000 +CVE-2024-55605,1,1,5da59064746c966fbecdee0873926a30743d9cf0c93b3f7a7c4a5a8c531fb4f2,2025-01-06T17:15:39.600000 CVE-2024-5561,0,0,4022800ab031c19c97b7a8f23f8f937de2c70091af69e68157c4f9d46ea4b02c,2024-10-07T17:45:29.950000 +CVE-2024-55626,1,1,f36d57ae1c0afcb67d13cb2e795b6bacdf08b400aa00b33a8f9a2f26bbc9996e,2025-01-06T18:15:22.570000 +CVE-2024-55627,1,1,173b2a119c84983e8af5be198263941a248429780ccb3b1808671f4cb34cc3ed,2025-01-06T18:15:22.757000 +CVE-2024-55628,1,1,78a27add8018dac3ca13515be1f7ea1c6d7cc8272d70369fac3cba68fec88116,2025-01-06T18:15:22.947000 +CVE-2024-55629,1,1,1049493b548b1aac237fe627a217b344429a469a3d12233187a25d8901f7dbc3,2025-01-06T18:15:23.130000 CVE-2024-55631,0,0,9a39e6716a26c44626015abe660ed68f10b9088a314dbff4a0b6656d61698251,2024-12-31T17:15:08.870000 CVE-2024-55632,0,0,0eec14618b1369f8c4390eb6d097cad91004417a9fa469a1ef5602d9a98a71f4,2024-12-31T17:15:09.007000 CVE-2024-55633,0,0,c4adbf002e3ac0157724f2b4e7760aa632e73f70f1dac02e75e7bdb334ba90e7,2024-12-12T18:15:27.733000 @@ -271496,7 +271511,7 @@ CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c8981452067 CVE-2024-5591,0,0,e2235dc9118cc79b3ae0a586a8dc702d3b6ecde665fe3ab616de0261ded7cef3,2025-01-03T15:15:10.813000 CVE-2024-55917,0,0,a2dca5ced3d5dcd8acfac3cb6ea6554a4664068c0ef8ff9f8ad449c34b6bc417,2024-12-31T17:15:09.140000 CVE-2024-55918,0,0,bbfbb68501d5d412b5390769769529160437a59c66144983bc4b57777cd87c8a,2024-12-17T20:15:23.140000 -CVE-2024-5594,0,0,42d88bff5e048997716e90f34250051c97a61e331f41209cc6dc6bb22fb4b491,2025-01-06T14:15:08.807000 +CVE-2024-5594,0,1,940fea6f22909b147125fe747964120391a812b447143a313922817b777157c5,2025-01-06T17:15:44.383000 CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000 CVE-2024-55947,0,0,694ecef04fd68cc6252e9a6f0180b35d880ee528dac800d937aa08150e860bb0,2024-12-24T16:15:25.463000 CVE-2024-55949,0,0,730f7b9444cd8d481c090272c978e37b84fbd5b51226a21ecf1c6c64d8e22362,2024-12-16T20:15:13.683000 @@ -271864,10 +271879,10 @@ CVE-2024-56570,0,0,8726d0931b01e9691ff00476bef7093196414275400f646de081f849d9a7a CVE-2024-56571,0,0,e8e5014dafd43d2b7ada8f39ea4437487772a9fce794b5856744aff3679ca068,2024-12-27T15:15:16.077000 CVE-2024-56572,0,0,5a27a909e83db3283ccc21b9ad69eaaf4554a88e22704e441cc1d155b20c91e5,2024-12-27T15:15:16.210000 CVE-2024-56573,0,0,686575fd6876aa7241d3b81816e19faa272e31a78981fb5d81fd728a72ab97dd,2024-12-27T15:15:16.320000 -CVE-2024-56574,0,0,f98499879e1affb3683f2713bdc3da40498d87b293beb49d5e9ec8eec8862043,2024-12-27T15:15:16.420000 +CVE-2024-56574,0,1,d1659bb2467b974570337abca4ede43186d6aecfacc04f417144c3b6fc3cf29e,2025-01-06T17:20:38.493000 CVE-2024-56575,0,0,d800439f994543901ae2936ca5724eb88e88f1f7c25bd51e79024d2a6df8170e,2024-12-27T15:15:16.537000 CVE-2024-56576,0,0,e5bd38b60a30f7044dce9a0ea37acf3f6568bf209930b2d10e73dea540708a34,2024-12-27T15:15:16.657000 -CVE-2024-56577,0,0,16886a6eb1c7cf825613579cb1d48101698038b8ebca158e9fd3c1ecd2952bed,2024-12-27T15:15:16.767000 +CVE-2024-56577,0,1,3ecccc37529565eba4667f5b0409fc9500b7d3d95e9ec471d37b764a28244e5e,2025-01-06T17:21:33.627000 CVE-2024-56578,0,0,6b0f3b20d2fedfafeff1688b07d6d8a6e4d1a3560e9940b78384e1dd9e589c91,2024-12-27T15:15:16.873000 CVE-2024-56579,0,0,fcf272a802513285f36c52001ec02bbb68cc32be40cc3f7325f026784f58773b,2024-12-27T15:15:16.983000 CVE-2024-5658,0,0,7e7462fc3515e519516e2f809c98e13e2106352e6aac99c565fb770e189dd063,2024-11-21T09:48:06.413000 @@ -271905,7 +271920,7 @@ CVE-2024-56608,0,0,097cacbd2b702d2f82dcc6dc51b8f7e512ed0a5b905c3f499bbf877ee8b8b CVE-2024-56609,0,0,cebfeb02fea20d2e5ec9b6db1e720f3f3e0983a6f297439668797a7ca6772c63,2024-12-27T15:15:20.387000 CVE-2024-5661,0,0,7d090de96660a134ff2e3cb7262fde0b3d927ce5a88611486b37761a6a2d78a0,2024-11-21T09:48:06.673000 CVE-2024-56610,0,0,3616430b001245a9667a9f4aa45a5afeac5c8dd0cb6af7e882645d533e24c8ba,2024-12-27T15:15:20.490000 -CVE-2024-56611,0,0,0672211ea364f1f926659f71be64b3a38b1befa29eca374caaf11a677d91ed15,2024-12-27T15:15:20.587000 +CVE-2024-56611,0,1,0d93be71bfd72357cc54d7ccd72b59dc3ffef4c2b81f6098928deb94ac964bb5,2025-01-06T17:22:48.560000 CVE-2024-56612,0,0,d9f2ff4b9baefac1d9ca340e52316b73ad0af8dcbbd855b5a8e0323d5e0769f8,2024-12-27T15:15:20.687000 CVE-2024-56613,0,0,91796d95113b3cd131808843bc48df4042262508e27b2fd4377a6d07ed28534f,2024-12-27T15:15:20.793000 CVE-2024-56614,0,0,0dc0201a77a7b3fde399c7cc5c2af413a8c9c98270694ae4b38d36beb69d3561,2024-12-27T15:15:20.897000 @@ -271940,7 +271955,7 @@ CVE-2024-5664,0,0,b6962e20742af8ea90e612bbc7ac8c73d6aa535f0e49e5cabd0c7dd5964763 CVE-2024-56640,0,0,cbe6c220e8c4e31481a770ac78aa1bd8cb1e00e3ee77b141b0919dfbc57b06eb,2024-12-27T15:15:23.730000 CVE-2024-56641,0,0,7bd87e333960b236379a7ab6f66f186a39f9577a76aff23809b25204a27a92db,2024-12-27T15:15:23.830000 CVE-2024-56642,0,0,ac80bdf712e9ba3e3a878808dc60334423b1c25edaffbe7c53a8b32cec5c80d1,2024-12-27T15:15:23.930000 -CVE-2024-56643,0,0,dcf95e173a7770e846dad9ef7b6b4fee16be5e61785294e9499107389b6e09f0,2024-12-27T15:15:24.040000 +CVE-2024-56643,0,1,7b5f1a4805f035363d7a8272badd51b331d739badf6cbf1475c665112dd3ac85,2025-01-06T17:14:41.813000 CVE-2024-56644,0,0,8a46d5b530bbcb9e52d9ab6abd7dba97d34ca0f87bf22a510768ea3f07eda72d,2024-12-27T15:15:24.163000 CVE-2024-56645,0,0,216619e3bf854381932f49b2368332f2fb98fc73e7d8eac5a9707768667df0ab,2024-12-27T15:15:24.260000 CVE-2024-56646,0,0,4be7310ae502f4727fcab28bfcff16ba81beb4d6909a4ebd18a23e6a9d35370c,2024-12-27T15:15:24.367000 @@ -271959,22 +271974,22 @@ CVE-2024-56657,0,0,d48559b2750479b7e31efe727fd59854eb6d1e16bbd5f2fd178e3c4c6467c CVE-2024-56658,0,0,1d3f590d42deb6f7e16578c7e998e0b3b5bed46dbcb1c7bc76aa3598a2364b40,2024-12-27T15:15:25.643000 CVE-2024-56659,0,0,2b460081eab9cd9201b849e95a23511bc3a4bb1e44765f21fd1e7e02a4e17d73,2024-12-27T15:15:25.747000 CVE-2024-5666,0,0,8139975e898ee1091802fa011bf50726a9ce2f054b4cff2fd9267df5d7986a48,2024-11-21T09:48:07.360000 -CVE-2024-56660,0,0,449f447435ad193a85b084b6eae491a2eb9bd07c7f5378921a7af3a0be6d780c,2024-12-27T15:15:25.857000 -CVE-2024-56661,0,0,4fd4741ffb96516e32022ac591c8a02897bc75eece9f630c082d6c064d6b038a,2024-12-27T15:15:25.960000 -CVE-2024-56662,0,0,8e3cffbd5c5ec158be58308351461a28f29ef1a01c0da248a6fc69ace97dfd94,2024-12-27T15:15:26.073000 -CVE-2024-56663,0,0,b0e9da04a2fb7d25b1875da24a640574ca095ffb0ba924ec6d2cb49b65716e65,2024-12-27T15:15:26.187000 +CVE-2024-56660,0,1,cfed4a787333c42a3454657a06f0d3b7a6226ccb05b4cc27e3c9f4d563a87d98,2025-01-06T18:43:45.897000 +CVE-2024-56661,0,1,c6c9e404b12664e81d58b8990f331d53c7130ec908c72b71de88eceee8fff31e,2025-01-06T18:49:40.310000 +CVE-2024-56662,0,1,2eb37c849d1c944c9ea82f37c67388f3c32521454fb617ad4e1f9a3fad26a35b,2025-01-06T18:51:31.593000 +CVE-2024-56663,0,1,b24b5ff415051e92cf82550565ee0a00212026738720b005f89116c862f514b2,2025-01-06T18:52:41.737000 CVE-2024-56664,0,0,d7dd1242b48fe0575d7d9a030055241d66c6f7d3abf5defef791cb4395b308d3,2024-12-27T15:15:26.297000 -CVE-2024-56665,0,0,eef02b57b020e3c7eababad16298c9fa978c0c49905e8ba83f5e857d137e0ba8,2024-12-27T15:15:26.400000 -CVE-2024-56666,0,0,2fb8753d44a350f522ac4b502d9a2716a599dc873ab9e164f89644e40341a197,2024-12-27T15:15:26.503000 -CVE-2024-56667,0,0,b5c5cc3fc44b533e8f3a11d05e9705e3c9c97d9514fc02387f53b73d19f29f8d,2024-12-27T15:15:26.600000 -CVE-2024-56668,0,0,d18419f092806fb427e0702d937230d214b4f45d9a83abf243cc85c340bf872f,2024-12-27T15:15:26.693000 -CVE-2024-56669,0,0,a4f7b88ed4270fc2c4fcd9f3c327049612c38eb81da815b9ceffddc16c5c08fd,2024-12-27T15:15:26.797000 -CVE-2024-56670,0,0,4c0f14e9288b42bc49c28dc264ee784ac9e5a2afad66e2f546a79158b2a6e40b,2024-12-27T15:15:26.890000 -CVE-2024-56671,0,1,965424f9a0cbe2a465372879236df9fbdb2bda68b251d088efe5ee351e22168f,2025-01-06T16:56:36.777000 -CVE-2024-56672,0,1,640d06269ad0ff588b376117fe4db63bf4af9e997d55d33d8badbfcd844cdc82,2025-01-06T16:53:02.043000 -CVE-2024-56673,0,1,5971b0074804b2e62dab27b21b0c044bddf21cad7132bb4c203a0572aa08e883,2025-01-06T15:08:36.363000 -CVE-2024-56674,0,1,1655890c951858878955fc86489ba71ecdfb8bf37566f2a1ea7244f22e4a1caf,2025-01-06T15:06:43.330000 -CVE-2024-56675,0,1,f2fbd776f051750f20f49b2577557a6c805ffb74848e2f90b5d83ed0c6e0e034,2025-01-06T15:03:31.087000 +CVE-2024-56665,0,1,b08ee739572f10c32d239f33de64977bec1256b54835c47ccb8efd3ec8866d26,2025-01-06T18:42:12.090000 +CVE-2024-56666,0,1,21f26ce12addeba29595c53677883f3a92e9d33b51f0211bdc6b5982f3c5d0f1,2025-01-06T18:23:37.147000 +CVE-2024-56667,0,1,1a9434d05c1117f8ebea126370a3323c87f5ea30d38cebd3e2ed4ea6d126e457,2025-01-06T18:21:07.280000 +CVE-2024-56668,0,1,bb0b1b28b41959171a614b3f974621ac0d2ac6eb7e9f87ec2a3ef420c316bb90,2025-01-06T18:20:19.580000 +CVE-2024-56669,0,1,5c4439da8b08ce895d9a311a88f6de163296ba7a25593d939a8027d7fb4dd940,2025-01-06T18:19:13.567000 +CVE-2024-56670,0,1,09dfad71a0a648bb5acf88bdf9f65707f93ff084785c319fcc16bdd4e85df5fb,2025-01-06T18:13:02.807000 +CVE-2024-56671,0,0,965424f9a0cbe2a465372879236df9fbdb2bda68b251d088efe5ee351e22168f,2025-01-06T16:56:36.777000 +CVE-2024-56672,0,0,640d06269ad0ff588b376117fe4db63bf4af9e997d55d33d8badbfcd844cdc82,2025-01-06T16:53:02.043000 +CVE-2024-56673,0,0,5971b0074804b2e62dab27b21b0c044bddf21cad7132bb4c203a0572aa08e883,2025-01-06T15:08:36.363000 +CVE-2024-56674,0,0,1655890c951858878955fc86489ba71ecdfb8bf37566f2a1ea7244f22e4a1caf,2025-01-06T15:06:43.330000 +CVE-2024-56675,0,0,f2fbd776f051750f20f49b2577557a6c805ffb74848e2f90b5d83ed0c6e0e034,2025-01-06T15:03:31.087000 CVE-2024-56676,0,0,03ca2593ba1f6c187c58ffa394f61794a04afedbef78f1711e91091bad939757,2024-12-28T10:15:06.113000 CVE-2024-56677,0,0,d031c64576aa51d9103334bd3b6d44296f922751ad496ef1b5c9abc035ca6c46,2024-12-28T10:15:08.277000 CVE-2024-56678,0,0,c4c66b2fa12698262c6c2c19cf62531365187bf8ac53346e9519d8db6540e994,2024-12-28T10:15:08.797000 @@ -272013,9 +272028,9 @@ CVE-2024-56707,0,0,b05b8792b2b7de0466fe1a56bcfb7d27eb2e048786ee1140fc3035d1622e8 CVE-2024-56708,0,0,e5f0e19c72b7781e683010a70d6ebaa08a94790dc924fb31d3c4c256c2d7ff31,2024-12-28T10:15:20.397000 CVE-2024-56709,0,0,cdf942cc701521c1ff3c800ae103d3cea4ef72f866f736a0015304fbfad4223b,2024-12-29T09:15:05.820000 CVE-2024-5671,0,0,ed90f881c7f33cc4424c259b337566a1f77772369738ebea5bec64062f030b65,2024-11-21T09:48:07.823000 -CVE-2024-56710,0,0,d94d3b5343e85fa5e12dba8143b3179aeacae0497d00b4a544527b4b053cb56c,2025-01-02T14:15:08.600000 +CVE-2024-56710,0,1,d570c66cc1493f8ba1b163d30fce601a9571d4053345eabd5838e156955920fe,2025-01-06T17:13:00.090000 CVE-2024-56711,0,0,d258abd55656cc7f90ce97ed6cb2b148afd36b4f76cc0591ecd0d3d5401df1ee,2024-12-29T09:15:06.110000 -CVE-2024-56712,0,0,216be7b8ebb8553e0fb51a48b63f3764452e4bc3b94d3eee1d3f6110226f9190,2024-12-29T09:15:06.250000 +CVE-2024-56712,0,1,5b4b2cfbf10a7f1957aa2405de52e1416f37c32b46cc4476328392ec38eda5bb,2025-01-06T17:11:48.987000 CVE-2024-56713,0,0,5020834a260519e2be6a95e6f4f1901adc3b751bc54eb22b967ecc861237a872,2024-12-29T09:15:06.377000 CVE-2024-56714,0,0,b3ce9d06b99ca38b43d3fc7ca241e57e4a1bb78055defdbd69f868bbfc41abea,2024-12-29T09:15:06.510000 CVE-2024-56715,0,0,70bd75e00b68050da07bfc6db7e0868c24998ca56b8e227ce1777c53f03a48fa,2024-12-29T09:15:06.643000 @@ -272030,8 +272045,8 @@ CVE-2024-56722,0,0,192422b70068428db5159f813742cbd379b4942193fab87be93196e507d9a CVE-2024-56723,0,0,0764f6d84894612c4c7bcea08560405887033e9e40f0569eb053145caa946b02,2024-12-29T12:15:06.390000 CVE-2024-56724,0,0,cc2f7e3f8dc8d55c1d83c89cb0d90d388267abaf43e50a6614a9271f4c5533d9,2024-12-29T12:15:06.490000 CVE-2024-56725,0,0,0d8c143455dd4c74ade00023de074d019020f9329ec8ea40eab7f04748540c97,2024-12-29T12:15:06.607000 -CVE-2024-56726,0,0,f5eaa29569ef6c2e42e3a5f43c1ccda0a3a2a3dac696eaa12053f10d5060d11d,2024-12-29T12:15:06.703000 -CVE-2024-56727,0,0,852c334565f24de2e989b8e09f1ede2549b6eff695c1818578468447790bdf40,2024-12-29T12:15:06.813000 +CVE-2024-56726,0,1,7396cabb8e6cb5316a0d2b902b918bc1194670ee7afa660cbe82cee81253f4d0,2025-01-06T17:10:17.110000 +CVE-2024-56727,0,1,eabc494dc2a4c2aa78fd4293bd969b774f7d696451c6d2e61e97848894874fc8,2025-01-06T17:09:19.120000 CVE-2024-56728,0,0,f2ee93b21b4b586bc43bd7afb5d904413b46e64426b9c99ca422b148a3d36cd2,2024-12-29T12:15:06.920000 CVE-2024-56729,0,0,571aff2aa5aff270b4fb31202621677957065bb98def964761742ced7d4824aa,2024-12-29T12:15:07.023000 CVE-2024-5673,0,0,f8b3774ce465f722b68e8727929e95d8d546e4b203a41a4244c7e4dffeee7a73,2024-11-21T09:48:08.057000 @@ -272051,17 +272066,30 @@ CVE-2024-56744,0,0,4fb6fc62444e03b4b24149d4d01a77f456dd95cbd7c45472910876c848ac5 CVE-2024-56745,0,0,b40e135615f262de3724a7319b7081ad59bcb8e0361d7744019371cf8598c258,2024-12-29T12:15:07.937000 CVE-2024-56746,0,0,172916252a614d41841f536ebea02633e8a1f1bfa89d3eaf7c619c78078148c2,2024-12-29T12:15:08.070000 CVE-2024-56747,0,0,2a3930adda2877ad219cae5ca5ac16a65b8c270ff5f76553f4625cfaba043f13,2024-12-29T12:15:08.183000 -CVE-2024-56748,0,0,c30fd201a940c8a767f19b1d8bf0047515f440a1b5ba9d5b5221ed590b12032c,2024-12-29T12:15:08.303000 -CVE-2024-56749,0,0,1ac87e8ee353fd0e10421252c8d413ea09573835af45107c215bcf21ac6a53c8,2024-12-29T12:15:08.410000 +CVE-2024-56748,0,1,fb30b675e7357a581772e704fd8acef36fd2795661d5099b6926a52f72af7d5d,2025-01-06T17:07:33.423000 +CVE-2024-56749,0,1,b0b97a777278ac5c6701ceeeaf8bc5407c17231b9cae6f5871f8fe89d39b5886,2025-01-06T17:06:18.380000 CVE-2024-5675,0,0,a93ae1d48690177c193b4a8fbcc4865158a63f066f83c2c6531b88eed5564aca,2024-11-21T09:48:08.303000 -CVE-2024-56750,0,0,6159c5f4e60fa7912c3693486aeb6a9ae5cf774bcd2bebe225e27d2673cfd48d,2024-12-29T12:15:08.517000 -CVE-2024-56751,0,0,ba274ae33ce305f7cbd6d3a9ecf2eded7c9878d7114b358ec6b4b186d3781d73,2024-12-29T12:15:08.640000 +CVE-2024-56750,0,1,31135ae99b9426471a2d8e602d032a8c692aadfcdf433f2d6cd611f14961f247,2025-01-06T17:04:58.267000 +CVE-2024-56751,0,1,456c10b3cb39157219110ccdd690f58f7fcf4394adb2c8368d3f973d3f30a360,2025-01-06T17:00:37.690000 CVE-2024-56752,0,0,2fdb0149176cfaa6a8fed7a78a0e207972398aa95ac4f3915f103fce59cf3bed,2024-12-29T12:15:08.753000 CVE-2024-56753,0,0,9a9e1100849854085bf9d1f688f71a98f1b55b5173d7b00e4c05697c66124674,2024-12-29T12:15:08.863000 CVE-2024-56754,0,0,cb047008e313194a73e0524177364a50e51263d4833eacc935cb2300f3a5c500,2024-12-29T12:15:08.967000 CVE-2024-56755,0,0,5c986320452db0124c4b994f3395702f179a429647ffc5ee3301038e797238d8,2024-12-29T12:15:09.077000 CVE-2024-56756,0,0,07e7dddad71e0f8b3f1edd0ef12bdcdd63f9b7b2acc77b9e263371c2f4b653a9,2024-12-29T12:15:09.190000 +CVE-2024-56757,1,1,a9cabd1b9e3bc1032f2ed13919426c61c9c36a86caef86a70fb68faf6d2329dd,2025-01-06T17:15:40.297000 +CVE-2024-56758,1,1,9dd0a642ae784b8676a7d7ad81b5dd7fc5ec0a04511ef1500ac70b82cc63466f,2025-01-06T17:15:40.597000 +CVE-2024-56759,1,1,51a4d69e473c95c2503d056afe5ba878b3c1df07567e3048365baf01598b1c06,2025-01-06T17:15:40.900000 CVE-2024-5676,0,0,42e21ca7cdab0bdccf25cf6637d45fef7f036494b6d014c88b5835e6e4847379,2024-11-21T09:48:08.420000 +CVE-2024-56760,1,1,2125177c83e1cff8a660b64e56488eda9a1564eb230e3213cd7e7d6e709ec7af,2025-01-06T17:15:41.173000 +CVE-2024-56761,1,1,2268c1312e9c768eeece5beab02482c4e7cc29ca6d6a7425791d414b0fae63ad,2025-01-06T17:15:41.480000 +CVE-2024-56762,1,1,fd2cda511dee9c83b3a74013b11aea8207299f8aac1e8ffa47281e47b41216ea,2025-01-06T17:15:41.777000 +CVE-2024-56763,1,1,5a5e00ab0150e4c9f23d35d9c1a4efb51410e8b448d4cbf3a876661bb5e810ab,2025-01-06T17:15:42.150000 +CVE-2024-56764,1,1,91b72a2ccbced4a7c9f79beaf4b327a4d43d7e0f7fa40f1c959b20a384ea4c3d,2025-01-06T17:15:42.483000 +CVE-2024-56765,1,1,2f958432f7b5e0953f9bb292214ab20c0363a79c8806ec0afc9fc2b493a5e4c0,2025-01-06T17:15:42.800000 +CVE-2024-56766,1,1,bf389ecd458f82d208b3fe6ac0e0cd9630e655e25369cc4984a2771492afc836,2025-01-06T17:15:43.127000 +CVE-2024-56767,1,1,b14fc64b14624303f26256201fa2e15ffbb1d3fd68d803b6f403b8d6eda55f4a,2025-01-06T17:15:43.477000 +CVE-2024-56768,1,1,2711975874778288d04f9537752ffd5439cccd65a5b6b2082bec18e66e19f912,2025-01-06T17:15:43.800000 +CVE-2024-56769,1,1,0353fe7a008f689293e1a78ceaf4d2240ef571b6dfbe38e9939db5ac8e335c84,2025-01-06T17:15:44.063000 CVE-2024-5677,0,0,1c94c489b32a2f3740f8b8867e0aff380d1e56445098bb97785a4bdba0037977,2024-11-21T09:48:08.540000 CVE-2024-5678,0,0,bb4133b16eab99226f567cd512e0bec4d1a7175fc845cb5a8a3e18dcdbfd75d7,2024-08-15T18:05:54.847000 CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000 @@ -272073,6 +272101,7 @@ CVE-2024-56802,0,0,2bf17880ee10109df3dc3a46015118efb291ba7061a269a28cfa534f6af9e CVE-2024-56803,0,0,5af6b53ef642536234b1144a6b5e8ae5f304fb932318cbb15508f9cbfed0d7e0,2024-12-31T23:15:41.553000 CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000 CVE-2024-5682,0,0,61babb4b22790f05b1e6fb044157f817a85668af929c91e823c0d3ae99b2f335,2024-09-20T12:30:51.220000 +CVE-2024-56828,1,1,58462cf48b4567824edfeec2a5b2d05411df2bbb14eef3534ab916b80e082c5f,2025-01-06T18:15:23.467000 CVE-2024-56829,0,0,c35cb95484606db3febb9c34eee6ba4919bfacdddc75d9fce694f618c221fbe8,2025-01-02T04:15:05.557000 CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000 CVE-2024-56830,0,0,79c85b0b070d5536c466f2e90f00cc426f8f9dfa98d4a97719c579eb1ffbed30,2025-01-02T05:15:07.967000 @@ -274502,7 +274531,7 @@ CVE-2024-8470,0,0,0b09aa8b8067433b7afb73b61c7aa44d3ef7ce8628b7e8d3b9e29fa3afb00f CVE-2024-8471,0,0,3934935f0a31bf82a596702efda6613996b08d7c183fa97f6a84e3cc4bc42129,2024-09-06T11:44:22.510000 CVE-2024-8472,0,0,a6a3ced3bf4a7f20791a06fac7764ccd2d88fa692882742c77836c8aae9605ea,2024-09-06T11:44:34.543000 CVE-2024-8473,0,0,bbd4d04523589cb8c745e9ab16e4a2c78d73b9497ab6f7282bb7e3bf6a9bfe27,2024-09-06T11:44:45.017000 -CVE-2024-8474,1,1,9216e9cff54425fe18aa485e721589f21e0454dd7d06985ff02b85e3a1afc736,2025-01-06T15:15:14.983000 +CVE-2024-8474,0,1,a1b136fefd80a840df73e57b6ef6834949bba9550af0fd9a07b6f39da4b7950f,2025-01-06T17:15:44.747000 CVE-2024-8475,0,0,c86d89e65a4821d108142f782b16ddf63e182d7002314d62a9de3c71a0583b70,2024-12-17T12:15:21.010000 CVE-2024-8476,0,0,e10a403d1e51fb18d41d013015e6a782c14511b4b5a178aec34efa9588c9653e,2024-10-02T17:31:00.583000 CVE-2024-8477,0,0,19e1a50b82df4e949fc45923ac7e1924aea3a0df2879078ebf532cd95acaecd0,2024-10-15T13:30:52.877000 @@ -275779,19 +275808,23 @@ CVE-2025-0230,0,0,da56c380fbd78e0c1f33c2e3a59c91c27f8ad01a46dc235a12db28093892ee CVE-2025-0231,0,0,73ba5b334ad5db7bd7f18e0277fa8cbe48a99916bc557dd1170e5fb52d78d868,2025-01-05T22:15:05.540000 CVE-2025-0232,0,0,bbb1f8dd03cca1cfde501a9cda5da15f541da213c05bfee0e291ed634d921d4c,2025-01-05T22:15:05.767000 CVE-2025-0233,0,0,5ed4a33582b9d256ec10fa7176aad6ab5c25b941c467fc43ba8899ab1d384b8a,2025-01-05T23:15:07.320000 -CVE-2025-21604,1,1,ec728601eba6bd539d6daf316c2c18ea930a896bd5f0099ef67fb1e9d57f3d64,2025-01-06T16:15:30.927000 +CVE-2025-21604,0,0,ec728601eba6bd539d6daf316c2c18ea930a896bd5f0099ef67fb1e9d57f3d64,2025-01-06T16:15:30.927000 CVE-2025-21609,0,0,46e3af17bfffe98fbaec33d01272d23877fbd06c6cc0e4a79625fd3beabb7e1e,2025-01-03T17:15:09.147000 CVE-2025-21610,0,0,803b1c12bbaab2c87bcfc5865cced8b68fa26746eb8c056e6bba01e1200224ac,2025-01-03T17:15:09.290000 -CVE-2025-21611,1,1,36a80f20f0f6b558dd5c487662753e7b9a1e02a5a76de946accf07884efa5778,2025-01-06T16:15:31.413000 -CVE-2025-21612,1,1,de8a571e6c557474f38c95df90d238e72135d453b3477b6be2bb7a8ad9fa3f45,2025-01-06T16:15:31.633000 +CVE-2025-21611,0,0,36a80f20f0f6b558dd5c487662753e7b9a1e02a5a76de946accf07884efa5778,2025-01-06T16:15:31.413000 +CVE-2025-21612,0,1,9fd30e827023ec934479d337fa9a8b1d25e05479de4a6b330575dbf744f4ba66,2025-01-06T17:15:46.840000 +CVE-2025-21613,1,1,450c2846ee71577b9830e8e719c31e155c37244e65ba9e77e5a01008786d8ec2,2025-01-06T17:15:47.043000 +CVE-2025-21614,1,1,aabe0db280dc9dc10bd490c84810b1f616f5219669182912c62b49c623ecf63b,2025-01-06T17:15:47.310000 +CVE-2025-21615,1,1,fb1d1b59e0795bd682134b6fa4b1fdae854aaf92d872a6fbaa412cd39ddeff25,2025-01-06T17:15:47.510000 +CVE-2025-21618,1,1,4c20ae4fc5c8b4aacd9f26687daa5f4af9af83a3837718673c9fc7ecd24be6c6,2025-01-06T17:15:47.660000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 CVE-2025-22376,0,0,5718c706cab54399c824e81247fa8725e0b2da3334acc9f4e812565255340de1,2025-01-03T23:15:08.897000 -CVE-2025-22383,0,1,5d92cf5968d0b3cb8c32ffddbb5f9d0fa05899712bf08a80edc7535b9d1dfdd0,2025-01-06T15:15:16.103000 -CVE-2025-22384,0,0,a34785f0ea77d1051462b06f3ba284ff30a622cd8e76e1c21ab8185ab758455f,2025-01-04T02:15:06.937000 -CVE-2025-22385,0,1,055bfc0e52a8dde2e5061dc2381685f52420f7c1e16deb69c2583706ea8c2ed0,2025-01-06T16:15:32.017000 -CVE-2025-22386,0,1,cbe66cd14564939b203fdaa4ca25a1cf5873df5d1e1522586eec7d727b2660ae,2025-01-06T16:15:32.707000 -CVE-2025-22387,0,0,3e10eb2a41e9d41275744f454fd4668103f91ee79454cdf6608fa82b29fb50cd,2025-01-04T03:15:07.340000 -CVE-2025-22388,0,1,7b76724cf59a9c67f325da6bd673f3f15746ba083c4bc35be8117d11c0a0d8b4,2025-01-06T15:15:16.307000 +CVE-2025-22383,0,0,5d92cf5968d0b3cb8c32ffddbb5f9d0fa05899712bf08a80edc7535b9d1dfdd0,2025-01-06T15:15:16.103000 +CVE-2025-22384,0,1,c3eb3907c8203007a185e0b56ba50453f7625b9e4c3e243d711609914b16742e,2025-01-06T17:15:47.820000 +CVE-2025-22385,0,0,055bfc0e52a8dde2e5061dc2381685f52420f7c1e16deb69c2583706ea8c2ed0,2025-01-06T16:15:32.017000 +CVE-2025-22386,0,0,cbe66cd14564939b203fdaa4ca25a1cf5873df5d1e1522586eec7d727b2660ae,2025-01-06T16:15:32.707000 +CVE-2025-22387,0,1,9dd5c36f62757a631fb5a2b118d56ec31778a4d5c7b66059ba094bd093cfa9e2,2025-01-06T17:15:47.997000 +CVE-2025-22388,0,0,7b76724cf59a9c67f325da6bd673f3f15746ba083c4bc35be8117d11c0a0d8b4,2025-01-06T15:15:16.307000 CVE-2025-22389,0,0,50d6eaab20c8259cde700c821ce2570def076c6cb2eb277d3379fa3f59f6550e,2025-01-04T03:15:07.580000 -CVE-2025-22390,0,0,feb4b17802fdfa010ee0f6d2a2c4fbfce8704f3f77f10ffa22d5acc33934f81f,2025-01-04T03:15:07.700000 +CVE-2025-22390,0,1,36805a833480d9f50dee34ab32e5ed9b2707017fd5287eb5a8abd68b1059bfbf,2025-01-06T17:15:48.170000