mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-01-08T23:00:19.694682+00:00
This commit is contained in:
parent
224f13c561
commit
8c6dd14d0d
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48884",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-21T07:15:04.987",
|
||||
"lastModified": "2024-08-21T12:30:33.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:31:21.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,90 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/mlx5: corrige el acceso a las estad\u00edsticas de los comandos despu\u00e9s de liberarlos. El comando puede fallar mientras se recarga el controlador y no puede aceptar comandos de firmware hasta que se reinicialice la interfaz de comandos. Dicho error de comando se registra en las estad\u00edsticas de comando. Esto da como resultado un acceso al puntero NULL a medida que la estructura de estad\u00edsticas de comando se libera y reasigna durante la recarga de mlx5 devlink (consulte el registro del kernel a continuaci\u00f3n). Solucionelo haciendo que las estad\u00edsticas de comando se asignen est\u00e1ticamente en la sonda del controlador. Registro del kernel: [2394.808802] ERROR: no se puede manejar la solicitud de paginaci\u00f3n del kernel en 000000000002a9c0 [2394.810610] PGD 0 P4D 0 [2394.811811] Vaya: 0002 [#1] SMP NOPTI... [2394.815482] RIP: 10:native_queued_spin_lock_slowpath+0x183/0x1d0 ... [2394.829505] Seguimiento de llamadas: [2394.830667] _raw_spin_lock_irq+0x23/0x26 [2394.831858] cmd_status_err+0x55/0x110 [mlx5_core] [2394.833020] mlx5_access_reg+0xe7/0x1 50 [mlx5_core] [2394.834175] mlx5_query_port_ptys+0x78/0xa0 [mlx5_core] [2394.835337] mlx5e_ethtool_get_link_ksettings+0x74/0x590 [mlx5_core] [2394.836454]? kmem_cache_alloc_trace+0x140/0x1c0 [ 2394.837562] __rh_call_get_link_ksettings+0x33/0x100 [ 2394.838663] ? __rtnl_unlock+0x25/0x50 [ 2394.839755] __ethtool_get_link_ksettings+0x72/0x150 [ 2394.840862] duplex_show+0x6e/0xc0 [ 2394.841963] dev_attr_show+0x1c/0x40 [ 2394.8 43048] sysfs_kf_seq_show+0x9b/0x100 [ 2394.844123] seq_read+0x153/0x410 [ 2394.845187] vfs_read+ 0x91/0x140 [ 2394.846226] ksys_read+0x4f/0xb0 [ 2394.847234] do_syscall_64+0x5b/0x1a0 [ 2394.848228] entrada_SYSCALL_64_after_hwframe+0x65/0xca"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/da2e552b469a0cd130ff70a88ccc4139da428a65",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ddf458641a511e7dff19f3bf0cbbc5dd9fe08ce5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18",
|
||||
"versionEndExcluding": "6.1.7",
|
||||
"matchCriteriaId": "F6F221E4-8654-4B9E-9C45-9DA7AC16B016"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/da2e552b469a0cd130ff70a88ccc4139da428a65",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ddf458641a511e7dff19f3bf0cbbc5dd9fe08ce5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27640",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-01T21:15:09.313",
|
||||
"lastModified": "2024-11-21T07:53:19.497",
|
||||
"lastModified": "2025-01-08T21:15:07.413",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28176",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-02T17:15:12.297",
|
||||
"lastModified": "2024-11-21T07:54:32.463",
|
||||
"lastModified": "2025-01-08T21:15:07.713",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28177",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-02T17:15:12.347",
|
||||
"lastModified": "2024-11-21T07:54:32.600",
|
||||
"lastModified": "2025-01-08T21:15:07.957",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28469",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-02T12:15:09.320",
|
||||
"lastModified": "2024-11-21T07:55:09.303",
|
||||
"lastModified": "2025-01-08T21:15:08.143",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-29551",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-02T17:15:13.010",
|
||||
"lastModified": "2024-11-21T07:57:16.907",
|
||||
"lastModified": "2025-01-08T22:15:27.373",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-29724",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-02T04:15:49.803",
|
||||
"lastModified": "2024-11-21T07:57:25.343",
|
||||
"lastModified": "2025-01-08T21:15:08.470",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-29725",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-02T04:15:49.863",
|
||||
"lastModified": "2024-11-21T07:57:25.487",
|
||||
"lastModified": "2025-01-08T21:15:08.740",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33476",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-02T14:15:09.437",
|
||||
"lastModified": "2024-11-21T08:05:36.737",
|
||||
"lastModified": "2025-01-08T21:15:09.183",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33669",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-02T20:15:09.520",
|
||||
"lastModified": "2024-11-21T08:05:51.333",
|
||||
"lastModified": "2025-01-08T21:15:09.473",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33670",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-02T20:15:09.563",
|
||||
"lastModified": "2024-11-21T08:05:51.487",
|
||||
"lastModified": "2025-01-08T21:15:09.780",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33671",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-02T20:15:09.607",
|
||||
"lastModified": "2024-11-21T08:05:51.647",
|
||||
"lastModified": "2025-01-08T21:15:10.023",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33672",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-02T20:15:09.647",
|
||||
"lastModified": "2024-11-21T08:05:51.797",
|
||||
"lastModified": "2025-01-08T21:15:10.270",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33673",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-02T20:15:09.693",
|
||||
"lastModified": "2024-11-21T08:05:51.947",
|
||||
"lastModified": "2025-01-08T21:15:10.503",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33675",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-02T20:15:09.733",
|
||||
"lastModified": "2024-11-21T08:05:52.093",
|
||||
"lastModified": "2025-01-08T21:15:10.757",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33717",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-02T12:15:09.367",
|
||||
"lastModified": "2024-11-21T08:05:53.620",
|
||||
"lastModified": "2025-01-08T21:15:11.000",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-34258",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T20:15:10.903",
|
||||
"lastModified": "2024-11-21T08:06:52.663",
|
||||
"lastModified": "2025-01-08T22:15:28.060",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
64
CVE-2024/CVE-2024-124xx/CVE-2024-12431.json
Normal file
64
CVE-2024/CVE-2024-124xx/CVE-2024-12431.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-12431",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2025-01-08T21:15:11.760",
|
||||
"lastModified": "2025-01-08T21:15:11.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 15.5 before 17.5.5, 17.6 before 17.6.3, and 17.7 before 17.7.1, in which unauthorized users could manipulate the status of issues in public projects."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://about.gitlab.com/releases/2025/01/08/patch-release-gitlab-17-7-1-released/#unauthorized-user-can-manipulate-status-of-issues-in-public-projects",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/508742",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2877710",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13187",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-08T17:15:15.410",
|
||||
"lastModified": "2025-01-08T17:15:15.410",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-08T21:15:11.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +136,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.468013",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Rsec-1/wps",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-13189",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-08T20:15:27.353",
|
||||
"lastModified": "2025-01-08T20:15:27.353",
|
||||
"lastModified": "2025-01-08T21:15:12.157",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +140,14 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.469223",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZeroWdd/myblog/issues/1",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZeroWdd/myblog/issues/1#issue-2759828006",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2024/CVE-2024-131xx/CVE-2024-13190.json
Normal file
145
CVE-2024/CVE-2024-131xx/CVE-2024-13190.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2024-13190",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-08T21:15:12.303",
|
||||
"lastModified": "2025-01-08T21:15:12.303",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in ZeroWdd myblog 1.0. This vulnerability affects unknown code of the file src/main/resources/mapper/BlogMapper.xml. The manipulation of the argument findBlogList/getTotalBlogs leads to xml injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-91"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZeroWdd/myblog/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZeroWdd/myblog/issues/2#issue-2759833644",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.290782",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.290782",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.469226",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3500",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-02T17:15:26.100",
|
||||
"lastModified": "2024-11-21T09:29:44.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:22:53.997",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://account.wpmet.com/downloads/elementskit/?changelog=1",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8ae0a47-cba5-468e-8d25-7b7176373b9c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://account.wpmet.com/downloads/elementskit/?changelog=1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8ae0a47-cba5-468e-8d25-7b7176373b9c?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*",
|
||||
"versionEndExcluding": "3.6.1",
|
||||
"matchCriteriaId": "47CE311A-7EE4-405F-984B-AC3A71E177CA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://account.wpmet.com/downloads/elementskit/?changelog=1",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8ae0a47-cba5-468e-8d25-7b7176373b9c?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://account.wpmet.com/downloads/elementskit/?changelog=1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8ae0a47-cba5-468e-8d25-7b7176373b9c?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3647",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-02T17:15:28.397",
|
||||
"lastModified": "2024-11-21T09:30:04.623",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:10:47.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3075668/premium-addons-for-elementor/trunk/widgets/premium-post-ticker.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48fdece5-2996-426f-b77c-ae0b35bcd0ce?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3075668/premium-addons-for-elementor/trunk/widgets/premium-post-ticker.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48fdece5-2996-426f-b77c-ae0b35bcd0ce?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.10.29",
|
||||
"matchCriteriaId": "7EF8D77D-225B-451D-B581-DF0A01E4FD24"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3075668/premium-addons-for-elementor/trunk/widgets/premium-post-ticker.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48fdece5-2996-426f-b77c-ae0b35bcd0ce?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3075668/premium-addons-for-elementor/trunk/widgets/premium-post-ticker.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48fdece5-2996-426f-b77c-ae0b35bcd0ce?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3675",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-02T17:15:29.320",
|
||||
"lastModified": "2024-11-21T09:30:09.453",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:11:01.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,54 +39,120 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-box/widgets/wpr-flip-box.php#L1903",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-carousel/widgets/wpr-flip-carousel.php#L1191",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/grid/widgets/wpr-grid.php#L8567",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/taxonomy-list/widgets/wpr-taxonomy-list.php#L621",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3072880%40royal-elementor-addons&new=3072880%40royal-elementor-addons&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/337cbec1-c8a8-41b5-8c32-779be671120f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-box/widgets/wpr-flip-box.php#L1903",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-carousel/widgets/wpr-flip-carousel.php#L1191",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/grid/widgets/wpr-grid.php#L8567",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/taxonomy-list/widgets/wpr-taxonomy-list.php#L621",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3072880%40royal-elementor-addons&new=3072880%40royal-elementor-addons&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/337cbec1-c8a8-41b5-8c32-779be671120f?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.3.972",
|
||||
"matchCriteriaId": "3924FF11-73F8-416F-971A-4C2F0161373D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-box/widgets/wpr-flip-box.php#L1903",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-carousel/widgets/wpr-flip-carousel.php#L1191",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/grid/widgets/wpr-grid.php#L8567",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/taxonomy-list/widgets/wpr-taxonomy-list.php#L621",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3072880%40royal-elementor-addons&new=3072880%40royal-elementor-addons&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/337cbec1-c8a8-41b5-8c32-779be671120f?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-box/widgets/wpr-flip-box.php#L1903",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-carousel/widgets/wpr-flip-carousel.php#L1191",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/grid/widgets/wpr-grid.php#L8567",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/taxonomy-list/widgets/wpr-taxonomy-list.php#L621",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3072880%40royal-elementor-addons&new=3072880%40royal-elementor-addons&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/337cbec1-c8a8-41b5-8c32-779be671120f?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3728",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-02T17:15:30.560",
|
||||
"lastModified": "2024-11-21T09:30:15.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:11:21.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,30 +39,78 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Filterable_Gallery.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Interactive_Circle.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/284ea577-ff67-4681-995b-f7bb5ef0ff3e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Filterable_Gallery.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Interactive_Circle.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/284ea577-ff67-4681-995b-f7bb5ef0ff3e?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "5.9.16",
|
||||
"matchCriteriaId": "3456F1EB-AE86-4EAB-AC60-16F1EFAF69E6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Filterable_Gallery.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Interactive_Circle.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/284ea577-ff67-4681-995b-f7bb5ef0ff3e?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Filterable_Gallery.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Interactive_Circle.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/284ea577-ff67-4681-995b-f7bb5ef0ff3e?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38182",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-07-31T23:15:13.560",
|
||||
"lastModified": "2024-08-13T23:15:19.657",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-08T21:35:17.920",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
@ -43,6 +43,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,12 +76,42 @@
|
||||
"value": "CWE-1390"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:dynamics_365:7.0:*:*:*:*:field_service:*:*",
|
||||
"matchCriteriaId": "0FF8E5BB-E97C-452A-A78C-B714A67B7003"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38182",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42107",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-30T08:15:03.220",
|
||||
"lastModified": "2024-11-21T09:33:36.967",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:32:03.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,123 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: no procesar extts si PTP est\u00e1 deshabilitado. La funci\u00f3n ice_ptp_extts_event() puede competir con ice_ptp_release() y provocar una desreferencia del puntero NULL que provoca un p\u00e1nico en el kernel. El p\u00e1nico ocurre porque la funci\u00f3n ice_ptp_extts_event() llama a ptp_clock_event() con un puntero NULL. El controlador de hielo ya ha liberado el reloj PTP cuando ocurre la interrupci\u00f3n para el siguiente evento de marca de tiempo externo. Para solucionar este problema, modifique la funci\u00f3n ice_ptp_extts_event() para verificar el estado de PTP y salir temprano si PTP no est\u00e1 listo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1c4e524811918600683b1ea87a5e0fc2db64fa9b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/996422e3230e41468f652d754fefd1bdbcd4604e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1c4e524811918600683b1ea87a5e0fc2db64fa9b",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/996422e3230e41468f652d754fefd1bdbcd4604e",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.14",
|
||||
"versionEndExcluding": "6.9.9",
|
||||
"matchCriteriaId": "3CAC77E6-2424-4ED8-97EC-A0FC7881A134"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD973AA4-A789-49BD-8D57-B2846935D3C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F3E9E0C-AC3E-4967-AF80-6483E8AB0078"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1c4e524811918600683b1ea87a5e0fc2db64fa9b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/996422e3230e41468f652d754fefd1bdbcd4604e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1c4e524811918600683b1ea87a5e0fc2db64fa9b",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/996422e3230e41468f652d754fefd1bdbcd4604e",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46715",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-18T07:15:03.130",
|
||||
"lastModified": "2024-09-20T12:30:51.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:30:44.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,102 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: driver: iio: agregar comprobaciones faltantes en el acceso a la devoluci\u00f3n de llamada de iio_info Se accede a algunas devoluciones de llamadas de la estructura iio_info sin ninguna comprobaci\u00f3n, por lo que si un controlador no las implementa, intentar acceder a las entradas sysfs correspondientes produce un error de kernel como: [ 2203.527791] No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 00000000 cuando se ejecuta [...] [ 2203.783416] Rastreo de llamadas: [ 2203.783429] iio_read_channel_info_avail de dev_attr_show+0x18/0x48 [ 2203.789807] dev_attr_show de sysfs_kf_seq_show+0x90/0x120 [ 2203.794181] sysfs_kf_seq_show de seq_read_iter+0xd0/0x4e4 [ 2203.798555] seq_read_iter de vfs_read+0x238/0x2a0 [ 2203.802236] vfs_read de ksys_read+0xa4/0xd4 [ 2203.805385] ksys_read de ret_fast_syscall+0x0/0x54 [ 2203.809135] Pila de excepciones (0xe0badfa8 a 0xe0badff0) [ 2203.812880] dfa0: 00000003 b6f10f80 00000003 b6eab000 00020000 00000000 [ 2203.819746] dfc0: 00000003 b6f10f80 7ff00000 00000003 00000003 00000000 00020000 00000000 [ 2203.826619] dfe0: b6e1bc88 bed80958 b6e1bc94 b6e1bcb0 [ 2203.830363] C\u00f3digo: valor de PC incorrecto [ 2203.832695] ---[ fin del seguimiento 000000000000000 ]---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0cc7e0ee31e5c44904e98e2229d591e093282a70",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/72f022ebb9deac28663fa4c04ba315ed5d6654d1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c4ec8dedca961db056ec85cb7ca8c9f7e2e92252",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dc537a72f64890d883d24ae4ac58733fc5bc523d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.1.109",
|
||||
"matchCriteriaId": "EFD3BACD-EA1D-4437-A135-A3E7A761F54F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.50",
|
||||
"matchCriteriaId": "A56A0460-B122-44D6-B0E6-26CE9C891536"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.9",
|
||||
"matchCriteriaId": "F4469C96-A86B-4CC3-B2D5-C21B6B72641B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0cc7e0ee31e5c44904e98e2229d591e093282a70",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/72f022ebb9deac28663fa4c04ba315ed5d6654d1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c4ec8dedca961db056ec85cb7ca8c9f7e2e92252",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dc537a72f64890d883d24ae4ac58733fc5bc523d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-528xx/CVE-2024-52869.json
Normal file
25
CVE-2024/CVE-2024-528xx/CVE-2024-52869.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-52869",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-08T21:15:12.523",
|
||||
"lastModified": "2025-01-08T21:15:12.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain Teradata account-handling code through 2024-11-04, used with SUSE Enterprise Linux Server, mismanages groups. Specifically, when there is an operating system move from SUSE Enterprise Linux Server (SLES) 12 Service Pack (SP) 2 or 3 to SLES 15 SP2 on Teradata Database systems, some service/system user accounts, and possibly systems administrator created user accounts, are incorrectly assigned to groups that allow higher system-level privileges than intended for those user accounts. Depending on the usage of these accounts, this may lead to full system compromise."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chrismanson.com/CVE/cve-2024-52869.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.teradata.com/trust-security-center/data-security",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53199",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T14:15:27.623",
|
||||
"lastModified": "2024-12-27T14:15:27.623",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:29:46.280",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,89 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: imx-audmix: Agregar comprobaci\u00f3n NULL en imx_audmix_probe. devm_kasprintf() puede devolver un puntero NULL en caso de error, pero este valor devuelto en imx_audmix_probe() no se comprueba. Agregar comprobaci\u00f3n NULL en imx_audmix_probe() para controlar el error de desreferencia de puntero NULL del kernel."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c040cbe2e13da6454ae4748e04e53d885e1c9603",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dc5aa71f39b44d8117b2417dafd0e2884a75dd37",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e038f43edaf0083f6aa7c9415d86cf28dfd152f9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.11",
|
||||
"matchCriteriaId": "07BE5DA1-4C04-4052-9B58-6EDE15469D65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c040cbe2e13da6454ae4748e04e53d885e1c9603",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dc5aa71f39b44d8117b2417dafd0e2884a75dd37",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e038f43edaf0083f6aa7c9415d86cf28dfd152f9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53200",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T14:15:27.733",
|
||||
"lastModified": "2024-12-27T14:15:27.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:29:35.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,103 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Se corrige la comprobaci\u00f3n nula de pipe_ctx->plane_state en hwss_setup_dpp Esta confirmaci\u00f3n soluciona un problema de desreferencia de puntero nulo en hwss_setup_dpp(). El problema podr\u00eda ocurrir cuando pipe_ctx->plane_state es nulo. La correcci\u00f3n agrega una comprobaci\u00f3n para garantizar que `pipe_ctx->plane_state` no sea nulo antes de acceder. Esto evita una desreferencia de puntero nulo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/020002c76147ecfdafe95c44abd3240e216b6316",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0dd3d1de7a5957804ccd58c1b252f9e34710e3f6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2bc96c95070571c6c824e0d4c7783bee25a37876",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/95792a18da0795300e15075ac05d1915e9066999",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.5",
|
||||
"versionEndExcluding": "6.6.64",
|
||||
"matchCriteriaId": "54B7846B-C7F0-4910-8749-C0C31DCDDFD7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.11.11",
|
||||
"matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/020002c76147ecfdafe95c44abd3240e216b6316",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0dd3d1de7a5957804ccd58c1b252f9e34710e3f6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2bc96c95070571c6c824e0d4c7783bee25a37876",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/95792a18da0795300e15075ac05d1915e9066999",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53201",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T14:15:27.853",
|
||||
"lastModified": "2024-12-27T14:15:27.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:26:58.670",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,96 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe Esta confirmaci\u00f3n soluciona un problema de desreferencia de puntero nulo en dcn20_program_pipe(). Anteriormente, el commit 8e4ed3cf1642 (\"drm/amd/display: Add null check for pipe_ctx->plane_state in dcn20_program_pipe\") solucion\u00f3 parcialmente el problema de desreferencia de puntero nulo. Sin embargo, en dcn20_update_dchubp_dpp(), se pasa la variable pipe_ctx y se accede nuevamente a plane_state a trav\u00e9s de pipe_ctx. Varias declaraciones if llaman directamente a los atributos de plane_state, lo que lleva a posibles problemas de desreferencia de puntero nulo. Este parche agrega las comprobaciones nulas necesarias para garantizar la estabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3609259326171cd5b98462636580fb2ae5c87d40",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6a057072ddd127255350357dd880903e8fa23f36",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6b4ee2560d4d8de2688da68cd9581177035e0876",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6.64",
|
||||
"versionEndExcluding": "6.7",
|
||||
"matchCriteriaId": "95DA1B24-4D45-41EF-9380-1829D4B8B3E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11.3",
|
||||
"versionEndExcluding": "6.11.11",
|
||||
"matchCriteriaId": "C2F1D9BC-CB2F-488F-90F8-8456CD3C44CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3609259326171cd5b98462636580fb2ae5c87d40",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6a057072ddd127255350357dd880903e8fa23f36",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6b4ee2560d4d8de2688da68cd9581177035e0876",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53207",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T14:15:28.563",
|
||||
"lastModified": "2024-12-27T14:15:28.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:26:42.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,117 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: MGMT: Corrige posibles bloqueos Esto corrige posibles bloqueos como el siguiente causado por hci_cmd_sync_dequeue, lo que hace que se ejecute la funci\u00f3n de destrucci\u00f3n: INFO: la tarea kworker/u19:0:143 se bloque\u00f3 durante m\u00e1s de 120 segundos. Tainted: GWO 6.8.0-2024-03-19-intel-next-iLS-24ww14 #1 \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" deshabilita este mensaje. tarea:kworker/u19:0 estado:D pila:0 pid:143 tgid:143 ppid:2 indicadores:0x00004000 Cola de trabajo: hci0 hci_cmd_sync_work [bluetooth] Rastreo de llamadas: __schedule+0x374/0xaf0 schedule+0x3c/0xf0 schedule_preempt_disabled+0x1c/0x30 __mutex_lock.constprop.0+0x3ef/0x7a0 __mutex_lock_slowpath+0x13/0x20 mutex_lock+0x3c/0x50 mgmt_set_connectable_complete+0xa4/0x150 [bluetooth] ? kfree+0x211/0x2a0 hci_cmd_sync_dequeue+0xae/0x130 [bluetooth] ? __pfx_cmd_complete_rsp+0x10/0x10 [bluetooth] cmd_complete_rsp+0x26/0x80 [bluetooth] mgmt_pending_foreach+0x4d/0x70 [bluetooth] __mgmt_power_off+0x8d/0x180 [bluetooth] ? __pfx_worker_thread+0x10/0x10 kthread+0x107/0x140 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x3d/0x60 ? __pfx_kthread+0x10/0x10 ret_de_fork_asm+0x1b/0x30 "
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5703fb1d85f653e35b327b14de4db7da239e4fd9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6a25ce9b4af6dc26ee2b9c32d6bd37620bf9739e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a66dfaf18fd61bb75ef8cee83db46b2aadf153d0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c3f594a3473d6429a0bcf2004cb2885368741b79",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cac34e44281f1f1bd842adbbcfe3ef9ff0905111",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6.55",
|
||||
"versionEndExcluding": "6.6.64",
|
||||
"matchCriteriaId": "C813C628-8D83-4585-9CCE-3DE13EBB4454"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.10.14",
|
||||
"versionEndExcluding": "6.11",
|
||||
"matchCriteriaId": "41AB04F0-1096-4B39-8148-796AB65AA193"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11.3",
|
||||
"versionEndExcluding": "6.11.11",
|
||||
"matchCriteriaId": "C2F1D9BC-CB2F-488F-90F8-8456CD3C44CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5703fb1d85f653e35b327b14de4db7da239e4fd9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6a25ce9b4af6dc26ee2b9c32d6bd37620bf9739e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a66dfaf18fd61bb75ef8cee83db46b2aadf153d0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c3f594a3473d6429a0bcf2004cb2885368741b79",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cac34e44281f1f1bd842adbbcfe3ef9ff0905111",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53222",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T14:15:30.327",
|
||||
"lastModified": "2024-12-27T14:15:30.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:25:39.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: zram: arregla el puntero NULL en comp_algorithm_show() LTP inform\u00f3 una desreferencia de puntero NULL de la siguiente manera: CPU: 7 UID: 0 PID: 5995 Comm: cat Kdump: cargado No contaminado 6.12.0-rc6+ #3 Nombre del hardware: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __pi_strcmp+0x24/0x140 lr : zcomp_available_show+0x60/0x100 [zram] sp : ffff800088b93b90 x29: ffff800088b93b90 x28: 0000000000000001 x27: 0000000000400cc0 x26: 0000000000000ffe x25: ffff80007b3e2388 x24: 00000000000000000 x23: ffff80007b3e2390 x22: ffff0004041a9000 x21: ffff80007b3e2900 x20: 0000000000000000 x19: 00000000000000000 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000000 x10: ffff80007b3e2900 x9: ffff80007b3cb280 x8: 0101010101010101 x7: 0000000000000000 x6: 0000000000000000 x5: 0000000000000040 x4 : 0000000000000000 x3 : 00656c722d6f7a6c x2 : 000000000000000 x1 : ffff80007b3e2900 x0 : 0000000000000000 Rastreo de llamadas: __pi_strcmp+0x24/0x140 comp_algorithm_show+0x40/0x70 [zram] dev_attr_show+0x28/0x80 sysfs_kf_seq_show+0x90/0x140 kernfs_seq_show+0x34/0x48 seq_read_iter+0x1d4/0x4e8 El zram->comp_algs[ZRAM_PRIMARY_COMP] puede ser NULL en zram_add() si No se ha llamado a comp_algorithm_set(). El usuario puede acceder al dispositivo zram mediante sysfs despu\u00e9s de device_add_disk(), por lo que hay una ventana de tiempo para activar la desreferencia del puntero NULL. Mu\u00e9valo hacia delante en device_add_disk() para asegurarse de que cuando el usuario pueda acceder al dispositivo zram, est\u00e9 listo. comp_algorithm_set() est\u00e1 protegido por zram->init_lock en otros lugares y no existe ese problema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/843d366ff19708668d95cda16bb8aba109a93dba",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f364cdeb38938f9d03061682b8ff3779dd1730e5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "F21702AB-90B0-49AB-83E6-29B799AF41C7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/843d366ff19708668d95cda16bb8aba109a93dba",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f364cdeb38938f9d03061682b8ff3779dd1730e5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2024/CVE-2024-539xx/CVE-2024-53995.json
Normal file
90
CVE-2024/CVE-2024-539xx/CVE-2024-53995.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2024-53995",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-08T21:15:12.703",
|
||||
"lastModified": "2025-01-08T21:15:12.703",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SickChill is an automatic video library manager for TV shows. A user-controlled `login` endpoint's `next_` parameter takes arbitrary content. Prior to commit c7128a8946c3701df95c285810eb75b2de18bf82, an authenticated attacker may use this to redirect the user to arbitrary destinations, leading to open redirect. Commit c7128a8946c3701df95c285810eb75b2de18bf82 changes the login page to redirect to `settings.DEFAULT_PAGE` instead of to the `next` parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 1.9,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "LOW",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/SickChill/sickchill/blob/846adafdfab579281353ea08a27bbb813f9a9872/sickchill/views/authentication.py#L33",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/SickChill/sickchill/commit/c7128a8946c3701df95c285810eb75b2de18bf82",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/SickChill/sickchill/pull/8811",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2024-283_GHSL-2024-291_sickchill_sickchill/",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-540xx/CVE-2024-54010.json
Normal file
44
CVE-2024/CVE-2024-540xx/CVE-2024-54010.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-54010",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2025-01-08T21:15:12.900",
|
||||
"lastModified": "2025-01-08T21:15:12.900",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the firewall component of HPE Aruba Networking CX 10000 Series Switches exists. It could allow an unauthenticated adjacent attacker to conduct a packet forwarding attack against the ICMP and UDP protocol. For this attack to be successful an attacker requires a switch configuration that allows packets routing (at layer 3). Configurations that do not allow network traffic routing are not impacted. Successful exploitation could allow an attacker to bypass security policies, potentially leading to unauthorized data exposure."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
|
||||
"baseScore": 3.4,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04772.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56541",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T14:15:33.767",
|
||||
"lastModified": "2024-12-27T14:15:33.767",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:25:24.730",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,89 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath12k: arreglo de use-after-free en ath12k_dp_cc_cleanup() Durante la eliminaci\u00f3n del m\u00f3dulo ath12k, en ath12k_core_deinit(), ath12k_mac_destroy() anula el registro de ah->hw de mac80211 y libera el ah->hw as\u00ed como todos los ar en \u00e9l. Despu\u00e9s de esto, ath12k_core_soc_destroy()-> ath12k_dp_free()-> ath12k_dp_cc_cleanup() intenta acceder a uno de los ar liberados del skb pendiente. Esto se debe a que durante la destrucci\u00f3n de mac, el controlador no pudo limpiar algunos paquetes de datos, a los que se accedi\u00f3 m\u00e1s tarde en ath12k_dp_cc_cleanup() y se liberaron, pero el uso de ar del paquete provoc\u00f3 este use-after-free. ERROR: KASAN: use-after-free en ath12k_dp_cc_cleanup.part.0+0x5e2/0xd40 [ath12k] Escritura de tama\u00f1o 4 en la direcci\u00f3n ffff888150bd3514 por la tarea modprobe/8926 CPU: 0 UID: 0 PID: 8926 Comm: modprobe No contaminado 6.11.0-rc2-wt-ath+ #1746 Nombre del hardware: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0067.2021.0528.1339 28/05/2021 Seguimiento de llamadas: dump_stack_lvl+0x7d/0xe0 direcci\u00f3n_de_impresi\u00f3n_descripci\u00f3n.constprop.0+0x33/0x3a0 informe_de_impresi\u00f3n+0xb5/0x260 ? direcci\u00f3n_kasan_a_losa+0x24/0x80 informe_kasan+0xd8/0x110 ? ath12k_dp_cc_cleanup.part.0+0x5e2/0xd40 [ath12k] ? ath12k_dp_cc_cleanup.part.0+0x5e2/0xd40 [ath12k] rango de comprobaci\u00f3n de kasan+0xf3/0x1a0 __comprobaci\u00f3n de escritura de kasan+0x14/0x20 ath12k_dp_cc_cleanup.part.0+0x5e2/0xd40 [ath12k] dp_free+0x178/0x420 [ath12k] n\u00facleo_detenci\u00f3n+0x176/0x200 [ath12k] n\u00facleo_deinit+0x13f/0x210 [ath12k] eliminaci\u00f3n de pci+0xad/0x1c0 [ath12k] eliminaci\u00f3n de dispositivo pci+0x9b/0x1b0 dispositivo_eliminar+0xbf/0x150 dispositivo_liberaci\u00f3n_controlador_interno+0x3c3/0x580 ? __kasan_check_read+0x11/0x20 controlador_desconectar+0xc4/0x190 bus_eliminar_controlador+0x130/0x2a0 controlador_anular_registro+0x68/0x90 pci_anular_registro_controlador+0x24/0x240 ? buscar_m\u00f3dulo_todos+0x13e/0x1e0 ath12k_pci_exit+0x10/0x20 [ath12k] __do_sys_eliminar_m\u00f3dulo+0x32c/0x580 ? m\u00f3dulo_indicadores+0x2f0/0x2f0 ? kmem_cache_libre+0xf0/0x410 ? __fput+0x56f/0xab0 ? __fput+0x56f/0xab0 ? debug_smp_processor_id+0x17/0x20 __x64_sys_delete_module+0x4f/0x70 x64_sys_call+0x522/0x9f0 do_syscall_64+0x64/0x130 entry_SYSCALL_64_after_hwframe+0x4b/0x53 RIP: 0033:0x7f8182c6ac8b Commit 24de1b7b231c (\"wifi: ath12k: corregir falla de vaciado en escenarios de recuperaci\u00f3n\") agreg\u00f3 el cambio para disminuir el conteo de paquetes pendientes en caso de recuperaci\u00f3n, lo que tiene sentido ya que ah->hw y todos los ar en \u00e9l est\u00e1n intactos durante la recuperaci\u00f3n, pero durante la desincializaci\u00f3n del n\u00facleo no tiene sentido disminuir el conteo de paquetes o despertar el waitq vac\u00edo ya que el m\u00f3dulo tambi\u00e9n se eliminar\u00e1. Los paquetes de skb pendientes no se pueden usar y los paquetes deber\u00edan simplemente liberarse. Para solucionar esto, evite acceder a ar desde skb->cb cuando se est\u00e1 anulando el registro del controlador. Probado en: QCN9274 hw2.0 PCI WLAN.WBE.1.1.1-00214-QCAHKSWPL_SILICONZ-1 Probado en: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/35be5018a2a4d1b07bdfcf957c81121d22d16355",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bdb281103373fd80eb5c91cede1e115ba270b4e9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e5e15c8b42923bfb6c84d3d906a9965d9a0f111d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.10",
|
||||
"versionEndExcluding": "6.11.11",
|
||||
"matchCriteriaId": "158A6B22-9260-41D7-965A-A81798A5A969"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/35be5018a2a4d1b07bdfcf957c81121d22d16355",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bdb281103373fd80eb5c91cede1e115ba270b4e9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e5e15c8b42923bfb6c84d3d906a9965d9a0f111d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56588",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T15:15:18.040",
|
||||
"lastModified": "2024-12-27T15:15:18.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:48:24.173",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,74 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: hisi_sas: Crear todos los archivos de volcado durante la inicializaci\u00f3n de debugfs Para el debugfs actual de hisi_sas, despu\u00e9s de que el usuario active el volcado, el controlador asigna espacio de memoria para guardar la informaci\u00f3n de registro y crear archivos de debugfs para mostrar la informaci\u00f3n guardada. En este proceso, los archivos de debugfs creados despu\u00e9s de cada volcado. Por lo tanto, cuando se activa el volcado mientras el controlador est\u00e1 desvinculado, se produce el siguiente bloqueo: [67840.853907] No se puede gestionar la desreferencia del puntero NULL del n\u00facleo en la direcci\u00f3n virtual 00000000000000a0 [67840.862947] Informaci\u00f3n de interrupci\u00f3n de memoria: [67840.865855] ESR = 0x0000000096000004 [67840.869713] EC = 0x25: DABT (EL actual), IL = 32 bits [67840.875125] SET = 0, FnV = 0 [67840.878291] EA = 0, S1PTW = 0 [67840.881545] FSC = 0x04: error de traducci\u00f3n de nivel 0 [67840.886528] Informaci\u00f3n de cancelaci\u00f3n de datos: [67840.889524] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [67840.895117] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [67840.900284] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [67840.905709] pgtable de usuario: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000002803a1f000 [67840.912263] [00000000000000a0] pgd=0000000000000000, p4d=0000000000000000 [67840.919177] Error interno: Oops: 0000000096000004 [#1] PREEMPT SMP [67840.996435] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [67841.003628] pc : down_write+0x30/0x98 [67841.007546] lr : start_creating.part.0+0x60/0x198 [67841.012495] sp : ffff8000b979ba20 [67841.016046] x29: ffff8000b979ba20 x28: 0000000000000010 x27: 0000000000024b40 [67841.023412] x26: 0000000000000012 x25: ffff20202b355ae8 x24: ffff20202b35a8c8 [67841.030779] x23: ffffa36877928208 x22: ffffa368b4972240 x21: ffff8000b979bb18 [67841.038147] x20: ffff00281dc1e3c0 x19: ffffffffffffffffe x18: 0000000000000020 [67841.045515] x17: 00000000000000000 x16: ffffa368b128a530 x15: ffffffffffffffff [67841.052888] x14: ffff8000b979bc18 x13: ffffffffffffffff x12: ffff8000b979bb18 [67841.060263] x11: 000000000000000 x10: 0000000000000000 x9: ffffa368b1289b18 [67841.067640] x8 : 0000000000000012 x7 : 0000000000000000 x6 : 00000000000003a9 [67841.075014] x5 : 0000000000000000 x4 : ffff002818c5cb00 x3 : 0000000000000001 [67841.082388] x2 : 000000000000000 x1 : ffff002818c5cb00 x0 : 00000000000000a0 [67841.089759] Seguimiento de llamadas: [67841.092456] escritura_inactiva+0x30/0x98 [67841.096017] creaci\u00f3n_iniciativa.parte.0+0x60/0x198 [67841.100613] creaci\u00f3n_directorio_debugfs+0x48/0x1f8 [67841.104950] creaci\u00f3n_archivos_debugfs_v3_hw+0x88/0x348 [hisi_sas_v3_hw] [67841.111447] registros_instant\u00e1neos_debugfs_v3_hw+0x708/0x798 [hisi_sas_v3_hw] [67841.118111] escritura_activadora_debugfs_v3_hw+0x9c/0x120 [hisi_sas_v3_hw] [67841.125115] escritura de proxy completo+0x68/0xc8 [67841.129175] escritura de vfs+0xd8/0x3f0 [67841.132708] escritura de ksys+0x70/0x108 [67841.136317] escritura de __arm64_sys+0x24/0x38 [67841.140440] llamada al sistema invocada+0x50/0x128 [67841.144385] el0_svc_common.constprop.0+0xc8/0xf0 [67841.149273] do_el0_svc+0x24/0x38 [67841.152773] el0_svc+0x38/0xd8 [67841.156009] el0t_64_sync_handler+0xc0/0xc8 [67841.160361] el0t_64_sync+0x1a4/0x1a8 [67841.164189] C\u00f3digo: b9000882 d2800002 d2800023 f9800011 (c85ffc05) [67841.170443] ---[ fin del seguimiento 000000000000000 ]--- Para solucionar este problema, cree todos los directorios y archivos durante la inicializaci\u00f3n de debugfs. De esta manera, el controlador solo necesita asignar espacio de memoria para guardar la informaci\u00f3n cada vez que el usuario activa el volcado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6c55f99123075e5429850b41b06f7dfffcb708eb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9f564f15f88490b484e02442dc4c4b11640ea172",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.12.5",
|
||||
"matchCriteriaId": "75E05E0A-C898-433A-8E50-6D9EC8646A64"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6c55f99123075e5429850b41b06f7dfffcb708eb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9f564f15f88490b484e02442dc4c4b11640ea172",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56599",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T15:15:19.307",
|
||||
"lastModified": "2024-12-27T15:15:19.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:48:04.090",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,74 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath10k: evitar error de puntero NULL durante la eliminaci\u00f3n de sdio Al ejecutar 'rmmod ath10k', ath10k_sdio_remove() liberar\u00e1 la cola de trabajo de sdio mediante destroy_workqueue(). Pero si CONFIG_INIT_ON_FREE_DEFAULT_ON est\u00e1 configurado en s\u00ed, se producir\u00e1 un p\u00e1nico del kernel: Rastreo de llamada: destroy_workqueue+0x1c/0x258 ath10k_sdio_remove+0x84/0x94 sdio_bus_remove+0x50/0x16c device_release_driver_internal+0x188/0x25c device_driver_detach+0x20/0x2c Esto se debe a que durante 'rmmod ath10k', ath10k_sdio_remove() llamar\u00e1 a ath10k_core_destroy() antes de destroy_workqueue(). wiphy_dev_release() finalmente se llamar\u00e1 en ath10k_core_destroy(). Esta funci\u00f3n liberar\u00e1 la estructura cfg80211_registered_device *rdev y todos sus miembros, incluidos wiphy, dev y el puntero de sdio workqueue. Luego, el puntero de sdio workqueue se establecer\u00e1 en NULL debido a CONFIG_INIT_ON_FREE_DEFAULT_ON. Despu\u00e9s de liberar el dispositivo, destroy_workqueue() usar\u00e1 el puntero NULL y luego se producir\u00e1 el p\u00e1nico del kernel. Rastreo de llamadas: ath10k_sdio_remove ->ath10k_core_unregister \u2026\u2026 ->ath10k_core_stop ->ath10k_hif_stop ->ath10k_sdio_irq_disable ->ath10k_hif_power_down ->del_timer_sync(&ar_sdio->sleep_timer) ->ath10k_core_destroy ->ath10k_mac_destroy ->ieee80211_free_hw ->wiphy_free \u2026\u2026 ->wiphy_dev_release ->destroy_workqueue Es necesario llamar a destroy_workqueue() antes de ath10k_core_destroy(), primero liberar el b\u00fafer de la cola de trabajo y luego liberar el puntero de la cola de trabajo mediante ath10k_core_destroy(). Este orden coincide con el orden de la ruta de error en ath10k_sdio_probe(). No se pondr\u00e1 en cola ning\u00fan trabajo en la cola de trabajo de sdio entre su destrucci\u00f3n y la llamada a ath10k_core_destroy(). Seg\u00fan la pila de llamadas anterior, el motivo es el siguiente: solo ath10k_sdio_sleep_timer_handler(), ath10k_sdio_hif_tx_sg() y ath10k_sdio_irq_disable() pondr\u00e1n en cola el trabajo en la cola de trabajo de sdio. El temporizador de suspensi\u00f3n se eliminar\u00e1 antes de ath10k_core_destroy() en ath10k_hif_power_down(). ath10k_sdio_irq_disable() solo se llamar\u00e1 en ath10k_hif_stop(). ath10k_core_unregister() llamar\u00e1 a ath10k_hif_power_down() para detener el bus hif, por lo que ya no se llamar\u00e1 ath10k_sdio_hif_tx_sg(). Probado en: QCA6174 hw3.2 SDIO WLAN.RMH.4.4.1-00189"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/543c0924d446b21f35701ca084d7feca09511220",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/95c38953cb1ecf40399a676a1f85dfe2b5780a9a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.12.5",
|
||||
"matchCriteriaId": "75E05E0A-C898-433A-8E50-6D9EC8646A64"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/543c0924d446b21f35701ca084d7feca09511220",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/95c38953cb1ecf40399a676a1f85dfe2b5780a9a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56606",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T15:15:20.087",
|
||||
"lastModified": "2024-12-27T15:15:20.087",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:46:59.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,144 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: af_packet: evitar errores despu\u00e9s de sock_init_data() en packet_create() Despu\u00e9s de sock_init_data(), el objeto sk asignado se adjunta al objeto sock proporcionado. En caso de error, packet_create() libera el objeto sk dejando el puntero colgando en el objeto sock al regresar. Es posible que alg\u00fan otro c\u00f3digo intente usar este puntero y provoque un error de use-after-free."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/132e615bb1d7cdec2d3cfbdec2efa630e923fd21",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/157f08db94123e2ba56877dd0ac88908b13a5dd0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1dc1e1db927056cb323296e2294a855cd003dfe7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/46f2a11cb82b657fd15bab1c47821b635e03838b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/71b22837a5e55ac27d6a14b9cdf2326587405c4f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a6cf750b737374454a4e03a5ed449a3eb0c96414",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fd09880b16d33aa5a7420578e01cd79148fa9829",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.4.287",
|
||||
"matchCriteriaId": "DC7D5C80-B677-4131-A399-3366D7F3961C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.231",
|
||||
"matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.174",
|
||||
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.120",
|
||||
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.66",
|
||||
"matchCriteriaId": "29A976AD-B9AB-4A95-9F08-7669F8847EB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.5",
|
||||
"matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/132e615bb1d7cdec2d3cfbdec2efa630e923fd21",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/157f08db94123e2ba56877dd0ac88908b13a5dd0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1dc1e1db927056cb323296e2294a855cd003dfe7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/46f2a11cb82b657fd15bab1c47821b635e03838b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/71b22837a5e55ac27d6a14b9cdf2326587405c4f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a6cf750b737374454a4e03a5ed449a3eb0c96414",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fd09880b16d33aa5a7420578e01cd79148fa9829",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56623",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T15:15:21.823",
|
||||
"lastModified": "2024-12-27T15:15:21.823",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:41:01.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,135 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: qla2xxx: Se corrige el use-after-free en la descarga Se observa un fallo del sistema con una advertencia de seguimiento de la pila de use-after-free. Hay 2 se\u00f1ales para indicar a dpc_thread que finalice (indicador UNLOADING y kthread_stop). Al establecer el indicador UNLOADING cuando dpc_thread se est\u00e1 ejecutando en ese momento y ve el indicador, esto hace que dpc_thread salga y se limpie a s\u00ed mismo. Cuando se llama a kthread_stop para la desinfecci\u00f3n final, esto provoca el use-after-free. Eliminar la se\u00f1al UNLOADING para finalizar dpc_thread. Usar kthread_stop como la se\u00f1al principal para salir de dpc_thread. [596663.812935] \u00a1ERROR del kernel en mm/slub.c:294! [596663.812950] C\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] SMP PTI [596663.812957] CPU: 13 PID: 1475935 Comm: rmmod Kdump: cargado Contaminado: G IOE --------- - - 4.18.0-240.el8.x86_64 #1 [596663.812960] Nombre del hardware: HP ProLiant DL380p Gen8, BIOS P70 20/08/2012 [596663.812974] RIP: 0010:__slab_free+0x17d/0x360 ... [596663.813008] Seguimiento de llamadas: [596663.813022] ? esperar_a_finalizaci\u00f3n+0x35/0x190 [596663.813048] ? intentar_activar+0x63/0x540 [596663.813055] tarea_libre+0x5a/0x60 [596663.813061] kthread_stop+0xf3/0x100 [596663.813103] qla2x00_eliminar_uno+0x284/0x440 [qla2xxx]"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/07c903db0a2ff84b68efa1a74a4de353ea591eb0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/12f04fc8580eafb0510f805749553eb6213f323e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/15369e774f27ec790f207de87c0b541e3f90b22d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6abf16d3c915b2feb68c1c8b25fcb71b13f98478",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b3e6f25176f248762a24d25ab8cf8c5e90874f80",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ca36d9d53745d5ec8946ef85006d4da605ea7c54",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.10.231",
|
||||
"matchCriteriaId": "2334FDBC-71D6-4D4A-AD2C-CF092C82C68A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.174",
|
||||
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.120",
|
||||
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.66",
|
||||
"matchCriteriaId": "29A976AD-B9AB-4A95-9F08-7669F8847EB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.5",
|
||||
"matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/07c903db0a2ff84b68efa1a74a4de353ea591eb0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/12f04fc8580eafb0510f805749553eb6213f323e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/15369e774f27ec790f207de87c0b541e3f90b22d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6abf16d3c915b2feb68c1c8b25fcb71b13f98478",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b3e6f25176f248762a24d25ab8cf8c5e90874f80",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ca36d9d53745d5ec8946ef85006d4da605ea7c54",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56631",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T15:15:22.690",
|
||||
"lastModified": "2024-12-27T15:15:22.690",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:37:59.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,94 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme-tcp: corrige la fuga de memoria cuando falla la creaci\u00f3n de un nuevo control Ahora, aunque falla la creaci\u00f3n de un nuevo control, no hemos liberado el conjunto de etiquetas ocupado por admin_q, aqu\u00ed intentamos solucionarlo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1f5e2f1ca5875728fcf62bc1a054707444ab4960",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/59b30afa578637169e2819536bb66459fdddc39d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f10593ad9bc36921f623361c9e3dd96bd52d85ee",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.16.85",
|
||||
"versionEndExcluding": "6.6.66",
|
||||
"matchCriteriaId": "01F1098C-DC37-41C5-B4D0-1D3B0B04ED49"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.5",
|
||||
"matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1f5e2f1ca5875728fcf62bc1a054707444ab4960",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/59b30afa578637169e2819536bb66459fdddc39d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f10593ad9bc36921f623361c9e3dd96bd52d85ee",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56642",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T15:15:23.930",
|
||||
"lastModified": "2024-12-27T15:15:23.930",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:37:23.950",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,150 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tipc: Se corrige el use-after-free del socket del kernel en cleanup_bearer(). syzkaller inform\u00f3 un use-after-free del socket del kernel UDP en cleanup_bearer() sin reproducci\u00f3n. [0][1] Cuando bearer_disable() llama a tipc_udp_disable(), la desinfecci\u00f3n del socket del kernel UDP se pospone mediante el trabajo que llama a cleanup_bearer(). tipc_net_stop() espera a que finalicen dichos trabajos comprobando tipc_net(net)->wq_count. Sin embargo, el trabajo disminuye el recuento demasiado pronto antes de liberar el socket del kernel, desbloqueando cleanup_net() y dando como resultado un use-after-free. Muevamos la disminuci\u00f3n despu\u00e9s de liberar el socket en cleanup_bearer(). [0]: ref_tracker: net notrefcnt@000000009b3d1faf tiene 1/1 usuarios en sk_alloc+0x438/0x608 inet_create+0x4c8/0xcb0 __sock_create+0x350/0x6b8 sock_create_kern+0x58/0x78 udp_sock_create4+0x68/0x398 udp_sock_create+0x88/0xc8 tipc_udp_enable+0x5e8/0x848 __tipc_nl_bearer_enable+0x84c/0xed8 tipc_nl_bearer_enable+0x38/0x60 genl_family_rcv_msg_doit+0x170/0x248 genl_rcv_msg+0x400/0x5b0 netlink_rcv_skb+0x1dc/0x398 genl_rcv+0x44/0x68 netlink_unicast+0x678/0x8b0 netlink_sendmsg+0x5e4/0x898 ____sys_sendmsg+0x500/0x830 [1]: ERROR: KMSAN: use-after-free en udp_hashslot include/net/udp.h:85 [en l\u00ednea] ERROR: KMSAN: use-after-free en udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979 udp_hashslot include/net/udp.h:85 [en l\u00ednea] udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979 sk_common_release+0xaf/0x3f0 net/core/sock.c:3820 inet_release+0x1e0/0x260 net/ipv4/af_inet.c:437 inet6_release+0x6f/0xd0 net/ipv6/af_inet6.c:489 __sock_release net/socket.c:658 [en l\u00ednea] sock_release+0xa0/0x210 net/socket.c:686 cleanup_bearer+0x42d/0x4c0 net/tipc/udp_media.c:819 proceso_one_work kernel/workqueue.c:3229 [en l\u00ednea] proceso_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310 worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391 kthread+0x531/0x6b0 kernel/kthread.c:389 ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244 Uninit se cre\u00f3 en: slab_free_hook mm/slub.c:2269 [en l\u00ednea] slab_free mm/slub.c:4580 [en l\u00ednea] kmem_cache_free+0x207/0xc40 mm/slub.c:4682 net_free net/core/net_namespace.c:454 [en l\u00ednea] cleanup_net+0x16f2/0x19d0 net/core/net_namespace.c:647 process_one_work kernel/workqueue.c:3229 [en l\u00ednea] process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310 worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391 kthread+0x531/0x6b0 kernel/kthread.c:389 ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244 CPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 No contaminado 6.12.0-rc1-00131-gf66ebf37d69c #7 91723d6f74857f70725e1583cba3cf4adc716cfa Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 01/04/2014 Cola de trabajo: eventos cleanup_bearer"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4e69457f9dfae67435f3ccf29008768eae860415",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/650ee9a22d7a2de8999fac2d45983597a0c22359",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6a2fa13312e51a621f652d522d7e2df7066330b6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d00d4470bf8c4282617a3a10e76b20a9c7e4cffa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d2a4894f238551eae178904e7f45af87577074fd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d62d5180c036eeac09f80660edc7a602b369125f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e48b211c4c59062cb6dd6c2c37c51a7cc235a464",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "5.4.287",
|
||||
"matchCriteriaId": "7446589C-7AB5-4517-9C06-B453135BFA99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.231",
|
||||
"matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.174",
|
||||
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.120",
|
||||
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.66",
|
||||
"matchCriteriaId": "29A976AD-B9AB-4A95-9F08-7669F8847EB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.5",
|
||||
"matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4e69457f9dfae67435f3ccf29008768eae860415",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/650ee9a22d7a2de8999fac2d45983597a0c22359",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6a2fa13312e51a621f652d522d7e2df7066330b6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d00d4470bf8c4282617a3a10e76b20a9c7e4cffa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d2a4894f238551eae178904e7f45af87577074fd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d62d5180c036eeac09f80660edc7a602b369125f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e48b211c4c59062cb6dd6c2c37c51a7cc235a464",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5828",
|
||||
"sourceIdentifier": "hirt@hitachi.co.jp",
|
||||
"published": "2024-08-06T03:15:30.103",
|
||||
"lastModified": "2024-08-06T16:30:24.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:25:28.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,12 +69,65 @@
|
||||
"value": "CWE-917"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-917"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachi:tuning_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.8.7-00",
|
||||
"matchCriteriaId": "2DA2B94C-AA9C-4915-AA8D-689178EF1723"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "91F372EA-3A78-4703-A457-751B2C98D796"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-140/index.html",
|
||||
"source": "hirt@hitachi.co.jp"
|
||||
"source": "hirt@hitachi.co.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6824",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T06:15:41.067",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:19:51.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,24 +49,64 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.10.39",
|
||||
"matchCriteriaId": "F23D4A06-F1CA-428D-A1F1-8CB176220120"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/includes/addons-integration.php#L159",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/includes/addons-integration.php#L184",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3131564/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b2840b9e-1baf-460c-ba11-43e4279ece27?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7548",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T06:15:42.170",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-08T21:07:57.303",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,32 +69,78 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.2.6.9.4",
|
||||
"matchCriteriaId": "664705A5-B30F-4087-914F-244A8DAA51B7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.svn.wordpress.org/learnpress/tags/4.2.6.9.3/inc/curds/class-lp-course-curd.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/learnpress/trunk/inc/curds/class-lp-course-curd.php#L828",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3132002/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3132019/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/learnpress/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/702715a9-b180-4d31-a1df-37b732ae8226?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-221xx/CVE-2025-22145.json
Normal file
82
CVE-2025/CVE-2025-221xx/CVE-2025-22145.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-22145",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-08T21:15:13.480",
|
||||
"lastModified": "2025-01-08T21:15:13.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Carbon is an international PHP extension for DateTime. Application passing unsanitized user input to Carbon::setLocale are at risk of arbitrary file include, if the application allows users to upload files with .php extension in an folder that allows include or require to read it, then they are at risk of arbitrary code ran on their servers. This vulnerability is fixed in 3.8.4 and 2.72.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-98"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/CarbonPHP/carbon/security/advisories/GHSA-j3f9-p6hm-5w6q",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/briannesbitt/Carbon/commit/129700ed449b1f02d70272d2ac802357c8c30c58",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
80
README.md
80
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-01-08T21:00:19.924394+00:00
|
||||
2025-01-08T23:00:19.694682+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-01-08T20:58:28.473000+00:00
|
||||
2025-01-08T22:15:28.060000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,58 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
276333
|
||||
276339
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-13188](CVE-2024/CVE-2024-131xx/CVE-2024-13188.json) (`2025-01-08T19:15:30.840`)
|
||||
- [CVE-2024-13189](CVE-2024/CVE-2024-131xx/CVE-2024-13189.json) (`2025-01-08T20:15:27.353`)
|
||||
- [CVE-2024-45342](CVE-2024/CVE-2024-453xx/CVE-2024-45342.json) (`2025-01-08T20:15:27.583`)
|
||||
- [CVE-2024-45343](CVE-2024/CVE-2024-453xx/CVE-2024-45343.json) (`2025-01-08T20:15:27.690`)
|
||||
- [CVE-2024-45344](CVE-2024/CVE-2024-453xx/CVE-2024-45344.json) (`2025-01-08T20:15:27.753`)
|
||||
- [CVE-2024-45345](CVE-2024/CVE-2024-453xx/CVE-2024-45345.json) (`2025-01-08T20:15:27.843`)
|
||||
- [CVE-2024-53526](CVE-2024/CVE-2024-535xx/CVE-2024-53526.json) (`2025-01-08T19:15:37.753`)
|
||||
- [CVE-2024-54818](CVE-2024/CVE-2024-548xx/CVE-2024-54818.json) (`2025-01-08T19:15:38.290`)
|
||||
- [CVE-2025-0194](CVE-2025/CVE-2025-01xx/CVE-2025-0194.json) (`2025-01-08T20:15:29.193`)
|
||||
- [CVE-2025-0291](CVE-2025/CVE-2025-02xx/CVE-2025-0291.json) (`2025-01-08T19:15:38.420`)
|
||||
- [CVE-2025-22139](CVE-2025/CVE-2025-221xx/CVE-2025-22139.json) (`2025-01-08T19:15:38.717`)
|
||||
- [CVE-2025-22140](CVE-2025/CVE-2025-221xx/CVE-2025-22140.json) (`2025-01-08T19:15:38.863`)
|
||||
- [CVE-2025-22141](CVE-2025/CVE-2025-221xx/CVE-2025-22141.json) (`2025-01-08T19:15:39.017`)
|
||||
- [CVE-2025-22143](CVE-2025/CVE-2025-221xx/CVE-2025-22143.json) (`2025-01-08T20:15:30.003`)
|
||||
- [CVE-2024-12431](CVE-2024/CVE-2024-124xx/CVE-2024-12431.json) (`2025-01-08T21:15:11.760`)
|
||||
- [CVE-2024-13190](CVE-2024/CVE-2024-131xx/CVE-2024-13190.json) (`2025-01-08T21:15:12.303`)
|
||||
- [CVE-2024-52869](CVE-2024/CVE-2024-528xx/CVE-2024-52869.json) (`2025-01-08T21:15:12.523`)
|
||||
- [CVE-2024-53995](CVE-2024/CVE-2024-539xx/CVE-2024-53995.json) (`2025-01-08T21:15:12.703`)
|
||||
- [CVE-2024-54010](CVE-2024/CVE-2024-540xx/CVE-2024-54010.json) (`2025-01-08T21:15:12.900`)
|
||||
- [CVE-2025-22145](CVE-2025/CVE-2025-221xx/CVE-2025-22145.json) (`2025-01-08T21:15:13.480`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `54`
|
||||
Recently modified CVEs: `41`
|
||||
|
||||
- [CVE-2024-30056](CVE-2024/CVE-2024-300xx/CVE-2024-30056.json) (`2025-01-08T20:20:05.590`)
|
||||
- [CVE-2024-3018](CVE-2024/CVE-2024-30xx/CVE-2024-3018.json) (`2025-01-08T19:35:58.073`)
|
||||
- [CVE-2024-31894](CVE-2024/CVE-2024-318xx/CVE-2024-31894.json) (`2025-01-08T19:58:17.603`)
|
||||
- [CVE-2024-31895](CVE-2024/CVE-2024-318xx/CVE-2024-31895.json) (`2025-01-08T20:03:38.133`)
|
||||
- [CVE-2024-3333](CVE-2024/CVE-2024-33xx/CVE-2024-3333.json) (`2025-01-08T19:43:24.987`)
|
||||
- [CVE-2024-38163](CVE-2024/CVE-2024-381xx/CVE-2024-38163.json) (`2025-01-08T20:50:00.877`)
|
||||
- [CVE-2024-38218](CVE-2024/CVE-2024-382xx/CVE-2024-38218.json) (`2025-01-08T20:58:28.473`)
|
||||
- [CVE-2024-40427](CVE-2024/CVE-2024-404xx/CVE-2024-40427.json) (`2025-01-08T19:15:31.043`)
|
||||
- [CVE-2024-41713](CVE-2024/CVE-2024-417xx/CVE-2024-41713.json) (`2025-01-08T20:31:25.237`)
|
||||
- [CVE-2024-42426](CVE-2024/CVE-2024-424xx/CVE-2024-42426.json) (`2025-01-08T20:06:04.867`)
|
||||
- [CVE-2024-4378](CVE-2024/CVE-2024-43xx/CVE-2024-4378.json) (`2025-01-08T20:07:57.800`)
|
||||
- [CVE-2024-4563](CVE-2024/CVE-2024-45xx/CVE-2024-4563.json) (`2025-01-08T19:51:35.093`)
|
||||
- [CVE-2024-46601](CVE-2024/CVE-2024-466xx/CVE-2024-46601.json) (`2025-01-08T20:15:27.920`)
|
||||
- [CVE-2024-4971](CVE-2024/CVE-2024-49xx/CVE-2024-4971.json) (`2025-01-08T19:28:26.847`)
|
||||
- [CVE-2024-51442](CVE-2024/CVE-2024-514xx/CVE-2024-51442.json) (`2025-01-08T20:15:28.137`)
|
||||
- [CVE-2024-53564](CVE-2024/CVE-2024-535xx/CVE-2024-53564.json) (`2025-01-08T19:15:38.050`)
|
||||
- [CVE-2024-55008](CVE-2024/CVE-2024-550xx/CVE-2024-55008.json) (`2025-01-08T20:15:28.467`)
|
||||
- [CVE-2024-55411](CVE-2024/CVE-2024-554xx/CVE-2024-55411.json) (`2025-01-08T20:15:28.640`)
|
||||
- [CVE-2024-55517](CVE-2024/CVE-2024-555xx/CVE-2024-55517.json) (`2025-01-08T20:15:28.810`)
|
||||
- [CVE-2024-55550](CVE-2024/CVE-2024-555xx/CVE-2024-55550.json) (`2025-01-08T20:46:01.203`)
|
||||
- [CVE-2024-55556](CVE-2024/CVE-2024-555xx/CVE-2024-55556.json) (`2025-01-08T20:15:28.987`)
|
||||
- [CVE-2024-7063](CVE-2024/CVE-2024-70xx/CVE-2024-7063.json) (`2025-01-08T20:33:37.817`)
|
||||
- [CVE-2024-7064](CVE-2024/CVE-2024-70xx/CVE-2024-7064.json) (`2025-01-08T20:30:58.207`)
|
||||
- [CVE-2024-7092](CVE-2024/CVE-2024-70xx/CVE-2024-7092.json) (`2025-01-08T20:53:45.230`)
|
||||
- [CVE-2025-20126](CVE-2025/CVE-2025-201xx/CVE-2025-20126.json) (`2025-01-08T19:15:38.553`)
|
||||
- [CVE-2023-34258](CVE-2023/CVE-2023-342xx/CVE-2023-34258.json) (`2025-01-08T22:15:28.060`)
|
||||
- [CVE-2024-13187](CVE-2024/CVE-2024-131xx/CVE-2024-13187.json) (`2025-01-08T21:15:11.973`)
|
||||
- [CVE-2024-13189](CVE-2024/CVE-2024-131xx/CVE-2024-13189.json) (`2025-01-08T21:15:12.157`)
|
||||
- [CVE-2024-3500](CVE-2024/CVE-2024-35xx/CVE-2024-3500.json) (`2025-01-08T21:22:53.997`)
|
||||
- [CVE-2024-3647](CVE-2024/CVE-2024-36xx/CVE-2024-3647.json) (`2025-01-08T21:10:47.357`)
|
||||
- [CVE-2024-3675](CVE-2024/CVE-2024-36xx/CVE-2024-3675.json) (`2025-01-08T21:11:01.357`)
|
||||
- [CVE-2024-3728](CVE-2024/CVE-2024-37xx/CVE-2024-3728.json) (`2025-01-08T21:11:21.157`)
|
||||
- [CVE-2024-38182](CVE-2024/CVE-2024-381xx/CVE-2024-38182.json) (`2025-01-08T21:35:17.920`)
|
||||
- [CVE-2024-42107](CVE-2024/CVE-2024-421xx/CVE-2024-42107.json) (`2025-01-08T21:32:03.527`)
|
||||
- [CVE-2024-46715](CVE-2024/CVE-2024-467xx/CVE-2024-46715.json) (`2025-01-08T21:30:44.227`)
|
||||
- [CVE-2024-53199](CVE-2024/CVE-2024-531xx/CVE-2024-53199.json) (`2025-01-08T21:29:46.280`)
|
||||
- [CVE-2024-53200](CVE-2024/CVE-2024-532xx/CVE-2024-53200.json) (`2025-01-08T21:29:35.877`)
|
||||
- [CVE-2024-53201](CVE-2024/CVE-2024-532xx/CVE-2024-53201.json) (`2025-01-08T21:26:58.670`)
|
||||
- [CVE-2024-53207](CVE-2024/CVE-2024-532xx/CVE-2024-53207.json) (`2025-01-08T21:26:42.470`)
|
||||
- [CVE-2024-53222](CVE-2024/CVE-2024-532xx/CVE-2024-53222.json) (`2025-01-08T21:25:39.027`)
|
||||
- [CVE-2024-56541](CVE-2024/CVE-2024-565xx/CVE-2024-56541.json) (`2025-01-08T21:25:24.730`)
|
||||
- [CVE-2024-56588](CVE-2024/CVE-2024-565xx/CVE-2024-56588.json) (`2025-01-08T21:48:24.173`)
|
||||
- [CVE-2024-56599](CVE-2024/CVE-2024-565xx/CVE-2024-56599.json) (`2025-01-08T21:48:04.090`)
|
||||
- [CVE-2024-56606](CVE-2024/CVE-2024-566xx/CVE-2024-56606.json) (`2025-01-08T21:46:59.767`)
|
||||
- [CVE-2024-56623](CVE-2024/CVE-2024-566xx/CVE-2024-56623.json) (`2025-01-08T21:41:01.397`)
|
||||
- [CVE-2024-56631](CVE-2024/CVE-2024-566xx/CVE-2024-56631.json) (`2025-01-08T21:37:59.833`)
|
||||
- [CVE-2024-56642](CVE-2024/CVE-2024-566xx/CVE-2024-56642.json) (`2025-01-08T21:37:23.950`)
|
||||
- [CVE-2024-5828](CVE-2024/CVE-2024-58xx/CVE-2024-5828.json) (`2025-01-08T21:25:28.967`)
|
||||
- [CVE-2024-6824](CVE-2024/CVE-2024-68xx/CVE-2024-6824.json) (`2025-01-08T21:19:51.450`)
|
||||
- [CVE-2024-7548](CVE-2024/CVE-2024-75xx/CVE-2024-7548.json) (`2025-01-08T21:07:57.303`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
222
_state.csv
222
_state.csv
@ -152302,7 +152302,7 @@ CVE-2020-19005,0,0,ab897d7bae864ef6f93bc39fbd569a81f3650a4fb53896debfa1acd48d348
|
||||
CVE-2020-19007,0,0,73c70e4fa5aa84add79bda9f8fd3e38f1444b0421a2d4d2a517a6fb327e33836,2024-11-21T05:08:54.960000
|
||||
CVE-2020-1901,0,0,e06c9f11493b95621cd15930103d8e83cd066c4f05215b62ee532e25f0cb1c5d,2024-11-21T05:11:34.657000
|
||||
CVE-2020-1902,0,0,7c311a5c7fe365faf83e939f334f13f2b95322f85a499bcb9fa6e4733bd54120,2024-11-21T05:11:34.770000
|
||||
CVE-2020-19028,0,1,b68fb95ee99f80bf5d31aab3ef0be833e0974202cc0d507656518c984b78829a,2025-01-08T20:15:23.773000
|
||||
CVE-2020-19028,0,0,b68fb95ee99f80bf5d31aab3ef0be833e0974202cc0d507656518c984b78829a,2025-01-08T20:15:23.773000
|
||||
CVE-2020-1903,0,0,c42d640c3f11acc24bdcbe58642d888ec3cb76349f7ba0288dd86c4f3c82bf38,2024-11-21T05:11:34.883000
|
||||
CVE-2020-19037,0,0,9918c618cf7d872b1eca89f4955ebfb139dfa333cc68f26536dd2a074a25c637,2024-11-21T05:08:55.237000
|
||||
CVE-2020-19038,0,0,4422b6fc956d725b535653951fb526eb5a39ebd0d7dc779d42bb5afbd24263b0,2024-11-21T05:08:55.377000
|
||||
@ -212874,7 +212874,7 @@ CVE-2022-48880,0,0,535014dc78a0cf3939da51e6f231a7ecade974f110d4883d643255c8fd017
|
||||
CVE-2022-48881,0,0,2645da7071fdb14e6913f56300863e68eef81fb1507e67b634c5f31083ac9e96,2024-08-29T02:39:19.137000
|
||||
CVE-2022-48882,0,0,1c742069183e85b6b210f0b65540103f483c42f44a324d5c2bbdae26d5c22494,2024-08-29T02:36:29.837000
|
||||
CVE-2022-48883,0,0,393ba512ffb574163a9f61b49138c9f5fd99ee611a3c62b415a0eaf8e576afe0,2024-08-21T12:30:33.697000
|
||||
CVE-2022-48884,0,0,442f30c7bc460d0b750d0d62192aad9e98cf9980141831c7f81e4f22265a3feb,2024-08-21T12:30:33.697000
|
||||
CVE-2022-48884,0,1,2747b4a935f17932d0849706158ea692225fdab7f007c66500b40f96230ee3fc,2025-01-08T21:31:21.570000
|
||||
CVE-2022-48885,0,0,b284058346751b2d4ecb15aa499f99630bc2f3d2cd27241c29ff74c88fadba87,2024-09-06T14:46:30.067000
|
||||
CVE-2022-48886,0,0,49d446060ccd62b8f9e1b32ac19359b9b5c01c0a51fda0b24e979df2bde795c2,2024-09-06T14:48:20.907000
|
||||
CVE-2022-48887,0,0,0ebc52eb04e26fa1d67583c38ab688f40c02a8e8357b4265385eb0186cf96da0,2024-09-06T14:55:46.460000
|
||||
@ -221358,7 +221358,7 @@ CVE-2023-27637,0,0,e336980e21c9f457fefe8b00c6dda3939956833d62bee8b874a32a0474274
|
||||
CVE-2023-27638,0,0,f9b8c74c29ed470086db04fe0ea2dc288af15cae523377e09d3050be9363d63c,2024-11-21T07:53:19.187000
|
||||
CVE-2023-27639,0,0,b9b7fbcf72b1364d7c314c995a4deac6aab0189112e61f86cad57476b0718b9f,2024-11-21T07:53:19.347000
|
||||
CVE-2023-2764,0,0,b60275bd60dae63771cfc63f6038367441d1d2a394ae81d73e693a63f3a17bc0,2024-11-21T07:59:14.770000
|
||||
CVE-2023-27640,0,0,502266dfa0839523fda8e3eb0d2ea4d1ea5c27d600e299a5e2b5f123ad16da62,2024-11-21T07:53:19.497000
|
||||
CVE-2023-27640,0,1,942d90eefd00ea0707349532a745b9ab0786557b6735d3ecc97aba150d6ceb39,2025-01-08T21:15:07.413000
|
||||
CVE-2023-27641,0,0,5df162186f1274a845e27d66cd560b269e038240b9ef162aab5bf59d5bce9e40,2024-11-21T07:53:19.640000
|
||||
CVE-2023-27643,0,0,58c01c0b7d14a29d67f4be239a74aca8ba60b7220eaa8e733dcec8e8179e6136,2024-11-21T07:53:19.793000
|
||||
CVE-2023-27645,0,0,5b93f3d4aaabe38d4ec4eed48e7fd65f8548a8d48c1794c83f9c87c33ac9698a,2024-11-21T07:53:19.947000
|
||||
@ -221804,8 +221804,8 @@ CVE-2023-28172,0,0,c971a8ffe820c495e5a005caaab04191ab2777add820e67940f9775e21eba
|
||||
CVE-2023-28173,0,0,68af7f906f41eb034da2d8723326e071179b29f81e4962576aee3639787e04e8,2024-11-21T07:54:32.010000
|
||||
CVE-2023-28174,0,0,0395f476edf5e053e887a9f7995d741a62bb05f347b95557bd275ffdeacef88f,2024-11-21T07:54:32.137000
|
||||
CVE-2023-28175,0,0,5522213ae06f55fcc5fb60c67fd4792ba0f4a7a1d16d7415fe6640350e531681,2024-11-21T07:54:32.270000
|
||||
CVE-2023-28176,0,0,64aa2f78c2b021e48b0729a70932536afb67c7a5b590937c7bc2e491af2c742a,2024-11-21T07:54:32.463000
|
||||
CVE-2023-28177,0,0,9eb43263c394b13747a003475f6d282a664de82a606e534bf935ab9c4aca3786,2024-11-21T07:54:32.600000
|
||||
CVE-2023-28176,0,1,62a0a9c58e2435a209c4f3085fefb1280d27fb30a4a014e46c3d70a90f340edb,2025-01-08T21:15:07.713000
|
||||
CVE-2023-28177,0,1,65a46b6aac6840bf6058fecd18ecc397b5c70e9cb15c480d5f5265c0a0e11af7,2025-01-08T21:15:07.957000
|
||||
CVE-2023-28178,0,0,bea5f49c485e4cbec3e11cd8d816ba700342509178a6f14df66ec06a05ec4418,2024-12-12T14:26:18.893000
|
||||
CVE-2023-28179,0,0,870008b95a647a1114870423bafa8a6a05fdcb978c8b81dd449c39ea8b394b6f,2024-11-21T07:54:32.867000
|
||||
CVE-2023-2818,0,0,735a9c6bb7b4e983aea153a48d7553aa85a0db10d10608cbd385e641830a2924,2024-11-21T07:59:20.993000
|
||||
@ -222094,7 +222094,7 @@ CVE-2023-28465,0,0,f2b530e3ae30a0bb6b76ed5bd7417a86aef68184d54e0a70da965a05dae4d
|
||||
CVE-2023-28466,0,0,a0d431d4a76aa54689e1dd1a48468708196338801f99241ccd92ad446584b06b,2024-11-21T07:55:08.660000
|
||||
CVE-2023-28467,0,0,00f2e50435ec08a76fcdfe79697aea51cf3a5fa0a62e71b20272c0e161290ea2,2024-11-21T07:55:08.857000
|
||||
CVE-2023-28468,0,0,96975a0a127d2e1308e38dfacce8610caf2fe1c7c28a726f1dd9bf495a52d4be,2024-11-21T07:55:09.023000
|
||||
CVE-2023-28469,0,0,89f0ccc5ca95c5b9d4f3cdd327b44147873a5a865de22a4164e45e73e6605c19,2024-11-21T07:55:09.303000
|
||||
CVE-2023-28469,0,1,0e8e15eaaeef38b9abb6c4c854adc4acb06a0654baf76b4a675b00f934b24a21,2025-01-08T21:15:08.143000
|
||||
CVE-2023-2847,0,0,171c10115b3eac66e6e79455e19407d7bfce7799ec4038965923726ba3c8a70f,2024-11-21T07:59:24.787000
|
||||
CVE-2023-28470,0,0,9d567ab6721f57a3406c965afb5401ac3dae98fb4a09fb7b4db2db7aad561d2f,2024-11-21T07:55:09.477000
|
||||
CVE-2023-28471,0,0,8daaeda9496d256b8e2255ec3ed761d131af853b2f18ae972ed7dfd52b12aae3,2024-11-21T07:55:09.727000
|
||||
@ -223099,7 +223099,7 @@ CVE-2023-29548,0,0,00e902680bbcecab5106b6846ed6e510d2721dffb60f34398345ef8db9326
|
||||
CVE-2023-29549,0,0,4e4192b4015dfe410378a0838eaec5c6eacfc95fba4abbebc809259190d6e4a5,2024-11-21T07:57:16.700000
|
||||
CVE-2023-2955,0,0,9c0e18923443b98b3624f6a20eb4112985b6c80a66e21eac353915004989baf6,2024-11-21T07:59:38.587000
|
||||
CVE-2023-29550,0,0,e4f3c9ebf56266ae93a8b7654d890809fa02038cee320637c5e05da2e3b4034c,2024-11-21T07:57:16.793000
|
||||
CVE-2023-29551,0,0,228f453bf40162e0ca56f9725a8243132d56c710990db765203fc98361e41d2b,2024-11-21T07:57:16.907000
|
||||
CVE-2023-29551,0,1,6f6042428f056388ae982f18e077673b6cf18c3fd9c579fabcd2adb1f3fc34b2,2025-01-08T22:15:27.373000
|
||||
CVE-2023-29552,0,0,581b98f26884acaa09a2e45c7906b5ad297c852b04af26ae94e2904276792077,2024-11-21T07:57:17.017000
|
||||
CVE-2023-29562,0,0,1ce691e8d9f6f5deb206e8ff10b9ec0045c33f0503241d0cacef281445620ccd,2025-01-03T21:15:12.693000
|
||||
CVE-2023-29566,0,0,72613a9047e5b74b43c598afd3a5332b14dad8bfb67cbbb4132d5bdb7fd4eb17,2024-11-21T07:57:17.310000
|
||||
@ -223171,8 +223171,8 @@ CVE-2023-29720,0,0,1f61853af6e31b6d17a1f07774bef430ef61e62aac6cb8edc9d923d77020b
|
||||
CVE-2023-29721,0,0,16bc6df95e94fb6a5ef25e342a42709e7a4b72452d3121be94f25487bab35666,2024-11-21T07:57:24.930000
|
||||
CVE-2023-29722,0,0,2303a4a35c865e2854536c12e174491e5ff732a5659c8412d42d68b1b5eff76f,2024-11-21T07:57:25.073000
|
||||
CVE-2023-29723,0,0,8cf5c95d58605565e8f6ab042e6525cd3ae54d69fe2f07d70439054bb34d5d4e,2024-11-21T07:57:25.203000
|
||||
CVE-2023-29724,0,0,97e60e7529553e8f0870846b133d4baa122821fc0e0e8b5914dc3209e420fb6c,2024-11-21T07:57:25.343000
|
||||
CVE-2023-29725,0,0,dc1b67db6e3bbdb4f6ed5bb60cf54499c1bb2ac87a38bccabddfe64825e2434c,2024-11-21T07:57:25.487000
|
||||
CVE-2023-29724,0,1,b957a3fcc2f908978b34709bccb4beaef482657df33bc886f526eec59e4351ea,2025-01-08T21:15:08.470000
|
||||
CVE-2023-29725,0,1,ab64230b18916f62d493ac57f81dd5cd07baf6987ff2e6626d94f28801370f14,2025-01-08T21:15:08.740000
|
||||
CVE-2023-29726,0,0,5edc83c46b4a4e4c7f7af4e90e64c34e867ab2e973eaa6365edabd0821085e67,2024-11-21T07:57:25.623000
|
||||
CVE-2023-29727,0,0,d2262bf85751efd28d11dd718d78ab0e700216d17b8927e794dc9f06802ec2ca,2024-11-21T07:57:25.770000
|
||||
CVE-2023-29728,0,0,043926f080c8d3e9064c12911e23091eaaad5413dd2bc1fed2dd3453938e1577,2024-11-21T07:57:25.900000
|
||||
@ -226023,17 +226023,17 @@ CVE-2023-33379,0,0,56071ddc70006503d0579ef54330f122abc6926fb2e2d89ab0a3c9f899e63
|
||||
CVE-2023-3338,0,0,3cda8649f934c581b6b533eca6ada7ce37372aa07e0c5aa58ca682eba2e45d52,2024-11-21T08:17:02.917000
|
||||
CVE-2023-33381,0,0,466cba4d3e8f58ae391c8fcef96048eb9c7b73f81ad45fe6362cef219973ba1c,2025-01-08T16:15:29.360000
|
||||
CVE-2023-33383,0,0,a28a7167b95315782f605325b16be32691bcd42b3f8b778f9c9163d5147b8288,2024-11-21T08:05:31.480000
|
||||
CVE-2023-33386,0,1,35cdcf2891b479b9a9502f0198064f6fa096a2cfc529fd18fe8d468b4e8943d4,2025-01-08T20:15:24.450000
|
||||
CVE-2023-33386,0,0,35cdcf2891b479b9a9502f0198064f6fa096a2cfc529fd18fe8d468b4e8943d4,2025-01-08T20:15:24.450000
|
||||
CVE-2023-33387,0,0,3e3361f6605be6009330b3068fed6534dc9ea26a4bdf2b70a6ee9bb32c805270,2024-11-21T08:05:31.887000
|
||||
CVE-2023-3339,0,0,1eb850a0ee33f4a634ae5ab5a33d04ae4e964149464e4343eb2740f3d794b7db,2024-11-21T08:17:03.083000
|
||||
CVE-2023-33394,0,0,b713b917f586a66ecba283fd72b5406fba7f1de8c464d1ce0b45cda0b89db7c3,2024-11-21T08:05:32.060000
|
||||
CVE-2023-3340,0,0,886acf1ac581bf96ef0b8a2140f4f4fa6948f6c59a9fe8f93226b73530b4b900,2024-11-21T08:17:03.230000
|
||||
CVE-2023-33404,0,0,2326dc4f79af9853ced62a740677d8f7c16fcd50e611de93c34ee10d4f26ac67,2024-11-21T08:05:32.223000
|
||||
CVE-2023-33405,0,0,4ffc9ed6899a82157392aaa5892cf9cb52b24d07dacf07cc60fb49ff4b70c63c,2024-12-06T18:15:21.373000
|
||||
CVE-2023-33408,0,1,c3e6766bcdc10f7bab205a2d05d3bfb1fd7cba0edd9585c13c58aa41064f9703,2025-01-08T20:15:24.640000
|
||||
CVE-2023-33409,0,1,2a9fbfca60ea1a2804bf5e9dbd5acc09b7d308f5060145bcbeb6dfe10eec3637,2025-01-08T19:15:29.267000
|
||||
CVE-2023-33408,0,0,c3e6766bcdc10f7bab205a2d05d3bfb1fd7cba0edd9585c13c58aa41064f9703,2025-01-08T20:15:24.640000
|
||||
CVE-2023-33409,0,0,2a9fbfca60ea1a2804bf5e9dbd5acc09b7d308f5060145bcbeb6dfe10eec3637,2025-01-08T19:15:29.267000
|
||||
CVE-2023-3341,0,0,b10e5e5975d4496eb9200a8f9befa833303018140e30a7f5eee3be3a9cfa8f2e,2024-11-21T08:17:03.370000
|
||||
CVE-2023-33410,0,1,9e30bfd3ca59fea2ee165c36e86d5d0e682cbecfbed507fbf59076c4a44f862e,2025-01-08T19:15:29.670000
|
||||
CVE-2023-33410,0,0,9e30bfd3ca59fea2ee165c36e86d5d0e682cbecfbed507fbf59076c4a44f862e,2025-01-08T19:15:29.670000
|
||||
CVE-2023-33411,0,0,1ce3f8db7d511d3e00848adb33493dd9b9e83d47bfa9a3e631b62f5d8357da37,2024-11-21T08:05:33.043000
|
||||
CVE-2023-33412,0,0,8b474498e767f3dc34547ed6d20c6f4ef43c7a500656830918be7ed3520600cd,2024-11-21T08:05:33.670000
|
||||
CVE-2023-33413,0,0,c3f547ef4aaaa1e268d6521c8025eb40d9b80f464e0894e1800298234e581040,2024-11-21T08:05:34.253000
|
||||
@ -226054,7 +226054,7 @@ CVE-2023-33468,0,0,4e03c49a7594212a8b1ff77b489a307327dcf22bee135bc562fbafc7e3974
|
||||
CVE-2023-33469,0,0,994bea01d55c6edda4d230c6ca8daa28df27e07f5b1b8935938681fe0f2d3bb6,2024-11-21T08:05:36.320000
|
||||
CVE-2023-3347,0,0,4851dcfdfcc397578885c52101d604631a3c7d600a20780072cf1fe3629398cb,2024-12-06T11:15:06.970000
|
||||
CVE-2023-33472,0,0,86b002e3a1ad3c07a43bbffb1f1d26c5daf73932568b8e94bc896b5fc2582380,2024-11-21T08:05:36.497000
|
||||
CVE-2023-33476,0,0,b01404e0c9b18ec021a76533d274ba57d8981979a0f7356291f98b64eaa96653,2024-11-21T08:05:36.737000
|
||||
CVE-2023-33476,0,1,28fbc4dbb52897d04779d556826727d3e95dd94c0a13e7e58a7bd4ab1fe072b9,2025-01-08T21:15:09.183000
|
||||
CVE-2023-33477,0,0,1612e0afbfac570e43393c9b7851644fd754df80a225b4b762d07212e5494daf,2025-01-08T16:15:29.793000
|
||||
CVE-2023-33478,0,0,00709454bd5c65a9487b456e1a8dc2d5e98b9d40e004c2b519b99603c16b1715,2024-11-21T08:05:37.057000
|
||||
CVE-2023-33479,0,0,ad2508dd8f6e278966b720b990c6f15325e8a2cbe4fe4e3f3725a8373469f527,2024-11-21T08:05:37.297000
|
||||
@ -226078,9 +226078,9 @@ CVE-2023-3351,0,0,f64258e34e1f6e2c3debe6ab542c8550e84fbbc69c1d8f132c263991d8bde0
|
||||
CVE-2023-33510,0,0,2fdbca3ef3ec1beb92f8e78ca0e200b48de108215e8c467acd4f2362be303f38,2025-01-07T16:15:30.803000
|
||||
CVE-2023-33515,0,0,365a9a5f6a7f4c9eca56bb36b50c44f896d0d4286fd9bf91ea545127cf4cb344,2025-01-06T18:15:14.737000
|
||||
CVE-2023-33517,0,0,b525e4f20df193bb6cbce03994f81acd991418a35811daa2f53394dfc22d6d82,2024-11-21T08:05:39.983000
|
||||
CVE-2023-33518,0,1,288f98e80c2ce2d2b6ef03190cd0b75d8f426b4c6332c76faf7054e7d4c8708c,2025-01-08T19:15:29.863000
|
||||
CVE-2023-33518,0,0,288f98e80c2ce2d2b6ef03190cd0b75d8f426b4c6332c76faf7054e7d4c8708c,2025-01-08T19:15:29.863000
|
||||
CVE-2023-3352,0,0,ca8ce10d91c2afb8d2b579cfae6df369db0748f6d1892a3e858fbf033cc8e8c8,2024-11-21T08:17:04.957000
|
||||
CVE-2023-33524,0,1,00e39ca7564820f7b55be181ca61600cd202d85de1a33f9718e465ff48d596ca,2025-01-08T19:15:30.063000
|
||||
CVE-2023-33524,0,0,00e39ca7564820f7b55be181ca61600cd202d85de1a33f9718e465ff48d596ca,2025-01-08T19:15:30.063000
|
||||
CVE-2023-33528,0,0,f9fa69afd45a1f617c3d1403ded5098c81af0e479a18344ed6622bd5b87b3971,2024-11-21T08:05:40.480000
|
||||
CVE-2023-3353,0,0,73f13e6c85e8b6a63fa0551d3ac8601dd5e6abaf30561f39657303dcaa775484,2024-06-20T14:15:10.650000
|
||||
CVE-2023-33530,0,0,3f5259f03c4db54a4fbff9537ee74602648d0c16efb6528bb870ef05b10af68d,2025-01-08T16:15:30.037000
|
||||
@ -226171,26 +226171,26 @@ CVE-2023-33664,0,0,5b7c5457bd01e6ce6a95a841eefdb5dbedfe475424974250034aba4be1bba
|
||||
CVE-2023-33665,0,0,a41268bb45a1086a0a687ddd7d32e9d4dd5551e67621c80cfea12c4100e16eb7,2024-11-21T08:05:50.863000
|
||||
CVE-2023-33666,0,0,68a2f2a077e7fc60053dc9b6213773b27f6cebb56b6b3e3832c1d701bea79450,2024-11-21T08:05:51.010000
|
||||
CVE-2023-33668,0,0,e84de9f5a23d7e91098f0794afb9473673da99f16d53563bd9b0d1213b7efd22,2024-11-21T08:05:51.173000
|
||||
CVE-2023-33669,0,0,56443f08577e2a7cc3d85d5d08d6ec255c5885a5e14de5af1ae372d6dfd9e440,2024-11-21T08:05:51.333000
|
||||
CVE-2023-33670,0,0,5f8253a8470a8bb3e9c21852d25b7e4cc630a383f597564abfa6eeef6d5b6788,2024-11-21T08:05:51.487000
|
||||
CVE-2023-33671,0,0,9fccf9f47985de6e781ed27aee76f40d08159f987e4274513e53c18719941b1b,2024-11-21T08:05:51.647000
|
||||
CVE-2023-33672,0,0,a9e0f85fed1e19aececc9be079089396b94f3527cca1ba12051ce52e610ed2b3,2024-11-21T08:05:51.797000
|
||||
CVE-2023-33673,0,0,236d2f94379f9748c31add40d4b155825a2b4f4f7af775cc92591aa9783dc89c,2024-11-21T08:05:51.947000
|
||||
CVE-2023-33675,0,0,af57d13cbf78e20633b47bb3b59bf43ecfcb595f132aac045ebc2ff971224e4f,2024-11-21T08:05:52.093000
|
||||
CVE-2023-33669,0,1,1e27b7bf6ef2e90c56bd6c7886baca57063c6244933fba02d2b7d6d8c5379e1f,2025-01-08T21:15:09.473000
|
||||
CVE-2023-33670,0,1,7e6415317756d5333d2f924807f995f43df30c704a0595729a8310880a5e04ea,2025-01-08T21:15:09.780000
|
||||
CVE-2023-33671,0,1,b05a3d76739f166917f30510df521b93e6c4122979f4e8abc04fd7819ea33994,2025-01-08T21:15:10.023000
|
||||
CVE-2023-33672,0,1,49dd67174f95f150dd27e73c75127089ed97853d98400feb768913913c8e3850,2025-01-08T21:15:10.270000
|
||||
CVE-2023-33673,0,1,21d48a68d1711244285d56ec6d443590902dc2bf172a11c8d502e597fabfb4f2,2025-01-08T21:15:10.503000
|
||||
CVE-2023-33675,0,1,a4545da2436a30181189346f391668da9917aee48160976e4e190c2fc519a754,2025-01-08T21:15:10.757000
|
||||
CVE-2023-33676,0,0,ffade39e283499614eb58de15783b0f308082bfa14f8012efc8f40af1b0e2cc3,2024-11-21T08:05:52.237000
|
||||
CVE-2023-33677,0,0,b4321357d01d562e0e98a9289bcc617262a1b839fd05ec4915e3954d9bfb9630,2024-11-21T08:05:52.460000
|
||||
CVE-2023-3368,0,0,a576f7da936cc2b8b472e450d586ad2850d395b190e021c8b6a0511d6ac82cf8,2024-11-21T08:17:07.007000
|
||||
CVE-2023-33684,0,0,6769107473566e0006445bbd8f63cd7291322fe530c7a747fdc8a8b33691d161,2024-11-21T08:05:52.680000
|
||||
CVE-2023-3369,0,0,0d25e3f23c285bc1228ef6bb953e795d7bcdba21bf14e72d441ce32e37e36897,2024-11-21T08:17:07.173000
|
||||
CVE-2023-33690,0,0,6085482f7fd60000036c557423a089989e501b7aa233e312f85663311e476e04,2024-11-21T08:05:52.830000
|
||||
CVE-2023-33693,0,1,3e8148212d4f546416a3c31b6ac046ee727065c009da48e3e800eccc535c4222,2025-01-08T19:15:30.350000
|
||||
CVE-2023-33693,0,0,3e8148212d4f546416a3c31b6ac046ee727065c009da48e3e800eccc535c4222,2025-01-08T19:15:30.350000
|
||||
CVE-2023-33695,0,0,1a512ec31a4e1ce8ed225c4780bbb5b76a9937d071e90d5afb6806d8f8d38d06,2024-11-21T08:05:53.147000
|
||||
CVE-2023-3370,0,0,9dddf58da1ae42a7566c0b92e84336c0d08e63f3c33e8ad56b0a0ee4f51516b5,2023-11-07T04:18:36.820000
|
||||
CVE-2023-33706,0,0,fad1968fea65403211fd2c9385b3602092ccc20b01e9d150d57322ea4fc84c68,2024-11-21T08:05:53.283000
|
||||
CVE-2023-3371,0,0,df34f309dbb56ab4c9e10189049735675c625cabb2e1178e461a2d83b4b45473,2024-11-21T08:17:07.337000
|
||||
CVE-2023-33715,0,0,70f8ea39909ccc7d7fedfea0a5651610ab41bdd10d186bbb572c059a14a3b869,2023-11-07T04:15:24.220000
|
||||
CVE-2023-33716,0,0,7b7604c19d61f731509886830b48df38fb105a9ff3e0c4a119ce7f619853d73e,2024-11-21T08:05:53.460000
|
||||
CVE-2023-33717,0,0,1309386fa32bdf9e26a6a8a1af47bd9cbc5c2920a80d84a9cfd9e6955927c5b7,2024-11-21T08:05:53.620000
|
||||
CVE-2023-33717,0,1,0cc9e8551affca6d31d9fa047b600ffdb3ddc33ab5b125ddf432d7a93b0fcd71,2025-01-08T21:15:11
|
||||
CVE-2023-33718,0,0,1586778d15355ffee6648b131924ae371a3d2019604b5073fe93a8180e3a40a7,2024-11-21T08:05:53.770000
|
||||
CVE-2023-33719,0,0,e8d9af2859dd56526dff03f2841c96e8870510e475c2a98cbdaa79fea915b66f,2024-11-21T08:05:53.927000
|
||||
CVE-2023-3372,0,0,84f21b60d2b56cb6d011b3c76313017d3ef2b1ee20e683414c273e919f5c98c6,2024-11-21T08:17:07.493000
|
||||
@ -226199,9 +226199,9 @@ CVE-2023-33722,0,0,577f04a66dba80af8edcb620e449171536c8a33547fdb2eb1e16f5993cabc
|
||||
CVE-2023-33725,0,0,501441fd8c0850dda7db2b5cbc4c50d99063609270f88ed8b5e1f563ad958019,2024-12-06T18:15:21.850000
|
||||
CVE-2023-3373,0,0,712fcfc5ec5d5a5858a7c6e82af9f759f31c8a9579462cec2a389020ad3d6bec,2024-11-21T08:17:07.620000
|
||||
CVE-2023-33730,0,0,6310f4453161d8845f3526a345e65c3e7de103266213728ef16d591864176147,2024-11-21T08:05:54.510000
|
||||
CVE-2023-33731,0,1,4e0716e51d797332a35d8cf3e5a52df1f04a68160a9692c084acf7ca25247b33,2025-01-08T20:15:24.840000
|
||||
CVE-2023-33731,0,0,4e0716e51d797332a35d8cf3e5a52df1f04a68160a9692c084acf7ca25247b33,2025-01-08T20:15:24.840000
|
||||
CVE-2023-33732,0,0,73e7254c99574e9b7803aa6d2e5a20146b7a53e5b864dd18f03405306d64d8a1,2024-11-21T08:05:54.810000
|
||||
CVE-2023-33733,0,1,67d14424780e2b2a99fc85cd6e4fd6c08e79d171c16dc23f4a6280281fd3af90,2025-01-08T19:15:30.560000
|
||||
CVE-2023-33733,0,0,67d14424780e2b2a99fc85cd6e4fd6c08e79d171c16dc23f4a6280281fd3af90,2025-01-08T19:15:30.560000
|
||||
CVE-2023-33734,0,0,ce9b6222e7c051206355de817b0fb42912304fcb66294482b08488625c37fe80,2024-11-21T08:05:55.107000
|
||||
CVE-2023-33735,0,0,342b6457f0ac3ac330051be3ab4ddae4481c406cc9b4868529f56e89a4ea2f7b,2024-11-21T08:05:55.260000
|
||||
CVE-2023-33736,0,0,b465ae61bb3875ca7c41d8d8e67e22e0b88bcb8c1b5473a310e3d9926c5d0a80,2024-11-21T08:05:55.420000
|
||||
@ -226223,9 +226223,9 @@ CVE-2023-33758,0,0,6eb30d4e57047cf78716b1a561c980b2c569f119a705cede04e789e29e71f
|
||||
CVE-2023-33759,0,0,63e74f8e659cf75d247f5ab0b4df2952cf4cff539392ea2281ed9021b4389119,2024-11-21T08:05:57.570000
|
||||
CVE-2023-3376,0,0,a0b735a4f3d815668e4f878bc8d21d4d7f0baaf4e560f4b47089ab3f13de3880,2024-11-21T08:17:08.053000
|
||||
CVE-2023-33760,0,0,66395363814916b245c0a8e20054660baa6a6c6428560780ce09fd6c751d57c3,2024-11-21T08:05:57.723000
|
||||
CVE-2023-33761,0,1,57a93ac893ae35326e39c092126e5e13d5e331d3b8372e3a303e80db32ec6902,2025-01-08T20:15:25.050000
|
||||
CVE-2023-33762,0,1,38f5fcfaba70048850b3e019780dd18dda0074fae37a3f2fe1c49610ea38ff47,2025-01-08T20:15:25.250000
|
||||
CVE-2023-33763,0,1,4b714c19fd58c23cabcc96b7c2627201896bc29e6a1b69cfe75a61bb1cfa788e,2025-01-08T20:15:26.130000
|
||||
CVE-2023-33761,0,0,57a93ac893ae35326e39c092126e5e13d5e331d3b8372e3a303e80db32ec6902,2025-01-08T20:15:25.050000
|
||||
CVE-2023-33762,0,0,38f5fcfaba70048850b3e019780dd18dda0074fae37a3f2fe1c49610ea38ff47,2025-01-08T20:15:25.250000
|
||||
CVE-2023-33763,0,0,4b714c19fd58c23cabcc96b7c2627201896bc29e6a1b69cfe75a61bb1cfa788e,2025-01-08T20:15:26.130000
|
||||
CVE-2023-33764,0,0,25064556854711887dc1bb6f6f1cf49e5299f880c7c82df8184b1321f68c6f8d,2024-11-21T08:05:58.363000
|
||||
CVE-2023-33768,0,0,06ef0c0decf4640dfb51ab40e4d57977e0315f708c6bde014cfbf4d1da8e9b5e,2024-11-21T08:05:58.517000
|
||||
CVE-2023-3377,0,0,bfef5eba24979a4babeeac5a2ac2afab2bc4aa25a44e9271085be4c4d2c0fcdc,2024-11-21T08:17:08.190000
|
||||
@ -226682,7 +226682,7 @@ CVE-2023-34254,0,0,28bc1c030aea3f52ac42aea5cabfb0b2c4b8caf27bbf30b675459c6d8263c
|
||||
CVE-2023-34255,0,0,80be5f9e6f93d1dff56157d1720c5c0d5b302e9fcf81ddd8a1748a4ec5b2a6f7,2023-11-07T04:15:33.133000
|
||||
CVE-2023-34256,0,0,691415f2f013332d745607532da3b4ac21fbf0bcec117633be38405c94853d0c,2024-11-21T08:06:52.333000
|
||||
CVE-2023-34257,0,0,d15b21c49281aac125543c6218a20e8e3fee27b0d9235eb7e685e0ccee8cd0cc,2024-11-21T08:06:52.500000
|
||||
CVE-2023-34258,0,0,0d46730d0368bc72178f84e29cab4ca72a408e0728c03217aa52391343d7a1fe,2024-11-21T08:06:52.663000
|
||||
CVE-2023-34258,0,1,fcdb643155db51246493eace9830d7f00f9ad9f8e9c26b5f3acf2452f9cf252a,2025-01-08T22:15:28.060000
|
||||
CVE-2023-34259,0,0,a17ffd4a41a9842f96ee8008d3ec22fa6d3e74baa3727d6c80193a1cef77d2d8,2024-11-21T08:06:52.813000
|
||||
CVE-2023-3426,0,0,ae2c21d78db765200c0b63c28eb0fffcbdbf50884f08013f5098219b8325bff9,2024-11-21T08:17:14.497000
|
||||
CVE-2023-34260,0,0,751c260fda5d42cd77fe0506bf52feb362109f06c26f040bf0c29f40353daeb6,2024-11-21T08:06:53.043000
|
||||
@ -226830,7 +226830,7 @@ CVE-2023-34395,0,0,6b27da8fd46729cf8e00b5b710b84600fc46a48029d9eace73be2c1175bdd
|
||||
CVE-2023-34396,0,0,a88caeed8ca60b7e2de946c97e864c28b26bd11abb406d0a5a7eed0460d71bfa,2024-11-21T08:07:10.320000
|
||||
CVE-2023-3440,0,0,c3a148f8bda83f5626794fbc68f98a1dc6c64d7bea5c4682462694a567b20fe9,2024-11-21T08:17:16.337000
|
||||
CVE-2023-34407,0,0,feb0cd99a613c0605481c85d03f4038aed84545414c9a8173ba7dd7d0782d2cd,2025-01-08T17:15:13.003000
|
||||
CVE-2023-34408,0,1,03b9bef6d87ce45b6ba8997f0b9758107c5f0a4c0c52b45bc5822b37a8cffdfe,2025-01-08T20:15:26.503000
|
||||
CVE-2023-34408,0,0,03b9bef6d87ce45b6ba8997f0b9758107c5f0a4c0c52b45bc5822b37a8cffdfe,2025-01-08T20:15:26.503000
|
||||
CVE-2023-34409,0,0,51b8f8415923aa1a2d243bed75d521d233228a55cbd4b9792f4bc8dabc1d5016,2025-01-08T16:15:31.940000
|
||||
CVE-2023-3441,0,0,96b660e59290fe52a56318b9a285eab78ceae8ef9c8a005c225e8ea7c212c771,2024-12-12T20:00:32.067000
|
||||
CVE-2023-34410,0,0,1d7d5688d71675c11284e2a1b91e0cd8515bec350db0e80fc1004491d1abeaf8,2025-01-08T17:15:13.230000
|
||||
@ -236585,7 +236585,7 @@ CVE-2023-47706,0,0,bbb32054d32ce2e0d3f68c842f3cdfa72be0ab10444f45a7954eb172de017
|
||||
CVE-2023-47707,0,0,c7b659cfa473bc10030ffc6b6ad313fb86dbaafbac13d5fd0040fb820891bbbf,2024-11-21T08:30:42.917000
|
||||
CVE-2023-47709,0,0,65ff53d8144fb462a84c16a837c569e68857f1c391294ca6a1d40092224f395b,2024-11-21T08:30:43.043000
|
||||
CVE-2023-4771,0,0,1012847fc256ae9ff3628aa2a1fb6186f4f8c6f51233026703d280e3101d9a14,2024-11-21T08:35:56.950000
|
||||
CVE-2023-47710,0,1,55d2267d368a638b154b4cbdb2e4829df517af8708523830856cddb5920594cf,2025-01-08T20:17:26.143000
|
||||
CVE-2023-47710,0,0,55d2267d368a638b154b4cbdb2e4829df517af8708523830856cddb5920594cf,2025-01-08T20:17:26.143000
|
||||
CVE-2023-47711,0,0,193c709b60d934908f9a5562e5007b0d54510a30e62d836ebcad6ad17ca6256f,2024-11-21T08:30:43.290000
|
||||
CVE-2023-47712,0,0,af7f68c5353560e036f5f2959c8b8d9c1784fe11f5ecf3513314e7be363e6fe4,2024-11-21T08:30:43.420000
|
||||
CVE-2023-47714,0,0,b87409e17435eabdd7f9b77efbff39fad7055f3f9770a66daeb88291622bf67f,2024-11-21T08:30:43.540000
|
||||
@ -242733,8 +242733,8 @@ CVE-2024-0511,0,0,5b5729b5b63c315b290874c9574a0771ecfd42be446e93c43c1ab37bbb9a83
|
||||
CVE-2024-0512,0,0,ac85c2e98bdc908cf84739ba96d567a0d7e4a29e55962c1611e976e274b149cd,2025-01-08T18:52:15.113000
|
||||
CVE-2024-0513,0,0,d636b0c15a0e47b002a67420bcc626b28b4566542f5eabacdfa68e40eeb591e1,2025-01-08T18:58:49.240000
|
||||
CVE-2024-0514,0,0,200af424e2494b9ef1cde83af9e0336be68ac0b95160b10bc25f104a49aff710,2025-01-08T18:59:31.757000
|
||||
CVE-2024-0515,0,1,7e4bf56d9bee19ba35451051d5188af092963d7f855a56da4ac6517f6316a66d,2025-01-08T19:02:52.477000
|
||||
CVE-2024-0516,0,1,a1c45ca10fd29ff130b69b86b74fad5f71b7de220cd93d419d06ba5747df79a7,2025-01-08T19:06:41.057000
|
||||
CVE-2024-0515,0,0,7e4bf56d9bee19ba35451051d5188af092963d7f855a56da4ac6517f6316a66d,2025-01-08T19:02:52.477000
|
||||
CVE-2024-0516,0,0,a1c45ca10fd29ff130b69b86b74fad5f71b7de220cd93d419d06ba5747df79a7,2025-01-08T19:06:41.057000
|
||||
CVE-2024-0517,0,0,c1d84921536d4f403fc308e0f21ef3e39772e61110c1ffc32ce08f0c2aac5138,2024-11-21T08:46:46.377000
|
||||
CVE-2024-0518,0,0,978d463e9f50d6258d652fd532f338a779dabff722688c763fb03b911a937830,2024-11-21T08:46:46.510000
|
||||
CVE-2024-0519,0,0,a6f73d962989f91484a755efd5ea0cc921464529c4019e1d89ca623170d61071,2024-12-20T19:01:11
|
||||
@ -244634,7 +244634,7 @@ CVE-2024-11706,0,0,d7aa48664fd3a99ff8ecdb1c5e606d3e6a16c2b68f26185023438aa20fdce
|
||||
CVE-2024-11707,0,0,c14d0723c12588788ccbd8bb2e9951ac0d18f4bf2138ffa0507ec2dce1fcd9c9,2024-12-03T08:15:06.223000
|
||||
CVE-2024-11708,0,0,46bf8dcd9e0a994fe6b91558c4bac72ea601d2749b0be7bd469a9ad7ee077e45,2024-11-27T15:15:24.747000
|
||||
CVE-2024-11709,0,0,c7d4cd410df5a04f3cf8d9ea3dda9b5544a86774d871c2cb08cc1e1a83cccda9,2024-12-12T05:15:08.900000
|
||||
CVE-2024-1171,0,1,ecbdcf43f5b983dd6d5e3901a4f79f545f1f5986a89a0bc7c9ca53a4bbe921fc,2025-01-08T19:07:55.783000
|
||||
CVE-2024-1171,0,0,ecbdcf43f5b983dd6d5e3901a4f79f545f1f5986a89a0bc7c9ca53a4bbe921fc,2025-01-08T19:07:55.783000
|
||||
CVE-2024-11710,0,0,76a5dd52f32d87e7772a2980c1d585729682665eba7003c9e06e0195686f14ed,2024-12-14T07:15:04.560000
|
||||
CVE-2024-11711,0,0,643f90abba573916fb9581285187fdc714fe533d8e03bdf0e8722c8c292f8e86,2024-12-14T07:15:06.187000
|
||||
CVE-2024-11712,0,0,d8eeffb57a7e2592152256c9eb6f1edc824d73d2b40e013aeae3b4e7ae12823b,2024-12-14T07:15:06.360000
|
||||
@ -244643,7 +244643,7 @@ CVE-2024-11714,0,0,c6471527e19f0ca60843e70cf630e8e5f2ae6981854a480677e1b01b2ada8
|
||||
CVE-2024-11715,0,0,0815aaace33685f035482241a4ccb0b0e0d773cd3b4b8723c5ec1e7d7b552602,2024-12-14T07:15:06.880000
|
||||
CVE-2024-11716,0,0,522e4ed8199ad8f3f63cbe6d21a80da8ac391d52575f83334b9f923b884fcb00,2025-01-02T18:15:15.367000
|
||||
CVE-2024-11717,0,0,68750f09c3123f04bf7a5bd697483739e358151e1b46d1fb4198fc9ac2d13fce,2025-01-02T18:15:15.740000
|
||||
CVE-2024-1172,0,1,1bc2ee9b555d1b5ce6888d4346af93aa633bcdcf2636d0f9ad6817045e164057,2025-01-08T19:08:16.787000
|
||||
CVE-2024-1172,0,0,1bc2ee9b555d1b5ce6888d4346af93aa633bcdcf2636d0f9ad6817045e164057,2025-01-08T19:08:16.787000
|
||||
CVE-2024-11720,0,0,29bcdc9d8ea7c52b0cf061a79d913eb830f398d7558309b58df85618930b04a5,2024-12-14T09:15:05.083000
|
||||
CVE-2024-11721,0,0,476bad2ae1181a71ee1e909e9b2944d8737010e4d5a814100bd6b1844c536af1,2024-12-14T09:15:06.383000
|
||||
CVE-2024-11722,0,0,40864411129bd70df76bf7827eb0e751b5dd144fb3c982ea787e070835d4fa8e,2024-12-21T10:15:07.367000
|
||||
@ -245130,7 +245130,7 @@ CVE-2024-12356,0,0,105dac76f068e0a7df26029c27e4dd4c6eb4193ba09a6f3d1c3ed5326b9fe
|
||||
CVE-2024-12357,0,0,48fcc186a0b90c08dc56b15842484729758da0392dc94d034d9fe9fdfb82ecb1,2024-12-10T23:35:15.660000
|
||||
CVE-2024-12358,0,0,c693e0849f917c8e8b82ecbabaa009531cb87832861cfd247370c207501db351,2024-12-10T23:34:20.467000
|
||||
CVE-2024-12359,0,0,c89d1a1aa75e792ebb41728457dc48f1f26a200ebabc2671ae04aee3d706d446,2024-12-10T23:34:02.110000
|
||||
CVE-2024-1236,0,1,42d257f977d290f4d0aa2f8d4699f4951f80f18e17ed46b119e80f5ed73ef1db,2025-01-08T19:08:56.023000
|
||||
CVE-2024-1236,0,0,42d257f977d290f4d0aa2f8d4699f4951f80f18e17ed46b119e80f5ed73ef1db,2025-01-08T19:08:56.023000
|
||||
CVE-2024-12360,0,0,9c92ce0fa75af6038fb90116f61bca41613e1dcad55daccb6d63b1c2c6eac745,2024-12-10T23:33:47.773000
|
||||
CVE-2024-12362,0,0,3d126c7d5b2c7c892f0afca83b7e5d0a3fdd9f8568569cdb62c20aebeb726e71,2024-12-16T10:15:05.097000
|
||||
CVE-2024-12363,0,0,8bf95d170f6881f24ef42d227f38a0cf0a0a8682e2906a9aa2aaa1e3f316a356,2024-12-11T10:15:07.260000
|
||||
@ -245170,6 +245170,7 @@ CVE-2024-12426,0,0,b1768326240a0dd8a6e52437c59b87b6647b9ea2add19ab16c01c997897bb
|
||||
CVE-2024-12428,0,0,0dc42c82097510dcd67ba200f4a63250bd059d1ff61bcff7d39f7b5f34a5af10,2024-12-25T05:15:06.920000
|
||||
CVE-2024-12429,0,0,99de63e9af0ae88e6e217f344e187dc7b14d0fe0ccd82d65454e97b04105efab,2025-01-07T17:15:20.527000
|
||||
CVE-2024-12430,0,0,d4276ccf8ce8cf1fc6449eee29ff956f270f606dae1ca6365bb2571c495303e4,2025-01-07T17:15:20.703000
|
||||
CVE-2024-12431,1,1,da304ead6ced274b9ff4f680c28a5ec526c901ffbf7544fee95d4ff47213effc,2025-01-08T21:15:11.760000
|
||||
CVE-2024-12432,0,0,3d67b932349f6253a91fa970f1501aba586896a462aba17731bbe90a2499433d,2024-12-18T04:15:07.947000
|
||||
CVE-2024-12435,0,0,0b924907debc21d874056d540a36b4cd28d4a499f8792c113a5d9122f40bd903,2025-01-07T05:15:18.887000
|
||||
CVE-2024-12437,0,0,6e24f2f4b2ec72fb52a0e054617c7907aded8c9b581797c18ca0d91453127b86,2025-01-07T07:15:27.127000
|
||||
@ -245634,10 +245635,11 @@ CVE-2024-13173,0,0,f1a33d2e3c9b2cf91c9a53b07743d77111624711ca1e4fa83f21d1b344cad
|
||||
CVE-2024-1318,0,0,875ffbabaf295988fe72077a5574dbe20799a2a8618e7dc53ba31731145c671a,2024-12-31T16:56:50.763000
|
||||
CVE-2024-13185,0,0,309623867cf2a365ccf0f9b8bad47d56d8813a4020c9e23dc24fdd83b6361ef7,2025-01-08T15:15:17.163000
|
||||
CVE-2024-13186,0,0,ab68464e9eb8c64ef77f66273b4531bf06ac11994ab182c60b128be5d808b9b1,2025-01-08T14:15:26.227000
|
||||
CVE-2024-13187,0,0,6b3f36a2340a79cb00f03c53cc5eedc706fbcd37e9329336b3a6eedb97ff1e2f,2025-01-08T17:15:15.410000
|
||||
CVE-2024-13188,1,1,cc95bf1d824c3b6096fc692ac535848a10cbc0f564544683f2277bd18e0fae2c,2025-01-08T19:15:30.840000
|
||||
CVE-2024-13189,1,1,9e7af9f6942308b7ca9c8e12a57b42ed561370b7ba877e9a778a7a36e87c0943,2025-01-08T20:15:27.353000
|
||||
CVE-2024-13187,0,1,22a296a0fc204e7fb6d468d261ef96cb75ee85392fddddbfd453c9e83d5a5443,2025-01-08T21:15:11.973000
|
||||
CVE-2024-13188,0,0,cc95bf1d824c3b6096fc692ac535848a10cbc0f564544683f2277bd18e0fae2c,2025-01-08T19:15:30.840000
|
||||
CVE-2024-13189,0,1,03a8ad20b4285eaac39004c7eb28ba111ec68af46d0e0b846ef6e6119fec9713,2025-01-08T21:15:12.157000
|
||||
CVE-2024-1319,0,0,e6fca38f8817c3f0a93cd5d73a5a9417a178ac65495356d684dc26f204fa5765,2024-11-21T08:50:19.530000
|
||||
CVE-2024-13190,1,1,b6c3d265062c184bd417077d9b801b1b02f71d26f94736dd2a2e2e78d84e35b3,2025-01-08T21:15:12.303000
|
||||
CVE-2024-1320,0,0,80370b3cf95d31a327dfcead0766151687bef5425baa11f9a4606b327981e1e5,2024-11-21T08:50:19.647000
|
||||
CVE-2024-1321,0,0,64c53fddfcf700442bf3bc09eea0aa8fb2f1c68b08bca44e74ca22c8291fb906,2024-11-21T08:50:19.770000
|
||||
CVE-2024-1322,0,0,a87df03aa9d8a817a942ae8ebad8afc3111ac175155d7ee73a384181ec986bff,2024-11-21T08:50:19.883000
|
||||
@ -245846,7 +245848,7 @@ CVE-2024-1533,0,0,672ff40ebd2d9061fbc3bbc9de7d5e8e4d35c5769bab92790afed3ed40e3dc
|
||||
CVE-2024-1534,0,0,2e9320299e2180ef1d7e929914dab933cb3e85ea5d4a83efd84ab898f262cf69,2024-11-21T08:50:46.520000
|
||||
CVE-2024-1535,0,0,927dc46177fcf2f0646a5365a296286366125eb861cfedb1145399176e63f500,2024-11-21T08:50:46.647000
|
||||
CVE-2024-1536,0,0,c46b5077118b6287104aa95a7ed0934321fcad65589140f40d58f23e342e618e,2025-01-08T18:32:08.960000
|
||||
CVE-2024-1537,0,1,56c08bfb4e8376533125db95254233cfd12a8a9f9def20e37b56b1cc354ee636,2025-01-08T19:09:15.633000
|
||||
CVE-2024-1537,0,0,56c08bfb4e8376533125db95254233cfd12a8a9f9def20e37b56b1cc354ee636,2025-01-08T19:09:15.633000
|
||||
CVE-2024-1538,0,0,f692a13d2117fab62bd43f3c930015d27dcdfedb4ea2c6fbf2a4f89e666d71a5,2024-11-21T08:50:47.027000
|
||||
CVE-2024-1540,0,0,dcc5f7f06abf726edf9706049e280bf2503f16b7be61b8dfaef13d5b5b992664,2024-11-21T08:50:47.170000
|
||||
CVE-2024-1541,0,0,4b2d5b7e49160c1a07da99bfb618ab29a30c8b85927a1cc1ce15d0c4b17a57ce,2024-12-12T17:51:27.017000
|
||||
@ -245874,7 +245876,7 @@ CVE-2024-1563,0,0,7d0bf239d127ed2704e916b4bb8cfd434f8136623a3e40c8f2ec9ef9bcf8d0
|
||||
CVE-2024-1564,0,0,84ceb93463fa25d921ef01feb499d06d312a061c27da82d4c95abef3e4e86329,2024-11-21T08:50:50.673000
|
||||
CVE-2024-1565,0,0,00fc6a5125264a59a67555b8c8202352f41a7d44a1f5f9ff79d0346bf16d4f67,2024-11-21T08:50:50.860000
|
||||
CVE-2024-1566,0,0,4ac720135761f12018d810740b03599e211c6d2088b3ec7481b0c1665640c9db,2024-11-21T08:50:51.007000
|
||||
CVE-2024-1567,0,1,6cdbaee71c1770d77caf03403af77d158a420504c05e33f36e632e6fe2f3ce20,2025-01-08T20:47:46.820000
|
||||
CVE-2024-1567,0,0,6cdbaee71c1770d77caf03403af77d158a420504c05e33f36e632e6fe2f3ce20,2025-01-08T20:47:46.820000
|
||||
CVE-2024-1568,0,0,7c747a42c43889299b85ee2d411912cccb4847e43395740d8e6d9bd8cca3c1b4,2024-11-21T08:50:51.240000
|
||||
CVE-2024-1569,0,0,cc3fd6764ddebd625443ddcd2f6dd2aba14c01115654ddd2b36f709166cad3a4,2024-11-21T08:50:51.360000
|
||||
CVE-2024-1570,0,0,c77fb8a1605b8ff029c140717833d66157c8c7aa9377bb5398abaa6409f8c2d4,2024-11-21T08:50:51.480000
|
||||
@ -251093,7 +251095,7 @@ CVE-2024-26226,0,0,f53978cfbf6d99fdbc30bc25db1632168b5ccc1c3dec083c913a87ec62927
|
||||
CVE-2024-26227,0,0,5c2fc4b90f1b4bbec7fdc7c88fc60c47c166e99b440dc547f2214ea4f38b0b17,2025-01-08T16:28:31.610000
|
||||
CVE-2024-26228,0,0,fbbae24dbfd1a6f2bfc2cd895125564469a7a613f2eed01bc0d7f5fccfb5a109,2025-01-08T16:31:38.633000
|
||||
CVE-2024-26229,0,0,553aad4240827e067db49fe129df0c528dd2b5cb7c8699a5a51f37123c98796e,2025-01-08T16:31:52.880000
|
||||
CVE-2024-2623,0,1,ad6ff4830c0fded63885ae0db2a00cbeed8247716bba8c3596a4bb3cdabc545f,2025-01-08T20:15:47.823000
|
||||
CVE-2024-2623,0,0,ad6ff4830c0fded63885ae0db2a00cbeed8247716bba8c3596a4bb3cdabc545f,2025-01-08T20:15:47.823000
|
||||
CVE-2024-26230,0,0,69377b64970d710af9e251debe1b54da41351ea80d23b5be64d65d9ef5099bf1,2025-01-08T16:32:41.670000
|
||||
CVE-2024-26231,0,0,b932e0c89a81d839ec530889e3bba74a55df396ef61aac39c031a3add1c31c60,2025-01-08T16:33:08.860000
|
||||
CVE-2024-26232,0,0,3b717e9ae005d4734140ff5837bde84cda000758a327ccc4b5664a77a5b55004,2024-12-06T14:39:54.630000
|
||||
@ -251241,7 +251243,7 @@ CVE-2024-26490,0,0,5d881f1c01fce0a8d045898f401c1fdce23d0fcbcfe7be54413530239baae
|
||||
CVE-2024-26491,0,0,c21263bce7ab5e4914f382cea90ce616eec96f5c4ee3ce13ab73daf3ca946d29,2024-11-21T09:02:30.480000
|
||||
CVE-2024-26492,0,0,9627b0f85e6c71953ddc8ad575684843b848841f59336ebddbc7ed81a95e3765,2024-11-21T09:02:30.693000
|
||||
CVE-2024-26495,0,0,1a3ef9413c39fd044d2faf5b27b039172ef94e2dc35c0a91bd7bc5a02c4f00e8,2024-11-21T09:02:30.907000
|
||||
CVE-2024-2650,0,1,608806f7ed4f4fceda8bfc65d112443c2ad90c7524d22b9fb97e555c3fb3dd04,2025-01-08T20:06:29.560000
|
||||
CVE-2024-2650,0,0,608806f7ed4f4fceda8bfc65d112443c2ad90c7524d22b9fb97e555c3fb3dd04,2025-01-08T20:06:29.560000
|
||||
CVE-2024-26503,0,0,df7d61dcb7128154350761a771150cb0494b47d4aafbfd7f2024eef22b0ed39b,2024-11-21T09:02:31.040000
|
||||
CVE-2024-26504,0,0,04368ca408cf828c52c9d21e0e159c77cba39aeb7ead3b77c45c5792276ceb5f,2024-11-21T09:02:31.240000
|
||||
CVE-2024-26507,0,0,6739efe9e31958f6327926c478411ff4c4c7914d75460fb344892d5adbfedceb,2024-11-21T09:02:31.463000
|
||||
@ -251331,7 +251333,7 @@ CVE-2024-26636,0,0,e040392dbf5dece5991bbd5b4813e4acf74491af81b2691222339ae1b7720
|
||||
CVE-2024-26637,0,0,33676b92619865021f629b461c2549985de282ac3ac30f360d4728cbdc20aa03,2024-11-21T09:02:44.403000
|
||||
CVE-2024-26638,0,0,6c83dc25b3412a9ff69e4abbfad53bbaa0a8b4f7b0192f35032c6bb4f6d464e3,2024-11-21T09:02:44.520000
|
||||
CVE-2024-26639,0,0,77fa0c405097892d132b380250ada6d19d3c676da4410ce6e163a929de368582,2024-06-20T09:15:11.183000
|
||||
CVE-2024-2664,0,1,d65d75a89592ce5f962a430dc227e13a6ba291c072ed415025f4dde2ffe9f647,2025-01-08T20:05:38.290000
|
||||
CVE-2024-2664,0,0,d65d75a89592ce5f962a430dc227e13a6ba291c072ed415025f4dde2ffe9f647,2025-01-08T20:05:38.290000
|
||||
CVE-2024-26640,0,0,54c5da3b229a93028da04fd82c4249df09909d6ac16876a131e19755de0888f3,2024-11-21T09:02:44.737000
|
||||
CVE-2024-26641,0,0,5f47a642bf5ae3dc0f36324b4a1b8f7c8a7ca05295b1963f0b237d32cbae450a,2024-11-21T09:02:44.853000
|
||||
CVE-2024-26642,0,0,8cb6e40acb222e213a9c1b8fa4426c911d8cd03fc8028b52eacb65429f170b4d,2024-11-21T09:02:44.980000
|
||||
@ -251342,7 +251344,7 @@ CVE-2024-26646,0,0,5c3b675eed417f04e79fbe9a962446c0936c3d49eec6b3e012c1e53cad995
|
||||
CVE-2024-26647,0,0,0087defa8b2daf5e29c0c380220574740551b7537aefbd17ea5876ff9a0ca272,2025-01-07T20:15:48.587000
|
||||
CVE-2024-26648,0,0,57660c3f5372b373298dbe0cd29fd4332764e7181a5b50e285b698a5ae516b44,2024-11-21T09:02:45.723000
|
||||
CVE-2024-26649,0,0,e755538fa424fa67581263d7164952806f11ff46847ca4f67e57e88a22ecb657,2024-11-21T09:02:45.903000
|
||||
CVE-2024-2665,0,1,7d353e3768885e4e4ccec25142dfea412a0d57b9ef35aaee4fe4d95b6836feb0,2025-01-08T20:05:50.257000
|
||||
CVE-2024-2665,0,0,7d353e3768885e4e4ccec25142dfea412a0d57b9ef35aaee4fe4d95b6836feb0,2025-01-08T20:05:50.257000
|
||||
CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000
|
||||
CVE-2024-26651,0,0,898711d0c00a026cf190f460e3b24d2751f2699fd4b1b6a25eb50a9711c0c7b9,2024-11-21T09:02:46.027000
|
||||
CVE-2024-26652,0,0,105744a3326cfd97769655231f5141eceba4e2c7ae5c2e6279ca9167a71c0f9b,2024-11-21T09:02:46.153000
|
||||
@ -251353,7 +251355,7 @@ CVE-2024-26656,0,0,87294d191c345c70a4c471a87fe66eabdaba9c1d9c21608ca348166e40c96
|
||||
CVE-2024-26657,0,0,5b20f2d67a13488a4561cdf1804b4d16bd412c492c2f8931f4259c8fdab78f08,2025-01-07T17:20:00.840000
|
||||
CVE-2024-26658,0,0,d8d3bbfb4b8888f4ac28f0fa2f85d0ddd9b9cef8032b00d528a731dbc6177ca2,2024-11-21T09:02:46.957000
|
||||
CVE-2024-26659,0,0,d1c064e96da1d530f31cb13996b98b6c11a5365d98cf8e2364eb0850bbe23f59,2024-11-21T09:02:47.073000
|
||||
CVE-2024-2666,0,1,f1b6b3235b2b495b42e297549bf95b2a093d5e348ec41b756e906ebd66544df0,2025-01-08T19:47:15.707000
|
||||
CVE-2024-2666,0,0,f1b6b3235b2b495b42e297549bf95b2a093d5e348ec41b756e906ebd66544df0,2025-01-08T19:47:15.707000
|
||||
CVE-2024-26660,0,0,a422396ff04da2dd1fc0fcd251abf1c784b2a21a790731caa445e598fd0e0efd,2024-11-21T09:02:47.193000
|
||||
CVE-2024-26661,0,0,d45863d2e30232e358edb0d1a1e889067585e710a0e2ee684c544bcee0a67515,2024-11-21T09:02:47.317000
|
||||
CVE-2024-26662,0,0,a88f4521b9b995afb0e21d9f507fb182180356687597cd7121dd3a6b42115b74,2024-11-21T09:02:47.500000
|
||||
@ -253631,7 +253633,7 @@ CVE-2024-29736,0,0,b61855bfadb15159a83451588b028249b7cffc739fe63ce533b91dd6bcf21
|
||||
CVE-2024-29737,0,0,2db4529f83196388cf55c7cfdbe908562eb738112835d568cd39a13d7a201ede,2024-11-21T09:08:12.270000
|
||||
CVE-2024-29738,0,0,8c7de6e64ca0b6d6c89dca0223ef5aad2d4ced944458e86ab12ff44f8d6da996,2024-11-21T09:08:12.490000
|
||||
CVE-2024-29739,0,0,df0346e10103b861fc131db19f20059c902c4eff1f464dc3f0be8070a3263292,2024-11-21T09:08:12.613000
|
||||
CVE-2024-2974,0,1,056c4d14612d3f51428fe0d21e7c5c73661985bea0ebb92c5f6fa0bb74b4757c,2025-01-08T20:06:14.587000
|
||||
CVE-2024-2974,0,0,056c4d14612d3f51428fe0d21e7c5c73661985bea0ebb92c5f6fa0bb74b4757c,2025-01-08T20:06:14.587000
|
||||
CVE-2024-29740,0,0,b4700812d574daa120bc21f820d9a1090255a14abc9e9b57649051371f118f81,2024-11-21T09:08:12.813000
|
||||
CVE-2024-29741,0,0,ad0166c0b9bdadba5399ed38f67d68bf92a9cd9d4585450d760bc972f88174e7,2024-11-21T09:08:13
|
||||
CVE-2024-29742,0,0,b9df7a6c13e81176309d5385a85ce7e04b5046d77b80b3b29ab68f5cb7b31339,2024-11-21T09:08:13.120000
|
||||
@ -253944,7 +253946,7 @@ CVE-2024-30038,0,0,a110458651a9eccf20a20127267985311cd4020527c39bb7fe92fbd8245e1
|
||||
CVE-2024-30039,0,0,6d4c2a358502acece6d39ccda69e9264f55f52a713bb5953f79ee8082ca9b1ab,2024-11-21T09:11:07.213000
|
||||
CVE-2024-3004,0,0,090e547619a006fd8749e79d0e05f6b17fb4b3abcde3d586f7d775d03c5b12a4,2024-11-21T09:28:39.437000
|
||||
CVE-2024-30040,0,0,53137381cad4836b484aca2921dfa740d0639018920e030d4cd815e000aa758f,2024-11-29T15:41:55.210000
|
||||
CVE-2024-30041,0,1,f6cb8df06dbdd5b3577bae4b6d27fc00b9774de77840fba8ad7bf05a429e4a96,2025-01-08T19:13:10.127000
|
||||
CVE-2024-30041,0,0,f6cb8df06dbdd5b3577bae4b6d27fc00b9774de77840fba8ad7bf05a429e4a96,2025-01-08T19:13:10.127000
|
||||
CVE-2024-30042,0,0,2ddeae73b8180fcd7b495ee7af2110afd4caf7ffe153ba2c55cd9ba91b6ad034,2025-01-08T18:59:45.373000
|
||||
CVE-2024-30043,0,0,4238deb754843aa8d72d31430a10f30c6667ebbbec7c44850b6d8f05dd2eceee,2025-01-08T18:56:55.587000
|
||||
CVE-2024-30044,0,0,c23984af5436e2f8cdb7981e48d399d742c3a14edea38f21dc44bdf3d8badb4d,2025-01-08T18:50:31.400000
|
||||
@ -253960,7 +253962,7 @@ CVE-2024-30052,0,0,feb05ec8d13faa8a370fe0b1fe28c0e714784156b747323ede30cca425a95
|
||||
CVE-2024-30053,0,0,65fd346c7990f2cdd0711ae82d91c16e78b5a16baa5880e2cffcb953ec779622,2025-01-08T18:09:06.970000
|
||||
CVE-2024-30054,0,0,208fd51c6e44baf0d897570f55f50e9e26e7f0682cb01924b044db6a064f4934,2025-01-08T17:57:54.547000
|
||||
CVE-2024-30055,0,0,d40900a82e156b5f78aede24cf5411e3dbd4c61b795d8cc3395f093438a333c8,2024-11-21T09:11:09.297000
|
||||
CVE-2024-30056,0,1,347fe50793d58ce0b74c4538ee1704257557dffe94bc7f90d6a7514a4e57a2be,2025-01-08T20:20:05.590000
|
||||
CVE-2024-30056,0,0,347fe50793d58ce0b74c4538ee1704257557dffe94bc7f90d6a7514a4e57a2be,2025-01-08T20:20:05.590000
|
||||
CVE-2024-30057,0,0,b9793e2532dfdaebb4194bb6e92ee863caeee414e13d6455dbf08c10146ae17d,2024-11-21T09:11:09.533000
|
||||
CVE-2024-30058,0,0,20262ca43dabc2c08aa015c0c48b80c60a8e2b5adb6e58d04501640e7acc003a,2024-11-21T09:11:09.667000
|
||||
CVE-2024-30059,0,0,3163a987284d43fc0ffca06b376cb917d6abd4a21ba6d05abf0a3e3c9f35694b,2025-01-08T17:33:36.930000
|
||||
@ -254065,7 +254067,7 @@ CVE-2024-30176,0,0,aa066c55eeeca0fd6bb4beb9ec423ba6486b66e97848e6e3c1974ce998315
|
||||
CVE-2024-30177,0,0,44c797d5a3808fe7f3d09ed56fa89cae0d3f4a517c94d374e7585b27408ea653,2024-11-21T09:11:22.287000
|
||||
CVE-2024-30178,0,0,a5c303cfe3274dddc07583df103192092e5bee518dfa7fb8388fe33b5060991d,2024-11-21T09:11:22.410000
|
||||
CVE-2024-30179,0,0,f8038176185d07e7f724f868e44725dee5d89f9e567d5a1272779cd6cb9c487e,2025-01-08T16:30:39.030000
|
||||
CVE-2024-3018,0,1,f65a264962ae2b96d7ccf9718d594d89d33b43e0d817bc446c0cdf042d66d063,2025-01-08T19:35:58.073000
|
||||
CVE-2024-3018,0,0,f65a264962ae2b96d7ccf9718d594d89d33b43e0d817bc446c0cdf042d66d063,2025-01-08T19:35:58.073000
|
||||
CVE-2024-30180,0,0,9ad3efa7e683e4471ea88f07410b3c0c613e57d65ed8126b5bf9db13a8b4971b,2024-11-21T09:11:22.647000
|
||||
CVE-2024-30181,0,0,4b63a15f923a825c1f6a8173bcb6b942101ded5f17f3fc266f511573c31cc6ed,2024-11-21T09:11:22.757000
|
||||
CVE-2024-30182,0,0,0f6979edc5340254c61dbc0cbd7d4390e6b740ecdf6e9fd97a9d73ad11716bc6,2024-11-21T09:11:22.890000
|
||||
@ -255356,8 +255358,8 @@ CVE-2024-31890,0,0,651fa0b1e1cfc65d537ba9b852527cb69af9fe2a04587dff5261b83358203
|
||||
CVE-2024-31891,0,0,01ff6a81cab4a69609149b5caef3f483d0f0e227ded20c94a2b847f21423d70d,2024-12-14T13:15:17.630000
|
||||
CVE-2024-31892,0,0,135dcdbc319a0ed23513a221119da13b2a8156f6458cff759f3b3e22d1b3e094,2024-12-14T13:15:18.877000
|
||||
CVE-2024-31893,0,0,f9f7cc52ac70574dbdc37ee8d3b0b8ab46f5010ec8db22134e66e018bc4778d8,2025-01-07T21:03:12.027000
|
||||
CVE-2024-31894,0,1,f0d62a7b5dc38de5d26022fd04cc616cb9f12689e57a87cc7f4e9928b0c8ebba,2025-01-08T19:58:17.603000
|
||||
CVE-2024-31895,0,1,f50d5f04db53f9d81b5d66d792a53670922d68d4ae5fd0896a38dc1ac638ebb6,2025-01-08T20:03:38.133000
|
||||
CVE-2024-31894,0,0,f0d62a7b5dc38de5d26022fd04cc616cb9f12689e57a87cc7f4e9928b0c8ebba,2025-01-08T19:58:17.603000
|
||||
CVE-2024-31895,0,0,f50d5f04db53f9d81b5d66d792a53670922d68d4ae5fd0896a38dc1ac638ebb6,2025-01-08T20:03:38.133000
|
||||
CVE-2024-31897,0,0,482d60ce194a404c922472f634fe27b65cdb7d56b2dfc2459272befae42533ec,2024-11-21T09:14:06.077000
|
||||
CVE-2024-31898,0,0,2bdf434c4d06bca201e71e4a7c99060368586d3dea800b988968adc32062eddf,2024-11-21T09:14:06.253000
|
||||
CVE-2024-31899,0,0,e3477cb6ba6850b36435640b21267340780a9020b61b2670506bdd2d9d1ba253,2025-01-07T20:02:40.877000
|
||||
@ -256461,7 +256463,7 @@ CVE-2024-33326,0,0,21aa8e01fa03dd6d6983c046a97e309b8f5e7887cedc440d4110e4bf14321
|
||||
CVE-2024-33327,0,0,39c302e73fc82a3f848eab9abfc551c2864d13ad719d483853a59c8a0053cf0f,2024-11-21T09:16:48.063000
|
||||
CVE-2024-33328,0,0,33679c434ab91b1217203cab95e138c33f1c7ce1a4cb3bcfdfcb0621dc39cfc0,2024-11-21T09:16:48.327000
|
||||
CVE-2024-33329,0,0,7067f41343ccda5aeabe46c2ce7e61ba4aab1aa536000e2f1a46e93ac72f75a2,2024-11-21T09:16:48.477000
|
||||
CVE-2024-3333,0,1,328f7d544ff2f6b320e467b4f7d33f183d77029256027ebbd56ef5dbf319ceab,2025-01-08T19:43:24.987000
|
||||
CVE-2024-3333,0,0,328f7d544ff2f6b320e467b4f7d33f183d77029256027ebbd56ef5dbf319ceab,2025-01-08T19:43:24.987000
|
||||
CVE-2024-33331,0,0,9615eb671a81caf99447cfe3f11a47c5fdeef0f060420da831650ede0c65f0d0,2024-04-28T23:15:07.120000
|
||||
CVE-2024-33332,0,0,e7e9aaf8deef139160b00409125515d32fa34515c193d220df574550f84c4ce1,2024-11-21T09:16:48.643000
|
||||
CVE-2024-33335,0,0,611d5c247a5ed8c68e8c37144affed7213a93ec1992045174cf05e693148d5b1,2024-11-21T09:16:48.797000
|
||||
@ -257732,7 +257734,7 @@ CVE-2024-34993,0,0,3429d7cf9bdcd8eab245a5626633f165ad9973223ed9ada1ce5ac78dbc5cf
|
||||
CVE-2024-34994,0,0,37148eb30e1eae5ae546d9cfe367eceae1af9949507076df10b37b8a6f5888e3,2024-11-21T09:19:40.910000
|
||||
CVE-2024-34995,0,0,abdbc2aef2da3b42556f78c65bc0781f5009a8f6a0313dafe6f17b909e933281,2024-11-21T09:19:41.123000
|
||||
CVE-2024-34997,0,0,13f21ea417fd3af13763e4f3faf7aae4d611bc2d0b48b03ccb7937233e7fb8db,2024-11-21T09:19:41.353000
|
||||
CVE-2024-3500,0,0,46f8e513d40461d38f694b77fb01ff81193905e93f0a98a738965ce837caec5a,2024-11-21T09:29:44.307000
|
||||
CVE-2024-3500,0,1,3c8bc608b6ad5e8f952884ade0c885304cb5cb379f598ad860c126e127175de1,2025-01-08T21:22:53.997000
|
||||
CVE-2024-35009,0,0,2e273427408b1e1fff4030ac74819540f868ad5b2d28acdf5d8d3e4f221aab8e,2024-11-21T09:19:41.613000
|
||||
CVE-2024-3501,0,0,464f9599017e33b9cc1a4bcf26d473c5180d646688d6886bce3e5bd5ecc52e6b,2024-11-18T21:38:33.963000
|
||||
CVE-2024-35010,0,0,a6fc656a98892420eeec5799d99fa4ae7352dad5dd7951f64589362d56d6fd9a,2024-11-21T09:19:41.840000
|
||||
@ -258878,7 +258880,7 @@ CVE-2024-36464,0,0,24cacab9f7d27b304eb6f6bdbe25e10a247232e8a99785c34e9f4b22e14f1
|
||||
CVE-2024-36466,0,0,ac5c096e99aeeb0fa27711ca22d2ffac4f2b2cd27652a43880a2ca285ef1be53,2024-11-28T08:15:05.290000
|
||||
CVE-2024-36467,0,0,5e7c9feb825942e85216b48a8df1264717bc1143e08c34071fc19ccd9af44e8b,2024-11-27T07:15:09.080000
|
||||
CVE-2024-36468,0,0,4d07a97e6229fa96a5beaca4686979827dcdfad71ecdb8cbc5dbb5d925944b83,2024-11-27T12:15:20.383000
|
||||
CVE-2024-3647,0,0,c4f22548ab3ec06e65b06868835f3b288746c169c8dbe48ff7249f6929f90981,2024-11-21T09:30:04.623000
|
||||
CVE-2024-3647,0,1,b8f0180f9ce86851720e736cd3cb7a8ab080972affce96fec42ec379c26f47f4,2025-01-08T21:10:47.357000
|
||||
CVE-2024-36470,0,0,f497d2b42b52913e47101575d034bd9952ffeaf7f900eba3287e2da0f4794583,2024-11-21T09:22:14.430000
|
||||
CVE-2024-36471,0,0,45b1b5747853880277d53a2288bb933531dafe70fc1359863c97a067db1b86ec,2024-11-21T09:22:14.553000
|
||||
CVE-2024-36472,0,0,2141a82cf2963fc87ad353f49c6d6e9a36ee98eea852abcc6337f04d66077509,2024-11-21T09:22:14.733000
|
||||
@ -259039,7 +259041,7 @@ CVE-2024-36740,0,0,26bb12c2c0bac7d2c18f8b182eb360b69df3faa918b57f2b0769297cadda4
|
||||
CVE-2024-36742,0,0,3a8ac06d2b7460d92170f393580d757a9169bcf0cb47f2df5b6b9175dc24eef2,2024-11-21T09:22:35.287000
|
||||
CVE-2024-36743,0,0,997f7cc47dfdd9276a067f7a34f5b7be0237277a0a3157d65da6a25a7753b82b,2024-11-21T09:22:35.510000
|
||||
CVE-2024-36745,0,0,7dbdb6b068ebfce6206826a7b3683b8e3075311b55f148598b550b2d1cdd84ea,2024-11-21T09:22:35.730000
|
||||
CVE-2024-3675,0,0,fb1951f8b1e662422afd95d095a7d04da868263ed5cd871d264d4f1d62b39e7d,2024-11-21T09:30:09.453000
|
||||
CVE-2024-3675,0,1,320c0c6a821e66128af3b5683a2218c46856ee00dab3b257adbda9526c52d243,2025-01-08T21:11:01.357000
|
||||
CVE-2024-36755,0,0,959c7e1c5392de2c0c9f9c3a5e5235cba19560b12ef4e2310e57761b2d2324b3,2024-11-21T09:22:35.883000
|
||||
CVE-2024-3676,0,0,c25c73186d2926601a4bf9263de9e5912c4170cf55771346041257a143aab173,2024-11-21T09:30:09.570000
|
||||
CVE-2024-36760,0,0,2eed0d1b029328b3aaf61411ac108b885b75813a77deb3defd7d8df3d154ccef,2024-11-21T09:22:36.097000
|
||||
@ -259484,7 +259486,7 @@ CVE-2024-37276,0,0,8fa601787078a7d94291da07862d06b98f1c8d76701e8d01e1801face58b7
|
||||
CVE-2024-37277,0,0,6bef2521d0e634706c130550687638a5e0ab6b669a9a86df1df6f2836a4f4834,2024-11-01T20:24:53.730000
|
||||
CVE-2024-37278,0,0,1436c2c246d028569aadd71e09653ad12932a70965aba38322d19c40d94fb1ce,2024-11-21T09:23:31.583000
|
||||
CVE-2024-37279,0,0,abea7d170e037ff0e94eacd5a1d2641ca163a9b9cff50d73ada60b93d302eb74,2024-11-21T09:23:31.710000
|
||||
CVE-2024-3728,0,0,3a0b09299b721cb58c11a4a482c1d5aa0cb0ded740e62b28202762b1eef8a6b7,2024-11-21T09:30:15.667000
|
||||
CVE-2024-3728,0,1,2f47ba3b88b08d1c7f062871db579ad3a810495a3df2f8082be944b99e745aa1,2025-01-08T21:11:21.157000
|
||||
CVE-2024-37280,0,0,82506e10255538602ec664d5ef7d85f7e7cc96b02dfe2ddcef5bb9ae709eaf34,2024-11-21T09:23:31.860000
|
||||
CVE-2024-37281,0,0,4249eefcbdc986d2244e44eaab8c4ce3c8b7e04bc410d0b79fef20d4a2687dce,2024-11-21T09:23:32.010000
|
||||
CVE-2024-37282,0,0,b5291a34bd6835cc4058846acc023216aad27c69e44906c812e14449c733e7c8,2024-11-21T09:23:32.153000
|
||||
@ -260196,7 +260198,7 @@ CVE-2024-3816,0,0,f305e4acc2cd1025a1370918c442df78de339ee2ce9d1a87478975ea74b49b
|
||||
CVE-2024-38160,0,0,8df8b30ae0ff6dd707e13b8e5bb4d0b988ec335d0e3195b45ecbbdd83fb5912a,2024-08-16T20:55:17.013000
|
||||
CVE-2024-38161,0,0,f142ae930f9c00d0046ea169748f3f89f8afc86cf3c0487dbd6a3bc3847d99c9,2024-08-16T20:55:20.973000
|
||||
CVE-2024-38162,0,0,51dd4436aeac7c5a6d44bc9fd4f765bf31f337219fe537874e32898d21453037,2024-08-16T20:41:43.583000
|
||||
CVE-2024-38163,0,1,6ef6bba2339797ed2f361dec8fdb3656af6316aedb2e92a430f2179d6e8a96ca,2025-01-08T20:50:00.877000
|
||||
CVE-2024-38163,0,0,6ef6bba2339797ed2f361dec8fdb3656af6316aedb2e92a430f2179d6e8a96ca,2025-01-08T20:50:00.877000
|
||||
CVE-2024-38164,0,0,0c0328b154209eee72c4c2b996e8e36b27e10dbabae46f853abf885606be6822,2024-11-21T09:25:00.093000
|
||||
CVE-2024-38165,0,0,fbb7382711fe4184f926dbc31fc126a2e43b1a1048a8e4bfd1ea151c19eb0685,2024-08-16T19:06:22.740000
|
||||
CVE-2024-38166,0,0,04cf30e3b63f293d3ec73e3105d8307baa08a61c7284be360a050ad5d3052ec0,2024-08-14T00:15:07.687000
|
||||
@ -260215,7 +260217,7 @@ CVE-2024-38178,0,0,829695ca2f5f6f945a6d3078569a39880265f8104e95e17c838e3f5f685ef
|
||||
CVE-2024-38179,0,0,2c5a894d01e51edb16258b3bed8449de0a4d319183d8d4f8067eaf441dbf7fea,2024-10-22T12:54:12.633000
|
||||
CVE-2024-3818,0,0,7d1d39e82ad91d5622119f4ea866721b9898edf8d4385d793aef1e9795c74157,2024-11-21T09:30:27.840000
|
||||
CVE-2024-38180,0,0,a6dec64e6de789e9b800b1526ade8a1dcd069f78672229cca40f4e8c4b02cf1e,2024-08-16T19:20:22.853000
|
||||
CVE-2024-38182,0,0,63c4376a4109b242c6dd9e322aed342594af0df2094c12cf7ce68947c8a5f7cb,2024-08-13T23:15:19.657000
|
||||
CVE-2024-38182,0,1,f0d85f191f16f62f849a41585c38c60c8eb5e729222a055e8f875398240fa5bd,2025-01-08T21:35:17.920000
|
||||
CVE-2024-38183,0,0,4fc4c4d894ca7a1786bcb11ba2aa9fdf5a300bd2ad84fc8d48e71857af9b39cf,2024-12-31T23:15:20.933000
|
||||
CVE-2024-38184,0,0,f3790a5c112e1dddd845eb925e9feb113ac28f72ae551cab2576dae91ee03932,2024-11-21T09:25:01.623000
|
||||
CVE-2024-38185,0,0,68c185b6e79f5dc2fc3a388ef6a6d9c7412b6d63a7b5f660cddf1001bee86662,2024-11-21T09:25:01.777000
|
||||
@ -260252,7 +260254,7 @@ CVE-2024-38214,0,0,c8a3fe534ac4e0e8bf788c36dd43983cd31bd5060c2468d1512da5b36d8c4
|
||||
CVE-2024-38215,0,0,deb3c401dbb28a6d926f7ff657cf8d9f46c26096bbd4eabc027320dedbde5503,2024-08-16T19:02:41.517000
|
||||
CVE-2024-38216,0,0,9b093a106d5fd0d02a2e9c94614cfe22ee0f0cfb522c3c7774659c5e003c6b62,2024-09-17T17:00:29.123000
|
||||
CVE-2024-38217,0,0,8d8f866ba3fe87021a870e6ab87dc022261c6d1d86fa7560c508caa11a925a58,2024-11-21T09:25:04.820000
|
||||
CVE-2024-38218,0,1,913e19eccc221b6d62bd3f004d9a23c4ecced5bf0793254c82e2e55052cab84b,2025-01-08T20:58:28.473000
|
||||
CVE-2024-38218,0,0,913e19eccc221b6d62bd3f004d9a23c4ecced5bf0793254c82e2e55052cab84b,2025-01-08T20:58:28.473000
|
||||
CVE-2024-38219,0,0,1cb1c7d90c1b0adb344a54b96084a8d918de46bca695ac4e743598772e7ef545,2024-08-29T14:45:17.383000
|
||||
CVE-2024-3822,0,0,779d52ad248a43b7f0b2350ab4f001c9b17cb4419f53eebc20cfa50e7d11cad4,2024-11-21T09:30:28.323000
|
||||
CVE-2024-38220,0,0,7a37fb6e0e0ac028694f1ea6a6ba861e1c9f6f01c7fcf480de64a061c04df8ad,2024-09-17T16:59:37.167000
|
||||
@ -261732,7 +261734,7 @@ CVE-2024-4042,0,0,cecab8b1687d6be49a591036e1f884eeaaaac74f662dec1e0d521caf21f5dd
|
||||
CVE-2024-40420,0,0,2cc64060c56a9cd8ae43221cc949a39e78df1f9a724e5e5fe2d1f288499041f6,2024-12-18T20:15:22.773000
|
||||
CVE-2024-40422,0,0,66694de383944722e2f25fc6c01858a58042d8c38d3705e14f9fc82648bd4ecd,2024-11-21T09:31:04.907000
|
||||
CVE-2024-40425,0,0,57fa5f5d788296fbd065197156216c884c87febf9dc0d47016294cebb94993ba,2024-11-21T09:31:05.133000
|
||||
CVE-2024-40427,0,1,f6ae4b9565a1b165aec968eca0f69b1a73db818924dd66dd558467a4c9023363,2025-01-08T19:15:31.043000
|
||||
CVE-2024-40427,0,0,f6ae4b9565a1b165aec968eca0f69b1a73db818924dd66dd558467a4c9023363,2025-01-08T19:15:31.043000
|
||||
CVE-2024-4043,0,0,d4b5f95f306543d879cec12e990f7b6a12bdbc75a98caec12c24a6e719c63084,2024-11-21T09:42:05.460000
|
||||
CVE-2024-40430,0,0,546dc110e07f45ee3ffd84e8af87c8ef8c5f6d93dcd27e587cb3a3c5233f7799,2024-09-13T21:15:10.357000
|
||||
CVE-2024-40431,0,0,e23592fbcb9fa660acf205a0231389b077a5c59972c85ee664d839efe06b83e4,2024-10-25T12:56:07.750000
|
||||
@ -262625,7 +262627,7 @@ CVE-2024-4171,0,0,1f56b05b395cd02714b648c07b8a801ca2a6b7d7ba94332e3b402d08208eaf
|
||||
CVE-2024-41710,0,0,837dd028ed039442f3fba358e71963b23cd81e157e2fc72a4188e4393c3eab4e,2024-08-14T18:35:06.257000
|
||||
CVE-2024-41711,0,0,68dd962f9a2631075d76b0f5dc2808ef613409420c9c9f99aeacaa5e6120b709,2024-08-14T16:35:15.033000
|
||||
CVE-2024-41712,0,0,2f73817818761739ebd31e3092aab4346b1ccc796b65799081ae94b063a67a15,2024-10-23T21:35:05.607000
|
||||
CVE-2024-41713,0,1,3487c8ff851c3a481ae23b368979a3242ff57f7c48f30db291ef2ed6aefdd218,2025-01-08T20:31:25.237000
|
||||
CVE-2024-41713,0,0,3487c8ff851c3a481ae23b368979a3242ff57f7c48f30db291ef2ed6aefdd218,2025-01-08T20:31:25.237000
|
||||
CVE-2024-41714,0,0,194b12585502057ff43eb474c8822c4bfff8557ec724eea446f51fa6890f4643,2024-10-23T15:12:34.673000
|
||||
CVE-2024-41715,0,0,2b361ed47bf6f81c6f17e8f44a6337c83a629e946281f8818c6e5fb6899097f4,2024-10-17T17:15:11.530000
|
||||
CVE-2024-41716,0,0,ab9b276c3da529c12bb40ef0d240bdb9954f1f4c86c22f5ce809e71a30285125,2024-09-13T19:53:47.723000
|
||||
@ -262961,7 +262963,7 @@ CVE-2024-42103,0,0,e9d1505615759d84b473a923219bea4c374e074e16b9df0ad5a10e4744ccf
|
||||
CVE-2024-42104,0,0,37643f8ca9c0f5ea248c66fc49683931b4d627367cd8eddcfc0ca016c3bf1fa1,2024-11-21T09:33:36.543000
|
||||
CVE-2024-42105,0,0,03e955b522490db0edaa227d4d15e3601e0044286b6517c93bbbdcc4c8e9fb6b,2024-11-21T09:33:36.693000
|
||||
CVE-2024-42106,0,0,3bfd515eee852b0f11ba9fb55133cd8305e17e0fbed4a149536610f3ac78c9c6,2024-11-21T09:33:36.830000
|
||||
CVE-2024-42107,0,0,f70e81876b6809847de88b301b26601763686f95ee363215a5d108be46731816,2024-11-21T09:33:36.967000
|
||||
CVE-2024-42107,0,1,7dfe60daa7c3bd6e1edb30da6d94fb531f783127afbef2ae222dadb30efd2cf7,2025-01-08T21:32:03.527000
|
||||
CVE-2024-42108,0,0,d5a469d5957316edbae938180a1d5e1c7bf006df0a49a7319d022d93a92d5108,2024-12-19T19:15:07.023000
|
||||
CVE-2024-42109,0,0,b37ad7c335453468153db5a09c0eff792186c290c2f1d13a1164b459f17bf15c,2024-11-21T09:33:37.223000
|
||||
CVE-2024-4211,0,0,3f4d9c089b9fcbdc49f631c3140d7bb6d7f76e9aa4ec903c896a2b0845e1a5d2,2024-10-21T16:15:09.963000
|
||||
@ -263249,7 +263251,7 @@ CVE-2024-42422,0,0,f64eacceb341ef4b768f40ee59a3acc8f645f72652a962c616340fa5fb7a9
|
||||
CVE-2024-42423,0,0,8264e3551cb249dc1d0a50016c0beecba4be32a4ea61b5936f8d0d7397afda33,2024-09-20T19:42:20.417000
|
||||
CVE-2024-42424,0,0,cdd20f106ec5d8232f1cf93d7c25f7e27225ced2de6387354bfbd69f26558307,2024-12-20T14:41:45.593000
|
||||
CVE-2024-42425,0,0,4b136399741737f30b4c8074218caee04298fffe4ffb70bb1828268e47340c65,2024-09-16T15:46:03.110000
|
||||
CVE-2024-42426,0,1,542eed5457725706713e83197f6e7952048061b311624c0a21287ef612b42519,2025-01-08T20:06:04.867000
|
||||
CVE-2024-42426,0,0,542eed5457725706713e83197f6e7952048061b311624c0a21287ef612b42519,2025-01-08T20:06:04.867000
|
||||
CVE-2024-42427,0,0,e27087303ea5100deec42ac0b4f9f58e1be3170e3db42adb071e149bc5ec50df,2024-12-20T14:43:52.363000
|
||||
CVE-2024-4243,0,0,fca6a85a4835b49fddf5d0335fd4a7549a8fc3f34d76f463d721c47ebcb74e87,2024-11-21T09:42:27.497000
|
||||
CVE-2024-42434,0,0,9351c3a6511f8bd4654b992e3a2dc28615806892c5ceb04ccff2f3cbfaf8ce4b,2024-09-04T21:35:50.963000
|
||||
@ -264261,7 +264263,7 @@ CVE-2024-43774,0,0,267603d5dcdafd9bbb030b267307fb5b633f3e8c3df39d738d42af146bd76
|
||||
CVE-2024-43775,0,0,895151aa205f09b9fadb348edccc220463b0287de3568477154d6fffb476bf97,2024-09-04T12:27:22.670000
|
||||
CVE-2024-43776,0,0,0e7377c058f9e86c53a9fbcebac62784c97230bd50dee78fb2efa5dfee29a277,2024-09-04T12:27:40.113000
|
||||
CVE-2024-43778,0,0,93d68d17e0a2e000a95bbf7644af02e0b191bd578d600aa43c2fc854145868d0,2024-09-20T12:30:51.220000
|
||||
CVE-2024-4378,0,1,d4319ee5339d2a9817c61070bfcf510c89afd3406f28aa380fe0de9169b486dc,2025-01-08T20:07:57.800000
|
||||
CVE-2024-4378,0,0,d4319ee5339d2a9817c61070bfcf510c89afd3406f28aa380fe0de9169b486dc,2025-01-08T20:07:57.800000
|
||||
CVE-2024-43780,0,0,46050aabd5861673e59431ba81794de47ac0366f2a10d4dfb8ab15f44f094284,2024-10-16T20:07:50.637000
|
||||
CVE-2024-43781,0,0,169ded40ca31dbd1f0dfd97b5659e936ba8664c1c6e73ed600899e39b741292b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43782,0,0,80ce351b892b39ea82a01db8909423e89d3634e1531e17d24b79841d353bdee4,2024-09-12T18:29:50.943000
|
||||
@ -265361,10 +265363,10 @@ CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae221
|
||||
CVE-2024-45337,0,0,0204a585b71dc2eafeae0a7aa43ff297085c36ff7e1720071b48d72e387539af,2024-12-12T21:15:08.500000
|
||||
CVE-2024-45338,0,0,4b2d696f8670e697ae1161a5584acef0120067536ac2182d79f6e6c35006631f,2024-12-31T20:16:06.603000
|
||||
CVE-2024-4534,0,0,05ec1ad9bbf04373d4c888e50c4da6ee25a8849a5c55f74fc5c0d8923189992d,2024-11-21T09:43:03.287000
|
||||
CVE-2024-45342,1,1,a4a31e9769756ae24649b74b18bd2d95ae5ebb0482440ad62570ce13c5ec4304,2025-01-08T20:15:27.583000
|
||||
CVE-2024-45343,1,1,318ff9ada4e764bd6c635c00720e7b9030062bb890baf82a7e3f16a4a83b72fb,2025-01-08T20:15:27.690000
|
||||
CVE-2024-45344,1,1,af604bd20c17ff15fecd0779ea006a02560ba533390f654e0b99f1b752eeb5b0,2025-01-08T20:15:27.753000
|
||||
CVE-2024-45345,1,1,4e5002e5dc81035c1af4e238f5f319df35e1e7454ff3bb9f51dea50624303a65,2025-01-08T20:15:27.843000
|
||||
CVE-2024-45342,0,0,a4a31e9769756ae24649b74b18bd2d95ae5ebb0482440ad62570ce13c5ec4304,2025-01-08T20:15:27.583000
|
||||
CVE-2024-45343,0,0,318ff9ada4e764bd6c635c00720e7b9030062bb890baf82a7e3f16a4a83b72fb,2025-01-08T20:15:27.690000
|
||||
CVE-2024-45344,0,0,af604bd20c17ff15fecd0779ea006a02560ba533390f654e0b99f1b752eeb5b0,2025-01-08T20:15:27.753000
|
||||
CVE-2024-45345,0,0,4e5002e5dc81035c1af4e238f5f319df35e1e7454ff3bb9f51dea50624303a65,2025-01-08T20:15:27.843000
|
||||
CVE-2024-45346,0,0,42bcf491a94494c9433ce7696078ac7ab2eca46d8c28dcac4158f4b2b20fa4a5,2024-08-29T03:15:05.247000
|
||||
CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000
|
||||
CVE-2024-4535,0,0,09bcb906ab5065886bd16710eccdce15006e447ef07dbc5cac7e797ac8618de8,2024-11-21T09:43:03.457000
|
||||
@ -265558,7 +265560,7 @@ CVE-2024-45622,0,0,b710e3973bc54105a6c52433711f835588415a56a038ced9ed7020c8b95ca
|
||||
CVE-2024-45623,0,0,5c441374691aca3d3dc1871007085f3589123ddb707473a40f59605250fae5e7,2024-09-03T15:35:15.360000
|
||||
CVE-2024-45624,0,0,b55674d4570db6379ffcfb68d511bfd6e80435e71433865e310cb34f4d504a6c,2024-09-12T15:35:48.600000
|
||||
CVE-2024-45625,0,0,d20161a4995ace7748c12e338379fbc120e9cd3065297a8eb4465406af4a3f9e,2024-09-10T11:19:40.113000
|
||||
CVE-2024-4563,0,1,b89c6e32d64d62a8b24c69598703856273065e960659587d8cad79f58476b289,2025-01-08T19:51:35.093000
|
||||
CVE-2024-4563,0,0,b89c6e32d64d62a8b24c69598703856273065e960659587d8cad79f58476b289,2025-01-08T19:51:35.093000
|
||||
CVE-2024-4564,0,0,ee8f47044242c05a630f54d8d399a7051500b8cbd4c8fa39ec50216846d2f2cf,2024-11-21T09:43:07.050000
|
||||
CVE-2024-45640,0,0,4f7258d4a10770dd15c770b196db9f2c63abfae563acccd54bf2aa4b6de18d73,2025-01-07T13:15:07.690000
|
||||
CVE-2024-45642,0,0,cfb188922d2de3d0a2e624109932e190c43782f5c9c1e7fb30a5b975a8a432ea,2024-11-16T00:13:06.017000
|
||||
@ -265988,7 +265990,7 @@ CVE-2024-46597,0,0,c52dc232c382bb8b06d8853357df9fa3c69df01498ea057ff4e6221b106d8
|
||||
CVE-2024-46598,0,0,cc14f076324de01fb0aedc665220d3a3ce311adfb4ca6be3700a7951d6f4c5a6,2024-09-24T16:37:39.833000
|
||||
CVE-2024-4660,0,0,61cefac851d738e6211130f613c3c24b72cb5a59425ed2099eb13a6958c5f9b7,2024-11-21T09:43:19.410000
|
||||
CVE-2024-46600,0,0,a2edf2944e549d9be47dd52eb91fd1fdfd1682be8e1c383075c7935775b4a0c4,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46601,0,1,a16e25e4092f7703bd60435f36d4f4383300a868d570208b6df199e7fbcdbc35,2025-01-08T20:15:27.920000
|
||||
CVE-2024-46601,0,0,a16e25e4092f7703bd60435f36d4f4383300a868d570208b6df199e7fbcdbc35,2025-01-08T20:15:27.920000
|
||||
CVE-2024-46602,0,0,9bf065832521a48ba06a7d71177908b2b7ce3608232449bb38e1d8f5f48286b3,2025-01-07T19:15:32.597000
|
||||
CVE-2024-46603,0,0,c30a25f7b88dcc01303c233fbff3cb3e51c22a29f42bd3bc5cdd7863e4696348,2025-01-07T21:15:11.983000
|
||||
CVE-2024-46605,0,0,1055d0ef26a73f5e645f2fdb8709387122d75ec2801b9b56966b3a9b26aba333,2024-10-18T12:53:04.627000
|
||||
@ -266072,7 +266074,7 @@ CVE-2024-46711,0,0,1222b9c2b9d6ec4a363865be966308156a25e93fd22779e56d5e1515f08ee
|
||||
CVE-2024-46712,0,0,0fdcee671c653661bb3df2e51c82e4650050d2f6ee04a8ebc9f4162b97c4c552,2024-09-19T13:09:22.957000
|
||||
CVE-2024-46713,0,0,a6f4ee9871c0b122806551f92aee6c4bb9f19a62163eec4e9b4f68119693903f,2024-09-13T16:37:22.997000
|
||||
CVE-2024-46714,0,0,85945af8eaa7caa4292985820578b6de456405cc547cc7a2cbc8d6549e9b6e00,2024-09-30T12:50:27.723000
|
||||
CVE-2024-46715,0,0,f6acc12b1eecea12bf9d6f195b39a00b75ddb201277b4ad1fc8ac95e25d25405,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46715,0,1,3b67fd96df7c47a51127ebed9497a1cdeb29999b280773af49c38e601a9726a4,2025-01-08T21:30:44.227000
|
||||
CVE-2024-46716,0,0,285e828ee8aa50fa4c3aa4bd8a3abe4a01c20af8ed00007aa5c1fe4778857afd,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46717,0,0,cd61e7eb874e3f98372d85a33e9e40d7e36ee1787456cd2287e7b17844f088a5,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46718,0,0,900cf0c6c1a69e700d46f12e93b7fb3c7ac208373a9c299b455c66344a9143ca,2024-09-20T12:30:51.220000
|
||||
@ -268174,7 +268176,7 @@ CVE-2024-49701,0,0,faa8cd67d7f87e8b700116e3ea01c26a0bace35a674e83df64e802c479757
|
||||
CVE-2024-49702,0,0,95504b65313eac7b0c032b66b56870b8b510aa5556c8e61dadfd6a9c41944713,2024-11-08T14:32:56.010000
|
||||
CVE-2024-49703,0,0,773f468dd20b89d6b077ffb05058547737a4c510a41e2a52930200811683b9b8,2024-10-25T12:56:07.750000
|
||||
CVE-2024-49704,0,0,011946741b0918ef57c6cb1900342b7378aadc477a57c2845fd73363988334a5,2024-12-10T14:30:44.573000
|
||||
CVE-2024-4971,0,1,17f65e33f654be41e85b2c190603b91b92e7c1a1f8fa7f8e99556cdd76507595,2025-01-08T19:28:26.847000
|
||||
CVE-2024-4971,0,0,17f65e33f654be41e85b2c190603b91b92e7c1a1f8fa7f8e99556cdd76507595,2025-01-08T19:28:26.847000
|
||||
CVE-2024-4972,0,0,6d57573ddd08bf2299e1f6597809329f00babdc0f3ad1d5869880ad1a42cee17,2024-11-21T09:43:58.863000
|
||||
CVE-2024-4973,0,0,19ccbb7e67bd4c75d6b883a0abe41227afb09f5e151258438b28388488924a3a,2024-11-21T09:43:59.010000
|
||||
CVE-2024-4974,0,0,d16672721f53b136de1b80de87435b925886996f97e506cdb2d6dc9e6ef8a3f1,2024-11-21T09:43:59.157000
|
||||
@ -269335,7 +269337,7 @@ CVE-2024-51431,0,0,828fd39fe0bf7bfec25d83e9c0a08cb7b9c4b5cc6704676ba7781e14660e7
|
||||
CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a4111b,2024-11-04T22:35:10.037000
|
||||
CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000
|
||||
CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000
|
||||
CVE-2024-51442,0,1,35e63d5f1781e450c7e8c0c28531cca65bad128d0eee09f5a8d21bd8b9f8ce4c,2025-01-08T20:15:28.137000
|
||||
CVE-2024-51442,0,0,35e63d5f1781e450c7e8c0c28531cca65bad128d0eee09f5a8d21bd8b9f8ce4c,2025-01-08T20:15:28.137000
|
||||
CVE-2024-5145,0,0,1ce6a725d120216d833ed23f25099d9f4810ecb9d4c63ffcf11012cbf68534d1,2024-11-21T09:47:03.920000
|
||||
CVE-2024-51460,0,0,0d1d0884deead80ce10e102d7fe3745fd378c1bb1816cc36f4177c2f9263fd37,2024-12-11T13:15:06.510000
|
||||
CVE-2024-51463,0,0,c0364c05afe1e0b2d0890e7f96c1b512b7afe4d3c2862d4a930e0585099ce1e6,2024-12-21T14:15:21.453000
|
||||
@ -270352,6 +270354,7 @@ CVE-2024-52862,0,0,38d6d5355e836074358c16f05c0d64f338c50e9ed2c4ba8e1c39a7c2a8895
|
||||
CVE-2024-52864,0,0,5aed2598110b254c3d64ec7569ade01fe6bf6ea08bd9b96449615a122a0e7958,2024-12-13T17:37:46.930000
|
||||
CVE-2024-52865,0,0,d77c984fda3ac5b6322fda83849195e30728a895341439024cb7eb650daf701d,2025-01-07T18:15:19.667000
|
||||
CVE-2024-52867,0,0,b14a9f7c8b0d212f056e38d3758777be722d9d6a10918da14d6ef6ffa3fcbd7e,2024-11-21T09:46:35.283000
|
||||
CVE-2024-52869,1,1,0e1bcc211838c1a54b69a90e7890a77934c3c88694b0d9758ed37975ae5d553d,2025-01-08T21:15:12.523000
|
||||
CVE-2024-5287,0,0,ede9629ba14e7833d0e00ab367a4e2205145f22a5dce3f4d9b720c5001bdf2cc,2024-11-21T09:47:21.753000
|
||||
CVE-2024-52871,0,0,bc912334ad7760e2905477f1da15c92d58ec818da9de2502b7206c7a0336bc4d,2024-11-18T18:35:09.027000
|
||||
CVE-2024-52872,0,0,d5c137691ac8affde2eb9f0d98f11a2242b42b7ed558ce4003950a43927045f3,2024-11-18T18:35:09.270000
|
||||
@ -270599,15 +270602,15 @@ CVE-2024-53195,0,0,40822fada027fbaf05987cc9ce8f2e124b2f2431fd5b4c0d0b70ffbb4d2da
|
||||
CVE-2024-53196,0,0,669eac4dafb6edf221cee20cd1683d2b1f89e85f60c1d2407e34dd687651f534,2024-12-27T14:15:27.267000
|
||||
CVE-2024-53197,0,0,2a02fe43ca0d2ec1b7735c0353b4e4bd40b3a62fa3d7d938d0e84d17e1a7da5e,2024-12-27T14:15:27.383000
|
||||
CVE-2024-53198,0,0,f76e0b82729683820652f1234ba21a690c649007ef042099a42d2c297481fc8c,2024-12-27T14:15:27.497000
|
||||
CVE-2024-53199,0,0,340a0d542c843405ff1093a5716faafd3c6aa3928e65460fd3f70bfeb9fc29ac,2024-12-27T14:15:27.623000
|
||||
CVE-2024-53200,0,0,eb517e426a859155b82def8ac15cf8fdd157a56ab9cb8cc70d8605f3f24d1258,2024-12-27T14:15:27.733000
|
||||
CVE-2024-53201,0,0,91d8b11d9db782848c273e96387188cdd4ce8d721088db1edd76f1846d079e2c,2024-12-27T14:15:27.853000
|
||||
CVE-2024-53199,0,1,b7d164e48aa05e3c01fb8207aa331e220207154288cf87cf44ac3ccbb8685b3a,2025-01-08T21:29:46.280000
|
||||
CVE-2024-53200,0,1,382e2ed7c91ff816c9972e95788547d617ab94e25d45361504cd38a28e7c4e1f,2025-01-08T21:29:35.877000
|
||||
CVE-2024-53201,0,1,c711eb722b8f180d53de7616fe5e83ef81c9c735e27696929f70cbb31bb1797d,2025-01-08T21:26:58.670000
|
||||
CVE-2024-53202,0,0,7d23e49d3acff80a64d7280021d5b5a203b4ae3822284474ef22a299df0b3198,2024-12-27T14:15:27.970000
|
||||
CVE-2024-53203,0,0,5b84b307ac617b2733d67355e11a8602cacf08603e863af6ef90308e193fa443,2024-12-27T14:15:28.083000
|
||||
CVE-2024-53204,0,0,a67dade237e65bb4a6674739087981fbee3f96204ef4395e1de0111b2e3875f1,2024-12-27T14:15:28.207000
|
||||
CVE-2024-53205,0,0,310e80c96eec5b9caeb40d4ac42b3fdd15b85eabb0a1c3c5481d29db45eb8c48,2024-12-27T14:15:28.340000
|
||||
CVE-2024-53206,0,0,268ffd34c64b364fd0d3805c6b95329cc878e29dffd09db69b06c8766424586d,2024-12-27T14:15:28.453000
|
||||
CVE-2024-53207,0,0,b666c494ce96c52e32b1ea784a2f41ec1f2899053a397e9626ef6224079275b3,2024-12-27T14:15:28.563000
|
||||
CVE-2024-53207,0,1,eb965d61db6125837dce0de6ef3af14c44ea9331488a35d8508a0d1b2053b009,2025-01-08T21:26:42.470000
|
||||
CVE-2024-53208,0,0,63742018889492dd1dd5b9e0af113e5a83b85a62bad173e2517dd29f6597d6c4,2024-12-27T14:15:28.677000
|
||||
CVE-2024-53209,0,0,250dcad80d4d09ca7de716f0788117fc7d9f3ac4ecadd8b7cf17ab3f32be6e8c,2024-12-27T14:15:28.793000
|
||||
CVE-2024-5321,0,0,0f218b8b6fcc3fc0b4ccef7040ede5ee801dc8e00258e6450bd3f123b6e73ca4,2024-11-21T09:47:25.283000
|
||||
@ -270624,7 +270627,7 @@ CVE-2024-53219,0,0,1b00affd94d61b5de19fb81e8faa16b477bbd2cfbef7cdbfc96c17cbff884
|
||||
CVE-2024-5322,0,0,6e9032fa3deabc9be71dae1989b7f0a781e1608a9b8c8f048902e90e4caef6d4,2024-11-21T09:47:25.413000
|
||||
CVE-2024-53220,0,0,f26063a76be1c0bb3c1467e74b1938b9624affbdebeb012a0b5099418d517cde,2024-12-27T14:15:30.077000
|
||||
CVE-2024-53221,0,0,c8102bf3e45423d3a5b6f80cdd7023cf3a790a173fe11da52f6b9a7e049785dd,2025-01-06T17:18:20.647000
|
||||
CVE-2024-53222,0,0,f47a5510f6b23d61cde71f55aaf5c70eb4fbab132cd4c256d01cfe97bfe4ae80,2024-12-27T14:15:30.327000
|
||||
CVE-2024-53222,0,1,f2c4441be714582636df5f4fbfdb327d4a44fc5f203c669f2bde6089ed7ac932,2025-01-08T21:25:39.027000
|
||||
CVE-2024-53223,0,0,1fb9775898b8edbe24341acf3f71ecbe157ce3c086c57964866b83250fee9b02,2024-12-27T14:15:30.453000
|
||||
CVE-2024-53224,0,0,336b7f256f93ca4c42653234db59c438e5694f32d74f85e7f140e28d6a850d12,2024-12-27T14:15:30.583000
|
||||
CVE-2024-53225,0,0,54a582b699de817df243bd1fa3b72bd7fcc44132f78acb35cb6f8a61ed85e2ca,2024-12-27T14:15:30.687000
|
||||
@ -270747,7 +270750,7 @@ CVE-2024-5351,0,0,a2df3cc9be27d64a2cd3dc5a2f1d5f6a44f6e98794670e6c0c19928c9af58e
|
||||
CVE-2024-5352,0,0,afede3a744404a4b63e0d831a5ec0e86e744b459100c94c26c1030a6d60025a6,2024-11-21T09:47:28.743000
|
||||
CVE-2024-53522,0,0,7466344c37c80a75f9949c9a474636edf28718607b90a0d9bf7bdac59eda3ec3,2025-01-08T16:15:35.343000
|
||||
CVE-2024-53523,0,0,62264463ec7bd597c8cd954da8d0baf08b58aa4c7ac24397d44469055812e6bd,2024-12-11T17:15:20.073000
|
||||
CVE-2024-53526,1,1,ede57fae3431829224893dc09bc40f4c776204f72e0aae08407837c7556dcee5,2025-01-08T19:15:37.753000
|
||||
CVE-2024-53526,0,0,ede57fae3431829224893dc09bc40f4c776204f72e0aae08407837c7556dcee5,2025-01-08T19:15:37.753000
|
||||
CVE-2024-5353,0,0,797e03a5615e2bede928ac816012d8783c471de5bd74a0480881887afd7a657a,2024-11-21T09:47:28.863000
|
||||
CVE-2024-5354,0,0,e179ff0fdd33289a32ca4c68c73a51c0aa8ddee9c94944cd1d4fd7185f36a76c,2024-11-21T09:47:28.997000
|
||||
CVE-2024-5355,0,0,5ae56d862872a5268a44df2d0e26a54aa307acbf5ff2835727472c989e377b6d,2024-11-21T09:47:29.130000
|
||||
@ -270756,7 +270759,7 @@ CVE-2024-53554,0,0,21a54d7bc341c058102c672add5c6a39faba0998e6b5d3050bab27868ab59
|
||||
CVE-2024-53555,0,0,98c9cd71300d5c5a0ee8cfe56c2efb641372e5ee4508b44193ca67680ed7c7bd,2024-11-26T21:15:08.560000
|
||||
CVE-2024-53556,0,0,197a1e9e5d0cdfa43597989d9978403511315370ea045225b596c7a587a5fd41,2024-11-27T17:15:14.917000
|
||||
CVE-2024-5356,0,0,8f1946b6e2ffce8dd75d8f13404335223fd7f289a256fdd41018e919f0c821b6,2024-11-21T09:47:29.267000
|
||||
CVE-2024-53564,0,1,7ea83dd4228ad9fe306e60deab2e4027cefc6d3838f1d5c87cada287f927dfcc,2025-01-08T19:15:38.050000
|
||||
CVE-2024-53564,0,0,7ea83dd4228ad9fe306e60deab2e4027cefc6d3838f1d5c87cada287f927dfcc,2025-01-08T19:15:38.050000
|
||||
CVE-2024-53566,0,0,fc369a1b56664965996271c6928e1c8e2a064ca2d4eb527d8b2effd8b48ca032,2024-12-02T18:15:11.500000
|
||||
CVE-2024-5357,0,0,9057606a4938c9bbcd6685626eec47e410331b31cc1665fb8c9e75b9a990e3a5,2024-11-21T09:47:29.400000
|
||||
CVE-2024-5358,0,0,ba9d3d6f584bd09e4f2a4dbb07d0235a0771fbffd077ecd2b7b801a3c6466c2b,2024-11-21T09:47:29.543000
|
||||
@ -271034,6 +271037,7 @@ CVE-2024-5399,0,0,288e52e14a6c0d307abe51f4547e4c97fb8609187689201d5c80525711bdfe
|
||||
CVE-2024-53990,0,0,c12d8d6491761b84e3c9cbf6d8d0ec68eb0e2a55a4d29316acb646b0bf606b88,2024-12-02T18:15:11.753000
|
||||
CVE-2024-53991,0,0,1aa3d39cfb5149ae5d3c6a1fbecf948ce6ac704feca22e25e4683b08ebe298d4,2024-12-19T20:15:07.670000
|
||||
CVE-2024-53992,0,0,0b3a35495bb74067a0d76912041d2b5ea6535fc009d5110d24df3f489d2b8ff8,2024-12-02T17:15:14.113000
|
||||
CVE-2024-53995,1,1,fd999c775946ba421ca996b1d1eac859e635f45fd6d33cfb33931dad116fe251,2025-01-08T21:15:12.703000
|
||||
CVE-2024-53999,0,0,9f5b40515f60aea6e9321651c1e98cb4d03b442ece2375483b9e36332d7840ba,2024-12-03T16:15:24.250000
|
||||
CVE-2024-5400,0,0,fa1089745765c8c92c3b698eeb8bc3e2fdf4bae4a68ce66e55e2111c1b051015,2024-11-21T09:47:34.830000
|
||||
CVE-2024-54000,0,0,52062f56a88a90280cce905a1f064658e0e87c6309ff02349950b495d69ff132,2024-12-03T16:15:24.380000
|
||||
@ -271046,6 +271050,7 @@ CVE-2024-54006,0,0,6bd5efcea443530b6f536e39e0d35c4df9fc909f18659576dbacb0ce5ccde
|
||||
CVE-2024-54007,0,0,796fbe1a2dec13fc9ac82cc0124bd0d476bde5dd7ac7433c3ded9782c4bc47c9,2025-01-07T19:15:32.927000
|
||||
CVE-2024-54008,0,0,eea0fea8f522a304d841eaa6b0b75d4fade41407f80f4626ca71a3072a5c233d,2024-12-11T14:15:19.713000
|
||||
CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f828,2024-12-19T23:15:06.887000
|
||||
CVE-2024-54010,1,1,b04b4830cc7fb027e8ccc476bc48098c8473d37fe42c62b91bf9299fec2ea80f,2025-01-08T21:15:12.900000
|
||||
CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000
|
||||
CVE-2024-5402,0,0,369141076231aa822f3b7e1a9c4a08753a10cb13fa106f65751574195737991f,2024-11-21T09:47:34.947000
|
||||
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
|
||||
@ -271508,7 +271513,7 @@ CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade3136481
|
||||
CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000
|
||||
CVE-2024-54810,0,0,98b1b32485df996df7d9929d6a4a4f3f6576d87de7e3a8405b0f88648f287e10,2024-12-13T18:15:21.707000
|
||||
CVE-2024-54811,0,0,c518d2be0055f2f694c9ca48885a5257eabcc0287b36c8555688778fe5e578d7,2024-12-13T18:15:21.940000
|
||||
CVE-2024-54818,1,1,107ce36bb49927696cb73b8a0138886f2981d404615a80bdf8340dd3abd3f997,2025-01-08T20:15:28.303000
|
||||
CVE-2024-54818,0,0,107ce36bb49927696cb73b8a0138886f2981d404615a80bdf8340dd3abd3f997,2025-01-08T20:15:28.303000
|
||||
CVE-2024-54819,0,0,5c1961a544502914eb3b6471593c9f93ff2e75de98f3ccb61d07b0e0c14fa158,2025-01-08T15:15:19.317000
|
||||
CVE-2024-5482,0,0,201df0de22cd2de6baef389275fa06366007791ec5f711f789012d102cd7d319,2024-11-21T09:47:46.010000
|
||||
CVE-2024-5483,0,0,079d428e5ef1f2457bdcfb946982be872b42b40e94b6bfbc28ab3fe49f413326,2024-11-21T09:47:46.130000
|
||||
@ -271557,7 +271562,7 @@ CVE-2024-54983,0,0,149f3772b456c1ff99a44fd44b0ae178f010b2926690711624e998da7ad36
|
||||
CVE-2024-54984,0,0,3c6b13090909d3934507dc7f38f4e66c664045495e844f3883a0db8064e98820,2025-01-07T15:15:10.720000
|
||||
CVE-2024-5499,0,0,bbe4dd69894f0f98fba609f59dfd6e7af7f9cec1f980c4939ff30b774a53a4b5,2024-12-26T16:07:06.693000
|
||||
CVE-2024-5500,0,0,280f34db2c8783872a68d6daa217e3e1e4614074bb8e8b0a741315b28d98613a,2024-11-21T09:47:49.373000
|
||||
CVE-2024-55008,0,1,46155f9f511c9f5f76f29eb42e0ab350c4f420855b69bdcc893ca8113faf6544,2025-01-08T20:15:28.467000
|
||||
CVE-2024-55008,0,0,46155f9f511c9f5f76f29eb42e0ab350c4f420855b69bdcc893ca8113faf6544,2025-01-08T20:15:28.467000
|
||||
CVE-2024-5501,0,0,c16d3f86bb6f5e02795073b49cb84dc8c7e7a5718a6fed025ea914c4721b4cad,2024-11-21T09:47:49.573000
|
||||
CVE-2024-5502,0,0,5a18d45bd85121e2ecc06d05133613fd7aff163eb02902343f6ea41930ef607b,2024-09-12T21:05:37.880000
|
||||
CVE-2024-5503,0,0,9845e42fb1624974feec370d0d7a831f8d27d3205ac47bd2622c9c03ded76cc7,2024-11-21T09:47:49.763000
|
||||
@ -271627,7 +271632,7 @@ CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402ac
|
||||
CVE-2024-55408,0,0,f29d22484915f373690eb82371db4cff76b365f8201325c0d76b3e731d67ff58,2025-01-07T22:15:31.260000
|
||||
CVE-2024-5541,0,0,f9b4d455e6b62fc87b5177b190c5e5d55cffd60f56e01c7f957c7d36f3e08c46,2024-11-21T09:47:53.453000
|
||||
CVE-2024-55410,0,0,a341b2a61f8dc44291b67917ab046b0ca56af6f84ecbeba25576f5a2ddd34b5b,2025-01-07T22:15:31.423000
|
||||
CVE-2024-55411,0,1,e79315ed14538192b3442e269ae3df7163b086fe6589e73b0be27cd11820e5cb,2025-01-08T20:15:28.640000
|
||||
CVE-2024-55411,0,0,e79315ed14538192b3442e269ae3df7163b086fe6589e73b0be27cd11820e5cb,2025-01-08T20:15:28.640000
|
||||
CVE-2024-55412,0,0,492ff029e687dc426b43e155e183e30d83635b8bd9198a179052d60e8971056e,2025-01-08T16:15:35.527000
|
||||
CVE-2024-55413,0,0,e71132936dff763cacd1e3af9fafa9260fb08cafb24be1848dd04f5f45cfd409,2025-01-08T16:15:35.717000
|
||||
CVE-2024-55414,0,0,9fbe004e5b78117f4dbe49f0ac8bd9b93d7d50832df3cfac0515d848006dd754,2025-01-08T16:15:35.883000
|
||||
@ -271658,7 +271663,7 @@ CVE-2024-55513,0,0,fedcaafc6e85e6bd74dcc7a40ecdf11b2568dda1579c04082d671c5acf74e
|
||||
CVE-2024-55514,0,0,1ab6d03dbd59f8b12772670ec93c7ec4ae46219483a32dbdb16b58811fc912d3,2024-12-18T16:15:14.900000
|
||||
CVE-2024-55515,0,0,aa63dd224a4ced8fb9deb1eadd4b58815859b25e0d9ddafab8ac8045b9bd13ff,2024-12-18T16:15:15.090000
|
||||
CVE-2024-55516,0,0,4229f59dc90fe9b1d907ed2bb61094e572306fdea72c70c9a7f771b2d9b1733b,2024-12-18T16:15:15.263000
|
||||
CVE-2024-55517,0,1,75c5a4d411c549a5d957f7b0fe65313c325e61ab29b98b405b291e2c36c5f6f9,2025-01-08T20:15:28.810000
|
||||
CVE-2024-55517,0,0,75c5a4d411c549a5d957f7b0fe65313c325e61ab29b98b405b291e2c36c5f6f9,2025-01-08T20:15:28.810000
|
||||
CVE-2024-5552,0,0,779c8b119b5a7bc042c6e25c9be4959c8015ea49092434c017d15512182ef4be,2024-11-21T09:47:54.927000
|
||||
CVE-2024-55529,0,0,59094f574a1ef2f6096a3e5fba1fa56f532a786844da89e23934c518ec5e2e07,2025-01-06T20:15:39.163000
|
||||
CVE-2024-5553,0,0,c6aeec952a2778be27c1792a1d1c97b8ff8c01ca6ed08226c6b506a6f771b767,2024-11-21T09:47:55.040000
|
||||
@ -271675,11 +271680,11 @@ CVE-2024-55546,0,0,942b232afb25307bd1bbb9171d407a64efb6124e7535155a6616308769a30
|
||||
CVE-2024-55547,0,0,9d23528e3e5c1a7b1f76563e1d474f90d9913c0e87c6f8fd8a14829ed85aff3d,2024-12-10T20:15:21.527000
|
||||
CVE-2024-55548,0,0,b89e0a622aeff00dfd6cdc1dc1884c1956fa3e7da287ae36b11ba4d60647d05d,2024-12-10T20:15:21.643000
|
||||
CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000
|
||||
CVE-2024-55550,0,1,9c9a30509bff8c2bca43bc78e6a45113dde5cc452b32a2969aee61b5f7aef23c,2025-01-08T20:46:01.203000
|
||||
CVE-2024-55550,0,0,9c9a30509bff8c2bca43bc78e6a45113dde5cc452b32a2969aee61b5f7aef23c,2025-01-08T20:46:01.203000
|
||||
CVE-2024-55553,0,0,3bc316f0af4b80bc58ae910e6172da9ff5010fe0b778c5270df43d1041706470,2025-01-07T16:15:36.840000
|
||||
CVE-2024-55554,0,0,09e3cdaa4a820daeb6598bb5a8faaf533e66285f3e6a4797b593c193d2a0933a,2024-12-17T17:15:09.843000
|
||||
CVE-2024-55555,0,0,0fff864cbeb4400bcfcde3625f1f4cf98f881f2b9aba59b727db3372655bde9e,2025-01-07T20:15:30.430000
|
||||
CVE-2024-55556,0,1,36ef2f008ce211b77e0b5750d7d4b803fcde3fc58fe847ba118d22617dc7c08a,2025-01-08T20:15:28.987000
|
||||
CVE-2024-55556,0,0,36ef2f008ce211b77e0b5750d7d4b803fcde3fc58fe847ba118d22617dc7c08a,2025-01-08T20:15:28.987000
|
||||
CVE-2024-55557,0,0,1c44f970be9c9162e2fd5fa3f9e1778bc69c31c3d5707dcbd0caa2e430754ba4,2024-12-17T16:15:25.900000
|
||||
CVE-2024-5556,0,0,f573f07f74091c9ef49ab63e55c790d8f661c071a22a95c82ecfdf6c6886287c,2024-08-27T14:36:53.273000
|
||||
CVE-2024-55560,0,0,34631484c4ac18e7385d5b08b3c8f4829d4f28112bef5e467e27e8892a961b13,2024-12-09T16:15:22.750000
|
||||
@ -272153,7 +272158,7 @@ CVE-2024-56538,0,0,05e6f243370f67e67c96f68f4c76b456d8b1f3b18efe17183f721393738aa
|
||||
CVE-2024-56539,0,0,73e3ac9371c38a01feaab685bc0b80785d1a14a9bbe3f9b6fa012305e81e56ab,2024-12-27T14:15:33.530000
|
||||
CVE-2024-5654,0,0,a36981ce1f77c761dfb14f4c731f47a8dfd22625db842c571518ed3950c72b86,2024-11-21T09:48:06.020000
|
||||
CVE-2024-56540,0,0,9bbe384790c8ce018fa6158c6c9afcb91eb4326c45847ca16b5953600db92de4,2024-12-27T14:15:33.670000
|
||||
CVE-2024-56541,0,0,590bcb1c700644aac7917f53bd9554353986a95487999aae34234cfedd914c00,2024-12-27T14:15:33.767000
|
||||
CVE-2024-56541,0,1,7084d91d256abff37c844e77e9a31d66fb1fe62676a1f93e5ccf37f018f7029a,2025-01-08T21:25:24.730000
|
||||
CVE-2024-56542,0,0,c22e6fa7d390e1afe8450440b362944db792ada801349ef3ed8bf0ee8bc16cf2,2024-12-27T14:15:33.880000
|
||||
CVE-2024-56543,0,0,887b5ebd3ba4f56e328fba92d390fd7953aa496872172482c2f78d83ece5941e,2024-12-27T14:15:34.020000
|
||||
CVE-2024-56544,0,0,ca1ec292015337081523043b4894d3fec345403de30dc92ff85e02c808d37447,2024-12-27T14:15:34.153000
|
||||
@ -272204,7 +272209,7 @@ CVE-2024-56584,0,0,eeb9dd397f2cf5bbbf04d47a1922c0a5bd55db3b2dd6af42d89d243ed3a0f
|
||||
CVE-2024-56585,0,0,877963cf60c4d690af9050e33b1bb1c26f5b0063aaeb8dcda5d72cde5d043865,2024-12-27T15:15:17.677000
|
||||
CVE-2024-56586,0,0,b0c3a1afa1e35fa2222a1770b2af5fd447e0839a2d0703f1d4ca2d9ff4979c31,2024-12-27T15:15:17.800000
|
||||
CVE-2024-56587,0,0,597ff3809927035a763007dd1ab65f05cbacc61e0ba8d04e0bc053074806191e,2024-12-27T15:15:17.917000
|
||||
CVE-2024-56588,0,0,d197662ec2cab9b52e7bc5ff12668b3172f242de7db49daffb85839a94cc3cc2,2024-12-27T15:15:18.040000
|
||||
CVE-2024-56588,0,1,aa89cf28160110554d9db50f9b3a3953651e6232debd2709afbefffb36888635,2025-01-08T21:48:24.173000
|
||||
CVE-2024-56589,0,0,e669c8f2a28110966f3559dfa46339a87026e650a8eac6b0a3c626f7087ebd28,2024-12-27T15:15:18.150000
|
||||
CVE-2024-5659,0,0,83e7687f93b86419198f1683634dd14733df87a0c466715b2e7e79370f69ac01,2024-11-21T09:48:06.543000
|
||||
CVE-2024-56590,0,0,ce1170c24714fa2e0e447addbede8cbfc003003487543f7771793bf3ebdaca04,2024-12-27T15:15:18.263000
|
||||
@ -272216,7 +272221,7 @@ CVE-2024-56595,0,0,5c739d39a04368864cbc388d8808a97d325a73a29c39f4cccb5f255c6ed55
|
||||
CVE-2024-56596,0,0,f9a03aa1aa88f972ffe6a55ad6e165129f456075471da9dcb4076a6e6b502209,2024-12-27T15:15:18.963000
|
||||
CVE-2024-56597,0,0,347c4891ee178d2857b2a9b9b3a59e9ef73cd9d9644a163cb89f5004d70ba847,2024-12-27T15:15:19.080000
|
||||
CVE-2024-56598,0,0,a2176885d0091e4f0f4ccf382f6f43c67f59acd5431ed7d070c60a0e375825cf,2024-12-27T15:15:19.200000
|
||||
CVE-2024-56599,0,0,2ccff4d7801b1259137e35edc39a719c848a3545739828c316f1b9d2f1c9c2d5,2024-12-27T15:15:19.307000
|
||||
CVE-2024-56599,0,1,04b9a5f3e69d9f54c42ecd83b1035f3ab23b521ab753e6e5aa5cefa0f19133d6,2025-01-08T21:48:04.090000
|
||||
CVE-2024-5660,0,0,185ada92ecf12140397c738113ef0443174eeeea8f301748716001f7b999562c,2024-12-16T14:15:05.123000
|
||||
CVE-2024-56600,0,0,52d580d322cdc56209d742bf1001e48cf3d43006079a875fc418ff12bed23270,2024-12-27T15:15:19.410000
|
||||
CVE-2024-56601,0,0,637410ffb911b579d9118778643db5f364036159a7ab02ab9694514f07f24700,2024-12-27T15:15:19.527000
|
||||
@ -272224,7 +272229,7 @@ CVE-2024-56602,0,0,ff463b8e2551ec1bfa6dc83aad02b0f0a834fbe19202bbf88d2a3ced34b92
|
||||
CVE-2024-56603,0,0,44c1fc20c2507a1b0892802648f891a340c404613043cf4a963b0efbbafa06ad,2024-12-27T15:15:19.770000
|
||||
CVE-2024-56604,0,0,565ab9d0b315999a07c7d4356116cd8598a6b3b07028c5fa8b14764daf5f90b9,2024-12-27T15:15:19.887000
|
||||
CVE-2024-56605,0,0,b64b4a627bbf95f44fe3405d04872bb763af58a6067e54da35f3e7f7c0ee5116,2024-12-27T15:15:19.980000
|
||||
CVE-2024-56606,0,0,a71e7dd711eb0364b89172b0c372f28265292eee0cf911f2b3aeffd343a59e7c,2024-12-27T15:15:20.087000
|
||||
CVE-2024-56606,0,1,ac0f83cc7a214072e6406d51e213fc315d5a502091a812f3bcbef5315f50bb3e,2025-01-08T21:46:59.767000
|
||||
CVE-2024-56607,0,0,ee73eedd6bd0ee7c97d323bfb736f17af98e701dbbb2223cb0dfb05c4d0e1892,2024-12-27T15:15:20.180000
|
||||
CVE-2024-56608,0,0,0d4d7a76c820d078ab63176c92aa3cecb2c95ef837fece154b0757799d40a37f,2025-01-08T17:10:01.233000
|
||||
CVE-2024-56609,0,0,cebfeb02fea20d2e5ec9b6db1e720f3f3e0983a6f297439668797a7ca6772c63,2024-12-27T15:15:20.387000
|
||||
@ -272243,7 +272248,7 @@ CVE-2024-5662,0,0,a32230f368c985ce000177685318420ae12365dafb7b142a133da07f0e3fd9
|
||||
CVE-2024-56620,0,0,62b2b96faf1f60cd015b681859229c54b1fe9ce3304d6f6d4b7456590dbf38dd,2025-01-08T16:09:56.403000
|
||||
CVE-2024-56621,0,0,becec3cb921696ec1e8d223c5c672e8625b14e057d03ddbb4a1c14a40fb95387,2025-01-08T16:44:53.720000
|
||||
CVE-2024-56622,0,0,57f9032cf59eb1768889e07334129fae85d94e8871f8d41026f335ec621b8f94,2024-12-27T15:15:21.730000
|
||||
CVE-2024-56623,0,0,84061956886d3000a76b0070d5a577cf5fb7fb2729269449f1a67fa7e5d9b903,2024-12-27T15:15:21.823000
|
||||
CVE-2024-56623,0,1,0e93d745489795428a20c54b35ad52e910e61dcb2158be56884d826399a6b1a3,2025-01-08T21:41:01.397000
|
||||
CVE-2024-56624,0,0,88799a063f0b005c3843d9067ee2b8e4d19fb1fd500724d525e887a886596206,2024-12-27T15:15:21.933000
|
||||
CVE-2024-56625,0,0,01037372e944818596a9b7f73f6b5c3b9ecad55d8f3378e4d833626252bed489,2024-12-27T15:15:22.033000
|
||||
CVE-2024-56626,0,0,9507827bbb175e001b11f84b3956f3317e09ce9b8f7e72675d76a6d737068242,2024-12-27T15:15:22.140000
|
||||
@ -272252,7 +272257,7 @@ CVE-2024-56628,0,0,d4522d2b8c88fd491d5e221aac0e8a6cb75c6500e0513d30049fbc40976e5
|
||||
CVE-2024-56629,0,0,c3ac49cfdd551a12a574df602f16819cd69e62bdcda6ce31db194f87ddd1b77f,2024-12-27T15:15:22.463000
|
||||
CVE-2024-5663,0,0,3d93cfa6260123c05a0fe5dd837778ab353045f85b9b96941dd647b061b7390d,2024-11-21T09:48:06.970000
|
||||
CVE-2024-56630,0,0,d6d5216a0f142ba6bcf7c47d2e00c742ad87f849638306ffcd1bf65dea9d39eb,2024-12-27T15:15:22.577000
|
||||
CVE-2024-56631,0,0,29d4144c015cfc42f072d5a6177bf3298ac1895ae6616941381c6f653c33dbf5,2024-12-27T15:15:22.690000
|
||||
CVE-2024-56631,0,1,617ad72d6cc164c6ec5e0872be5940aa2d750c02202d5d1494e4695f407911a5,2025-01-08T21:37:59.833000
|
||||
CVE-2024-56632,0,0,87f002e611c90fbf889f9615cfc01c68922e19cca4853fe3161af73b8e3806db,2024-12-27T15:15:22.803000
|
||||
CVE-2024-56633,0,0,8f14e1f5dec3f29ec32002015820b7dc04ee262ce167624069ed4db31922fa34,2024-12-27T15:15:22.933000
|
||||
CVE-2024-56634,0,0,d0f7bf396b8d8ec8091b0dd6b12e9ac6a4e3bc63a9f97a38d388da788cc29e3e,2025-01-08T16:45:10.040000
|
||||
@ -272264,7 +272269,7 @@ CVE-2024-56639,0,0,4e03b9a4b0fe8d6bd8f9fd82003b020dc8d8aef46c04d71ba745b13665fcf
|
||||
CVE-2024-5664,0,0,b6962e20742af8ea90e612bbc7ac8c73d6aa535f0e49e5cabd0c7dd59647632b,2024-11-21T09:48:07.107000
|
||||
CVE-2024-56640,0,0,cbe6c220e8c4e31481a770ac78aa1bd8cb1e00e3ee77b141b0919dfbc57b06eb,2024-12-27T15:15:23.730000
|
||||
CVE-2024-56641,0,0,7bd87e333960b236379a7ab6f66f186a39f9577a76aff23809b25204a27a92db,2024-12-27T15:15:23.830000
|
||||
CVE-2024-56642,0,0,ac80bdf712e9ba3e3a878808dc60334423b1c25edaffbe7c53a8b32cec5c80d1,2024-12-27T15:15:23.930000
|
||||
CVE-2024-56642,0,1,f811146448c39a9a6cc4c1f585da7148d95f1ad3c40ca22e2cf625a123ebe4d6,2025-01-08T21:37:23.950000
|
||||
CVE-2024-56643,0,0,7b5f1a4805f035363d7a8272badd51b331d739badf6cbf1475c665112dd3ac85,2025-01-06T17:14:41.813000
|
||||
CVE-2024-56644,0,0,8a46d5b530bbcb9e52d9ab6abd7dba97d34ca0f87bf22a510768ea3f07eda72d,2024-12-27T15:15:24.163000
|
||||
CVE-2024-56645,0,0,216619e3bf854381932f49b2368332f2fb98fc73e7d8eac5a9707768667df0ab,2024-12-27T15:15:24.260000
|
||||
@ -272565,7 +272570,7 @@ CVE-2024-5824,0,0,e1bcdf6d43e3da8ae6ba6ab7de5f8d3f3eaee723b9a1ed9af8e8dbb46b2110
|
||||
CVE-2024-5825,0,0,682d9c8db78e32760516d35e8d80736a485272125d13ba44bf7f0b379940e54f,2024-06-11T10:15:13.960000
|
||||
CVE-2024-5826,0,0,676ce5cec2202232492aeb7a31cb471cd0485dd44f0bad4d2271201c9d98c0de,2024-11-21T09:48:24.490000
|
||||
CVE-2024-5827,0,0,12cdd01c3634b5f2da13128a187bc2d1c8d9fa87429a9aed8ec50812f82df183,2024-11-21T09:48:24.607000
|
||||
CVE-2024-5828,0,0,42fc2d6e281fad378be60bd4a9a60618064b7bba92372dfb3e5207a2a6904aee,2024-08-06T16:30:24.547000
|
||||
CVE-2024-5828,0,1,73069a2f9dbd005f637a8c432d288f4c861c4d147da919c5c71f3de2432e48cd,2025-01-08T21:25:28.967000
|
||||
CVE-2024-5829,0,0,559dcf2146927d836020801e4f427537de3688dc2c4d2e0258f7b3fd7df26af1,2024-11-21T09:48:24.870000
|
||||
CVE-2024-5830,0,0,58fa656705847e8888d4baa011f2237c51ab84c7204f0c65ec2147b17109a82d,2024-11-21T09:48:25.010000
|
||||
CVE-2024-5831,0,0,9e502a518e4b6405afff92abaf73ea2137e504904b3519e7b72d524d071fb179,2024-11-21T09:48:25.233000
|
||||
@ -273461,7 +273466,7 @@ CVE-2024-6820,0,0,d49345aa069d354d1c6e40ded1ad61f62a354359a5ce0728beadc1fcf2503b
|
||||
CVE-2024-6821,0,0,d9533168d7235e28df27c61e6f5f17f9ab7fdd5177768258a9eb801a7c053fc6,2024-11-29T18:26:30.487000
|
||||
CVE-2024-6822,0,0,d07de9efa27babd066138fbe688e614f83b8a08f0a4be3e53ee99f76a8051349,2024-11-29T18:26:48.817000
|
||||
CVE-2024-6823,0,0,507bf1755068154356fbc9b75a57f8b2dc1da0c80bd55fde708f372104df4297,2024-08-13T12:58:25.437000
|
||||
CVE-2024-6824,0,0,4156dbfb03132f59c5018ebfea8a63c679b35a6d0828bc89913859548f86f9fe,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6824,0,1,aa23fd5579cfdc3f2c0e9f65e67bb12c513928f2173d0f46d80385a5b5f5d2cc,2025-01-08T21:19:51.450000
|
||||
CVE-2024-6826,0,0,6dc3ddf1692843a912faeec64198f3b4a4c6df842fd14ed632d889092f2dda4c,2024-12-13T15:29:32.850000
|
||||
CVE-2024-6828,0,0,982edf1ce9d659dfbd11370bdbf0f7daf4367ded5d8dbae90ae3fb05b545d32c,2024-11-21T09:50:22.943000
|
||||
CVE-2024-6830,0,0,b701dfb8329b51f5f1611713acab0fd035410cab601e1a2c121bd125b4608ab0,2024-11-21T09:50:23.070000
|
||||
@ -273656,8 +273661,8 @@ CVE-2024-7059,0,0,ce56df412767385b9cb61e4c8e1bf31372cfb963ffc3e23cc9674911b48dd5
|
||||
CVE-2024-7060,0,0,c0598e11620cb7c2d88064c17a434f301a6660aeeb00b2cac5526c91c534e6e7,2024-11-21T09:50:48.840000
|
||||
CVE-2024-7061,0,0,8526b9d19b3673c6e22c5c23db6ddcae8c5c6af148f708c06649a9c2b60e9bab,2024-08-28T18:25:38.217000
|
||||
CVE-2024-7062,0,0,168c4dad1590faa0fdf3e59812aa97ca21a605e41058ac70de28efc89704dd43,2024-11-21T09:50:49.053000
|
||||
CVE-2024-7063,0,1,e1a01ce9e0f71f3fed01593db24bc162a5cb8de2b68ce1edeacf04020cf8a70a,2025-01-08T20:33:37.817000
|
||||
CVE-2024-7064,0,1,155d5aa6e595ad27c7f9e03fb9a0274799f8be3280607ace805d705d065fa3cd,2025-01-08T20:30:58.207000
|
||||
CVE-2024-7063,0,0,e1a01ce9e0f71f3fed01593db24bc162a5cb8de2b68ce1edeacf04020cf8a70a,2025-01-08T20:33:37.817000
|
||||
CVE-2024-7064,0,0,155d5aa6e595ad27c7f9e03fb9a0274799f8be3280607ace805d705d065fa3cd,2025-01-08T20:30:58.207000
|
||||
CVE-2024-7065,0,0,9cc5257737f910d18b17f64e26dc0483f0055fa09dfb364a84340730664e7257,2024-11-21T09:50:49.327000
|
||||
CVE-2024-7066,0,0,6580bfda2716215fe470c479f49ce1b0113bcee7ab3fc4732a647ffe8c996e6d,2024-11-21T09:50:49.487000
|
||||
CVE-2024-7067,0,0,8eefdb1cfc4aaca14cb79985e5b7554edcc0d8362356b5c1a06a07af816e4cf6,2024-11-21T09:50:49.650000
|
||||
@ -273674,7 +273679,7 @@ CVE-2024-7082,0,0,2b028759baa437363b0cc7ad3dd78bb2bf3d1d6bef8b78e020b72446eb5c0e
|
||||
CVE-2024-7084,0,0,defb1354da8d1678d2485f21ed63c9a7f4e3a919dea9273a0ffa046a33d17e24,2024-11-01T21:35:06.680000
|
||||
CVE-2024-7090,0,0,7679e01617b8bc0fdb646a3483b9433c1190d790bc24dfbfcf4e67bf7ce57e8c,2024-08-21T12:30:33.697000
|
||||
CVE-2024-7091,0,0,2e97b518273552a04ba73841a769980ec5b660c5e31e35e2adff15b2a3f71791,2024-11-21T09:50:52.033000
|
||||
CVE-2024-7092,0,1,422abf4bd36177ce9961c0f919edf6c6f74cba62c54abe4f5e6a3dbdcfa5204a,2025-01-08T20:53:45.230000
|
||||
CVE-2024-7092,0,0,422abf4bd36177ce9961c0f919edf6c6f74cba62c54abe4f5e6a3dbdcfa5204a,2025-01-08T20:53:45.230000
|
||||
CVE-2024-7093,0,0,290b2b9585ccf417103151a24d8f190abbc7679ec51d5537d6ffb9bc07efb94a,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7094,0,0,b22ce77ffacf979339f568296208b1cc49b896d3f1ddb1fcde0ad4f63f12731e,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7098,0,0,6d3f84e80cfe29d233429433ab17908fcb372f3ed014d96486b0feeee4cd8197,2024-09-20T17:14:53.063000
|
||||
@ -274090,7 +274095,7 @@ CVE-2024-7544,0,0,f5bacc57de438a3891f625e9194bf22f3b74627e035164b84489b5c4d26bbd
|
||||
CVE-2024-7545,0,0,8216c555bf8242b290975f0b41b7e17046d0894f946fd673ad40f4ba36c98f60,2024-08-19T20:00:57.433000
|
||||
CVE-2024-7546,0,0,2bf5b9e1095969e3dbd5485145b386409016c6afdb554169ba425e835d0ec384,2024-08-29T17:55:47.547000
|
||||
CVE-2024-7547,0,0,7822254abb08f507b73da0f63c3de0001ec37a15858c40e5f1efb89542c0142d,2024-08-19T20:03:12.377000
|
||||
CVE-2024-7548,0,0,a346e5635bfb6b792f5bbb8d03f497c82dd124dc5f596547d47c36523808aa41,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7548,0,1,2af7beb0d4b8ceae7c4412eb435338c9d0389032417869486f388c5176513b65,2025-01-08T21:07:57.303000
|
||||
CVE-2024-7550,0,0,4203e18b9ad5e215a9b97e11487a0d42441334eaacdb7528676d4d5fbbf460bf,2024-08-12T18:32:08.900000
|
||||
CVE-2024-7551,0,0,44a9791906a617486b3ce4483ac9164f6da1c1e3323013bb47db16e9778eb950,2024-08-12T16:12:12.377000
|
||||
CVE-2024-7552,0,0,855cafe3f5a68512701a1f911776a165d3aa54b356bbb484abc0d9e617bcd5fa,2024-08-07T21:29:57.417000
|
||||
@ -276116,7 +276121,7 @@ CVE-2025-0173,0,0,c1f252ca4cbbf65084a89ab024bca7f0b17a90985239dec13e360a268ca336
|
||||
CVE-2025-0174,0,0,a58f6ba631c2a0feb58527b8303d7d4a31c3e3872c8ddd8918aacd475478a78f,2025-01-03T02:15:07.480000
|
||||
CVE-2025-0175,0,0,d9a687479ae4dd84b5b46d302a16ec57021ad84e1ebe3621ace137eeaefcef9b,2025-01-03T02:15:07.680000
|
||||
CVE-2025-0176,0,0,25b97cf7942e2d65b84cd3d69b2f6ce4b0c39c12b63a98b8f04cd8b606eafaef,2025-01-03T15:15:11.360000
|
||||
CVE-2025-0194,1,1,c06709847d23622e73b5bb90181a6ba8237930ba386bc53927e88b89c13cc831,2025-01-08T20:15:29.193000
|
||||
CVE-2025-0194,0,0,c06709847d23622e73b5bb90181a6ba8237930ba386bc53927e88b89c13cc831,2025-01-08T20:15:29.193000
|
||||
CVE-2025-0195,0,0,3a317c51726170702316fa33d45de8f3fef3184ae45ef5e02dd449cbd27af8d0,2025-01-03T18:15:17.317000
|
||||
CVE-2025-0196,0,0,fb71521e255dd853610214509345a55ba2b3e12d37e32c94fc1c20cb4b643ab6,2025-01-03T19:15:12.793000
|
||||
CVE-2025-0197,0,0,8050294c8ecdc49228ce7833915570638c5758146d0bd01628204a571b88b989,2025-01-03T20:15:28.873000
|
||||
@ -276163,7 +276168,7 @@ CVE-2025-0244,0,0,4dc39d4eb7e9626e46633620b63b126f4ca8c432d219058ffa0df86e8e17d0
|
||||
CVE-2025-0245,0,0,17124b2bb78bf9f026108e77a44161cf6b567d6714acd6476cda81e3148b7689,2025-01-08T16:15:37.693000
|
||||
CVE-2025-0246,0,0,f212da1e386aff9790e671db2401da03b9d2ebbeea4ee1b40e830ef0d58e3da6,2025-01-08T16:15:37.880000
|
||||
CVE-2025-0247,0,0,19788955cc9b607e55d300602d56942e119086cfe1c51c09f21df249cc649c46,2025-01-08T15:15:21.033000
|
||||
CVE-2025-0291,1,1,e64e166dc7ec231b6921ab6e7b688950a3c44d4ac259882cc427bcb73fed1fd1,2025-01-08T20:15:29.353000
|
||||
CVE-2025-0291,0,0,e64e166dc7ec231b6921ab6e7b688950a3c44d4ac259882cc427bcb73fed1fd1,2025-01-08T20:15:29.353000
|
||||
CVE-2025-0294,0,0,e5d86f9b17bdfc744e2441f17af376b91232f83a0091836e1403d549321b0bdf,2025-01-07T15:15:12.113000
|
||||
CVE-2025-0295,0,0,52a16028421d06d344a294c38baeb65e7eade91eddca5850ff08cb460a814ef0,2025-01-07T16:15:39.460000
|
||||
CVE-2025-0296,0,0,ef99994aa0e927283601f299ff2a2a7b6828140dc06395bd45961df4e93495db,2025-01-07T16:15:39.673000
|
||||
@ -276173,7 +276178,7 @@ CVE-2025-0299,0,0,46c993a70c9dd5843cd4dc3486123b8f79f076cb607c745df442454088b3fb
|
||||
CVE-2025-0300,0,0,6462b093b202cdda5c643638789beb08104cb14d8ff95eb1f2f740fecb0f8630,2025-01-07T17:15:32.090000
|
||||
CVE-2025-0301,0,0,db7e09db06a3c89075ef99c6e0773ce8d9b6391802870d788b13b4dc1d994dbc,2025-01-07T18:15:21.460000
|
||||
CVE-2025-20123,0,0,7f3b728d3f9cbfa875df0a45e50a08c953f805f15b1141475f4e31dfbed0e1d1,2025-01-08T16:15:38.150000
|
||||
CVE-2025-20126,0,1,1585188395ef0aa5a894bbea6d526bdf238d58865dbcb187ac89434fb8c590b9,2025-01-08T19:15:38.553000
|
||||
CVE-2025-20126,0,0,1585188395ef0aa5a894bbea6d526bdf238d58865dbcb187ac89434fb8c590b9,2025-01-08T19:15:38.553000
|
||||
CVE-2025-20166,0,0,b11a57811b63f7d2208067ccc65af65bb9e1761d9a36811f745adce498b4e21f,2025-01-08T17:15:16.990000
|
||||
CVE-2025-20167,0,0,e3874d78f816684b3ad3095069171d70c3e3e27074d9afdb1ef0c3389781207f,2025-01-08T17:15:17.163000
|
||||
CVE-2025-20168,0,0,1b582f0e103ddf474141bdcff2b1873e77789f263e13a1a2b55771b742e937b2,2025-01-08T17:15:17.323000
|
||||
@ -276200,10 +276205,11 @@ CVE-2025-22132,0,0,68d348d844ec3947f7795605dbc0f9b5ea1e9ec0bb464d07ae2fd1571ba27
|
||||
CVE-2025-22133,0,0,fbcb8ce624ceed57d4b59a3f2fe5dc11cb74a45b756ff7cc7f2369bba16ab526,2025-01-08T15:15:21.727000
|
||||
CVE-2025-22136,0,0,123a9917fd0885e775ecfe67805e47c52e223b69c26b7474799ef308240a577d,2025-01-08T16:15:38.770000
|
||||
CVE-2025-22137,0,0,b7624e8939f9495a9a9ad1232e6a1d9ca96cc90779cda5c7141fa5d1adf92295,2025-01-08T16:15:38.920000
|
||||
CVE-2025-22139,1,1,be959e3195c9ea3b69331abcd52f163ffe573225c18b8ab22128a548f8371fe1,2025-01-08T20:15:29.693000
|
||||
CVE-2025-22140,1,1,270f2879e8de65b243beb9d7f4b67eed45df0b791563d9a26d7b732c538b2740,2025-01-08T20:15:29.800000
|
||||
CVE-2025-22141,1,1,2044a7b2e6c78c72031cb6881e193da3e0a629d8a5ed02e93c39455436172a69,2025-01-08T20:15:29.897000
|
||||
CVE-2025-22143,1,1,379ec5cc1d9ddc4be571cdbe4ab10dde3e7605621fcd6681c8378b70a5e0e0ce,2025-01-08T20:15:30.003000
|
||||
CVE-2025-22139,0,0,be959e3195c9ea3b69331abcd52f163ffe573225c18b8ab22128a548f8371fe1,2025-01-08T20:15:29.693000
|
||||
CVE-2025-22140,0,0,270f2879e8de65b243beb9d7f4b67eed45df0b791563d9a26d7b732c538b2740,2025-01-08T20:15:29.800000
|
||||
CVE-2025-22141,0,0,2044a7b2e6c78c72031cb6881e193da3e0a629d8a5ed02e93c39455436172a69,2025-01-08T20:15:29.897000
|
||||
CVE-2025-22143,0,0,379ec5cc1d9ddc4be571cdbe4ab10dde3e7605621fcd6681c8378b70a5e0e0ce,2025-01-08T20:15:30.003000
|
||||
CVE-2025-22145,1,1,a3e7e33eb43759950c0b6a9c304c03ed60cf76009fe03502e9b6e5d41248cec1,2025-01-08T21:15:13.480000
|
||||
CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000
|
||||
CVE-2025-22215,0,0,67b181a6458a232e8ac5c80f2cba09df8333cbef01abc4197cfb8a002eebc845,2025-01-08T15:15:21.927000
|
||||
CVE-2025-22261,0,0,b64f32ab7c14edb8b70371073baa276f94f41977fffad6128d5b8c7f32ae4fb7,2025-01-07T11:15:13.290000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user